mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/05/24 18:07:47
This commit is contained in:
parent
0db82d83e6
commit
c7e76ab21f
13 changed files with 77 additions and 44 deletions
|
@ -59,13 +59,13 @@
|
|||
"description": "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in ",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T09:43:04Z",
|
||||
"updated_at": "2020-03-31T12:07:37Z",
|
||||
"updated_at": "2020-05-24T08:53:20Z",
|
||||
"pushed_at": "2018-02-19T03:04:07Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2018-12-12T02:54:01Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-2628 & CVE-2018-2893",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-18T05:41:23Z",
|
||||
"updated_at": "2020-05-22T11:30:31Z",
|
||||
"updated_at": "2020-05-24T08:46:14Z",
|
||||
"pushed_at": "2018-07-20T01:24:36Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-10T02:39:57Z",
|
||||
"updated_at": "2020-04-18T10:15:35Z",
|
||||
"updated_at": "2020-05-24T03:25:54Z",
|
||||
"pushed_at": "2019-12-11T09:33:31Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12814.json
Normal file
25
2019/CVE-2019-12814.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 266469917,
|
||||
"name": "CVE-2019-12814",
|
||||
"full_name": "Al1ex\/CVE-2019-12814",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2019-12814",
|
||||
"description": "CVE-2019-12814:Jackson JDOM XSLTransformer Gadget",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T04:33:55Z",
|
||||
"updated_at": "2020-05-24T04:35:06Z",
|
||||
"pushed_at": "2020-05-24T04:35:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2020-05-21T08:43:18Z",
|
||||
"updated_at": "2020-05-24T03:36:31Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 385,
|
||||
"watchers": 386,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-08-19T17:33:56Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "The reproduction code for CVE-2019-8641.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T07:29:01Z",
|
||||
"updated_at": "2020-05-20T08:23:28Z",
|
||||
"pushed_at": "2020-05-20T08:23:26Z",
|
||||
"updated_at": "2020-05-24T07:24:55Z",
|
||||
"pushed_at": "2020-05-24T07:24:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T08:01:37Z",
|
||||
"updated_at": "2020-05-21T08:36:19Z",
|
||||
"updated_at": "2020-05-24T05:59:36Z",
|
||||
"pushed_at": "2020-05-04T08:11:21Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -197,8 +197,8 @@
|
|||
"description": "CVE-2020-2551 POC to use in Internet",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T02:56:12Z",
|
||||
"updated_at": "2020-05-24T02:56:16Z",
|
||||
"pushed_at": "2020-05-24T02:56:14Z",
|
||||
"updated_at": "2020-05-24T03:43:41Z",
|
||||
"pushed_at": "2020-05-24T03:43:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-8617 (BIND)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T12:26:45Z",
|
||||
"updated_at": "2020-05-23T13:04:38Z",
|
||||
"updated_at": "2020-05-24T05:44:48Z",
|
||||
"pushed_at": "2020-05-20T13:03:50Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2020-05-23T13:57:03Z",
|
||||
"updated_at": "2020-05-24T08:35:55Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T00:41:06Z",
|
||||
"updated_at": "2020-05-23T03:06:25Z",
|
||||
"updated_at": "2020-05-24T04:07:54Z",
|
||||
"pushed_at": "2020-05-21T10:15:35Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-05-21T15:13:22Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -2090,6 +2090,14 @@ Symantec Endpoint Protection, prior to 14.2 RU1 & 12.1 RU6 MP10 and Symantec
|
|||
### CVE-2019-12796
|
||||
- [PeterUpfold/CVE-2019-12796](https://github.com/PeterUpfold/CVE-2019-12796)
|
||||
|
||||
### CVE-2019-12814
|
||||
|
||||
<code>
|
||||
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2019-12814](https://github.com/Al1ex/CVE-2019-12814)
|
||||
|
||||
### CVE-2019-12815
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue