mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
Update CVE sources 2024-08-12 19:01
This commit is contained in:
parent
a417c53201
commit
66773275a6
@ -10,6 +10,7 @@ Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to
|
|||||||
### POC
|
### POC
|
||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
|
- https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf
|
||||||
- https://hackerone.com/reports/145463
|
- https://hackerone.com/reports/145463
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
@ -109,6 +109,7 @@ In Jboss Application Server as shipped with Red Hat Enterprise Application Platf
|
|||||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||||
- https://github.com/pen4uin/vulnerability-research
|
- https://github.com/pen4uin/vulnerability-research
|
||||||
- https://github.com/pen4uin/vulnerability-research-list
|
- https://github.com/pen4uin/vulnerability-research-list
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/r0eXpeR/redteam_vul
|
- https://github.com/r0eXpeR/redteam_vul
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
|
@ -87,6 +87,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
|
|||||||
- https://github.com/onewinner/VulToolsKit
|
- https://github.com/onewinner/VulToolsKit
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/q99266/saury-vulnhub
|
- https://github.com/q99266/saury-vulnhub
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/qiantu88/Tomcat-Exploit
|
- https://github.com/qiantu88/Tomcat-Exploit
|
||||||
|
@ -91,6 +91,7 @@ Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in In
|
|||||||
- https://github.com/opensec-cn/kunpeng
|
- https://github.com/opensec-cn/kunpeng
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/qnsoft/kunpeng
|
- https://github.com/qnsoft/kunpeng
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
|
@ -71,6 +71,7 @@ A code execution vulnerability exists in the Stapler web framework used by Jenki
|
|||||||
- https://github.com/onewinner/VulToolsKit
|
- https://github.com/onewinner/VulToolsKit
|
||||||
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/reph0r/poc-exp
|
- https://github.com/reph0r/poc-exp
|
||||||
- https://github.com/reph0r/poc-exp-tools
|
- https://github.com/reph0r/poc-exp-tools
|
||||||
- https://github.com/retr0-13/Goby
|
- https://github.com/retr0-13/Goby
|
||||||
|
@ -115,6 +115,7 @@ In WinRAR versions prior to and including 5.61, There is path traversal vulnerab
|
|||||||
- https://github.com/nobiusmallyu/kehai
|
- https://github.com/nobiusmallyu/kehai
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pranav0408/WinAFL
|
- https://github.com/pranav0408/WinAFL
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/ray-cp/Vuln_Analysis
|
- https://github.com/ray-cp/Vuln_Analysis
|
||||||
|
17
2018/CVE-2018-21179.md
Normal file
17
2018/CVE-2018-21179.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2018-21179](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21179)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, D7800 before 1.0.1.30, R7500 before 1.0.0.122, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://kb.netgear.com/000055179/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2620
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -114,6 +114,7 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
|
|||||||
- https://github.com/oleksandrbi/CodePathweek7
|
- https://github.com/oleksandrbi/CodePathweek7
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/paulveillard/cybersecurity-tools
|
- https://github.com/paulveillard/cybersecurity-tools
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/piyushimself/Bugbounty_Writeups
|
- https://github.com/piyushimself/Bugbounty_Writeups
|
||||||
- https://github.com/plancoo/Bugbounty_Writeups
|
- https://github.com/plancoo/Bugbounty_Writeups
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
|
@ -112,6 +112,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
|||||||
- https://github.com/paramint/windows-kernel-exploits
|
- https://github.com/paramint/windows-kernel-exploits
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/windows-kernel-exploits
|
- https://github.com/password520/windows-kernel-exploits
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pwninx/WinPwn
|
- https://github.com/pwninx/WinPwn
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/qiantu88/CVE-2018-8120
|
- https://github.com/qiantu88/CVE-2018-8120
|
||||||
|
@ -329,6 +329,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
- https://github.com/pengusec/awesome-netsec-articles
|
- https://github.com/pengusec/awesome-netsec-articles
|
||||||
- https://github.com/pentest-a2p2v/pentest-a2p2v-core
|
- https://github.com/pentest-a2p2v/pentest-a2p2v-core
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pg001001/deception-tech
|
- https://github.com/pg001001/deception-tech
|
||||||
- https://github.com/phant0n/PENTESTING-BIBLE
|
- https://github.com/phant0n/PENTESTING-BIBLE
|
||||||
- https://github.com/pikpikcu/Pentest-Tools-Framework
|
- https://github.com/pikpikcu/Pentest-Tools-Framework
|
||||||
|
@ -61,6 +61,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
|||||||
- https://github.com/paramint/windows-kernel-exploits
|
- https://github.com/paramint/windows-kernel-exploits
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pravinsrc/NOTES-windows-kernel-links
|
- https://github.com/pravinsrc/NOTES-windows-kernel-links
|
||||||
- https://github.com/root26/bug
|
- https://github.com/root26/bug
|
||||||
- https://github.com/safesword/WindowsExp
|
- https://github.com/safesword/WindowsExp
|
||||||
|
@ -38,6 +38,7 @@ An elevation of privilege vulnerability exists in the way Windows Error Reportin
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
@ -30,6 +30,7 @@ A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and
|
|||||||
- https://github.com/onewinner/VulToolsKit
|
- https://github.com/onewinner/VulToolsKit
|
||||||
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -38,6 +38,7 @@ A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and
|
|||||||
- https://github.com/onewinner/VulToolsKit
|
- https://github.com/onewinner/VulToolsKit
|
||||||
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/retr0-13/pwn_jenkins
|
- https://github.com/retr0-13/pwn_jenkins
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -36,6 +36,7 @@ It was found that xstream API version 1.4.10 before 1.4.11 introduced a regressi
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/lokerxx/JavaVul
|
- https://github.com/lokerxx/JavaVul
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -53,6 +53,7 @@ mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints
|
|||||||
- https://github.com/masahiro331/CVE-2019-10758
|
- https://github.com/masahiro331/CVE-2019-10758
|
||||||
- https://github.com/ossf-cve-benchmark/CVE-2019-10758
|
- https://github.com/ossf-cve-benchmark/CVE-2019-10758
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/retr0-13/Goby
|
- https://github.com/retr0-13/Goby
|
||||||
- https://github.com/tdtc7/qps
|
- https://github.com/tdtc7/qps
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
|
@ -108,6 +108,7 @@ In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in
|
|||||||
- https://github.com/motikan2010/blog.motikan2010.com
|
- https://github.com/motikan2010/blog.motikan2010.com
|
||||||
- https://github.com/neex/phuip-fpizdam
|
- https://github.com/neex/phuip-fpizdam
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/rmtec/modeswitcher
|
- https://github.com/rmtec/modeswitcher
|
||||||
- https://github.com/shadow-horse/cve-2019-11043
|
- https://github.com/shadow-horse/cve-2019-11043
|
||||||
|
@ -89,6 +89,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7
|
|||||||
- https://github.com/nvchungkma/Pulse-VPN-Vulnerability-Analysis
|
- https://github.com/nvchungkma/Pulse-VPN-Vulnerability-Analysis
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/popyue/Pulse_exploit
|
- https://github.com/popyue/Pulse_exploit
|
||||||
- https://github.com/priamai/sigmatau
|
- https://github.com/priamai/sigmatau
|
||||||
- https://github.com/projectzeroindia/CVE-2019-11510
|
- https://github.com/projectzeroindia/CVE-2019-11510
|
||||||
|
@ -57,6 +57,7 @@ Insufficient vetting of parameters passed with the Prompt:Open IPC message betwe
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/m1ghtym0/browser-pwn
|
- https://github.com/m1ghtym0/browser-pwn
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/weeka10/-hktalent-TOP
|
- https://github.com/weeka10/-hktalent-TOP
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -46,6 +46,7 @@ The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/lnick2023/nicenice
|
- https://github.com/lnick2023/nicenice
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/woods-sega/woodswiki
|
- https://github.com/woods-sega/woodswiki
|
||||||
|
@ -59,6 +59,7 @@ An elevation of privilege vulnerability exists when the Windows AppX Deployment
|
|||||||
- https://github.com/padovah4ck/CVE-2019-1253
|
- https://github.com/padovah4ck/CVE-2019-1253
|
||||||
- https://github.com/paramint/Watson-Windows-check-KB
|
- https://github.com/paramint/Watson-Windows-check-KB
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pwninx/Watson
|
- https://github.com/pwninx/Watson
|
||||||
- https://github.com/rasta-mouse/Watson
|
- https://github.com/rasta-mouse/Watson
|
||||||
- https://github.com/rnbochsr/Relevant
|
- https://github.com/rnbochsr/Relevant
|
||||||
|
@ -30,6 +30,7 @@ No PoCs from references.
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pr0tean/CVE-2019-13051
|
- https://github.com/pr0tean/CVE-2019-13051
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -58,6 +58,7 @@ An elevation of privilege vulnerability exists when Windows improperly handles a
|
|||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
- https://github.com/pengusec/awesome-netsec-articles
|
- https://github.com/pengusec/awesome-netsec-articles
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/rnbochsr/Relevant
|
- https://github.com/rnbochsr/Relevant
|
||||||
- https://github.com/weeka10/-hktalent-TOP
|
- https://github.com/weeka10/-hktalent-TOP
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
|
@ -116,6 +116,7 @@ In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the
|
|||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
- https://github.com/pathakabhi24/Pentest-Tools
|
- https://github.com/pathakabhi24/Pentest-Tools
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pjgmonteiro/Pentest-tools
|
- https://github.com/pjgmonteiro/Pentest-tools
|
||||||
- https://github.com/polosec/CVE-2019-13272
|
- https://github.com/polosec/CVE-2019-13272
|
||||||
- https://github.com/pwnCmndr/LinuxPrivEsc
|
- https://github.com/pwnCmndr/LinuxPrivEsc
|
||||||
|
@ -86,6 +86,7 @@ No PoCs from references.
|
|||||||
- https://github.com/nobodyatall648/CVE-2019-1388
|
- https://github.com/nobodyatall648/CVE-2019-1388
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
|
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/rahul-masal/Windows-Privilege-Escalation
|
- https://github.com/rahul-masal/Windows-Privilege-Escalation
|
||||||
|
@ -66,6 +66,7 @@ An elevation of privilege vulnerability exists when the Windows Universal Plug a
|
|||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
- https://github.com/pengusec/awesome-netsec-articles
|
- https://github.com/pengusec/awesome-netsec-articles
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/rnbochsr/Relevant
|
- https://github.com/rnbochsr/Relevant
|
||||||
- https://github.com/shubham0d/SymBlock
|
- https://github.com/shubham0d/SymBlock
|
||||||
- https://github.com/weeka10/-hktalent-TOP
|
- https://github.com/weeka10/-hktalent-TOP
|
||||||
|
@ -66,6 +66,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
|||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/paramint/windows-kernel-exploits
|
- https://github.com/paramint/windows-kernel-exploits
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/piotrflorczyk/cve-2019-1458_POC
|
- https://github.com/piotrflorczyk/cve-2019-1458_POC
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/rip1s/CVE-2019-1458
|
- https://github.com/rip1s/CVE-2019-1458
|
||||||
|
@ -117,6 +117,7 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_change.
|
|||||||
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
|
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/psw01/CVE-2019-15107_webminRCE
|
- https://github.com/psw01/CVE-2019-15107_webminRCE
|
||||||
- https://github.com/puckiestyle/CVE-2019-15107
|
- https://github.com/puckiestyle/CVE-2019-15107
|
||||||
- https://github.com/q99266/saury-vulnhub
|
- https://github.com/q99266/saury-vulnhub
|
||||||
|
@ -42,6 +42,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lnick2023/nicenice
|
- https://github.com/lnick2023/nicenice
|
||||||
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
|
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/tom0li/collection-document
|
- https://github.com/tom0li/collection-document
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
|
@ -34,6 +34,7 @@ No PoCs from references.
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -34,6 +34,7 @@ No PoCs from references.
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -62,6 +62,7 @@ Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6
|
|||||||
- https://github.com/merlinepedra25/nuclei-templates
|
- https://github.com/merlinepedra25/nuclei-templates
|
||||||
- https://github.com/n3ov4n1sh/CVE-2019-16278
|
- https://github.com/n3ov4n1sh/CVE-2019-16278
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/richardsonjf/King-of-the-hill
|
- https://github.com/richardsonjf/King-of-the-hill
|
||||||
- https://github.com/sobinge/nuclei-templates
|
- https://github.com/sobinge/nuclei-templates
|
||||||
|
@ -34,6 +34,7 @@ No PoCs from references.
|
|||||||
- https://github.com/jas502n/CVE-2019-16278
|
- https://github.com/jas502n/CVE-2019-16278
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -27,6 +27,7 @@ No PoCs from references.
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -46,6 +46,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
|
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
|
||||||
- https://github.com/openx-org/BLEN
|
- https://github.com/openx-org/BLEN
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/tdtc7/qps
|
- https://github.com/tdtc7/qps
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -27,6 +27,7 @@ No PoCs from references.
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
17
2019/CVE-2019-16638.md
Normal file
17
2019/CVE-2019-16638.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2019-16638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16638)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
An issue was found on the Ruijie EG-2000 series gateway. An attacker can easily dump cleartext stored passwords in /data/config.text with simple XORs. This affects EG-2000SE EG_RGOS 11.1(1)B1.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://0x.mk/?p=239
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2019/CVE-2019-16639.md
Normal file
17
2019/CVE-2019-16639.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2019-16639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16639)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
An issue was found on the Ruijie EG-2000 series gateway. There is a newcli.php API interface without access control, which can allow an attacker (who only has web interface access) to use TELNET commands and/or show admin passwords via the mode_url=exec&command= substring. This affects EG-2000SE EG_RGOS 11.9 B11P1.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://0x.mk/?p=239
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2019/CVE-2019-16640.md
Normal file
17
2019/CVE-2019-16640.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2019-16640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16640)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
An issue was found in upload.php on the Ruijie EG-2000 series gateway. A parameter passed to the class UploadFile is mishandled (%00 and /var/./html are not checked), which can allow an attacker to upload any file to the gateway. This affects EG-2000SE EG_RGOS 11.9 B11P1.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://0x.mk/?p=239
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2019/CVE-2019-16641.md
Normal file
17
2019/CVE-2019-16641.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2019-16641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16641)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
An issue was found on the Ruijie EG-2000 series gateway. There is a buffer overflow in client.so. Consequently, an attacker can use login.php to login to any account, without providing its password. This affects EG-2000SE EG_RGOS 11.1(1)B1.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://0x.mk/?p=239
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -72,6 +72,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
|
|||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/p0megranate/makura
|
- https://github.com/p0megranate/makura
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/polar1s7/CVE-2019-16759-bypass
|
- https://github.com/polar1s7/CVE-2019-16759-bypass
|
||||||
- https://github.com/psychoxploit/vbull
|
- https://github.com/psychoxploit/vbull
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
|
@ -43,6 +43,7 @@ Unauthenticated remote code execution occurs in D-Link products such as DIR-655C
|
|||||||
- https://github.com/merlinepedra/nuclei-templates
|
- https://github.com/merlinepedra/nuclei-templates
|
||||||
- https://github.com/merlinepedra25/nuclei-templates
|
- https://github.com/merlinepedra25/nuclei-templates
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pwnhacker0x18/CVE-2019-16920-MassPwn3r
|
- https://github.com/pwnhacker0x18/CVE-2019-16920-MassPwn3r
|
||||||
- https://github.com/sobinge/nuclei-templates
|
- https://github.com/sobinge/nuclei-templates
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
|
@ -32,6 +32,7 @@ A stack-based buffer overflow in the processPrivilage() function in IOS/process-
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/mavlevin/CVE-2019-17424
|
- https://github.com/mavlevin/CVE-2019-17424
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/sereok3/buffer-overflow-writeups
|
- https://github.com/sereok3/buffer-overflow-writeups
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -32,6 +32,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -57,6 +57,7 @@ No PoCs from references.
|
|||||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||||
- https://github.com/pen4uin/vulnerability-research
|
- https://github.com/pen4uin/vulnerability-research
|
||||||
- https://github.com/pen4uin/vulnerability-research-list
|
- https://github.com/pen4uin/vulnerability-research-list
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/r00t4dm/CVE-2019-17564
|
- https://github.com/r00t4dm/CVE-2019-17564
|
||||||
- https://github.com/t0m4too/t0m4to
|
- https://github.com/t0m4too/t0m4to
|
||||||
|
@ -40,6 +40,7 @@ The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06
|
|||||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||||
- https://github.com/pen4uin/vulnerability-research
|
- https://github.com/pen4uin/vulnerability-research
|
||||||
- https://github.com/pen4uin/vulnerability-research-list
|
- https://github.com/pen4uin/vulnerability-research-list
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/s1kr10s/D-Link-DIR-859-RCE
|
- https://github.com/s1kr10s/D-Link-DIR-859-RCE
|
||||||
- https://github.com/secenv/GoInputProxy
|
- https://github.com/secenv/GoInputProxy
|
||||||
- https://github.com/tanjiti/sec_profile
|
- https://github.com/tanjiti/sec_profile
|
||||||
|
@ -38,6 +38,7 @@ ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise
|
|||||||
- https://github.com/kxisxr/Bash-Script-CVE-2019-17662
|
- https://github.com/kxisxr/Bash-Script-CVE-2019-17662
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/rajendrakumaryadav/CVE-2019-17662-Exploit
|
- https://github.com/rajendrakumaryadav/CVE-2019-17662-Exploit
|
||||||
- https://github.com/rnbochsr/atlas
|
- https://github.com/rnbochsr/atlas
|
||||||
- https://github.com/thomas-osgood/CVE-2019-17662
|
- https://github.com/thomas-osgood/CVE-2019-17662
|
||||||
|
@ -41,6 +41,7 @@ An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/tomsiwik/xiaomi-router-patch
|
- https://github.com/tomsiwik/xiaomi-router-patch
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -43,6 +43,7 @@ An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -31,6 +31,7 @@ class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4,
|
|||||||
- https://github.com/jra89/CVE-2019-19634
|
- https://github.com/jra89/CVE-2019-19634
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -168,6 +168,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
|
|||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
- https://github.com/pathakabhi24/Pentest-Tools
|
- https://github.com/pathakabhi24/Pentest-Tools
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pjgmonteiro/Pentest-tools
|
- https://github.com/pjgmonteiro/Pentest-tools
|
||||||
- https://github.com/projectzeroindia/CVE-2019-19781
|
- https://github.com/projectzeroindia/CVE-2019-19781
|
||||||
- https://github.com/ptresearch/Pentest-Detections
|
- https://github.com/ptresearch/Pentest-Detections
|
||||||
|
@ -38,6 +38,7 @@ Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account tak
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/maocatooo/Django2_dailyfresh
|
- https://github.com/maocatooo/Django2_dailyfresh
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/ryu22e/django_cve_2019_19844_poc
|
- https://github.com/ryu22e/django_cve_2019_19844_poc
|
||||||
- https://github.com/siddharthraopotukuchi/trivy
|
- https://github.com/siddharthraopotukuchi/trivy
|
||||||
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
|
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
|
||||||
|
@ -10,6 +10,7 @@ An Untrusted Search Path vulnerability in Malwarebytes AdwCleaner before 8.0.1 c
|
|||||||
### POC
|
### POC
|
||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
|
- https://borncity.com/win/2019/12/19/adwcleaner-8-0-1-closes-a-dll-hijacking-vulnerability/
|
||||||
- https://www.bleepingcomputer.com/news/software/adwcleaner-801-fixes-dll-hijacking-vulnerability/
|
- https://www.bleepingcomputer.com/news/software/adwcleaner-801-fixes-dll-hijacking-vulnerability/
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
@ -27,6 +27,7 @@ D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/secenv/GoInputProxy
|
- https://github.com/secenv/GoInputProxy
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -44,6 +44,7 @@ In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds
|
|||||||
- https://github.com/marcinguy/CVE-2019-2107
|
- https://github.com/marcinguy/CVE-2019-2107
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/weeka10/-hktalent-TOP
|
- https://github.com/weeka10/-hktalent-TOP
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -169,6 +169,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
- https://github.com/pathakabhi24/Pentest-Tools
|
- https://github.com/pathakabhi24/Pentest-Tools
|
||||||
- https://github.com/paulveillard/cybersecurity-web-security
|
- https://github.com/paulveillard/cybersecurity-web-security
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pimps/CVE-2019-2725
|
- https://github.com/pimps/CVE-2019-2725
|
||||||
- https://github.com/pjgmonteiro/Pentest-tools
|
- https://github.com/pjgmonteiro/Pentest-tools
|
||||||
- https://github.com/pwnagelabs/VEF
|
- https://github.com/pwnagelabs/VEF
|
||||||
|
@ -29,6 +29,7 @@ ThinkCMF 5.0.190111 allows remote attackers to execute arbitrary PHP code via th
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -82,6 +82,7 @@ Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw
|
|||||||
- https://github.com/mpgn/CVE-2019-7609
|
- https://github.com/mpgn/CVE-2019-7609
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/paulveillard/cybersecurity-web-security
|
- https://github.com/paulveillard/cybersecurity-web-security
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/qazbnm456/awesome-web-security
|
- https://github.com/qazbnm456/awesome-web-security
|
||||||
- https://github.com/rhbb/CVE-2019-7609
|
- https://github.com/rhbb/CVE-2019-7609
|
||||||
|
@ -29,6 +29,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
|
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/tdtc7/qps
|
- https://github.com/tdtc7/qps
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -127,6 +127,7 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
|
|||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC
|
- https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pravinsrc/NOTES-windows-kernel-links
|
- https://github.com/pravinsrc/NOTES-windows-kernel-links
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/robmichel2854/robs-links
|
- https://github.com/robmichel2854/robs-links
|
||||||
|
@ -49,6 +49,7 @@ No PoCs from references.
|
|||||||
- https://github.com/ly4k/BlueGate
|
- https://github.com/ly4k/BlueGate
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
|
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
|
||||||
- https://github.com/ruppde/scan_CVE-2020-29583
|
- https://github.com/ruppde/scan_CVE-2020-29583
|
||||||
|
@ -46,6 +46,7 @@ No PoCs from references.
|
|||||||
- https://github.com/ly4k/BlueGate
|
- https://github.com/ly4k/BlueGate
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
|
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
|
@ -69,6 +69,7 @@ A remote code execution vulnerability exists in Microsoft SQL Server Reporting S
|
|||||||
- https://github.com/nitishbadole/PENTESTING-BIBLE
|
- https://github.com/nitishbadole/PENTESTING-BIBLE
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/phant0n/PENTESTING-BIBLE
|
- https://github.com/phant0n/PENTESTING-BIBLE
|
||||||
- https://github.com/puckiestyle/ysoserial.net
|
- https://github.com/puckiestyle/ysoserial.net
|
||||||
- https://github.com/pwntester/ysoserial.net
|
- https://github.com/pwntester/ysoserial.net
|
||||||
|
@ -65,6 +65,7 @@ An elevation of privilege vulnerability exists in the way that the Windows Kerne
|
|||||||
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
|
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
|
||||||
- https://github.com/nu11secur1ty/Windows10Exploits
|
- https://github.com/nu11secur1ty/Windows10Exploits
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/tussjump/cve_2020_0668
|
- https://github.com/tussjump/cve_2020_0668
|
||||||
|
@ -63,6 +63,7 @@ A remote code execution vulnerability exists in the way that the scripting engin
|
|||||||
- https://github.com/maxpl0it/CVE-2020-0674-Exploit
|
- https://github.com/maxpl0it/CVE-2020-0674-Exploit
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/sbroekhoven/CVE-2020-0674
|
- https://github.com/sbroekhoven/CVE-2020-0674
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/suspiciousbytes/CVE-2020-0674
|
- https://github.com/suspiciousbytes/CVE-2020-0674
|
||||||
|
@ -67,6 +67,7 @@ An elevation of privilege vulnerability exists in the Windows Installer when MSI
|
|||||||
- https://github.com/nu11secur1ty/Windows10Exploits
|
- https://github.com/nu11secur1ty/Windows10Exploits
|
||||||
- https://github.com/padovah4ck/CVE-2020-0683
|
- https://github.com/padovah4ck/CVE-2020-0683
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/rainmana/awesome-rainmana
|
- https://github.com/rainmana/awesome-rainmana
|
||||||
- https://github.com/shubham0d/SymBlock
|
- https://github.com/shubham0d/SymBlock
|
||||||
|
@ -138,6 +138,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
|
|||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
- https://github.com/pathakabhi24/Pentest-Tools
|
- https://github.com/pathakabhi24/Pentest-Tools
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/phackt/Invoke-Recon
|
- https://github.com/phackt/Invoke-Recon
|
||||||
- https://github.com/pjgmonteiro/Pentest-tools
|
- https://github.com/pjgmonteiro/Pentest-tools
|
||||||
- https://github.com/puckiestyle/Active-Directory-Exploitation-Cheat-Sheet
|
- https://github.com/puckiestyle/Active-Directory-Exploitation-Cheat-Sheet
|
||||||
|
@ -41,6 +41,7 @@ An information vulnerability exists when Windows Modules Installer Service impro
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -52,6 +52,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -87,6 +87,7 @@ An elevation of privilege vulnerability exists when the Windows Background Intel
|
|||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/paramint/windows-kernel-exploits
|
- https://github.com/paramint/windows-kernel-exploits
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pwninx/WinPwn
|
- https://github.com/pwninx/WinPwn
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
|
@ -294,6 +294,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/pathakabhi24/Awesome-C
|
- https://github.com/pathakabhi24/Awesome-C
|
||||||
- https://github.com/pengusec/awesome-netsec-articles
|
- https://github.com/pengusec/awesome-netsec-articles
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
|
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
|
||||||
- https://github.com/polarityio/youtube
|
- https://github.com/polarityio/youtube
|
||||||
- https://github.com/psc4re/NSE-scripts
|
- https://github.com/psc4re/NSE-scripts
|
||||||
|
@ -55,6 +55,7 @@ Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution b
|
|||||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/retr0-13/Goby
|
- https://github.com/retr0-13/Goby
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/tdtc7/qps
|
- https://github.com/tdtc7/qps
|
||||||
|
@ -73,6 +73,7 @@ Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
|
|||||||
- https://github.com/netveil/Awesome-List
|
- https://github.com/netveil/Awesome-List
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
||||||
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
|
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
|
||||||
- https://github.com/safe6Sec/CodeqlNote
|
- https://github.com/safe6Sec/CodeqlNote
|
||||||
|
@ -64,6 +64,7 @@ Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
|
|||||||
- https://github.com/netveil/Awesome-List
|
- https://github.com/netveil/Awesome-List
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
||||||
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
|
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
|
@ -32,6 +32,7 @@ No PoCs from references.
|
|||||||
- https://github.com/nisodaisuki/VulnerabilityScanningSecurityTool
|
- https://github.com/nisodaisuki/VulnerabilityScanningSecurityTool
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -31,6 +31,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -65,6 +65,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se
|
|||||||
- https://github.com/neofito/CVE-2020-1337
|
- https://github.com/neofito/CVE-2020-1337
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/shubham0d/CVE-2020-1048
|
- https://github.com/shubham0d/CVE-2020-1048
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/thalpius/Microsoft-PrintDemon-Vulnerability
|
- https://github.com/thalpius/Microsoft-PrintDemon-Vulnerability
|
||||||
|
@ -62,6 +62,7 @@ An elevation of privilege vulnerability exists in Windows when the Windows kerne
|
|||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xonoxitron/INE-eJPT-Certification-Exam-Notes-Cheat-Sheet
|
- https://github.com/xonoxitron/INE-eJPT-Certification-Exam-Notes-Cheat-Sheet
|
||||||
|
@ -42,6 +42,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/taielab/awesome-hacking-lists
|
- https://github.com/taielab/awesome-hacking-lists
|
||||||
|
@ -42,6 +42,7 @@ FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction betwee
|
|||||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
- https://github.com/seal-community/patches
|
- https://github.com/seal-community/patches
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
|
@ -53,6 +53,7 @@ A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2
|
|||||||
- https://github.com/omnibor/bomsh
|
- https://github.com/omnibor/bomsh
|
||||||
- https://github.com/ozun215/shim-review
|
- https://github.com/ozun215/shim-review
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/puzzleos/uefi-shim_review
|
- https://github.com/puzzleos/uefi-shim_review
|
||||||
- https://github.com/rhboot/shim-review
|
- https://github.com/rhboot/shim-review
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
|
@ -36,6 +36,7 @@ No PoCs from references.
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/shubham0d/SymBlock
|
- https://github.com/shubham0d/SymBlock
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -87,6 +87,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
|
|||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/orgTestCodacy11KRepos110MB/repo-1492-Dork-Admin
|
- https://github.com/orgTestCodacy11KRepos110MB/repo-1492-Dork-Admin
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/puckiestyle/cve-2020-11651
|
- https://github.com/puckiestyle/cve-2020-11651
|
||||||
- https://github.com/rapyuta-robotics/clean-script
|
- https://github.com/rapyuta-robotics/clean-script
|
||||||
- https://github.com/retr0-13/Goby
|
- https://github.com/retr0-13/Goby
|
||||||
|
@ -69,6 +69,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
|
|||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/orgTestCodacy11KRepos110MB/repo-1492-Dork-Admin
|
- https://github.com/orgTestCodacy11KRepos110MB/repo-1492-Dork-Admin
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/rapyuta-robotics/clean-script
|
- https://github.com/rapyuta-robotics/clean-script
|
||||||
- https://github.com/rossengeorgiev/salt-security-backports
|
- https://github.com/rossengeorgiev/salt-security-backports
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
|
@ -33,6 +33,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -45,6 +45,7 @@ The Open Connectivity Foundation UPnP specification before 2020-04-17 does not f
|
|||||||
- https://github.com/mvlnetdev/zeek_detection_script_collection
|
- https://github.com/mvlnetdev/zeek_detection_script_collection
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
|
@ -32,6 +32,7 @@ An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, a
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/shinyquagsire23/CVE-2020-12753-PoC
|
- https://github.com/shinyquagsire23/CVE-2020-12753-PoC
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
|
@ -40,6 +40,7 @@ A remote code execution vulnerability exists when Microsoft Windows OLE fails to
|
|||||||
- https://github.com/huike007/poc
|
- https://github.com/huike007/poc
|
||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||||
- https://github.com/yedada-wei/-
|
- https://github.com/yedada-wei/-
|
||||||
|
@ -46,6 +46,7 @@ An elevation of privilege vulnerability exists when the Windows Update Orchestra
|
|||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/taielab/awesome-hacking-lists
|
- https://github.com/taielab/awesome-hacking-lists
|
||||||
|
@ -83,6 +83,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se
|
|||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/cve-2020-1337-poc
|
- https://github.com/password520/cve-2020-1337-poc
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/sailay1996/cve-2020-1337-poc
|
- https://github.com/sailay1996/cve-2020-1337-poc
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
|
@ -77,6 +77,7 @@ A remote code execution vulnerability exists in Windows Domain Name System serve
|
|||||||
- https://github.com/mr-r3b00t/CVE-2020-1350
|
- https://github.com/mr-r3b00t/CVE-2020-1350
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pg001001/deception-tech
|
- https://github.com/pg001001/deception-tech
|
||||||
- https://github.com/psc4re/NSE-scripts
|
- https://github.com/psc4re/NSE-scripts
|
||||||
- https://github.com/rudraimmunefi/source-code-review
|
- https://github.com/rudraimmunefi/source-code-review
|
||||||
|
@ -55,6 +55,7 @@ No PoCs from references.
|
|||||||
- https://github.com/morpheuslord/GPT_Vuln-analyzer
|
- https://github.com/morpheuslord/GPT_Vuln-analyzer
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/taielab/awesome-hacking-lists
|
- https://github.com/taielab/awesome-hacking-lists
|
||||||
|
@ -43,6 +43,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/potats0/cve_2020_14644
|
- https://github.com/potats0/cve_2020_14644
|
||||||
- https://github.com/r0eXpeR/redteam_vul
|
- https://github.com/r0eXpeR/redteam_vul
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
|
@ -49,6 +49,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/r00t4dm/r00t4dm
|
- https://github.com/r00t4dm/r00t4dm
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
|
@ -49,6 +49,7 @@ No PoCs from references.
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/phx/cvescan
|
- https://github.com/phx/cvescan
|
||||||
- https://github.com/readloud/Awesome-Stars
|
- https://github.com/readloud/Awesome-Stars
|
||||||
- https://github.com/retr0-13/cveScannerV2
|
- https://github.com/retr0-13/cveScannerV2
|
||||||
|
@ -167,6 +167,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
|||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
- https://github.com/pathakabhi24/Pentest-Tools
|
- https://github.com/pathakabhi24/Pentest-Tools
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
||||||
- https://github.com/pjgmonteiro/Pentest-tools
|
- https://github.com/pjgmonteiro/Pentest-tools
|
||||||
- https://github.com/q99266/saury-vulnhub
|
- https://github.com/q99266/saury-vulnhub
|
||||||
|
@ -46,6 +46,7 @@ No PoCs from references.
|
|||||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947
|
- https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/threedr3am/learnjavabug
|
- https://github.com/threedr3am/learnjavabug
|
||||||
|
@ -52,6 +52,7 @@ No PoCs from references.
|
|||||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||||
- https://github.com/pen4uin/vulnerability-research
|
- https://github.com/pen4uin/vulnerability-research
|
||||||
- https://github.com/pen4uin/vulnerability-research-list
|
- https://github.com/pen4uin/vulnerability-research-list
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/tanjiti/sec_profile
|
- https://github.com/tanjiti/sec_profile
|
||||||
- https://github.com/txrw/Dubbo-CVE-2020-1948
|
- https://github.com/txrw/Dubbo-CVE-2020-1948
|
||||||
|
@ -44,6 +44,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||||||
- https://github.com/lions2012/Penetration_Testing_POC
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/soosmile/POC
|
- https://github.com/soosmile/POC
|
||||||
- https://github.com/weeka10/-hktalent-TOP
|
- https://github.com/weeka10/-hktalent-TOP
|
||||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||||
|
@ -139,6 +139,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||||||
- https://github.com/onewinner/VulToolsKit
|
- https://github.com/onewinner/VulToolsKit
|
||||||
- https://github.com/password520/Penetration_PoC
|
- https://github.com/password520/Penetration_PoC
|
||||||
- https://github.com/pathakabhi24/Pentest-Tools
|
- https://github.com/pathakabhi24/Pentest-Tools
|
||||||
|
- https://github.com/pentration/gongkaishouji
|
||||||
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
||||||
- https://github.com/pjgmonteiro/Pentest-tools
|
- https://github.com/pjgmonteiro/Pentest-tools
|
||||||
- https://github.com/qazbnm456/awesome-cve-poc
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user