mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/03/12 12:07:14
This commit is contained in:
parent
ccc65d04c2
commit
d2263d4450
28 changed files with 188 additions and 140 deletions
|
@ -36,13 +36,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-03-11T08:03:35Z",
|
"updated_at": "2020-03-12T00:11:51Z",
|
||||||
"pushed_at": "2020-03-07T13:15:39Z",
|
"pushed_at": "2020-03-07T13:15:39Z",
|
||||||
"stargazers_count": 264,
|
"stargazers_count": 265,
|
||||||
"watchers_count": 264,
|
"watchers_count": 265,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 264,
|
"watchers": 265,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -82,7 +82,7 @@
|
||||||
"description": "PoC code for 32 bit Android OS",
|
"description": "PoC code for 32 bit Android OS",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2015-09-12T01:31:36Z",
|
"created_at": "2015-09-12T01:31:36Z",
|
||||||
"updated_at": "2020-02-16T14:57:21Z",
|
"updated_at": "2020-03-11T23:05:06Z",
|
||||||
"pushed_at": "2015-12-15T05:42:02Z",
|
"pushed_at": "2015-12-15T05:42:02Z",
|
||||||
"stargazers_count": 128,
|
"stargazers_count": 128,
|
||||||
"watchers_count": 128,
|
"watchers_count": 128,
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-03-11T08:03:35Z",
|
"updated_at": "2020-03-12T00:11:51Z",
|
||||||
"pushed_at": "2020-03-07T13:15:39Z",
|
"pushed_at": "2020-03-07T13:15:39Z",
|
||||||
"stargazers_count": 264,
|
"stargazers_count": 265,
|
||||||
"watchers_count": 264,
|
"watchers_count": 265,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 264,
|
"watchers": 265,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2019-10-21T08:13:40Z",
|
"pushed_at": "2019-10-21T08:13:40Z",
|
||||||
"stargazers_count": 39,
|
"stargazers_count": 39,
|
||||||
"watchers_count": 39,
|
"watchers_count": 39,
|
||||||
"forks_count": 14,
|
"forks_count": 15,
|
||||||
"forks": 14,
|
"forks": 15,
|
||||||
"watchers": 39,
|
"watchers": 39,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-03-11T08:03:35Z",
|
"updated_at": "2020-03-12T00:11:51Z",
|
||||||
"pushed_at": "2020-03-07T13:15:39Z",
|
"pushed_at": "2020-03-07T13:15:39Z",
|
||||||
"stargazers_count": 264,
|
"stargazers_count": 265,
|
||||||
"watchers_count": 264,
|
"watchers_count": 265,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 264,
|
"watchers": 265,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
|
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-04-10T03:44:04Z",
|
"created_at": "2017-04-10T03:44:04Z",
|
||||||
"updated_at": "2020-01-11T12:22:37Z",
|
"updated_at": "2020-03-12T00:59:44Z",
|
||||||
"pushed_at": "2017-04-12T09:17:27Z",
|
"pushed_at": "2017-04-12T09:17:27Z",
|
||||||
"stargazers_count": 162,
|
"stargazers_count": 163,
|
||||||
"watchers_count": 162,
|
"watchers_count": 163,
|
||||||
"forks_count": 78,
|
"forks_count": 78,
|
||||||
"forks": 78,
|
"forks": 78,
|
||||||
"watchers": 162,
|
"watchers": 163,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-03-08T00:08:20Z",
|
"pushed_at": "2020-03-08T00:08:20Z",
|
||||||
"stargazers_count": 317,
|
"stargazers_count": 317,
|
||||||
"watchers_count": 317,
|
"watchers_count": 317,
|
||||||
"forks_count": 286,
|
"forks_count": 287,
|
||||||
"forks": 286,
|
"forks": 287,
|
||||||
"watchers": 317,
|
"watchers": 317,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -450,13 +450,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-03-11T08:03:35Z",
|
"updated_at": "2020-03-12T00:11:51Z",
|
||||||
"pushed_at": "2020-03-07T13:15:39Z",
|
"pushed_at": "2020-03-07T13:15:39Z",
|
||||||
"stargazers_count": 264,
|
"stargazers_count": 265,
|
||||||
"watchers_count": 264,
|
"watchers_count": 265,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 264,
|
"watchers": 265,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-12-21T22:45:55Z",
|
"created_at": "2019-12-21T22:45:55Z",
|
||||||
"updated_at": "2020-03-11T08:11:13Z",
|
"updated_at": "2020-03-12T02:09:27Z",
|
||||||
"pushed_at": "2020-01-05T21:46:25Z",
|
"pushed_at": "2020-01-05T21:46:25Z",
|
||||||
"stargazers_count": 197,
|
"stargazers_count": 196,
|
||||||
"watchers_count": 197,
|
"watchers_count": 196,
|
||||||
"forks_count": 36,
|
"forks_count": 36,
|
||||||
"forks": 36,
|
"forks": 36,
|
||||||
"watchers": 197,
|
"watchers": 196,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
|
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-04-16T14:32:03Z",
|
"created_at": "2019-04-16T14:32:03Z",
|
||||||
"updated_at": "2020-03-09T09:19:18Z",
|
"updated_at": "2020-03-12T00:07:25Z",
|
||||||
"pushed_at": "2019-04-17T02:42:03Z",
|
"pushed_at": "2019-04-17T02:42:03Z",
|
||||||
"stargazers_count": 52,
|
"stargazers_count": 53,
|
||||||
"watchers_count": 52,
|
"watchers_count": 53,
|
||||||
"forks_count": 21,
|
"forks_count": 21,
|
||||||
"forks": 21,
|
"forks": 21,
|
||||||
"watchers": 52,
|
"watchers": 53,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T08:30:14Z",
|
"created_at": "2020-03-11T08:30:14Z",
|
||||||
"updated_at": "2020-03-11T20:19:03Z",
|
"updated_at": "2020-03-12T01:38:19Z",
|
||||||
"pushed_at": "2020-03-11T09:59:01Z",
|
"pushed_at": "2020-03-11T09:59:01Z",
|
||||||
"stargazers_count": 24,
|
"stargazers_count": 27,
|
||||||
"watchers_count": 24,
|
"watchers_count": 27,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 24,
|
"watchers": 27,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
|
"description": "New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-08-31T20:28:12Z",
|
"created_at": "2019-08-31T20:28:12Z",
|
||||||
"updated_at": "2020-02-26T12:58:08Z",
|
"updated_at": "2020-03-12T02:47:58Z",
|
||||||
"pushed_at": "2019-10-30T18:18:43Z",
|
"pushed_at": "2019-10-30T18:18:43Z",
|
||||||
"stargazers_count": 20,
|
"stargazers_count": 21,
|
||||||
"watchers_count": 20,
|
"watchers_count": 21,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 20,
|
"watchers": 21,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -151,13 +151,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-03-11T08:03:35Z",
|
"updated_at": "2020-03-12T00:11:51Z",
|
||||||
"pushed_at": "2020-03-07T13:15:39Z",
|
"pushed_at": "2020-03-07T13:15:39Z",
|
||||||
"stargazers_count": 264,
|
"stargazers_count": 265,
|
||||||
"watchers_count": 264,
|
"watchers_count": 265,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 264,
|
"watchers": 265,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-02-12T22:07:47Z",
|
"created_at": "2019-02-12T22:07:47Z",
|
||||||
"updated_at": "2020-02-26T07:57:38Z",
|
"updated_at": "2020-03-11T22:06:24Z",
|
||||||
"pushed_at": "2019-02-20T15:35:34Z",
|
"pushed_at": "2019-02-20T15:35:34Z",
|
||||||
"stargazers_count": 175,
|
"stargazers_count": 176,
|
||||||
"watchers_count": 175,
|
"watchers_count": 176,
|
||||||
"forks_count": 61,
|
"forks_count": 61,
|
||||||
"forks": 61,
|
"forks": 61,
|
||||||
"watchers": 175,
|
"watchers": 176,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)",
|
"description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-10T17:00:01Z",
|
"created_at": "2020-03-10T17:00:01Z",
|
||||||
"updated_at": "2020-03-11T11:25:09Z",
|
"updated_at": "2020-03-12T00:05:30Z",
|
||||||
"pushed_at": "2020-03-10T17:10:12Z",
|
"pushed_at": "2020-03-10T17:10:12Z",
|
||||||
"stargazers_count": 9,
|
"stargazers_count": 12,
|
||||||
"watchers_count": 9,
|
"watchers_count": 12,
|
||||||
"forks_count": 2,
|
"forks_count": 3,
|
||||||
"forks": 2,
|
"forks": 3,
|
||||||
"watchers": 9,
|
"watchers": 12,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -128,13 +128,13 @@
|
||||||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T23:07:41Z",
|
"created_at": "2020-01-15T23:07:41Z",
|
||||||
"updated_at": "2020-03-11T20:03:07Z",
|
"updated_at": "2020-03-11T22:33:45Z",
|
||||||
"pushed_at": "2020-01-20T23:33:19Z",
|
"pushed_at": "2020-01-20T23:33:19Z",
|
||||||
"stargazers_count": 785,
|
"stargazers_count": 786,
|
||||||
"watchers_count": 785,
|
"watchers_count": 786,
|
||||||
"forks_count": 195,
|
"forks_count": 195,
|
||||||
"forks": 195,
|
"forks": 195,
|
||||||
"watchers": 785,
|
"watchers": 786,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -105,13 +105,13 @@
|
||||||
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
|
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-24T19:47:45Z",
|
"created_at": "2020-01-24T19:47:45Z",
|
||||||
"updated_at": "2020-03-06T02:29:37Z",
|
"updated_at": "2020-03-11T22:09:22Z",
|
||||||
"pushed_at": "2020-01-31T13:49:06Z",
|
"pushed_at": "2020-01-31T13:49:06Z",
|
||||||
"stargazers_count": 60,
|
"stargazers_count": 61,
|
||||||
"watchers_count": 60,
|
"watchers_count": 61,
|
||||||
"forks_count": 14,
|
"forks_count": 14,
|
||||||
"forks": 14,
|
"forks": 14,
|
||||||
"watchers": 60,
|
"watchers": 61,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-20T06:22:40Z",
|
"created_at": "2020-02-20T06:22:40Z",
|
||||||
"updated_at": "2020-03-10T17:02:56Z",
|
"updated_at": "2020-03-12T00:20:05Z",
|
||||||
"pushed_at": "2020-02-20T11:03:18Z",
|
"pushed_at": "2020-02-20T11:03:18Z",
|
||||||
"stargazers_count": 143,
|
"stargazers_count": 144,
|
||||||
"watchers_count": 143,
|
"watchers_count": 144,
|
||||||
"forks_count": 30,
|
"forks_count": 30,
|
||||||
"forks": 30,
|
"forks": 30,
|
||||||
"watchers": 143,
|
"watchers": 144,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-02-26T00:58:39Z",
|
"pushed_at": "2020-02-26T00:58:39Z",
|
||||||
"stargazers_count": 132,
|
"stargazers_count": 132,
|
||||||
"watchers_count": 132,
|
"watchers_count": 132,
|
||||||
"forks_count": 38,
|
"forks_count": 39,
|
||||||
"forks": 38,
|
"forks": 39,
|
||||||
"watchers": 132,
|
"watchers": 132,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
@ -40,8 +40,8 @@
|
||||||
"pushed_at": "2020-02-27T03:50:07Z",
|
"pushed_at": "2020-02-27T03:50:07Z",
|
||||||
"stargazers_count": 21,
|
"stargazers_count": 21,
|
||||||
"watchers_count": 21,
|
"watchers_count": 21,
|
||||||
"forks_count": 9,
|
"forks_count": 10,
|
||||||
"forks": 9,
|
"forks": 10,
|
||||||
"watchers": 21,
|
"watchers": 21,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
@ -82,13 +82,13 @@
|
||||||
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-27T13:53:46Z",
|
"created_at": "2020-02-27T13:53:46Z",
|
||||||
"updated_at": "2020-03-11T07:39:22Z",
|
"updated_at": "2020-03-12T01:31:39Z",
|
||||||
"pushed_at": "2020-02-27T15:57:53Z",
|
"pushed_at": "2020-02-27T15:57:53Z",
|
||||||
"stargazers_count": 88,
|
"stargazers_count": 89,
|
||||||
"watchers_count": 88,
|
"watchers_count": 89,
|
||||||
"forks_count": 34,
|
"forks_count": 34,
|
||||||
"forks": 34,
|
"forks": 34,
|
||||||
"watchers": 88,
|
"watchers": 89,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
|
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-10T21:40:57Z",
|
"created_at": "2020-03-10T21:40:57Z",
|
||||||
"updated_at": "2020-03-11T20:17:26Z",
|
"updated_at": "2020-03-11T21:20:42Z",
|
||||||
"pushed_at": "2020-03-10T21:41:35Z",
|
"pushed_at": "2020-03-10T21:41:35Z",
|
||||||
"stargazers_count": 10,
|
"stargazers_count": 11,
|
||||||
"watchers_count": 10,
|
"watchers_count": 11,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 10,
|
"watchers": 11,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -59,13 +59,13 @@
|
||||||
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
|
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T06:51:58Z",
|
"created_at": "2020-03-11T06:51:58Z",
|
||||||
"updated_at": "2020-03-11T20:12:34Z",
|
"updated_at": "2020-03-12T02:48:10Z",
|
||||||
"pushed_at": "2020-03-11T12:54:04Z",
|
"pushed_at": "2020-03-12T01:00:27Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 12,
|
||||||
"watchers_count": 8,
|
"watchers_count": 12,
|
||||||
"forks_count": 1,
|
"forks_count": 3,
|
||||||
"forks": 1,
|
"forks": 3,
|
||||||
"watchers": 8,
|
"watchers": 12,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -82,13 +82,13 @@
|
||||||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T15:21:27Z",
|
"created_at": "2020-03-11T15:21:27Z",
|
||||||
"updated_at": "2020-03-11T20:49:09Z",
|
"updated_at": "2020-03-12T03:06:48Z",
|
||||||
"pushed_at": "2020-03-11T15:33:47Z",
|
"pushed_at": "2020-03-11T15:33:47Z",
|
||||||
"stargazers_count": 45,
|
"stargazers_count": 92,
|
||||||
"watchers_count": 45,
|
"watchers_count": 92,
|
||||||
"forks_count": 7,
|
"forks_count": 24,
|
||||||
"forks": 7,
|
"forks": 24,
|
||||||
"watchers": 45,
|
"watchers": 92,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -105,8 +105,8 @@
|
||||||
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
|
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T16:23:03Z",
|
"created_at": "2020-03-11T16:23:03Z",
|
||||||
"updated_at": "2020-03-11T18:26:09Z",
|
"updated_at": "2020-03-11T22:50:42Z",
|
||||||
"pushed_at": "2020-03-11T18:26:07Z",
|
"pushed_at": "2020-03-11T22:50:40Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
|
@ -159,5 +159,51 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 246724151,
|
||||||
|
"name": "cve-2020-0796-scanner",
|
||||||
|
"full_name": "dickens88\/cve-2020-0796-scanner",
|
||||||
|
"owner": {
|
||||||
|
"login": "dickens88",
|
||||||
|
"id": 8390209,
|
||||||
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8390209?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/dickens88"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/dickens88\/cve-2020-0796-scanner",
|
||||||
|
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2020-03-12T02:20:07Z",
|
||||||
|
"updated_at": "2020-03-12T02:49:12Z",
|
||||||
|
"pushed_at": "2020-03-12T02:49:10Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 246728549,
|
||||||
|
"name": "CVE-2020-0796",
|
||||||
|
"full_name": "kn6869610\/CVE-2020-0796",
|
||||||
|
"owner": {
|
||||||
|
"login": "kn6869610",
|
||||||
|
"id": 6917744,
|
||||||
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6917744?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/kn6869610"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2020-0796",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2020-03-12T02:47:49Z",
|
||||||
|
"updated_at": "2020-03-12T02:59:11Z",
|
||||||
|
"pushed_at": "2020-03-12T02:59:09Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Powershell SMBv3 Compression checker",
|
"description": "Powershell SMBv3 Compression checker",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T09:13:48Z",
|
"created_at": "2020-03-11T09:13:48Z",
|
||||||
"updated_at": "2020-03-11T20:41:29Z",
|
"updated_at": "2020-03-12T01:17:55Z",
|
||||||
"pushed_at": "2020-03-11T17:10:12Z",
|
"pushed_at": "2020-03-11T17:10:12Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -151,13 +151,13 @@
|
||||||
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
|
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-21T07:48:50Z",
|
"created_at": "2020-02-21T07:48:50Z",
|
||||||
"updated_at": "2020-03-10T11:17:32Z",
|
"updated_at": "2020-03-12T00:58:13Z",
|
||||||
"pushed_at": "2020-02-21T10:19:52Z",
|
"pushed_at": "2020-02-21T10:19:52Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"forks_count": 3,
|
"forks_count": 4,
|
||||||
"forks": 3,
|
"forks": 4,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2020-1947 poc",
|
"description": "CVE-2020-1947 poc",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-10T12:44:01Z",
|
"created_at": "2020-03-10T12:44:01Z",
|
||||||
"updated_at": "2020-03-11T21:02:31Z",
|
"updated_at": "2020-03-12T02:12:44Z",
|
||||||
"pushed_at": "2020-03-10T12:48:10Z",
|
"pushed_at": "2020-03-10T12:48:10Z",
|
||||||
"stargazers_count": 32,
|
"stargazers_count": 36,
|
||||||
"watchers_count": 32,
|
"watchers_count": 36,
|
||||||
"forks_count": 8,
|
"forks_count": 10,
|
||||||
"forks": 8,
|
"forks": 10,
|
||||||
"watchers": 32,
|
"watchers": 36,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -36,13 +36,13 @@
|
||||||
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
|
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T03:15:25Z",
|
"created_at": "2020-03-11T03:15:25Z",
|
||||||
"updated_at": "2020-03-11T16:03:16Z",
|
"updated_at": "2020-03-12T02:19:32Z",
|
||||||
"pushed_at": "2020-03-11T03:54:34Z",
|
"pushed_at": "2020-03-11T03:54:34Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 16,
|
"watchers_count": 19,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 16,
|
"watchers": 19,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-03-11T08:03:35Z",
|
"updated_at": "2020-03-12T00:11:51Z",
|
||||||
"pushed_at": "2020-03-07T13:15:39Z",
|
"pushed_at": "2020-03-07T13:15:39Z",
|
||||||
"stargazers_count": 264,
|
"stargazers_count": 265,
|
||||||
"watchers_count": 264,
|
"watchers_count": 265,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 264,
|
"watchers": 265,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -36,13 +36,13 @@
|
||||||
"description": "Weblogic RCE with IIOP",
|
"description": "Weblogic RCE with IIOP",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-18T07:08:06Z",
|
"created_at": "2020-01-18T07:08:06Z",
|
||||||
"updated_at": "2020-03-11T02:05:09Z",
|
"updated_at": "2020-03-12T01:29:57Z",
|
||||||
"pushed_at": "2020-01-18T07:14:34Z",
|
"pushed_at": "2020-01-18T07:14:34Z",
|
||||||
"stargazers_count": 68,
|
"stargazers_count": 69,
|
||||||
"watchers_count": 68,
|
"watchers_count": 69,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"forks": 9,
|
"forks": 9,
|
||||||
"watchers": 68,
|
"watchers": 69,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -109,8 +109,8 @@
|
||||||
"pushed_at": "2020-03-04T16:16:58Z",
|
"pushed_at": "2020-03-04T16:16:58Z",
|
||||||
"stargazers_count": 128,
|
"stargazers_count": 128,
|
||||||
"watchers_count": 128,
|
"watchers_count": 128,
|
||||||
"forks_count": 30,
|
"forks_count": 32,
|
||||||
"forks": 30,
|
"forks": 32,
|
||||||
"watchers": 128,
|
"watchers": 128,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -59,8 +59,8 @@
|
||||||
"description": "CVE-2020-2555",
|
"description": "CVE-2020-2555",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-07T12:02:26Z",
|
"created_at": "2020-03-07T12:02:26Z",
|
||||||
"updated_at": "2020-03-11T09:58:43Z",
|
"updated_at": "2020-03-12T02:34:50Z",
|
||||||
"pushed_at": "2020-03-11T09:58:41Z",
|
"pushed_at": "2020-03-12T02:34:48Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 2,
|
"watchers_count": 2,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
@ -82,13 +82,13 @@
|
||||||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-07T18:58:09Z",
|
"created_at": "2020-03-07T18:58:09Z",
|
||||||
"updated_at": "2020-03-11T16:35:41Z",
|
"updated_at": "2020-03-12T02:25:19Z",
|
||||||
"pushed_at": "2020-03-09T05:25:05Z",
|
"pushed_at": "2020-03-09T05:25:05Z",
|
||||||
"stargazers_count": 58,
|
"stargazers_count": 60,
|
||||||
"watchers_count": 58,
|
"watchers_count": 60,
|
||||||
"forks_count": 12,
|
"forks_count": 13,
|
||||||
"forks": 12,
|
"forks": 13,
|
||||||
"watchers": 58,
|
"watchers": 60,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2020-8597",
|
"description": "CVE-2020-8597",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-24T08:37:50Z",
|
"created_at": "2020-02-24T08:37:50Z",
|
||||||
"updated_at": "2020-03-11T08:17:30Z",
|
"updated_at": "2020-03-12T02:26:50Z",
|
||||||
"pushed_at": "2020-03-10T19:01:21Z",
|
"pushed_at": "2020-03-10T19:01:21Z",
|
||||||
"stargazers_count": 45,
|
"stargazers_count": 47,
|
||||||
"watchers_count": 45,
|
"watchers_count": 47,
|
||||||
"forks_count": 17,
|
"forks_count": 17,
|
||||||
"forks": 17,
|
"forks": 17,
|
||||||
"watchers": 45,
|
"watchers": 47,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,8 +13,8 @@
|
||||||
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
|
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-19T02:29:14Z",
|
"created_at": "2020-02-19T02:29:14Z",
|
||||||
"updated_at": "2020-03-11T14:50:44Z",
|
"updated_at": "2020-03-12T02:25:33Z",
|
||||||
"pushed_at": "2020-03-10T04:00:12Z",
|
"pushed_at": "2020-03-12T02:25:31Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 6,
|
"watchers_count": 6,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
|
|
|
@ -150,6 +150,8 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
|
||||||
- [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker)
|
- [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker)
|
||||||
- [pr4jwal/CVE-2020-0796](https://github.com/pr4jwal/CVE-2020-0796)
|
- [pr4jwal/CVE-2020-0796](https://github.com/pr4jwal/CVE-2020-0796)
|
||||||
- [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796)
|
- [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796)
|
||||||
|
- [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner)
|
||||||
|
- [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796)
|
||||||
|
|
||||||
### CVE-2020-0976
|
### CVE-2020-0976
|
||||||
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
|
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
|
||||||
|
|
Loading…
Reference in a new issue