cve/2020/CVE-2020-15778.md

65 lines
3.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-15778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15778)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
** DISPUTED ** scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ArrestX/--POC
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Evan-Zhangyf/CVE-2020-15778
- https://github.com/FontouraAbreu/seguranca-T5
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Neko-chanQwQ/CVE-2020-15778-Exploit
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/SF4bin/SEEKER_dataset
- https://github.com/SexyBeast233/SecBooks
- https://github.com/TarikVUT/secure-fedora38
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Totes5706/TotesHTB
2024-07-25 21:25:12 +00:00
- https://github.com/TrojanAZhen/Self_Back
2024-06-07 04:52:01 +00:00
- https://github.com/Tyro-Shan/gongkaishouji
2024-05-25 21:48:12 +02:00
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/Penetration_PoC
2024-05-25 21:48:12 +02:00
- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network
- https://github.com/cpandya2909/CVE-2020-15778
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/huike007/penetration_poc
- https://github.com/jim091418/Information_Security_Course
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
2024-08-12 19:01:27 +00:00
- https://github.com/pentration/gongkaishouji
2024-05-25 21:48:12 +02:00
- https://github.com/phx/cvescan
- https://github.com/readloud/Awesome-Stars
- https://github.com/retr0-13/cveScannerV2
- https://github.com/scmanjarrez/CVEScannerV2
- https://github.com/siddicky/git-and-crumpets
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji