mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/01/22 12:09:59
This commit is contained in:
parent
cf22a439d1
commit
bfab2b1064
19 changed files with 87 additions and 87 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Environment for CVE-2018-1273 (Spring Data Commons)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-13T13:41:02Z",
|
||||
"updated_at": "2019-04-24T05:33:19Z",
|
||||
"updated_at": "2021-01-22T02:49:50Z",
|
||||
"pushed_at": "2018-08-15T05:26:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2021-01-12T07:21:25Z",
|
||||
"updated_at": "2021-01-22T02:12:21Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-15T11:54:21Z",
|
||||
"updated_at": "2021-01-11T20:36:20Z",
|
||||
"updated_at": "2021-01-21T21:29:48Z",
|
||||
"pushed_at": "2020-06-09T13:13:44Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
|
|
|
@ -183,29 +183,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234598729,
|
||||
"name": "CVE-2020-0601",
|
||||
"full_name": "YoannDqr\/CVE-2020-0601",
|
||||
"owner": {
|
||||
"login": "YoannDqr",
|
||||
"id": 26006989,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26006989?v=4",
|
||||
"html_url": "https:\/\/github.com\/YoannDqr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/YoannDqr\/CVE-2020-0601",
|
||||
"description": "CurveBall CVE exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T17:17:55Z",
|
||||
"updated_at": "2020-02-09T12:37:38Z",
|
||||
"pushed_at": "2020-01-20T10:52:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235145190,
|
||||
"name": "curveball",
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-11T20:13:05Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1071,13 +1071,13 @@
|
|||
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-20T21:38:47Z",
|
||||
"updated_at": "2021-01-20T22:25:08Z",
|
||||
"updated_at": "2021-01-21T22:43:02Z",
|
||||
"pushed_at": "2021-01-20T22:25:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2021-01-21T16:44:00Z",
|
||||
"updated_at": "2021-01-22T02:52:28Z",
|
||||
"pushed_at": "2021-01-13T10:38:48Z",
|
||||
"stargazers_count": 783,
|
||||
"watchers_count": 783,
|
||||
"forks_count": 143,
|
||||
"forks": 143,
|
||||
"watchers": 783,
|
||||
"stargazers_count": 788,
|
||||
"watchers_count": 788,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"watchers": 788,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-21T15:38:22Z",
|
||||
"updated_at": "2021-01-21T01:33:41Z",
|
||||
"updated_at": "2021-01-22T02:29:43Z",
|
||||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exchange2010 authorized RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T10:30:16Z",
|
||||
"updated_at": "2021-01-19T02:32:34Z",
|
||||
"updated_at": "2021-01-22T02:14:33Z",
|
||||
"pushed_at": "2020-12-24T08:11:51Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-21T15:58:16Z",
|
||||
"updated_at": "2021-01-22T03:12:11Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 887,
|
||||
"watchers_count": 887,
|
||||
"stargazers_count": 888,
|
||||
"watchers_count": 888,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 887,
|
||||
"watchers": 888,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2021-01-20T01:45:48Z",
|
||||
"updated_at": "2021-01-22T02:25:46Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 210,
|
||||
"watchers": 211,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": " CVE-2020-35728 & Jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T01:55:39Z",
|
||||
"updated_at": "2021-01-20T05:13:32Z",
|
||||
"updated_at": "2021-01-22T01:02:02Z",
|
||||
"pushed_at": "2020-12-31T01:56:18Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T10:49:40Z",
|
||||
"updated_at": "2021-01-21T20:40:04Z",
|
||||
"updated_at": "2021-01-21T23:32:08Z",
|
||||
"pushed_at": "2021-01-15T16:25:19Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 24,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Hacking Artifactory with server side template injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T13:56:43Z",
|
||||
"updated_at": "2020-12-11T10:21:56Z",
|
||||
"updated_at": "2021-01-22T02:06:59Z",
|
||||
"pushed_at": "2020-03-12T06:55:39Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 331774345,
|
||||
"name": "CVE-2020-8554",
|
||||
"full_name": "Dviejopomata\/CVE-2020-8554",
|
||||
"owner": {
|
||||
"login": "Dviejopomata",
|
||||
"id": 6862893,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6862893?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dviejopomata"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dviejopomata\/CVE-2020-8554",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T22:41:50Z",
|
||||
"updated_at": "2021-01-21T22:42:08Z",
|
||||
"pushed_at": "2021-01-21T22:42:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Information about Kubernetes CVE-2020-8558, including proof of concept exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T06:56:07Z",
|
||||
"updated_at": "2021-01-21T16:01:44Z",
|
||||
"updated_at": "2021-01-22T01:20:20Z",
|
||||
"pushed_at": "2020-07-22T12:34:47Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2021-3019 lanproxy目录遍历任意文件读取漏洞探测POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T04:18:44Z",
|
||||
"updated_at": "2021-01-20T01:39:20Z",
|
||||
"updated_at": "2021-01-22T02:56:21Z",
|
||||
"pushed_at": "2021-01-13T07:29:01Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-01-19T07:42:13Z",
|
||||
"updated_at": "2021-01-22T00:14:39Z",
|
||||
"pushed_at": "2021-01-13T13:25:10Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -185,7 +185,6 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
|
|||
- [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601)
|
||||
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
|
||||
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
|
||||
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
|
||||
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
|
||||
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
|
||||
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
|
||||
|
@ -1478,6 +1477,7 @@ Kubernetes API server in all versions allow an attacker who is able to create a
|
|||
- [rancher/externalip-webhook](https://github.com/rancher/externalip-webhook)
|
||||
- [jrmurray000/CVE-2020-8554](https://github.com/jrmurray000/CVE-2020-8554)
|
||||
- [twistlock/k8s-cve-2020-8554-mitigations](https://github.com/twistlock/k8s-cve-2020-8554-mitigations)
|
||||
- [Dviejopomata/CVE-2020-8554](https://github.com/Dviejopomata/CVE-2020-8554)
|
||||
|
||||
### CVE-2020-8558 (2020-07-27)
|
||||
|
||||
|
|
Loading…
Reference in a new issue