mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/01/16 07:00:02
This commit is contained in:
parent
f5d6703d2b
commit
e13594e9d0
16 changed files with 192 additions and 72 deletions
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2013-05-15T04:12:13Z",
|
||||
"updated_at": "2019-07-23T19:28:29Z",
|
||||
"updated_at": "2020-01-15T16:23:42Z",
|
||||
"pushed_at": "2014-03-29T14:07:38Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-03T20:28:27Z",
|
||||
"updated_at": "2020-01-10T09:39:01Z",
|
||||
"updated_at": "2020-01-15T20:43:37Z",
|
||||
"pushed_at": "2019-01-31T22:56:17Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 171,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -228,5 +228,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234157095,
|
||||
"name": "Zabbix-Templates",
|
||||
"full_name": "slunart\/Zabbix-Templates",
|
||||
"owner": {
|
||||
"login": "slunart",
|
||||
"id": 352135,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/352135?v=4",
|
||||
"html_url": "https:\/\/github.com\/slunart"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/slunart\/Zabbix-Templates",
|
||||
"description": "Zabbix template for check the CVE-2016-0728 Vulnerability in Red Hat Linux OS like",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T19:32:15Z",
|
||||
"updated_at": "2020-01-15T20:11:45Z",
|
||||
"pushed_at": "2020-01-15T20:07:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Android Blueborne RCE CVE-2017-0781",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-17T21:07:24Z",
|
||||
"updated_at": "2020-01-14T15:53:31Z",
|
||||
"updated_at": "2020-01-15T18:09:28Z",
|
||||
"pushed_at": "2018-04-04T12:59:18Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T02:50:37Z",
|
||||
"updated_at": "2019-10-11T19:04:17Z",
|
||||
"updated_at": "2020-01-15T18:50:34Z",
|
||||
"pushed_at": "2017-09-08T11:59:20Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1233,7 +1233,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-06-26T10:21:50Z",
|
||||
"updated_at": "2019-11-12T10:42:33Z",
|
||||
"pushed_at": "2020-01-15T14:40:13Z",
|
||||
"pushed_at": "2020-01-15T16:12:07Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 122,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "A proof of concept for ReadyAPI 2.5.0\/2.6.0 Remote Code Execution Vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-03T17:53:17Z",
|
||||
"updated_at": "2019-05-10T02:19:59Z",
|
||||
"pushed_at": "2019-05-10T02:19:57Z",
|
||||
"updated_at": "2020-01-15T16:15:34Z",
|
||||
"pushed_at": "2020-01-15T16:15:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-14T16:32:08Z",
|
||||
"updated_at": "2020-01-09T23:28:55Z",
|
||||
"updated_at": "2020-01-15T17:37:09Z",
|
||||
"pushed_at": "2019-08-06T12:42:05Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-06-28T03:57:26Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-01-15T08:31:25Z",
|
||||
"updated_at": "2020-01-15T19:30:54Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1513,
|
||||
"watchers_count": 1513,
|
||||
"stargazers_count": 1514,
|
||||
"watchers_count": 1514,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"watchers": 1513,
|
||||
"watchers": 1514,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,8 +174,8 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2020-01-07T08:45:45Z",
|
||||
"pushed_at": "2020-01-10T19:53:10Z",
|
||||
"updated_at": "2020-01-15T17:01:52Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 22,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-25T16:46:11Z",
|
||||
"updated_at": "2020-01-09T13:11:17Z",
|
||||
"updated_at": "2020-01-15T15:42:29Z",
|
||||
"pushed_at": "2019-12-25T16:48:41Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2020-01-15T10:20:38Z",
|
||||
"updated_at": "2020-01-15T17:27:43Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2020-01-15T12:37:22Z",
|
||||
"updated_at": "2020-01-15T21:08:51Z",
|
||||
"pushed_at": "2020-01-11T14:11:43Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 250,
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 254,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2020-01-15T14:40:47Z",
|
||||
"pushed_at": "2020-01-15T14:40:45Z",
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 401,
|
||||
"updated_at": "2020-01-15T19:22:46Z",
|
||||
"pushed_at": "2020-01-15T18:53:44Z",
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"watchers": 404,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Test a host for susceptibility to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2020-01-15T12:54:13Z",
|
||||
"pushed_at": "2020-01-14T21:26:26Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 58,
|
||||
"updated_at": "2020-01-15T20:40:57Z",
|
||||
"pushed_at": "2020-01-15T19:46:09Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-01-15T13:55:49Z",
|
||||
"updated_at": "2020-01-15T20:30:37Z",
|
||||
"pushed_at": "2020-01-13T18:54:57Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 45,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "All Working Exploits",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T20:43:09Z",
|
||||
"updated_at": "2020-01-11T22:09:36Z",
|
||||
"updated_at": "2020-01-15T18:57:44Z",
|
||||
"pushed_at": "2020-01-11T22:09:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -270,8 +270,8 @@
|
|||
"pushed_at": "2020-01-15T10:54:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -435,5 +435,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234157094,
|
||||
"name": "CVE-2019-19781_IOCs",
|
||||
"full_name": "digitalshadows\/CVE-2019-19781_IOCs",
|
||||
"owner": {
|
||||
"login": "digitalshadows",
|
||||
"id": 11042971,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11042971?v=4",
|
||||
"html_url": "https:\/\/github.com\/digitalshadows"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/digitalshadows\/CVE-2019-19781_IOCs",
|
||||
"description": "IOCs for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T19:32:14Z",
|
||||
"updated_at": "2020-01-15T19:37:59Z",
|
||||
"pushed_at": "2020-01-15T19:36:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234169492,
|
||||
"name": "CVE-2019-19781-Forensic",
|
||||
"full_name": "onSec-fr\/CVE-2019-19781-Forensic",
|
||||
"owner": {
|
||||
"login": "onSec-fr",
|
||||
"id": 59887731,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/59887731?v=4",
|
||||
"html_url": "https:\/\/github.com\/onSec-fr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onSec-fr\/CVE-2019-19781-Forensic",
|
||||
"description": "Automated forensic script hunting for cve-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T20:43:37Z",
|
||||
"updated_at": "2020-01-15T20:58:13Z",
|
||||
"pushed_at": "2020-01-15T20:58:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,59 @@
|
|||
"description": "Zeek package to detect CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T00:01:29Z",
|
||||
"updated_at": "2020-01-15T15:09:35Z",
|
||||
"updated_at": "2020-01-15T19:27:10Z",
|
||||
"pushed_at": "2020-01-15T02:16:00Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234134766,
|
||||
"name": "CVE-2020-0601",
|
||||
"full_name": "SherlockSec\/CVE-2020-0601",
|
||||
"owner": {
|
||||
"login": "SherlockSec",
|
||||
"id": 37545173,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37545173?v=4",
|
||||
"html_url": "https:\/\/github.com\/SherlockSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601",
|
||||
"description": "A Windows Crypto Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T17:26:58Z",
|
||||
"updated_at": "2020-01-15T20:32:29Z",
|
||||
"pushed_at": "2020-01-15T17:28:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 13,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234146234,
|
||||
"name": "CVE-2020-0601",
|
||||
"full_name": "JPurrier\/CVE-2020-0601",
|
||||
"owner": {
|
||||
"login": "JPurrier",
|
||||
"id": 25715340,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25715340?v=4",
|
||||
"html_url": "https:\/\/github.com\/JPurrier"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JPurrier\/CVE-2020-0601",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T18:31:30Z",
|
||||
"updated_at": "2020-01-15T18:34:29Z",
|
||||
"pushed_at": "2020-01-15T18:34:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1365,6 +1365,7 @@
|
|||
- [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728)
|
||||
- [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728)
|
||||
- [sugarvillela/CVE](https://github.com/sugarvillela/CVE)
|
||||
- [slunart/Zabbix-Templates](https://github.com/slunart/Zabbix-Templates)
|
||||
|
||||
### CVE-2016-0752.json
|
||||
- [forced-request/rails-rce-cve-2016-0752](https://github.com/forced-request/rails-rce-cve-2016-0752)
|
||||
|
@ -5024,6 +5025,8 @@
|
|||
- [mekhalleh/citrix_dir_trasversal_rce](https://github.com/mekhalleh/citrix_dir_trasversal_rce)
|
||||
- [zenturacp/cve-2019-19781-web](https://github.com/zenturacp/cve-2019-19781-web)
|
||||
- [zgelici/CVE-2019-19781-Checker](https://github.com/zgelici/CVE-2019-19781-Checker)
|
||||
- [digitalshadows/CVE-2019-19781_IOCs](https://github.com/digitalshadows/CVE-2019-19781_IOCs)
|
||||
- [onSec-fr/CVE-2019-19781-Forensic](https://github.com/onSec-fr/CVE-2019-19781-Forensic)
|
||||
|
||||
### CVE-2019-19844.json
|
||||
- [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc)
|
||||
|
@ -5412,6 +5415,8 @@
|
|||
### CVE-2020-0601.json
|
||||
- [nissan-sudo/CVE-2020-0601](https://github.com/nissan-sudo/CVE-2020-0601)
|
||||
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
|
||||
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
|
||||
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
|
||||
|
||||
### CVE-2020-5509.json
|
||||
- [FULLSHADE/CVE-2020-5509-POC](https://github.com/FULLSHADE/CVE-2020-5509-POC)
|
||||
|
|
Loading…
Reference in a new issue