mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2021/01/13 00:10:08
This commit is contained in:
parent
747acdf32e
commit
0fd06c4329
26 changed files with 120 additions and 96 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-12T08:23:55Z",
|
||||
"updated_at": "2021-01-12T10:07:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 876,
|
||||
"watchers_count": 876,
|
||||
"stargazers_count": 877,
|
||||
"watchers_count": 877,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 876,
|
||||
"watchers": 877,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-12T08:23:55Z",
|
||||
"updated_at": "2021-01-12T10:07:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 876,
|
||||
"watchers_count": 876,
|
||||
"stargazers_count": 877,
|
||||
"watchers_count": 877,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 876,
|
||||
"watchers": 877,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -243,8 +243,8 @@
|
|||
"description": "CVE-2017-12615 任意文件写入exp,写入webshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T09:07:12Z",
|
||||
"updated_at": "2021-01-12T09:07:16Z",
|
||||
"pushed_at": "2021-01-12T09:07:14Z",
|
||||
"updated_at": "2021-01-12T09:20:00Z",
|
||||
"pushed_at": "2021-01-12T09:19:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-12T08:23:55Z",
|
||||
"updated_at": "2021-01-12T10:07:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 876,
|
||||
"watchers_count": 876,
|
||||
"stargazers_count": 877,
|
||||
"watchers_count": 877,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 876,
|
||||
"watchers": 877,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-10T09:51:40Z",
|
||||
"updated_at": "2018-07-17T08:13:36Z",
|
||||
"updated_at": "2021-01-12T12:20:23Z",
|
||||
"pushed_at": "2018-07-17T08:13:34Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-12T08:23:55Z",
|
||||
"updated_at": "2021-01-12T10:07:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 876,
|
||||
"watchers_count": 876,
|
||||
"stargazers_count": 877,
|
||||
"watchers_count": 877,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 876,
|
||||
"watchers": 877,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-01-09T14:31:00Z",
|
||||
"updated_at": "2021-01-12T09:30:59Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 350,
|
||||
"watchers": 351,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -473,8 +473,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-01-11T20:29:36Z",
|
||||
"pushed_at": "2021-01-11T20:29:34Z",
|
||||
"updated_at": "2021-01-12T12:04:27Z",
|
||||
"pushed_at": "2021-01-12T12:04:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-12T07:44:33Z",
|
||||
"updated_at": "2021-01-12T14:38:52Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2252,
|
||||
"watchers_count": 2252,
|
||||
"stargazers_count": 2255,
|
||||
"watchers_count": 2255,
|
||||
"forks_count": 638,
|
||||
"forks": 638,
|
||||
"watchers": 2252,
|
||||
"watchers": 2255,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T12:42:54Z",
|
||||
"updated_at": "2021-01-09T22:05:56Z",
|
||||
"updated_at": "2021-01-12T13:04:44Z",
|
||||
"pushed_at": "2019-05-21T14:52:36Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-12T08:23:55Z",
|
||||
"updated_at": "2021-01-12T10:07:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 876,
|
||||
"watchers_count": 876,
|
||||
"stargazers_count": 877,
|
||||
"watchers_count": 877,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 876,
|
||||
"watchers": 877,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -910,13 +910,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-01-09T13:41:47Z",
|
||||
"updated_at": "2021-01-12T14:17:52Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1060,
|
||||
"watchers_count": 1060,
|
||||
"stargazers_count": 1059,
|
||||
"watchers_count": 1059,
|
||||
"forks_count": 355,
|
||||
"forks": 355,
|
||||
"watchers": 1060,
|
||||
"watchers": 1059,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T15:52:43Z",
|
||||
"updated_at": "2021-01-02T12:06:35Z",
|
||||
"updated_at": "2021-01-12T14:17:53Z",
|
||||
"pushed_at": "2020-06-09T20:41:32Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 128,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-01-11T08:20:34Z",
|
||||
"updated_at": "2021-01-12T12:54:28Z",
|
||||
"pushed_at": "2020-11-04T17:33:15Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 41,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1221,
|
||||
"watchers_count": 1221,
|
||||
"forks_count": 281,
|
||||
"forks": 281,
|
||||
"forks_count": 282,
|
||||
"forks": 282,
|
||||
"watchers": 1221,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-01-07T06:17:59Z",
|
||||
"updated_at": "2021-01-12T10:24:11Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 730,
|
||||
"watchers_count": 730,
|
||||
"stargazers_count": 731,
|
||||
"watchers_count": 731,
|
||||
"forks_count": 210,
|
||||
"forks": 210,
|
||||
"watchers": 730,
|
||||
"watchers": 731,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-12T07:44:33Z",
|
||||
"updated_at": "2021-01-12T14:38:52Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2252,
|
||||
"watchers_count": 2252,
|
||||
"stargazers_count": 2255,
|
||||
"watchers_count": 2255,
|
||||
"forks_count": 638,
|
||||
"forks": 638,
|
||||
"watchers": 2252,
|
||||
"watchers": 2255,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2021-01-12T08:45:47Z",
|
||||
"updated_at": "2021-01-12T13:31:16Z",
|
||||
"pushed_at": "2021-01-11T09:03:04Z",
|
||||
"stargazers_count": 733,
|
||||
"watchers_count": 733,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 733,
|
||||
"stargazers_count": 736,
|
||||
"watchers_count": 736,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"watchers": 736,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-16012, a timing side channel in drawImage in Firefox & Chrome",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-14T21:32:15Z",
|
||||
"updated_at": "2021-01-11T20:53:19Z",
|
||||
"updated_at": "2021-01-12T09:25:11Z",
|
||||
"pushed_at": "2021-01-11T17:57:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-06T23:51:32Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-12T08:23:55Z",
|
||||
"updated_at": "2021-01-12T10:07:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 876,
|
||||
"watchers_count": 876,
|
||||
"stargazers_count": 877,
|
||||
"watchers_count": 877,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 876,
|
||||
"watchers": 877,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-11-03T17:14:22Z",
|
||||
"updated_at": "2020-12-26T02:17:37Z",
|
||||
"pushed_at": "2020-11-25T16:03:18Z",
|
||||
"pushed_at": "2021-01-12T10:11:42Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 14,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-10T06:47:49Z",
|
||||
"updated_at": "2021-01-12T07:34:24Z",
|
||||
"updated_at": "2021-01-12T10:55:55Z",
|
||||
"pushed_at": "2021-01-10T06:48:53Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 40,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-36188 &&Jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T06:29:38Z",
|
||||
"updated_at": "2021-01-12T07:43:16Z",
|
||||
"updated_at": "2021-01-12T11:01:10Z",
|
||||
"pushed_at": "2021-01-11T06:29:59Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 328976450,
|
||||
"name": "CVE-2020-8165",
|
||||
"full_name": "macosta-42\/CVE-2020-8165",
|
||||
"owner": {
|
||||
"login": "macosta-42",
|
||||
"id": 64427620,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/64427620?v=4",
|
||||
"html_url": "https:\/\/github.com\/macosta-42"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/macosta-42\/CVE-2020-8165",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T12:14:17Z",
|
||||
"updated_at": "2021-01-12T12:37:41Z",
|
||||
"pushed_at": "2021-01-12T12:37:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-06-10T07:08:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-1056",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-08T11:29:48Z",
|
||||
"updated_at": "2021-01-11T02:11:51Z",
|
||||
"pushed_at": "2021-01-10T05:34:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2021-01-12T14:02:07Z",
|
||||
"pushed_at": "2021-01-12T09:21:02Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1334,6 +1334,7 @@ A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.
|
|||
- [umiterkol/CVE-2020-8165--Auto-Shell](https://github.com/umiterkol/CVE-2020-8165--Auto-Shell)
|
||||
- [taipansec/CVE-2020-8165](https://github.com/taipansec/CVE-2020-8165)
|
||||
- [hybryx/CVE-2020-8165](https://github.com/hybryx/CVE-2020-8165)
|
||||
- [macosta-42/CVE-2020-8165](https://github.com/macosta-42/CVE-2020-8165)
|
||||
|
||||
### CVE-2020-8175 (2020-07-24)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue