mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/04/09 12:11:13
This commit is contained in:
parent
50c1095b07
commit
2dce4b2b05
162 changed files with 8492 additions and 56 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T04:36:23Z",
|
||||
"updated_at": "2021-02-23T21:13:07Z",
|
||||
"updated_at": "2021-04-09T02:11:33Z",
|
||||
"pushed_at": "2018-08-14T07:47:02Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,8 +59,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-08T19:41:57Z",
|
||||
"updated_at": "2021-04-08T21:10:16Z",
|
||||
"pushed_at": "2021-04-08T21:10:14Z",
|
||||
"updated_at": "2021-04-08T22:34:39Z",
|
||||
"pushed_at": "2021-04-08T22:34:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-28T14:45:06Z",
|
||||
"updated_at": "2021-03-11T01:57:10Z",
|
||||
"updated_at": "2021-04-09T00:54:14Z",
|
||||
"pushed_at": "2018-05-08T10:59:23Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 79,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-04-06T11:16:49Z",
|
||||
"updated_at": "2021-04-09T03:07:33Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 397,
|
||||
"watchers_count": 397,
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 397,
|
||||
"watchers": 399,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1324,13 +1324,13 @@
|
|||
"description": "基于360公开的无损检测工具的可直接在windows上运行的批量检测程序",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-28T16:09:10Z",
|
||||
"updated_at": "2019-10-20T18:29:55Z",
|
||||
"updated_at": "2021-04-09T01:20:13Z",
|
||||
"pushed_at": "2019-05-28T17:16:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1040 with Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-14T11:16:03Z",
|
||||
"updated_at": "2021-03-23T03:15:54Z",
|
||||
"updated_at": "2021-04-08T23:38:21Z",
|
||||
"pushed_at": "2021-02-02T12:25:57Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 186,
|
||||
"watchers": 187,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2021-04-08T01:44:43Z",
|
||||
"updated_at": "2021-04-09T00:25:14Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 756,
|
||||
"watchers_count": 756,
|
||||
"forks_count": 156,
|
||||
"forks": 156,
|
||||
"watchers": 756,
|
||||
"stargazers_count": 757,
|
||||
"watchers_count": 757,
|
||||
"forks_count": 157,
|
||||
"forks": 157,
|
||||
"watchers": 757,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2019-07-15T06:03:15Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2020/CVE-2020-0014.json
Normal file
25
2020/CVE-2020-0014.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 292801316,
|
||||
"name": "CVE-2020-0014-Toast",
|
||||
"full_name": "tea9\/CVE-2020-0014-Toast",
|
||||
"owner": {
|
||||
"login": "tea9",
|
||||
"id": 39117901,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39117901?v=4",
|
||||
"html_url": "https:\/\/github.com\/tea9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tea9\/CVE-2020-0014-Toast",
|
||||
"description": "CVE-2020-0014-Toast-复现",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-04T09:02:29Z",
|
||||
"updated_at": "2020-11-25T07:28:27Z",
|
||||
"pushed_at": "2020-09-07T06:34:42Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -45,6 +45,52 @@
|
|||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 288758217,
|
||||
"name": "CVE-2020-0041",
|
||||
"full_name": "minutesinch\/CVE-2020-0041",
|
||||
"owner": {
|
||||
"login": "minutesinch",
|
||||
"id": 46642972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46642972?v=4",
|
||||
"html_url": "https:\/\/github.com\/minutesinch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/minutesinch\/CVE-2020-0041",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T14:44:48Z",
|
||||
"updated_at": "2020-08-19T14:45:02Z",
|
||||
"pushed_at": "2020-08-19T14:44:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 288758376,
|
||||
"name": "CVE-2020-0041-Original",
|
||||
"full_name": "minutesinch\/CVE-2020-0041-Original",
|
||||
"owner": {
|
||||
"login": "minutesinch",
|
||||
"id": 46642972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46642972?v=4",
|
||||
"html_url": "https:\/\/github.com\/minutesinch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/minutesinch\/CVE-2020-0041-Original",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T14:45:28Z",
|
||||
"updated_at": "2020-08-19T14:45:41Z",
|
||||
"pushed_at": "2020-08-19T14:45:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 337629139,
|
||||
"name": "CVE-2020-0041",
|
||||
|
|
25
2020/CVE-2020-0108.json
Normal file
25
2020/CVE-2020-0108.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 285182790,
|
||||
"name": "ServiceCheater",
|
||||
"full_name": "CrackerCat\/ServiceCheater",
|
||||
"owner": {
|
||||
"login": "CrackerCat",
|
||||
"id": 17995064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
|
||||
"html_url": "https:\/\/github.com\/CrackerCat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CrackerCat\/ServiceCheater",
|
||||
"description": "PoC of CVE-2020-0108",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-05T04:50:42Z",
|
||||
"updated_at": "2021-02-04T02:18:03Z",
|
||||
"pushed_at": "2020-08-05T02:55:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-0114.json
Normal file
25
2020/CVE-2020-0114.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 293716653,
|
||||
"name": "CVE-2020-0114-systemui",
|
||||
"full_name": "tea9\/CVE-2020-0114-systemui",
|
||||
"owner": {
|
||||
"login": "tea9",
|
||||
"id": 39117901,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39117901?v=4",
|
||||
"html_url": "https:\/\/github.com\/tea9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tea9\/CVE-2020-0114-systemui",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T06:06:36Z",
|
||||
"updated_at": "2020-11-25T07:32:06Z",
|
||||
"pushed_at": "2020-09-08T06:09:54Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 66,
|
||||
"watchers": 195,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299851365,
|
||||
"name": "CVE-2020-0674",
|
||||
"full_name": "Ken-Abruzzi\/CVE-2020-0674",
|
||||
"owner": {
|
||||
"login": "Ken-Abruzzi",
|
||||
"id": 68931768,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68931768?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ken-Abruzzi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ken-Abruzzi\/CVE-2020-0674",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-30T08:08:42Z",
|
||||
"updated_at": "2020-09-30T08:27:55Z",
|
||||
"pushed_at": "2020-09-30T08:27:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -344,6 +344,75 @@
|
|||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 288177224,
|
||||
"name": "CVE-2020-0688",
|
||||
"full_name": "murataydemir\/CVE-2020-0688",
|
||||
"owner": {
|
||||
"login": "murataydemir",
|
||||
"id": 16391655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
|
||||
"html_url": "https:\/\/github.com\/murataydemir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-0688",
|
||||
"description": "[CVE-2020-0688] Microsoft Exchange Server Fixed Cryptographic Key Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-17T12:41:51Z",
|
||||
"updated_at": "2021-03-13T00:32:52Z",
|
||||
"pushed_at": "2020-08-29T21:00:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 306497480,
|
||||
"name": "ecp_slap",
|
||||
"full_name": "zyn3rgy\/ecp_slap",
|
||||
"owner": {
|
||||
"login": "zyn3rgy",
|
||||
"id": 73311948,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73311948?v=4",
|
||||
"html_url": "https:\/\/github.com\/zyn3rgy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zyn3rgy\/ecp_slap",
|
||||
"description": "CVE-2020-0688 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-23T01:18:13Z",
|
||||
"updated_at": "2020-12-21T20:27:18Z",
|
||||
"pushed_at": "2020-10-26T03:35:14Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308367304,
|
||||
"name": "CVE-2020-0688-Scanner",
|
||||
"full_name": "SLSteff\/CVE-2020-0688-Scanner",
|
||||
"owner": {
|
||||
"login": "SLSteff",
|
||||
"id": 20557573,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20557573?v=4",
|
||||
"html_url": "https:\/\/github.com\/SLSteff"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SLSteff\/CVE-2020-0688-Scanner",
|
||||
"description": "Scans for Microsoft Exchange Versions with masscan",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T15:16:24Z",
|
||||
"updated_at": "2021-03-20T06:54:20Z",
|
||||
"pushed_at": "2020-10-29T20:06:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 326652424,
|
||||
"name": "CVE-2020-0688",
|
||||
|
|
|
@ -1379,6 +1379,121 @@
|
|||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277568818,
|
||||
"name": "SMBGhost-SMBleed-scanner",
|
||||
"full_name": "ZecOps\/SMBGhost-SMBleed-scanner",
|
||||
"owner": {
|
||||
"login": "ZecOps",
|
||||
"id": 31035096,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31035096?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZecOps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZecOps\/SMBGhost-SMBleed-scanner",
|
||||
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T14:45:07Z",
|
||||
"updated_at": "2021-04-02T02:34:56Z",
|
||||
"pushed_at": "2020-07-06T19:00:06Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279475059,
|
||||
"name": "smbghost-5",
|
||||
"full_name": "5l1v3r1\/smbghost-5",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/smbghost-5",
|
||||
"description": "CVE-2020-0796. Smbghost Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-14T03:49:09Z",
|
||||
"updated_at": "2021-02-05T22:53:54Z",
|
||||
"pushed_at": "2020-07-12T09:59:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296190446,
|
||||
"name": "CVE-2020-0796-BOF",
|
||||
"full_name": "rsmudge\/CVE-2020-0796-BOF",
|
||||
"owner": {
|
||||
"login": "rsmudge",
|
||||
"id": 1174994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1174994?v=4",
|
||||
"html_url": "https:\/\/github.com\/rsmudge"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rsmudge\/CVE-2020-0796-BOF",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T01:48:37Z",
|
||||
"updated_at": "2021-02-12T02:17:59Z",
|
||||
"pushed_at": "2020-09-17T01:55:48Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299197060,
|
||||
"name": "SMBGhost-CVE-2020-0796-",
|
||||
"full_name": "codewithpradhan\/SMBGhost-CVE-2020-0796-",
|
||||
"owner": {
|
||||
"login": "codewithpradhan",
|
||||
"id": 68530116,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68530116?v=4",
|
||||
"html_url": "https:\/\/github.com\/codewithpradhan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codewithpradhan\/SMBGhost-CVE-2020-0796-",
|
||||
"description": "To crash Windows-10 easily",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-28T05:23:20Z",
|
||||
"updated_at": "2020-09-28T05:37:37Z",
|
||||
"pushed_at": "2020-09-28T05:24:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 310486564,
|
||||
"name": "CVE-2020-0796-POC",
|
||||
"full_name": "AaronWilsonGrylls\/CVE-2020-0796-POC",
|
||||
"owner": {
|
||||
"login": "AaronWilsonGrylls",
|
||||
"id": 40255963,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40255963?v=4",
|
||||
"html_url": "https:\/\/github.com\/AaronWilsonGrylls"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AaronWilsonGrylls\/CVE-2020-0796-POC",
|
||||
"description": "CVE-2020-0796-POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-06T03:56:52Z",
|
||||
"updated_at": "2020-11-06T05:27:47Z",
|
||||
"pushed_at": "2020-11-06T05:27:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 311524122,
|
||||
"name": "CVE-2020-0796",
|
||||
|
|
25
2020/CVE-2020-0890.json
Normal file
25
2020/CVE-2020-0890.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 292597950,
|
||||
"name": "hyperv_local_dos_poc",
|
||||
"full_name": "gerhart01\/hyperv_local_dos_poc",
|
||||
"owner": {
|
||||
"login": "gerhart01",
|
||||
"id": 25981258,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25981258?v=4",
|
||||
"html_url": "https:\/\/github.com\/gerhart01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gerhart01\/hyperv_local_dos_poc",
|
||||
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-03T14:45:51Z",
|
||||
"updated_at": "2021-03-19T02:06:23Z",
|
||||
"pushed_at": "2020-09-08T20:01:05Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-1.json
Normal file
25
2020/CVE-2020-1.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 287520540,
|
||||
"name": "FDEU-CVE-2020-1FC5",
|
||||
"full_name": "full-disclosure\/FDEU-CVE-2020-1FC5",
|
||||
"owner": {
|
||||
"login": "full-disclosure",
|
||||
"id": 62108425,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62108425?v=4",
|
||||
"html_url": "https:\/\/github.com\/full-disclosure"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/full-disclosure\/FDEU-CVE-2020-1FC5",
|
||||
"description": "Telia Technicolor TG389ac v.17.1.7992 Samba privilege escalation exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-14T11:47:37Z",
|
||||
"updated_at": "2021-01-11T11:41:40Z",
|
||||
"pushed_at": "2020-08-17T07:43:41Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-10205.json
Normal file
25
2020/CVE-2020-10205.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 300210711,
|
||||
"name": "CVE-2020-10205",
|
||||
"full_name": "5l1v3r1\/CVE-2020-10205",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-10205",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-01T08:49:47Z",
|
||||
"updated_at": "2021-01-30T16:15:20Z",
|
||||
"pushed_at": "2020-04-17T04:00:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 297202950,
|
||||
"name": "CVE-2020-1048",
|
||||
"full_name": "Ken-Abruzzi\/CVE-2020-1048",
|
||||
"owner": {
|
||||
"login": "Ken-Abruzzi",
|
||||
"id": 68931768,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68931768?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ken-Abruzzi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ken-Abruzzi\/CVE-2020-1048",
|
||||
"description": "An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-21T01:59:38Z",
|
||||
"updated_at": "2020-09-21T03:26:18Z",
|
||||
"pushed_at": "2020-09-21T03:26:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,74 @@
|
|||
"forks": 27,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 280822745,
|
||||
"name": "CVE-2020-1054",
|
||||
"full_name": "Iamgublin\/CVE-2020-1054",
|
||||
"owner": {
|
||||
"login": "Iamgublin",
|
||||
"id": 16526066,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16526066?v=4",
|
||||
"html_url": "https:\/\/github.com\/Iamgublin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Iamgublin\/CVE-2020-1054",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-19T08:20:57Z",
|
||||
"updated_at": "2020-11-23T06:23:07Z",
|
||||
"pushed_at": "2020-07-19T08:24:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 282434512,
|
||||
"name": "CVE-2020-1054",
|
||||
"full_name": "KaLendsi\/CVE-2020-1054",
|
||||
"owner": {
|
||||
"login": "KaLendsi",
|
||||
"id": 68001644,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
|
||||
"html_url": "https:\/\/github.com\/KaLendsi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2020-1054",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-25T11:56:48Z",
|
||||
"updated_at": "2021-04-01T07:16:46Z",
|
||||
"pushed_at": "2020-07-27T02:43:12Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 307866361,
|
||||
"name": "CVE-2020-1054",
|
||||
"full_name": "Graham382\/CVE-2020-1054",
|
||||
"owner": {
|
||||
"login": "Graham382",
|
||||
"id": 67909699,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67909699?v=4",
|
||||
"html_url": "https:\/\/github.com\/Graham382"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Graham382\/CVE-2020-1054",
|
||||
"description": "Windows 7 LPE",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T00:48:43Z",
|
||||
"updated_at": "2020-10-28T06:09:12Z",
|
||||
"pushed_at": "2020-10-28T00:57:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-10713.json
Normal file
25
2020/CVE-2020-10713.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 283354389,
|
||||
"name": "BootHole",
|
||||
"full_name": "eclypsium\/BootHole",
|
||||
"owner": {
|
||||
"login": "eclypsium",
|
||||
"id": 28793771,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28793771?v=4",
|
||||
"html_url": "https:\/\/github.com\/eclypsium"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/eclypsium\/BootHole",
|
||||
"description": "BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-29T00:01:41Z",
|
||||
"updated_at": "2021-03-03T14:00:14Z",
|
||||
"pushed_at": "2020-08-24T23:16:38Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-11896.json
Normal file
25
2020/CVE-2020-11896.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 281287041,
|
||||
"name": "Treck20-Related",
|
||||
"full_name": "Fans0n-Fan\/Treck20-Related",
|
||||
"owner": {
|
||||
"login": "Fans0n-Fan",
|
||||
"id": 62650136,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62650136?v=4",
|
||||
"html_url": "https:\/\/github.com\/Fans0n-Fan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Fans0n-Fan\/Treck20-Related",
|
||||
"description": "PoC for CVE-2020-11896 Treck TCP\/IP stack and device asset investigation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T03:38:31Z",
|
||||
"updated_at": "2020-09-03T10:53:52Z",
|
||||
"pushed_at": "2020-09-03T06:37:46Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-11989.json
Normal file
25
2020/CVE-2020-11989.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 305056797,
|
||||
"name": "HYWZ36-CVE-2020-11989-code",
|
||||
"full_name": "HYWZ36\/HYWZ36-CVE-2020-11989-code",
|
||||
"owner": {
|
||||
"login": "HYWZ36",
|
||||
"id": 27775281,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27775281?v=4",
|
||||
"html_url": "https:\/\/github.com\/HYWZ36"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HYWZ36\/HYWZ36-CVE-2020-11989-code",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T08:34:47Z",
|
||||
"updated_at": "2020-10-19T08:52:49Z",
|
||||
"pushed_at": "2020-10-19T08:52:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-11996.json
Normal file
25
2020/CVE-2020-11996.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 282904807,
|
||||
"name": "tomcat-embed-core-9.0.31-CVE-2020-11996",
|
||||
"full_name": "rusakovichma\/tomcat-embed-core-9.0.31-CVE-2020-11996",
|
||||
"owner": {
|
||||
"login": "rusakovichma",
|
||||
"id": 4024331,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4024331?v=4",
|
||||
"html_url": "https:\/\/github.com\/rusakovichma"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rusakovichma\/tomcat-embed-core-9.0.31-CVE-2020-11996",
|
||||
"description": "tomcat-embed-core-9.0.31 CVE-2020-11996 Test PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-27T13:22:21Z",
|
||||
"updated_at": "2020-11-06T13:06:12Z",
|
||||
"pushed_at": "2020-11-06T13:05:59Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,51 @@
|
|||
"forks": 44,
|
||||
"watchers": 133,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277048370,
|
||||
"name": "CVE-2020-1206-Exploit",
|
||||
"full_name": "Info-Security-Solution-Kolkata\/CVE-2020-1206-Exploit",
|
||||
"owner": {
|
||||
"login": "Info-Security-Solution-Kolkata",
|
||||
"id": 67817658,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67817658?v=4",
|
||||
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata\/CVE-2020-1206-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T05:54:58Z",
|
||||
"updated_at": "2020-07-04T05:54:58Z",
|
||||
"pushed_at": "2020-07-04T05:54:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277049855,
|
||||
"name": "Smbleed-CVE-2020-1206-Exploit",
|
||||
"full_name": "Info-Security-Solution-Kolkata\/Smbleed-CVE-2020-1206-Exploit",
|
||||
"owner": {
|
||||
"login": "Info-Security-Solution-Kolkata",
|
||||
"id": 67817658,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67817658?v=4",
|
||||
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata\/Smbleed-CVE-2020-1206-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T06:06:52Z",
|
||||
"updated_at": "2020-07-04T06:06:52Z",
|
||||
"pushed_at": "2020-07-04T06:06:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-12432.json
Normal file
25
2020/CVE-2020-12432.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 281384090,
|
||||
"name": "CVE-2020-12432",
|
||||
"full_name": "d7x\/CVE-2020-12432",
|
||||
"owner": {
|
||||
"login": "d7x",
|
||||
"id": 36901198,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36901198?v=4",
|
||||
"html_url": "https:\/\/github.com\/d7x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d7x\/CVE-2020-12432",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T11:53:27Z",
|
||||
"updated_at": "2020-07-21T12:17:54Z",
|
||||
"pushed_at": "2020-07-21T12:17:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13094.json
Normal file
25
2020/CVE-2020-13094.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 284480533,
|
||||
"name": "CVE-2020-13094",
|
||||
"full_name": "mkelepce\/CVE-2020-13094",
|
||||
"owner": {
|
||||
"login": "mkelepce",
|
||||
"id": 10780392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10780392?v=4",
|
||||
"html_url": "https:\/\/github.com\/mkelepce"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mkelepce\/CVE-2020-13094",
|
||||
"description": " Dolibarr 11.0.3 - Persistent Cross-Site Scripting",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-02T14:43:43Z",
|
||||
"updated_at": "2020-08-02T14:45:17Z",
|
||||
"pushed_at": "2020-08-02T14:45:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-1313.json
Normal file
25
2020/CVE-2020-1313.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 283541946,
|
||||
"name": "CVE-2020-1313",
|
||||
"full_name": "irsl\/CVE-2020-1313",
|
||||
"owner": {
|
||||
"login": "irsl",
|
||||
"id": 6357121,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6357121?v=4",
|
||||
"html_url": "https:\/\/github.com\/irsl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/irsl\/CVE-2020-1313",
|
||||
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-29T15:56:50Z",
|
||||
"updated_at": "2021-02-15T13:32:57Z",
|
||||
"pushed_at": "2020-07-30T07:48:40Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13151.json
Normal file
25
2020/CVE-2020-13151.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 284276011,
|
||||
"name": "CVE-2020-13151",
|
||||
"full_name": "b4ny4n\/CVE-2020-13151",
|
||||
"owner": {
|
||||
"login": "b4ny4n",
|
||||
"id": 18220016,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18220016?v=4",
|
||||
"html_url": "https:\/\/github.com\/b4ny4n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b4ny4n\/CVE-2020-13151",
|
||||
"description": "POC for CVE-2020-13151",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-01T14:29:59Z",
|
||||
"updated_at": "2020-08-06T04:09:52Z",
|
||||
"pushed_at": "2020-08-03T18:55:37Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13162.json
Normal file
25
2020/CVE-2020-13162.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 292356141,
|
||||
"name": "tu-TOCTOU-kaiu-TOCMEU-CVE-2020-13162-",
|
||||
"full_name": "redtimmy\/tu-TOCTOU-kaiu-TOCMEU-CVE-2020-13162-",
|
||||
"owner": {
|
||||
"login": "redtimmy",
|
||||
"id": 40774163,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40774163?v=4",
|
||||
"html_url": "https:\/\/github.com\/redtimmy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/redtimmy\/tu-TOCTOU-kaiu-TOCMEU-CVE-2020-13162-",
|
||||
"description": "Exploit for CVE-2020-13162",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-02T17:58:32Z",
|
||||
"updated_at": "2021-01-28T03:34:26Z",
|
||||
"pushed_at": "2020-09-02T19:14:21Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13259.json
Normal file
25
2020/CVE-2020-13259.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 291721408,
|
||||
"name": "CVE-2020-13259",
|
||||
"full_name": "UrielYochpaz\/CVE-2020-13259",
|
||||
"owner": {
|
||||
"login": "UrielYochpaz",
|
||||
"id": 36864886,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36864886?v=4",
|
||||
"html_url": "https:\/\/github.com\/UrielYochpaz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/UrielYochpaz\/CVE-2020-13259",
|
||||
"description": "PoC of Full Account Takeover on RAD SecFlow-1v ",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-31T13:22:21Z",
|
||||
"updated_at": "2020-09-15T09:24:49Z",
|
||||
"pushed_at": "2020-08-31T13:53:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 281334440,
|
||||
"name": "CVE-2020-1337-exploit",
|
||||
"full_name": "math1as\/CVE-2020-1337-exploit",
|
||||
"owner": {
|
||||
"login": "math1as",
|
||||
"id": 13290978,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13290978?v=4",
|
||||
"html_url": "https:\/\/github.com\/math1as"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/math1as\/CVE-2020-1337-exploit",
|
||||
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T08:01:20Z",
|
||||
"updated_at": "2021-02-07T02:19:32Z",
|
||||
"pushed_at": "2020-07-21T10:28:42Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 286737584,
|
||||
"name": "CVE-2020-1337",
|
||||
"full_name": "VoidSec\/CVE-2020-1337",
|
||||
"owner": {
|
||||
"login": "VoidSec",
|
||||
"id": 5717603,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4",
|
||||
"html_url": "https:\/\/github.com\/VoidSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VoidSec\/CVE-2020-1337",
|
||||
"description": "CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-11T12:22:56Z",
|
||||
"updated_at": "2020-12-21T06:15:20Z",
|
||||
"pushed_at": "2020-08-11T17:23:04Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 286767343,
|
||||
"name": "CVE-2020-1337",
|
||||
"full_name": "neofito\/CVE-2020-1337",
|
||||
"owner": {
|
||||
"login": "neofito",
|
||||
"id": 1921186,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1921186?v=4",
|
||||
"html_url": "https:\/\/github.com\/neofito"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/neofito\/CVE-2020-1337",
|
||||
"description": "CVE-2020-1048 bypass: binary planting PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-11T14:34:07Z",
|
||||
"updated_at": "2020-12-11T17:31:45Z",
|
||||
"pushed_at": "2020-08-20T15:15:50Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 286979865,
|
||||
"name": "cve-2020-1337-poc",
|
||||
"full_name": "sailay1996\/cve-2020-1337-poc",
|
||||
"owner": {
|
||||
"login": "sailay1996",
|
||||
"id": 16739401,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4",
|
||||
"html_url": "https:\/\/github.com\/sailay1996"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sailay1996\/cve-2020-1337-poc",
|
||||
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T10:05:36Z",
|
||||
"updated_at": "2021-03-10T05:50:53Z",
|
||||
"pushed_at": "2020-08-13T07:16:12Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354442383,
|
||||
"name": "cve-2020-1337-poc",
|
||||
|
|
25
2020/CVE-2020-13424.json
Normal file
25
2020/CVE-2020-13424.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 284480950,
|
||||
"name": "CVE-2020-13424",
|
||||
"full_name": "mkelepce\/CVE-2020-13424",
|
||||
"owner": {
|
||||
"login": "mkelepce",
|
||||
"id": 10780392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10780392?v=4",
|
||||
"html_url": "https:\/\/github.com\/mkelepce"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mkelepce\/CVE-2020-13424",
|
||||
"description": " Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-02T14:46:10Z",
|
||||
"updated_at": "2020-08-02T14:49:24Z",
|
||||
"pushed_at": "2020-08-02T14:49:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-1349.json
Normal file
25
2020/CVE-2020-1349.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 283193307,
|
||||
"name": "CVE-2020-1349",
|
||||
"full_name": "0neb1n\/CVE-2020-1349",
|
||||
"owner": {
|
||||
"login": "0neb1n",
|
||||
"id": 22587350,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22587350?v=4",
|
||||
"html_url": "https:\/\/github.com\/0neb1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0neb1n\/CVE-2020-1349",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-28T11:33:38Z",
|
||||
"updated_at": "2021-01-24T17:07:02Z",
|
||||
"pushed_at": "2020-07-28T13:36:41Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,304 @@
|
|||
"forks": 15,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279675165,
|
||||
"name": "CVE-2020-1350",
|
||||
"full_name": "mr-r3b00t\/CVE-2020-1350",
|
||||
"owner": {
|
||||
"login": "mr-r3b00t",
|
||||
"id": 14963690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-14T19:28:46Z",
|
||||
"updated_at": "2020-10-10T20:44:29Z",
|
||||
"pushed_at": "2020-07-20T06:15:56Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279701266,
|
||||
"name": "Fake_CVE-2020-1350",
|
||||
"full_name": "zoomerxsec\/Fake_CVE-2020-1350",
|
||||
"owner": {
|
||||
"login": "zoomerxsec",
|
||||
"id": 56858864,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56858864?v=4",
|
||||
"html_url": "https:\/\/github.com\/zoomerxsec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350",
|
||||
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-14T21:55:57Z",
|
||||
"updated_at": "2020-10-10T20:44:46Z",
|
||||
"pushed_at": "2020-07-19T02:29:33Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279776271,
|
||||
"name": "CVE-2020-1350",
|
||||
"full_name": "T13nn3s\/CVE-2020-1350",
|
||||
"owner": {
|
||||
"login": "T13nn3s",
|
||||
"id": 29333776,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4",
|
||||
"html_url": "https:\/\/github.com\/T13nn3s"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350",
|
||||
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T05:46:31Z",
|
||||
"updated_at": "2020-10-26T00:13:06Z",
|
||||
"pushed_at": "2020-07-18T06:38:11Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279778118,
|
||||
"name": "SIGRed",
|
||||
"full_name": "corelight\/SIGRed",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/SIGRed",
|
||||
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T05:55:20Z",
|
||||
"updated_at": "2021-01-14T18:47:12Z",
|
||||
"pushed_at": "2020-07-20T02:20:43Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279961698,
|
||||
"name": "dRMM-CVE-2020-1350-response",
|
||||
"full_name": "jmaddington\/dRMM-CVE-2020-1350-response",
|
||||
"owner": {
|
||||
"login": "jmaddington",
|
||||
"id": 2353597,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
|
||||
"html_url": "https:\/\/github.com\/jmaddington"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response",
|
||||
"description": "Windows registry mitigation response to CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T19:43:39Z",
|
||||
"updated_at": "2020-10-10T20:38:31Z",
|
||||
"pushed_at": "2020-07-15T19:59:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279999285,
|
||||
"name": "CVE-2020-1350-DoS",
|
||||
"full_name": "maxpl0it\/CVE-2020-1350-DoS",
|
||||
"owner": {
|
||||
"login": "maxpl0it",
|
||||
"id": 27973683,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4",
|
||||
"html_url": "https:\/\/github.com\/maxpl0it"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS",
|
||||
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T23:00:00Z",
|
||||
"updated_at": "2021-03-31T07:43:42Z",
|
||||
"pushed_at": "2020-07-17T13:07:29Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 228,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 280207373,
|
||||
"name": "CVE-2020-1350",
|
||||
"full_name": "captainGeech42\/CVE-2020-1350",
|
||||
"owner": {
|
||||
"login": "captainGeech42",
|
||||
"id": 4255667,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4255667?v=4",
|
||||
"html_url": "https:\/\/github.com\/captainGeech42"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350",
|
||||
"description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-16T16:46:48Z",
|
||||
"updated_at": "2021-01-10T20:47:19Z",
|
||||
"pushed_at": "2020-07-16T18:32:04Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 280336928,
|
||||
"name": "CVE-2020-1350",
|
||||
"full_name": "connormcgarr\/CVE-2020-1350",
|
||||
"owner": {
|
||||
"login": "connormcgarr",
|
||||
"id": 45445720,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4",
|
||||
"html_url": "https:\/\/github.com\/connormcgarr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350",
|
||||
"description": "CVE-2020-1350 Proof-of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-17T05:41:19Z",
|
||||
"updated_at": "2021-03-13T12:31:18Z",
|
||||
"pushed_at": "2020-07-27T16:20:06Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 280665873,
|
||||
"name": "CVE-2020-1350",
|
||||
"full_name": "graph-inc\/CVE-2020-1350",
|
||||
"owner": {
|
||||
"login": "graph-inc",
|
||||
"id": 68469953,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68469953?v=4",
|
||||
"html_url": "https:\/\/github.com\/graph-inc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/graph-inc\/CVE-2020-1350",
|
||||
"description": "Scanner and Mitigator for CVE 2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T13:49:54Z",
|
||||
"updated_at": "2021-01-27T17:38:05Z",
|
||||
"pushed_at": "2020-07-18T14:05:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 280916907,
|
||||
"name": "CVE-2020-1350",
|
||||
"full_name": "CVEmaster\/CVE-2020-1350",
|
||||
"owner": {
|
||||
"login": "CVEmaster",
|
||||
"id": 68512490,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4",
|
||||
"html_url": "https:\/\/github.com\/CVEmaster"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350",
|
||||
"description": "DNS Vulnerability - CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-19T17:32:47Z",
|
||||
"updated_at": "2020-10-10T20:39:05Z",
|
||||
"pushed_at": "2020-07-20T14:25:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 281069444,
|
||||
"name": "CVE-2020-1350-checker.ps1",
|
||||
"full_name": "Secuora-Org\/CVE-2020-1350-checker.ps1",
|
||||
"owner": {
|
||||
"login": "Secuora-Org",
|
||||
"id": 67636594,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67636594?v=4",
|
||||
"html_url": "https:\/\/github.com\/Secuora-Org"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Secuora-Org\/CVE-2020-1350-checker.ps1",
|
||||
"description": "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T09:12:07Z",
|
||||
"updated_at": "2020-10-10T20:40:44Z",
|
||||
"pushed_at": "2020-07-20T09:12:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 281667659,
|
||||
"name": "cve-2020-1350",
|
||||
"full_name": "gdwnet\/cve-2020-1350",
|
||||
"owner": {
|
||||
"login": "gdwnet",
|
||||
"id": 19855556,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4",
|
||||
"html_url": "https:\/\/github.com\/gdwnet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350",
|
||||
"description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-22T12:11:33Z",
|
||||
"updated_at": "2020-10-10T20:40:26Z",
|
||||
"pushed_at": "2020-07-22T12:15:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 282558950,
|
||||
"name": "CVE-2020-1350-Fix",
|
||||
"full_name": "simeononsecurity\/CVE-2020-1350-Fix",
|
||||
"owner": {
|
||||
"login": "simeononsecurity",
|
||||
"id": 4913771,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4",
|
||||
"html_url": "https:\/\/github.com\/simeononsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix",
|
||||
"description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-26T02:12:36Z",
|
||||
"updated_at": "2020-10-10T20:40:04Z",
|
||||
"pushed_at": "2020-07-26T02:13:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-1362.json
Normal file
25
2020/CVE-2020-1362.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 280358563,
|
||||
"name": "CVE-2020-1362",
|
||||
"full_name": "Q4n\/CVE-2020-1362",
|
||||
"owner": {
|
||||
"login": "Q4n",
|
||||
"id": 48317526,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48317526?v=4",
|
||||
"html_url": "https:\/\/github.com\/Q4n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Q4n\/CVE-2020-1362",
|
||||
"description": "writeup of CVE-2020-1362",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-17T07:35:05Z",
|
||||
"updated_at": "2021-03-12T18:18:45Z",
|
||||
"pushed_at": "2020-07-17T07:54:26Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 223,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13640.json
Normal file
25
2020/CVE-2020-13640.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 277377386,
|
||||
"name": "CVE-2020-13640",
|
||||
"full_name": "asterite3\/CVE-2020-13640",
|
||||
"owner": {
|
||||
"login": "asterite3",
|
||||
"id": 5569241,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5569241?v=4",
|
||||
"html_url": "https:\/\/github.com\/asterite3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/asterite3\/CVE-2020-13640",
|
||||
"description": "CVE-2020-13640 - SQL injection in wpDiscuz WordPress plugin <= 5.3.5",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T20:22:16Z",
|
||||
"updated_at": "2020-07-29T06:32:34Z",
|
||||
"pushed_at": "2020-07-05T20:24:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13925.json
Normal file
25
2020/CVE-2020-13925.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 281088072,
|
||||
"name": "CVE-2020-13925",
|
||||
"full_name": "bit4woo\/CVE-2020-13925",
|
||||
"owner": {
|
||||
"login": "bit4woo",
|
||||
"id": 8793481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8793481?v=4",
|
||||
"html_url": "https:\/\/github.com\/bit4woo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bit4woo\/CVE-2020-13925",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T10:38:14Z",
|
||||
"updated_at": "2020-09-01T02:28:05Z",
|
||||
"pushed_at": "2020-07-20T10:56:28Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2020/CVE-2020-13933.json
Normal file
48
2020/CVE-2020-13933.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 294077686,
|
||||
"name": "CVE-2020-13933",
|
||||
"full_name": "lyy289065406\/CVE-2020-13933",
|
||||
"owner": {
|
||||
"login": "lyy289065406",
|
||||
"id": 17040287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17040287?v=4",
|
||||
"html_url": "https:\/\/github.com\/lyy289065406"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lyy289065406\/CVE-2020-13933",
|
||||
"description": "CVE-2020-13933 靶场: shiro 认证绕过漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-09T10:20:25Z",
|
||||
"updated_at": "2020-11-20T06:30:05Z",
|
||||
"pushed_at": "2020-09-11T17:14:19Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 297823317,
|
||||
"name": "cve-2020-13933",
|
||||
"full_name": "0xkami\/cve-2020-13933",
|
||||
"owner": {
|
||||
"login": "0xkami",
|
||||
"id": 19571618,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xkami"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xkami\/cve-2020-13933",
|
||||
"description": "cve-2020-13933 apache shiro权限绕过漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T01:55:46Z",
|
||||
"updated_at": "2020-12-14T07:27:56Z",
|
||||
"pushed_at": "2020-09-23T02:00:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13935.json
Normal file
25
2020/CVE-2020-13935.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 309400991,
|
||||
"name": "CVE-2020-13935",
|
||||
"full_name": "RedTeamPentesting\/CVE-2020-13935",
|
||||
"owner": {
|
||||
"login": "RedTeamPentesting",
|
||||
"id": 34096076,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34096076?v=4",
|
||||
"html_url": "https:\/\/github.com\/RedTeamPentesting"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RedTeamPentesting\/CVE-2020-13935",
|
||||
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-02T14:48:55Z",
|
||||
"updated_at": "2021-04-07T13:37:56Z",
|
||||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13996.json
Normal file
25
2020/CVE-2020-13996.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 284481729,
|
||||
"name": "CVE-2020-13996",
|
||||
"full_name": "mkelepce\/CVE-2020-13996",
|
||||
"owner": {
|
||||
"login": "mkelepce",
|
||||
"id": 10780392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10780392?v=4",
|
||||
"html_url": "https:\/\/github.com\/mkelepce"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mkelepce\/CVE-2020-13996",
|
||||
"description": " Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-02T14:50:04Z",
|
||||
"updated_at": "2020-08-02T14:52:24Z",
|
||||
"pushed_at": "2020-08-02T14:52:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 300843760,
|
||||
"name": "CVE-2020-14064",
|
||||
"full_name": "masoud-zivari\/CVE-2020-14064",
|
||||
"owner": {
|
||||
"login": "masoud-zivari",
|
||||
"id": 72297087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72297087?v=4",
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14064",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-03T09:30:34Z",
|
||||
"updated_at": "2020-10-03T09:30:47Z",
|
||||
"pushed_at": "2020-10-03T09:30:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 300840687,
|
||||
"name": "CVE-2020-14065",
|
||||
"full_name": "masoud-zivari\/CVE-2020-14065",
|
||||
"owner": {
|
||||
"login": "masoud-zivari",
|
||||
"id": 72297087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72297087?v=4",
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14065",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-03T09:13:19Z",
|
||||
"updated_at": "2020-10-03T09:13:34Z",
|
||||
"pushed_at": "2020-10-03T09:13:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 300841463,
|
||||
"name": "CVE-2020-14066",
|
||||
"full_name": "masoud-zivari\/CVE-2020-14066",
|
||||
"owner": {
|
||||
"login": "masoud-zivari",
|
||||
"id": 72297087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72297087?v=4",
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14066",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-03T09:17:35Z",
|
||||
"updated_at": "2020-10-03T09:17:50Z",
|
||||
"pushed_at": "2020-10-03T09:17:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 307446561,
|
||||
"name": "CVE-2020-14181",
|
||||
"full_name": "Rival420\/CVE-2020-14181",
|
||||
"owner": {
|
||||
"login": "Rival420",
|
||||
"id": 51548322,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51548322?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rival420"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rival420\/CVE-2020-14181",
|
||||
"description": "POC For CVE-2020-1481 - Jira Username Enumerator\/Validator",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-26T17:07:28Z",
|
||||
"updated_at": "2021-03-29T07:28:14Z",
|
||||
"pushed_at": "2020-10-30T09:36:23Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 336200955,
|
||||
"name": "CVE-2020-14181",
|
||||
|
|
25
2020/CVE-2020-14199.json
Normal file
25
2020/CVE-2020-14199.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 280435778,
|
||||
"name": "CVE-2020-14199",
|
||||
"full_name": "nondejus\/CVE-2020-14199",
|
||||
"owner": {
|
||||
"login": "nondejus",
|
||||
"id": 56696825,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56696825?v=4",
|
||||
"html_url": "https:\/\/github.com\/nondejus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nondejus\/CVE-2020-14199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-17T13:48:01Z",
|
||||
"updated_at": "2020-07-17T13:58:07Z",
|
||||
"pushed_at": "2020-07-17T13:58:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14292.json
Normal file
25
2020/CVE-2020-14292.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 288914124,
|
||||
"name": "CVE-2020-14292",
|
||||
"full_name": "alwentiu\/CVE-2020-14292",
|
||||
"owner": {
|
||||
"login": "alwentiu",
|
||||
"id": 39551518,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39551518?v=4",
|
||||
"html_url": "https:\/\/github.com\/alwentiu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alwentiu\/CVE-2020-14292",
|
||||
"description": "Details of CVE-2020-14292",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-20T05:24:30Z",
|
||||
"updated_at": "2020-09-08T02:14:25Z",
|
||||
"pushed_at": "2020-09-08T02:13:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14293.json
Normal file
25
2020/CVE-2020-14293.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 298228408,
|
||||
"name": "CVE-2020-14293",
|
||||
"full_name": "patrickhener\/CVE-2020-14293",
|
||||
"owner": {
|
||||
"login": "patrickhener",
|
||||
"id": 7579055,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7579055?v=4",
|
||||
"html_url": "https:\/\/github.com\/patrickhener"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/patrickhener\/CVE-2020-14293",
|
||||
"description": "This repository holds the advisory, exploits and vulnerable software of the CVE-2020-14293",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-24T09:17:38Z",
|
||||
"updated_at": "2020-10-06T10:32:07Z",
|
||||
"pushed_at": "2020-10-02T10:38:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14294.json
Normal file
25
2020/CVE-2020-14294.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 298221475,
|
||||
"name": "CVE-2020-14294",
|
||||
"full_name": "patrickhener\/CVE-2020-14294",
|
||||
"owner": {
|
||||
"login": "patrickhener",
|
||||
"id": 7579055,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7579055?v=4",
|
||||
"html_url": "https:\/\/github.com\/patrickhener"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/patrickhener\/CVE-2020-14294",
|
||||
"description": "This repository holds the advisory of the CVE-2020-14294",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-24T08:49:05Z",
|
||||
"updated_at": "2020-10-02T10:37:49Z",
|
||||
"pushed_at": "2020-10-02T10:37:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14321.json
Normal file
25
2020/CVE-2020-14321.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 282554130,
|
||||
"name": "CVE-2020-14321",
|
||||
"full_name": "HoangKien1020\/CVE-2020-14321",
|
||||
"owner": {
|
||||
"login": "HoangKien1020",
|
||||
"id": 24661746,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24661746?v=4",
|
||||
"html_url": "https:\/\/github.com\/HoangKien1020"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2020-14321",
|
||||
"description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-26T01:28:53Z",
|
||||
"updated_at": "2021-04-05T13:39:48Z",
|
||||
"pushed_at": "2020-07-26T01:36:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14386.json
Normal file
25
2020/CVE-2020-14386.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 296445764,
|
||||
"name": "cve-2020-14386",
|
||||
"full_name": "cgwalters\/cve-2020-14386",
|
||||
"owner": {
|
||||
"login": "cgwalters",
|
||||
"id": 244096,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/244096?v=4",
|
||||
"html_url": "https:\/\/github.com\/cgwalters"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cgwalters\/cve-2020-14386",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T21:25:18Z",
|
||||
"updated_at": "2021-03-04T03:23:26Z",
|
||||
"pushed_at": "2020-09-18T00:01:00Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14644.json
Normal file
25
2020/CVE-2020-14644.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 305639848,
|
||||
"name": "cve-2020-14644",
|
||||
"full_name": "0xkami\/cve-2020-14644",
|
||||
"owner": {
|
||||
"login": "0xkami",
|
||||
"id": 19571618,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xkami"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xkami\/cve-2020-14644",
|
||||
"description": "cve-2020-14644 漏洞环境",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-20T08:25:40Z",
|
||||
"updated_at": "2020-10-20T09:11:28Z",
|
||||
"pushed_at": "2020-10-20T09:11:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 281003266,
|
||||
"name": "CVE-2020-14645",
|
||||
"full_name": "Y4er\/CVE-2020-14645",
|
||||
"owner": {
|
||||
"login": "Y4er",
|
||||
"id": 40487319,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40487319?v=4",
|
||||
"html_url": "https:\/\/github.com\/Y4er"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Y4er\/CVE-2020-14645",
|
||||
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T03:27:24Z",
|
||||
"updated_at": "2021-03-16T07:32:45Z",
|
||||
"pushed_at": "2020-07-20T03:51:06Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 281100240,
|
||||
"name": "CVE-2020-14645",
|
||||
"full_name": "DaBoQuan\/CVE-2020-14645",
|
||||
"owner": {
|
||||
"login": "DaBoQuan",
|
||||
"id": 13045485,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13045485?v=4",
|
||||
"html_url": "https:\/\/github.com\/DaBoQuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DaBoQuan\/CVE-2020-14645",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T11:40:09Z",
|
||||
"updated_at": "2020-08-31T02:50:43Z",
|
||||
"pushed_at": "2020-07-20T14:03:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 283214659,
|
||||
"name": "CVE-2020-14645",
|
||||
"full_name": "ChenZIDu\/CVE-2020-14645",
|
||||
"owner": {
|
||||
"login": "ChenZIDu",
|
||||
"id": 49174343,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49174343?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChenZIDu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChenZIDu\/CVE-2020-14645",
|
||||
"description": "环境下载",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-28T13:05:13Z",
|
||||
"updated_at": "2020-07-29T04:25:51Z",
|
||||
"pushed_at": "2020-07-29T04:25:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 305992602,
|
||||
"name": "CVE-2020-14645-code",
|
||||
|
|
|
@ -1,4 +1,510 @@
|
|||
[
|
||||
{
|
||||
"id": 287009597,
|
||||
"name": "CVE-2020-1472-visualizer",
|
||||
"full_name": "Tobey123\/CVE-2020-1472-visualizer",
|
||||
"owner": {
|
||||
"login": "Tobey123",
|
||||
"id": 5292815,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5292815?v=4",
|
||||
"html_url": "https:\/\/github.com\/Tobey123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Tobey123\/CVE-2020-1472-visualizer",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T12:35:56Z",
|
||||
"updated_at": "2020-11-05T15:16:46Z",
|
||||
"pushed_at": "2020-08-06T22:24:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 293756101,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "SecuraBV\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "SecuraBV",
|
||||
"id": 46344423,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46344423?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecuraBV"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecuraBV\/CVE-2020-1472",
|
||||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-04-07T13:30:25Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1269,
|
||||
"watchers_count": 1269,
|
||||
"forks_count": 292,
|
||||
"forks": 292,
|
||||
"watchers": 1269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295480770,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "cube0x0\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "cube0x0",
|
||||
"id": 39370848,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
|
||||
"html_url": "https:\/\/github.com\/cube0x0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:52:37Z",
|
||||
"updated_at": "2021-04-08T01:07:35Z",
|
||||
"pushed_at": "2020-09-14T16:53:07Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295481822,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "dirkjanm\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "dirkjanm",
|
||||
"id": 1773762,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1773762?v=4",
|
||||
"html_url": "https:\/\/github.com\/dirkjanm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dirkjanm\/CVE-2020-1472",
|
||||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-04-08T10:22:43Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 779,
|
||||
"watchers_count": 779,
|
||||
"forks_count": 227,
|
||||
"forks": 227,
|
||||
"watchers": 779,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295482050,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "VoidSec\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "VoidSec",
|
||||
"id": 5717603,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4",
|
||||
"html_url": "https:\/\/github.com\/VoidSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VoidSec\/CVE-2020-1472",
|
||||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2021-04-07T12:53:44Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 198,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295515909,
|
||||
"name": "zerologon",
|
||||
"full_name": "risksense\/zerologon",
|
||||
"owner": {
|
||||
"login": "risksense",
|
||||
"id": 1999284,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1999284?v=4",
|
||||
"html_url": "https:\/\/github.com\/risksense"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/risksense\/zerologon",
|
||||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-04-07T11:37:32Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 297,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295517706,
|
||||
"name": "zer0dump",
|
||||
"full_name": "bb00\/zer0dump",
|
||||
"owner": {
|
||||
"login": "bb00",
|
||||
"id": 11166320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11166320?v=4",
|
||||
"html_url": "https:\/\/github.com\/bb00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bb00\/zer0dump",
|
||||
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:27:14Z",
|
||||
"updated_at": "2021-04-02T22:09:33Z",
|
||||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295692006,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "0xkami\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "0xkami",
|
||||
"id": 19571618,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xkami"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xkami\/CVE-2020-1472",
|
||||
"description": "CVE-2020-1472漏洞复现过程",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T10:25:47Z",
|
||||
"updated_at": "2020-11-07T02:11:06Z",
|
||||
"pushed_at": "2020-09-15T10:39:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295716616,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "NAXG\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "NAXG",
|
||||
"id": 28560949,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28560949?v=4",
|
||||
"html_url": "https:\/\/github.com\/NAXG"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NAXG\/CVE-2020-1472",
|
||||
"description": "CVE-2020-1472复现流程",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T12:11:49Z",
|
||||
"updated_at": "2020-09-17T20:50:53Z",
|
||||
"pushed_at": "2020-09-16T08:45:06Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295743213,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "s0wr0b1ndef\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "s0wr0b1ndef",
|
||||
"id": 37288034,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37288034?v=4",
|
||||
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T13:50:01Z",
|
||||
"updated_at": "2020-09-20T18:17:37Z",
|
||||
"pushed_at": "2021-03-20T05:07:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295754317,
|
||||
"name": "zerologon-CVE-2020-1472",
|
||||
"full_name": "harshil-shah004\/zerologon-CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "harshil-shah004",
|
||||
"id": 34110198,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34110198?v=4",
|
||||
"html_url": "https:\/\/github.com\/harshil-shah004"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/harshil-shah004\/zerologon-CVE-2020-1472",
|
||||
"description": "PoC for Zerologon (CVE-2020-1472) - Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T14:29:24Z",
|
||||
"updated_at": "2021-01-27T07:28:51Z",
|
||||
"pushed_at": "2020-09-16T11:06:19Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295781919,
|
||||
"name": "CVE-2020-1472-EXP",
|
||||
"full_name": "k8gege\/CVE-2020-1472-EXP",
|
||||
"owner": {
|
||||
"login": "k8gege",
|
||||
"id": 42312878,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
|
||||
"html_url": "https:\/\/github.com\/k8gege"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k8gege\/CVE-2020-1472-EXP",
|
||||
"description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T16:10:21Z",
|
||||
"updated_at": "2021-02-11T11:15:16Z",
|
||||
"pushed_at": "2020-09-15T16:40:53Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295788757,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "422926799\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "422926799",
|
||||
"id": 29516567,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29516567?v=4",
|
||||
"html_url": "https:\/\/github.com\/422926799"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/422926799\/CVE-2020-1472",
|
||||
"description": "CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T16:36:40Z",
|
||||
"updated_at": "2020-09-16T03:58:43Z",
|
||||
"pushed_at": "2020-09-15T16:38:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295903888,
|
||||
"name": "zabbix-template-CVE-2020-1472",
|
||||
"full_name": "scv-m\/zabbix-template-CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "scv-m",
|
||||
"id": 965541,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/965541?v=4",
|
||||
"html_url": "https:\/\/github.com\/scv-m"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/scv-m\/zabbix-template-CVE-2020-1472",
|
||||
"description": "Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T02:37:52Z",
|
||||
"updated_at": "2021-02-08T22:22:05Z",
|
||||
"pushed_at": "2020-09-16T02:47:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295915198,
|
||||
"name": "cve-2020-1472",
|
||||
"full_name": "mstxq17\/cve-2020-1472",
|
||||
"owner": {
|
||||
"login": "mstxq17",
|
||||
"id": 29624427,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4",
|
||||
"html_url": "https:\/\/github.com\/mstxq17"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mstxq17\/cve-2020-1472",
|
||||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2021-03-01T01:00:35Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295917575,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "Fa1c0n35\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "Fa1c0n35",
|
||||
"id": 33335488,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
|
||||
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:54:27Z",
|
||||
"updated_at": "2020-09-19T17:56:42Z",
|
||||
"pushed_at": "2020-09-16T03:54:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295917979,
|
||||
"name": "SecuraBV-CVE-2020-1472",
|
||||
"full_name": "Fa1c0n35\/SecuraBV-CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "Fa1c0n35",
|
||||
"id": 33335488,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
|
||||
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Fa1c0n35\/SecuraBV-CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:57:04Z",
|
||||
"updated_at": "2020-09-25T06:08:29Z",
|
||||
"pushed_at": "2021-03-20T05:06:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295956141,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "CanciuCostin\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "CanciuCostin",
|
||||
"id": 27332434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27332434?v=4",
|
||||
"html_url": "https:\/\/github.com\/CanciuCostin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CanciuCostin\/CVE-2020-1472",
|
||||
"description": "CVE-2020-1472 - Zero Logon vulnerability Python implementation",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T07:25:22Z",
|
||||
"updated_at": "2020-09-17T07:17:13Z",
|
||||
"pushed_at": "2020-09-16T08:39:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295972450,
|
||||
"name": "cve-2020-1472_Tool-collection",
|
||||
"full_name": "0xcccc666\/cve-2020-1472_Tool-collection",
|
||||
"owner": {
|
||||
"login": "0xcccc666",
|
||||
"id": 71364553,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71364553?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xcccc666"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xcccc666\/cve-2020-1472_Tool-collection",
|
||||
"description": "cve-2020-1472_Tool collection",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T08:32:52Z",
|
||||
"updated_at": "2020-11-28T04:59:11Z",
|
||||
"pushed_at": "2020-09-16T09:13:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295984599,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "murataydemir\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "murataydemir",
|
||||
"id": 16391655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
|
||||
"html_url": "https:\/\/github.com\/murataydemir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-1472",
|
||||
"description": "[CVE-2020-1472] Netlogon Remote Protocol Call (MS-NRPC) Privilege Escalation (Zerologon)",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T09:22:30Z",
|
||||
"updated_at": "2021-01-15T04:57:38Z",
|
||||
"pushed_at": "2020-09-16T20:59:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295992280,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "npocmak\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "npocmak",
|
||||
"id": 33814019,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33814019?v=4",
|
||||
"html_url": "https:\/\/github.com\/npocmak"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/npocmak\/CVE-2020-1472",
|
||||
"description": "https:\/\/github.com\/dirkjanm\/CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T09:54:09Z",
|
||||
"updated_at": "2020-10-10T11:45:35Z",
|
||||
"pushed_at": "2020-09-16T09:58:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296056571,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "victim10wq3\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "victim10wq3",
|
||||
"id": 46973456,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46973456?v=4",
|
||||
"html_url": "https:\/\/github.com\/victim10wq3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/victim10wq3\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T14:25:54Z",
|
||||
"updated_at": "2020-09-19T17:56:06Z",
|
||||
"pushed_at": "2020-09-16T14:28:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296388474,
|
||||
"name": "zerologon",
|
||||
|
@ -22,6 +528,190 @@
|
|||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296468860,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "sv3nbeast\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "sv3nbeast",
|
||||
"id": 55974091,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55974091?v=4",
|
||||
"html_url": "https:\/\/github.com\/sv3nbeast"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-1472",
|
||||
"description": " CVE-2020-1472复现时使用的py文件整理打包",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-18T00:02:26Z",
|
||||
"updated_at": "2020-12-09T05:06:51Z",
|
||||
"pushed_at": "2020-09-18T00:20:46Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296948762,
|
||||
"name": "CVE-2020-1472-Easy",
|
||||
"full_name": "midpipps\/CVE-2020-1472-Easy",
|
||||
"owner": {
|
||||
"login": "midpipps",
|
||||
"id": 4256983,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4256983?v=4",
|
||||
"html_url": "https:\/\/github.com\/midpipps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/midpipps\/CVE-2020-1472-Easy",
|
||||
"description": "A simple implementation\/code smash of a bunch of other repos",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-19T20:44:40Z",
|
||||
"updated_at": "2020-09-19T21:27:41Z",
|
||||
"pushed_at": "2020-09-19T21:27:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296966855,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "hectorgie\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "hectorgie",
|
||||
"id": 56555336,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56555336?v=4",
|
||||
"html_url": "https:\/\/github.com\/hectorgie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hectorgie\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-19T23:15:41Z",
|
||||
"updated_at": "2020-09-19T23:15:54Z",
|
||||
"pushed_at": "2020-09-19T23:15:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 297085240,
|
||||
"name": "zerologon-cve-2020-1472-notes",
|
||||
"full_name": "johnpathe\/zerologon-cve-2020-1472-notes",
|
||||
"owner": {
|
||||
"login": "johnpathe",
|
||||
"id": 8648275,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8648275?v=4",
|
||||
"html_url": "https:\/\/github.com\/johnpathe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/johnpathe\/zerologon-cve-2020-1472-notes",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-20T13:44:16Z",
|
||||
"updated_at": "2020-10-19T06:55:24Z",
|
||||
"pushed_at": "2020-10-19T06:55:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 297260718,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "t31m0\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "t31m0",
|
||||
"id": 13071219,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13071219?v=4",
|
||||
"html_url": "https:\/\/github.com\/t31m0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/t31m0\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-21T07:24:03Z",
|
||||
"updated_at": "2020-09-21T07:24:16Z",
|
||||
"pushed_at": "2020-09-21T07:24:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 298383438,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "grupooruss\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "grupooruss",
|
||||
"id": 43943489,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4",
|
||||
"html_url": "https:\/\/github.com\/grupooruss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2020-1472",
|
||||
"description": "CVE 2020-1472 Script de validación ",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-24T20:05:21Z",
|
||||
"updated_at": "2020-09-24T20:08:43Z",
|
||||
"pushed_at": "2020-09-24T20:08:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 298771178,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "striveben\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "striveben",
|
||||
"id": 61238912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61238912?v=4",
|
||||
"html_url": "https:\/\/github.com\/striveben"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/striveben\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-26T08:31:47Z",
|
||||
"updated_at": "2021-01-21T09:02:23Z",
|
||||
"pushed_at": "2020-09-26T08:44:42Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299216120,
|
||||
"name": "CVE-2020-1472-02-",
|
||||
"full_name": "Fa1c0n35\/CVE-2020-1472-02-",
|
||||
"owner": {
|
||||
"login": "Fa1c0n35",
|
||||
"id": 33335488,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
|
||||
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2020-1472-02-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-28T06:53:41Z",
|
||||
"updated_at": "2020-09-28T06:53:54Z",
|
||||
"pushed_at": "2021-03-20T05:09:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299264416,
|
||||
"name": "CVE-2020-1472",
|
||||
|
@ -45,6 +735,121 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299708288,
|
||||
"name": "Zerologon_CVE-2020-1472",
|
||||
"full_name": "WiIs0n\/Zerologon_CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "WiIs0n",
|
||||
"id": 40162782,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40162782?v=4",
|
||||
"html_url": "https:\/\/github.com\/WiIs0n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WiIs0n\/Zerologon_CVE-2020-1472",
|
||||
"description": "POC for checking multiple hosts for Zerologon vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-29T18:45:44Z",
|
||||
"updated_at": "2021-03-30T12:54:34Z",
|
||||
"pushed_at": "2020-10-05T07:47:02Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299733711,
|
||||
"name": "ADZero",
|
||||
"full_name": "Privia-Security\/ADZero",
|
||||
"owner": {
|
||||
"login": "Privia-Security",
|
||||
"id": 69091374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69091374?v=4",
|
||||
"html_url": "https:\/\/github.com\/Privia-Security"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Privia-Security\/ADZero",
|
||||
"description": "Zerologon AutoExploit Tool | CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-29T20:43:06Z",
|
||||
"updated_at": "2021-04-03T01:16:58Z",
|
||||
"pushed_at": "2020-10-02T13:00:21Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299845895,
|
||||
"name": "cve-2020-1472",
|
||||
"full_name": "Ken-Abruzzi\/cve-2020-1472",
|
||||
"owner": {
|
||||
"login": "Ken-Abruzzi",
|
||||
"id": 68931768,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68931768?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ken-Abruzzi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ken-Abruzzi\/cve-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-30T07:45:50Z",
|
||||
"updated_at": "2020-09-30T07:57:36Z",
|
||||
"pushed_at": "2020-09-30T07:57:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299977188,
|
||||
"name": "Set-ZerologonMitigation",
|
||||
"full_name": "rhymeswithmogul\/Set-ZerologonMitigation",
|
||||
"owner": {
|
||||
"login": "rhymeswithmogul",
|
||||
"id": 19931245,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19931245?v=4",
|
||||
"html_url": "https:\/\/github.com\/rhymeswithmogul"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rhymeswithmogul\/Set-ZerologonMitigation",
|
||||
"description": "Protect your domain controllers against Zerologon (CVE-2020-1472).",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-30T16:10:26Z",
|
||||
"updated_at": "2020-10-13T15:41:20Z",
|
||||
"pushed_at": "2020-09-30T16:34:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 302859573,
|
||||
"name": "cve-2020-1472",
|
||||
"full_name": "shanfenglan\/cve-2020-1472",
|
||||
"owner": {
|
||||
"login": "shanfenglan",
|
||||
"id": 49781523,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49781523?v=4",
|
||||
"html_url": "https:\/\/github.com\/shanfenglan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shanfenglan\/cve-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T09:00:41Z",
|
||||
"updated_at": "2020-10-18T05:46:12Z",
|
||||
"pushed_at": "2020-10-10T09:02:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304362194,
|
||||
"name": "zerologon",
|
||||
|
@ -68,6 +873,75 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304764704,
|
||||
"name": "CVE-2020-1472_ZeroLogonChecker",
|
||||
"full_name": "CPO-EH\/CVE-2020-1472_ZeroLogonChecker",
|
||||
"owner": {
|
||||
"login": "CPO-EH",
|
||||
"id": 56457033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
|
||||
"html_url": "https:\/\/github.com\/CPO-EH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-1472_ZeroLogonChecker",
|
||||
"description": "C# Vulnerability Checker for CVE-2020-1472 Aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-17T00:14:08Z",
|
||||
"updated_at": "2020-10-17T11:03:34Z",
|
||||
"pushed_at": "2020-10-17T10:29:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 305977168,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "puckiestyle\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-21T09:42:34Z",
|
||||
"updated_at": "2020-10-21T09:42:48Z",
|
||||
"pushed_at": "2021-03-20T05:18:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 310337744,
|
||||
"name": "CVE-2020-1472-visualizer",
|
||||
"full_name": "mingchen-script\/CVE-2020-1472-visualizer",
|
||||
"owner": {
|
||||
"login": "mingchen-script",
|
||||
"id": 68715366,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68715366?v=4",
|
||||
"html_url": "https:\/\/github.com\/mingchen-script"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mingchen-script\/CVE-2020-1472-visualizer",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-05T15:17:14Z",
|
||||
"updated_at": "2020-11-05T15:19:05Z",
|
||||
"pushed_at": "2020-11-05T15:19:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 311790363,
|
||||
"name": "dirkjanm_CVE-2020-1472_static_binaries",
|
||||
|
|
|
@ -45,6 +45,29 @@
|
|||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308145197,
|
||||
"name": "CVE-2020-14882",
|
||||
"full_name": "s1kr10s\/CVE-2020-14882",
|
||||
"owner": {
|
||||
"login": "s1kr10s",
|
||||
"id": 5374475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5374475?v=4",
|
||||
"html_url": "https:\/\/github.com\/s1kr10s"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/s1kr10s\/CVE-2020-14882",
|
||||
"description": "CVE-2020–14882 by Jang",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T21:28:12Z",
|
||||
"updated_at": "2021-03-18T23:50:58Z",
|
||||
"pushed_at": "2020-10-29T03:57:09Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308184758,
|
||||
"name": "-Patched-McMaster-University-Blind-Command-Injection",
|
||||
|
@ -68,6 +91,98 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308238126,
|
||||
"name": "CVE-2020-14882",
|
||||
"full_name": "RedTeamWing\/CVE-2020-14882",
|
||||
"owner": {
|
||||
"login": "RedTeamWing",
|
||||
"id": 25416365,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25416365?v=4",
|
||||
"html_url": "https:\/\/github.com\/RedTeamWing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882",
|
||||
"description": "CVE-2020-14882 Weblogic-Exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T06:30:30Z",
|
||||
"updated_at": "2021-03-14T05:03:17Z",
|
||||
"pushed_at": "2020-10-29T06:36:01Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308343789,
|
||||
"name": "cve-2020-14882",
|
||||
"full_name": "0thm4n3\/cve-2020-14882",
|
||||
"owner": {
|
||||
"login": "0thm4n3",
|
||||
"id": 12746014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12746014?v=4",
|
||||
"html_url": "https:\/\/github.com\/0thm4n3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0thm4n3\/cve-2020-14882",
|
||||
"description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T13:53:31Z",
|
||||
"updated_at": "2021-03-18T23:46:12Z",
|
||||
"pushed_at": "2020-10-31T13:03:26Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308374913,
|
||||
"name": "cve-2020-14882",
|
||||
"full_name": "wsfengfan\/cve-2020-14882",
|
||||
"owner": {
|
||||
"login": "wsfengfan",
|
||||
"id": 33821840,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33821840?v=4",
|
||||
"html_url": "https:\/\/github.com\/wsfengfan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882",
|
||||
"description": "CVE-2020-14882 EXP 回显",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T15:44:23Z",
|
||||
"updated_at": "2020-12-06T17:09:24Z",
|
||||
"pushed_at": "2020-11-09T09:55:10Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308605927,
|
||||
"name": "CVE-2020-14882",
|
||||
"full_name": "alexfrancow\/CVE-2020-14882",
|
||||
"owner": {
|
||||
"login": "alexfrancow",
|
||||
"id": 23419929,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23419929?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexfrancow"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-30T11:07:11Z",
|
||||
"updated_at": "2020-10-31T15:57:21Z",
|
||||
"pushed_at": "2020-10-31T15:57:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308782228,
|
||||
"name": "CVE-2020-14882_POC",
|
||||
|
@ -91,6 +206,29 @@
|
|||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 309098912,
|
||||
"name": "Weblogic_Unauthorized-bypass-RCE",
|
||||
"full_name": "ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
|
||||
"owner": {
|
||||
"login": "ludy-dev",
|
||||
"id": 70466565,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
|
||||
"html_url": "https:\/\/github.com\/ludy-dev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
|
||||
"description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-01T13:12:27Z",
|
||||
"updated_at": "2021-03-18T23:50:26Z",
|
||||
"pushed_at": "2020-11-01T13:56:48Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 309655403,
|
||||
"name": "CVE-2020-14882_ALL",
|
||||
|
@ -114,6 +252,75 @@
|
|||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 309666360,
|
||||
"name": "CVE-2020-14882-checker",
|
||||
"full_name": "ovProphet\/CVE-2020-14882-checker",
|
||||
"owner": {
|
||||
"login": "ovProphet",
|
||||
"id": 12277617,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12277617?v=4",
|
||||
"html_url": "https:\/\/github.com\/ovProphet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ovProphet\/CVE-2020-14882-checker",
|
||||
"description": "CVE-2020-14882 detection script",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T11:34:38Z",
|
||||
"updated_at": "2021-03-18T23:48:22Z",
|
||||
"pushed_at": "2020-11-03T11:34:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 309868259,
|
||||
"name": "CVE-2020-14882",
|
||||
"full_name": "NS-Sp4ce\/CVE-2020-14882",
|
||||
"owner": {
|
||||
"login": "NS-Sp4ce",
|
||||
"id": 33349032,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4",
|
||||
"html_url": "https:\/\/github.com\/NS-Sp4ce"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NS-Sp4ce\/CVE-2020-14882",
|
||||
"description": "CVE-2020-14882\/14883\/14750",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-04T03:09:13Z",
|
||||
"updated_at": "2021-01-19T07:12:06Z",
|
||||
"pushed_at": "2020-11-04T03:15:33Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 310303375,
|
||||
"name": "cve-2020-14882",
|
||||
"full_name": "mmioimm\/cve-2020-14882",
|
||||
"owner": {
|
||||
"login": "mmioimm",
|
||||
"id": 19258899,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19258899?v=4",
|
||||
"html_url": "https:\/\/github.com\/mmioimm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mmioimm\/cve-2020-14882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-05T13:12:28Z",
|
||||
"updated_at": "2021-01-29T03:18:00Z",
|
||||
"pushed_at": "2020-11-05T13:14:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 311265070,
|
||||
"name": "CVE-2020-14882",
|
||||
|
@ -381,13 +588,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T09:48:49Z",
|
||||
"updated_at": "2021-04-08T18:38:38Z",
|
||||
"updated_at": "2021-04-09T00:41:55Z",
|
||||
"pushed_at": "2021-04-08T15:17:01Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-08T17:57:00Z",
|
||||
"updated_at": "2021-04-09T02:58:50Z",
|
||||
"pushed_at": "2021-04-08T13:53:46Z",
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 338,
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 346,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-1493.json
Normal file
25
2020/CVE-2020-1493.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 290121561,
|
||||
"name": "CVE-2020-1493",
|
||||
"full_name": "0neb1n\/CVE-2020-1493",
|
||||
"owner": {
|
||||
"login": "0neb1n",
|
||||
"id": 22587350,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22587350?v=4",
|
||||
"html_url": "https:\/\/github.com\/0neb1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0neb1n\/CVE-2020-1493",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-25T05:25:45Z",
|
||||
"updated_at": "2021-01-24T17:07:03Z",
|
||||
"pushed_at": "2020-08-25T05:46:30Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14947.json
Normal file
25
2020/CVE-2020-14947.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 276697965,
|
||||
"name": "CVE-2020-14947",
|
||||
"full_name": "mhaskar\/CVE-2020-14947",
|
||||
"owner": {
|
||||
"login": "mhaskar",
|
||||
"id": 6861215,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
|
||||
"html_url": "https:\/\/github.com\/mhaskar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2020-14947",
|
||||
"description": "The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-02T16:40:52Z",
|
||||
"updated_at": "2020-10-21T22:17:41Z",
|
||||
"pushed_at": "2020-07-02T16:46:10Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14955.json
Normal file
25
2020/CVE-2020-14955.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 302371253,
|
||||
"name": "CVE-2020-14955",
|
||||
"full_name": "intrigus-lgtm\/CVE-2020-14955",
|
||||
"owner": {
|
||||
"login": "intrigus-lgtm",
|
||||
"id": 60750685,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60750685?v=4",
|
||||
"html_url": "https:\/\/github.com\/intrigus-lgtm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/intrigus-lgtm\/CVE-2020-14955",
|
||||
"description": "Jiangmin",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-08T14:41:23Z",
|
||||
"updated_at": "2020-10-10T08:24:37Z",
|
||||
"pushed_at": "2020-10-09T03:46:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-15051.json
Normal file
25
2020/CVE-2020-15051.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 277732389,
|
||||
"name": "CVE-2020-15051",
|
||||
"full_name": "pratikshad19\/CVE-2020-15051",
|
||||
"owner": {
|
||||
"login": "pratikshad19",
|
||||
"id": 67833998,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833998?v=4",
|
||||
"html_url": "https:\/\/github.com\/pratikshad19"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pratikshad19\/CVE-2020-15051",
|
||||
"description": "CVE-2020-15051 : Artica Proxy before 4.30.000000 Community Edition allows Stored Cross Site Scripting.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T06:11:04Z",
|
||||
"updated_at": "2020-07-20T16:22:23Z",
|
||||
"pushed_at": "2020-07-20T16:22:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-15052.json
Normal file
25
2020/CVE-2020-15052.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 277770540,
|
||||
"name": "CVE-2020-15052",
|
||||
"full_name": "pratikshad19\/CVE-2020-15052",
|
||||
"owner": {
|
||||
"login": "pratikshad19",
|
||||
"id": 67833998,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833998?v=4",
|
||||
"html_url": "https:\/\/github.com\/pratikshad19"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pratikshad19\/CVE-2020-15052",
|
||||
"description": "Artica Proxy before 4.30.000000 Community Edition allows SQL Injection.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T09:13:18Z",
|
||||
"updated_at": "2020-07-21T13:24:54Z",
|
||||
"pushed_at": "2020-07-20T16:21:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-15053.json
Normal file
25
2020/CVE-2020-15053.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 277772338,
|
||||
"name": "CVE-2020-15053",
|
||||
"full_name": "pratikshad19\/CVE-2020-15053",
|
||||
"owner": {
|
||||
"login": "pratikshad19",
|
||||
"id": 67833998,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833998?v=4",
|
||||
"html_url": "https:\/\/github.com\/pratikshad19"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pratikshad19\/CVE-2020-15053",
|
||||
"description": "Artica Proxy before 4.30.000000 Community Edition allows Reflected Cross Site Scripting.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T09:21:30Z",
|
||||
"updated_at": "2020-07-20T16:21:09Z",
|
||||
"pushed_at": "2020-07-20T16:21:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2020/CVE-2020-15148.json
Normal file
48
2020/CVE-2020-15148.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 297223360,
|
||||
"name": "CVE-2020-15148-bypasses",
|
||||
"full_name": "Maskhe\/CVE-2020-15148-bypasses",
|
||||
"owner": {
|
||||
"login": "Maskhe",
|
||||
"id": 30264078,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30264078?v=4",
|
||||
"html_url": "https:\/\/github.com\/Maskhe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Maskhe\/CVE-2020-15148-bypasses",
|
||||
"description": "几条关于CVE-2020-15148(yii2反序列化)的绕过",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-21T03:55:55Z",
|
||||
"updated_at": "2021-03-11T10:41:35Z",
|
||||
"pushed_at": "2020-09-21T04:04:39Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 307620612,
|
||||
"name": "cve-2020-15148",
|
||||
"full_name": "0xkami\/cve-2020-15148",
|
||||
"owner": {
|
||||
"login": "0xkami",
|
||||
"id": 19571618,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xkami"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xkami\/cve-2020-15148",
|
||||
"description": "cve-2020-15148",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-27T07:33:47Z",
|
||||
"updated_at": "2020-12-17T09:04:51Z",
|
||||
"pushed_at": "2020-10-27T07:35:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-15169.json
Normal file
25
2020/CVE-2020-15169.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 302388307,
|
||||
"name": "CVE-2020-15169",
|
||||
"full_name": "glasses618\/CVE-2020-15169",
|
||||
"owner": {
|
||||
"login": "glasses618",
|
||||
"id": 10650655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10650655?v=4",
|
||||
"html_url": "https:\/\/github.com\/glasses618"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/glasses618\/CVE-2020-15169",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-08T15:42:37Z",
|
||||
"updated_at": "2020-10-08T15:43:15Z",
|
||||
"pushed_at": "2020-10-08T15:43:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 302645381,
|
||||
"name": "CVE-2020-15227",
|
||||
"full_name": "Langriklol\/CVE-2020-15227",
|
||||
"owner": {
|
||||
"login": "Langriklol",
|
||||
"id": 20239181,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20239181?v=4",
|
||||
"html_url": "https:\/\/github.com\/Langriklol"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Langriklol\/CVE-2020-15227",
|
||||
"description": "CVE-2020-15227 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T13:13:14Z",
|
||||
"updated_at": "2020-11-08T21:38:22Z",
|
||||
"pushed_at": "2020-11-05T21:29:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 302798857,
|
||||
"name": "CVE-2020-15227",
|
||||
"full_name": "hu4wufu\/CVE-2020-15227",
|
||||
"owner": {
|
||||
"login": "hu4wufu",
|
||||
"id": 22029831,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22029831?v=4",
|
||||
"html_url": "https:\/\/github.com\/hu4wufu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hu4wufu\/CVE-2020-15227",
|
||||
"description": "CVE-2020-15227 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T02:38:15Z",
|
||||
"updated_at": "2020-11-24T04:00:06Z",
|
||||
"pushed_at": "2020-10-09T16:39:54Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313061696,
|
||||
"name": "CVE-2020-15227",
|
||||
|
|
25
2020/CVE-2020-15399.json
Normal file
25
2020/CVE-2020-15399.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 284479027,
|
||||
"name": "CVE-2020-15399",
|
||||
"full_name": "mkelepce\/CVE-2020-15399",
|
||||
"owner": {
|
||||
"login": "mkelepce",
|
||||
"id": 10780392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10780392?v=4",
|
||||
"html_url": "https:\/\/github.com\/mkelepce"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mkelepce\/CVE-2020-15399",
|
||||
"description": " Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-02T14:35:26Z",
|
||||
"updated_at": "2020-08-02T14:38:26Z",
|
||||
"pushed_at": "2020-08-02T14:38:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-15492.json
Normal file
25
2020/CVE-2020-15492.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 298218272,
|
||||
"name": "CVE-2020-15492",
|
||||
"full_name": "patrickhener\/CVE-2020-15492",
|
||||
"owner": {
|
||||
"login": "patrickhener",
|
||||
"id": 7579055,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7579055?v=4",
|
||||
"html_url": "https:\/\/github.com\/patrickhener"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/patrickhener\/CVE-2020-15492",
|
||||
"description": "This repository holds the advisory, exploits and vulnerable software of the CVE-2020-15492",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-24T08:36:40Z",
|
||||
"updated_at": "2020-09-29T13:45:47Z",
|
||||
"pushed_at": "2020-09-29T13:45:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-15873.json
Normal file
25
2020/CVE-2020-15873.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 295692158,
|
||||
"name": "cs4239-cve-2020-15873",
|
||||
"full_name": "limerencee\/cs4239-cve-2020-15873",
|
||||
"owner": {
|
||||
"login": "limerencee",
|
||||
"id": 25873970,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25873970?v=4",
|
||||
"html_url": "https:\/\/github.com\/limerencee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/limerencee\/cs4239-cve-2020-15873",
|
||||
"description": "Proof of Concept of CVE-2020-15873 - Blind SQL Injection in Librenms < v1.65.1",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T10:26:26Z",
|
||||
"updated_at": "2020-10-05T04:34:32Z",
|
||||
"pushed_at": "2020-09-21T12:14:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-15906.json
Normal file
25
2020/CVE-2020-15906.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 281907147,
|
||||
"name": "CVE-2020-15906",
|
||||
"full_name": "S1lkys\/CVE-2020-15906",
|
||||
"owner": {
|
||||
"login": "S1lkys",
|
||||
"id": 40408435,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
|
||||
"html_url": "https:\/\/github.com\/S1lkys"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/S1lkys\/CVE-2020-15906",
|
||||
"description": "Writeup of CVE-2020-15906",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-23T09:20:53Z",
|
||||
"updated_at": "2021-03-22T04:03:34Z",
|
||||
"pushed_at": "2020-10-26T22:01:33Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-15956.json
Normal file
25
2020/CVE-2020-15956.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 284867344,
|
||||
"name": "cve-2020-15956",
|
||||
"full_name": "megamagnus\/cve-2020-15956",
|
||||
"owner": {
|
||||
"login": "megamagnus",
|
||||
"id": 68912653,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68912653?v=4",
|
||||
"html_url": "https:\/\/github.com\/megamagnus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/megamagnus\/cve-2020-15956",
|
||||
"description": "ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unauthenticated attackers to trigger a buffer overflow and application termination via a malformed payload.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-04T03:27:24Z",
|
||||
"updated_at": "2020-08-07T04:39:24Z",
|
||||
"pushed_at": "2020-08-04T15:50:13Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-16152.json
Normal file
25
2020/CVE-2020-16152.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 291464552,
|
||||
"name": "CVE-2020-16152",
|
||||
"full_name": "eriknl\/CVE-2020-16152",
|
||||
"owner": {
|
||||
"login": "eriknl",
|
||||
"id": 7977955,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7977955?v=4",
|
||||
"html_url": "https:\/\/github.com\/eriknl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/eriknl\/CVE-2020-16152",
|
||||
"description": "Explanation and PoC for CVE-2020-16152",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-30T12:18:12Z",
|
||||
"updated_at": "2020-12-30T11:03:03Z",
|
||||
"pushed_at": "2020-09-01T05:22:23Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-16270.json
Normal file
25
2020/CVE-2020-16270.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 304345770,
|
||||
"name": "CVE-2020-16270",
|
||||
"full_name": "Security-AVS\/CVE-2020-16270",
|
||||
"owner": {
|
||||
"login": "Security-AVS",
|
||||
"id": 72926885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
|
||||
"html_url": "https:\/\/github.com\/Security-AVS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2020-16270",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-15T14:06:28Z",
|
||||
"updated_at": "2020-10-15T15:07:15Z",
|
||||
"pushed_at": "2020-10-15T15:07:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
324
2020/CVE-2020-16898.json
Normal file
324
2020/CVE-2020-16898.json
Normal file
|
@ -0,0 +1,324 @@
|
|||
[
|
||||
{
|
||||
"id": 302145941,
|
||||
"name": "CVE-2020-16898",
|
||||
"full_name": "advanced-threat-research\/CVE-2020-16898",
|
||||
"owner": {
|
||||
"login": "advanced-threat-research",
|
||||
"id": 27901279,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
|
||||
"html_url": "https:\/\/github.com\/advanced-threat-research"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16898",
|
||||
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-07T19:56:09Z",
|
||||
"updated_at": "2021-01-27T09:05:22Z",
|
||||
"pushed_at": "2020-10-26T10:15:32Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 303891965,
|
||||
"name": "CVE-2020-16898",
|
||||
"full_name": "corelight\/CVE-2020-16898",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/CVE-2020-16898",
|
||||
"description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T03:25:00Z",
|
||||
"updated_at": "2021-02-24T17:35:51Z",
|
||||
"pushed_at": "2020-10-22T15:22:55Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304024639,
|
||||
"name": "CVE-2020-16898_Check",
|
||||
"full_name": "Maliek\/CVE-2020-16898_Check",
|
||||
"owner": {
|
||||
"login": "Maliek",
|
||||
"id": 8858341,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8858341?v=4",
|
||||
"html_url": "https:\/\/github.com\/Maliek"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Maliek\/CVE-2020-16898_Check",
|
||||
"description": "Minor powershell script that checks for vulnerable interfaces.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T13:30:38Z",
|
||||
"updated_at": "2020-10-16T09:20:02Z",
|
||||
"pushed_at": "2020-10-16T09:20:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304044860,
|
||||
"name": "CVE-2020-16898",
|
||||
"full_name": "ZephrFish\/CVE-2020-16898",
|
||||
"owner": {
|
||||
"login": "ZephrFish",
|
||||
"id": 5783068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZephrFish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-16898",
|
||||
"description": "HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T14:42:52Z",
|
||||
"updated_at": "2021-03-19T01:24:50Z",
|
||||
"pushed_at": "2020-10-14T16:56:04Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304075693,
|
||||
"name": "cve-2020-16898",
|
||||
"full_name": "esnet-security\/cve-2020-16898",
|
||||
"owner": {
|
||||
"login": "esnet-security",
|
||||
"id": 46755983,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46755983?v=4",
|
||||
"html_url": "https:\/\/github.com\/esnet-security"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/esnet-security\/cve-2020-16898",
|
||||
"description": "Detects CVE-2020-16898: \"Bad Neighbor\"",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T16:38:06Z",
|
||||
"updated_at": "2020-10-15T15:39:52Z",
|
||||
"pushed_at": "2020-10-15T23:00:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304139222,
|
||||
"name": "CVE-2020-16898-Bad-Neighbor",
|
||||
"full_name": "initconf\/CVE-2020-16898-Bad-Neighbor",
|
||||
"owner": {
|
||||
"login": "initconf",
|
||||
"id": 4044729,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
|
||||
"html_url": "https:\/\/github.com\/initconf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/initconf\/CVE-2020-16898-Bad-Neighbor",
|
||||
"description": "Zeek detection for CVE-2020-16898-\"Bad Neighbor\"",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T21:25:09Z",
|
||||
"updated_at": "2020-10-22T21:12:06Z",
|
||||
"pushed_at": "2020-10-22T21:12:03Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304538917,
|
||||
"name": "CVE-2020-16898",
|
||||
"full_name": "Q1984\/CVE-2020-16898",
|
||||
"owner": {
|
||||
"login": "Q1984",
|
||||
"id": 50952023,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50952023?v=4",
|
||||
"html_url": "https:\/\/github.com\/Q1984"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898",
|
||||
"description": "PoC Bad Neighbor BSOD exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-16T06:27:24Z",
|
||||
"updated_at": "2020-10-16T11:17:23Z",
|
||||
"pushed_at": "2020-10-16T11:17:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304755825,
|
||||
"name": "cve-2020-16898",
|
||||
"full_name": "0xeb-bp\/cve-2020-16898",
|
||||
"owner": {
|
||||
"login": "0xeb-bp",
|
||||
"id": 53204152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53204152?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xeb-bp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xeb-bp\/cve-2020-16898",
|
||||
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-16T23:03:15Z",
|
||||
"updated_at": "2021-01-13T11:23:25Z",
|
||||
"pushed_at": "2020-10-16T23:12:52Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304797048,
|
||||
"name": "cve-2020-16898",
|
||||
"full_name": "jiansiting\/cve-2020-16898",
|
||||
"owner": {
|
||||
"login": "jiansiting",
|
||||
"id": 28823754,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiansiting"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiansiting\/cve-2020-16898",
|
||||
"description": "PoC BSOD for CVE-2020-16898",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-17T04:32:11Z",
|
||||
"updated_at": "2020-10-28T03:38:27Z",
|
||||
"pushed_at": "2020-10-17T04:32:19Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304819444,
|
||||
"name": "CVE-2020-16898_Workaround",
|
||||
"full_name": "CPO-EH\/CVE-2020-16898_Workaround",
|
||||
"owner": {
|
||||
"login": "CPO-EH",
|
||||
"id": 56457033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
|
||||
"html_url": "https:\/\/github.com\/CPO-EH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Workaround",
|
||||
"description": "PowerShell Script Workaround for VCE-220-16898 Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-17T07:09:58Z",
|
||||
"updated_at": "2020-10-21T16:45:04Z",
|
||||
"pushed_at": "2020-10-21T16:45:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304851828,
|
||||
"name": "CVE-2020-16898_Checker",
|
||||
"full_name": "CPO-EH\/CVE-2020-16898_Checker",
|
||||
"owner": {
|
||||
"login": "CPO-EH",
|
||||
"id": 56457033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
|
||||
"html_url": "https:\/\/github.com\/CPO-EH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Checker",
|
||||
"description": "Check all Network Interfaces for CVE-2020-16898 Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-17T10:23:56Z",
|
||||
"updated_at": "2020-10-21T17:45:24Z",
|
||||
"pushed_at": "2020-10-21T17:45:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304888543,
|
||||
"name": "CVE-2020-16898-exp",
|
||||
"full_name": "momika233\/CVE-2020-16898-exp",
|
||||
"owner": {
|
||||
"login": "momika233",
|
||||
"id": 56291820,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
|
||||
"html_url": "https:\/\/github.com\/momika233"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/momika233\/CVE-2020-16898-exp",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-17T13:52:08Z",
|
||||
"updated_at": "2021-01-06T08:49:01Z",
|
||||
"pushed_at": "2020-10-17T13:52:38Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 305598825,
|
||||
"name": "CVE-2020-16898-EXP-POC",
|
||||
"full_name": "komomon\/CVE-2020-16898-EXP-POC",
|
||||
"owner": {
|
||||
"login": "komomon",
|
||||
"id": 52700174,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
|
||||
"html_url": "https:\/\/github.com\/komomon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898-EXP-POC",
|
||||
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-20T05:24:47Z",
|
||||
"updated_at": "2021-01-29T10:23:15Z",
|
||||
"pushed_at": "2020-10-28T11:21:00Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 307994197,
|
||||
"name": "CVE-2020-16898--EXP-POC",
|
||||
"full_name": "komomon\/CVE-2020-16898--EXP-POC",
|
||||
"owner": {
|
||||
"login": "komomon",
|
||||
"id": 52700174,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
|
||||
"html_url": "https:\/\/github.com\/komomon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898--EXP-POC",
|
||||
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:25:58Z",
|
||||
"updated_at": "2021-03-22T03:25:52Z",
|
||||
"pushed_at": "2020-10-28T11:27:17Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2020/CVE-2020-16899.json
Normal file
48
2020/CVE-2020-16899.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 303511670,
|
||||
"name": "CVE-2020-16899",
|
||||
"full_name": "advanced-threat-research\/CVE-2020-16899",
|
||||
"owner": {
|
||||
"login": "advanced-threat-research",
|
||||
"id": 27901279,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
|
||||
"html_url": "https:\/\/github.com\/advanced-threat-research"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16899",
|
||||
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-12T20:59:03Z",
|
||||
"updated_at": "2020-11-19T21:34:47Z",
|
||||
"pushed_at": "2020-10-19T13:58:46Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 304597619,
|
||||
"name": "CVE-2020-16899",
|
||||
"full_name": "bkerler\/CVE-2020-16899",
|
||||
"owner": {
|
||||
"login": "bkerler",
|
||||
"id": 6317772,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6317772?v=4",
|
||||
"html_url": "https:\/\/github.com\/bkerler"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bkerler\/CVE-2020-16899",
|
||||
"description": "Windows RDNSS RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-16T10:44:22Z",
|
||||
"updated_at": "2020-10-16T18:38:19Z",
|
||||
"pushed_at": "2020-10-16T00:15:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-16938.json
Normal file
25
2020/CVE-2020-16938.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 306071294,
|
||||
"name": "CVE-2020-16938",
|
||||
"full_name": "ioncodes\/CVE-2020-16938",
|
||||
"owner": {
|
||||
"login": "ioncodes",
|
||||
"id": 18533297,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18533297?v=4",
|
||||
"html_url": "https:\/\/github.com\/ioncodes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ioncodes\/CVE-2020-16938",
|
||||
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-21T15:38:22Z",
|
||||
"updated_at": "2021-04-02T06:26:06Z",
|
||||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 169,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-16939.json
Normal file
25
2020/CVE-2020-16939.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 303857222,
|
||||
"name": "CVE-2020-16939",
|
||||
"full_name": "rogue-kdc\/CVE-2020-16939",
|
||||
"owner": {
|
||||
"login": "rogue-kdc",
|
||||
"id": 49311295,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49311295?v=4",
|
||||
"html_url": "https:\/\/github.com\/rogue-kdc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2020-16939",
|
||||
"description": "PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T00:03:49Z",
|
||||
"updated_at": "2021-01-29T03:13:14Z",
|
||||
"pushed_at": "2020-10-27T16:42:14Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 304353448,
|
||||
"name": "CVE-2020-16947",
|
||||
"full_name": "0neb1n\/CVE-2020-16947",
|
||||
"owner": {
|
||||
"login": "0neb1n",
|
||||
"id": 22587350,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22587350?v=4",
|
||||
"html_url": "https:\/\/github.com\/0neb1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0neb1n\/CVE-2020-16947",
|
||||
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-15T14:32:25Z",
|
||||
"updated_at": "2021-02-07T14:56:21Z",
|
||||
"pushed_at": "2020-10-20T20:09:58Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 314771487,
|
||||
"name": "CVE-2020-16947",
|
||||
|
|
25
2020/CVE-2020-17382.json
Normal file
25
2020/CVE-2020-17382.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 296409739,
|
||||
"name": "CVE-2020-17382",
|
||||
"full_name": "uf0o\/CVE-2020-17382",
|
||||
"owner": {
|
||||
"login": "uf0o",
|
||||
"id": 24236867,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24236867?v=4",
|
||||
"html_url": "https:\/\/github.com\/uf0o"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uf0o\/CVE-2020-17382",
|
||||
"description": "PoC exploits for CVE-2020-17382",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T18:26:32Z",
|
||||
"updated_at": "2021-03-07T01:19:33Z",
|
||||
"pushed_at": "2020-10-02T18:45:43Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2020/CVE-2020-17496.json
Normal file
48
2020/CVE-2020-17496.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 288998463,
|
||||
"name": "CVE-2020-17496",
|
||||
"full_name": "ctlyz123\/CVE-2020-17496",
|
||||
"owner": {
|
||||
"login": "ctlyz123",
|
||||
"id": 50359597,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50359597?v=4",
|
||||
"html_url": "https:\/\/github.com\/ctlyz123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ctlyz123\/CVE-2020-17496",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-20T12:20:03Z",
|
||||
"updated_at": "2020-09-07T14:06:34Z",
|
||||
"pushed_at": "2020-08-20T12:24:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 292596829,
|
||||
"name": "vBulletin_5.x-tab_panel-RCE",
|
||||
"full_name": "ludy-dev\/vBulletin_5.x-tab_panel-RCE",
|
||||
"owner": {
|
||||
"login": "ludy-dev",
|
||||
"id": 70466565,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
|
||||
"html_url": "https:\/\/github.com\/ludy-dev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ludy-dev\/vBulletin_5.x-tab_panel-RCE",
|
||||
"description": "(CVE-2020-17496) vBulletin 5.x Widget_tabbedcontainer_tab_panel RCE Vuln Test script",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-03T14:41:29Z",
|
||||
"updated_at": "2020-11-07T13:03:43Z",
|
||||
"pushed_at": "2020-11-07T13:03:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-1764.json
Normal file
25
2020/CVE-2020-1764.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 277557089,
|
||||
"name": "cve-2020-1764-poc",
|
||||
"full_name": "jpts\/cve-2020-1764-poc",
|
||||
"owner": {
|
||||
"login": "jpts",
|
||||
"id": 5352661,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5352661?v=4",
|
||||
"html_url": "https:\/\/github.com\/jpts"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jpts\/cve-2020-1764-poc",
|
||||
"description": "Auth Bypass PoC for Kiali",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T13:59:52Z",
|
||||
"updated_at": "2020-09-21T13:51:22Z",
|
||||
"pushed_at": "2020-07-06T14:02:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -482,6 +482,29 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 280544880,
|
||||
"name": "ghostcatch",
|
||||
"full_name": "MateoSec\/ghostcatch",
|
||||
"owner": {
|
||||
"login": "MateoSec",
|
||||
"id": 68019458,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68019458?v=4",
|
||||
"html_url": "https:\/\/github.com\/MateoSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MateoSec\/ghostcatch",
|
||||
"description": "Disables AJP connectors to remediate CVE-2020-1938!",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-17T23:34:47Z",
|
||||
"updated_at": "2020-07-18T00:06:32Z",
|
||||
"pushed_at": "2020-07-18T00:06:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 312827286,
|
||||
"name": "cve-2020-1938",
|
||||
|
|
|
@ -22,6 +22,52 @@
|
|||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277021315,
|
||||
"name": "Dubbo-CVE-2020-1948",
|
||||
"full_name": "txrw\/Dubbo-CVE-2020-1948",
|
||||
"owner": {
|
||||
"login": "txrw",
|
||||
"id": 32354358,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32354358?v=4",
|
||||
"html_url": "https:\/\/github.com\/txrw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/txrw\/Dubbo-CVE-2020-1948",
|
||||
"description": "Apache Dubbo CVE-2020-1948 漏洞测试环境,亲测可用。",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T02:06:28Z",
|
||||
"updated_at": "2021-01-10T06:10:22Z",
|
||||
"pushed_at": "2020-07-03T02:46:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278242568,
|
||||
"name": "cve-2020-1948-poc",
|
||||
"full_name": "M3g4Byt3\/cve-2020-1948-poc",
|
||||
"owner": {
|
||||
"login": "M3g4Byt3",
|
||||
"id": 25048908,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25048908?v=4",
|
||||
"html_url": "https:\/\/github.com\/M3g4Byt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M3g4Byt3\/cve-2020-1948-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T02:27:54Z",
|
||||
"updated_at": "2020-09-02T09:32:18Z",
|
||||
"pushed_at": "2020-07-02T10:03:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279463521,
|
||||
"name": "Dubbo-deserialization",
|
||||
|
|
25
2020/CVE-2020-2034.json
Normal file
25
2020/CVE-2020-2034.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 286057021,
|
||||
"name": "CVE-2020-2034-POC",
|
||||
"full_name": "blackhatethicalhacking\/CVE-2020-2034-POC",
|
||||
"owner": {
|
||||
"login": "blackhatethicalhacking",
|
||||
"id": 13942386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13942386?v=4",
|
||||
"html_url": "https:\/\/github.com\/blackhatethicalhacking"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/blackhatethicalhacking\/CVE-2020-2034-POC",
|
||||
"description": "Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-08T14:19:44Z",
|
||||
"updated_at": "2021-01-03T06:31:44Z",
|
||||
"pushed_at": "2020-08-14T09:24:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24028.json
Normal file
25
2020/CVE-2020-24028.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 291787379,
|
||||
"name": "CVE-2020-24028",
|
||||
"full_name": "underprotection\/CVE-2020-24028",
|
||||
"owner": {
|
||||
"login": "underprotection",
|
||||
"id": 60452208,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452208?v=4",
|
||||
"html_url": "https:\/\/github.com\/underprotection"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24028",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-31T18:00:21Z",
|
||||
"updated_at": "2020-08-31T18:24:01Z",
|
||||
"pushed_at": "2020-08-31T18:23:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24029.json
Normal file
25
2020/CVE-2020-24029.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 291793224,
|
||||
"name": "CVE-2020-24029",
|
||||
"full_name": "underprotection\/CVE-2020-24029",
|
||||
"owner": {
|
||||
"login": "underprotection",
|
||||
"id": 60452208,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452208?v=4",
|
||||
"html_url": "https:\/\/github.com\/underprotection"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24029",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-31T18:26:05Z",
|
||||
"updated_at": "2020-08-31T18:46:30Z",
|
||||
"pushed_at": "2020-08-31T18:46:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24030.json
Normal file
25
2020/CVE-2020-24030.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 291795866,
|
||||
"name": "CVE-2020-24030",
|
||||
"full_name": "underprotection\/CVE-2020-24030",
|
||||
"owner": {
|
||||
"login": "underprotection",
|
||||
"id": 60452208,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452208?v=4",
|
||||
"html_url": "https:\/\/github.com\/underprotection"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24030",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-31T18:38:58Z",
|
||||
"updated_at": "2020-08-31T18:46:09Z",
|
||||
"pushed_at": "2020-08-31T18:46:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24616.json
Normal file
25
2020/CVE-2020-24616.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 292535943,
|
||||
"name": "cve-2020-24616-poc",
|
||||
"full_name": "0xkami\/cve-2020-24616-poc",
|
||||
"owner": {
|
||||
"login": "0xkami",
|
||||
"id": 19571618,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xkami"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xkami\/cve-2020-24616-poc",
|
||||
"description": "cve-2020-24616 poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-03T10:18:39Z",
|
||||
"updated_at": "2020-09-13T13:31:03Z",
|
||||
"pushed_at": "2020-09-07T06:22:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24765.json
Normal file
25
2020/CVE-2020-24765.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 277878269,
|
||||
"name": "CVE-2020-24765",
|
||||
"full_name": "trump88\/CVE-2020-24765",
|
||||
"owner": {
|
||||
"login": "trump88",
|
||||
"id": 67972622,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67972622?v=4",
|
||||
"html_url": "https:\/\/github.com\/trump88"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trump88\/CVE-2020-24765",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T17:15:57Z",
|
||||
"updated_at": "2020-10-08T13:03:10Z",
|
||||
"pushed_at": "2020-10-08T13:03:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24955.json
Normal file
25
2020/CVE-2020-24955.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 292162147,
|
||||
"name": "CVE-2020-24955",
|
||||
"full_name": "b1nary0x1\/CVE-2020-24955",
|
||||
"owner": {
|
||||
"login": "b1nary0x1",
|
||||
"id": 68638314,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68638314?v=4",
|
||||
"html_url": "https:\/\/github.com\/b1nary0x1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b1nary0x1\/CVE-2020-24955",
|
||||
"description": "SUPERAntiSyware Professional X Trial <= 10.0.1206 Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-02T02:48:36Z",
|
||||
"updated_at": "2020-09-02T03:01:10Z",
|
||||
"pushed_at": "2020-09-02T03:00:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25068.json
Normal file
25
2020/CVE-2020-25068.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 292313004,
|
||||
"name": "CVE-2020-25068",
|
||||
"full_name": "bryanroma\/CVE-2020-25068",
|
||||
"owner": {
|
||||
"login": "bryanroma",
|
||||
"id": 16670696,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16670696?v=4",
|
||||
"html_url": "https:\/\/github.com\/bryanroma"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bryanroma\/CVE-2020-25068",
|
||||
"description": "Python script to exploit CVE-2020-25068. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-02T14:53:57Z",
|
||||
"updated_at": "2020-09-10T06:05:05Z",
|
||||
"pushed_at": "2020-09-03T13:28:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25200.json
Normal file
25
2020/CVE-2020-25200.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 293369835,
|
||||
"name": "pritunl-CVE-2020-25200",
|
||||
"full_name": "lukaszstu\/pritunl-CVE-2020-25200",
|
||||
"owner": {
|
||||
"login": "lukaszstu",
|
||||
"id": 70864053,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70864053?v=4",
|
||||
"html_url": "https:\/\/github.com\/lukaszstu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lukaszstu\/pritunl-CVE-2020-25200",
|
||||
"description": "pritunl-CVE-2020-25200",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-06T22:11:24Z",
|
||||
"updated_at": "2021-03-03T17:07:50Z",
|
||||
"pushed_at": "2020-09-08T05:48:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 302958732,
|
||||
"name": "wp-file-manager-CVE-2020-25213",
|
||||
"full_name": "mansoorr123\/wp-file-manager-CVE-2020-25213",
|
||||
"owner": {
|
||||
"login": "mansoorr123",
|
||||
"id": 54185552,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54185552?v=4",
|
||||
"html_url": "https:\/\/github.com\/mansoorr123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mansoorr123\/wp-file-manager-CVE-2020-25213",
|
||||
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T17:50:01Z",
|
||||
"updated_at": "2021-04-07T04:47:04Z",
|
||||
"pushed_at": "2020-10-12T09:57:28Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 312602621,
|
||||
"name": "WPKiller",
|
||||
|
|
25
2020/CVE-2020-25270.json
Normal file
25
2020/CVE-2020-25270.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297838971,
|
||||
"name": "CVE-2020-25270",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25270",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25270",
|
||||
"description": "PHPGurukul hostel-management-system 2.1 allows XSS via Guardian Name, Guardian Relation, Guardian Contact no, Address, City",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T03:16:08Z",
|
||||
"updated_at": "2020-09-27T13:34:18Z",
|
||||
"pushed_at": "2020-09-23T03:22:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25271.json
Normal file
25
2020/CVE-2020-25271.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297840535,
|
||||
"name": "CVE-2020-25271",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25271",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25271",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T03:24:20Z",
|
||||
"updated_at": "2020-09-23T03:49:17Z",
|
||||
"pushed_at": "2020-09-23T03:49:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25272.json
Normal file
25
2020/CVE-2020-25272.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297850617,
|
||||
"name": "CVE-2020-25272",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25272",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25272",
|
||||
"description": "Online Bus Booking System 1.0,there is XSS through the name parameter in book_now.php",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T04:20:16Z",
|
||||
"updated_at": "2020-09-27T13:37:22Z",
|
||||
"pushed_at": "2020-09-23T04:28:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25273.json
Normal file
25
2020/CVE-2020-25273.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297852230,
|
||||
"name": "CVE-2020-25273",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25273",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25273",
|
||||
"description": "Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T04:29:29Z",
|
||||
"updated_at": "2020-09-26T16:07:01Z",
|
||||
"pushed_at": "2020-09-26T03:43:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25398.json
Normal file
25
2020/CVE-2020-25398.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 279259540,
|
||||
"name": "CVE-2020-25398",
|
||||
"full_name": "h3llraiser\/CVE-2020-25398",
|
||||
"owner": {
|
||||
"login": "h3llraiser",
|
||||
"id": 52741391,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52741391?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3llraiser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3llraiser\/CVE-2020-25398",
|
||||
"description": "CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv export functionality.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T09:37:11Z",
|
||||
"updated_at": "2020-11-05T15:00:19Z",
|
||||
"pushed_at": "2020-11-05T10:17:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25399.json
Normal file
25
2020/CVE-2020-25399.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 279259641,
|
||||
"name": "CVE-2020-25399",
|
||||
"full_name": "h3llraiser\/CVE-2020-25399",
|
||||
"owner": {
|
||||
"login": "h3llraiser",
|
||||
"id": 52741391,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52741391?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3llraiser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3llraiser\/CVE-2020-25399",
|
||||
"description": "Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack another user's session by sending a malicious file in the chat.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T09:37:38Z",
|
||||
"updated_at": "2020-11-05T15:00:40Z",
|
||||
"pushed_at": "2020-11-05T10:43:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25487.json
Normal file
25
2020/CVE-2020-25487.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297710280,
|
||||
"name": "CVE-2020-25487",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25487",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25487",
|
||||
"description": "SQL injection Vulnerability in Zoo Management System",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-22T16:37:46Z",
|
||||
"updated_at": "2020-09-23T09:31:19Z",
|
||||
"pushed_at": "2020-09-22T16:41:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25488.json
Normal file
25
2020/CVE-2020-25488.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297708009,
|
||||
"name": "CVE-2020-25488",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25488",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25488",
|
||||
"description": "Login Bypass in Zoo Management System V1.0",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-22T16:28:34Z",
|
||||
"updated_at": "2020-09-22T17:06:49Z",
|
||||
"pushed_at": "2020-09-22T17:06:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue