mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/11/14 06:09:16
This commit is contained in:
parent
47018cb949
commit
c21f163458
22 changed files with 122 additions and 256 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 224839310,
|
||||
"name": "CVE-2007-0038",
|
||||
"full_name": "Axua\/CVE-2007-0038",
|
||||
"owner": {
|
||||
"login": "Axua",
|
||||
"id": 28788087,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
|
||||
"html_url": "https:\/\/github.com\/Axua"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038",
|
||||
"description": "IE7 buffer overflow through an ANI file",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-29T11:15:39Z",
|
||||
"updated_at": "2020-04-30T04:01:07Z",
|
||||
"pushed_at": "2019-11-29T11:16:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 27229028,
|
||||
"name": "spydir",
|
||||
"full_name": "z3APA3A\/spydir",
|
||||
"owner": {
|
||||
"login": "z3APA3A",
|
||||
"id": 7222768,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7222768?v=4",
|
||||
"html_url": "https:\/\/github.com\/z3APA3A"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z3APA3A\/spydir",
|
||||
"description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)",
|
||||
"fork": false,
|
||||
"created_at": "2014-11-27T14:36:05Z",
|
||||
"updated_at": "2020-09-04T11:59:08Z",
|
||||
"pushed_at": "2017-04-08T16:40:03Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,73 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 143461594,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "amriunix\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "amriunix",
|
||||
"id": 6618368,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6618368?v=4",
|
||||
"html_url": "https:\/\/github.com\/amriunix"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447",
|
||||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T18:39:56Z",
|
||||
"updated_at": "2020-11-04T10:36:06Z",
|
||||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 195401614,
|
||||
"name": "metasploitable2",
|
||||
"full_name": "Unix13\/metasploitable2",
|
||||
"owner": {
|
||||
"login": "Unix13",
|
||||
"id": 52569108,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/52569108?v=4",
|
||||
"html_url": "https:\/\/github.com\/Unix13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Unix13\/metasploitable2",
|
||||
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-05T11:55:41Z",
|
||||
"updated_at": "2020-08-26T14:48:27Z",
|
||||
"pushed_at": "2018-07-11T18:22:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 211957347,
|
||||
"name": "smb_usermap",
|
||||
"full_name": "b1fair\/smb_usermap",
|
||||
"owner": {
|
||||
"login": "b1fair",
|
||||
"id": 43326124,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/43326124?v=4",
|
||||
"html_url": "https:\/\/github.com\/b1fair"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b1fair\/smb_usermap",
|
||||
"description": "A simple exploit for CVE-2007-2447",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T21:06:09Z",
|
||||
"updated_at": "2019-10-01T18:44:18Z",
|
||||
"pushed_at": "2019-10-01T18:44:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 225688290,
|
||||
"name": "exploit_smb_usermap_script",
|
||||
|
@ -91,52 +22,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235003634,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "JoseBarrios\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "JoseBarrios",
|
||||
"id": 794342,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/794342?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoseBarrios"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447",
|
||||
"description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T02:30:35Z",
|
||||
"updated_at": "2020-01-20T02:30:39Z",
|
||||
"pushed_at": "2020-01-20T02:30:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 257885318,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "3x1t1um\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "3x1t1um",
|
||||
"id": 54857145,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54857145?v=4",
|
||||
"html_url": "https:\/\/github.com\/3x1t1um"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T11:47:16Z",
|
||||
"updated_at": "2020-08-04T14:13:55Z",
|
||||
"pushed_at": "2020-08-04T14:13:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 264335823,
|
||||
"name": "smb-usermap-destroyer",
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "IBM Lotus Notes PNG Integer Overflow",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-03T15:55:12Z",
|
||||
"updated_at": "2020-01-03T17:32:12Z",
|
||||
"pushed_at": "2020-01-03T16:49:42Z",
|
||||
"updated_at": "2020-11-13T18:29:22Z",
|
||||
"pushed_at": "2020-11-13T18:29:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Sketchup MAC Pict Material Palette Stack Corruption",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-03T16:53:55Z",
|
||||
"updated_at": "2020-01-03T17:31:14Z",
|
||||
"pushed_at": "2020-01-03T17:11:11Z",
|
||||
"updated_at": "2020-11-13T18:48:51Z",
|
||||
"pushed_at": "2020-11-13T18:48:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -36,8 +36,8 @@
|
|||
"description": "Sketchup BMP Material RLE4 Heap Overflow",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-03T17:05:48Z",
|
||||
"updated_at": "2020-01-03T17:31:47Z",
|
||||
"pushed_at": "2020-01-03T17:10:23Z",
|
||||
"updated_at": "2020-11-13T18:44:43Z",
|
||||
"pushed_at": "2020-11-13T18:44:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2013-6282 proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-19T16:14:18Z",
|
||||
"updated_at": "2020-10-12T10:04:26Z",
|
||||
"updated_at": "2020-11-13T16:35:19Z",
|
||||
"pushed_at": "2016-12-19T16:19:07Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 11,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2014-3153 aka towelroot",
|
||||
"fork": false,
|
||||
"created_at": "2014-07-24T13:28:00Z",
|
||||
"updated_at": "2020-08-29T15:46:18Z",
|
||||
"updated_at": "2020-11-13T15:45:10Z",
|
||||
"pushed_at": "2017-04-25T07:24:08Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 120,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1305,8 +1305,8 @@
|
|||
"pushed_at": "2020-11-12T04:15:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -113,5 +113,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 312628962,
|
||||
"name": "exploit_laravel_cve-2018-15133",
|
||||
"full_name": "aljavier\/exploit_laravel_cve-2018-15133",
|
||||
"owner": {
|
||||
"login": "aljavier",
|
||||
"id": 1992392,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1992392?v=4",
|
||||
"html_url": "https:\/\/github.com\/aljavier"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aljavier\/exploit_laravel_cve-2018-15133",
|
||||
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T16:33:52Z",
|
||||
"updated_at": "2020-11-13T20:50:17Z",
|
||||
"pushed_at": "2020-11-13T20:50:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-11-10T11:10:22Z",
|
||||
"updated_at": "2020-11-13T16:38:54Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 331,
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 332,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2019-05-15T02:51:24Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1278,13 +1278,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-11-13T03:51:33Z",
|
||||
"updated_at": "2020-11-13T18:29:00Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 771,
|
||||
"watchers_count": 771,
|
||||
"stargazers_count": 772,
|
||||
"watchers_count": 772,
|
||||
"forks_count": 189,
|
||||
"forks": 189,
|
||||
"watchers": 771,
|
||||
"watchers": 772,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2313,13 +2313,13 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2020-11-11T08:01:49Z",
|
||||
"updated_at": "2020-11-13T19:48:05Z",
|
||||
"pushed_at": "2019-10-16T01:04:12Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 166,
|
||||
"watchers": 167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-13T10:01:52Z",
|
||||
"updated_at": "2020-11-13T15:15:33Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2049,
|
||||
"watchers_count": 2049,
|
||||
"forks_count": 548,
|
||||
"forks": 548,
|
||||
"watchers": 2049,
|
||||
"stargazers_count": 2050,
|
||||
"watchers_count": 2050,
|
||||
"forks_count": 549,
|
||||
"forks": 549,
|
||||
"watchers": 2050,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-24T13:22:30Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-10T10:54:36Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-13T10:01:52Z",
|
||||
"updated_at": "2020-11-13T15:15:33Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2049,
|
||||
"watchers_count": 2049,
|
||||
"forks_count": 548,
|
||||
"forks": 548,
|
||||
"watchers": 2049,
|
||||
"stargazers_count": 2050,
|
||||
"watchers_count": 2050,
|
||||
"forks_count": 549,
|
||||
"forks": 549,
|
||||
"watchers": 2050,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2020-11-13T10:08:32Z",
|
||||
"updated_at": "2020-11-13T15:24:31Z",
|
||||
"pushed_at": "2020-11-10T02:58:25Z",
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 335,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-11-13T14:07:33Z",
|
||||
"updated_at": "2020-11-13T18:19:31Z",
|
||||
"pushed_at": "2020-11-04T02:26:59Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 176,
|
||||
"watchers": 177,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-13T13:41:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-10-22T15:22:55Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2020/CVE-2020-25769.json
Normal file
25
2020/CVE-2020-25769.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 312644639,
|
||||
"name": "CVE-2020-25769",
|
||||
"full_name": "lagartojuancho\/CVE-2020-25769",
|
||||
"owner": {
|
||||
"login": "lagartojuancho",
|
||||
"id": 59481050,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/59481050?v=4",
|
||||
"html_url": "https:\/\/github.com\/lagartojuancho"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lagartojuancho\/CVE-2020-25769",
|
||||
"description": "GOG Galaxy Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T17:42:40Z",
|
||||
"updated_at": "2020-11-13T18:51:41Z",
|
||||
"pushed_at": "2020-11-13T18:51:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2020-11-12T08:58:55Z",
|
||||
"updated_at": "2020-11-13T15:25:54Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
README.md
25
README.md
|
@ -2762,6 +2762,9 @@ The Telnet service of Rubetek cameras RV-3406, RV-3409, and RV-3411 cameras (fir
|
|||
|
||||
- [jet-pentest/CVE-2020-25749](https://github.com/jet-pentest/CVE-2020-25749)
|
||||
|
||||
### CVE-2020-25769
|
||||
- [lagartojuancho/CVE-2020-25769](https://github.com/lagartojuancho/CVE-2020-25769)
|
||||
|
||||
### CVE-2020-25790 (2020-09-19)
|
||||
|
||||
<code>
|
||||
|
@ -8610,6 +8613,7 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut
|
|||
- [Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader](https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader)
|
||||
- [iansangaji/laravel-rce-cve-2018-15133](https://github.com/iansangaji/laravel-rce-cve-2018-15133)
|
||||
- [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133)
|
||||
- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133)
|
||||
|
||||
### CVE-2018-15365 (2018-09-28)
|
||||
|
||||
|
@ -15805,22 +15809,6 @@ Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before
|
|||
|
||||
|
||||
## 2007
|
||||
### CVE-2007-0038 (2007-03-30)
|
||||
|
||||
<code>
|
||||
Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.
|
||||
</code>
|
||||
|
||||
- [Axua/CVE-2007-0038](https://github.com/Axua/CVE-2007-0038)
|
||||
|
||||
### CVE-2007-0843 (2007-02-22)
|
||||
|
||||
<code>
|
||||
The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
|
||||
</code>
|
||||
|
||||
- [z3APA3A/spydir](https://github.com/z3APA3A/spydir)
|
||||
|
||||
### CVE-2007-1567 (2007-03-21)
|
||||
|
||||
<code>
|
||||
|
@ -15835,12 +15823,7 @@ Stack-based buffer overflow in War FTP Daemon 1.65, and possibly earlier, allows
|
|||
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
|
||||
</code>
|
||||
|
||||
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
|
||||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
|
||||
- [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script)
|
||||
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
|
||||
- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447)
|
||||
- [nickvourd/smb-usermap-destroyer](https://github.com/nickvourd/smb-usermap-destroyer)
|
||||
|
||||
### CVE-2007-3830 (2007-07-17)
|
||||
|
|
Loading…
Reference in a new issue