mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/12/22 06:09:38
This commit is contained in:
parent
b710b11bbb
commit
26c639c15a
22 changed files with 187 additions and 82 deletions
|
@ -90,5 +90,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323381650,
|
||||
"name": "CVE-2003-0264",
|
||||
"full_name": "PepeTheRital\/CVE-2003-0264",
|
||||
"owner": {
|
||||
"login": "PepeTheRital",
|
||||
"id": 65770864,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/65770864?v=4",
|
||||
"html_url": "https:\/\/github.com\/PepeTheRital"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PepeTheRital\/CVE-2003-0264",
|
||||
"description": "Exploit CVE-2003-0264 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T15:52:32Z",
|
||||
"updated_at": "2020-12-21T15:58:48Z",
|
||||
"pushed_at": "2020-12-21T15:58:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2020-12-20T20:39:57Z",
|
||||
"updated_at": "2020-12-21T16:51:53Z",
|
||||
"pushed_at": "2017-10-09T15:20:11Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-12-21T04:25:52Z",
|
||||
"updated_at": "2020-12-21T15:15:05Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"forks_count": 136,
|
||||
"forks": 136,
|
||||
"forks_count": 137,
|
||||
"forks": 137,
|
||||
"watchers": 380,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2020-12-21T12:56:55Z",
|
||||
"updated_at": "2020-12-21T18:50:46Z",
|
||||
"pushed_at": "2020-12-21T12:56:53Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 91,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-09T01:32:57Z",
|
||||
"updated_at": "2020-09-30T09:10:48Z",
|
||||
"updated_at": "2020-12-21T18:12:47Z",
|
||||
"pushed_at": "2017-11-07T19:24:00Z",
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 236,
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 237,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -136,5 +136,28 @@
|
|||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323443725,
|
||||
"name": "Larascript",
|
||||
"full_name": "PwnedShell\/Larascript",
|
||||
"owner": {
|
||||
"login": "PwnedShell",
|
||||
"id": 55540142,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/55540142?v=4",
|
||||
"html_url": "https:\/\/github.com\/PwnedShell"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PwnedShell\/Larascript",
|
||||
"description": "Laravel exploit CVE-2018-15133",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T20:44:29Z",
|
||||
"updated_at": "2020-12-21T20:45:11Z",
|
||||
"pushed_at": "2020-12-21T20:44:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-08-18T00:00:15Z",
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"forks_count": 140,
|
||||
"forks": 140,
|
||||
"forks_count": 141,
|
||||
"forks": 141,
|
||||
"watchers": 426,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Crash macOS and iOS devices with one packet",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-01T17:03:25Z",
|
||||
"updated_at": "2020-04-06T10:58:21Z",
|
||||
"updated_at": "2020-12-21T17:36:52Z",
|
||||
"pushed_at": "2018-11-15T21:13:37Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1489,8 +1489,8 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"forks_count": 352,
|
||||
"forks": 352,
|
||||
"forks_count": 353,
|
||||
"forks": 353,
|
||||
"watchers": 1049,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,20 +1,20 @@
|
|||
[
|
||||
{
|
||||
"id": 221713137,
|
||||
"name": "CVE-2019-17234-Wordpress-DirStroyer",
|
||||
"full_name": "administra1tor\/CVE-2019-17234-Wordpress-DirStroyer",
|
||||
"name": "CVE-2019-17234b-Exploit",
|
||||
"full_name": "administra1tor\/CVE-2019-17234b-Exploit",
|
||||
"owner": {
|
||||
"login": "administra1tor",
|
||||
"id": 57760715,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/57760715?v=4",
|
||||
"html_url": "https:\/\/github.com\/administra1tor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/administra1tor\/CVE-2019-17234-Wordpress-DirStroyer",
|
||||
"html_url": "https:\/\/github.com\/administra1tor\/CVE-2019-17234b-Exploit",
|
||||
"description": "Wordpress IgniteUp plugin < 3.4.1 allows unauthenticated users to arbitrarily delete files on the webserver possibly causing DoS.",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-14T14:12:36Z",
|
||||
"updated_at": "2019-11-14T17:32:35Z",
|
||||
"pushed_at": "2019-11-14T17:32:33Z",
|
||||
"updated_at": "2020-12-21T16:31:31Z",
|
||||
"pushed_at": "2020-12-21T16:31:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2020-12-02T21:00:03Z",
|
||||
"updated_at": "2020-12-21T18:13:03Z",
|
||||
"pushed_at": "2020-06-04T13:17:10Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 76,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-12-21T04:25:52Z",
|
||||
"updated_at": "2020-12-21T15:15:05Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2020-12-21T04:59:08Z",
|
||||
"updated_at": "2020-12-21T15:14:48Z",
|
||||
"pushed_at": "2020-10-16T17:44:13Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 174,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T16:04:30Z",
|
||||
"updated_at": "2020-12-15T08:00:57Z",
|
||||
"updated_at": "2020-12-21T15:34:26Z",
|
||||
"pushed_at": "2020-10-07T08:10:46Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -358,13 +358,13 @@
|
|||
"description": "CVE-2020-0688 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-23T01:18:13Z",
|
||||
"updated_at": "2020-12-03T18:22:45Z",
|
||||
"updated_at": "2020-12-21T20:27:18Z",
|
||||
"pushed_at": "2020-10-26T03:35:14Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -933,13 +933,13 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2020-12-09T23:26:05Z",
|
||||
"updated_at": "2020-12-21T19:18:30Z",
|
||||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 208,
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 209,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1140,13 +1140,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-12-18T09:01:29Z",
|
||||
"updated_at": "2020-12-21T19:15:42Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"forks_count": 114,
|
||||
"forks": 114,
|
||||
"watchers": 341,
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"watchers": 342,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T15:52:43Z",
|
||||
"updated_at": "2020-12-14T13:48:05Z",
|
||||
"updated_at": "2020-12-21T19:17:42Z",
|
||||
"pushed_at": "2020-06-09T20:41:32Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-12-21T10:49:08Z",
|
||||
"updated_at": "2020-12-21T17:36:55Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 249,
|
||||
"watchers": 250,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -83,7 +83,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-07-14T02:42:41Z",
|
||||
"updated_at": "2020-12-08T09:52:23Z",
|
||||
"pushed_at": "2020-12-02T18:46:16Z",
|
||||
"pushed_at": "2020-12-21T17:05:44Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-14T19:39:42Z",
|
||||
"updated_at": "2020-12-21T13:46:36Z",
|
||||
"updated_at": "2020-12-21T19:51:30Z",
|
||||
"pushed_at": "2020-12-20T17:29:07Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-29156.json
Normal file
25
2020/CVE-2020-29156.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 323442733,
|
||||
"name": "CVE-2020-29156",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-29156",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-29156",
|
||||
"description": "woocommerce wordpress plugin - Affected Version: V 4.5.2 [CVE-2020-29156]",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T20:38:50Z",
|
||||
"updated_at": "2020-12-21T20:48:23Z",
|
||||
"pushed_at": "2020-12-21T20:48:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 322992127,
|
||||
"name": "k8s-cve-2020-8554-mitigations",
|
||||
"full_name": "twistlock\/k8s-cve-2020-8554-mitigations",
|
||||
"owner": {
|
||||
"login": "twistlock",
|
||||
"id": 12218272,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12218272?v=4",
|
||||
"html_url": "https:\/\/github.com\/twistlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/twistlock\/k8s-cve-2020-8554-mitigations",
|
||||
"description": "Prisma Cloud Compute Admission rules to mitigate Kubernetes CVE-2020-8554",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-20T04:22:43Z",
|
||||
"updated_at": "2020-12-21T19:50:24Z",
|
||||
"pushed_at": "2020-12-20T20:34:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -1354,6 +1354,7 @@ DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.
|
|||
### CVE-2020-8554
|
||||
- [rancher/externalip-webhook](https://github.com/rancher/externalip-webhook)
|
||||
- [jrmurray000/CVE-2020-8554](https://github.com/jrmurray000/CVE-2020-8554)
|
||||
- [twistlock/k8s-cve-2020-8554-mitigations](https://github.com/twistlock/k8s-cve-2020-8554-mitigations)
|
||||
|
||||
### CVE-2020-8558 (2020-07-27)
|
||||
|
||||
|
@ -3066,7 +3067,12 @@ The Telnet service of Rubetek cameras RV-3406, RV-3409, and RV-3411 cameras (fir
|
|||
- [t0gu/CVE-2020-25790](https://github.com/t0gu/CVE-2020-25790)
|
||||
- [7Mitu/CVE-2020-25790](https://github.com/7Mitu/CVE-2020-25790)
|
||||
|
||||
### CVE-2020-25860
|
||||
### CVE-2020-25860 (2020-12-21)
|
||||
|
||||
<code>
|
||||
The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.
|
||||
</code>
|
||||
|
||||
- [rauc/rauc-1.5-integration](https://github.com/rauc/rauc-1.5-integration)
|
||||
|
||||
### CVE-2020-25867 (2020-10-07)
|
||||
|
@ -3303,6 +3309,9 @@ osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the
|
|||
|
||||
- [aslanemre/cve-2020-29070](https://github.com/aslanemre/cve-2020-29070)
|
||||
|
||||
### CVE-2020-29156
|
||||
- [Ko-kn3t/CVE-2020-29156](https://github.com/Ko-kn3t/CVE-2020-29156)
|
||||
|
||||
### CVE-2020-29254 (2020-12-11)
|
||||
|
||||
<code>
|
||||
|
@ -6391,7 +6400,7 @@ PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrate
|
|||
includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress allows unauthenticated arbitrary file deletion.
|
||||
</code>
|
||||
|
||||
- [administra1tor/CVE-2019-17234-Wordpress-DirStroyer](https://github.com/administra1tor/CVE-2019-17234-Wordpress-DirStroyer)
|
||||
- [administra1tor/CVE-2019-17234b-Exploit](https://github.com/administra1tor/CVE-2019-17234b-Exploit)
|
||||
|
||||
### CVE-2019-17240 (2019-10-06)
|
||||
|
||||
|
@ -9155,6 +9164,7 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut
|
|||
- [iansangaji/laravel-rce-cve-2018-15133](https://github.com/iansangaji/laravel-rce-cve-2018-15133)
|
||||
- [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133)
|
||||
- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133)
|
||||
- [PwnedShell/Larascript](https://github.com/PwnedShell/Larascript)
|
||||
|
||||
### CVE-2018-15365 (2018-09-28)
|
||||
|
||||
|
@ -16636,6 +16646,7 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
|
|||
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
|
||||
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
|
||||
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
|
||||
- [PepeTheRital/CVE-2003-0264](https://github.com/PepeTheRital/CVE-2003-0264)
|
||||
|
||||
### CVE-2003-0282 (2003-05-14)
|
||||
|
||||
|
|
Loading…
Reference in a new issue