Auto Update 2020/08/28 06:10:03

This commit is contained in:
motikan2010-bot 2020-08-28 06:10:03 +09:00
parent 0f0ccc8e46
commit 00ee9fd2df
70 changed files with 378 additions and 312 deletions

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2020-08-14T23:42:44Z",
"updated_at": "2020-08-27T17:35:25Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2243,
"watchers_count": 2243,
"stargazers_count": 2242,
"watchers_count": 2242,
"forks_count": 482,
"forks": 482,
"watchers": 2243,
"watchers": 2242,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-4321 exploit",
"fork": false,
"created_at": "2015-03-08T06:13:36Z",
"updated_at": "2018-11-14T10:48:42Z",
"updated_at": "2020-08-27T17:35:49Z",
"pushed_at": "2015-03-08T06:14:34Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 14,
"forks": 14,
"watchers": 20,
"watchers": 19,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1",
"fork": false,
"created_at": "2016-01-24T13:49:03Z",
"updated_at": "2020-05-21T05:00:27Z",
"updated_at": "2020-08-27T17:36:18Z",
"pushed_at": "2016-01-24T22:20:44Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 45,
"forks": 45,
"watchers": 73,
"watchers": 72,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright stsc MP4 Atom Integer Overflow Remote Code Execution",
"fork": false,
"created_at": "2015-09-10T23:00:59Z",
"updated_at": "2020-08-01T19:21:45Z",
"updated_at": "2020-08-27T17:36:07Z",
"pushed_at": "2015-09-10T23:01:09Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 118,
"forks": 118,
"watchers": 192,
"watchers": 191,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "PoC code for 32 bit Android OS",
"fork": false,
"created_at": "2015-09-12T01:31:36Z",
"updated_at": "2020-06-23T13:37:22Z",
"updated_at": "2020-08-27T17:36:07Z",
"pushed_at": "2015-12-15T05:42:02Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 96,
"forks": 96,
"watchers": 130,
"watchers": 129,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2016-02-18T14:39:04Z",
"updated_at": "2018-11-14T10:49:00Z",
"updated_at": "2020-08-27T17:36:21Z",
"pushed_at": "2016-02-18T14:40:19Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"watchers": 7,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
"fork": false,
"created_at": "2016-05-02T12:18:57Z",
"updated_at": "2020-08-05T00:36:18Z",
"updated_at": "2020-08-27T17:36:27Z",
"pushed_at": "2019-08-13T07:14:01Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 48,
"forks": 48,
"watchers": 93,
"watchers": 92,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-08-24T15:11:29Z",
"updated_at": "2020-08-27T17:36:32Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 283,
"watchers_count": 283,
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 88,
"forks": 88,
"watchers": 283,
"watchers": 282,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2015-7547",
"fork": false,
"created_at": "2016-02-10T21:13:54Z",
"updated_at": "2020-08-01T19:18:33Z",
"updated_at": "2020-08-27T17:36:20Z",
"pushed_at": "2016-02-20T07:57:58Z",
"stargazers_count": 547,
"watchers_count": 547,
"stargazers_count": 546,
"watchers_count": 546,
"forks_count": 179,
"forks": 179,
"watchers": 547,
"watchers": 546,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
"updated_at": "2020-06-19T06:49:20Z",
"updated_at": "2020-08-27T17:36:20Z",
"pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 327,
"watchers_count": 327,
"stargazers_count": 326,
"watchers_count": 326,
"forks_count": 152,
"forks": 152,
"watchers": 327,
"watchers": 326,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2016-01-22T03:52:11Z",
"updated_at": "2018-12-31T16:52:34Z",
"updated_at": "2020-08-27T17:36:18Z",
"pushed_at": "2018-12-31T16:52:32Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 13,
"forks": 13,
"watchers": 23,
"watchers": 22,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)",
"fork": false,
"created_at": "2016-05-03T16:47:32Z",
"updated_at": "2020-06-24T17:58:44Z",
"updated_at": "2020-08-27T17:36:27Z",
"pushed_at": "2019-03-10T02:18:00Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 171,
"watchers_count": 171,
"forks_count": 55,
"forks": 55,
"watchers": 172,
"watchers": 171,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-08-24T15:11:29Z",
"updated_at": "2020-08-27T17:36:32Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 283,
"watchers_count": 283,
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 88,
"forks": 88,
"watchers": 283,
"watchers": 282,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2016-07-05T10:46:34Z",
"updated_at": "2018-11-14T10:49:06Z",
"updated_at": "2020-08-27T17:36:33Z",
"pushed_at": "2016-07-05T10:46:57Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 18,
"forks": 18,
"watchers": 51,
"watchers": 50,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Public repository for improvements to the EXTRABACON exploit",
"fork": false,
"created_at": "2016-09-20T23:19:02Z",
"updated_at": "2020-08-22T15:56:56Z",
"updated_at": "2020-08-27T17:36:39Z",
"pushed_at": "2016-11-02T03:11:27Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 150,
"watchers_count": 150,
"forks_count": 75,
"forks": 75,
"watchers": 151,
"watchers": 150,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Pixel bootlaoder exploit for reading flash storage",
"fork": false,
"created_at": "2016-10-28T16:26:18Z",
"updated_at": "2019-10-22T02:02:48Z",
"updated_at": "2020-08-27T17:36:41Z",
"pushed_at": "2017-01-05T18:55:56Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 9,
"forks": 9,
"watchers": 26,
"watchers": 25,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2020-08-18T17:57:59Z",
"updated_at": "2020-08-27T17:36:59Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 107,
"forks": 107,
"watchers": 270,
"watchers": 269,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2020-08-26T06:26:42Z",
"updated_at": "2020-08-27T17:36:52Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 627,
"watchers_count": 627,
"stargazers_count": 626,
"watchers_count": 626,
"forks_count": 282,
"forks": 282,
"watchers": 627,
"watchers": 626,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2020-07-24T07:38:50Z",
"updated_at": "2020-08-27T17:37:05Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 426,
"watchers_count": 426,
"stargazers_count": 425,
"watchers_count": 425,
"forks_count": 193,
"forks": 193,
"watchers": 426,
"watchers": 425,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2017-05-30T18:12:38Z",
"updated_at": "2020-06-10T12:49:21Z",
"updated_at": "2020-08-27T17:36:56Z",
"pushed_at": "2017-06-05T19:53:35Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 40,
"forks": 40,
"watchers": 116,
"watchers": 115,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2020-08-18T02:30:45Z",
"updated_at": "2020-08-27T17:37:10Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 77,
"forks": 77,
"watchers": 272,
"watchers": 271,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Test and exploit for CVE-2017-12542",
"fork": false,
"created_at": "2018-02-05T18:55:56Z",
"updated_at": "2020-08-18T04:33:36Z",
"updated_at": "2020-08-27T17:37:18Z",
"pushed_at": "2018-04-15T12:01:38Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 31,
"forks": 31,
"watchers": 77,
"watchers": 76,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2020-08-26T07:51:36Z",
"updated_at": "2020-08-27T17:37:06Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 348,
"watchers_count": 348,
"forks_count": 129,
"forks": 129,
"watchers": 349,
"watchers": 348,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
"fork": false,
"created_at": "2017-11-13T21:33:55Z",
"updated_at": "2020-06-06T02:43:32Z",
"updated_at": "2020-08-27T17:37:10Z",
"pushed_at": "2017-11-14T10:26:28Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 37,
"forks": 37,
"watchers": 157,
"watchers": 156,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-08-10T18:54:27Z",
"updated_at": "2020-08-27T17:37:14Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 538,
"watchers_count": 538,
"stargazers_count": 537,
"watchers_count": 537,
"forks_count": 91,
"forks": 91,
"watchers": 538,
"watchers": 537,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2020-08-26T22:23:11Z",
"updated_at": "2020-08-27T17:36:55Z",
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 242,
"watchers_count": 242,
"forks_count": 88,
"forks": 88,
"watchers": 243,
"watchers": 242,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2017-7494 - Detection Scripts",
"fork": false,
"created_at": "2017-05-26T07:28:26Z",
"updated_at": "2020-04-06T12:15:02Z",
"updated_at": "2020-08-27T17:36:56Z",
"pushed_at": "2017-05-26T07:43:02Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 24,
"forks": 24,
"watchers": 62,
"watchers": 61,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2020-08-25T22:14:35Z",
"updated_at": "2020-08-27T17:36:56Z",
"pushed_at": "2017-11-27T16:28:14Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 69,
"forks": 69,
"watchers": 201,
"watchers": 200,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2020-08-15T17:44:18Z",
"updated_at": "2020-08-27T17:37:15Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 101,
"forks": 101,
"watchers": 171,
"watchers": 170,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Running CVE-2017-8759 exploit sample.",
"fork": false,
"created_at": "2017-09-13T09:50:04Z",
"updated_at": "2020-06-06T03:04:15Z",
"updated_at": "2020-08-27T17:37:04Z",
"pushed_at": "2020-01-23T06:53:00Z",
"stargazers_count": 257,
"watchers_count": 257,
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 107,
"forks": 107,
"watchers": 257,
"watchers": 256,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2020-08-09T21:12:25Z",
"updated_at": "2020-08-27T17:37:05Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 123,
"forks": 123,
"watchers": 305,
"watchers": 304,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-8809 Docker - RFD(Reflected File Download) for MediaWiki",
"fork": false,
"created_at": "2020-01-22T10:21:51Z",
"updated_at": "2020-05-18T10:43:35Z",
"updated_at": "2020-08-27T17:38:15Z",
"pushed_at": "2020-01-22T10:27:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Test utility for cve-2018-1002105",
"fork": false,
"created_at": "2018-12-05T02:51:43Z",
"updated_at": "2020-08-18T02:21:20Z",
"updated_at": "2020-08-27T17:37:39Z",
"pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 26,
"forks": 26,
"watchers": 191,
"watchers": 190,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
"fork": false,
"created_at": "2018-10-17T23:05:10Z",
"updated_at": "2020-08-08T06:01:23Z",
"updated_at": "2020-08-27T17:37:36Z",
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 53,
"forks": 53,
"watchers": 231,
"watchers": 230,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-08-10T18:54:27Z",
"updated_at": "2020-08-27T17:37:14Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 538,
"watchers_count": 538,
"stargazers_count": 537,
"watchers_count": 537,
"forks_count": 91,
"forks": 91,
"watchers": 538,
"watchers": 537,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-08-26T03:52:32Z",
"updated_at": "2020-08-27T19:30:38Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 66,
"forks": 66,
"watchers": 292,
"watchers": 293,
"score": 0
}
]

View file

@ -243,13 +243,13 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
"updated_at": "2020-08-19T07:40:58Z",
"updated_at": "2020-08-27T16:10:45Z",
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 31,
"forks": 31,
"watchers": 78,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 32,
"forks": 32,
"watchers": 79,
"score": 0
},
{

View file

@ -1301,13 +1301,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-08-26T09:30:54Z",
"updated_at": "2020-08-27T17:37:53Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 755,
"watchers_count": 755,
"stargazers_count": 754,
"watchers_count": 754,
"forks_count": 183,
"forks": 183,
"watchers": 755,
"watchers": 754,
"score": 0
},
{
@ -1508,13 +1508,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2020-08-27T02:59:40Z",
"updated_at": "2020-08-27T17:37:53Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1040,
"watchers_count": 1040,
"stargazers_count": 1039,
"watchers_count": 1039,
"forks_count": 349,
"forks": 349,
"watchers": 1040,
"watchers": 1039,
"score": 0
},
{
@ -1577,13 +1577,13 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2020-08-10T05:50:22Z",
"updated_at": "2020-08-27T17:37:54Z",
"pushed_at": "2020-05-09T09:49:14Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 116,
"forks": 116,
"watchers": 332,
"watchers": 331,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-10092 Docker - Apache HTTP Server",
"fork": false,
"created_at": "2019-12-18T14:15:13Z",
"updated_at": "2020-05-18T10:43:29Z",
"updated_at": "2020-08-27T17:38:11Z",
"pushed_at": "2020-01-07T03:22:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-08-27T08:55:28Z",
"updated_at": "2020-08-27T19:47:27Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1604,
"watchers_count": 1604,
"stargazers_count": 1605,
"watchers_count": 1605,
"forks_count": 233,
"forks": 233,
"watchers": 1604,
"watchers": 1605,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2020-08-25T17:42:35Z",
"updated_at": "2020-08-27T17:38:03Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 580,
"watchers_count": 580,
"stargazers_count": 579,
"watchers_count": 579,
"forks_count": 76,
"forks": 76,
"watchers": 580,
"watchers": 579,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU",
"fork": false,
"created_at": "2020-01-18T08:23:46Z",
"updated_at": "2020-06-29T13:18:59Z",
"updated_at": "2020-08-27T17:38:14Z",
"pushed_at": "2020-04-06T09:01:07Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 13,
"forks": 13,
"watchers": 55,
"watchers": 54,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-09-10T15:57:23Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 53,
"score": 0
}

25
2019/CVE-2019-17026.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 290864437,
"name": "CVE-2019-17026-Exploit",
"full_name": "maxpl0it\/CVE-2019-17026-Exploit",
"owner": {
"login": "maxpl0it",
"id": 27973683,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27973683?v=4",
"html_url": "https:\/\/github.com\/maxpl0it"
},
"html_url": "https:\/\/github.com\/maxpl0it\/CVE-2019-17026-Exploit",
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
"fork": false,
"created_at": "2020-08-27T19:32:07Z",
"updated_at": "2020-08-27T20:41:11Z",
"pushed_at": "2020-08-27T19:33:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-17564 Apache Dubbo deserialization RCE",
"fork": false,
"created_at": "2020-02-13T01:40:50Z",
"updated_at": "2020-04-05T08:56:00Z",
"updated_at": "2020-08-27T17:38:17Z",
"pushed_at": "2020-02-13T01:42:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"watchers": 3,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "TelerikUI Vulnerability Scanner (CVE-2019-18935)",
"fork": false,
"created_at": "2020-05-25T08:37:51Z",
"updated_at": "2020-07-06T08:50:06Z",
"updated_at": "2020-08-27T17:38:28Z",
"pushed_at": "2020-05-25T08:15:28Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Chevereto reflected XSS in Website Name - 1.0.0 - 1.1.4 Free, <= 3.13.5 Core",
"fork": false,
"created_at": "2019-12-11T14:00:32Z",
"updated_at": "2020-02-15T22:38:06Z",
"updated_at": "2020-08-27T17:38:10Z",
"pushed_at": "2019-12-11T14:11:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-01-10T02:05:51Z",
"updated_at": "2020-01-11T18:51:18Z",
"updated_at": "2020-08-27T17:38:13Z",
"pushed_at": "2020-01-10T05:12:02Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"watchers": 7,
"score": 0
},
{
@ -703,13 +703,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2020-08-25T06:50:15Z",
"updated_at": "2020-08-27T17:38:15Z",
"pushed_at": "2020-03-25T05:07:43Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 14,
"forks": 14,
"watchers": 80,
"watchers": 79,
"score": 0
},
{
@ -726,13 +726,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T23:13:00Z",
"updated_at": "2020-07-29T11:44:54Z",
"updated_at": "2020-08-27T17:38:15Z",
"pushed_at": "2020-03-25T16:48:30Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 11,
"forks": 11,
"watchers": 56,
"watchers": 55,
"score": 0
},
{

View file

@ -316,8 +316,8 @@
"pushed_at": "2019-07-15T06:03:15Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 19,
"forks": 19,
"forks_count": 20,
"forks": 20,
"watchers": 60,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-5096(UAF in upload handler) exploit cause Denial of Service",
"fork": false,
"created_at": "2020-02-17T13:44:36Z",
"updated_at": "2020-07-03T03:51:52Z",
"updated_at": "2020-08-27T17:38:17Z",
"pushed_at": "2020-02-17T13:47:55Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"watchers": 10,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "POC for CVE-2019-7616 \/ ESA-2019-09",
"fork": false,
"created_at": "2020-06-02T07:28:13Z",
"updated_at": "2020-06-12T21:14:53Z",
"updated_at": "2020-08-27T17:38:30Z",
"pushed_at": "2020-06-02T07:29:20Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-9729. Transferred from https:\/\/github.com\/DoubleLabyrinth\/SdoKeyCrypt-sys-local-privilege-elevation",
"fork": false,
"created_at": "2019-03-12T14:18:20Z",
"updated_at": "2020-05-31T02:35:38Z",
"updated_at": "2020-08-27T17:37:48Z",
"pushed_at": "2019-03-13T01:24:21Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 26,
"forks": 26,
"watchers": 81,
"watchers": 80,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false,
"created_at": "2020-01-21T21:33:17Z",
"updated_at": "2020-07-22T15:40:51Z",
"updated_at": "2020-08-27T17:38:15Z",
"pushed_at": "2020-07-05T17:27:24Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 3,
"forks": 3,
"watchers": 33,
"watchers": 32,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-08-22T21:58:17Z",
"updated_at": "2020-08-27T17:38:15Z",
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 219,
"watchers_count": 219,
"stargazers_count": 218,
"watchers_count": 218,
"forks_count": 67,
"forks": 67,
"watchers": 219,
"watchers": 218,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-07-18T13:19:37Z",
"updated_at": "2020-08-27T17:38:18Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 44,
"forks": 44,
"watchers": 171,
"watchers": 170,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2020-08-25T21:16:00Z",
"updated_at": "2020-08-27T19:42:21Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 55,
"forks": 55,
"watchers": 169,
"watchers": 170,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-25T23:44:16Z",
"updated_at": "2020-08-16T09:13:13Z",
"updated_at": "2020-08-27T17:38:18Z",
"pushed_at": "2020-02-26T00:58:39Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 47,
"forks": 47,
"watchers": 146,
"watchers": 145,
"score": 0
},
{
@ -63,8 +63,8 @@
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 215,
"watchers_count": 215,
"forks_count": 77,
"forks": 77,
"forks_count": 78,
"forks": 78,
"watchers": 215,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-08-27T09:49:03Z",
"updated_at": "2020-08-27T17:38:31Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 401,
"watchers_count": 401,
"stargazers_count": 400,
"watchers_count": 400,
"forks_count": 95,
"forks": 95,
"watchers": 401,
"watchers": 400,
"score": 0
}
]

View file

@ -887,13 +887,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-08-26T18:10:31Z",
"updated_at": "2020-08-27T17:38:22Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 991,
"watchers_count": 991,
"stargazers_count": 990,
"watchers_count": 990,
"forks_count": 325,
"forks": 325,
"watchers": 991,
"watchers": 990,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials",
"fork": false,
"created_at": "2020-07-29T00:01:41Z",
"updated_at": "2020-08-26T16:19:57Z",
"updated_at": "2020-08-27T17:38:33Z",
"pushed_at": "2020-08-24T23:16:38Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 9,
"forks": 9,
"watchers": 49,
"watchers": 48,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)",
"fork": false,
"created_at": "2020-06-11T15:42:18Z",
"updated_at": "2020-08-17T13:52:12Z",
"updated_at": "2020-08-27T17:38:31Z",
"pushed_at": "2020-06-11T16:21:01Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"forks": 7,
"watchers": 16,
"watchers": 15,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-04T08:01:37Z",
"updated_at": "2020-08-24T13:27:52Z",
"updated_at": "2020-08-27T17:38:26Z",
"pushed_at": "2020-05-04T08:11:21Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 32,
"forks": 32,
"watchers": 93,
"watchers": 92,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE",
"fork": false,
"created_at": "2020-04-22T06:42:50Z",
"updated_at": "2020-08-07T12:26:39Z",
"updated_at": "2020-08-27T16:23:25Z",
"pushed_at": "2020-04-22T10:29:16Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 8,
"forks": 8,
"watchers": 55,
"watchers": 56,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-11896 Treck TCP\/IP stack and device asset investigation",
"fork": false,
"created_at": "2020-07-21T03:38:31Z",
"updated_at": "2020-07-24T03:12:02Z",
"updated_at": "2020-08-27T18:25:14Z",
"pushed_at": "2020-07-22T02:41:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A proof-of-concept for CVE-2020-12753",
"fork": false,
"created_at": "2020-06-01T21:58:42Z",
"updated_at": "2020-08-06T13:55:04Z",
"updated_at": "2020-08-27T17:17:00Z",
"pushed_at": "2020-06-01T22:55:46Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 4,
"forks": 4,
"watchers": 25,
"watchers": 26,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-18T05:15:05Z",
"updated_at": "2020-08-27T06:27:20Z",
"updated_at": "2020-08-27T16:28:49Z",
"pushed_at": "2020-07-18T11:52:31Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 10,
"forks": 10,
"watchers": 68,
"watchers": 69,
"score": 0
}
]

25
2020/CVE-2020-1958.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 254874176,
"name": "CVE-2020-1958",
"full_name": "ggolawski\/CVE-2020-1958",
"owner": {
"login": "ggolawski",
"id": 35563296,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/35563296?v=4",
"html_url": "https:\/\/github.com\/ggolawski"
},
"html_url": "https:\/\/github.com\/ggolawski\/CVE-2020-1958",
"description": "CVE-2020-1958 PoC",
"fork": false,
"created_at": "2020-04-11T13:31:02Z",
"updated_at": "2020-08-27T17:38:24Z",
"pushed_at": "2020-04-11T14:52:36Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 8,
"forks": 8,
"watchers": 20,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-08-13T04:44:34Z",
"updated_at": "2020-08-27T17:38:19Z",
"pushed_at": "2020-06-10T10:49:38Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 26,
"forks": 26,
"watchers": 112,
"watchers": 111,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-18T07:08:06Z",
"updated_at": "2020-07-06T15:54:23Z",
"updated_at": "2020-08-27T17:38:14Z",
"pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 14,
"forks": 14,
"watchers": 76,
"watchers": 75,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-08-17T03:43:31Z",
"updated_at": "2020-08-27T17:38:14Z",
"pushed_at": "2020-05-22T08:46:20Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 31,
"forks": 31,
"watchers": 137,
"watchers": 136,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-08-23T06:14:19Z",
"updated_at": "2020-08-27T17:38:19Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 219,
"watchers_count": 219,
"stargazers_count": 218,
"watchers_count": 218,
"forks_count": 54,
"forks": 54,
"watchers": 219,
"watchers": 218,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-08-25T08:34:48Z",
"updated_at": "2020-08-27T16:28:55Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 199,
"watchers_count": 199,
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 45,
"forks": 45,
"watchers": 199,
"watchers": 200,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Waitress 1.4.2 ReDoS - CVE-2020-5236 (Blog Sample Code)",
"fork": false,
"created_at": "2020-02-06T06:21:02Z",
"updated_at": "2020-05-18T10:43:36Z",
"updated_at": "2020-08-27T17:38:17Z",
"pushed_at": "2020-02-06T09:45:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "💣 CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false,
"created_at": "2020-01-17T05:35:01Z",
"updated_at": "2020-07-16T04:44:33Z",
"updated_at": "2020-08-27T17:38:14Z",
"pushed_at": "2020-01-22T04:58:59Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 18,
"forks": 18,
"watchers": 62,
"watchers": 61,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!",
"fork": false,
"created_at": "2020-07-05T16:38:36Z",
"updated_at": "2020-07-06T23:54:37Z",
"updated_at": "2020-08-27T17:38:32Z",
"pushed_at": "2020-07-05T16:44:03Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"watchers": 14,
"watchers": 13,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-20T04:27:52Z",
"updated_at": "2020-07-21T05:09:36Z",
"updated_at": "2020-08-27T17:38:28Z",
"pushed_at": "2020-06-24T20:57:03Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"forks": 3,
"watchers": 13,
"watchers": 12,
"score": 0
}
]

View file

@ -536,6 +536,14 @@ This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An
- [txrw/Dubbo-CVE-2020-1948](https://github.com/txrw/Dubbo-CVE-2020-1948)
- [L0kiii/Dubbo-deserialization](https://github.com/L0kiii/Dubbo-deserialization)
### CVE-2020-1958
<code>
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
</code>
- [ggolawski/CVE-2020-1958](https://github.com/ggolawski/CVE-2020-1958)
### CVE-2020-1967
<code>
@ -4804,6 +4812,14 @@ NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary co
- [purpleracc00n/CVE-2019-16941](https://github.com/purpleracc00n/CVE-2019-16941)
### CVE-2019-17026
<code>
Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 68.4.1, Thunderbird &lt; 68.4.1, and Firefox &lt; 72.0.1.
</code>
- [maxpl0it/CVE-2019-17026-Exploit](https://github.com/maxpl0it/CVE-2019-17026-Exploit)
### CVE-2019-17080
<code>