mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/03/12 00:07:16
This commit is contained in:
parent
79c0489193
commit
e10bced79d
36 changed files with 255 additions and 142 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-07-02T23:35:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2014-4210+Redis未授权访问",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T02:09:48Z",
|
||||
"updated_at": "2020-03-09T01:38:49Z",
|
||||
"updated_at": "2020-03-11T13:18:19Z",
|
||||
"pushed_at": "2017-03-10T08:35:42Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -106,7 +106,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-06-19T07:05:51Z",
|
||||
"updated_at": "2019-11-15T04:42:37Z",
|
||||
"pushed_at": "2019-10-29T16:31:52Z",
|
||||
"pushed_at": "2020-03-11T14:30:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OS X 10.11.6 LPE PoC for CVE-2016-4655 \/ CVE-2016-4656",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-02T12:42:14Z",
|
||||
"updated_at": "2020-03-04T23:39:46Z",
|
||||
"updated_at": "2020-03-11T09:13:19Z",
|
||||
"pushed_at": "2016-10-04T16:36:18Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-03T03:11:24Z",
|
||||
"updated_at": "2020-03-11T07:44:18Z",
|
||||
"updated_at": "2020-03-11T14:28:14Z",
|
||||
"pushed_at": "2019-10-21T08:13:40Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-02-18T13:30:19Z",
|
||||
"updated_at": "2020-03-11T10:24:56Z",
|
||||
"pushed_at": "2019-12-13T17:40:34Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2020-02-19T00:36:28Z",
|
||||
"updated_at": "2020-03-11T10:25:02Z",
|
||||
"pushed_at": "2019-06-16T09:53:10Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-06-02T10:33:41Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 237,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-10-23T13:51:06Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 133,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2018-11-04T17:29:33Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -2083,13 +2083,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-21T00:48:55Z",
|
||||
"updated_at": "2019-11-28T01:38:58Z",
|
||||
"updated_at": "2020-03-11T13:53:42Z",
|
||||
"pushed_at": "2019-11-28T01:38:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T05:59:24Z",
|
||||
"updated_at": "2020-03-02T15:15:05Z",
|
||||
"updated_at": "2020-03-11T11:54:26Z",
|
||||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 243,
|
||||
"watchers": 244,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2020-03-04T15:33:23Z",
|
||||
"updated_at": "2020-03-11T11:21:10Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-11-21T08:41:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2020-03-11T09:06:18Z",
|
||||
"pushed_at": "2020-03-11T08:46:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"updated_at": "2020-03-11T14:54:27Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-17658.json
Normal file
25
2019/CVE-2019-17658.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 246558752,
|
||||
"name": "CVE-2019-17658",
|
||||
"full_name": "Ibonok\/CVE-2019-17658",
|
||||
"owner": {
|
||||
"login": "Ibonok",
|
||||
"id": 37837775,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37837775?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ibonok"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ibonok\/CVE-2019-17658",
|
||||
"description": "Unquoted Service Path exploit in FortiClient (CVE-2019-17658)",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T11:58:24Z",
|
||||
"updated_at": "2020-03-11T12:02:07Z",
|
||||
"pushed_at": "2020-03-11T11:59:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-02-18T13:30:19Z",
|
||||
"updated_at": "2020-03-11T10:24:56Z",
|
||||
"pushed_at": "2019-12-13T17:40:34Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2020-03-04T15:33:00Z",
|
||||
"updated_at": "2020-03-11T12:06:14Z",
|
||||
"pushed_at": "2019-12-18T15:32:15Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 112,
|
||||
"watchers": 113,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-28T07:15:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Automated Root Script for MTK ARM64 based chipsets based on diplomatic's CVE-2020-0069 (mtk-su) exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2020-03-10T17:54:34Z",
|
||||
"updated_at": "2020-03-11T15:07:38Z",
|
||||
"pushed_at": "2020-03-09T20:40:50Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T17:00:01Z",
|
||||
"updated_at": "2020-03-11T08:24:12Z",
|
||||
"updated_at": "2020-03-11T11:25:09Z",
|
||||
"pushed_at": "2020-03-10T17:10:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 143,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2020-03-09T14:23:29Z",
|
||||
"updated_at": "2020-03-11T14:05:15Z",
|
||||
"pushed_at": "2020-02-11T21:34:28Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 172,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-02-27T02:54:58Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-03-11T07:45:16Z",
|
||||
"updated_at": "2020-03-11T11:03:48Z",
|
||||
"pushed_at": "2020-03-01T12:58:01Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 114,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2020-03-05T08:02:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six unfixed Window DOS Vulnerabilities.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-23T11:10:49Z",
|
||||
"updated_at": "2020-02-27T07:31:09Z",
|
||||
"updated_at": "2020-03-11T13:36:15Z",
|
||||
"pushed_at": "2020-02-22T13:57:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T21:40:57Z",
|
||||
"updated_at": "2020-03-11T06:00:13Z",
|
||||
"updated_at": "2020-03-11T13:46:50Z",
|
||||
"pushed_at": "2020-03-10T21:41:35Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-0796 Flaw Mitigation - Active Directory Administrative Templates",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T03:43:29Z",
|
||||
"updated_at": "2020-03-11T08:58:06Z",
|
||||
"updated_at": "2020-03-11T13:45:57Z",
|
||||
"pushed_at": "2020-03-11T04:57:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T06:51:58Z",
|
||||
"updated_at": "2020-03-11T09:01:10Z",
|
||||
"pushed_at": "2020-03-11T07:03:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"updated_at": "2020-03-11T12:54:06Z",
|
||||
"pushed_at": "2020-03-11T12:54:04Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-0976.json
Normal file
25
2020/CVE-2020-0976.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 246525183,
|
||||
"name": "CVE-2020-0976",
|
||||
"full_name": "T13nn3s\/CVE-2020-0976",
|
||||
"owner": {
|
||||
"login": "T13nn3s",
|
||||
"id": 29333776,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4",
|
||||
"html_url": "https:\/\/github.com\/T13nn3s"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-0976",
|
||||
"description": "Powershell SMBv3 Compression checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T09:13:48Z",
|
||||
"updated_at": "2020-03-11T14:54:34Z",
|
||||
"pushed_at": "2020-03-11T14:19:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-22T13:45:21Z",
|
||||
"updated_at": "2020-02-28T19:27:47Z",
|
||||
"updated_at": "2020-03-11T12:02:36Z",
|
||||
"pushed_at": "2020-01-22T14:01:32Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1947 poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T12:44:01Z",
|
||||
"updated_at": "2020-03-11T08:38:41Z",
|
||||
"updated_at": "2020-03-11T14:26:56Z",
|
||||
"pushed_at": "2020-03-10T12:48:10Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,36 @@
|
|||
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T03:15:25Z",
|
||||
"updated_at": "2020-03-11T08:23:33Z",
|
||||
"updated_at": "2020-03-11T11:58:11Z",
|
||||
"pushed_at": "2020-03-11T03:54:34Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246566519,
|
||||
"name": "CVE-2020-1947",
|
||||
"full_name": "wsfengfan\/CVE-2020-1947",
|
||||
"owner": {
|
||||
"login": "wsfengfan",
|
||||
"id": 33821840,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4",
|
||||
"html_url": "https:\/\/github.com\/wsfengfan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wsfengfan\/CVE-2020-1947",
|
||||
"description": "CVE-2020-1947 Python POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T12:35:56Z",
|
||||
"updated_at": "2020-03-11T15:06:31Z",
|
||||
"pushed_at": "2020-03-11T15:06:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-03-10T15:46:18Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-03-10T12:24:10Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -59,8 +59,8 @@
|
|||
"description": "CVE-2020-2555",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T12:02:26Z",
|
||||
"updated_at": "2020-03-09T02:02:06Z",
|
||||
"pushed_at": "2020-03-07T12:02:28Z",
|
||||
"updated_at": "2020-03-11T09:58:43Z",
|
||||
"pushed_at": "2020-03-11T09:58:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-03-11T07:15:18Z",
|
||||
"updated_at": "2020-03-11T09:23:16Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of CVE",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T08:18:56Z",
|
||||
"updated_at": "2020-03-10T11:32:43Z",
|
||||
"updated_at": "2020-03-11T12:29:42Z",
|
||||
"pushed_at": "2020-03-08T05:53:47Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-7931.json
Normal file
25
2020/CVE-2020-7931.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 246585568,
|
||||
"name": "CVE-2020-7931",
|
||||
"full_name": "gquere\/CVE-2020-7931",
|
||||
"owner": {
|
||||
"login": "gquere",
|
||||
"id": 1585000,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1585000?v=4",
|
||||
"html_url": "https:\/\/github.com\/gquere"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gquere\/CVE-2020-7931",
|
||||
"description": "Hacking Artifactory with server side template injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T13:56:43Z",
|
||||
"updated_at": "2020-03-11T14:10:00Z",
|
||||
"pushed_at": "2020-03-11T14:08:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-8597 poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T19:00:46Z",
|
||||
"updated_at": "2020-03-11T07:53:07Z",
|
||||
"updated_at": "2020-03-11T10:28:12Z",
|
||||
"pushed_at": "2020-03-10T14:03:24Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T02:29:14Z",
|
||||
"updated_at": "2020-03-10T04:00:13Z",
|
||||
"updated_at": "2020-03-11T14:50:44Z",
|
||||
"pushed_at": "2020-03-10T04:00:12Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -147,6 +147,9 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
|
|||
- [technion/DisableSMBCompression](https://github.com/technion/DisableSMBCompression)
|
||||
- [cve-2020-0796/cve-2020-0796](https://github.com/cve-2020-0796/cve-2020-0796)
|
||||
|
||||
### CVE-2020-0976
|
||||
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
|
||||
|
||||
### CVE-2020-1611
|
||||
|
||||
<code>
|
||||
|
@ -182,6 +185,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
|||
### CVE-2020-1947
|
||||
- [Imanfeng/CVE-2020-1947](https://github.com/Imanfeng/CVE-2020-1947)
|
||||
- [jas502n/CVE-2020-1947](https://github.com/jas502n/CVE-2020-1947)
|
||||
- [wsfengfan/CVE-2020-1947](https://github.com/wsfengfan/CVE-2020-1947)
|
||||
|
||||
### CVE-2020-2546
|
||||
|
||||
|
@ -328,6 +332,14 @@ An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allo
|
|||
- [Pikaqi/cve-2020-7799](https://github.com/Pikaqi/cve-2020-7799)
|
||||
- [ianxtianxt/CVE-2020-7799](https://github.com/ianxtianxt/CVE-2020-7799)
|
||||
|
||||
### CVE-2020-7931
|
||||
|
||||
<code>
|
||||
In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
|
||||
</code>
|
||||
|
||||
- [gquere/CVE-2020-7931](https://github.com/gquere/CVE-2020-7931)
|
||||
|
||||
### CVE-2020-7980
|
||||
|
||||
<code>
|
||||
|
@ -2233,6 +2245,9 @@ For Eclipse Che versions 6.16 to 7.3.0, with both authentication and TLS disable
|
|||
|
||||
- [mgrube/CVE-2019-17633](https://github.com/mgrube/CVE-2019-17633)
|
||||
|
||||
### CVE-2019-17658
|
||||
- [Ibonok/CVE-2019-17658](https://github.com/Ibonok/CVE-2019-17658)
|
||||
|
||||
### CVE-2019-1821
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue