mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/01/30 00:10:08
This commit is contained in:
parent
85c208bc45
commit
d75aeb818f
21 changed files with 160 additions and 136 deletions
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2021-01-10T22:23:07Z",
|
||||
"stargazers_count": 857,
|
||||
"watchers_count": 857,
|
||||
"forks_count": 405,
|
||||
"forks": 405,
|
||||
"forks_count": 406,
|
||||
"forks": 406,
|
||||
"watchers": 857,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-12-15T09:08:53Z",
|
||||
"updated_at": "2020-10-16T09:10:43Z",
|
||||
"pushed_at": "2020-10-14T12:23:52Z",
|
||||
"pushed_at": "2021-01-29T14:49:44Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 7,
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2018-11-30T07:10:44Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1029,8 +1029,8 @@
|
|||
"pushed_at": "2020-12-06T04:48:38Z",
|
||||
"stargazers_count": 1133,
|
||||
"watchers_count": 1133,
|
||||
"forks_count": 386,
|
||||
"forks": 386,
|
||||
"forks_count": 385,
|
||||
"forks": 385,
|
||||
"watchers": 1133,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1264,29 +1264,6 @@
|
|||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188781634,
|
||||
"name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"full_name": "krivegasa\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"owner": {
|
||||
"login": "krivegasa",
|
||||
"id": 26058390,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26058390?v=4",
|
||||
"html_url": "https:\/\/github.com\/krivegasa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/krivegasa\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"description": "Scan through given ip list",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-27T06:11:51Z",
|
||||
"updated_at": "2020-01-14T11:35:09Z",
|
||||
"pushed_at": "2019-05-22T22:32:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188842935,
|
||||
"name": "bluekeepscan",
|
||||
|
@ -2552,6 +2529,29 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 318113571,
|
||||
"name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"full_name": "DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"owner": {
|
||||
"login": "DeathStroke-source",
|
||||
"id": 23089257,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23089257?v=4",
|
||||
"html_url": "https:\/\/github.com\/DeathStroke-source"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
|
||||
"description": "Scan through given ip list",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-03T07:40:19Z",
|
||||
"updated_at": "2021-01-29T14:08:43Z",
|
||||
"pushed_at": "2019-05-22T22:32:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 324765199,
|
||||
"name": "CVE-2019-0708",
|
||||
|
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 7,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 236072228,
|
||||
"name": "BlueGate",
|
||||
"full_name": "ioncodes\/BlueGate",
|
||||
"owner": {
|
||||
"login": "ioncodes",
|
||||
"id": 18533297,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18533297?v=4",
|
||||
"html_url": "https:\/\/github.com\/ioncodes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ioncodes\/BlueGate",
|
||||
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T19:47:45Z",
|
||||
"updated_at": "2020-12-11T14:22:52Z",
|
||||
"pushed_at": "2020-01-31T13:49:06Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2021-01-28T18:05:47Z",
|
||||
"updated_at": "2021-01-29T14:32:01Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 262,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2021-01-28T10:42:50Z",
|
||||
"updated_at": "2021-01-29T15:04:53Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 492,
|
||||
"watchers_count": 492,
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"watchers": 492,
|
||||
"watchers": 493,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-01-26T12:19:27Z",
|
||||
"updated_at": "2021-01-29T13:55:03Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 351,
|
||||
"watchers": 352,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "POC exploit for SMBLost vulnerability (CVE-2020-1301)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-13T18:24:26Z",
|
||||
"updated_at": "2020-07-22T19:39:16Z",
|
||||
"updated_at": "2021-01-29T10:35:29Z",
|
||||
"pushed_at": "2020-06-13T18:55:03Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Kylin API未授权访问漏洞;CVE-2020-13937;Apache Kylin漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T08:57:09Z",
|
||||
"updated_at": "2021-01-29T05:01:47Z",
|
||||
"updated_at": "2021-01-29T10:43:36Z",
|
||||
"pushed_at": "2021-01-15T08:59:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-01-28T13:27:57Z",
|
||||
"updated_at": "2021-01-29T10:51:06Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 745,
|
||||
"watchers_count": 745,
|
||||
"stargazers_count": 746,
|
||||
"watchers_count": 746,
|
||||
"forks_count": 218,
|
||||
"forks": 218,
|
||||
"watchers": 745,
|
||||
"watchers": 746,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-06T12:46:03Z",
|
||||
"updated_at": "2021-01-04T12:31:51Z",
|
||||
"updated_at": "2021-01-29T11:19:42Z",
|
||||
"pushed_at": "2020-11-10T10:54:36Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2021-01-29T05:52:43Z",
|
||||
"updated_at": "2021-01-29T12:54:57Z",
|
||||
"pushed_at": "2021-01-29T05:52:39Z",
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"stargazers_count": 843,
|
||||
"watchers_count": 843,
|
||||
"forks_count": 154,
|
||||
"forks": 154,
|
||||
"watchers": 842,
|
||||
"watchers": 843,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -573,5 +573,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334149882,
|
||||
"name": "CVE-2020-14882-WebLogic",
|
||||
"full_name": "pwn3z\/CVE-2020-14882-WebLogic",
|
||||
"owner": {
|
||||
"login": "pwn3z",
|
||||
"id": 71440287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
|
||||
"html_url": "https:\/\/github.com\/pwn3z"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2020-14882-WebLogic",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T13:12:40Z",
|
||||
"updated_at": "2021-01-29T13:13:37Z",
|
||||
"pushed_at": "2021-01-29T13:13:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -289,13 +289,13 @@
|
|||
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-20T05:24:47Z",
|
||||
"updated_at": "2020-12-23T19:00:26Z",
|
||||
"updated_at": "2021-01-29T10:23:15Z",
|
||||
"pushed_at": "2020-10-28T11:21:00Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 208,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-02-21T08:45:51Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-23T19:07:18Z",
|
||||
"updated_at": "2021-01-28T19:22:14Z",
|
||||
"updated_at": "2021-01-29T13:44:49Z",
|
||||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "CISCO CVE-2020-3452 Scanner & Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T14:41:13Z",
|
||||
"updated_at": "2021-01-28T06:08:36Z",
|
||||
"updated_at": "2021-01-29T14:42:45Z",
|
||||
"pushed_at": "2021-01-10T09:14:08Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:37:11Z",
|
||||
"updated_at": "2021-01-28T07:21:09Z",
|
||||
"updated_at": "2021-01-29T14:08:47Z",
|
||||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-01-29T07:11:16Z",
|
||||
"pushed_at": "2021-01-13T13:25:10Z",
|
||||
"updated_at": "2021-01-29T13:59:09Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T15:11:45Z",
|
||||
"updated_at": "2021-01-29T07:57:09Z",
|
||||
"pushed_at": "2021-01-28T11:08:41Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 26,
|
||||
"updated_at": "2021-01-29T14:57:01Z",
|
||||
"pushed_at": "2021-01-29T11:41:10Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T16:03:34Z",
|
||||
"updated_at": "2021-01-29T08:14:15Z",
|
||||
"updated_at": "2021-01-29T13:35:53Z",
|
||||
"pushed_at": "2021-01-27T16:48:11Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 57,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "1day research effort",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T02:13:49Z",
|
||||
"updated_at": "2021-01-29T08:28:08Z",
|
||||
"updated_at": "2021-01-29T10:49:30Z",
|
||||
"pushed_at": "2021-01-29T03:21:13Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T08:55:04Z",
|
||||
"updated_at": "2021-01-28T15:22:13Z",
|
||||
"updated_at": "2021-01-29T14:32:24Z",
|
||||
"pushed_at": "2021-01-28T09:12:29Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -274,5 +274,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334126031,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "ltfafei\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "ltfafei",
|
||||
"id": 43526141,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43526141?v=4",
|
||||
"html_url": "https:\/\/github.com\/ltfafei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ltfafei\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T11:32:33Z",
|
||||
"updated_at": "2021-01-29T14:19:35Z",
|
||||
"pushed_at": "2021-01-29T14:19:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -74,6 +74,7 @@ Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalat
|
|||
- [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp)
|
||||
- [ph4ntonn/CVE-2021-3156](https://github.com/ph4ntonn/CVE-2021-3156)
|
||||
- [binw2018/CVE-2021-3156-SCRIPT](https://github.com/binw2018/CVE-2021-3156-SCRIPT)
|
||||
- [ltfafei/CVE-2021-3156](https://github.com/ltfafei/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3164 (2021-01-21)
|
||||
|
||||
|
@ -230,7 +231,6 @@ A remote code execution vulnerability exists in Windows Remote Desktop Gateway (
|
|||
</code>
|
||||
|
||||
- [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609)
|
||||
- [ioncodes/BlueGate](https://github.com/ioncodes/BlueGate)
|
||||
|
||||
### CVE-2020-0618 (2020-02-11)
|
||||
|
||||
|
@ -2616,6 +2616,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [xkx518/CodeTest](https://github.com/xkx518/CodeTest)
|
||||
- [securitysqs/poc](https://github.com/securitysqs/poc)
|
||||
- [ShmilySec/CVE-2020-14882](https://github.com/ShmilySec/CVE-2020-14882)
|
||||
- [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic)
|
||||
|
||||
### CVE-2020-14883 (2020-10-21)
|
||||
|
||||
|
@ -4018,7 +4019,6 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [freeide/CVE-2019-0708-PoC-Exploit](https://github.com/freeide/CVE-2019-0708-PoC-Exploit)
|
||||
- [robertdavidgraham/rdpscan](https://github.com/robertdavidgraham/rdpscan)
|
||||
- [closethe/CVE-2019-0708-POC](https://github.com/closethe/CVE-2019-0708-POC)
|
||||
- [krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
|
||||
- [Rostelecom-CERT/bluekeepscan](https://github.com/Rostelecom-CERT/bluekeepscan)
|
||||
- [Leoid/CVE-2019-0708](https://github.com/Leoid/CVE-2019-0708)
|
||||
- [ht0Ruial/CVE-2019-0708Poc-BatchScanning](https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanning)
|
||||
|
@ -4074,6 +4074,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI)
|
||||
- [AaronWilsonGrylls/CVE-2019-0708-POC](https://github.com/AaronWilsonGrylls/CVE-2019-0708-POC)
|
||||
- [alexa872/CVE-2019-0708](https://github.com/alexa872/CVE-2019-0708)
|
||||
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
|
||||
- [sinlee1/CVE-2019-0708](https://github.com/sinlee1/CVE-2019-0708)
|
||||
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
|
||||
|
||||
|
|
Loading…
Reference in a new issue