mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2020/10/17 00:10:27
This commit is contained in:
parent
f30b55a374
commit
eb8064848d
21 changed files with 84 additions and 79 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit PoC for Spring RCE issue (CVE-2011-2894)",
|
||||
"fork": false,
|
||||
"created_at": "2013-07-31T08:48:19Z",
|
||||
"updated_at": "2019-10-11T19:03:03Z",
|
||||
"updated_at": "2020-10-16T14:08:14Z",
|
||||
"pushed_at": "2020-02-11T15:09:32Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2020-10-16T08:41:17Z",
|
||||
"updated_at": "2020-10-16T09:22:41Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 471,
|
||||
"watchers_count": 471,
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 471,
|
||||
"watchers": 472,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "RF-14310 \/ CVE-2018-12533 - Payload generator ",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-15T09:08:53Z",
|
||||
"updated_at": "2020-10-14T12:23:55Z",
|
||||
"updated_at": "2020-10-16T09:10:43Z",
|
||||
"pushed_at": "2020-10-14T12:23:52Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2020-10-06T01:44:45Z",
|
||||
"pushed_at": "2020-09-24T06:09:14Z",
|
||||
"updated_at": "2020-10-16T12:09:47Z",
|
||||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"forks_count": 357,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-20T03:59:18Z",
|
||||
"updated_at": "2020-10-08T21:02:47Z",
|
||||
"updated_at": "2020-10-16T14:37:14Z",
|
||||
"pushed_at": "2018-07-20T12:46:50Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T15:33:50Z",
|
||||
"updated_at": "2020-10-13T06:57:56Z",
|
||||
"updated_at": "2020-10-16T13:40:14Z",
|
||||
"pushed_at": "2020-03-23T11:22:54Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 229,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-25T16:46:11Z",
|
||||
"updated_at": "2020-09-03T02:59:12Z",
|
||||
"updated_at": "2020-10-16T10:25:50Z",
|
||||
"pushed_at": "2019-12-25T16:48:41Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,7 +59,7 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2020-10-14T06:43:25Z",
|
||||
"updated_at": "2020-10-16T13:51:37Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Zimbra RCE PoC - CVE-2019-9670 XXE\/SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-16T04:37:11Z",
|
||||
"updated_at": "2020-09-03T17:21:03Z",
|
||||
"updated_at": "2020-10-16T09:46:01Z",
|
||||
"pushed_at": "2019-08-16T05:54:16Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-03-04T22:32:03Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-01-31T13:49:06Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1416,13 +1416,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T01:48:37Z",
|
||||
"updated_at": "2020-10-06T05:33:45Z",
|
||||
"updated_at": "2020-10-16T09:42:04Z",
|
||||
"pushed_at": "2020-09-17T01:55:48Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-07-19T08:24:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-05-18T17:36:18Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -864,8 +864,8 @@
|
|||
"description": "Check for events that indicate non compatible devices -> CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-15T15:02:53Z",
|
||||
"updated_at": "2020-10-15T15:50:41Z",
|
||||
"pushed_at": "2020-10-15T15:50:38Z",
|
||||
"updated_at": "2020-10-16T14:57:47Z",
|
||||
"pushed_at": "2020-10-16T14:57:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-15227 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T02:38:15Z",
|
||||
"updated_at": "2020-10-16T03:33:03Z",
|
||||
"updated_at": "2020-10-16T12:20:11Z",
|
||||
"pushed_at": "2020-10-09T16:39:54Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-07T19:56:09Z",
|
||||
"updated_at": "2020-10-16T08:48:53Z",
|
||||
"updated_at": "2020-10-16T15:00:26Z",
|
||||
"pushed_at": "2020-10-15T02:57:22Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 173,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,8 +59,8 @@
|
|||
"description": "Minor powershell script that checks for vulnerable interfaces.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T13:30:38Z",
|
||||
"updated_at": "2020-10-14T22:33:21Z",
|
||||
"pushed_at": "2020-10-14T14:00:26Z",
|
||||
"updated_at": "2020-10-16T09:20:02Z",
|
||||
"pushed_at": "2020-10-16T09:20:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-10-14T16:56:04Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-10-16T00:15:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -197,8 +197,8 @@
|
|||
"description": "PoC Bad Neighbor BSOD exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-16T06:27:24Z",
|
||||
"updated_at": "2020-10-16T07:34:56Z",
|
||||
"pushed_at": "2020-10-16T07:34:55Z",
|
||||
"updated_at": "2020-10-16T11:17:23Z",
|
||||
"pushed_at": "2020-10-16T11:17:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-15T14:32:25Z",
|
||||
"updated_at": "2020-10-16T09:09:52Z",
|
||||
"updated_at": "2020-10-16T15:04:27Z",
|
||||
"pushed_at": "2020-10-15T14:57:31Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-10-16T08:06:30Z",
|
||||
"updated_at": "2020-10-16T09:30:06Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 208,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -979,13 +979,13 @@
|
|||
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T15:33:00Z",
|
||||
"updated_at": "2020-10-13T11:11:38Z",
|
||||
"updated_at": "2020-10-16T12:16:05Z",
|
||||
"pushed_at": "2020-07-12T10:36:20Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2231,6 +2231,11 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
|
|||
- [eriknl/CVE-2020-16152](https://github.com/eriknl/CVE-2020-16152)
|
||||
|
||||
### CVE-2020-16270
|
||||
|
||||
<code>
|
||||
OLIMPOKS before 5.1.0 allows Auth/Admin ErrorMessage XSS.
|
||||
</code>
|
||||
|
||||
- [Security-AVS/CVE-2020-16270](https://github.com/Security-AVS/CVE-2020-16270)
|
||||
|
||||
### CVE-2020-16898
|
||||
|
|
Loading…
Add table
Reference in a new issue