mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/05/05 18:08:34
This commit is contained in:
parent
5eb2058539
commit
0d70c496a4
27 changed files with 171 additions and 115 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2020-04-27T13:31:04Z",
|
||||
"updated_at": "2020-05-05T03:53:35Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 256,
|
||||
"watchers": 257,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Proof-of-Concept exploits for CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-20T16:35:30Z",
|
||||
"updated_at": "2020-04-01T09:11:05Z",
|
||||
"updated_at": "2020-05-05T07:37:53Z",
|
||||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 462,
|
||||
"watchers_count": 462,
|
||||
"stargazers_count": 463,
|
||||
"watchers_count": 463,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 462,
|
||||
"watchers": 463,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2020-04-14T15:35:34Z",
|
||||
"updated_at": "2020-05-05T05:56:52Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"watchers": 341,
|
||||
"watchers": 342,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T15:44:29Z",
|
||||
"updated_at": "2020-04-18T20:39:02Z",
|
||||
"updated_at": "2020-05-05T03:21:01Z",
|
||||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 168,
|
||||
"watchers": 169,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"forks_count": 310,
|
||||
"forks": 310,
|
||||
"forks_count": 311,
|
||||
"forks": 311,
|
||||
"watchers": 334,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-17T23:48:15Z",
|
||||
"updated_at": "2020-05-03T23:47:57Z",
|
||||
"updated_at": "2020-05-05T03:54:36Z",
|
||||
"pushed_at": "2019-11-15T08:12:32Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-15T07:44:43Z",
|
||||
"updated_at": "2020-03-25T11:06:29Z",
|
||||
"updated_at": "2020-05-05T03:55:47Z",
|
||||
"pushed_at": "2018-10-15T08:19:54Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -221,11 +221,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-12-25T07:08:55Z",
|
||||
"updated_at": "2018-12-25T07:48:09Z",
|
||||
"pushed_at": "2018-12-25T07:40:49Z",
|
||||
"pushed_at": "2020-05-05T05:28:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-02T18:31:11Z",
|
||||
"updated_at": "2020-01-15T12:34:12Z",
|
||||
"updated_at": "2020-05-05T03:07:52Z",
|
||||
"pushed_at": "2020-01-15T12:34:10Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 253,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-05-04T19:37:09Z",
|
||||
"updated_at": "2020-05-05T08:48:45Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1569,
|
||||
"watchers_count": 1569,
|
||||
"stargazers_count": 1568,
|
||||
"watchers_count": 1568,
|
||||
"forks_count": 224,
|
||||
"forks": 224,
|
||||
"watchers": 1569,
|
||||
"watchers": 1568,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2020-05-04T04:46:18Z",
|
||||
"updated_at": "2020-05-05T07:32:43Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-04-28T04:52:30Z",
|
||||
"updated_at": "2020-05-05T06:17:29Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"stargazers_count": 663,
|
||||
"watchers_count": 663,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 662,
|
||||
"watchers": 663,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-04T23:23:42Z",
|
||||
"updated_at": "2020-05-05T05:53:20Z",
|
||||
"pushed_at": "2020-04-17T11:11:18Z",
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"stargazers_count": 631,
|
||||
"watchers_count": 631,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"watchers": 630,
|
||||
"watchers": 631,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 325,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-06T08:46:31Z",
|
||||
"updated_at": "2020-04-30T17:59:17Z",
|
||||
"updated_at": "2020-05-05T08:25:27Z",
|
||||
"pushed_at": "2019-12-06T09:18:56Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SQL Server Reporting Services(CVE-2020-0618)中的RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-15T06:40:23Z",
|
||||
"updated_at": "2020-05-04T16:12:08Z",
|
||||
"updated_at": "2020-05-05T05:56:11Z",
|
||||
"pushed_at": "2020-02-15T06:41:54Z",
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 161,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -956,13 +956,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-05-05T03:04:18Z",
|
||||
"updated_at": "2020-05-05T03:24:19Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 865,
|
||||
"watchers_count": 865,
|
||||
"stargazers_count": 866,
|
||||
"watchers_count": 866,
|
||||
"forks_count": 246,
|
||||
"forks": 246,
|
||||
"watchers": 865,
|
||||
"watchers": 866,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-04T23:23:42Z",
|
||||
"updated_at": "2020-05-05T05:53:20Z",
|
||||
"pushed_at": "2020-04-17T11:11:18Z",
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"stargazers_count": 631,
|
||||
"watchers_count": 631,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"watchers": 630,
|
||||
"watchers": 631,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T08:01:37Z",
|
||||
"updated_at": "2020-05-05T02:26:14Z",
|
||||
"updated_at": "2020-05-05T08:56:39Z",
|
||||
"pushed_at": "2020-05-04T08:11:21Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 24,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,12 +82,12 @@
|
|||
"description": "CVE-2020-11651: Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T11:47:56Z",
|
||||
"updated_at": "2020-05-05T03:07:36Z",
|
||||
"pushed_at": "2020-05-05T03:07:34Z",
|
||||
"updated_at": "2020-05-05T08:56:12Z",
|
||||
"pushed_at": "2020-05-05T03:27:11Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -105,36 +105,36 @@
|
|||
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T11:52:28Z",
|
||||
"updated_at": "2020-05-05T01:15:56Z",
|
||||
"updated_at": "2020-05-05T06:33:19Z",
|
||||
"pushed_at": "2020-05-04T16:06:46Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 261202396,
|
||||
"id": 261203600,
|
||||
"name": "SaltStack-Exp",
|
||||
"full_name": "Imanfeng\/SaltStack-Exp",
|
||||
"full_name": "thelostworldFree\/SaltStack-Exp",
|
||||
"owner": {
|
||||
"login": "Imanfeng",
|
||||
"id": 24694387,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24694387?v=4",
|
||||
"html_url": "https:\/\/github.com\/Imanfeng"
|
||||
"login": "thelostworldFree",
|
||||
"id": 24971604,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24971604?v=4",
|
||||
"html_url": "https:\/\/github.com\/thelostworldFree"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Imanfeng\/SaltStack-Exp",
|
||||
"html_url": "https:\/\/github.com\/thelostworldFree\/SaltStack-Exp",
|
||||
"description": "CVE-2020-11651&&CVE-2020-11652 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T14:21:58Z",
|
||||
"updated_at": "2020-05-04T19:33:34Z",
|
||||
"pushed_at": "2020-05-04T14:23:13Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"created_at": "2020-05-04T14:25:13Z",
|
||||
"updated_at": "2020-05-05T03:18:21Z",
|
||||
"pushed_at": "2020-05-05T06:31:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T06:42:50Z",
|
||||
"updated_at": "2020-05-01T22:41:24Z",
|
||||
"updated_at": "2020-05-05T08:19:02Z",
|
||||
"pushed_at": "2020-04-22T10:29:16Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2020-05-05T00:18:57Z",
|
||||
"updated_at": "2020-05-05T04:26:14Z",
|
||||
"pushed_at": "2020-04-27T15:17:46Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 79,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-04-27T11:25:51Z",
|
||||
"updated_at": "2020-05-05T08:24:33Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-8597 pppd buffer overflow poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T19:00:46Z",
|
||||
"updated_at": "2020-04-28T10:29:59Z",
|
||||
"updated_at": "2020-05-05T06:35:50Z",
|
||||
"pushed_at": "2020-03-12T11:10:31Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-9332.json
Normal file
25
2020/CVE-2020-9332.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 261396094,
|
||||
"name": "CVE-2020-9332",
|
||||
"full_name": "Sentinel-One\/CVE-2020-9332",
|
||||
"owner": {
|
||||
"login": "Sentinel-One",
|
||||
"id": 8438799,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8438799?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sentinel-One"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sentinel-One\/CVE-2020-9332",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-05T08:06:05Z",
|
||||
"updated_at": "2020-05-05T08:34:36Z",
|
||||
"pushed_at": "2020-05-05T08:06:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-9361.json
Normal file
25
2020/CVE-2020-9361.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 261396252,
|
||||
"name": "CVE-2020-9361",
|
||||
"full_name": "Sentinel-One\/CVE-2020-9361",
|
||||
"owner": {
|
||||
"login": "Sentinel-One",
|
||||
"id": 8438799,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8438799?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sentinel-One"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sentinel-One\/CVE-2020-9361",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-05T08:06:58Z",
|
||||
"updated_at": "2020-05-05T08:34:48Z",
|
||||
"pushed_at": "2020-05-05T08:07:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -422,7 +422,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
|
|||
- [dozernz/cve-2020-11651](https://github.com/dozernz/cve-2020-11651)
|
||||
- [0xc0d/CVE-2020-11651](https://github.com/0xc0d/CVE-2020-11651)
|
||||
- [jasperla/CVE-2020-11651-poc](https://github.com/jasperla/CVE-2020-11651-poc)
|
||||
- [Imanfeng/SaltStack-Exp](https://github.com/Imanfeng/SaltStack-Exp)
|
||||
- [thelostworldFree/SaltStack-Exp](https://github.com/thelostworldFree/SaltStack-Exp)
|
||||
- [kevthehermit/CVE-2020-11651](https://github.com/kevthehermit/CVE-2020-11651)
|
||||
|
||||
### CVE-2020-11890
|
||||
|
@ -852,6 +852,12 @@ Joplin through 1.0.184 allows Arbitrary File Read via XSS.
|
|||
|
||||
- [JavierOlmedo/CVE-2020-9038](https://github.com/JavierOlmedo/CVE-2020-9038)
|
||||
|
||||
### CVE-2020-9332
|
||||
- [Sentinel-One/CVE-2020-9332](https://github.com/Sentinel-One/CVE-2020-9332)
|
||||
|
||||
### CVE-2020-9361
|
||||
- [Sentinel-One/CVE-2020-9361](https://github.com/Sentinel-One/CVE-2020-9361)
|
||||
|
||||
### CVE-2020-9375
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue