mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/04/18 00:08:06
This commit is contained in:
parent
94057efd4b
commit
2c6d4ed0cf
29 changed files with 147 additions and 131 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 255,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -293,8 +293,8 @@
|
|||
"pushed_at": "2014-07-10T21:17:22Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-09T20:08:56Z",
|
||||
"updated_at": "2020-04-12T20:09:02Z",
|
||||
"updated_at": "2020-04-17T14:00:06Z",
|
||||
"pushed_at": "2018-04-07T00:30:52Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -37,11 +37,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-01-24T16:03:22Z",
|
||||
"updated_at": "2019-10-31T22:14:11Z",
|
||||
"pushed_at": "2018-01-31T01:24:08Z",
|
||||
"pushed_at": "2020-04-17T14:38:14Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-23T09:50:15Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-06-16T09:53:10Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-04-16T07:29:27Z",
|
||||
"updated_at": "2020-04-17T14:18:41Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 233,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"forks_count": 136,
|
||||
"forks": 136,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -2037,13 +2037,13 @@
|
|||
"description": "rce exploit , made to work with pocsuite3",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-17T17:23:53Z",
|
||||
"updated_at": "2020-04-08T07:10:24Z",
|
||||
"updated_at": "2020-04-17T13:27:25Z",
|
||||
"pushed_at": "2019-08-19T02:52:11Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2019-08-27T09:29:05Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T16:32:47Z",
|
||||
"updated_at": "2020-04-16T23:08:08Z",
|
||||
"pushed_at": "2020-04-16T17:00:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2020-04-17T14:11:51Z",
|
||||
"pushed_at": "2020-04-17T14:57:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Poc for CVE-2019-1253",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T20:40:15Z",
|
||||
"updated_at": "2020-04-17T04:14:34Z",
|
||||
"updated_at": "2020-04-17T09:47:52Z",
|
||||
"pushed_at": "2019-09-12T14:43:47Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC code for CVE-2019-14040",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-03T23:04:49Z",
|
||||
"updated_at": "2020-04-17T04:38:07Z",
|
||||
"updated_at": "2020-04-17T13:38:25Z",
|
||||
"pushed_at": "2020-04-15T14:27:49Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC code for CVE-2019-14041",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-03T23:05:10Z",
|
||||
"updated_at": "2020-04-16T17:19:31Z",
|
||||
"updated_at": "2020-04-17T13:19:43Z",
|
||||
"pushed_at": "2020-04-15T14:28:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-23T09:50:15Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-17T08:56:42Z",
|
||||
"pushed_at": "2020-04-16T09:51:34Z",
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"forks_count": 106,
|
||||
"forks": 106,
|
||||
"watchers": 547,
|
||||
"updated_at": "2020-04-17T13:16:12Z",
|
||||
"pushed_at": "2020-04-17T11:11:18Z",
|
||||
"stargazers_count": 555,
|
||||
"watchers_count": 555,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 555,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-04-16T14:40:28Z",
|
||||
"updated_at": "2020-04-17T13:05:15Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 150,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -795,13 +795,13 @@
|
|||
"description": "An unauthenticated PoC for CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-15T22:17:50Z",
|
||||
"updated_at": "2020-04-01T13:40:54Z",
|
||||
"updated_at": "2020-04-17T10:11:13Z",
|
||||
"pushed_at": "2020-03-15T22:20:58Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-17T08:56:42Z",
|
||||
"pushed_at": "2020-04-16T09:51:34Z",
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"forks_count": 106,
|
||||
"forks": 106,
|
||||
"watchers": 547,
|
||||
"updated_at": "2020-04-17T13:16:12Z",
|
||||
"pushed_at": "2020-04-17T11:11:18Z",
|
||||
"stargazers_count": 555,
|
||||
"watchers_count": 555,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 555,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1958 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-11T13:31:02Z",
|
||||
"updated_at": "2020-04-14T02:49:07Z",
|
||||
"updated_at": "2020-04-17T09:32:15Z",
|
||||
"pushed_at": "2020-04-11T14:52:36Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2020-04-17T07:51:14Z",
|
||||
"pushed_at": "2020-04-17T07:51:11Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 17,
|
||||
"updated_at": "2020-04-17T14:24:33Z",
|
||||
"pushed_at": "2020-04-17T14:24:31Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-2555 Python POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:02:59Z",
|
||||
"updated_at": "2020-04-17T05:50:55Z",
|
||||
"updated_at": "2020-04-17T10:37:10Z",
|
||||
"pushed_at": "2020-04-16T12:04:18Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-2555",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T12:02:26Z",
|
||||
"updated_at": "2020-04-16T13:02:07Z",
|
||||
"updated_at": "2020-04-17T10:37:16Z",
|
||||
"pushed_at": "2020-03-12T09:20:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-04-16T14:32:52Z",
|
||||
"updated_at": "2020-04-17T10:42:56Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 92,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2020-2555",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T08:06:08Z",
|
||||
"updated_at": "2020-04-10T09:18:27Z",
|
||||
"updated_at": "2020-04-17T11:12:38Z",
|
||||
"pushed_at": "2020-03-10T08:15:45Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,36 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-04-17T08:25:42Z",
|
||||
"updated_at": "2020-04-17T14:39:00Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 61,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256499271,
|
||||
"name": "CVE-2020-3952",
|
||||
"full_name": "gelim\/CVE-2020-3952",
|
||||
"owner": {
|
||||
"login": "gelim",
|
||||
"id": 179122,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/179122?v=4",
|
||||
"html_url": "https:\/\/github.com\/gelim"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gelim\/CVE-2020-3952",
|
||||
"description": "VMWare vmdir missing access control exploit checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-17T12:39:31Z",
|
||||
"updated_at": "2020-04-17T12:57:59Z",
|
||||
"pushed_at": "2020-04-17T12:57:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-15T10:16:56Z",
|
||||
"updated_at": "2020-04-17T07:30:50Z",
|
||||
"updated_at": "2020-04-17T10:38:14Z",
|
||||
"pushed_at": "2020-04-16T09:47:38Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-5260演示记录",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T16:19:23Z",
|
||||
"updated_at": "2020-04-17T03:43:05Z",
|
||||
"updated_at": "2020-04-17T14:17:44Z",
|
||||
"pushed_at": "2020-04-16T17:01:02Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -488,6 +488,7 @@ Under certain conditions, vmdir that ships with VMware vCenter Server, as part o
|
|||
- [curtbraz/CVE-2020-3952](https://github.com/curtbraz/CVE-2020-3952)
|
||||
- [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952)
|
||||
- [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952)
|
||||
- [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952)
|
||||
|
||||
### CVE-2020-4276
|
||||
|
||||
|
@ -12611,14 +12612,6 @@ Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.1
|
|||
|
||||
- [minervais/pocs](https://github.com/minervais/pocs)
|
||||
|
||||
### CVE-2009-1185
|
||||
|
||||
<code>
|
||||
udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
|
||||
</code>
|
||||
|
||||
- [joker2a/CVE-2009-1185-UDEV](https://github.com/joker2a/CVE-2009-1185-UDEV)
|
||||
|
||||
### CVE-2009-1244
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue