Auto Update 2020/07/13 12:08:28

This commit is contained in:
motikan2010-bot 2020-07-13 12:08:28 +09:00
parent 59b9e79618
commit 0259f9a40f
81 changed files with 3117 additions and 146 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-12T03:46:58Z",
"updated_at": "2020-07-13T02:48:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 494,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 122,
"forks": 122,
"watchers": 496,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-12T03:46:58Z",
"updated_at": "2020-07-13T02:48:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 494,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 122,
"forks": 122,
"watchers": 496,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 35,
"forks": 35,
"forks_count": 34,
"forks": 34,
"watchers": 74,
"score": 0
},

View file

@ -178,8 +178,8 @@
"pushed_at": "2017-11-28T03:06:32Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 48,
"forks": 48,
"forks_count": 49,
"forks": 49,
"watchers": 35,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-12T03:46:58Z",
"updated_at": "2020-07-13T02:48:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 494,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 122,
"forks": 122,
"watchers": 496,
"score": 0
}
]

View file

@ -404,13 +404,13 @@
"description": "CVE-2018-2628漏洞工具包",
"fork": false,
"created_at": "2018-10-30T03:26:16Z",
"updated_at": "2020-03-26T14:54:00Z",
"updated_at": "2020-07-13T02:21:36Z",
"pushed_at": "2018-10-30T03:35:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"forks": 6,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-12T03:46:58Z",
"updated_at": "2020-07-13T02:48:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 494,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 122,
"forks": 122,
"watchers": 496,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2020-07-07T13:40:02Z",
"updated_at": "2020-07-12T22:36:44Z",
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 431,
"watchers_count": 431,
"forks_count": 139,
"forks": 139,
"watchers": 430,
"watchers": 431,
"score": 0
},
{

View file

@ -1,4 +1,27 @@
[
{
"id": 174814901,
"name": "CVE-2019-0192",
"full_name": "mpgn\/CVE-2019-0192",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-0192",
"description": "RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl",
"fork": false,
"created_at": "2019-03-10T11:35:26Z",
"updated_at": "2020-06-27T16:16:13Z",
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 206,
"watchers_count": 206,
"forks_count": 58,
"forks": 58,
"watchers": 206,
"score": 0
},
{
"id": 218993619,
"name": "Solr-RCE-CVE-2019-0192",

View file

@ -1,4 +1,27 @@
[
{
"id": 176290079,
"name": "CVE-2019-0193",
"full_name": "xConsoIe\/CVE-2019-0193",
"owner": {
"login": "xConsoIe",
"id": 48456709,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48456709?v=4",
"html_url": "https:\/\/github.com\/xConsoIe"
},
"html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193",
"description": null,
"fork": false,
"created_at": "2019-03-18T13:18:01Z",
"updated_at": "2020-06-01T05:52:53Z",
"pushed_at": "2019-03-18T13:22:48Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 6,
"forks": 6,
"watchers": 6,
"score": 0
},
{
"id": 201405406,
"name": "CVE-2019-0193",
@ -36,13 +59,13 @@
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
"fork": false,
"created_at": "2019-08-12T07:17:21Z",
"updated_at": "2020-07-08T14:42:50Z",
"updated_at": "2020-07-13T01:49:10Z",
"pushed_at": "2020-07-08T06:51:47Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 6,
"forks": 6,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -1,4 +1,27 @@
[
{
"id": 177246255,
"name": "CVE-2019-0604",
"full_name": "linhlhq\/CVE-2019-0604",
"owner": {
"login": "linhlhq",
"id": 28854132,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28854132?v=4",
"html_url": "https:\/\/github.com\/linhlhq"
},
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2020-06-17T02:44:41Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 75,
"forks": 75,
"watchers": 125,
"score": 0
},
{
"id": 179413290,
"name": "CVE-2019-0604_sharepoint_CVE",

View file

@ -1,4 +1,27 @@
[
{
"id": 177576776,
"name": "cve-2019-0808-poc",
"full_name": "ze0r\/cve-2019-0808-poc",
"owner": {
"login": "ze0r",
"id": 43227253,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43227253?v=4",
"html_url": "https:\/\/github.com\/ze0r"
},
"html_url": "https:\/\/github.com\/ze0r\/cve-2019-0808-poc",
"description": "cve-2019-0808-poc",
"fork": false,
"created_at": "2019-03-25T11:53:35Z",
"updated_at": "2020-06-07T11:49:31Z",
"pushed_at": "2019-03-25T12:10:40Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 17,
"forks": 17,
"watchers": 39,
"score": 0
},
{
"id": 182577297,
"name": "CVE-2019-0808",

View file

@ -45,6 +45,29 @@
"watchers": 263,
"score": 0
},
{
"id": 172198653,
"name": "CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"full_name": "0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"owner": {
"login": "0xtavian",
"id": 21030907,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21030907?v=4",
"html_url": "https:\/\/github.com\/0xtavian"
},
"html_url": "https:\/\/github.com\/0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-02-23T10:00:03Z",
"updated_at": "2020-04-20T00:16:50Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"score": 0
},
{
"id": 183322760,
"name": "CVE-2019-1003000_RCE-DETECTION",

25
2019/CVE-2019-1351.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 279172833,
"name": "PruebaCVE20191351",
"full_name": "JonasDL\/PruebaCVE20191351",
"owner": {
"login": "JonasDL",
"id": 50348980,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50348980?v=4",
"html_url": "https:\/\/github.com\/JonasDL"
},
"html_url": "https:\/\/github.com\/JonasDL\/PruebaCVE20191351",
"description": "Prueba de CVE-2019-1351",
"fork": false,
"created_at": "2020-07-13T00:33:43Z",
"updated_at": "2020-07-13T00:43:54Z",
"pushed_at": "2020-07-13T00:43:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2020-06-24T09:49:18Z",
"updated_at": "2020-07-13T02:46:58Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 49,
"forks": 49,
"watchers": 158,
"watchers": 159,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)",
"fork": false,
"created_at": "2020-03-18T16:25:28Z",
"updated_at": "2020-06-23T03:45:44Z",
"updated_at": "2020-07-13T02:08:10Z",
"pushed_at": "2020-04-03T20:21:46Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 6,
"forks": 6,
"watchers": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 7,
"forks": 7,
"watchers": 43,
"score": 0
},
{

25
2019/CVE-2019-1652.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 167347037,
"name": "CiscoRV320Dump",
"full_name": "0x27\/CiscoRV320Dump",
"owner": {
"login": "0x27",
"id": 9094330,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9094330?v=4",
"html_url": "https:\/\/github.com\/0x27"
},
"html_url": "https:\/\/github.com\/0x27\/CiscoRV320Dump",
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2020-06-12T03:47:41Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 62,
"forks": 62,
"watchers": 191,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 168361115,
"name": "CVE-2019-1653",
"full_name": "dubfr33\/CVE-2019-1653",
"owner": {
"login": "dubfr33",
"id": 20056018,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20056018?v=4",
"html_url": "https:\/\/github.com\/dubfr33"
},
"html_url": "https:\/\/github.com\/dubfr33\/CVE-2019-1653",
"description": "NSE script to scan for Cisco routers vulnerable to CVE-2019-1653",
"fork": false,
"created_at": "2019-01-30T14:58:48Z",
"updated_at": "2020-04-21T04:04:11Z",
"pushed_at": "2019-01-30T15:01:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 178810790,
"name": "CiscoSpill",

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-12T13:48:54Z",
"updated_at": "2020-07-13T02:46:11Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1222,
"watchers_count": 1222,
"stargazers_count": 1228,
"watchers_count": 1228,
"forks_count": 309,
"forks": 309,
"watchers": 1222,
"watchers": 1228,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-07-07T12:03:30Z",
"updated_at": "2020-07-13T02:49:18Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 23,
"forks": 23,
"watchers": 124,
"watchers": 125,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 115,
"forks": 115,
"forks_count": 116,
"forks": 116,
"watchers": 492,
"score": 0
},

25
2019/CVE-2019-1987.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171108223,
"name": "android-7-9-png-bug",
"full_name": "marcinguy\/android-7-9-png-bug",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/android-7-9-png-bug",
"description": "CVE-2019-1987",
"fork": false,
"created_at": "2019-02-17T10:22:01Z",
"updated_at": "2020-05-18T10:42:55Z",
"pushed_at": "2019-03-02T19:54:06Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 12,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-12T03:46:58Z",
"updated_at": "2020-07-13T02:48:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 494,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 122,
"forks": 122,
"watchers": 496,
"score": 0
}
]

48
2019/CVE-2019-3462.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 167275161,
"name": "check_CVE-2019-3462",
"full_name": "tonejito\/check_CVE-2019-3462",
"owner": {
"login": "tonejito",
"id": 618588,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/618588?v=4",
"html_url": "https:\/\/github.com\/tonejito"
},
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
"fork": false,
"created_at": "2019-01-24T00:30:15Z",
"updated_at": "2019-01-26T01:21:38Z",
"pushed_at": "2019-01-26T01:21:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 170573944,
"name": "update-apt-package",
"full_name": "atilacastro\/update-apt-package",
"owner": {
"login": "atilacastro",
"id": 5832809,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5832809?v=4",
"html_url": "https:\/\/github.com\/atilacastro"
},
"html_url": "https:\/\/github.com\/atilacastro\/update-apt-package",
"description": "Playbook update APT package because CVE-2019-3462",
"fork": false,
"created_at": "2019-02-13T20:22:33Z",
"updated_at": "2019-02-14T18:31:31Z",
"pushed_at": "2019-02-14T18:31:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 175966226,
"name": "CVE-2019-5418",
"full_name": "mpgn\/CVE-2019-5418",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-5418",
"description": "CVE-2019-5418 - File Content Disclosure on Ruby on Rails",
"fork": false,
"created_at": "2019-03-16T11:58:18Z",
"updated_at": "2020-06-08T00:55:34Z",
"pushed_at": "2019-03-25T07:19:58Z",
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 17,
"forks": 17,
"watchers": 156,
"score": 0
},
{
"id": 176323109,
"name": "CVE-2019-5418",
"full_name": "omarkurt\/CVE-2019-5418",
"owner": {
"login": "omarkurt",
"id": 1712468,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1712468?v=4",
"html_url": "https:\/\/github.com\/omarkurt"
},
"html_url": "https:\/\/github.com\/omarkurt\/CVE-2019-5418",
"description": "File Content Disclosure on Rails Test Case - CVE-2019-5418",
"fork": false,
"created_at": "2019-03-18T16:09:13Z",
"updated_at": "2020-04-17T21:45:45Z",
"pushed_at": "2019-03-18T16:15:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 176545257,
"name": "CVE-2019-5418-Scanner",
"full_name": "brompwnie\/CVE-2019-5418-Scanner",
"owner": {
"login": "brompwnie",
"id": 8638589,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8638589?v=4",
"html_url": "https:\/\/github.com\/brompwnie"
},
"html_url": "https:\/\/github.com\/brompwnie\/CVE-2019-5418-Scanner",
"description": "A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418",
"fork": false,
"created_at": "2019-03-19T15:38:01Z",
"updated_at": "2020-04-13T06:13:20Z",
"pushed_at": "2019-03-21T17:26:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 15,
"forks": 15,
"watchers": 30,
"score": 0
},
{
"id": 177236589,
"name": "Rails-doubletap-RCE",

View file

@ -1,4 +1,27 @@
[
{
"id": 176976251,
"name": "CVE-2019-5420",
"full_name": "knqyf263\/CVE-2019-5420",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-5420",
"description": "CVE-2019-5420 (Ruby on Rails)",
"fork": false,
"created_at": "2019-03-21T15:42:54Z",
"updated_at": "2020-06-09T11:27:51Z",
"pushed_at": "2019-03-21T23:52:48Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 178050921,
"name": "cve-2019-5420",

View file

@ -1,4 +1,165 @@
[
{
"id": 170398859,
"name": "cve-2019-5736-poc",
"full_name": "q3k\/cve-2019-5736-poc",
"owner": {
"login": "q3k",
"id": 315234,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/315234?v=4",
"html_url": "https:\/\/github.com\/q3k"
},
"html_url": "https:\/\/github.com\/q3k\/cve-2019-5736-poc",
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2020-04-06T10:46:09Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 61,
"forks": 61,
"watchers": 179,
"score": 0
},
{
"id": 170445833,
"name": "CVE-2019-5736-PoC",
"full_name": "Frichetten\/CVE-2019-5736-PoC",
"owner": {
"login": "Frichetten",
"id": 10386884,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10386884?v=4",
"html_url": "https:\/\/github.com\/Frichetten"
},
"html_url": "https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC",
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2020-07-11T05:53:11Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 391,
"watchers_count": 391,
"forks_count": 96,
"forks": 96,
"watchers": 391,
"score": 0
},
{
"id": 170613828,
"name": "CVE-2019-5736",
"full_name": "jas502n\/CVE-2019-5736",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-5736",
"description": "runc容器逃逸漏洞预警",
"fork": false,
"created_at": "2019-02-14T02:30:12Z",
"updated_at": "2020-02-03T01:45:33Z",
"pushed_at": "2019-02-14T02:40:55Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"score": 0
},
{
"id": 170656576,
"name": "CVE-2019-5736",
"full_name": "denmilu\/CVE-2019-5736",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/denmilu"
},
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-02-14T08:37:25Z",
"updated_at": "2019-02-14T08:37:36Z",
"pushed_at": "2019-02-14T08:37:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170656601,
"name": "cve-2019-5736-poc",
"full_name": "denmilu\/cve-2019-5736-poc",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/denmilu"
},
"html_url": "https:\/\/github.com\/denmilu\/cve-2019-5736-poc",
"description": null,
"fork": false,
"created_at": "2019-02-14T08:37:39Z",
"updated_at": "2019-02-14T08:37:49Z",
"pushed_at": "2019-02-14T08:37:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170836971,
"name": "cve-2019-5736-poc",
"full_name": "agppp\/cve-2019-5736-poc",
"owner": {
"login": "agppp",
"id": 10527860,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10527860?v=4",
"html_url": "https:\/\/github.com\/agppp"
},
"html_url": "https:\/\/github.com\/agppp\/cve-2019-5736-poc",
"description": "getshell test",
"fork": false,
"created_at": "2019-02-15T09:22:27Z",
"updated_at": "2019-02-15T09:49:47Z",
"pushed_at": "2019-02-15T09:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 171499608,
"name": "poc-cve-2019-5736",
"full_name": "ebdecastro\/poc-cve-2019-5736",
"owner": {
"login": "ebdecastro",
"id": 46558799,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46558799?v=4",
"html_url": "https:\/\/github.com\/ebdecastro"
},
"html_url": "https:\/\/github.com\/ebdecastro\/poc-cve-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-02-19T15:34:18Z",
"updated_at": "2019-06-04T10:53:26Z",
"pushed_at": "2019-02-19T15:37:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 171668415,
"name": "RunC-CVE-2019-5736",
@ -22,6 +183,75 @@
"watchers": 49,
"score": 0
},
{
"id": 173057459,
"name": "CVE-2019-5736-PoC-2",
"full_name": "yyqs2008\/CVE-2019-5736-PoC-2",
"owner": {
"login": "yyqs2008",
"id": 1332668,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1332668?v=4",
"html_url": "https:\/\/github.com\/yyqs2008"
},
"html_url": "https:\/\/github.com\/yyqs2008\/CVE-2019-5736-PoC-2",
"description": null,
"fork": false,
"created_at": "2019-02-28T06:48:13Z",
"updated_at": "2020-06-11T14:27:08Z",
"pushed_at": "2019-02-23T13:20:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 174545720,
"name": "CVE-2019-5736-PoC",
"full_name": "zyriuse75\/CVE-2019-5736-PoC",
"owner": {
"login": "zyriuse75",
"id": 225690,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/225690?v=4",
"html_url": "https:\/\/github.com\/zyriuse75"
},
"html_url": "https:\/\/github.com\/zyriuse75\/CVE-2019-5736-PoC",
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5736 poc of CVE-2019-5736 ",
"fork": false,
"created_at": "2019-03-08T13:50:57Z",
"updated_at": "2019-03-08T13:50:59Z",
"pushed_at": "2019-03-08T13:50:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 177891884,
"name": "CVE-2019-5736",
"full_name": "stillan00b\/CVE-2019-5736",
"owner": {
"login": "stillan00b",
"id": 48630837,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/48630837?v=4",
"html_url": "https:\/\/github.com\/stillan00b"
},
"html_url": "https:\/\/github.com\/stillan00b\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-03-27T00:52:49Z",
"updated_at": "2019-03-27T01:05:08Z",
"pushed_at": "2019-03-27T01:05:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 181238407,
"name": "cve-2019-5736-exp",

25
2019/CVE-2019-5737.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 172282648,
"name": "cve-2019-5737",
"full_name": "beelzebruh\/cve-2019-5737",
"owner": {
"login": "beelzebruh",
"id": 39379168,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39379168?v=4",
"html_url": "https:\/\/github.com\/beelzebruh"
},
"html_url": "https:\/\/github.com\/beelzebruh\/cve-2019-5737",
"description": null,
"fork": false,
"created_at": "2019-02-24T01:20:04Z",
"updated_at": "2020-05-12T03:29:52Z",
"pushed_at": "2019-02-24T03:43:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-5786.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 176796740,
"name": "CVE-2019-5786",
"full_name": "exodusintel\/CVE-2019-5786",
"owner": {
"login": "exodusintel",
"id": 16653014,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16653014?v=4",
"html_url": "https:\/\/github.com\/exodusintel"
},
"html_url": "https:\/\/github.com\/exodusintel\/CVE-2019-5786",
"description": "FileReader Exploit",
"fork": false,
"created_at": "2019-03-20T18:43:49Z",
"updated_at": "2020-07-13T01:58:10Z",
"pushed_at": "2019-03-20T18:47:25Z",
"stargazers_count": 247,
"watchers_count": 247,
"forks_count": 85,
"forks": 85,
"watchers": 247,
"score": 0
}
]

25
2019/CVE-2019-5893.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 165075365,
"name": "OpenSource-ERP-SQL-Injection",
"full_name": "EmreOvunc\/OpenSource-ERP-SQL-Injection",
"owner": {
"login": "EmreOvunc",
"id": 15659223,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
"html_url": "https:\/\/github.com\/EmreOvunc"
},
"html_url": "https:\/\/github.com\/EmreOvunc\/OpenSource-ERP-SQL-Injection",
"description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.",
"fork": false,
"created_at": "2019-01-10T14:36:55Z",
"updated_at": "2020-05-16T12:47:44Z",
"pushed_at": "2019-01-11T07:45:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 168440280,
"name": "OsirisJailbreak12",
"full_name": "fatgrass\/OsirisJailbreak12",
"owner": {
"login": "fatgrass",
"id": 19977419,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19977419?v=4",
"html_url": "https:\/\/github.com\/fatgrass"
},
"html_url": "https:\/\/github.com\/fatgrass\/OsirisJailbreak12",
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
"fork": false,
"created_at": "2019-01-31T01:03:43Z",
"updated_at": "2020-04-08T17:22:51Z",
"pushed_at": "2019-01-31T00:53:03Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 73,
"forks": 73,
"watchers": 9,
"score": 0
},
{
"id": 194542840,
"name": "CVE-2019-6225-macOS",
@ -21,5 +44,28 @@
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 201224192,
"name": "jailbreak-iOS12",
"full_name": "raystyle\/jailbreak-iOS12",
"owner": {
"login": "raystyle",
"id": 3284570,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3284570?v=4",
"html_url": "https:\/\/github.com\/raystyle"
},
"html_url": "https:\/\/github.com\/raystyle\/jailbreak-iOS12",
"description": "OS 12.0 & 12.1.2 - Jailbreak with CVE-2019-6225",
"fork": false,
"created_at": "2019-08-08T09:22:57Z",
"updated_at": "2019-09-28T04:38:14Z",
"pushed_at": "2019-02-27T12:57:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-6249.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171827364,
"name": "CVE-2019-6249_Hucart-cms",
"full_name": "NMTech0x90\/CVE-2019-6249_Hucart-cms",
"owner": {
"login": "NMTech0x90",
"id": 27001865,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/27001865?v=4",
"html_url": "https:\/\/github.com\/NMTech0x90"
},
"html_url": "https:\/\/github.com\/NMTech0x90\/CVE-2019-6249_Hucart-cms",
"description": "CVE-2019-6249 Hucart cms 复现环境",
"fork": false,
"created_at": "2019-02-21T08:03:43Z",
"updated_at": "2020-03-25T03:29:55Z",
"pushed_at": "2019-02-21T08:22:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

25
2019/CVE-2019-6263.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 166368513,
"name": "CVE-2019-6263-Joomla-POC",
"full_name": "praveensutar\/CVE-2019-6263-Joomla-POC",
"owner": {
"login": "praveensutar",
"id": 12555214,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12555214?v=4",
"html_url": "https:\/\/github.com\/praveensutar"
},
"html_url": "https:\/\/github.com\/praveensutar\/CVE-2019-6263-Joomla-POC",
"description": null,
"fork": false,
"created_at": "2019-01-18T08:10:11Z",
"updated_at": "2019-09-12T15:02:55Z",
"pushed_at": "2019-01-19T04:29:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
}
]

View file

@ -1,4 +1,142 @@
[
{
"id": 172094613,
"name": "Drupal-SA-CORE-2019-003",
"full_name": "g0rx\/Drupal-SA-CORE-2019-003",
"owner": {
"login": "g0rx",
"id": 10961397,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10961397?v=4",
"html_url": "https:\/\/github.com\/g0rx"
},
"html_url": "https:\/\/github.com\/g0rx\/Drupal-SA-CORE-2019-003",
"description": "CVE-2019-6340-Drupal SA-CORE-2019-003",
"fork": false,
"created_at": "2019-02-22T16:03:40Z",
"updated_at": "2020-07-12T16:24:18Z",
"pushed_at": "2019-02-24T18:43:05Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 9,
"forks": 9,
"watchers": 31,
"score": 0
},
{
"id": 172217636,
"name": "CVE-2019-6340",
"full_name": "knqyf263\/CVE-2019-6340",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-6340",
"description": "Environment for CVE-2019-6340 (Drupal)",
"fork": false,
"created_at": "2019-02-23T13:28:58Z",
"updated_at": "2020-04-02T13:09:08Z",
"pushed_at": "2019-02-23T17:34:19Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 10,
"forks": 10,
"watchers": 41,
"score": 0
},
{
"id": 172429144,
"name": "CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"full_name": "DevDungeon\/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"owner": {
"login": "DevDungeon",
"id": 16630634,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16630634?v=4",
"html_url": "https:\/\/github.com\/DevDungeon"
},
"html_url": "https:\/\/github.com\/DevDungeon\/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"description": "CVE-2019-6340 Drupal 8.6.9 REST Auth Bypass examples",
"fork": false,
"created_at": "2019-02-25T03:38:47Z",
"updated_at": "2020-05-30T04:32:25Z",
"pushed_at": "2019-02-25T03:47:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 6,
"forks": 6,
"watchers": 3,
"score": 0
},
{
"id": 172458734,
"name": "CVE-2019-6340",
"full_name": "oways\/CVE-2019-6340",
"owner": {
"login": "oways",
"id": 11142952,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11142952?v=4",
"html_url": "https:\/\/github.com\/oways"
},
"html_url": "https:\/\/github.com\/oways\/CVE-2019-6340",
"description": "CVE-2019-6340 POC Drupal rce",
"fork": false,
"created_at": "2019-02-25T07:47:16Z",
"updated_at": "2020-04-02T11:50:43Z",
"pushed_at": "2019-02-25T08:57:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"forks": 5,
"watchers": 12,
"score": 0
},
{
"id": 172766416,
"name": "cve-2019-6340",
"full_name": "cved-sources\/cve-2019-6340",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-6340",
"description": "cve-2019-6340",
"fork": false,
"created_at": "2019-02-26T18:26:50Z",
"updated_at": "2020-04-02T13:08:58Z",
"pushed_at": "2019-02-26T18:38:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 175109773,
"name": "cve-2019-6340-bits",
"full_name": "d1vious\/cve-2019-6340-bits",
"owner": {
"login": "d1vious",
"id": 1476868,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1476868?v=4",
"html_url": "https:\/\/github.com\/d1vious"
},
"html_url": "https:\/\/github.com\/d1vious\/cve-2019-6340-bits",
"description": "Bits generated while analyzing CVE-2019-6340 Drupal RESTful RCE",
"fork": false,
"created_at": "2019-03-12T01:13:56Z",
"updated_at": "2019-04-15T07:13:03Z",
"pushed_at": "2019-03-12T01:41:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 188896047,
"name": "CVE-2019-6340",

25
2019/CVE-2019-6440.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 170884262,
"name": "CVE-2019-6440",
"full_name": "hexnone\/CVE-2019-6440",
"owner": {
"login": "hexnone",
"id": 17256467,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17256467?v=4",
"html_url": "https:\/\/github.com\/hexnone"
},
"html_url": "https:\/\/github.com\/hexnone\/CVE-2019-6440",
"description": "CVE-2019-6440. Zemana RCE and privilege escalation.",
"fork": false,
"created_at": "2019-02-15T15:15:52Z",
"updated_at": "2019-03-22T18:53:26Z",
"pushed_at": "2019-03-22T18:53:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 164948400,
"name": "ESFileExplorerOpenPortVuln",
"full_name": "fs0c131y\/ESFileExplorerOpenPortVuln",
"owner": {
"login": "fs0c131y",
"id": 36547191,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36547191?v=4",
"html_url": "https:\/\/github.com\/fs0c131y"
},
"html_url": "https:\/\/github.com\/fs0c131y\/ESFileExplorerOpenPortVuln",
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2020-07-11T13:09:53Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 581,
"watchers_count": 581,
"forks_count": 130,
"forks": 130,
"watchers": 581,
"score": 0
},
{
"id": 263921419,
"name": "ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447",

View file

@ -1,4 +1,27 @@
[
{
"id": 171244957,
"name": "cve-2019-6453-poc",
"full_name": "proofofcalc\/cve-2019-6453-poc",
"owner": {
"login": "proofofcalc",
"id": 47607270,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/47607270?v=4",
"html_url": "https:\/\/github.com\/proofofcalc"
},
"html_url": "https:\/\/github.com\/proofofcalc\/cve-2019-6453-poc",
"description": "Proof of calc for CVE-2019-6453",
"fork": false,
"created_at": "2019-02-18T08:35:03Z",
"updated_at": "2020-05-29T08:59:39Z",
"pushed_at": "2019-02-18T13:10:38Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 13,
"forks": 13,
"watchers": 49,
"score": 0
},
{
"id": 197653851,
"name": "mIRC-CVE-2019-6453",

25
2019/CVE-2019-6487.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 166241615,
"name": "TP-Link-WDR-Router-Command-injection_POC",
"full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"owner": {
"login": "afang5472",
"id": 18503100,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18503100?v=4",
"html_url": "https:\/\/github.com\/afang5472"
},
"html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.",
"fork": false,
"created_at": "2019-01-17T14:44:12Z",
"updated_at": "2020-07-10T12:22:52Z",
"pushed_at": "2019-01-19T10:49:21Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 13,
"forks": 13,
"watchers": 24,
"score": 0
}
]

25
2019/CVE-2019-7216.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 168365175,
"name": "CVE-2019-7216",
"full_name": "Ekultek\/CVE-2019-7216",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/CVE-2019-7216",
"description": "Filechucker filter bypass Proof Of Concept",
"fork": false,
"created_at": "2019-01-30T15:23:40Z",
"updated_at": "2020-03-30T04:22:37Z",
"pushed_at": "2019-02-01T16:56:53Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 172401532,
"name": "CVE-2019-7238",
"full_name": "mpgn\/CVE-2019-7238",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-7238",
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2020-06-27T16:17:46Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 41,
"forks": 41,
"watchers": 128,
"score": 0
},
{
"id": 187840869,
"name": "CVE-2019-7238",

View file

@ -21,5 +21,28 @@
"forks": 107,
"watchers": 512,
"score": 0
},
{
"id": 170741210,
"name": "CVE-2019-7304_DirtySock",
"full_name": "SecuritySi\/CVE-2019-7304_DirtySock",
"owner": {
"login": "SecuritySi",
"id": 7517443,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7517443?v=4",
"html_url": "https:\/\/github.com\/SecuritySi"
},
"html_url": "https:\/\/github.com\/SecuritySi\/CVE-2019-7304_DirtySock",
"description": "Payload Generator",
"fork": false,
"created_at": "2019-02-14T18:48:56Z",
"updated_at": "2019-03-05T06:03:09Z",
"pushed_at": "2019-02-14T18:49:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
}
]

25
2019/CVE-2019-7642.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 173723117,
"name": "CVE-2019-7642",
"full_name": "xw77cve\/CVE-2019-7642",
"owner": {
"login": "xw77cve",
"id": 48202281,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48202281?v=4",
"html_url": "https:\/\/github.com\/xw77cve"
},
"html_url": "https:\/\/github.com\/xw77cve\/CVE-2019-7642",
"description": null,
"fork": false,
"created_at": "2019-03-04T10:24:04Z",
"updated_at": "2019-10-04T12:40:46Z",
"pushed_at": "2019-03-04T11:04:30Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 1,
"forks": 1,
"watchers": 15,
"score": 0
}
]

25
2019/CVE-2019-8389.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171097356,
"name": "CVE-2019-8389",
"full_name": "shawarkhanethicalhacker\/CVE-2019-8389",
"owner": {
"login": "shawarkhanethicalhacker",
"id": 41706151,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/41706151?v=4",
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker"
},
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker\/CVE-2019-8389",
"description": " [CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application ",
"fork": false,
"created_at": "2019-02-17T08:10:50Z",
"updated_at": "2019-12-06T13:47:51Z",
"pushed_at": "2019-02-17T08:40:06Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 172448763,
"name": "WordPress_4.9.8_RCE_POC",
"full_name": "brianwrf\/WordPress_4.9.8_RCE_POC",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/WordPress_4.9.8_RCE_POC",
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
"fork": false,
"created_at": "2019-02-25T06:38:15Z",
"updated_at": "2020-07-12T16:24:13Z",
"pushed_at": "2019-03-18T01:20:52Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 18,
"forks": 18,
"watchers": 56,
"score": 0
},
{
"id": 184548123,
"name": "CVE-2019-8942",

25
2019/CVE-2019-9184.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175870177,
"name": "cve-2019-9184",
"full_name": "cved-sources\/cve-2019-9184",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-9184",
"description": "cve-2019-9184",
"fork": false,
"created_at": "2019-03-15T18:12:49Z",
"updated_at": "2019-03-15T18:15:09Z",
"pushed_at": "2019-03-15T18:15:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-9194.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175870594,
"name": "cve-2019-9194",
"full_name": "cved-sources\/cve-2019-9194",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-9194",
"description": "cve-2019-9194",
"fork": false,
"created_at": "2019-03-15T18:16:27Z",
"updated_at": "2019-03-15T18:17:32Z",
"pushed_at": "2019-03-15T18:17:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-9580.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175478558,
"name": "CVE-2019-9580",
"full_name": "mpgn\/CVE-2019-9580",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-9580",
"description": "CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE",
"fork": false,
"created_at": "2019-03-13T18:37:18Z",
"updated_at": "2020-04-05T17:19:04Z",
"pushed_at": "2019-03-13T19:26:27Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 5,
"forks": 5,
"watchers": 28,
"score": 0
}
]

25
2019/CVE-2019-9653.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175789235,
"name": "CVE-2019-9653",
"full_name": "grayoneday\/CVE-2019-9653",
"owner": {
"login": "grayoneday",
"id": 28929076,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28929076?v=4",
"html_url": "https:\/\/github.com\/grayoneday"
},
"html_url": "https:\/\/github.com\/grayoneday\/CVE-2019-9653",
"description": null,
"fork": false,
"created_at": "2019-03-15T09:27:15Z",
"updated_at": "2019-03-15T09:32:42Z",
"pushed_at": "2019-03-15T09:32:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-9673.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175058439,
"name": "CVE-2019-9673",
"full_name": "mgrube\/CVE-2019-9673",
"owner": {
"login": "mgrube",
"id": 90159,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/90159?v=4",
"html_url": "https:\/\/github.com\/mgrube"
},
"html_url": "https:\/\/github.com\/mgrube\/CVE-2019-9673",
"description": "Writeup",
"fork": false,
"created_at": "2019-03-11T18:16:15Z",
"updated_at": "2019-08-08T16:04:30Z",
"pushed_at": "2019-03-24T08:21:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

25
2019/CVE-2019-9729.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175226868,
"name": "SdoKeyCrypt-sys-local-privilege-elevation",
"full_name": "HyperSine\/SdoKeyCrypt-sys-local-privilege-elevation",
"owner": {
"login": "HyperSine",
"id": 58699351,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/58699351?v=4",
"html_url": "https:\/\/github.com\/HyperSine"
},
"html_url": "https:\/\/github.com\/HyperSine\/SdoKeyCrypt-sys-local-privilege-elevation",
"description": "CVE-2019-9729. Transferred from https:\/\/github.com\/DoubleLabyrinth\/SdoKeyCrypt-sys-local-privilege-elevation",
"fork": false,
"created_at": "2019-03-12T14:18:20Z",
"updated_at": "2020-05-31T02:35:38Z",
"pushed_at": "2019-03-13T01:24:21Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 26,
"forks": 26,
"watchers": 81,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 177500802,
"name": "CVE-2019-9810-PoC",
"full_name": "xuechiyaobai\/CVE-2019-9810-PoC",
"owner": {
"login": "xuechiyaobai",
"id": 8443947,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8443947?v=4",
"html_url": "https:\/\/github.com\/xuechiyaobai"
},
"html_url": "https:\/\/github.com\/xuechiyaobai\/CVE-2019-9810-PoC",
"description": "Array.prototype.slice wrong alias information.",
"fork": false,
"created_at": "2019-03-25T02:33:18Z",
"updated_at": "2020-05-17T11:45:11Z",
"pushed_at": "2019-03-25T02:41:43Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 15,
"forks": 15,
"watchers": 69,
"score": 0
},
{
"id": 185060837,
"name": "CVE-2019-9810",

View file

@ -21,5 +21,28 @@
"forks": 6,
"watchers": 34,
"score": 0
},
{
"id": 240753059,
"name": "cve-2020-0022",
"full_name": "leommxj\/cve-2020-0022",
"owner": {
"login": "leommxj",
"id": 11194599,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11194599?v=4",
"html_url": "https:\/\/github.com\/leommxj"
},
"html_url": "https:\/\/github.com\/leommxj\/cve-2020-0022",
"description": "poc for cve-2020-0022",
"fork": false,
"created_at": "2020-02-15T16:55:44Z",
"updated_at": "2020-07-06T01:00:25Z",
"pushed_at": "2020-02-16T17:18:01Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 18,
"forks": 18,
"watchers": 40,
"score": 0
}
]

View file

@ -1,4 +1,142 @@
[
{
"id": 233959211,
"name": "CVE-2020-0601",
"full_name": "nissan-sudo\/CVE-2020-0601",
"owner": {
"login": "nissan-sudo",
"id": 58976920,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/58976920?v=4",
"html_url": "https:\/\/github.com\/nissan-sudo"
},
"html_url": "https:\/\/github.com\/nissan-sudo\/CVE-2020-0601",
"description": "Remote Code Execution Exploit ",
"fork": false,
"created_at": "2020-01-14T23:53:18Z",
"updated_at": "2020-01-27T17:28:37Z",
"pushed_at": "2020-01-14T23:56:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 233960159,
"name": "cve-2020-0601",
"full_name": "0xxon\/cve-2020-0601",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601",
"description": "Zeek package to detect CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T00:01:29Z",
"updated_at": "2020-02-12T19:30:05Z",
"pushed_at": "2020-02-12T19:30:03Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 10,
"forks": 10,
"watchers": 34,
"score": 0
},
{
"id": 234134766,
"name": "CVE-2020-0601",
"full_name": "SherlockSec\/CVE-2020-0601",
"owner": {
"login": "SherlockSec",
"id": 37545173,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37545173?v=4",
"html_url": "https:\/\/github.com\/SherlockSec"
},
"html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601",
"description": "A Windows Crypto Exploit",
"fork": false,
"created_at": "2020-01-15T17:26:58Z",
"updated_at": "2020-01-16T20:56:07Z",
"pushed_at": "2020-01-15T17:28:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 234146234,
"name": "CVE-2020-0601",
"full_name": "JPurrier\/CVE-2020-0601",
"owner": {
"login": "JPurrier",
"id": 25715340,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25715340?v=4",
"html_url": "https:\/\/github.com\/JPurrier"
},
"html_url": "https:\/\/github.com\/JPurrier\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-15T18:31:30Z",
"updated_at": "2020-01-17T10:49:19Z",
"pushed_at": "2020-01-17T10:49:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234190972,
"name": "cve-2020-0601-plugin",
"full_name": "0xxon\/cve-2020-0601-plugin",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-plugin",
"description": "Zeek package that uses OpenSSL to detect CVE-2020-0601 exploit attempts",
"fork": false,
"created_at": "2020-01-15T23:07:02Z",
"updated_at": "2020-02-12T19:38:37Z",
"pushed_at": "2020-02-12T19:38:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 234191063,
"name": "CurveBall",
"full_name": "ollypwn\/CurveBall",
"owner": {
"login": "ollypwn",
"id": 53348818,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ollypwn"
},
"html_url": "https:\/\/github.com\/ollypwn\/CurveBall",
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-07-12T04:39:31Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 814,
"watchers_count": 814,
"forks_count": 208,
"forks": 208,
"watchers": 814,
"score": 0
},
{
"id": 234192123,
"name": "chainoffools",
@ -22,6 +160,75 @@
"watchers": 322,
"score": 0
},
{
"id": 234220195,
"name": "Awesome-CVE-2020-0601",
"full_name": "RrUZi\/Awesome-CVE-2020-0601",
"owner": {
"login": "RrUZi",
"id": 43235635,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43235635?v=4",
"html_url": "https:\/\/github.com\/RrUZi"
},
"html_url": "https:\/\/github.com\/RrUZi\/Awesome-CVE-2020-0601",
"description": "😂An awesome curated list of repos for CVE-2020-0601.",
"fork": false,
"created_at": "2020-01-16T02:46:21Z",
"updated_at": "2020-02-13T14:33:37Z",
"pushed_at": "2020-02-02T02:29:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 234317211,
"name": "CVE-2020-0601",
"full_name": "BleepSec\/CVE-2020-0601",
"owner": {
"login": "BleepSec",
"id": 550582,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/550582?v=4",
"html_url": "https:\/\/github.com\/BleepSec"
},
"html_url": "https:\/\/github.com\/BleepSec\/CVE-2020-0601",
"description": "Curated list of CVE-2020-0601 resources",
"fork": false,
"created_at": "2020-01-16T12:40:48Z",
"updated_at": "2020-02-12T10:22:35Z",
"pushed_at": "2020-02-03T21:24:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 234378948,
"name": "CVE-2020-0601",
"full_name": "apmunch\/CVE-2020-0601",
"owner": {
"login": "apmunch",
"id": 7328483,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/7328483?v=4",
"html_url": "https:\/\/github.com\/apmunch"
},
"html_url": "https:\/\/github.com\/apmunch\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-16T17:54:36Z",
"updated_at": "2020-01-16T18:04:01Z",
"pushed_at": "2020-01-16T18:03:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234433419,
"name": "badecparams",
@ -45,6 +252,29 @@
"watchers": 59,
"score": 0
},
{
"id": 234442281,
"name": "cve-2020-0601-utils",
"full_name": "0xxon\/cve-2020-0601-utils",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
"fork": false,
"created_at": "2020-01-17T01:02:52Z",
"updated_at": "2020-01-21T19:49:00Z",
"pushed_at": "2020-01-21T19:48:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 234574037,
"name": "Windows10_Cumulative_Updates_PowerShell",
@ -68,6 +298,351 @@
"watchers": 1,
"score": 0
},
{
"id": 234588471,
"name": "CVE-2020-0601",
"full_name": "MarkusZehnle\/CVE-2020-0601",
"owner": {
"login": "MarkusZehnle",
"id": 60010315,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/60010315?v=4",
"html_url": "https:\/\/github.com\/MarkusZehnle"
},
"html_url": "https:\/\/github.com\/MarkusZehnle\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-17T16:24:31Z",
"updated_at": "2020-01-17T16:42:32Z",
"pushed_at": "2020-01-17T16:42:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 234598729,
"name": "CVE-2020-0601",
"full_name": "YoannDqr\/CVE-2020-0601",
"owner": {
"login": "YoannDqr",
"id": 26006989,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26006989?v=4",
"html_url": "https:\/\/github.com\/YoannDqr"
},
"html_url": "https:\/\/github.com\/YoannDqr\/CVE-2020-0601",
"description": "CurveBall CVE exploitation",
"fork": false,
"created_at": "2020-01-17T17:17:55Z",
"updated_at": "2020-02-09T12:37:38Z",
"pushed_at": "2020-01-20T10:52:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 234714299,
"name": "cve-2020-0601-Perl",
"full_name": "thimelp\/cve-2020-0601-Perl",
"owner": {
"login": "thimelp",
"id": 60032194,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/60032194?v=4",
"html_url": "https:\/\/github.com\/thimelp"
},
"html_url": "https:\/\/github.com\/thimelp\/cve-2020-0601-Perl",
"description": "Perl version of recently published scripts to build ECC certificates with specific parameters re CVE-2020-0601",
"fork": false,
"created_at": "2020-01-18T09:58:16Z",
"updated_at": "2020-02-07T23:24:44Z",
"pushed_at": "2020-01-18T12:07:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234920281,
"name": "curveball_lua",
"full_name": "dlee35\/curveball_lua",
"owner": {
"login": "dlee35",
"id": 7849311,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7849311?v=4",
"html_url": "https:\/\/github.com\/dlee35"
},
"html_url": "https:\/\/github.com\/dlee35\/curveball_lua",
"description": "Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffic",
"fork": false,
"created_at": "2020-01-19T15:20:19Z",
"updated_at": "2020-01-19T21:25:55Z",
"pushed_at": "2020-01-19T21:25:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234944443,
"name": "-CVE-2020-0601-ECC---EXPLOIT",
"full_name": "IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"owner": {
"login": "IIICTECH",
"id": 5104528,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5104528?v=4",
"html_url": "https:\/\/github.com\/IIICTECH"
},
"html_url": "https:\/\/github.com\/IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"description": "CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. ",
"fork": false,
"created_at": "2020-01-19T18:20:26Z",
"updated_at": "2020-01-27T17:28:54Z",
"pushed_at": "2020-01-19T18:26:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 235000073,
"name": "CVE-2020-0601",
"full_name": "Ash112121\/CVE-2020-0601",
"owner": {
"login": "Ash112121",
"id": 50549802,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50549802?v=4",
"html_url": "https:\/\/github.com\/Ash112121"
},
"html_url": "https:\/\/github.com\/Ash112121\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-20T02:04:05Z",
"updated_at": "2020-01-20T02:05:22Z",
"pushed_at": "2020-01-20T02:05:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 235145190,
"name": "curveball",
"full_name": "gentilkiwi\/curveball",
"owner": {
"login": "gentilkiwi",
"id": 2307945,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2307945?v=4",
"html_url": "https:\/\/github.com\/gentilkiwi"
},
"html_url": "https:\/\/github.com\/gentilkiwi\/curveball",
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2020-07-09T18:52:50Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 10,
"forks": 10,
"watchers": 63,
"score": 0
},
{
"id": 235858699,
"name": "CurveBall",
"full_name": "Hans-MartinHannibalLauridsen\/CurveBall",
"owner": {
"login": "Hans-MartinHannibalLauridsen",
"id": 19854797,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19854797?v=4",
"html_url": "https:\/\/github.com\/Hans-MartinHannibalLauridsen"
},
"html_url": "https:\/\/github.com\/Hans-MartinHannibalLauridsen\/CurveBall",
"description": "CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall\/ChainOfFools)",
"fork": false,
"created_at": "2020-01-23T18:26:48Z",
"updated_at": "2020-03-15T21:32:59Z",
"pushed_at": "2020-01-28T10:11:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 236119532,
"name": "PoC_CurveBall",
"full_name": "apodlosky\/PoC_CurveBall",
"owner": {
"login": "apodlosky",
"id": 36350051,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/36350051?v=4",
"html_url": "https:\/\/github.com\/apodlosky"
},
"html_url": "https:\/\/github.com\/apodlosky\/PoC_CurveBall",
"description": "PoC for \"CurveBall\" CVE-2020-0601",
"fork": false,
"created_at": "2020-01-25T03:11:36Z",
"updated_at": "2020-02-19T04:00:05Z",
"pushed_at": "2020-02-19T04:00:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 236845131,
"name": "Curveball",
"full_name": "ioncodes\/Curveball",
"owner": {
"login": "ioncodes",
"id": 18533297,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18533297?v=4",
"html_url": "https:\/\/github.com\/ioncodes"
},
"html_url": "https:\/\/github.com\/ioncodes\/Curveball",
"description": "PoC for CVE-2020-0601 - CryptoAPI exploit",
"fork": false,
"created_at": "2020-01-28T21:24:54Z",
"updated_at": "2020-03-24T05:22:40Z",
"pushed_at": "2020-01-28T22:06:57Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 2,
"forks": 2,
"watchers": 16,
"score": 0
},
{
"id": 236884560,
"name": "gringotts",
"full_name": "amlweems\/gringotts",
"owner": {
"login": "amlweems",
"id": 117625,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/117625?v=4",
"html_url": "https:\/\/github.com\/amlweems"
},
"html_url": "https:\/\/github.com\/amlweems\/gringotts",
"description": "proof of concept for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-29T01:59:43Z",
"updated_at": "2020-01-29T02:12:44Z",
"pushed_at": "2020-01-30T20:16:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 237977846,
"name": "CVE-2020-0601",
"full_name": "aloswoya\/CVE-2020-0601",
"owner": {
"login": "aloswoya",
"id": 21354684,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21354684?v=4",
"html_url": "https:\/\/github.com\/aloswoya"
},
"html_url": "https:\/\/github.com\/aloswoya\/CVE-2020-0601",
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll) POC: https:\/\/github.com\/ollypwn\/CurveBall",
"fork": false,
"created_at": "2020-02-03T13:58:07Z",
"updated_at": "2020-02-03T16:30:26Z",
"pushed_at": "2020-02-03T16:30:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 237996900,
"name": "CurveBallDetection",
"full_name": "talbeerysec\/CurveBallDetection",
"owner": {
"login": "talbeerysec",
"id": 25826743,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25826743?v=4",
"html_url": "https:\/\/github.com\/talbeerysec"
},
"html_url": "https:\/\/github.com\/talbeerysec\/CurveBallDetection",
"description": "Resources related to CurveBall (CVE-2020-0601) detection",
"fork": false,
"created_at": "2020-02-03T15:25:54Z",
"updated_at": "2020-02-03T21:05:53Z",
"pushed_at": "2020-02-03T21:05:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 238791221,
"name": "CurveballCertTool",
"full_name": "david4599\/CurveballCertTool",
"owner": {
"login": "david4599",
"id": 29437084,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29437084?v=4",
"html_url": "https:\/\/github.com\/david4599"
},
"html_url": "https:\/\/github.com\/david4599\/CurveballCertTool",
"description": "PoC for CVE-2020-0601 vulnerability (Code Signing)",
"fork": false,
"created_at": "2020-02-06T21:46:31Z",
"updated_at": "2020-02-17T01:12:16Z",
"pushed_at": "2020-02-06T22:04:17Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 241135389,
"name": "CVE-2020-0601-EXP",
"full_name": "eastmountyxz\/CVE-2020-0601-EXP",
"owner": {
"login": "eastmountyxz",
"id": 53172375,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
"html_url": "https:\/\/github.com\/eastmountyxz"
},
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2020-0601-EXP",
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601结合相关资源及文章实现。推荐大家结合作者博客理解ECC算法、Windows验证机制并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者自己确实很菜但希望坚持下去加油",
"fork": false,
"created_at": "2020-02-17T15:01:54Z",
"updated_at": "2020-03-04T09:43:27Z",
"pushed_at": "2020-02-17T16:09:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 241136874,
"name": "CVE-2018-20250-WinRAR",
@ -91,6 +666,29 @@
"watchers": 0,
"score": 0
},
{
"id": 241412565,
"name": "cve-2020-0601_poc",
"full_name": "gremwell\/cve-2020-0601_poc",
"owner": {
"login": "gremwell",
"id": 633734,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/633734?v=4",
"html_url": "https:\/\/github.com\/gremwell"
},
"html_url": "https:\/\/github.com\/gremwell\/cve-2020-0601_poc",
"description": "CVE-2020-0601 proof of concept",
"fork": false,
"created_at": "2020-02-18T16:36:49Z",
"updated_at": "2020-02-19T08:46:38Z",
"pushed_at": "2020-02-19T08:46:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 243353551,
"name": "meetup-2-curveball",

View file

@ -21,5 +21,97 @@
"forks": 2,
"watchers": 31,
"score": 0
},
{
"id": 235899471,
"name": "BlueGate",
"full_name": "ollypwn\/BlueGate",
"owner": {
"login": "ollypwn",
"id": 53348818,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ollypwn"
},
"html_url": "https:\/\/github.com\/ollypwn\/BlueGate",
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-06-30T03:04:32Z",
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 217,
"watchers_count": 217,
"forks_count": 60,
"forks": 60,
"watchers": 217,
"score": 0
},
{
"id": 235935839,
"name": "RDGScanner",
"full_name": "MalwareTech\/RDGScanner",
"owner": {
"login": "MalwareTech",
"id": 7256561,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7256561?v=4",
"html_url": "https:\/\/github.com\/MalwareTech"
},
"html_url": "https:\/\/github.com\/MalwareTech\/RDGScanner",
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
"fork": false,
"created_at": "2020-01-24T03:52:49Z",
"updated_at": "2020-06-01T20:12:51Z",
"pushed_at": "2020-01-26T21:04:27Z",
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 26,
"forks": 26,
"watchers": 66,
"score": 0
},
{
"id": 236030102,
"name": "CVE-2020-0609",
"full_name": "Bechsen\/CVE-2020-0609",
"owner": {
"login": "Bechsen",
"id": 6298298,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6298298?v=4",
"html_url": "https:\/\/github.com\/Bechsen"
},
"html_url": "https:\/\/github.com\/Bechsen\/CVE-2020-0609",
"description": null,
"fork": false,
"created_at": "2020-01-24T15:39:39Z",
"updated_at": "2020-01-28T12:36:06Z",
"pushed_at": "2020-01-28T12:36:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 236072228,
"name": "BlueGate",
"full_name": "ioncodes\/BlueGate",
"owner": {
"login": "ioncodes",
"id": 18533297,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18533297?v=4",
"html_url": "https:\/\/github.com\/ioncodes"
},
"html_url": "https:\/\/github.com\/ioncodes\/BlueGate",
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
"fork": false,
"created_at": "2020-01-24T19:47:45Z",
"updated_at": "2020-06-21T14:18:24Z",
"pushed_at": "2020-01-31T13:49:06Z",
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 16,
"forks": 16,
"watchers": 70,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 240657889,
"name": "CVE-2020-0618",
"full_name": "euphrat1ca\/CVE-2020-0618",
"owner": {
"login": "euphrat1ca",
"id": 23180818,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23180818?v=4",
"html_url": "https:\/\/github.com\/euphrat1ca"
},
"html_url": "https:\/\/github.com\/euphrat1ca\/CVE-2020-0618",
"description": "SQL Server Reporting Services(CVE-2020-0618)中的RCE",
"fork": false,
"created_at": "2020-02-15T06:40:23Z",
"updated_at": "2020-06-30T17:20:05Z",
"pushed_at": "2020-02-15T06:41:54Z",
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 38,
"forks": 38,
"watchers": 179,
"score": 0
},
{
"id": 241408033,
"name": "cve-2020-0618",

View file

@ -13,13 +13,13 @@
"description": "win32k use-after-free poc",
"fork": false,
"created_at": "2020-04-22T13:11:16Z",
"updated_at": "2020-07-02T09:53:04Z",
"updated_at": "2020-07-13T02:05:09Z",
"pushed_at": "2020-04-22T13:11:27Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 32,
"forks": 32,
"watchers": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 33,
"forks": 33,
"watchers": 58,
"score": 0
}
]

View file

@ -22,6 +22,29 @@
"watchers": 44,
"score": 0
},
{
"id": 241809572,
"name": "CVE-2020-0668",
"full_name": "RedCursorSecurityConsulting\/CVE-2020-0668",
"owner": {
"login": "RedCursorSecurityConsulting",
"id": 61265565,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/61265565?v=4",
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting"
},
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting\/CVE-2020-0668",
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-06-17T05:47:12Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 43,
"forks": 43,
"watchers": 170,
"score": 0
},
{
"id": 243248025,
"name": "CVE-2020-0668",

View file

@ -1,4 +1,27 @@
[
{
"id": 235790827,
"name": "CVE-2020-0674",
"full_name": "binaryfigments\/CVE-2020-0674",
"owner": {
"login": "binaryfigments",
"id": 2205121,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2205121?v=4",
"html_url": "https:\/\/github.com\/binaryfigments"
},
"html_url": "https:\/\/github.com\/binaryfigments\/CVE-2020-0674",
"description": "Info about CVE-2020-0674",
"fork": false,
"created_at": "2020-01-23T12:30:51Z",
"updated_at": "2020-03-30T17:27:13Z",
"pushed_at": "2020-01-23T12:54:24Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,
"forks": 7,
"watchers": 14,
"score": 0
},
{
"id": 262167867,
"name": "CVE-2020-0674-Exploit",

25
2020/CVE-2020-0683.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 239812937,
"name": "CVE-2020-0683",
"full_name": "padovah4ck\/CVE-2020-0683",
"owner": {
"login": "padovah4ck",
"id": 13963076,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13963076?v=4",
"html_url": "https:\/\/github.com\/padovah4ck"
},
"html_url": "https:\/\/github.com\/padovah4ck\/CVE-2020-0683",
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2020-07-12T10:07:54Z",
"pushed_at": "2020-02-11T21:34:28Z",
"stargazers_count": 219,
"watchers_count": 219,
"forks_count": 46,
"forks": 46,
"watchers": 219,
"score": 0
}
]

25
2020/CVE-2020-0728.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 240129027,
"name": "CVE-2020-0728",
"full_name": "irsl\/CVE-2020-0728",
"owner": {
"login": "irsl",
"id": 6357121,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6357121?v=4",
"html_url": "https:\/\/github.com\/irsl"
},
"html_url": "https:\/\/github.com\/irsl\/CVE-2020-0728",
"description": "Proof of Concept code for CVE-2020-0728",
"fork": false,
"created_at": "2020-02-12T22:32:28Z",
"updated_at": "2020-06-11T06:10:35Z",
"pushed_at": "2020-02-12T22:50:22Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 9,
"forks": 9,
"watchers": 35,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-07-09T23:28:40Z",
"updated_at": "2020-07-13T00:32:31Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 510,
"watchers_count": 510,
"stargazers_count": 511,
"watchers_count": 511,
"forks_count": 169,
"forks": 169,
"watchers": 510,
"watchers": 511,
"score": 0
},
{
@ -1186,13 +1186,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-07-10T06:47:45Z",
"updated_at": "2020-07-13T02:10:10Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 90,
"forks": 90,
"watchers": 289,
"stargazers_count": 290,
"watchers_count": 290,
"forks_count": 91,
"forks": 91,
"watchers": 290,
"score": 0
},
{
@ -1462,13 +1462,13 @@
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
"fork": false,
"created_at": "2020-07-06T14:45:07Z",
"updated_at": "2020-07-12T19:26:29Z",
"updated_at": "2020-07-12T22:42:23Z",
"pushed_at": "2020-07-06T19:00:06Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE 2020-10135 a.k.a BIAS (Bluetooth Impersonation Attack)",
"fork": false,
"created_at": "2020-06-01T07:36:37Z",
"updated_at": "2020-07-10T13:13:13Z",
"updated_at": "2020-07-13T02:11:41Z",
"pushed_at": "2020-06-07T08:59:47Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"forks": 5,
"watchers": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"forks": 6,
"watchers": 17,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
"fork": false,
"created_at": "2020-06-25T07:35:29Z",
"updated_at": "2020-07-03T06:21:33Z",
"updated_at": "2020-07-13T02:09:47Z",
"pushed_at": "2020-06-25T07:49:34Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 12,
"forks": 12,
"watchers": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 13,
"forks": 13,
"watchers": 49,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Technical Write-Up on and PoC Exploit for CVE-2020-11519 and CVE-2020-11520",
"fork": false,
"created_at": "2020-06-30T23:01:33Z",
"updated_at": "2020-07-11T18:43:38Z",
"updated_at": "2020-07-13T03:00:30Z",
"pushed_at": "2020-07-10T10:39:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

25
2020/CVE-2020-1611.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 235582404,
"name": "CVE-2020-1611",
"full_name": "Ibonok\/CVE-2020-1611",
"owner": {
"login": "Ibonok",
"id": 37837775,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37837775?v=4",
"html_url": "https:\/\/github.com\/Ibonok"
},
"html_url": "https:\/\/github.com\/Ibonok\/CVE-2020-1611",
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
"fork": false,
"created_at": "2020-01-22T13:45:21Z",
"updated_at": "2020-03-20T23:38:03Z",
"pushed_at": "2020-01-22T14:01:32Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"score": 0
}
]

View file

@ -91,6 +91,98 @@
"watchers": 177,
"score": 0
},
{
"id": 242038197,
"name": "CVE-2020-1938",
"full_name": "laolisafe\/CVE-2020-1938",
"owner": {
"login": "laolisafe",
"id": 45027935,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/45027935?v=4",
"html_url": "https:\/\/github.com\/laolisafe"
},
"html_url": "https:\/\/github.com\/laolisafe\/CVE-2020-1938",
"description": "CVE-2020-1938漏洞复现",
"fork": false,
"created_at": "2020-02-21T02:36:37Z",
"updated_at": "2020-06-07T14:08:16Z",
"pushed_at": "2020-02-21T02:49:57Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 10,
"forks": 10,
"watchers": 30,
"score": 0
},
{
"id": 242054816,
"name": "CVE-2020-1938",
"full_name": "DaemonShao\/CVE-2020-1938",
"owner": {
"login": "DaemonShao",
"id": 24861334,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24861334?v=4",
"html_url": "https:\/\/github.com\/DaemonShao"
},
"html_url": "https:\/\/github.com\/DaemonShao\/CVE-2020-1938",
"description": null,
"fork": false,
"created_at": "2020-02-21T04:34:40Z",
"updated_at": "2020-02-21T08:05:08Z",
"pushed_at": "2020-02-21T04:40:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 242083141,
"name": "CVE-2020-1938-Tomact-file_include-file_read",
"full_name": "sv3nbeast\/CVE-2020-1938-Tomact-file_include-file_read",
"owner": {
"login": "sv3nbeast",
"id": 55974091,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/55974091?v=4",
"html_url": "https:\/\/github.com\/sv3nbeast"
},
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-1938-Tomact-file_include-file_read",
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
"fork": false,
"created_at": "2020-02-21T07:48:50Z",
"updated_at": "2020-06-29T23:15:55Z",
"pushed_at": "2020-02-21T10:19:52Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"forks": 10,
"watchers": 15,
"score": 0
},
{
"id": 242093081,
"name": "CVE-2020-1938",
"full_name": "fairyming\/CVE-2020-1938",
"owner": {
"login": "fairyming",
"id": 44915879,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/44915879?v=4",
"html_url": "https:\/\/github.com\/fairyming"
},
"html_url": "https:\/\/github.com\/fairyming\/CVE-2020-1938",
"description": "在一定条件下可执行命令",
"fork": false,
"created_at": "2020-02-21T08:42:50Z",
"updated_at": "2020-05-18T10:43:38Z",
"pushed_at": "2020-02-21T08:45:51Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"forks": 6,
"watchers": 4,
"score": 0
},
{
"id": 242107452,
"name": "CVE-2020-1938",

View file

@ -13,13 +13,36 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-12T03:46:58Z",
"updated_at": "2020-07-13T02:48:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 494,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 122,
"forks": 122,
"watchers": 496,
"score": 0
},
{
"id": 234696172,
"name": "CVE-2020-2551",
"full_name": "jas502n\/CVE-2020-2551",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-2551",
"description": "Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-18T07:08:06Z",
"updated_at": "2020-07-06T15:54:23Z",
"pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 13,
"forks": 13,
"watchers": 76,
"score": 0
},
{

25
2020/CVE-2020-2655.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 233879183,
"name": "CVE-2020-2655-DemoServer",
"full_name": "RUB-NDS\/CVE-2020-2655-DemoServer",
"owner": {
"login": "RUB-NDS",
"id": 11559003,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11559003?v=4",
"html_url": "https:\/\/github.com\/RUB-NDS"
},
"html_url": "https:\/\/github.com\/RUB-NDS\/CVE-2020-2655-DemoServer",
"description": null,
"fork": false,
"created_at": "2020-01-14T15:59:48Z",
"updated_at": "2020-03-20T23:04:07Z",
"pushed_at": "2020-01-20T10:45:47Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2020-07-10T01:01:26Z",
"updated_at": "2020-07-13T02:00:47Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 25,
"forks": 25,
"watchers": 130,
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 26,
"forks": 26,
"watchers": 131,
"score": 0
},
{

25
2020/CVE-2020-3833.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 235952111,
"name": "Safari-Address-Bar-Spoof-CVE-2020-3833-",
"full_name": "c0d3G33k\/Safari-Address-Bar-Spoof-CVE-2020-3833-",
"owner": {
"login": "c0d3G33k",
"id": 16446505,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16446505?v=4",
"html_url": "https:\/\/github.com\/c0d3G33k"
},
"html_url": "https:\/\/github.com\/c0d3G33k\/Safari-Address-Bar-Spoof-CVE-2020-3833-",
"description": null,
"fork": false,
"created_at": "2020-01-24T06:35:07Z",
"updated_at": "2020-03-21T18:41:33Z",
"pushed_at": "2020-01-24T06:49:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
"fork": false,
"created_at": "2020-06-01T18:26:32Z",
"updated_at": "2020-07-12T16:30:28Z",
"updated_at": "2020-07-13T02:11:27Z",
"pushed_at": "2020-06-02T08:30:22Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 25,
"forks": 25,
"watchers": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 26,
"forks": 26,
"watchers": 63,
"score": 0
}
]

25
2020/CVE-2020-5236.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 238621679,
"name": "CVE-2020-5236",
"full_name": "motikan2010\/CVE-2020-5236",
"owner": {
"login": "motikan2010",
"id": 3177297,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3177297?v=4",
"html_url": "https:\/\/github.com\/motikan2010"
},
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2020-5236",
"description": "Waitress 1.4.2 ReDoS - CVE-2020-5236 (Blog Sample Code)",
"fork": false,
"created_at": "2020-02-06T06:21:02Z",
"updated_at": "2020-05-18T10:43:36Z",
"pushed_at": "2020-02-06T09:45:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

25
2020/CVE-2020-5398.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 234478120,
"name": "CVE-2020-5398",
"full_name": "motikan2010\/CVE-2020-5398",
"owner": {
"login": "motikan2010",
"id": 3177297,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3177297?v=4",
"html_url": "https:\/\/github.com\/motikan2010"
},
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2020-5398",
"description": "💣CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false,
"created_at": "2020-01-17T05:35:01Z",
"updated_at": "2020-06-29T16:31:20Z",
"pushed_at": "2020-01-22T04:58:59Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 16,
"forks": 16,
"watchers": 62,
"score": 0
}
]

25
2020/CVE-2020-5509.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 231982886,
"name": "CVE-2020-5509",
"full_name": "FULLSHADE\/CVE-2020-5509",
"owner": {
"login": "FULLSHADE",
"id": 54753063,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54753063?v=4",
"html_url": "https:\/\/github.com\/FULLSHADE"
},
"html_url": "https:\/\/github.com\/FULLSHADE\/CVE-2020-5509",
"description": "Car Rental Project v.1.0 Remote Code Execution",
"fork": false,
"created_at": "2020-01-05T22:13:24Z",
"updated_at": "2020-06-26T14:46:10Z",
"pushed_at": "2020-01-05T22:23:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-12T13:48:54Z",
"updated_at": "2020-07-13T02:46:11Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1222,
"watchers_count": 1222,
"stargazers_count": 1228,
"watchers_count": 1228,
"forks_count": 309,
"forks": 309,
"watchers": 1222,
"watchers": 1228,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-07-12T15:19:51Z",
"updated_at": "2020-07-13T02:46:05Z",
"pushed_at": "2020-07-07T09:36:24Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 80,
"forks": 80,
"watchers": 271,
"watchers": 272,
"score": 0
},
{
@ -427,13 +427,13 @@
"description": "批量扫描CVE-2020-5902远程代码执行已测试",
"fork": false,
"created_at": "2020-07-06T09:16:36Z",
"updated_at": "2020-07-12T07:53:49Z",
"updated_at": "2020-07-13T02:49:12Z",
"pushed_at": "2020-07-09T09:24:55Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -979,13 +979,13 @@
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
"fork": false,
"created_at": "2020-07-10T15:33:00Z",
"updated_at": "2020-07-12T10:36:22Z",
"updated_at": "2020-07-13T02:26:34Z",
"pushed_at": "2020-07-12T10:36:20Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
},
{

25
2020/CVE-2020-72381.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 236367767,
"name": "CVE-2020-72381",
"full_name": "jdordonezn\/CVE-2020-72381",
"owner": {
"login": "jdordonezn",
"id": 20976774,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20976774?v=4",
"html_url": "https:\/\/github.com\/jdordonezn"
},
"html_url": "https:\/\/github.com\/jdordonezn\/CVE-2020-72381",
"description": null,
"fork": false,
"created_at": "2020-01-26T19:56:34Z",
"updated_at": "2020-01-26T19:56:34Z",
"pushed_at": "2020-01-26T19:56:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

71
2020/CVE-2020-7247.json Normal file
View file

@ -0,0 +1,71 @@
[
{
"id": 237289178,
"name": "cve-2020-7247-exploit",
"full_name": "FiroSolutions\/cve-2020-7247-exploit",
"owner": {
"login": "FiroSolutions",
"id": 43434507,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43434507?v=4",
"html_url": "https:\/\/github.com\/FiroSolutions"
},
"html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit",
"description": "Python exploit of cve-2020-7247",
"fork": false,
"created_at": "2020-01-30T19:29:27Z",
"updated_at": "2020-06-29T16:29:30Z",
"pushed_at": "2020-02-19T10:55:15Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,
"forks": 8,
"watchers": 15,
"score": 0
},
{
"id": 241011451,
"name": "cve-2020-7247",
"full_name": "superzerosec\/cve-2020-7247",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/cve-2020-7247",
"description": "OpenSMTPD version 6.6.2 remote code execution exploit",
"fork": false,
"created_at": "2020-02-17T03:28:09Z",
"updated_at": "2020-05-17T23:55:06Z",
"pushed_at": "2020-02-18T06:57:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 241337606,
"name": "CVE-2020-7247",
"full_name": "r0lh\/CVE-2020-7247",
"owner": {
"login": "r0lh",
"id": 51697374,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51697374?v=4",
"html_url": "https:\/\/github.com\/r0lh"
},
"html_url": "https:\/\/github.com\/r0lh\/CVE-2020-7247",
"description": "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2",
"fork": false,
"created_at": "2020-02-18T10:52:38Z",
"updated_at": "2020-03-28T19:05:22Z",
"pushed_at": "2020-02-18T11:08:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 239774776,
"name": "CVE-2020-7471",
"full_name": "Saferman\/CVE-2020-7471",
"owner": {
"login": "Saferman",
"id": 17509858,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/17509858?v=4",
"html_url": "https:\/\/github.com\/Saferman"
},
"html_url": "https:\/\/github.com\/Saferman\/CVE-2020-7471",
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2020-07-04T07:47:07Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 18,
"forks": 18,
"watchers": 86,
"score": 0
},
{
"id": 240205875,
"name": "DjVul_StringAgg",
@ -21,5 +44,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 242260909,
"name": "CVE-2020-7471",
"full_name": "SNCKER\/CVE-2020-7471",
"owner": {
"login": "SNCKER",
"id": 49559334,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49559334?v=4",
"html_url": "https:\/\/github.com\/SNCKER"
},
"html_url": "https:\/\/github.com\/SNCKER\/CVE-2020-7471",
"description": "CVE-2020-7471 Potential SQL injection via StringAgg(delimiter)",
"fork": false,
"created_at": "2020-02-22T01:32:40Z",
"updated_at": "2020-02-22T01:42:24Z",
"pushed_at": "2020-02-22T01:42:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

48
2020/CVE-2020-7799.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 239452179,
"name": "cve-2020-7799",
"full_name": "Pikaqi\/cve-2020-7799",
"owner": {
"login": "Pikaqi",
"id": 29857108,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29857108?v=4",
"html_url": "https:\/\/github.com\/Pikaqi"
},
"html_url": "https:\/\/github.com\/Pikaqi\/cve-2020-7799",
"description": "批量检测cve-2020-7799",
"fork": false,
"created_at": "2020-02-10T07:27:21Z",
"updated_at": "2020-02-10T08:08:44Z",
"pushed_at": "2020-02-10T08:08:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 241617298,
"name": "CVE-2020-7799",
"full_name": "ianxtianxt\/CVE-2020-7799",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt"
},
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2020-7799",
"description": null,
"fork": false,
"created_at": "2020-02-19T12:33:24Z",
"updated_at": "2020-07-03T03:51:28Z",
"pushed_at": "2020-02-19T12:33:57Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

25
2020/CVE-2020-7980.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 236865005,
"name": "Satellian-CVE-2020-7980",
"full_name": "Xh4H\/Satellian-CVE-2020-7980",
"owner": {
"login": "Xh4H",
"id": 20613820,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20613820?v=4",
"html_url": "https:\/\/github.com\/Xh4H"
},
"html_url": "https:\/\/github.com\/Xh4H\/Satellian-CVE-2020-7980",
"description": "PoC script that shows RCE vulnerability over Intellian Satellite controller",
"fork": false,
"created_at": "2020-01-28T23:27:20Z",
"updated_at": "2020-06-17T10:34:57Z",
"pushed_at": "2020-01-30T11:42:26Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 8,
"forks": 8,
"watchers": 45,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Citrix ADC Vulns",
"fork": false,
"created_at": "2020-07-10T20:00:17Z",
"updated_at": "2020-07-12T16:51:29Z",
"updated_at": "2020-07-13T02:39:16Z",
"pushed_at": "2020-07-10T21:03:20Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 5,
"forks": 5,
"watchers": 34,
"watchers": 36,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-12T13:05:40Z",
"updated_at": "2020-07-12T13:32:51Z",
"updated_at": "2020-07-13T02:33:46Z",
"pushed_at": "2020-07-12T13:10:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 8,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 242176659,
"name": "CVE-2020-8840",
"full_name": "jas502n\/CVE-2020-8840",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-8840",
"description": "FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-21T15:58:25Z",
"updated_at": "2020-06-23T06:51:59Z",
"pushed_at": "2020-02-21T16:03:28Z",
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 13,
"forks": 13,
"watchers": 66,
"score": 0
},
{
"id": 242452403,
"name": "FastJson1.2.62-RCE",

331
README.md
View file

@ -8,6 +8,7 @@ In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bou
</code>
- [marcinguy/CVE-2020-0022](https://github.com/marcinguy/CVE-2020-0022)
- [leommxj/cve-2020-0022](https://github.com/leommxj/cve-2020-0022)
### CVE-2020-0041
@ -75,10 +76,36 @@ Race condition in the Intel(R) Driver and Support Assistant before version 20.1.
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
</code>
- [nissan-sudo/CVE-2020-0601](https://github.com/nissan-sudo/CVE-2020-0601)
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
- [ollypwn/CurveBall](https://github.com/ollypwn/CurveBall)
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
- [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601)
- [apmunch/CVE-2020-0601](https://github.com/apmunch/CVE-2020-0601)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
- [Doug-Moody/Windows10_Cumulative_Updates_PowerShell](https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell)
- [MarkusZehnle/CVE-2020-0601](https://github.com/MarkusZehnle/CVE-2020-0601)
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
- [thimelp/cve-2020-0601-Perl](https://github.com/thimelp/cve-2020-0601-Perl)
- [dlee35/curveball_lua](https://github.com/dlee35/curveball_lua)
- [IIICTECH/-CVE-2020-0601-ECC---EXPLOIT](https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT)
- [Ash112121/CVE-2020-0601](https://github.com/Ash112121/CVE-2020-0601)
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
- [ioncodes/Curveball](https://github.com/ioncodes/Curveball)
- [amlweems/gringotts](https://github.com/amlweems/gringotts)
- [aloswoya/CVE-2020-0601](https://github.com/aloswoya/CVE-2020-0601)
- [talbeerysec/CurveBallDetection](https://github.com/talbeerysec/CurveBallDetection)
- [david4599/CurveballCertTool](https://github.com/david4599/CurveballCertTool)
- [eastmountyxz/CVE-2020-0601-EXP](https://github.com/eastmountyxz/CVE-2020-0601-EXP)
- [eastmountyxz/CVE-2018-20250-WinRAR](https://github.com/eastmountyxz/CVE-2018-20250-WinRAR)
- [gremwell/cve-2020-0601_poc](https://github.com/gremwell/cve-2020-0601_poc)
- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball)
- [NishantRanjantech/CVE-2020-0601-spoofkey](https://github.com/NishantRanjantech/CVE-2020-0601-spoofkey)
- [ShayNehmad/twoplustwo](https://github.com/ShayNehmad/twoplustwo)
@ -90,6 +117,10 @@ A remote code execution vulnerability exists in Windows Remote Desktop Gateway (
</code>
- [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609)
- [ollypwn/BlueGate](https://github.com/ollypwn/BlueGate)
- [MalwareTech/RDGScanner](https://github.com/MalwareTech/RDGScanner)
- [Bechsen/CVE-2020-0609](https://github.com/Bechsen/CVE-2020-0609)
- [ioncodes/BlueGate](https://github.com/ioncodes/BlueGate)
### CVE-2020-0618
@ -97,6 +128,7 @@ A remote code execution vulnerability exists in Windows Remote Desktop Gateway (
A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'.
</code>
- [euphrat1ca/CVE-2020-0618](https://github.com/euphrat1ca/CVE-2020-0618)
- [wortell/cve-2020-0618](https://github.com/wortell/cve-2020-0618)
### CVE-2020-0624
@ -114,6 +146,7 @@ An elevation of privilege vulnerability exists in the way that the Windows Kerne
</code>
- [itm4n/SysTracingPoc](https://github.com/itm4n/SysTracingPoc)
- [RedCursorSecurityConsulting/CVE-2020-0668](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
- [Nan3r/CVE-2020-0668](https://github.com/Nan3r/CVE-2020-0668)
### CVE-2020-0674
@ -122,8 +155,17 @@ An elevation of privilege vulnerability exists in the way that the Windows Kerne
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
</code>
- [binaryfigments/CVE-2020-0674](https://github.com/binaryfigments/CVE-2020-0674)
- [maxpl0it/CVE-2020-0674-Exploit](https://github.com/maxpl0it/CVE-2020-0674-Exploit)
### CVE-2020-0683
<code>
An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0686.
</code>
- [padovah4ck/CVE-2020-0683](https://github.com/padovah4ck/CVE-2020-0683)
### CVE-2020-0688
<code>
@ -154,6 +196,14 @@ A remote code execution vulnerability exists when the Windows Imaging Library im
- [asc0t6e/CVE-2020-0708](https://github.com/asc0t6e/CVE-2020-0708)
### CVE-2020-0728
<code>
An information vulnerability exists when Windows Modules Installer Service improperly discloses file information, aka 'Windows Modules Installer Service Information Disclosure Vulnerability'.
</code>
- [irsl/CVE-2020-0728](https://github.com/irsl/CVE-2020-0728)
### CVE-2020-0753
<code>
@ -343,6 +393,14 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [P1kAju/CVE-2020-1301](https://github.com/P1kAju/CVE-2020-1301)
- [shubham0d/CVE-2020-1301](https://github.com/shubham0d/CVE-2020-1301)
### CVE-2020-1611
<code>
A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
</code>
- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611)
### CVE-2020-1764
<code>
@ -361,6 +419,10 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [xindongzhuaizhuai/CVE-2020-1938](https://github.com/xindongzhuaizhuai/CVE-2020-1938)
- [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC)
- [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner)
- [laolisafe/CVE-2020-1938](https://github.com/laolisafe/CVE-2020-1938)
- [DaemonShao/CVE-2020-1938](https://github.com/DaemonShao/CVE-2020-1938)
- [sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read](https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read)
- [fairyming/CVE-2020-1938](https://github.com/fairyming/CVE-2020-1938)
- [dacade/CVE-2020-1938](https://github.com/dacade/CVE-2020-1938)
- [woaiqiukui/CVE-2020-1938TomcatAjpScanner](https://github.com/woaiqiukui/CVE-2020-1938TomcatAjpScanner)
- [fatal0/tomcat-cve-2020-1938-check](https://github.com/fatal0/tomcat-cve-2020-1938-check)
@ -425,6 +487,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
</code>
- [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner)
- [jas502n/CVE-2020-2551](https://github.com/jas502n/CVE-2020-2551)
- [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551)
- [0nise/CVE-2020-2551](https://github.com/0nise/CVE-2020-2551)
- [Y4er/CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551)
@ -444,6 +507,14 @@ Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (compo
- [Y4er/CVE-2020-2555](https://github.com/Y4er/CVE-2020-2555)
- [Maskhe/cve-2020-2555](https://github.com/Maskhe/cve-2020-2555)
### CVE-2020-2655
<code>
Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
</code>
- [RUB-NDS/CVE-2020-2655-DemoServer](https://github.com/RUB-NDS/CVE-2020-2655-DemoServer)
### CVE-2020-2883
<code>
@ -472,6 +543,14 @@ Adobe Genuine Integrity Service versions Version 6.4 and earlier have an insecur
- [hessandrew/CVE-2020-3766_APSB20-12](https://github.com/hessandrew/CVE-2020-3766_APSB20-12)
### CVE-2020-3833
<code>
An inconsistent user interface issue was addressed with improved state management. This issue is fixed in Safari 13.0.5. Visiting a malicious website may lead to address bar spoofing.
</code>
- [c0d3G33k/Safari-Address-Bar-Spoof-CVE-2020-3833-](https://github.com/c0d3G33k/Safari-Address-Bar-Spoof-CVE-2020-3833-)
### CVE-2020-3952
<code>
@ -500,6 +579,14 @@ IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional is vulnerabl
- [mekoko/CVE-2020-4276](https://github.com/mekoko/CVE-2020-4276)
### CVE-2020-5236
<code>
Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains invalid characters. When a header like &quot;Bad-header: xxxxxxxxxxxxxxx\x10&quot; is received, it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions. This allows an attacker to send a single request with an invalid header and take the service offline. This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230. The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible.
</code>
- [motikan2010/CVE-2020-5236](https://github.com/motikan2010/CVE-2020-5236)
### CVE-2020-5250
<code>
@ -534,6 +621,14 @@ In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulne
- [GUI/legacy-rails-CVE-2020-5267-patch](https://github.com/GUI/legacy-rails-CVE-2020-5267-patch)
### CVE-2020-5398
<code>
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a &quot;Content-Disposition&quot; header in the response where the filename attribute is derived from user supplied input.
</code>
- [motikan2010/CVE-2020-5398](https://github.com/motikan2010/CVE-2020-5398)
### CVE-2020-5410
<code>
@ -543,6 +638,14 @@ Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.
- [dead5nd/config-demo](https://github.com/dead5nd/config-demo)
- [osamahamad/CVE-2020-5410-POC](https://github.com/osamahamad/CVE-2020-5410-POC)
### CVE-2020-5509
<code>
PHPGurukul Car Rental Project v1.0 allows Remote Code Execution via an executable file in an upload of a new profile image.
</code>
- [FULLSHADE/CVE-2020-5509](https://github.com/FULLSHADE/CVE-2020-5509)
### CVE-2020-5837
<code>
@ -655,13 +758,25 @@ A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An a
- [lnxcrew/CVE-2020-7246](https://github.com/lnxcrew/CVE-2020-7246)
### CVE-2020-7247
<code>
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the &quot;uncommented&quot; default configuration. The issue exists because of an incorrect return value upon failure of input validation.
</code>
- [FiroSolutions/cve-2020-7247-exploit](https://github.com/FiroSolutions/cve-2020-7247-exploit)
- [superzerosec/cve-2020-7247](https://github.com/superzerosec/cve-2020-7247)
- [r0lh/CVE-2020-7247](https://github.com/r0lh/CVE-2020-7247)
### CVE-2020-7471
<code>
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
</code>
- [Saferman/CVE-2020-7471](https://github.com/Saferman/CVE-2020-7471)
- [secoba/DjVul_StringAgg](https://github.com/secoba/DjVul_StringAgg)
- [SNCKER/CVE-2020-7471](https://github.com/SNCKER/CVE-2020-7471)
### CVE-2020-7473
@ -679,6 +794,15 @@ Incorrect handling of Upgrade header with the value websocket leads in crashing
- [andsnw/sockjs-dos-py](https://github.com/andsnw/sockjs-dos-py)
### CVE-2020-7799
<code>
An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -&gt; Settings -&gt; Email Templates) or themes (Home -&gt; Settings -&gt; Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates.
</code>
- [Pikaqi/cve-2020-7799](https://github.com/Pikaqi/cve-2020-7799)
- [ianxtianxt/CVE-2020-7799](https://github.com/ianxtianxt/CVE-2020-7799)
### CVE-2020-7931
<code>
@ -697,6 +821,14 @@ Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows
- [TheSysOwner/CVE-2020-7961-payloads](https://github.com/TheSysOwner/CVE-2020-7961-payloads)
- [wcxxxxx/CVE-2020-7961](https://github.com/wcxxxxx/CVE-2020-7961)
### CVE-2020-7980
<code>
Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.
</code>
- [Xh4H/Satellian-CVE-2020-7980](https://github.com/Xh4H/Satellian-CVE-2020-7980)
### CVE-2020-8004
<code>
@ -833,6 +965,7 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
</code>
- [jas502n/CVE-2020-8840](https://github.com/jas502n/CVE-2020-8840)
- [Wfzsec/FastJson1.2.62-RCE](https://github.com/Wfzsec/FastJson1.2.62-RCE)
- [fairyming/CVE-2020-8840](https://github.com/fairyming/CVE-2020-8840)
- [0nise/CVE-2020-8840](https://github.com/0nise/CVE-2020-8840)
@ -1449,6 +1582,9 @@ A user enumeration vulnerability flaw was found in Venki Supravizio BPM 10.1.2.
- [inflixim4be/CVE-2020-15392](https://github.com/inflixim4be/CVE-2020-15392)
### CVE-2020-72381
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
### CVE-2020-123456789
- [mrknow001/CVE-2020-123456789](https://github.com/mrknow001/CVE-2020-123456789)
@ -1468,6 +1604,7 @@ Insufficient validation of environment variables in the telnet client supplied i
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.
</code>
- [mpgn/CVE-2019-0192](https://github.com/mpgn/CVE-2019-0192)
- [Rapidsafeguard/Solr-RCE-CVE-2019-0192](https://github.com/Rapidsafeguard/Solr-RCE-CVE-2019-0192)
### CVE-2019-0193
@ -1476,6 +1613,7 @@ In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's &quot;dataConfig&quot; parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property &quot;enable.dih.dataConfigParam&quot; to true.
</code>
- [xConsoIe/CVE-2019-0193](https://github.com/xConsoIe/CVE-2019-0193)
- [jas502n/CVE-2019-0193](https://github.com/jas502n/CVE-2019-0193)
- [1135/solr_exploit](https://github.com/1135/solr_exploit)
- [jaychouzzk/CVE-2019-0193-exp](https://github.com/jaychouzzk/CVE-2019-0193-exp)
@ -1521,6 +1659,7 @@ A remote code execution vulnerability exists in the way that the Chakra scriptin
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594.
</code>
- [linhlhq/CVE-2019-0604](https://github.com/linhlhq/CVE-2019-0604)
- [denmilu/CVE-2019-0604_sharepoint_CVE](https://github.com/denmilu/CVE-2019-0604_sharepoint_CVE)
- [k8gege/CVE-2019-0604](https://github.com/k8gege/CVE-2019-0604)
- [m5050/CVE-2019-0604](https://github.com/m5050/CVE-2019-0604)
@ -1701,6 +1840,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797.
</code>
- [ze0r/cve-2019-0808-poc](https://github.com/ze0r/cve-2019-0808-poc)
- [rakesh143/CVE-2019-0808](https://github.com/rakesh143/CVE-2019-0808)
- [exodusintel/CVE-2019-0808](https://github.com/exodusintel/CVE-2019-0808)
- [DreamoneOnly/CVE-2019-0808-32-64-exp](https://github.com/DreamoneOnly/CVE-2019-0808-32-64-exp)
@ -1852,6 +1992,14 @@ An elevation of privilege vulnerability exists when Windows Error Reporting mana
- [Mayter/CVE-2019-1315](https://github.com/Mayter/CVE-2019-1315)
### CVE-2019-1351
<code>
A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.
</code>
- [JonasDL/PruebaCVE20191351](https://github.com/JonasDL/PruebaCVE20191351)
### CVE-2019-1367
<code>
@ -1928,12 +2076,21 @@ Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier
- [securifera/CVE-2019-1579](https://github.com/securifera/CVE-2019-1579)
### CVE-2019-1652
<code>
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
</code>
- [0x27/CiscoRV320Dump](https://github.com/0x27/CiscoRV320Dump)
### CVE-2019-1653
<code>
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
</code>
- [dubfr33/CVE-2019-1653](https://github.com/dubfr33/CVE-2019-1653)
- [shaheemirza/CiscoSpill](https://github.com/shaheemirza/CiscoSpill)
### CVE-2019-1759
@ -1952,6 +2109,14 @@ A vulnerability in the web-based management interface of Cisco Prime Infrastruct
- [k8gege/CiscoExploit](https://github.com/k8gege/CiscoExploit)
### CVE-2019-1987
<code>
In onSetSampleX of SkSwizzler.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-118143775.
</code>
- [marcinguy/android-7-9-png-bug](https://github.com/marcinguy/android-7-9-png-bug)
### CVE-2019-2107
<code>
@ -2124,6 +2289,15 @@ Confluence Server and Data Center had a path traversal vulnerability in the down
- [superevr/cve-2019-3398](https://github.com/superevr/cve-2019-3398)
### CVE-2019-3462
<code>
Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
</code>
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
### CVE-2019-3663
<code>
@ -2194,6 +2368,9 @@ An exploitable code execution vulnerability exists in the processing of multi-pa
There is a File Content Disclosure vulnerability in Action View &lt;5.2.2.1, &lt;5.1.6.2, &lt;5.0.7.2, &lt;4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
</code>
- [mpgn/CVE-2019-5418](https://github.com/mpgn/CVE-2019-5418)
- [omarkurt/CVE-2019-5418](https://github.com/omarkurt/CVE-2019-5418)
- [brompwnie/CVE-2019-5418-Scanner](https://github.com/brompwnie/CVE-2019-5418-Scanner)
- [mpgn/Rails-doubletap-RCE](https://github.com/mpgn/Rails-doubletap-RCE)
- [takeokunn/CVE-2019-5418](https://github.com/takeokunn/CVE-2019-5418)
- [Bad3r/RailroadBandit](https://github.com/Bad3r/RailroadBandit)
@ -2206,6 +2383,7 @@ There is a File Content Disclosure vulnerability in Action View &lt;5.2.2.1, &lt
A remote code execution vulnerability in development mode Rails &lt;5.2.2.1, &lt;6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
</code>
- [knqyf263/CVE-2019-5420](https://github.com/knqyf263/CVE-2019-5420)
- [cved-sources/cve-2019-5420](https://github.com/cved-sources/cve-2019-5420)
### CVE-2019-5475
@ -2255,7 +2433,17 @@ NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vu
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
</code>
- [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc)
- [Frichetten/CVE-2019-5736-PoC](https://github.com/Frichetten/CVE-2019-5736-PoC)
- [jas502n/CVE-2019-5736](https://github.com/jas502n/CVE-2019-5736)
- [denmilu/CVE-2019-5736](https://github.com/denmilu/CVE-2019-5736)
- [denmilu/cve-2019-5736-poc](https://github.com/denmilu/cve-2019-5736-poc)
- [agppp/cve-2019-5736-poc](https://github.com/agppp/cve-2019-5736-poc)
- [ebdecastro/poc-cve-2019-5736](https://github.com/ebdecastro/poc-cve-2019-5736)
- [twistlock/RunC-CVE-2019-5736](https://github.com/twistlock/RunC-CVE-2019-5736)
- [yyqs2008/CVE-2019-5736-PoC-2](https://github.com/yyqs2008/CVE-2019-5736-PoC-2)
- [zyriuse75/CVE-2019-5736-PoC](https://github.com/zyriuse75/CVE-2019-5736-PoC)
- [stillan00b/CVE-2019-5736](https://github.com/stillan00b/CVE-2019-5736)
- [milloni/cve-2019-5736-exp](https://github.com/milloni/cve-2019-5736-exp)
- [13paulmurith/Docker-Runc-Exploit](https://github.com/13paulmurith/Docker-Runc-Exploit)
- [RyanNgWH/CVE-2019-5736-POC](https://github.com/RyanNgWH/CVE-2019-5736-POC)
@ -2267,6 +2455,22 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
- [shen54/IT19172088](https://github.com/shen54/IT19172088)
### CVE-2019-5737
<code>
In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.
</code>
- [beelzebruh/cve-2019-5737](https://github.com/beelzebruh/cve-2019-5737)
### CVE-2019-5786
<code>
Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
</code>
- [exodusintel/CVE-2019-5786](https://github.com/exodusintel/CVE-2019-5786)
### CVE-2019-5822
<code>
@ -2283,6 +2487,14 @@ Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed
- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825)
### CVE-2019-5893
<code>
Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.
</code>
- [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection)
### CVE-2019-6111
<code>
@ -2315,7 +2527,17 @@ An out-of-bounds read issue existed that led to the disclosure of kernel memory.
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges.
</code>
- [fatgrass/OsirisJailbreak12](https://github.com/fatgrass/OsirisJailbreak12)
- [TrungNguyen1909/CVE-2019-6225-macOS](https://github.com/TrungNguyen1909/CVE-2019-6225-macOS)
- [raystyle/jailbreak-iOS12](https://github.com/raystyle/jailbreak-iOS12)
### CVE-2019-6249
<code>
An issue was discovered in HuCart v5.7.4. There is a CSRF vulnerability that can add an admin account via /adminsys/index.php?load=admins&amp;act=edit_info&amp;act_type=add.
</code>
- [NMTech0x90/CVE-2019-6249_Hucart-cms](https://github.com/NMTech0x90/CVE-2019-6249_Hucart-cms)
### CVE-2019-6260
@ -2325,6 +2547,14 @@ The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and
- [amboar/cve-2019-6260](https://github.com/amboar/cve-2019-6260)
### CVE-2019-6263
<code>
An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS.
</code>
- [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC)
### CVE-2019-6329
<code>
@ -2339,8 +2569,22 @@ HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege a
Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)
</code>
- [g0rx/Drupal-SA-CORE-2019-003](https://github.com/g0rx/Drupal-SA-CORE-2019-003)
- [knqyf263/CVE-2019-6340](https://github.com/knqyf263/CVE-2019-6340)
- [DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass](https://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass)
- [oways/CVE-2019-6340](https://github.com/oways/CVE-2019-6340)
- [cved-sources/cve-2019-6340](https://github.com/cved-sources/cve-2019-6340)
- [d1vious/cve-2019-6340-bits](https://github.com/d1vious/cve-2019-6340-bits)
- [jas502n/CVE-2019-6340](https://github.com/jas502n/CVE-2019-6340)
### CVE-2019-6440
<code>
Zemana AntiMalware before 3.0.658 Beta mishandles update logic.
</code>
- [hexnone/CVE-2019-6440](https://github.com/hexnone/CVE-2019-6440)
### CVE-2019-6446
<code>
@ -2355,6 +2599,7 @@ Some field types do not properly sanitize data from non-form sources in Drupal 8
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
</code>
- [fs0c131y/ESFileExplorerOpenPortVuln](https://github.com/fs0c131y/ESFileExplorerOpenPortVuln)
- [SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447](https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447)
### CVE-2019-6453
@ -2363,6 +2608,7 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
</code>
- [proofofcalc/cve-2019-6453-poc](https://github.com/proofofcalc/cve-2019-6453-poc)
- [andripwn/mIRC-CVE-2019-6453](https://github.com/andripwn/mIRC-CVE-2019-6453)
### CVE-2019-6467
@ -2373,6 +2619,14 @@ A programming error in the nxdomain-redirect feature can cause an assertion fail
- [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467)
### CVE-2019-6487
<code>
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
</code>
- [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC)
### CVE-2019-6690
<code>
@ -2399,6 +2653,14 @@ This improper access control vulnerability allows remote attackers to gain unaut
- [cycraft-corp/cve-2019-7192-check](https://github.com/cycraft-corp/cve-2019-7192-check)
- [th3gundy/CVE-2019-7192_QNAP_Exploit](https://github.com/th3gundy/CVE-2019-7192_QNAP_Exploit)
### CVE-2019-7216
<code>
An issue was discovered in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php.
</code>
- [Ekultek/CVE-2019-7216](https://github.com/Ekultek/CVE-2019-7216)
### CVE-2019-7219
<code>
@ -2413,6 +2675,7 @@ Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
</code>
- [mpgn/CVE-2019-7238](https://github.com/mpgn/CVE-2019-7238)
- [jas502n/CVE-2019-7238](https://github.com/jas502n/CVE-2019-7238)
- [verctor/nexus_rce_CVE-2019-7238](https://github.com/verctor/nexus_rce_CVE-2019-7238)
- [magicming200/CVE-2019-7238_Nexus_RCE_Tool](https://github.com/magicming200/CVE-2019-7238_Nexus_RCE_Tool)
@ -2424,6 +2687,7 @@ Canonical snapd before version 2.37.1 incorrectly performed socket owner validat
</code>
- [initstring/dirty_sock](https://github.com/initstring/dirty_sock)
- [SecuritySi/CVE-2019-7304_DirtySock](https://github.com/SecuritySi/CVE-2019-7304_DirtySock)
### CVE-2019-7482
@ -2462,6 +2726,14 @@ Kibana versions before 6.8.2 and 7.2.1 contain a server side request forgery (SS
- [random-robbie/CVE-2019-7616](https://github.com/random-robbie/CVE-2019-7616)
### CVE-2019-7642
<code>
D-Link routers with the mydlink feature have some web interfaces without authentication requirements. An attacker can remotely obtain users' DNS query logs and login logs. Vulnerable targets include but are not limited to the latest firmware versions of DIR-817LW (A1-1.04), DIR-816L (B1-2.06), DIR-816 (B1-2.06?), DIR-850L (A1-1.09), and DIR-868L (A1-1.10).
</code>
- [xw77cve/CVE-2019-7642](https://github.com/xw77cve/CVE-2019-7642)
### CVE-2019-7839
<code>
@ -2470,6 +2742,14 @@ ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 a
- [securifera/CVE-2019-7839](https://github.com/securifera/CVE-2019-7839)
### CVE-2019-8389
<code>
A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicloud 1.6. By default, the application runs a transfer service on port 8080, accessible by everyone on the same Wi-Fi network. An attacker can send the POST parameters downfiles and cur-folder (with a crafted ../ payload) to the download.script endpoint. This will create a MusicPlayerArchive.zip archive that is publicly accessible and includes the content of any requested file (such as the /etc/passwd file).
</code>
- [shawarkhanethicalhacker/CVE-2019-8389](https://github.com/shawarkhanethicalhacker/CVE-2019-8389)
### CVE-2019-8446
<code>
@ -2572,6 +2852,7 @@ NTP through 4.2.8p12 has a NULL Pointer Dereference.
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
</code>
- [brianwrf/WordPress_4.9.8_RCE_POC](https://github.com/brianwrf/WordPress_4.9.8_RCE_POC)
- [synacktiv/CVE-2019-8942](https://github.com/synacktiv/CVE-2019-8942)
### CVE-2019-8956
@ -2606,6 +2887,14 @@ Improper Verification of a Cryptographic Signature in OpenPGP.js &lt;=4.1.2 allo
- [ZenyWay/opgp-service-cve-2019-9153](https://github.com/ZenyWay/opgp-service-cve-2019-9153)
### CVE-2019-9184
<code>
SQL injection vulnerability in the J2Store plugin 3.x before 3.3.7 for Joomla! allows remote attackers to execute arbitrary SQL commands via the product_option[] parameter.
</code>
- [cved-sources/cve-2019-9184](https://github.com/cved-sources/cve-2019-9184)
### CVE-2019-9193
<code>
@ -2614,6 +2903,14 @@ Improper Verification of a Cryptographic Signature in OpenPGP.js &lt;=4.1.2 allo
- [skyship36/CVE-2019-9193](https://github.com/skyship36/CVE-2019-9193)
### CVE-2019-9194
<code>
elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.
</code>
- [cved-sources/cve-2019-9194](https://github.com/cved-sources/cve-2019-9194)
### CVE-2019-9202
<code>
@ -2638,6 +2935,14 @@ The Bluetooth BR/EDR specification up to and including version 5.1 permits suffi
- [francozappa/knob](https://github.com/francozappa/knob)
### CVE-2019-9580
<code>
In st2web in StackStorm Web UI before 2.9.3 and 2.10.x before 2.10.3, it is possible to bypass the CORS protection mechanism via a &quot;null&quot; origin value, potentially leading to XSS.
</code>
- [mpgn/CVE-2019-9580](https://github.com/mpgn/CVE-2019-9580)
### CVE-2019-9596
<code>
@ -2662,6 +2967,14 @@ Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, an
- [k8gege/ZimbraExploit](https://github.com/k8gege/ZimbraExploit)
### CVE-2019-9653
<code>
NUUO Network Video Recorder Firmware 1.7.x through 3.3.x allows unauthenticated attackers to execute arbitrary commands via shell metacharacters to handle_load_config.php.
</code>
- [grayoneday/CVE-2019-9653](https://github.com/grayoneday/CVE-2019-9653)
### CVE-2019-9670
<code>
@ -2671,6 +2984,22 @@ mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10
- [rek7/Zimbra-RCE](https://github.com/rek7/Zimbra-RCE)
- [attackgithub/Zimbra-RCE](https://github.com/attackgithub/Zimbra-RCE)
### CVE-2019-9673
<code>
Freenet 1483 has a MIME type bypass that allows arbitrary JavaScript execution via a crafted Freenet URI.
</code>
- [mgrube/CVE-2019-9673](https://github.com/mgrube/CVE-2019-9673)
### CVE-2019-9729
<code>
In Shanda MapleStory Online V160, the SdoKeyCrypt.sys driver allows privilege escalation to NT AUTHORITY\SYSTEM because of not validating the IOCtl 0x8000c01c input value, leading to an integer signedness error and a heap-based buffer underflow.
</code>
- [HyperSine/SdoKeyCrypt-sys-local-privilege-elevation](https://github.com/HyperSine/SdoKeyCrypt-sys-local-privilege-elevation)
### CVE-2019-9730
<code>
@ -2712,6 +3041,7 @@ WordPress before 5.1.1 does not properly filter comment content, leading to Remo
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox &lt; 66.0.1, Firefox ESR &lt; 60.6.1, and Thunderbird &lt; 60.6.1.
</code>
- [xuechiyaobai/CVE-2019-9810-PoC](https://github.com/xuechiyaobai/CVE-2019-9810-PoC)
- [0vercl0k/CVE-2019-9810](https://github.com/0vercl0k/CVE-2019-9810)
### CVE-2019-9896
@ -4541,6 +4871,7 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
- [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
### CVE-2019-1010054