mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/04/03 06:08:57
This commit is contained in:
parent
9807de3e8b
commit
decf82d0f4
20 changed files with 108 additions and 92 deletions
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-29T10:28:44Z",
|
||||
"stargazers_count": 462,
|
||||
"watchers_count": 462,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 462,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-03-06T10:52:19Z",
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"watchers": 388,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exp of CVE-2018-15982",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-10T04:53:31Z",
|
||||
"updated_at": "2020-03-12T06:36:08Z",
|
||||
"updated_at": "2020-04-02T18:50:35Z",
|
||||
"pushed_at": "2019-01-04T09:29:01Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"forks_count": 112,
|
||||
"forks": 112,
|
||||
"watchers": 324,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 411,
|
||||
"watchers_count": 411,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 411,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2018-07-12T08:35:13Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-27T06:30:32Z",
|
||||
"updated_at": "2020-04-02T12:34:40Z",
|
||||
"updated_at": "2020-04-02T18:51:18Z",
|
||||
"pushed_at": "2018-12-30T11:53:08Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"forks_count": 110,
|
||||
"forks": 110,
|
||||
"watchers": 291,
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 292,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1144,8 +1144,8 @@
|
|||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1094,
|
||||
"watchers_count": 1094,
|
||||
"forks_count": 371,
|
||||
"forks": 371,
|
||||
"forks_count": 370,
|
||||
"forks": 370,
|
||||
"watchers": 1094,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1558,8 +1558,8 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1015,
|
||||
"watchers_count": 1015,
|
||||
"forks_count": 349,
|
||||
"forks": 349,
|
||||
"forks_count": 348,
|
||||
"forks": 348,
|
||||
"watchers": 1015,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1040 with Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-14T11:16:03Z",
|
||||
"updated_at": "2020-04-01T13:37:17Z",
|
||||
"updated_at": "2020-04-02T18:42:45Z",
|
||||
"pushed_at": "2020-03-20T09:11:20Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2020-03-31T17:48:27Z",
|
||||
"updated_at": "2020-04-02T17:08:17Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 227,
|
||||
"watchers": 228,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2020-04-01T13:40:04Z",
|
||||
"updated_at": "2020-04-02T19:10:13Z",
|
||||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2020-04-01T13:40:40Z",
|
||||
"updated_at": "2020-04-02T15:23:43Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-02-17T13:28:02Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-04-02T07:08:55Z",
|
||||
"updated_at": "2020-04-02T18:01:43Z",
|
||||
"pushed_at": "2019-06-24T06:06:48Z",
|
||||
"stargazers_count": 506,
|
||||
"watchers_count": 506,
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"watchers": 506,
|
||||
"watchers": 508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2020-04-02T12:16:28Z",
|
||||
"updated_at": "2020-04-02T18:11:52Z",
|
||||
"pushed_at": "2020-04-01T05:57:35Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 153,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-03-31T20:34:24Z",
|
||||
"updated_at": "2020-04-02T18:44:05Z",
|
||||
"pushed_at": "2020-02-27T02:54:58Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 167,
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 168,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-04-02T13:19:16Z",
|
||||
"updated_at": "2020-04-02T15:37:37Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 413,
|
||||
"watchers_count": 413,
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 413,
|
||||
"watchers": 414,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -979,13 +979,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-04-02T14:53:44Z",
|
||||
"updated_at": "2020-04-02T19:54:30Z",
|
||||
"pushed_at": "2020-03-31T20:07:46Z",
|
||||
"stargazers_count": 724,
|
||||
"watchers_count": 724,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 724,
|
||||
"stargazers_count": 726,
|
||||
"watchers_count": 726,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 726,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1006,8 +1006,8 @@
|
|||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1148,5 +1148,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 252494911,
|
||||
"name": "CVE-2020-0796-EXP",
|
||||
"full_name": "LabDookhtegan\/CVE-2020-0796-EXP",
|
||||
"owner": {
|
||||
"login": "LabDookhtegan",
|
||||
"id": 63061898,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/63061898?v=4",
|
||||
"html_url": "https:\/\/github.com\/LabDookhtegan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LabDookhtegan\/CVE-2020-0796-EXP",
|
||||
"description": "CVE-2020-0796-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-02T15:32:10Z",
|
||||
"updated_at": "2020-04-02T15:46:28Z",
|
||||
"pushed_at": "2020-04-02T15:45:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-26T01:34:38Z",
|
||||
"updated_at": "2020-04-01T11:52:14Z",
|
||||
"updated_at": "2020-04-02T15:50:37Z",
|
||||
"pushed_at": "2020-03-31T10:07:08Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,8 +36,8 @@
|
|||
"description": "nmap script to detect CVE-2020-8515 on Draytek Devices",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T05:40:11Z",
|
||||
"updated_at": "2020-03-31T05:41:12Z",
|
||||
"pushed_at": "2020-03-31T05:41:09Z",
|
||||
"updated_at": "2020-04-02T18:23:10Z",
|
||||
"pushed_at": "2020-04-02T18:23:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -215,6 +215,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [jiansiting/CVE-2020-0796](https://github.com/jiansiting/CVE-2020-0796)
|
||||
- [wurmx64/CVE-2020-0796](https://github.com/wurmx64/CVE-2020-0796)
|
||||
- [eastmountyxz/CVE-2020-0796-SMB](https://github.com/eastmountyxz/CVE-2020-0796-SMB)
|
||||
- [LabDookhtegan/CVE-2020-0796-EXP](https://github.com/LabDookhtegan/CVE-2020-0796-EXP)
|
||||
|
||||
### CVE-2020-0976
|
||||
- [ericzhong2010/GUI-Check-CVE-2020-0976](https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976)
|
||||
|
@ -12883,14 +12884,6 @@ Directory traversal vulnerability in ftpd in QPC QVT/Net 4.0 and AVT/Term 5.0 al
|
|||
|
||||
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
|
||||
|
||||
### CVE-2001-0758
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in Shambala 4.5 allows remote attackers to escape the FTP root directory via "CWD ..." command.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2001-0758](https://github.com/alt3kx/CVE-2001-0758)
|
||||
|
||||
### CVE-2001-0931
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue