mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/04/04 12:14:25
This commit is contained in:
parent
d6721dda27
commit
b8aa9bf6e0
16 changed files with 99 additions and 75 deletions
|
@ -105,13 +105,13 @@
|
|||
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-10T02:39:57Z",
|
||||
"updated_at": "2021-04-02T09:12:34Z",
|
||||
"updated_at": "2021-04-04T00:14:01Z",
|
||||
"pushed_at": "2021-04-02T09:12:32Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2021-04-02T01:41:29Z",
|
||||
"updated_at": "2021-04-04T02:46:49Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-05-24T16:28:46Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-16T05:54:16Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 42,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354442383,
|
||||
"name": "cve-2020-1337-poc",
|
||||
"full_name": "password520\/cve-2020-1337-poc",
|
||||
"owner": {
|
||||
"login": "password520",
|
||||
"id": 29515145,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29515145?v=4",
|
||||
"html_url": "https:\/\/github.com\/password520"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/password520\/cve-2020-1337-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-04T02:56:02Z",
|
||||
"updated_at": "2021-04-04T02:56:12Z",
|
||||
"pushed_at": "2021-04-04T02:56:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-04-03T17:38:46Z",
|
||||
"updated_at": "2021-04-03T21:24:32Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"stargazers_count": 296,
|
||||
"watchers_count": 296,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 295,
|
||||
"watchers": 296,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 297507799,
|
||||
"name": "CVE-2020-25790",
|
||||
"full_name": "pownx\/CVE-2020-25790",
|
||||
"owner": {
|
||||
"login": "pownx",
|
||||
"id": 79206826,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79206826?v=4",
|
||||
"html_url": "https:\/\/github.com\/pownx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pownx\/CVE-2020-25790",
|
||||
"description": "Exploit for CVE-2020-25790",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-22T01:57:06Z",
|
||||
"updated_at": "2021-03-15T21:07:53Z",
|
||||
"pushed_at": "2021-03-10T21:51:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 302557281,
|
||||
"name": "CVE-2020-25790",
|
||||
|
|
|
@ -691,19 +691,19 @@
|
|||
},
|
||||
{
|
||||
"id": 278201438,
|
||||
"name": "checkvulnCVE2020590",
|
||||
"full_name": "renanhsilva\/checkvulnCVE2020590",
|
||||
"name": "checkvulnCVE20205902",
|
||||
"full_name": "renanhsilva\/checkvulnCVE20205902",
|
||||
"owner": {
|
||||
"login": "renanhsilva",
|
||||
"id": 29900840,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29900840?v=4",
|
||||
"html_url": "https:\/\/github.com\/renanhsilva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/renanhsilva\/checkvulnCVE2020590",
|
||||
"html_url": "https:\/\/github.com\/renanhsilva\/checkvulnCVE20205902",
|
||||
"description": "A powershell script to check vulnerability CVE-2020-5902 of ip list",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-08T21:50:32Z",
|
||||
"updated_at": "2020-07-09T16:15:21Z",
|
||||
"updated_at": "2021-04-04T00:01:08Z",
|
||||
"pushed_at": "2020-07-08T21:56:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-30T05:21:26Z",
|
||||
"updated_at": "2021-04-03T09:37:17Z",
|
||||
"updated_at": "2021-04-03T21:20:33Z",
|
||||
"pushed_at": "2021-03-30T05:31:22Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-04-01T06:47:36Z",
|
||||
"updated_at": "2021-04-03T23:45:15Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Nmap script to check vulnerability CVE-2021-21975",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T21:59:05Z",
|
||||
"updated_at": "2021-04-03T21:16:21Z",
|
||||
"updated_at": "2021-04-04T00:15:45Z",
|
||||
"pushed_at": "2021-04-02T00:32:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for CVE-2021-24098",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T07:29:44Z",
|
||||
"updated_at": "2021-04-02T11:30:27Z",
|
||||
"updated_at": "2021-04-03T21:17:20Z",
|
||||
"pushed_at": "2021-04-01T07:34:23Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -358,13 +358,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T16:54:39Z",
|
||||
"updated_at": "2021-04-01T10:45:33Z",
|
||||
"updated_at": "2021-04-03T23:24:23Z",
|
||||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -661,8 +661,8 @@
|
|||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -964,5 +964,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354429117,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "password520\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "password520",
|
||||
"id": 29515145,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29515145?v=4",
|
||||
"html_url": "https:\/\/github.com\/password520"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/password520\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-04T01:15:05Z",
|
||||
"updated_at": "2021-04-04T01:15:15Z",
|
||||
"pushed_at": "2021-04-04T01:15:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2021-04-03T13:58:33Z",
|
||||
"updated_at": "2021-04-03T23:47:22Z",
|
||||
"pushed_at": "2021-03-31T12:00:09Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -168,6 +168,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [Chal13W1zz/Sudo-Spunk](https://github.com/Chal13W1zz/Sudo-Spunk)
|
||||
- [lmol/CVE-2021-3156](https://github.com/lmol/CVE-2021-3156)
|
||||
- [Nokialinux/CVE-2021-3156](https://github.com/Nokialinux/CVE-2021-3156)
|
||||
- [password520/CVE-2021-3156](https://github.com/password520/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [y3rb1t4/CVE-2021-3157](https://github.com/y3rb1t4/CVE-2021-3157)
|
||||
|
@ -1202,6 +1203,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se
|
|||
- [VoidSec/CVE-2020-1337](https://github.com/VoidSec/CVE-2020-1337)
|
||||
- [neofito/CVE-2020-1337](https://github.com/neofito/CVE-2020-1337)
|
||||
- [sailay1996/cve-2020-1337-poc](https://github.com/sailay1996/cve-2020-1337-poc)
|
||||
- [password520/cve-2020-1337-poc](https://github.com/password520/cve-2020-1337-poc)
|
||||
|
||||
### CVE-2020-1349 (2020-07-14)
|
||||
|
||||
|
@ -1755,7 +1757,7 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
|
|||
- [zhzyker/CVE-2020-5902](https://github.com/zhzyker/CVE-2020-5902)
|
||||
- [GovindPalakkal/EvilRip](https://github.com/GovindPalakkal/EvilRip)
|
||||
- [dnerzker/CVE-2020-5902](https://github.com/dnerzker/CVE-2020-5902)
|
||||
- [renanhsilva/checkvulnCVE2020590](https://github.com/renanhsilva/checkvulnCVE2020590)
|
||||
- [renanhsilva/checkvulnCVE20205902](https://github.com/renanhsilva/checkvulnCVE20205902)
|
||||
- [halencarjunior/f5scan](https://github.com/halencarjunior/f5scan)
|
||||
- [deepsecurity-pe/GoF5-CVE-2020-5902](https://github.com/deepsecurity-pe/GoF5-CVE-2020-5902)
|
||||
- [Shu1L/CVE-2020-5902-fofa-scan](https://github.com/Shu1L/CVE-2020-5902-fofa-scan)
|
||||
|
@ -4195,7 +4197,6 @@ An issue was discovered on Accfly Wireless Security IR Camera 720P System with s
|
|||
** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2.
|
||||
</code>
|
||||
|
||||
- [pownx/CVE-2020-25790](https://github.com/pownx/CVE-2020-25790)
|
||||
- [7Mitu/CVE-2020-25790](https://github.com/7Mitu/CVE-2020-25790)
|
||||
|
||||
### CVE-2020-25860 (2020-12-21)
|
||||
|
|
Loading…
Add table
Reference in a new issue