mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/01/10 00:09:55
This commit is contained in:
parent
f88fe87fde
commit
0ca5f27da1
19 changed files with 111 additions and 78 deletions
|
@ -174,8 +174,8 @@
|
||||||
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
|
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-10-31T11:39:11Z",
|
"created_at": "2020-10-31T11:39:11Z",
|
||||||
"updated_at": "2021-01-08T11:10:11Z",
|
"updated_at": "2021-01-09T11:52:12Z",
|
||||||
"pushed_at": "2021-01-08T11:10:09Z",
|
"pushed_at": "2021-01-09T11:52:09Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "frp bypass without account overwrite",
|
"description": "frp bypass without account overwrite",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-10-08T12:26:23Z",
|
"created_at": "2017-10-08T12:26:23Z",
|
||||||
"updated_at": "2019-03-17T16:31:49Z",
|
"updated_at": "2021-01-09T10:39:40Z",
|
||||||
"pushed_at": "2017-10-08T12:26:24Z",
|
"pushed_at": "2017-10-08T12:26:24Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-12-21T22:45:55Z",
|
"created_at": "2019-12-21T22:45:55Z",
|
||||||
"updated_at": "2021-01-07T16:23:08Z",
|
"updated_at": "2021-01-09T14:31:00Z",
|
||||||
"pushed_at": "2020-01-05T21:46:25Z",
|
"pushed_at": "2020-01-05T21:46:25Z",
|
||||||
"stargazers_count": 349,
|
"stargazers_count": 350,
|
||||||
"watchers_count": 349,
|
"watchers_count": 350,
|
||||||
"forks_count": 80,
|
"forks_count": 80,
|
||||||
"forks": 80,
|
"forks": 80,
|
||||||
"watchers": 349,
|
"watchers": 350,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -82,7 +82,7 @@
|
||||||
"description": "CVE-2019-0708-exploit",
|
"description": "CVE-2019-0708-exploit",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-05-15T02:24:21Z",
|
"created_at": "2019-05-15T02:24:21Z",
|
||||||
"updated_at": "2021-01-04T02:05:33Z",
|
"updated_at": "2021-01-09T14:06:25Z",
|
||||||
"pushed_at": "2019-05-15T02:26:46Z",
|
"pushed_at": "2019-05-15T02:26:46Z",
|
||||||
"stargazers_count": 116,
|
"stargazers_count": 116,
|
||||||
"watchers_count": 116,
|
"watchers_count": 116,
|
||||||
|
@ -1439,13 +1439,13 @@
|
||||||
"description": "Proof of concept for CVE-2019-0708",
|
"description": "Proof of concept for CVE-2019-0708",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-05-29T16:53:54Z",
|
"created_at": "2019-05-29T16:53:54Z",
|
||||||
"updated_at": "2021-01-06T16:13:11Z",
|
"updated_at": "2021-01-09T12:21:20Z",
|
||||||
"pushed_at": "2019-09-03T20:50:28Z",
|
"pushed_at": "2019-09-03T20:50:28Z",
|
||||||
"stargazers_count": 1054,
|
"stargazers_count": 1055,
|
||||||
"watchers_count": 1054,
|
"watchers_count": 1055,
|
||||||
"forks_count": 353,
|
"forks_count": 353,
|
||||||
"forks": 353,
|
"forks": 353,
|
||||||
"watchers": 1054,
|
"watchers": 1055,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-09-03T15:08:49Z",
|
"created_at": "2019-09-03T15:08:49Z",
|
||||||
"updated_at": "2021-01-07T07:18:25Z",
|
"updated_at": "2021-01-09T12:54:41Z",
|
||||||
"pushed_at": "2019-09-08T06:09:11Z",
|
"pushed_at": "2019-09-08T06:09:11Z",
|
||||||
"stargazers_count": 680,
|
"stargazers_count": 681,
|
||||||
"watchers_count": 680,
|
"watchers_count": 681,
|
||||||
"forks_count": 61,
|
"forks_count": 61,
|
||||||
"forks": 61,
|
"forks": 61,
|
||||||
"watchers": 680,
|
"watchers": 681,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-13T14:53:54Z",
|
"created_at": "2020-03-13T14:53:54Z",
|
||||||
"updated_at": "2021-01-05T05:16:02Z",
|
"updated_at": "2021-01-09T15:05:07Z",
|
||||||
"pushed_at": "2020-03-22T19:46:04Z",
|
"pushed_at": "2020-03-22T19:46:04Z",
|
||||||
"stargazers_count": 183,
|
"stargazers_count": 182,
|
||||||
"watchers_count": 183,
|
"watchers_count": 182,
|
||||||
"forks_count": 59,
|
"forks_count": 59,
|
||||||
"forks": 59,
|
"forks": 59,
|
||||||
"watchers": 183,
|
"watchers": 182,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -726,13 +726,13 @@
|
||||||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-21T23:13:00Z",
|
"created_at": "2020-01-21T23:13:00Z",
|
||||||
"updated_at": "2020-12-10T08:53:49Z",
|
"updated_at": "2021-01-09T10:04:39Z",
|
||||||
"pushed_at": "2020-03-25T16:48:30Z",
|
"pushed_at": "2020-03-25T16:48:30Z",
|
||||||
"stargazers_count": 57,
|
"stargazers_count": 58,
|
||||||
"watchers_count": 57,
|
"watchers_count": 58,
|
||||||
"forks_count": 11,
|
"forks_count": 11,
|
||||||
"forks": 11,
|
"forks": 11,
|
||||||
"watchers": 57,
|
"watchers": 58,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
|
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-05-21T13:16:02Z",
|
"created_at": "2019-05-21T13:16:02Z",
|
||||||
"updated_at": "2020-07-27T02:19:18Z",
|
"updated_at": "2021-01-09T14:57:47Z",
|
||||||
"pushed_at": "2019-08-19T17:33:56Z",
|
"pushed_at": "2019-08-19T17:33:56Z",
|
||||||
"stargazers_count": 57,
|
"stargazers_count": 58,
|
||||||
"watchers_count": 57,
|
"watchers_count": 58,
|
||||||
"forks_count": 20,
|
"forks_count": 20,
|
||||||
"forks": 20,
|
"forks": 20,
|
||||||
"watchers": 57,
|
"watchers": 58,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
|
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-21T21:33:17Z",
|
"created_at": "2020-01-21T21:33:17Z",
|
||||||
"updated_at": "2020-12-23T19:30:32Z",
|
"updated_at": "2021-01-09T11:46:42Z",
|
||||||
"pushed_at": "2020-07-05T17:27:24Z",
|
"pushed_at": "2020-07-05T17:27:24Z",
|
||||||
"stargazers_count": 35,
|
"stargazers_count": 36,
|
||||||
"watchers_count": 35,
|
"watchers_count": 36,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 35,
|
"watchers": 36,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -151,13 +151,13 @@
|
||||||
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
|
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-28T16:04:30Z",
|
"created_at": "2020-02-28T16:04:30Z",
|
||||||
"updated_at": "2020-12-28T03:45:49Z",
|
"updated_at": "2021-01-09T11:01:49Z",
|
||||||
"pushed_at": "2020-10-07T08:10:46Z",
|
"pushed_at": "2020-10-07T08:10:46Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 32,
|
||||||
"watchers_count": 31,
|
"watchers_count": 32,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 31,
|
"watchers": 32,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -243,13 +243,13 @@
|
||||||
"description": "Vulnerability scanner for CVE-2020-0688",
|
"description": "Vulnerability scanner for CVE-2020-0688",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-19T16:39:56Z",
|
"created_at": "2020-03-19T16:39:56Z",
|
||||||
"updated_at": "2020-10-06T17:27:40Z",
|
"updated_at": "2021-01-09T11:45:35Z",
|
||||||
"pushed_at": "2020-03-19T16:41:39Z",
|
"pushed_at": "2020-03-19T16:41:39Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -174,13 +174,13 @@
|
||||||
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
|
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T02:20:07Z",
|
"created_at": "2020-03-12T02:20:07Z",
|
||||||
"updated_at": "2020-12-21T01:37:26Z",
|
"updated_at": "2021-01-09T11:44:13Z",
|
||||||
"pushed_at": "2020-03-12T02:49:10Z",
|
"pushed_at": "2020-03-12T02:49:10Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 9,
|
||||||
"watchers_count": 8,
|
"watchers_count": 9,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"forks": 9,
|
"forks": 9,
|
||||||
"watchers": 8,
|
"watchers": 9,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -910,13 +910,13 @@
|
||||||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-30T11:42:56Z",
|
"created_at": "2020-03-30T11:42:56Z",
|
||||||
"updated_at": "2021-01-09T02:41:33Z",
|
"updated_at": "2021-01-09T13:41:47Z",
|
||||||
"pushed_at": "2020-12-07T20:04:27Z",
|
"pushed_at": "2020-12-07T20:04:27Z",
|
||||||
"stargazers_count": 1059,
|
"stargazers_count": 1060,
|
||||||
"watchers_count": 1059,
|
"watchers_count": 1060,
|
||||||
"forks_count": 355,
|
"forks_count": 355,
|
||||||
"forks": 355,
|
"forks": 355,
|
||||||
"watchers": 1059,
|
"watchers": 1060,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1140,13 +1140,13 @@
|
||||||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-20T14:35:48Z",
|
"created_at": "2020-04-20T14:35:48Z",
|
||||||
"updated_at": "2021-01-08T13:41:03Z",
|
"updated_at": "2021-01-09T13:11:00Z",
|
||||||
"pushed_at": "2020-06-09T20:46:45Z",
|
"pushed_at": "2020-06-09T20:46:45Z",
|
||||||
"stargazers_count": 345,
|
"stargazers_count": 346,
|
||||||
"watchers_count": 345,
|
"watchers_count": 346,
|
||||||
"forks_count": 117,
|
"forks_count": 117,
|
||||||
"forks": 117,
|
"forks": 117,
|
||||||
"watchers": 345,
|
"watchers": 346,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Remote Code Execution vulnerability on ArcSight Logger",
|
"description": "Remote Code Execution vulnerability on ArcSight Logger",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-01-07T12:30:23Z",
|
"created_at": "2021-01-07T12:30:23Z",
|
||||||
"updated_at": "2021-01-08T20:32:49Z",
|
"updated_at": "2021-01-09T10:35:20Z",
|
||||||
"pushed_at": "2021-01-07T14:06:11Z",
|
"pushed_at": "2021-01-09T10:15:48Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 5,
|
"watchers_count": 6,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 5,
|
"watchers": 6,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-10-09T06:34:36Z",
|
"created_at": "2020-10-09T06:34:36Z",
|
||||||
"updated_at": "2021-01-09T07:22:14Z",
|
"updated_at": "2021-01-09T14:41:21Z",
|
||||||
"pushed_at": "2021-01-08T11:00:13Z",
|
"pushed_at": "2021-01-08T11:00:13Z",
|
||||||
"stargazers_count": 705,
|
"stargazers_count": 709,
|
||||||
"watchers_count": 705,
|
"watchers_count": 709,
|
||||||
"forks_count": 124,
|
"forks_count": 126,
|
||||||
"forks": 124,
|
"forks": 126,
|
||||||
"watchers": 705,
|
"watchers": 709,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2021-01-06T23:51:32Z",
|
"pushed_at": "2021-01-06T23:51:32Z",
|
||||||
"stargazers_count": 30,
|
"stargazers_count": 30,
|
||||||
"watchers_count": 30,
|
"watchers_count": 30,
|
||||||
"forks_count": 8,
|
"forks_count": 9,
|
||||||
"forks": 8,
|
"forks": 9,
|
||||||
"watchers": 30,
|
"watchers": 30,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "CVE-2020-5902 BIG-IP",
|
"description": "CVE-2020-5902 BIG-IP",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-05T16:38:32Z",
|
"created_at": "2020-07-05T16:38:32Z",
|
||||||
"updated_at": "2021-01-08T12:31:15Z",
|
"updated_at": "2021-01-09T11:48:35Z",
|
||||||
"pushed_at": "2020-07-15T02:52:33Z",
|
"pushed_at": "2020-07-15T02:52:33Z",
|
||||||
"stargazers_count": 328,
|
"stargazers_count": 329,
|
||||||
"watchers_count": 328,
|
"watchers_count": 329,
|
||||||
"forks_count": 103,
|
"forks_count": 103,
|
||||||
"forks": 103,
|
"forks": 103,
|
||||||
"watchers": 328,
|
"watchers": 329,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
25
2020/CVE-2020-7048.json
Normal file
25
2020/CVE-2020-7048.json
Normal file
|
@ -0,0 +1,25 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 328165952,
|
||||||
|
"name": "CVE-2020-7048",
|
||||||
|
"full_name": "ElmouradiAmine\/CVE-2020-7048",
|
||||||
|
"owner": {
|
||||||
|
"login": "ElmouradiAmine",
|
||||||
|
"id": 48139304,
|
||||||
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48139304?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ElmouradiAmine"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ElmouradiAmine\/CVE-2020-7048",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2021-01-09T13:52:09Z",
|
||||||
|
"updated_at": "2021-01-09T13:54:32Z",
|
||||||
|
"pushed_at": "2021-01-09T13:54:30Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-11-02T00:58:32Z",
|
"pushed_at": "2020-11-02T00:58:32Z",
|
||||||
"stargazers_count": 29,
|
"stargazers_count": 29,
|
||||||
"watchers_count": 29,
|
"watchers_count": 29,
|
||||||
"forks_count": 15,
|
"forks_count": 16,
|
||||||
"forks": 15,
|
"forks": 16,
|
||||||
"watchers": 29,
|
"watchers": 29,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -105,13 +105,13 @@
|
||||||
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
|
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-05T20:40:28Z",
|
"created_at": "2020-06-05T20:40:28Z",
|
||||||
"updated_at": "2020-12-01T15:12:37Z",
|
"updated_at": "2021-01-09T11:49:46Z",
|
||||||
"pushed_at": "2020-06-05T21:04:43Z",
|
"pushed_at": "2020-06-05T21:04:43Z",
|
||||||
"stargazers_count": 19,
|
"stargazers_count": 20,
|
||||||
"watchers_count": 19,
|
"watchers_count": 20,
|
||||||
"forks_count": 11,
|
"forks_count": 11,
|
||||||
"forks": 11,
|
"forks": 11,
|
||||||
"watchers": 19,
|
"watchers": 20,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -1147,6 +1147,14 @@ A flawed protocol design in the Ledger Monero app before 1.5.1 for Ledger Nano a
|
||||||
### CVE-2020-6888
|
### CVE-2020-6888
|
||||||
- [section-c/CVE-2020-6888](https://github.com/section-c/CVE-2020-6888)
|
- [section-c/CVE-2020-6888](https://github.com/section-c/CVE-2020-6888)
|
||||||
|
|
||||||
|
### CVE-2020-7048 (2020-01-16)
|
||||||
|
|
||||||
|
<code>
|
||||||
|
The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [ElmouradiAmine/CVE-2020-7048](https://github.com/ElmouradiAmine/CVE-2020-7048)
|
||||||
|
|
||||||
### CVE-2020-7209 (2020-02-12)
|
### CVE-2020-7209 (2020-02-12)
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
|
Loading…
Reference in a new issue