mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
Update CVE sources 2024-08-12 19:01
This commit is contained in:
parent
a417c53201
commit
66773275a6
@ -10,6 +10,7 @@ Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf
|
||||
- https://hackerone.com/reports/145463
|
||||
|
||||
#### Github
|
||||
|
@ -109,6 +109,7 @@ In Jboss Application Server as shipped with Red Hat Enterprise Application Platf
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/r0eXpeR/redteam_vul
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
|
@ -87,6 +87,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
|
||||
- https://github.com/onewinner/VulToolsKit
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/q99266/saury-vulnhub
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/qiantu88/Tomcat-Exploit
|
||||
|
@ -91,6 +91,7 @@ Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in In
|
||||
- https://github.com/opensec-cn/kunpeng
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/qnsoft/kunpeng
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
|
@ -71,6 +71,7 @@ A code execution vulnerability exists in the Stapler web framework used by Jenki
|
||||
- https://github.com/onewinner/VulToolsKit
|
||||
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/reph0r/poc-exp
|
||||
- https://github.com/reph0r/poc-exp-tools
|
||||
- https://github.com/retr0-13/Goby
|
||||
|
@ -115,6 +115,7 @@ In WinRAR versions prior to and including 5.61, There is path traversal vulnerab
|
||||
- https://github.com/nobiusmallyu/kehai
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pranav0408/WinAFL
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/ray-cp/Vuln_Analysis
|
||||
|
17
2018/CVE-2018-21179.md
Normal file
17
2018/CVE-2018-21179.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2018-21179](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21179)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, D7800 before 1.0.1.30, R7500 before 1.0.0.122, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://kb.netgear.com/000055179/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2620
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -114,6 +114,7 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
|
||||
- https://github.com/oleksandrbi/CodePathweek7
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/paulveillard/cybersecurity-tools
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/piyushimself/Bugbounty_Writeups
|
||||
- https://github.com/plancoo/Bugbounty_Writeups
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
|
@ -112,6 +112,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
||||
- https://github.com/paramint/windows-kernel-exploits
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/windows-kernel-exploits
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pwninx/WinPwn
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/qiantu88/CVE-2018-8120
|
||||
|
@ -329,6 +329,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pengusec/awesome-netsec-articles
|
||||
- https://github.com/pentest-a2p2v/pentest-a2p2v-core
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pg001001/deception-tech
|
||||
- https://github.com/phant0n/PENTESTING-BIBLE
|
||||
- https://github.com/pikpikcu/Pentest-Tools-Framework
|
||||
|
@ -61,6 +61,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
||||
- https://github.com/paramint/windows-kernel-exploits
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pravinsrc/NOTES-windows-kernel-links
|
||||
- https://github.com/root26/bug
|
||||
- https://github.com/safesword/WindowsExp
|
||||
|
@ -38,6 +38,7 @@ An elevation of privilege vulnerability exists in the way Windows Error Reportin
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
@ -30,6 +30,7 @@ A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and
|
||||
- https://github.com/onewinner/VulToolsKit
|
||||
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -38,6 +38,7 @@ A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and
|
||||
- https://github.com/onewinner/VulToolsKit
|
||||
- https://github.com/orangetw/awesome-jenkins-rce-2019
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/retr0-13/pwn_jenkins
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -36,6 +36,7 @@ It was found that xstream API version 1.4.10 before 1.4.11 introduced a regressi
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/lokerxx/JavaVul
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -53,6 +53,7 @@ mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints
|
||||
- https://github.com/masahiro331/CVE-2019-10758
|
||||
- https://github.com/ossf-cve-benchmark/CVE-2019-10758
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/retr0-13/Goby
|
||||
- https://github.com/tdtc7/qps
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
|
@ -108,6 +108,7 @@ In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in
|
||||
- https://github.com/motikan2010/blog.motikan2010.com
|
||||
- https://github.com/neex/phuip-fpizdam
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/rmtec/modeswitcher
|
||||
- https://github.com/shadow-horse/cve-2019-11043
|
||||
|
@ -89,6 +89,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7
|
||||
- https://github.com/nvchungkma/Pulse-VPN-Vulnerability-Analysis
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/popyue/Pulse_exploit
|
||||
- https://github.com/priamai/sigmatau
|
||||
- https://github.com/projectzeroindia/CVE-2019-11510
|
||||
|
@ -57,6 +57,7 @@ Insufficient vetting of parameters passed with the Prompt:Open IPC message betwe
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/m1ghtym0/browser-pwn
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/weeka10/-hktalent-TOP
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -46,6 +46,7 @@ The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/woods-sega/woodswiki
|
||||
|
@ -59,6 +59,7 @@ An elevation of privilege vulnerability exists when the Windows AppX Deployment
|
||||
- https://github.com/padovah4ck/CVE-2019-1253
|
||||
- https://github.com/paramint/Watson-Windows-check-KB
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pwninx/Watson
|
||||
- https://github.com/rasta-mouse/Watson
|
||||
- https://github.com/rnbochsr/Relevant
|
||||
|
@ -30,6 +30,7 @@ No PoCs from references.
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pr0tean/CVE-2019-13051
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -58,6 +58,7 @@ An elevation of privilege vulnerability exists when Windows improperly handles a
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pengusec/awesome-netsec-articles
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/rnbochsr/Relevant
|
||||
- https://github.com/weeka10/-hktalent-TOP
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
|
@ -116,6 +116,7 @@ In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pathakabhi24/Pentest-Tools
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pjgmonteiro/Pentest-tools
|
||||
- https://github.com/polosec/CVE-2019-13272
|
||||
- https://github.com/pwnCmndr/LinuxPrivEsc
|
||||
|
@ -86,6 +86,7 @@ No PoCs from references.
|
||||
- https://github.com/nobodyatall648/CVE-2019-1388
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/rahul-masal/Windows-Privilege-Escalation
|
||||
|
@ -66,6 +66,7 @@ An elevation of privilege vulnerability exists when the Windows Universal Plug a
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pengusec/awesome-netsec-articles
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/rnbochsr/Relevant
|
||||
- https://github.com/shubham0d/SymBlock
|
||||
- https://github.com/weeka10/-hktalent-TOP
|
||||
|
@ -66,6 +66,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/paramint/windows-kernel-exploits
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/piotrflorczyk/cve-2019-1458_POC
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/rip1s/CVE-2019-1458
|
||||
|
@ -117,6 +117,7 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_change.
|
||||
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/psw01/CVE-2019-15107_webminRCE
|
||||
- https://github.com/puckiestyle/CVE-2019-15107
|
||||
- https://github.com/q99266/saury-vulnhub
|
||||
|
@ -42,6 +42,7 @@ No PoCs from references.
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/tom0li/collection-document
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
|
@ -34,6 +34,7 @@ No PoCs from references.
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -34,6 +34,7 @@ No PoCs from references.
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -62,6 +62,7 @@ Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6
|
||||
- https://github.com/merlinepedra25/nuclei-templates
|
||||
- https://github.com/n3ov4n1sh/CVE-2019-16278
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/richardsonjf/King-of-the-hill
|
||||
- https://github.com/sobinge/nuclei-templates
|
||||
|
@ -34,6 +34,7 @@ No PoCs from references.
|
||||
- https://github.com/jas502n/CVE-2019-16278
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -27,6 +27,7 @@ No PoCs from references.
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -46,6 +46,7 @@ No PoCs from references.
|
||||
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/tdtc7/qps
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -27,6 +27,7 @@ No PoCs from references.
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
17
2019/CVE-2019-16638.md
Normal file
17
2019/CVE-2019-16638.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2019-16638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16638)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue was found on the Ruijie EG-2000 series gateway. An attacker can easily dump cleartext stored passwords in /data/config.text with simple XORs. This affects EG-2000SE EG_RGOS 11.1(1)B1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://0x.mk/?p=239
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2019/CVE-2019-16639.md
Normal file
17
2019/CVE-2019-16639.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2019-16639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16639)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue was found on the Ruijie EG-2000 series gateway. There is a newcli.php API interface without access control, which can allow an attacker (who only has web interface access) to use TELNET commands and/or show admin passwords via the mode_url=exec&command= substring. This affects EG-2000SE EG_RGOS 11.9 B11P1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://0x.mk/?p=239
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2019/CVE-2019-16640.md
Normal file
17
2019/CVE-2019-16640.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2019-16640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16640)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue was found in upload.php on the Ruijie EG-2000 series gateway. A parameter passed to the class UploadFile is mishandled (%00 and /var/./html are not checked), which can allow an attacker to upload any file to the gateway. This affects EG-2000SE EG_RGOS 11.9 B11P1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://0x.mk/?p=239
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2019/CVE-2019-16641.md
Normal file
17
2019/CVE-2019-16641.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2019-16641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16641)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue was found on the Ruijie EG-2000 series gateway. There is a buffer overflow in client.so. Consequently, an attacker can use login.php to login to any account, without providing its password. This affects EG-2000SE EG_RGOS 11.1(1)B1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://0x.mk/?p=239
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -72,6 +72,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/p0megranate/makura
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/polar1s7/CVE-2019-16759-bypass
|
||||
- https://github.com/psychoxploit/vbull
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
|
@ -43,6 +43,7 @@ Unauthenticated remote code execution occurs in D-Link products such as DIR-655C
|
||||
- https://github.com/merlinepedra/nuclei-templates
|
||||
- https://github.com/merlinepedra25/nuclei-templates
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pwnhacker0x18/CVE-2019-16920-MassPwn3r
|
||||
- https://github.com/sobinge/nuclei-templates
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
|
@ -32,6 +32,7 @@ A stack-based buffer overflow in the processPrivilage() function in IOS/process-
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/mavlevin/CVE-2019-17424
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/sereok3/buffer-overflow-writeups
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -32,6 +32,7 @@ No PoCs from references.
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -57,6 +57,7 @@ No PoCs from references.
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/r00t4dm/CVE-2019-17564
|
||||
- https://github.com/t0m4too/t0m4to
|
||||
|
@ -40,6 +40,7 @@ The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/s1kr10s/D-Link-DIR-859-RCE
|
||||
- https://github.com/secenv/GoInputProxy
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
|
@ -38,6 +38,7 @@ ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise
|
||||
- https://github.com/kxisxr/Bash-Script-CVE-2019-17662
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/rajendrakumaryadav/CVE-2019-17662-Exploit
|
||||
- https://github.com/rnbochsr/atlas
|
||||
- https://github.com/thomas-osgood/CVE-2019-17662
|
||||
|
@ -41,6 +41,7 @@ An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/tomsiwik/xiaomi-router-patch
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -43,6 +43,7 @@ An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -31,6 +31,7 @@ class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4,
|
||||
- https://github.com/jra89/CVE-2019-19634
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -168,6 +168,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pathakabhi24/Pentest-Tools
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pjgmonteiro/Pentest-tools
|
||||
- https://github.com/projectzeroindia/CVE-2019-19781
|
||||
- https://github.com/ptresearch/Pentest-Detections
|
||||
|
@ -38,6 +38,7 @@ Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account tak
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/maocatooo/Django2_dailyfresh
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/ryu22e/django_cve_2019_19844_poc
|
||||
- https://github.com/siddharthraopotukuchi/trivy
|
||||
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
|
||||
|
@ -10,6 +10,7 @@ An Untrusted Search Path vulnerability in Malwarebytes AdwCleaner before 8.0.1 c
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://borncity.com/win/2019/12/19/adwcleaner-8-0-1-closes-a-dll-hijacking-vulnerability/
|
||||
- https://www.bleepingcomputer.com/news/software/adwcleaner-801-fixes-dll-hijacking-vulnerability/
|
||||
|
||||
#### Github
|
||||
|
@ -27,6 +27,7 @@ D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/secenv/GoInputProxy
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -44,6 +44,7 @@ In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds
|
||||
- https://github.com/marcinguy/CVE-2019-2107
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/weeka10/-hktalent-TOP
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -169,6 +169,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pathakabhi24/Pentest-Tools
|
||||
- https://github.com/paulveillard/cybersecurity-web-security
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pimps/CVE-2019-2725
|
||||
- https://github.com/pjgmonteiro/Pentest-tools
|
||||
- https://github.com/pwnagelabs/VEF
|
||||
|
@ -29,6 +29,7 @@ ThinkCMF 5.0.190111 allows remote attackers to execute arbitrary PHP code via th
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -82,6 +82,7 @@ Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw
|
||||
- https://github.com/mpgn/CVE-2019-7609
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/paulveillard/cybersecurity-web-security
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/qazbnm456/awesome-web-security
|
||||
- https://github.com/rhbb/CVE-2019-7609
|
||||
|
@ -29,6 +29,7 @@ No PoCs from references.
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/tdtc7/qps
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -127,6 +127,7 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pravinsrc/NOTES-windows-kernel-links
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/robmichel2854/robs-links
|
||||
|
@ -49,6 +49,7 @@ No PoCs from references.
|
||||
- https://github.com/ly4k/BlueGate
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
|
||||
- https://github.com/ruppde/scan_CVE-2020-29583
|
||||
|
@ -46,6 +46,7 @@ No PoCs from references.
|
||||
- https://github.com/ly4k/BlueGate
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
|
||||
- https://github.com/soosmile/POC
|
||||
|
@ -69,6 +69,7 @@ A remote code execution vulnerability exists in Microsoft SQL Server Reporting S
|
||||
- https://github.com/nitishbadole/PENTESTING-BIBLE
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/phant0n/PENTESTING-BIBLE
|
||||
- https://github.com/puckiestyle/ysoserial.net
|
||||
- https://github.com/pwntester/ysoserial.net
|
||||
|
@ -65,6 +65,7 @@ An elevation of privilege vulnerability exists in the way that the Windows Kerne
|
||||
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
|
||||
- https://github.com/nu11secur1ty/Windows10Exploits
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/tussjump/cve_2020_0668
|
||||
|
@ -63,6 +63,7 @@ A remote code execution vulnerability exists in the way that the scripting engin
|
||||
- https://github.com/maxpl0it/CVE-2020-0674-Exploit
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/sbroekhoven/CVE-2020-0674
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/suspiciousbytes/CVE-2020-0674
|
||||
|
@ -67,6 +67,7 @@ An elevation of privilege vulnerability exists in the Windows Installer when MSI
|
||||
- https://github.com/nu11secur1ty/Windows10Exploits
|
||||
- https://github.com/padovah4ck/CVE-2020-0683
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/rainmana/awesome-rainmana
|
||||
- https://github.com/shubham0d/SymBlock
|
||||
|
@ -138,6 +138,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pathakabhi24/Pentest-Tools
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/phackt/Invoke-Recon
|
||||
- https://github.com/pjgmonteiro/Pentest-tools
|
||||
- https://github.com/puckiestyle/Active-Directory-Exploitation-Cheat-Sheet
|
||||
|
@ -41,6 +41,7 @@ An information vulnerability exists when Windows Modules Installer Service impro
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -52,6 +52,7 @@ No PoCs from references.
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -87,6 +87,7 @@ An elevation of privilege vulnerability exists when the Windows Background Intel
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/paramint/windows-kernel-exploits
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pwninx/WinPwn
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
|
@ -294,6 +294,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pathakabhi24/Awesome-C
|
||||
- https://github.com/pengusec/awesome-netsec-articles
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
|
||||
- https://github.com/polarityio/youtube
|
||||
- https://github.com/psc4re/NSE-scripts
|
||||
|
@ -55,6 +55,7 @@ Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution b
|
||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/retr0-13/Goby
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/tdtc7/qps
|
||||
|
@ -73,6 +73,7 @@ Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
|
||||
- https://github.com/netveil/Awesome-List
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
||||
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
|
||||
- https://github.com/safe6Sec/CodeqlNote
|
||||
|
@ -64,6 +64,7 @@ Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
|
||||
- https://github.com/netveil/Awesome-List
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
||||
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
|
||||
- https://github.com/soosmile/POC
|
||||
|
@ -32,6 +32,7 @@ No PoCs from references.
|
||||
- https://github.com/nisodaisuki/VulnerabilityScanningSecurityTool
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -31,6 +31,7 @@ No PoCs from references.
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -65,6 +65,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se
|
||||
- https://github.com/neofito/CVE-2020-1337
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/shubham0d/CVE-2020-1048
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/thalpius/Microsoft-PrintDemon-Vulnerability
|
||||
|
@ -62,6 +62,7 @@ An elevation of privilege vulnerability exists in Windows when the Windows kerne
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xonoxitron/INE-eJPT-Certification-Exam-Notes-Cheat-Sheet
|
||||
|
@ -42,6 +42,7 @@ No PoCs from references.
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/taielab/awesome-hacking-lists
|
||||
|
@ -42,6 +42,7 @@ FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction betwee
|
||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/seal-community/patches
|
||||
- https://github.com/soosmile/POC
|
||||
|
@ -53,6 +53,7 @@ A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2
|
||||
- https://github.com/omnibor/bomsh
|
||||
- https://github.com/ozun215/shim-review
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/puzzleos/uefi-shim_review
|
||||
- https://github.com/rhboot/shim-review
|
||||
- https://github.com/soosmile/POC
|
||||
|
@ -36,6 +36,7 @@ No PoCs from references.
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/shubham0d/SymBlock
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -87,6 +87,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/orgTestCodacy11KRepos110MB/repo-1492-Dork-Admin
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/puckiestyle/cve-2020-11651
|
||||
- https://github.com/rapyuta-robotics/clean-script
|
||||
- https://github.com/retr0-13/Goby
|
||||
|
@ -69,6 +69,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/orgTestCodacy11KRepos110MB/repo-1492-Dork-Admin
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/rapyuta-robotics/clean-script
|
||||
- https://github.com/rossengeorgiev/salt-security-backports
|
||||
- https://github.com/soosmile/POC
|
||||
|
@ -33,6 +33,7 @@ No PoCs from references.
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -45,6 +45,7 @@ The Open Connectivity Foundation UPnP specification before 2020-04-17 does not f
|
||||
- https://github.com/mvlnetdev/zeek_detection_script_collection
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
|
@ -32,6 +32,7 @@ An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, a
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/shinyquagsire23/CVE-2020-12753-PoC
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
|
@ -40,6 +40,7 @@ A remote code execution vulnerability exists when Microsoft Windows OLE fails to
|
||||
- https://github.com/huike007/poc
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
|
@ -46,6 +46,7 @@ An elevation of privilege vulnerability exists when the Windows Update Orchestra
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/taielab/awesome-hacking-lists
|
||||
|
@ -83,6 +83,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/cve-2020-1337-poc
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/sailay1996/cve-2020-1337-poc
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
|
@ -77,6 +77,7 @@ A remote code execution vulnerability exists in Windows Domain Name System serve
|
||||
- https://github.com/mr-r3b00t/CVE-2020-1350
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pg001001/deception-tech
|
||||
- https://github.com/psc4re/NSE-scripts
|
||||
- https://github.com/rudraimmunefi/source-code-review
|
||||
|
@ -55,6 +55,7 @@ No PoCs from references.
|
||||
- https://github.com/morpheuslord/GPT_Vuln-analyzer
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/taielab/awesome-hacking-lists
|
||||
|
@ -43,6 +43,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/potats0/cve_2020_14644
|
||||
- https://github.com/r0eXpeR/redteam_vul
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
|
@ -49,6 +49,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/r00t4dm/r00t4dm
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
- https://github.com/soosmile/POC
|
||||
|
@ -49,6 +49,7 @@ No PoCs from references.
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/phx/cvescan
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
- https://github.com/retr0-13/cveScannerV2
|
||||
|
@ -167,6 +167,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pathakabhi24/Pentest-Tools
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
||||
- https://github.com/pjgmonteiro/Pentest-tools
|
||||
- https://github.com/q99266/saury-vulnhub
|
||||
|
@ -46,6 +46,7 @@ No PoCs from references.
|
||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/threedr3am/learnjavabug
|
||||
|
@ -52,6 +52,7 @@ No PoCs from references.
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/txrw/Dubbo-CVE-2020-1948
|
||||
|
@ -44,6 +44,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/weeka10/-hktalent-TOP
|
||||
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||||
|
@ -139,6 +139,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
||||
- https://github.com/onewinner/VulToolsKit
|
||||
- https://github.com/password520/Penetration_PoC
|
||||
- https://github.com/pathakabhi24/Pentest-Tools
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
||||
- https://github.com/pjgmonteiro/Pentest-tools
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user