mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/01/27 00:10:23
This commit is contained in:
parent
686736341d
commit
f9aedc95e9
26 changed files with 116 additions and 107 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-06-12T20:07:46Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-14T08:12:07Z",
|
||||
"updated_at": "2021-01-02T05:45:41Z",
|
||||
"updated_at": "2021-01-26T14:15:01Z",
|
||||
"pushed_at": "2021-01-02T05:45:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-08-18T00:00:15Z",
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 142,
|
||||
"forks": 142,
|
||||
"forks_count": 143,
|
||||
"forks": 143,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 198,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-07T06:45:27Z",
|
||||
"updated_at": "2021-01-22T12:23:46Z",
|
||||
"updated_at": "2021-01-26T14:29:59Z",
|
||||
"pushed_at": "2020-11-18T03:01:31Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Quick and dirty bruteforcer for CVE-2018-7669 (Directory Traversal Vulnerability in Sitecore)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T10:13:32Z",
|
||||
"updated_at": "2021-01-25T10:19:15Z",
|
||||
"pushed_at": "2021-01-25T10:19:13Z",
|
||||
"updated_at": "2021-01-26T10:21:46Z",
|
||||
"pushed_at": "2021-01-26T10:21:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -2543,13 +2543,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-14T08:51:31Z",
|
||||
"updated_at": "2020-11-14T09:04:55Z",
|
||||
"updated_at": "2021-01-26T14:15:09Z",
|
||||
"pushed_at": "2020-11-14T09:04:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-18T16:25:28Z",
|
||||
"updated_at": "2021-01-13T23:02:59Z",
|
||||
"updated_at": "2021-01-26T13:46:27Z",
|
||||
"pushed_at": "2020-08-19T15:34:30Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-26T08:13:05Z",
|
||||
"updated_at": "2021-01-26T09:59:40Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2295,
|
||||
"watchers_count": 2295,
|
||||
"stargazers_count": 2296,
|
||||
"watchers_count": 2296,
|
||||
"forks_count": 643,
|
||||
"forks": 643,
|
||||
"watchers": 2295,
|
||||
"watchers": 2296,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T02:41:44Z",
|
||||
"updated_at": "2021-01-10T23:57:22Z",
|
||||
"updated_at": "2021-01-26T14:21:51Z",
|
||||
"pushed_at": "2020-02-19T03:47:33Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 51,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-01-24T17:07:35Z",
|
||||
"updated_at": "2021-01-26T14:22:10Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 533,
|
||||
"watchers_count": 533,
|
||||
"stargazers_count": 532,
|
||||
"watchers_count": 532,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"watchers": 533,
|
||||
"watchers": 532,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-22T13:11:27Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -321,29 +321,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246896093,
|
||||
"name": "CVE-2020-0796",
|
||||
"full_name": "0xtobu\/CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "0xtobu",
|
||||
"id": 35800885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35800885?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xtobu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xtobu\/CVE-2020-0796",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T17:43:00Z",
|
||||
"updated_at": "2020-03-23T02:59:46Z",
|
||||
"pushed_at": "2020-03-12T17:50:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246900063,
|
||||
"name": "SMBGhost",
|
||||
|
@ -1140,13 +1117,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2021-01-20T07:33:31Z",
|
||||
"updated_at": "2021-01-26T14:17:31Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"watchers": 349,
|
||||
"watchers": 350,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-0799.json
Normal file
25
2020/CVE-2020-0799.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 248334231,
|
||||
"name": "CVE-2020-0799",
|
||||
"full_name": "5l1v3r1\/CVE-2020-0799",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0799",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-18T20:20:23Z",
|
||||
"updated_at": "2021-01-26T12:54:03Z",
|
||||
"pushed_at": "2020-03-12T17:50:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-10-28T00:57:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Remote Code Execution vulnerability on ArcSight Logger",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-07T12:30:23Z",
|
||||
"updated_at": "2021-01-24T09:28:10Z",
|
||||
"updated_at": "2021-01-26T14:57:51Z",
|
||||
"pushed_at": "2021-01-24T09:28:08Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 18,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-01-25T19:53:27Z",
|
||||
"updated_at": "2021-01-26T12:19:27Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 352,
|
||||
"watchers": 351,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-26T08:13:05Z",
|
||||
"updated_at": "2021-01-26T09:59:40Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2295,
|
||||
"watchers_count": 2295,
|
||||
"stargazers_count": 2296,
|
||||
"watchers_count": 2296,
|
||||
"forks_count": 643,
|
||||
"forks": 643,
|
||||
"watchers": 2295,
|
||||
"watchers": 2296,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "用于对WebLogic(10.3.6.0.0 ;12.1.3.0.0 ;12.2.1.3.0; 12.2.1.4.0 ;14.1.1.0.0)进行验证及利用",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T15:33:04Z",
|
||||
"updated_at": "2021-01-25T15:40:48Z",
|
||||
"pushed_at": "2021-01-25T15:40:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-01-26T14:31:14Z",
|
||||
"pushed_at": "2021-01-26T14:26:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-07T19:56:09Z",
|
||||
"updated_at": "2021-01-24T13:52:49Z",
|
||||
"updated_at": "2021-01-26T09:55:44Z",
|
||||
"pushed_at": "2020-10-26T10:15:32Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 207,
|
||||
"watchers": 208,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-23T19:07:18Z",
|
||||
"updated_at": "2021-01-26T07:12:05Z",
|
||||
"updated_at": "2021-01-26T14:20:20Z",
|
||||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T10:49:40Z",
|
||||
"updated_at": "2021-01-26T08:48:06Z",
|
||||
"updated_at": "2021-01-26T13:52:31Z",
|
||||
"pushed_at": "2021-01-15T16:25:19Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 45,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-07-18T19:20:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-01-26T07:21:12Z",
|
||||
"updated_at": "2021-01-26T12:05:51Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 44,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -341,7 +341,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [xax007/CVE-2020-0796-Scanner](https://github.com/xax007/CVE-2020-0796-Scanner)
|
||||
- [Dhoomralochana/Scanners-for-CVE-2020-0796-Testing](https://github.com/Dhoomralochana/Scanners-for-CVE-2020-0796-Testing)
|
||||
- [UraSecTeam/smbee](https://github.com/UraSecTeam/smbee)
|
||||
- [0xtobu/CVE-2020-0796](https://github.com/0xtobu/CVE-2020-0796)
|
||||
- [netscylla/SMBGhost](https://github.com/netscylla/SMBGhost)
|
||||
- [eerykitty/CVE-2020-0796-PoC](https://github.com/eerykitty/CVE-2020-0796-PoC)
|
||||
- [wneessen/SMBCompScan](https://github.com/wneessen/SMBCompScan)
|
||||
|
@ -406,6 +405,14 @@ An elevation of privilege vulnerability exists when the Windows Work Folder Serv
|
|||
|
||||
- [bonesg/CVE-2020-0797](https://github.com/bonesg/CVE-2020-0797)
|
||||
|
||||
### CVE-2020-0799 (2020-03-12)
|
||||
|
||||
<code>
|
||||
An elevation of privilege vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle parsing of certain symbolic links, aka 'Windows Kernel Elevation of Privilege Vulnerability'.
|
||||
</code>
|
||||
|
||||
- [5l1v3r1/CVE-2020-0799](https://github.com/5l1v3r1/CVE-2020-0799)
|
||||
|
||||
### CVE-2020-0801 (2020-03-12)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue