mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/08/26 00:10:28
This commit is contained in:
parent
039a240518
commit
e125589c7f
34 changed files with 108 additions and 432 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2013-05-21T05:40:37Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 50957830,
|
||||
"name": "cve-2016-0701",
|
||||
"full_name": "luanjampa\/cve-2016-0701",
|
||||
"owner": {
|
||||
"login": "luanjampa",
|
||||
"id": 4728927,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4728927?v=4",
|
||||
"html_url": "https:\/\/github.com\/luanjampa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/luanjampa\/cve-2016-0701",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-02-02T22:53:34Z",
|
||||
"updated_at": "2016-02-15T06:03:46Z",
|
||||
"pushed_at": "2016-02-24T17:32:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 49952630,
|
||||
"name": "cve-2016-0728",
|
||||
"full_name": "idl3r\/cve-2016-0728",
|
||||
"owner": {
|
||||
"login": "idl3r",
|
||||
"id": 11041719,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11041719?v=4",
|
||||
"html_url": "https:\/\/github.com\/idl3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/idl3r\/cve-2016-0728",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-01-19T12:55:49Z",
|
||||
"updated_at": "2016-01-19T12:55:49Z",
|
||||
"pushed_at": "2016-01-19T12:55:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 50038843,
|
||||
"name": "cve_2016_0728",
|
||||
"full_name": "kennetham\/cve_2016_0728",
|
||||
"owner": {
|
||||
"login": "kennetham",
|
||||
"id": 507492,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/507492?v=4",
|
||||
"html_url": "https:\/\/github.com\/kennetham"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kennetham\/cve_2016_0728",
|
||||
"description": "CVE-2016-0728 Linux Kernel Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-20T15:23:52Z",
|
||||
"updated_at": "2018-01-04T10:37:03Z",
|
||||
"pushed_at": "2016-01-20T15:26:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 50156146,
|
||||
"name": "cve-2016-0728",
|
||||
|
@ -68,75 +22,6 @@
|
|||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 50231808,
|
||||
"name": "CVE-2016-0728",
|
||||
"full_name": "googleweb\/CVE-2016-0728",
|
||||
"owner": {
|
||||
"login": "googleweb",
|
||||
"id": 11829793,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11829793?v=4",
|
||||
"html_url": "https:\/\/github.com\/googleweb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/googleweb\/CVE-2016-0728",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-01-23T09:17:21Z",
|
||||
"updated_at": "2019-01-06T01:51:44Z",
|
||||
"pushed_at": "2016-01-20T21:31:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 50619014,
|
||||
"name": "cve-2016-0728-testbed",
|
||||
"full_name": "neuschaefer\/cve-2016-0728-testbed",
|
||||
"owner": {
|
||||
"login": "neuschaefer",
|
||||
"id": 1021512,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1021512?v=4",
|
||||
"html_url": "https:\/\/github.com\/neuschaefer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/neuschaefer\/cve-2016-0728-testbed",
|
||||
"description": "A testbed for CVE-2016-0728, a refcount leak\/overflow bug in Linux",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-28T22:38:13Z",
|
||||
"updated_at": "2017-06-05T14:54:37Z",
|
||||
"pushed_at": "2016-01-29T00:48:38Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 53915696,
|
||||
"name": "cve-2016-0728",
|
||||
"full_name": "bittorrent3389\/cve-2016-0728",
|
||||
"owner": {
|
||||
"login": "bittorrent3389",
|
||||
"id": 5295462,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5295462?v=4",
|
||||
"html_url": "https:\/\/github.com\/bittorrent3389"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bittorrent3389\/cve-2016-0728",
|
||||
"description": "a exploit for cve-2016-0728",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-15T04:52:40Z",
|
||||
"updated_at": "2018-11-12T08:15:48Z",
|
||||
"pushed_at": "2016-03-16T10:15:47Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 80220505,
|
||||
"name": "exploit_cve-2016-0728",
|
||||
|
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 50437751,
|
||||
"name": "rails-rce-cve-2016-0752",
|
||||
"full_name": "forced-request\/rails-rce-cve-2016-0752",
|
||||
"owner": {
|
||||
"login": "forced-request",
|
||||
"id": 961246,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/961246?v=4",
|
||||
"html_url": "https:\/\/github.com\/forced-request"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/forced-request\/rails-rce-cve-2016-0752",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-01-26T15:25:34Z",
|
||||
"updated_at": "2017-03-22T01:11:06Z",
|
||||
"pushed_at": "2016-01-26T15:30:22Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 54231678,
|
||||
"name": "CVE-2016-0752",
|
||||
"full_name": "dachidahu\/CVE-2016-0752",
|
||||
"owner": {
|
||||
"login": "dachidahu",
|
||||
"id": 1536032,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1536032?v=4",
|
||||
"html_url": "https:\/\/github.com\/dachidahu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dachidahu\/CVE-2016-0752",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-03-18T21:10:18Z",
|
||||
"updated_at": "2016-03-18T21:45:54Z",
|
||||
"pushed_at": "2016-03-21T05:02:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 55565130,
|
||||
"name": "cve-2016-0805",
|
||||
"full_name": "hulovebin\/cve-2016-0805",
|
||||
"owner": {
|
||||
"login": "hulovebin",
|
||||
"id": 9494192,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/9494192?v=4",
|
||||
"html_url": "https:\/\/github.com\/hulovebin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hulovebin\/cve-2016-0805",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-04-06T00:59:43Z",
|
||||
"updated_at": "2016-04-06T00:59:43Z",
|
||||
"pushed_at": "2016-04-06T00:59:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 51731718,
|
||||
"name": "killasa",
|
||||
"full_name": "jgajek\/killasa",
|
||||
"owner": {
|
||||
"login": "jgajek",
|
||||
"id": 7495374,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7495374?v=4",
|
||||
"html_url": "https:\/\/github.com\/jgajek"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jgajek\/killasa",
|
||||
"description": "CVE-2016-1287 vulnerability test",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-15T04:56:15Z",
|
||||
"updated_at": "2020-04-08T00:19:21Z",
|
||||
"pushed_at": "2016-02-15T04:59:43Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 67734857,
|
||||
"name": "asa_tools",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 52896981,
|
||||
"name": "dh-CVE_2016_2098",
|
||||
"full_name": "hderms\/dh-CVE_2016_2098",
|
||||
"owner": {
|
||||
"login": "hderms",
|
||||
"id": 833575,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/833575?v=4",
|
||||
"html_url": "https:\/\/github.com\/hderms"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hderms\/dh-CVE_2016_2098",
|
||||
"description": "Proof of concept showing how CVE-2016-2098 leads to remote code execution",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-01T17:45:29Z",
|
||||
"updated_at": "2020-06-06T02:45:09Z",
|
||||
"pushed_at": "2016-03-01T17:45:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 60613259,
|
||||
"name": "PoC_CVE-2016-2098_Rails42",
|
||||
|
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 54332427,
|
||||
"name": "cert-pinning-flaw-poc",
|
||||
"full_name": "ikoz\/cert-pinning-flaw-poc",
|
||||
"owner": {
|
||||
"login": "ikoz",
|
||||
"id": 9115937,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9115937?v=4",
|
||||
"html_url": "https:\/\/github.com\/ikoz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ikoz\/cert-pinning-flaw-poc",
|
||||
"description": "Simple script for testing CVE-2016-2402 and similar flaws",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-20T18:04:40Z",
|
||||
"updated_at": "2019-05-15T08:00:43Z",
|
||||
"pushed_at": "2016-03-30T23:37:07Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 55105611,
|
||||
"name": "certPinningVulnerableOkHttp",
|
||||
"full_name": "ikoz\/certPinningVulnerableOkHttp",
|
||||
"owner": {
|
||||
"login": "ikoz",
|
||||
"id": 9115937,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9115937?v=4",
|
||||
"html_url": "https:\/\/github.com\/ikoz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ikoz\/certPinningVulnerableOkHttp",
|
||||
"description": "OkHttp sample app vulnerable to CVE-2016-2402",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-30T23:45:06Z",
|
||||
"updated_at": "2018-11-30T02:52:33Z",
|
||||
"pushed_at": "2016-03-31T00:15:36Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-03T03:11:24Z",
|
||||
"updated_at": "2020-08-24T21:09:07Z",
|
||||
"pushed_at": "2019-10-21T08:13:40Z",
|
||||
"updated_at": "2020-08-25T09:48:48Z",
|
||||
"pushed_at": "2020-08-25T09:48:45Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 16,
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2017-03-12T15:43:27Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-22T14:19:54Z",
|
||||
"updated_at": "2020-08-19T14:28:05Z",
|
||||
"updated_at": "2020-08-25T13:59:11Z",
|
||||
"pushed_at": "2019-02-21T13:18:24Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2017-09-19T18:06:41Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 177,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-0230 & s2-059 poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-20T08:21:54Z",
|
||||
"updated_at": "2020-08-25T05:42:35Z",
|
||||
"updated_at": "2020-08-25T09:44:49Z",
|
||||
"pushed_at": "2020-08-21T12:41:14Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1301,7 +1301,7 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-08-24T19:01:58Z",
|
||||
"updated_at": "2020-08-25T10:56:08Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 753,
|
||||
"watchers_count": 753,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-08-24T03:36:29Z",
|
||||
"updated_at": "2020-08-25T10:31:24Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1601,
|
||||
"watchers_count": 1601,
|
||||
"stargazers_count": 1602,
|
||||
"watchers_count": 1602,
|
||||
"forks_count": 233,
|
||||
"forks": 233,
|
||||
"watchers": 1601,
|
||||
"watchers": 1602,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-08-21T05:10:50Z",
|
||||
"updated_at": "2020-08-25T14:36:06Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 670,
|
||||
"watchers_count": 670,
|
||||
"stargazers_count": 671,
|
||||
"watchers_count": 671,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 670,
|
||||
"watchers": 671,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 5,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 290230078,
|
||||
"name": "proftpd-cve-2019-12815",
|
||||
"full_name": "lcartey\/proftpd-cve-2019-12815",
|
||||
"owner": {
|
||||
"login": "lcartey",
|
||||
"id": 5377966,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5377966?v=4",
|
||||
"html_url": "https:\/\/github.com\/lcartey"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lcartey\/proftpd-cve-2019-12815",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-25T13:58:38Z",
|
||||
"updated_at": "2020-08-25T14:13:27Z",
|
||||
"pushed_at": "2020-08-25T14:05:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2020-08-20T21:36:01Z",
|
||||
"updated_at": "2020-08-25T09:45:02Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 241,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-11-23T11:35:34Z",
|
||||
"updated_at": "2020-03-15T10:32:47Z",
|
||||
"updated_at": "2020-08-25T12:12:20Z",
|
||||
"pushed_at": "2019-11-25T06:09:35Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :).",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-17T17:59:26Z",
|
||||
"updated_at": "2020-08-03T13:28:25Z",
|
||||
"updated_at": "2020-08-25T14:52:05Z",
|
||||
"pushed_at": "2019-10-15T17:05:38Z",
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-03T05:57:44Z",
|
||||
"updated_at": "2020-03-13T16:14:48Z",
|
||||
"updated_at": "2020-08-25T14:33:00Z",
|
||||
"pushed_at": "2019-05-03T06:18:03Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,8 +59,8 @@
|
|||
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-24T19:33:10Z",
|
||||
"updated_at": "2020-08-24T19:34:41Z",
|
||||
"pushed_at": "2020-08-24T19:34:39Z",
|
||||
"updated_at": "2020-08-25T10:21:48Z",
|
||||
"pushed_at": "2020-08-25T10:21:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-08-19T14:27:14Z",
|
||||
"updated_at": "2020-08-25T09:43:43Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-04T00:50:42Z",
|
||||
"updated_at": "2020-08-16T02:11:52Z",
|
||||
"updated_at": "2020-08-25T12:34:39Z",
|
||||
"pushed_at": "2020-05-10T22:35:46Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-28T11:33:38Z",
|
||||
"updated_at": "2020-08-19T16:48:40Z",
|
||||
"updated_at": "2020-08-25T12:44:40Z",
|
||||
"pushed_at": "2020-07-28T13:36:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2020-08-17T16:49:37Z",
|
||||
"updated_at": "2020-08-25T11:36:45Z",
|
||||
"pushed_at": "2020-08-17T16:49:35Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-25T05:25:45Z",
|
||||
"updated_at": "2020-08-25T09:10:35Z",
|
||||
"updated_at": "2020-08-25T13:13:01Z",
|
||||
"pushed_at": "2020-08-25T05:46:30Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-23T06:58:04Z",
|
||||
"updated_at": "2020-08-25T07:40:37Z",
|
||||
"updated_at": "2020-08-25T09:19:29Z",
|
||||
"pushed_at": "2020-08-25T01:08:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2020-08-25T04:00:54Z",
|
||||
"updated_at": "2020-08-25T12:44:42Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1117,13 +1117,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T19:10:09Z",
|
||||
"updated_at": "2020-08-24T03:44:31Z",
|
||||
"updated_at": "2020-08-25T11:14:07Z",
|
||||
"pushed_at": "2020-08-24T03:44:29Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Docker repository with a PoC for WP Code Snippets 2.13.3 (CVE-2020-8417)",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-06T00:03:14Z",
|
||||
"updated_at": "2020-05-29T10:33:11Z",
|
||||
"updated_at": "2020-08-25T11:50:19Z",
|
||||
"pushed_at": "2020-04-23T03:28:14Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
42
README.md
42
README.md
|
@ -4072,6 +4072,7 @@ An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows
|
|||
</code>
|
||||
|
||||
- [KTN1990/CVE-2019-12815](https://github.com/KTN1990/CVE-2019-12815)
|
||||
- [lcartey/proftpd-cve-2019-12815](https://github.com/lcartey/proftpd-cve-2019-12815)
|
||||
|
||||
### CVE-2019-12836
|
||||
|
||||
|
@ -10800,40 +10801,18 @@ Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusi
|
|||
- [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner)
|
||||
- [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln)
|
||||
|
||||
### CVE-2016-0701
|
||||
|
||||
<code>
|
||||
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
|
||||
</code>
|
||||
|
||||
- [luanjampa/cve-2016-0701](https://github.com/luanjampa/cve-2016-0701)
|
||||
|
||||
### CVE-2016-0728
|
||||
|
||||
<code>
|
||||
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
|
||||
</code>
|
||||
|
||||
- [idl3r/cve-2016-0728](https://github.com/idl3r/cve-2016-0728)
|
||||
- [kennetham/cve_2016_0728](https://github.com/kennetham/cve_2016_0728)
|
||||
- [nardholio/cve-2016-0728](https://github.com/nardholio/cve-2016-0728)
|
||||
- [googleweb/CVE-2016-0728](https://github.com/googleweb/CVE-2016-0728)
|
||||
- [neuschaefer/cve-2016-0728-testbed](https://github.com/neuschaefer/cve-2016-0728-testbed)
|
||||
- [bittorrent3389/cve-2016-0728](https://github.com/bittorrent3389/cve-2016-0728)
|
||||
- [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728)
|
||||
- [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728)
|
||||
- [sugarvillela/CVE](https://github.com/sugarvillela/CVE)
|
||||
- [th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit](https://github.com/th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit)
|
||||
|
||||
### CVE-2016-0752
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
|
||||
</code>
|
||||
|
||||
- [forced-request/rails-rce-cve-2016-0752](https://github.com/forced-request/rails-rce-cve-2016-0752)
|
||||
- [dachidahu/CVE-2016-0752](https://github.com/dachidahu/CVE-2016-0752)
|
||||
|
||||
### CVE-2016-0792
|
||||
|
||||
<code>
|
||||
|
@ -10860,14 +10839,6 @@ The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4.4, 5.x before
|
|||
- [abdsec/CVE-2016-0801](https://github.com/abdsec/CVE-2016-0801)
|
||||
- [zsaurus/CVE-2016-0801-test](https://github.com/zsaurus/CVE-2016-0801-test)
|
||||
|
||||
### CVE-2016-0805
|
||||
|
||||
<code>
|
||||
The performance event manager for Qualcomm ARM processors in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49G, and 6.x before 2016-02-01 allows attackers to gain privileges via a crafted application, aka internal bug 25773204.
|
||||
</code>
|
||||
|
||||
- [hulovebin/cve-2016-0805](https://github.com/hulovebin/cve-2016-0805)
|
||||
|
||||
### CVE-2016-0846
|
||||
|
||||
<code>
|
||||
|
@ -10900,7 +10871,6 @@ The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8
|
|||
Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via crafted UDP packets, aka Bug IDs CSCux29978 and CSCux42019.
|
||||
</code>
|
||||
|
||||
- [jgajek/killasa](https://github.com/jgajek/killasa)
|
||||
- [NetSPI/asa_tools](https://github.com/NetSPI/asa_tools)
|
||||
|
||||
### CVE-2016-1494
|
||||
|
@ -10990,7 +10960,6 @@ drivers/gpu/msm/kgsl.c in the MSM graphics driver (aka GPU driver) for the Linux
|
|||
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
|
||||
</code>
|
||||
|
||||
- [hderms/dh-CVE_2016_2098](https://github.com/hderms/dh-CVE_2016_2098)
|
||||
- [CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42](https://github.com/CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42)
|
||||
- [Alejandro-MartinG/rails-PoC-CVE-2016-2098](https://github.com/Alejandro-MartinG/rails-PoC-CVE-2016-2098)
|
||||
- [0x00-0x00/CVE-2016-2098](https://github.com/0x00-0x00/CVE-2016-2098)
|
||||
|
@ -11047,15 +11016,6 @@ SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40
|
|||
|
||||
- [murataydemir/CVE-2016-2386](https://github.com/murataydemir/CVE-2016-2386)
|
||||
|
||||
### CVE-2016-2402
|
||||
|
||||
<code>
|
||||
OkHttp before 2.7.4 and 3.x before 3.1.2 allows man-in-the-middle attackers to bypass certificate pinning by sending a certificate chain with a certificate from a non-pinned trusted CA and the pinned certificate.
|
||||
</code>
|
||||
|
||||
- [ikoz/cert-pinning-flaw-poc](https://github.com/ikoz/cert-pinning-flaw-poc)
|
||||
- [ikoz/certPinningVulnerableOkHttp](https://github.com/ikoz/certPinningVulnerableOkHttp)
|
||||
|
||||
### CVE-2016-2431
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue