mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/04/17 06:08:48
This commit is contained in:
parent
732d72d8fc
commit
0dc25716a9
23 changed files with 170 additions and 122 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T22:56:29Z",
|
||||
"updated_at": "2020-03-27T10:32:44Z",
|
||||
"updated_at": "2020-04-16T15:11:16Z",
|
||||
"pushed_at": "2018-06-03T18:55:07Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 43,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -289,13 +289,13 @@
|
|||
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-04T14:25:09Z",
|
||||
"updated_at": "2020-03-12T04:44:23Z",
|
||||
"updated_at": "2020-04-16T16:14:48Z",
|
||||
"pushed_at": "2019-05-05T15:49:44Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -270,8 +270,8 @@
|
|||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2020-04-16T09:23:19Z",
|
||||
"updated_at": "2020-04-16T15:58:03Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 436,
|
||||
"watchers_count": 436,
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"forks_count": 197,
|
||||
"forks": 197,
|
||||
"watchers": 436,
|
||||
"watchers": 437,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-21T08:40:26Z",
|
||||
"updated_at": "2020-04-14T23:48:51Z",
|
||||
"updated_at": "2020-04-16T16:42:55Z",
|
||||
"pushed_at": "2020-01-11T13:55:33Z",
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"watchers": 306,
|
||||
"watchers": 307,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -205,5 +205,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256271162,
|
||||
"name": "check-your-pulse",
|
||||
"full_name": "cisagov\/check-your-pulse",
|
||||
"owner": {
|
||||
"login": "cisagov",
|
||||
"id": 18539691,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/18539691?v=4",
|
||||
"html_url": "https:\/\/github.com\/cisagov"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
|
||||
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T16:32:47Z",
|
||||
"updated_at": "2020-04-16T17:01:01Z",
|
||||
"pushed_at": "2020-04-16T17:00:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Poc for CVE-2019-1253",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T20:40:15Z",
|
||||
"updated_at": "2020-04-16T09:41:10Z",
|
||||
"updated_at": "2020-04-16T17:11:17Z",
|
||||
"pushed_at": "2019-09-12T14:43:47Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC code for CVE-2019-14040",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-03T23:04:49Z",
|
||||
"updated_at": "2020-04-16T04:00:46Z",
|
||||
"updated_at": "2020-04-16T17:18:36Z",
|
||||
"pushed_at": "2020-04-15T14:27:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC code for CVE-2019-14041",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-03T23:05:10Z",
|
||||
"updated_at": "2020-04-15T18:31:06Z",
|
||||
"updated_at": "2020-04-16T17:19:31Z",
|
||||
"pushed_at": "2020-04-15T14:28:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -91,6 +91,29 @@
|
|||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 214698783,
|
||||
"name": "CVE-2019-16759",
|
||||
"full_name": "FarjaalAhmad\/CVE-2019-16759",
|
||||
"owner": {
|
||||
"login": "FarjaalAhmad",
|
||||
"id": 45895453,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45895453?v=4",
|
||||
"html_url": "https:\/\/github.com\/FarjaalAhmad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FarjaalAhmad\/CVE-2019-16759",
|
||||
"description": "Interactive-Like Command-Line Console for CVE-2019-16759",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-12T18:51:16Z",
|
||||
"updated_at": "2020-04-16T18:56:32Z",
|
||||
"pushed_at": "2019-10-12T18:56:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 230790251,
|
||||
"name": "pwn-vbulletin",
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Gather a list of Citrix appliances in a country \/ state pair, and check if they're vulnerable to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-08T10:42:20Z",
|
||||
"updated_at": "2020-03-16T04:29:53Z",
|
||||
"updated_at": "2020-04-16T15:33:28Z",
|
||||
"pushed_at": "2020-03-08T11:06:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-16T14:24:04Z",
|
||||
"updated_at": "2020-04-16T15:43:48Z",
|
||||
"pushed_at": "2020-04-16T09:51:34Z",
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"stargazers_count": 529,
|
||||
"watchers_count": 529,
|
||||
"forks_count": 103,
|
||||
"forks": 103,
|
||||
"watchers": 528,
|
||||
"watchers": 529,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "File Content Disclosure on Rails Test Case - CVE-2019-5418",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-18T16:09:13Z",
|
||||
"updated_at": "2019-08-26T16:40:57Z",
|
||||
"updated_at": "2020-04-16T19:56:26Z",
|
||||
"pushed_at": "2019-03-18T16:15:25Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2020-04-15T14:39:19Z",
|
||||
"updated_at": "2020-04-16T20:32:50Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-11T21:34:28Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-15T17:41:44Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-04-16T06:34:09Z",
|
||||
"updated_at": "2020-04-16T19:50:33Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 427,
|
||||
"watchers": 428,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -979,13 +979,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-04-16T06:35:22Z",
|
||||
"updated_at": "2020-04-16T15:54:07Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 825,
|
||||
"watchers_count": 825,
|
||||
"stargazers_count": 826,
|
||||
"watchers_count": 826,
|
||||
"forks_count": 232,
|
||||
"forks": 232,
|
||||
"watchers": 825,
|
||||
"watchers": 826,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1172,29 +1172,6 @@
|
|||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 253536195,
|
||||
"name": "CVE-2020-0796-scanner",
|
||||
"full_name": "sivak1rl\/CVE-2020-0796-scanner",
|
||||
"owner": {
|
||||
"login": "sivak1rl",
|
||||
"id": 8893063,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8893063?v=4",
|
||||
"html_url": "https:\/\/github.com\/sivak1rl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sivak1rl\/CVE-2020-0796-scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T15:18:11Z",
|
||||
"updated_at": "2020-04-06T15:18:11Z",
|
||||
"pushed_at": "2020-04-06T15:18:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 253927600,
|
||||
"name": "cve-2020-0796",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-16T14:24:04Z",
|
||||
"updated_at": "2020-04-16T15:43:48Z",
|
||||
"pushed_at": "2020-04-16T09:51:34Z",
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"forks_count": 103,
|
||||
"forks": 103,
|
||||
"watchers": 528,
|
||||
"stargazers_count": 529,
|
||||
"watchers_count": 529,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 529,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Nexus <= 3.21.1 远程代码执行脚本(无回显)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T09:40:15Z",
|
||||
"updated_at": "2020-04-16T09:44:28Z",
|
||||
"updated_at": "2020-04-16T15:30:03Z",
|
||||
"pushed_at": "2020-04-16T09:44:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2020-04-16T13:12:27Z",
|
||||
"updated_at": "2020-04-16T18:26:26Z",
|
||||
"pushed_at": "2020-04-16T11:34:13Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-04-16T01:20:30Z",
|
||||
"updated_at": "2020-04-16T19:26:45Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 168,
|
||||
"watchers": 169,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-2555 Python POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:02:59Z",
|
||||
"updated_at": "2020-04-16T13:38:34Z",
|
||||
"updated_at": "2020-04-16T15:30:09Z",
|
||||
"pushed_at": "2020-04-16T12:04:18Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-15T00:13:59Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-04-15T22:23:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-04-16T15:06:50Z",
|
||||
"updated_at": "2020-04-16T20:46:04Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-15T10:16:56Z",
|
||||
"updated_at": "2020-04-16T13:16:07Z",
|
||||
"updated_at": "2020-04-16T16:39:11Z",
|
||||
"pushed_at": "2020-04-16T09:47:38Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -44,5 +44,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256267905,
|
||||
"name": "CVE-2020-5260",
|
||||
"full_name": "sv3nbeast\/CVE-2020-5260",
|
||||
"owner": {
|
||||
"login": "sv3nbeast",
|
||||
"id": 55974091,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/55974091?v=4",
|
||||
"html_url": "https:\/\/github.com\/sv3nbeast"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-5260",
|
||||
"description": "CVE-2020-5260演示记录",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T16:19:23Z",
|
||||
"updated_at": "2020-04-16T17:01:04Z",
|
||||
"pushed_at": "2020-04-16T17:01:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -235,7 +235,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [eastmountyxz/CVE-2020-0796-SMB](https://github.com/eastmountyxz/CVE-2020-0796-SMB)
|
||||
- [LabDookhtegan/CVE-2020-0796-EXP](https://github.com/LabDookhtegan/CVE-2020-0796-EXP)
|
||||
- [Rvn0xsy/CVE_2020_0796_CNA](https://github.com/Rvn0xsy/CVE_2020_0796_CNA)
|
||||
- [sivak1rl/CVE-2020-0796-scanner](https://github.com/sivak1rl/CVE-2020-0796-scanner)
|
||||
- [0xeb-bp/cve-2020-0796](https://github.com/0xeb-bp/cve-2020-0796)
|
||||
- [intelliroot-tech/cve-2020-0796-Scanner](https://github.com/intelliroot-tech/cve-2020-0796-Scanner)
|
||||
- [curtbraz/CVE-2020-0796](https://github.com/curtbraz/CVE-2020-0796)
|
||||
|
@ -522,6 +521,7 @@ Affected versions of Git have a vulnerability whereby Git can be tricked into se
|
|||
|
||||
- [brompwnie/cve-2020-5260](https://github.com/brompwnie/cve-2020-5260)
|
||||
- [Asgavar/CVE-2020-5260](https://github.com/Asgavar/CVE-2020-5260)
|
||||
- [sv3nbeast/CVE-2020-5260](https://github.com/sv3nbeast/CVE-2020-5260)
|
||||
|
||||
### CVE-2020-5267
|
||||
|
||||
|
@ -1400,6 +1400,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7
|
|||
- [jason3e7/CVE-2019-11510](https://github.com/jason3e7/CVE-2019-11510)
|
||||
- [BishopFox/pwn-pulse](https://github.com/BishopFox/pwn-pulse)
|
||||
- [aqhmal/pulsexploit](https://github.com/aqhmal/pulsexploit)
|
||||
- [cisagov/check-your-pulse](https://github.com/cisagov/check-your-pulse)
|
||||
|
||||
### CVE-2019-11523
|
||||
|
||||
|
@ -2487,6 +2488,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
|
|||
- [M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit](https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit)
|
||||
- [r00tpgp/http-vuln-CVE-2019-16759](https://github.com/r00tpgp/http-vuln-CVE-2019-16759)
|
||||
- [jas502n/CVE-2019-16759](https://github.com/jas502n/CVE-2019-16759)
|
||||
- [FarjaalAhmad/CVE-2019-16759](https://github.com/FarjaalAhmad/CVE-2019-16759)
|
||||
- [andripwn/pwn-vbulletin](https://github.com/andripwn/pwn-vbulletin)
|
||||
- [psychoxploit/vbull](https://github.com/psychoxploit/vbull)
|
||||
|
||||
|
|
Loading…
Reference in a new issue