mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/12/25 18:09:40
This commit is contained in:
parent
6cf37a2c71
commit
f565df06fb
18 changed files with 162 additions and 63 deletions
25
2010/CVE-2010-3332.json
Normal file
25
2010/CVE-2010-3332.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 106621452,
|
||||
"name": "MS10-070",
|
||||
"full_name": "bongbongco\/MS10-070",
|
||||
"owner": {
|
||||
"login": "bongbongco",
|
||||
"id": 3170006,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3170006?v=4",
|
||||
"html_url": "https:\/\/github.com\/bongbongco"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bongbongco\/MS10-070",
|
||||
"description": "CVE-2010-3332 Oracle Padding Vulnerability in Microsoft ASP.NET",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-11T23:50:33Z",
|
||||
"updated_at": "2020-07-17T05:12:24Z",
|
||||
"pushed_at": "2017-10-11T23:50:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-4221.json
Normal file
25
2010/CVE-2010-4221.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 108682441,
|
||||
"name": "cve-2010-4221",
|
||||
"full_name": "M31MOTH\/cve-2010-4221",
|
||||
"owner": {
|
||||
"login": "M31MOTH",
|
||||
"id": 10201432,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10201432?v=4",
|
||||
"html_url": "https:\/\/github.com\/M31MOTH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M31MOTH\/cve-2010-4221",
|
||||
"description": "This exploit was written to study some concepts, enjoy!",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-28T20:37:26Z",
|
||||
"updated_at": "2020-03-26T15:45:57Z",
|
||||
"pushed_at": "2017-10-22T19:46:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-4804.json
Normal file
25
2010/CVE-2010-4804.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 16589706,
|
||||
"name": "android-cve-2010-4804",
|
||||
"full_name": "thomascannon\/android-cve-2010-4804",
|
||||
"owner": {
|
||||
"login": "thomascannon",
|
||||
"id": 1297160,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1297160?v=4",
|
||||
"html_url": "https:\/\/github.com\/thomascannon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thomascannon\/android-cve-2010-4804",
|
||||
"description": "Android Data Stealing Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2014-02-06T18:53:31Z",
|
||||
"updated_at": "2020-09-26T10:56:29Z",
|
||||
"pushed_at": "2014-02-06T19:06:01Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,13 +174,13 @@
|
|||
"description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-04T01:47:05Z",
|
||||
"updated_at": "2020-09-22T13:46:40Z",
|
||||
"updated_at": "2020-12-25T08:10:12Z",
|
||||
"pushed_at": "2018-11-04T02:25:08Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1462,13 +1462,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2020-12-24T09:16:09Z",
|
||||
"updated_at": "2020-12-25T08:52:33Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1051,
|
||||
"watchers_count": 1051,
|
||||
"stargazers_count": 1052,
|
||||
"watchers_count": 1052,
|
||||
"forks_count": 352,
|
||||
"forks": 352,
|
||||
"watchers": 1051,
|
||||
"watchers": 1052,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-24T11:35:11Z",
|
||||
"updated_at": "2020-12-25T08:41:45Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2194,
|
||||
"watchers_count": 2194,
|
||||
"forks_count": 619,
|
||||
"forks": 619,
|
||||
"watchers": 2194,
|
||||
"stargazers_count": 2197,
|
||||
"watchers_count": 2197,
|
||||
"forks_count": 620,
|
||||
"forks": 620,
|
||||
"watchers": 2197,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-12-16T23:49:48Z",
|
||||
"updated_at": "2020-12-25T05:04:06Z",
|
||||
"pushed_at": "2020-08-28T14:09:20Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-12-22T01:28:48Z",
|
||||
"updated_at": "2020-12-25T04:44:13Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 685,
|
||||
"watchers_count": 685,
|
||||
"stargazers_count": 686,
|
||||
"watchers_count": 686,
|
||||
"forks_count": 143,
|
||||
"forks": 143,
|
||||
"watchers": 685,
|
||||
"watchers": 686,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 141,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-12-19T16:37:32Z",
|
||||
"updated_at": "2020-12-25T03:34:29Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 568,
|
||||
"watchers_count": 568,
|
||||
"stargazers_count": 569,
|
||||
"watchers_count": 569,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"watchers": 568,
|
||||
"watchers": 569,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -910,13 +910,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-12-24T17:17:19Z",
|
||||
"updated_at": "2020-12-25T07:17:54Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1046,
|
||||
"watchers_count": 1046,
|
||||
"stargazers_count": 1047,
|
||||
"watchers_count": 1047,
|
||||
"forks_count": 352,
|
||||
"forks": 352,
|
||||
"watchers": 1046,
|
||||
"watchers": 1047,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1554,8 +1554,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T02:35:34Z",
|
||||
"updated_at": "2020-11-16T04:45:20Z",
|
||||
"pushed_at": "2020-11-16T04:22:28Z",
|
||||
"updated_at": "2020-12-25T09:08:30Z",
|
||||
"pushed_at": "2020-12-25T09:08:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-11652 & CVE-2020-11651",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-25T02:58:35Z",
|
||||
"updated_at": "2020-12-25T02:58:53Z",
|
||||
"updated_at": "2020-12-25T05:50:44Z",
|
||||
"pushed_at": "2020-12-25T02:58:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-24T11:35:11Z",
|
||||
"updated_at": "2020-12-25T08:41:45Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2194,
|
||||
"watchers_count": 2194,
|
||||
"forks_count": 619,
|
||||
"forks": 619,
|
||||
"watchers": 2194,
|
||||
"stargazers_count": 2197,
|
||||
"watchers_count": 2197,
|
||||
"forks_count": 620,
|
||||
"forks": 620,
|
||||
"watchers": 2197,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2020-12-24T14:10:00Z",
|
||||
"updated_at": "2020-12-25T05:29:24Z",
|
||||
"pushed_at": "2020-12-15T02:33:45Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 480,
|
||||
"watchers_count": 480,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 477,
|
||||
"watchers": 480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-17008 splWOW64 Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-24T04:00:29Z",
|
||||
"updated_at": "2020-12-25T02:23:32Z",
|
||||
"updated_at": "2020-12-25T08:03:34Z",
|
||||
"pushed_at": "2020-12-24T06:02:53Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 23,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2020-17057 poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-23T10:02:47Z",
|
||||
"updated_at": "2020-12-24T07:46:20Z",
|
||||
"updated_at": "2020-12-25T08:56:24Z",
|
||||
"pushed_at": "2020-12-23T10:08:16Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -10,11 +10,11 @@
|
|||
"html_url": "https:\/\/github.com\/dn9uy3n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dn9uy3n\/Check-WP-CVE-2020-35489",
|
||||
"description": null,
|
||||
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-24T09:10:17Z",
|
||||
"updated_at": "2020-12-24T09:10:21Z",
|
||||
"pushed_at": "2020-12-24T09:10:19Z",
|
||||
"updated_at": "2020-12-25T08:09:25Z",
|
||||
"pushed_at": "2020-12-25T07:47:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-12T06:55:39Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
}
|
||||
|
|
24
README.md
24
README.md
|
@ -16112,6 +16112,14 @@ UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 th
|
|||
|
||||
- [M4LV0/UnrealIRCd-3.2.8.1-RCE](https://github.com/M4LV0/UnrealIRCd-3.2.8.1-RCE)
|
||||
|
||||
### CVE-2010-3332 (2010-09-22)
|
||||
|
||||
<code>
|
||||
Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
|
||||
</code>
|
||||
|
||||
- [bongbongco/MS10-070](https://github.com/bongbongco/MS10-070)
|
||||
|
||||
### CVE-2010-3333 (2010-11-09)
|
||||
|
||||
<code>
|
||||
|
@ -16168,6 +16176,14 @@ Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Ca
|
|||
|
||||
- [nektra/CVE-2010-3971-hotpatch](https://github.com/nektra/CVE-2010-3971-hotpatch)
|
||||
|
||||
### CVE-2010-4221 (2010-11-09)
|
||||
|
||||
<code>
|
||||
Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
|
||||
</code>
|
||||
|
||||
- [M31MOTH/cve-2010-4221](https://github.com/M31MOTH/cve-2010-4221)
|
||||
|
||||
### CVE-2010-4258 (2010-12-30)
|
||||
|
||||
<code>
|
||||
|
@ -16192,6 +16208,14 @@ The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Microso
|
|||
|
||||
- [quinn-samuel-perry/CVE-2010-4669](https://github.com/quinn-samuel-perry/CVE-2010-4669)
|
||||
|
||||
### CVE-2010-4804 (2011-06-09)
|
||||
|
||||
<code>
|
||||
The Android browser in Android before 2.3.4 allows remote attackers to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.
|
||||
</code>
|
||||
|
||||
- [thomascannon/android-cve-2010-4804](https://github.com/thomascannon/android-cve-2010-4804)
|
||||
|
||||
### CVE-2010-5327 (2017-01-13)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue