Auto Update 2021/04/09 12:11:13

This commit is contained in:
motikan2010-bot 2021-04-09 12:11:13 +09:00
parent 50c1095b07
commit 2dce4b2b05
162 changed files with 8492 additions and 56 deletions

View file

@ -36,13 +36,13 @@
"description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.",
"fork": false,
"created_at": "2018-08-03T04:36:23Z",
"updated_at": "2021-02-23T21:13:07Z",
"updated_at": "2021-04-09T02:11:33Z",
"pushed_at": "2018-08-14T07:47:02Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 24,
"forks": 24,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -59,8 +59,8 @@
"description": null,
"fork": false,
"created_at": "2021-04-08T19:41:57Z",
"updated_at": "2021-04-08T21:10:16Z",
"pushed_at": "2021-04-08T21:10:14Z",
"updated_at": "2021-04-08T22:34:39Z",
"pushed_at": "2021-04-08T22:34:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)",
"fork": false,
"created_at": "2018-02-28T14:45:06Z",
"updated_at": "2021-03-11T01:57:10Z",
"updated_at": "2021-04-09T00:54:14Z",
"pushed_at": "2018-05-08T10:59:23Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 24,
"forks": 24,
"watchers": 79,
"watchers": 81,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-04-06T11:16:49Z",
"updated_at": "2021-04-09T03:07:33Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 397,
"watchers_count": 397,
"stargazers_count": 399,
"watchers_count": 399,
"forks_count": 96,
"forks": 96,
"watchers": 397,
"watchers": 399,
"score": 0
}
]

View file

@ -1324,13 +1324,13 @@
"description": "基于360公开的无损检测工具的可直接在windows上运行的批量检测程序",
"fork": false,
"created_at": "2019-05-28T16:09:10Z",
"updated_at": "2019-10-20T18:29:55Z",
"updated_at": "2021-04-09T01:20:13Z",
"pushed_at": "2019-05-28T17:16:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2021-03-23T03:15:54Z",
"updated_at": "2021-04-08T23:38:21Z",
"pushed_at": "2021-02-02T12:25:57Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"forks_count": 56,
"forks": 56,
"watchers": 186,
"watchers": 187,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-04-08T01:44:43Z",
"updated_at": "2021-04-09T00:25:14Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 756,
"watchers_count": 756,
"forks_count": 156,
"forks": 156,
"watchers": 756,
"stargazers_count": 757,
"watchers_count": 757,
"forks_count": 157,
"forks": 157,
"watchers": 757,
"score": 0
},
{

View file

@ -316,8 +316,8 @@
"pushed_at": "2019-07-15T06:03:15Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 22,
"forks": 22,
"forks_count": 23,
"forks": 23,
"watchers": 60,
"score": 0
},

25
2020/CVE-2020-0014.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 292801316,
"name": "CVE-2020-0014-Toast",
"full_name": "tea9\/CVE-2020-0014-Toast",
"owner": {
"login": "tea9",
"id": 39117901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39117901?v=4",
"html_url": "https:\/\/github.com\/tea9"
},
"html_url": "https:\/\/github.com\/tea9\/CVE-2020-0014-Toast",
"description": "CVE-2020-0014-Toast-复现",
"fork": false,
"created_at": "2020-09-04T09:02:29Z",
"updated_at": "2020-11-25T07:28:27Z",
"pushed_at": "2020-09-07T06:34:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -45,6 +45,52 @@
"watchers": 20,
"score": 0
},
{
"id": 288758217,
"name": "CVE-2020-0041",
"full_name": "minutesinch\/CVE-2020-0041",
"owner": {
"login": "minutesinch",
"id": 46642972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46642972?v=4",
"html_url": "https:\/\/github.com\/minutesinch"
},
"html_url": "https:\/\/github.com\/minutesinch\/CVE-2020-0041",
"description": null,
"fork": false,
"created_at": "2020-08-19T14:44:48Z",
"updated_at": "2020-08-19T14:45:02Z",
"pushed_at": "2020-08-19T14:44:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 288758376,
"name": "CVE-2020-0041-Original",
"full_name": "minutesinch\/CVE-2020-0041-Original",
"owner": {
"login": "minutesinch",
"id": 46642972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46642972?v=4",
"html_url": "https:\/\/github.com\/minutesinch"
},
"html_url": "https:\/\/github.com\/minutesinch\/CVE-2020-0041-Original",
"description": null,
"fork": false,
"created_at": "2020-08-19T14:45:28Z",
"updated_at": "2020-08-19T14:45:41Z",
"pushed_at": "2020-08-19T14:45:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 337629139,
"name": "CVE-2020-0041",

25
2020/CVE-2020-0108.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 285182790,
"name": "ServiceCheater",
"full_name": "CrackerCat\/ServiceCheater",
"owner": {
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat"
},
"html_url": "https:\/\/github.com\/CrackerCat\/ServiceCheater",
"description": "PoC of CVE-2020-0108",
"fork": false,
"created_at": "2020-08-05T04:50:42Z",
"updated_at": "2021-02-04T02:18:03Z",
"pushed_at": "2020-08-05T02:55:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2020/CVE-2020-0114.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 293716653,
"name": "CVE-2020-0114-systemui",
"full_name": "tea9\/CVE-2020-0114-systemui",
"owner": {
"login": "tea9",
"id": 39117901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39117901?v=4",
"html_url": "https:\/\/github.com\/tea9"
},
"html_url": "https:\/\/github.com\/tea9\/CVE-2020-0114-systemui",
"description": null,
"fork": false,
"created_at": "2020-09-08T06:06:36Z",
"updated_at": "2020-11-25T07:32:06Z",
"pushed_at": "2020-09-08T06:09:54Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 66,
"watchers": 195,
"score": 0
},
{
"id": 299851365,
"name": "CVE-2020-0674",
"full_name": "Ken-Abruzzi\/CVE-2020-0674",
"owner": {
"login": "Ken-Abruzzi",
"id": 68931768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68931768?v=4",
"html_url": "https:\/\/github.com\/Ken-Abruzzi"
},
"html_url": "https:\/\/github.com\/Ken-Abruzzi\/CVE-2020-0674",
"description": null,
"fork": false,
"created_at": "2020-09-30T08:08:42Z",
"updated_at": "2020-09-30T08:27:55Z",
"pushed_at": "2020-09-30T08:27:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -344,6 +344,75 @@
"watchers": 14,
"score": 0
},
{
"id": 288177224,
"name": "CVE-2020-0688",
"full_name": "murataydemir\/CVE-2020-0688",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-0688",
"description": "[CVE-2020-0688] Microsoft Exchange Server Fixed Cryptographic Key Remote Code Execution (RCE)",
"fork": false,
"created_at": "2020-08-17T12:41:51Z",
"updated_at": "2021-03-13T00:32:52Z",
"pushed_at": "2020-08-29T21:00:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 306497480,
"name": "ecp_slap",
"full_name": "zyn3rgy\/ecp_slap",
"owner": {
"login": "zyn3rgy",
"id": 73311948,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73311948?v=4",
"html_url": "https:\/\/github.com\/zyn3rgy"
},
"html_url": "https:\/\/github.com\/zyn3rgy\/ecp_slap",
"description": "CVE-2020-0688 PoC",
"fork": false,
"created_at": "2020-10-23T01:18:13Z",
"updated_at": "2020-12-21T20:27:18Z",
"pushed_at": "2020-10-26T03:35:14Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 308367304,
"name": "CVE-2020-0688-Scanner",
"full_name": "SLSteff\/CVE-2020-0688-Scanner",
"owner": {
"login": "SLSteff",
"id": 20557573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20557573?v=4",
"html_url": "https:\/\/github.com\/SLSteff"
},
"html_url": "https:\/\/github.com\/SLSteff\/CVE-2020-0688-Scanner",
"description": "Scans for Microsoft Exchange Versions with masscan",
"fork": false,
"created_at": "2020-10-29T15:16:24Z",
"updated_at": "2021-03-20T06:54:20Z",
"pushed_at": "2020-10-29T20:06:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 326652424,
"name": "CVE-2020-0688",

View file

@ -1379,6 +1379,121 @@
"watchers": 20,
"score": 0
},
{
"id": 277568818,
"name": "SMBGhost-SMBleed-scanner",
"full_name": "ZecOps\/SMBGhost-SMBleed-scanner",
"owner": {
"login": "ZecOps",
"id": 31035096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31035096?v=4",
"html_url": "https:\/\/github.com\/ZecOps"
},
"html_url": "https:\/\/github.com\/ZecOps\/SMBGhost-SMBleed-scanner",
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
"fork": false,
"created_at": "2020-07-06T14:45:07Z",
"updated_at": "2021-04-02T02:34:56Z",
"pushed_at": "2020-07-06T19:00:06Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 11,
"forks": 11,
"watchers": 29,
"score": 0
},
{
"id": 279475059,
"name": "smbghost-5",
"full_name": "5l1v3r1\/smbghost-5",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/smbghost-5",
"description": "CVE-2020-0796. Smbghost Local Privilege Escalation",
"fork": false,
"created_at": "2020-07-14T03:49:09Z",
"updated_at": "2021-02-05T22:53:54Z",
"pushed_at": "2020-07-12T09:59:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 296190446,
"name": "CVE-2020-0796-BOF",
"full_name": "rsmudge\/CVE-2020-0796-BOF",
"owner": {
"login": "rsmudge",
"id": 1174994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1174994?v=4",
"html_url": "https:\/\/github.com\/rsmudge"
},
"html_url": "https:\/\/github.com\/rsmudge\/CVE-2020-0796-BOF",
"description": null,
"fork": false,
"created_at": "2020-09-17T01:48:37Z",
"updated_at": "2021-02-12T02:17:59Z",
"pushed_at": "2020-09-17T01:55:48Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 14,
"forks": 14,
"watchers": 51,
"score": 0
},
{
"id": 299197060,
"name": "SMBGhost-CVE-2020-0796-",
"full_name": "codewithpradhan\/SMBGhost-CVE-2020-0796-",
"owner": {
"login": "codewithpradhan",
"id": 68530116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68530116?v=4",
"html_url": "https:\/\/github.com\/codewithpradhan"
},
"html_url": "https:\/\/github.com\/codewithpradhan\/SMBGhost-CVE-2020-0796-",
"description": "To crash Windows-10 easily",
"fork": false,
"created_at": "2020-09-28T05:23:20Z",
"updated_at": "2020-09-28T05:37:37Z",
"pushed_at": "2020-09-28T05:24:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 310486564,
"name": "CVE-2020-0796-POC",
"full_name": "AaronWilsonGrylls\/CVE-2020-0796-POC",
"owner": {
"login": "AaronWilsonGrylls",
"id": 40255963,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40255963?v=4",
"html_url": "https:\/\/github.com\/AaronWilsonGrylls"
},
"html_url": "https:\/\/github.com\/AaronWilsonGrylls\/CVE-2020-0796-POC",
"description": "CVE-2020-0796-POC",
"fork": false,
"created_at": "2020-11-06T03:56:52Z",
"updated_at": "2020-11-06T05:27:47Z",
"pushed_at": "2020-11-06T05:27:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 311524122,
"name": "CVE-2020-0796",

25
2020/CVE-2020-0890.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 292597950,
"name": "hyperv_local_dos_poc",
"full_name": "gerhart01\/hyperv_local_dos_poc",
"owner": {
"login": "gerhart01",
"id": 25981258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25981258?v=4",
"html_url": "https:\/\/github.com\/gerhart01"
},
"html_url": "https:\/\/github.com\/gerhart01\/hyperv_local_dos_poc",
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
"fork": false,
"created_at": "2020-09-03T14:45:51Z",
"updated_at": "2021-03-19T02:06:23Z",
"pushed_at": "2020-09-08T20:01:05Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"forks": 7,
"watchers": 27,
"score": 0
}
]

25
2020/CVE-2020-1.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 287520540,
"name": "FDEU-CVE-2020-1FC5",
"full_name": "full-disclosure\/FDEU-CVE-2020-1FC5",
"owner": {
"login": "full-disclosure",
"id": 62108425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62108425?v=4",
"html_url": "https:\/\/github.com\/full-disclosure"
},
"html_url": "https:\/\/github.com\/full-disclosure\/FDEU-CVE-2020-1FC5",
"description": "Telia Technicolor TG389ac v.17.1.7992 Samba privilege escalation exploit",
"fork": false,
"created_at": "2020-08-14T11:47:37Z",
"updated_at": "2021-01-11T11:41:40Z",
"pushed_at": "2020-08-17T07:43:41Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
}
]

25
2020/CVE-2020-10205.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 300210711,
"name": "CVE-2020-10205",
"full_name": "5l1v3r1\/CVE-2020-10205",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-10205",
"description": null,
"fork": false,
"created_at": "2020-10-01T08:49:47Z",
"updated_at": "2021-01-30T16:15:20Z",
"pushed_at": "2020-04-17T04:00:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 3,
"watchers": 10,
"score": 0
},
{
"id": 297202950,
"name": "CVE-2020-1048",
"full_name": "Ken-Abruzzi\/CVE-2020-1048",
"owner": {
"login": "Ken-Abruzzi",
"id": 68931768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68931768?v=4",
"html_url": "https:\/\/github.com\/Ken-Abruzzi"
},
"html_url": "https:\/\/github.com\/Ken-Abruzzi\/CVE-2020-1048",
"description": "An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'.",
"fork": false,
"created_at": "2020-09-21T01:59:38Z",
"updated_at": "2020-09-21T03:26:18Z",
"pushed_at": "2020-09-21T03:26:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,74 @@
"forks": 27,
"watchers": 78,
"score": 0
},
{
"id": 280822745,
"name": "CVE-2020-1054",
"full_name": "Iamgublin\/CVE-2020-1054",
"owner": {
"login": "Iamgublin",
"id": 16526066,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16526066?v=4",
"html_url": "https:\/\/github.com\/Iamgublin"
},
"html_url": "https:\/\/github.com\/Iamgublin\/CVE-2020-1054",
"description": null,
"fork": false,
"created_at": "2020-07-19T08:20:57Z",
"updated_at": "2020-11-23T06:23:07Z",
"pushed_at": "2020-07-19T08:24:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 5,
"forks": 5,
"watchers": 2,
"score": 0
},
{
"id": 282434512,
"name": "CVE-2020-1054",
"full_name": "KaLendsi\/CVE-2020-1054",
"owner": {
"login": "KaLendsi",
"id": 68001644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
"html_url": "https:\/\/github.com\/KaLendsi"
},
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2020-1054",
"description": null,
"fork": false,
"created_at": "2020-07-25T11:56:48Z",
"updated_at": "2021-04-01T07:16:46Z",
"pushed_at": "2020-07-27T02:43:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"watchers": 5,
"score": 0
},
{
"id": 307866361,
"name": "CVE-2020-1054",
"full_name": "Graham382\/CVE-2020-1054",
"owner": {
"login": "Graham382",
"id": 67909699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67909699?v=4",
"html_url": "https:\/\/github.com\/Graham382"
},
"html_url": "https:\/\/github.com\/Graham382\/CVE-2020-1054",
"description": "Windows 7 LPE",
"fork": false,
"created_at": "2020-10-28T00:48:43Z",
"updated_at": "2020-10-28T06:09:12Z",
"pushed_at": "2020-10-28T00:57:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"forks": 4,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-10713.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 283354389,
"name": "BootHole",
"full_name": "eclypsium\/BootHole",
"owner": {
"login": "eclypsium",
"id": 28793771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28793771?v=4",
"html_url": "https:\/\/github.com\/eclypsium"
},
"html_url": "https:\/\/github.com\/eclypsium\/BootHole",
"description": "BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials",
"fork": false,
"created_at": "2020-07-29T00:01:41Z",
"updated_at": "2021-03-03T14:00:14Z",
"pushed_at": "2020-08-24T23:16:38Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 9,
"forks": 9,
"watchers": 52,
"score": 0
}
]

25
2020/CVE-2020-11896.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 281287041,
"name": "Treck20-Related",
"full_name": "Fans0n-Fan\/Treck20-Related",
"owner": {
"login": "Fans0n-Fan",
"id": 62650136,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62650136?v=4",
"html_url": "https:\/\/github.com\/Fans0n-Fan"
},
"html_url": "https:\/\/github.com\/Fans0n-Fan\/Treck20-Related",
"description": "PoC for CVE-2020-11896 Treck TCP\/IP stack and device asset investigation",
"fork": false,
"created_at": "2020-07-21T03:38:31Z",
"updated_at": "2020-09-03T10:53:52Z",
"pushed_at": "2020-09-03T06:37:46Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
}
]

25
2020/CVE-2020-11989.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 305056797,
"name": "HYWZ36-CVE-2020-11989-code",
"full_name": "HYWZ36\/HYWZ36-CVE-2020-11989-code",
"owner": {
"login": "HYWZ36",
"id": 27775281,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27775281?v=4",
"html_url": "https:\/\/github.com\/HYWZ36"
},
"html_url": "https:\/\/github.com\/HYWZ36\/HYWZ36-CVE-2020-11989-code",
"description": null,
"fork": false,
"created_at": "2020-10-18T08:34:47Z",
"updated_at": "2020-10-19T08:52:49Z",
"pushed_at": "2020-10-19T08:52:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-11996.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 282904807,
"name": "tomcat-embed-core-9.0.31-CVE-2020-11996",
"full_name": "rusakovichma\/tomcat-embed-core-9.0.31-CVE-2020-11996",
"owner": {
"login": "rusakovichma",
"id": 4024331,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4024331?v=4",
"html_url": "https:\/\/github.com\/rusakovichma"
},
"html_url": "https:\/\/github.com\/rusakovichma\/tomcat-embed-core-9.0.31-CVE-2020-11996",
"description": "tomcat-embed-core-9.0.31 CVE-2020-11996 Test PoC",
"fork": false,
"created_at": "2020-07-27T13:22:21Z",
"updated_at": "2020-11-06T13:06:12Z",
"pushed_at": "2020-11-06T13:05:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -21,5 +21,51 @@
"forks": 44,
"watchers": 133,
"score": 0
},
{
"id": 277048370,
"name": "CVE-2020-1206-Exploit",
"full_name": "Info-Security-Solution-Kolkata\/CVE-2020-1206-Exploit",
"owner": {
"login": "Info-Security-Solution-Kolkata",
"id": 67817658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67817658?v=4",
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata"
},
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata\/CVE-2020-1206-Exploit",
"description": null,
"fork": false,
"created_at": "2020-07-04T05:54:58Z",
"updated_at": "2020-07-04T05:54:58Z",
"pushed_at": "2020-07-04T05:54:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 277049855,
"name": "Smbleed-CVE-2020-1206-Exploit",
"full_name": "Info-Security-Solution-Kolkata\/Smbleed-CVE-2020-1206-Exploit",
"owner": {
"login": "Info-Security-Solution-Kolkata",
"id": 67817658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67817658?v=4",
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata"
},
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata\/Smbleed-CVE-2020-1206-Exploit",
"description": null,
"fork": false,
"created_at": "2020-07-04T06:06:52Z",
"updated_at": "2020-07-04T06:06:52Z",
"pushed_at": "2020-07-04T06:06:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-12432.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 281384090,
"name": "CVE-2020-12432",
"full_name": "d7x\/CVE-2020-12432",
"owner": {
"login": "d7x",
"id": 36901198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36901198?v=4",
"html_url": "https:\/\/github.com\/d7x"
},
"html_url": "https:\/\/github.com\/d7x\/CVE-2020-12432",
"description": null,
"fork": false,
"created_at": "2020-07-21T11:53:27Z",
"updated_at": "2020-07-21T12:17:54Z",
"pushed_at": "2020-07-21T12:17:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-13094.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 284480533,
"name": "CVE-2020-13094",
"full_name": "mkelepce\/CVE-2020-13094",
"owner": {
"login": "mkelepce",
"id": 10780392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10780392?v=4",
"html_url": "https:\/\/github.com\/mkelepce"
},
"html_url": "https:\/\/github.com\/mkelepce\/CVE-2020-13094",
"description": " Dolibarr 11.0.3 - Persistent Cross-Site Scripting",
"fork": false,
"created_at": "2020-08-02T14:43:43Z",
"updated_at": "2020-08-02T14:45:17Z",
"pushed_at": "2020-08-02T14:45:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-1313.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 283541946,
"name": "CVE-2020-1313",
"full_name": "irsl\/CVE-2020-1313",
"owner": {
"login": "irsl",
"id": 6357121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6357121?v=4",
"html_url": "https:\/\/github.com\/irsl"
},
"html_url": "https:\/\/github.com\/irsl\/CVE-2020-1313",
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2020-07-29T15:56:50Z",
"updated_at": "2021-02-15T13:32:57Z",
"pushed_at": "2020-07-30T07:48:40Z",
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 20,
"forks": 20,
"watchers": 110,
"score": 0
}
]

25
2020/CVE-2020-13151.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 284276011,
"name": "CVE-2020-13151",
"full_name": "b4ny4n\/CVE-2020-13151",
"owner": {
"login": "b4ny4n",
"id": 18220016,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18220016?v=4",
"html_url": "https:\/\/github.com\/b4ny4n"
},
"html_url": "https:\/\/github.com\/b4ny4n\/CVE-2020-13151",
"description": "POC for CVE-2020-13151",
"fork": false,
"created_at": "2020-08-01T14:29:59Z",
"updated_at": "2020-08-06T04:09:52Z",
"pushed_at": "2020-08-03T18:55:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

25
2020/CVE-2020-13162.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 292356141,
"name": "tu-TOCTOU-kaiu-TOCMEU-CVE-2020-13162-",
"full_name": "redtimmy\/tu-TOCTOU-kaiu-TOCMEU-CVE-2020-13162-",
"owner": {
"login": "redtimmy",
"id": 40774163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40774163?v=4",
"html_url": "https:\/\/github.com\/redtimmy"
},
"html_url": "https:\/\/github.com\/redtimmy\/tu-TOCTOU-kaiu-TOCMEU-CVE-2020-13162-",
"description": "Exploit for CVE-2020-13162",
"fork": false,
"created_at": "2020-09-02T17:58:32Z",
"updated_at": "2021-01-28T03:34:26Z",
"pushed_at": "2020-09-02T19:14:21Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 9,
"forks": 9,
"watchers": 10,
"score": 0
}
]

25
2020/CVE-2020-13259.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291721408,
"name": "CVE-2020-13259",
"full_name": "UrielYochpaz\/CVE-2020-13259",
"owner": {
"login": "UrielYochpaz",
"id": 36864886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36864886?v=4",
"html_url": "https:\/\/github.com\/UrielYochpaz"
},
"html_url": "https:\/\/github.com\/UrielYochpaz\/CVE-2020-13259",
"description": "PoC of Full Account Takeover on RAD SecFlow-1v ",
"fork": false,
"created_at": "2020-08-31T13:22:21Z",
"updated_at": "2020-09-15T09:24:49Z",
"pushed_at": "2020-08-31T13:53:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,96 @@
[
{
"id": 281334440,
"name": "CVE-2020-1337-exploit",
"full_name": "math1as\/CVE-2020-1337-exploit",
"owner": {
"login": "math1as",
"id": 13290978,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13290978?v=4",
"html_url": "https:\/\/github.com\/math1as"
},
"html_url": "https:\/\/github.com\/math1as\/CVE-2020-1337-exploit",
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false,
"created_at": "2020-07-21T08:01:20Z",
"updated_at": "2021-02-07T02:19:32Z",
"pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 28,
"forks": 28,
"watchers": 144,
"score": 0
},
{
"id": 286737584,
"name": "CVE-2020-1337",
"full_name": "VoidSec\/CVE-2020-1337",
"owner": {
"login": "VoidSec",
"id": 5717603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4",
"html_url": "https:\/\/github.com\/VoidSec"
},
"html_url": "https:\/\/github.com\/VoidSec\/CVE-2020-1337",
"description": "CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048s patch",
"fork": false,
"created_at": "2020-08-11T12:22:56Z",
"updated_at": "2020-12-21T06:15:20Z",
"pushed_at": "2020-08-11T17:23:04Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 9,
"score": 0
},
{
"id": 286767343,
"name": "CVE-2020-1337",
"full_name": "neofito\/CVE-2020-1337",
"owner": {
"login": "neofito",
"id": 1921186,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1921186?v=4",
"html_url": "https:\/\/github.com\/neofito"
},
"html_url": "https:\/\/github.com\/neofito\/CVE-2020-1337",
"description": "CVE-2020-1048 bypass: binary planting PoC",
"fork": false,
"created_at": "2020-08-11T14:34:07Z",
"updated_at": "2020-12-11T17:31:45Z",
"pushed_at": "2020-08-20T15:15:50Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 8,
"forks": 8,
"watchers": 32,
"score": 0
},
{
"id": 286979865,
"name": "cve-2020-1337-poc",
"full_name": "sailay1996\/cve-2020-1337-poc",
"owner": {
"login": "sailay1996",
"id": 16739401,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4",
"html_url": "https:\/\/github.com\/sailay1996"
},
"html_url": "https:\/\/github.com\/sailay1996\/cve-2020-1337-poc",
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false,
"created_at": "2020-08-12T10:05:36Z",
"updated_at": "2021-03-10T05:50:53Z",
"pushed_at": "2020-08-13T07:16:12Z",
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 42,
"forks": 42,
"watchers": 144,
"score": 0
},
{
"id": 354442383,
"name": "cve-2020-1337-poc",

25
2020/CVE-2020-13424.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 284480950,
"name": "CVE-2020-13424",
"full_name": "mkelepce\/CVE-2020-13424",
"owner": {
"login": "mkelepce",
"id": 10780392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10780392?v=4",
"html_url": "https:\/\/github.com\/mkelepce"
},
"html_url": "https:\/\/github.com\/mkelepce\/CVE-2020-13424",
"description": " Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated)",
"fork": false,
"created_at": "2020-08-02T14:46:10Z",
"updated_at": "2020-08-02T14:49:24Z",
"pushed_at": "2020-08-02T14:49:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-1349.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 283193307,
"name": "CVE-2020-1349",
"full_name": "0neb1n\/CVE-2020-1349",
"owner": {
"login": "0neb1n",
"id": 22587350,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22587350?v=4",
"html_url": "https:\/\/github.com\/0neb1n"
},
"html_url": "https:\/\/github.com\/0neb1n\/CVE-2020-1349",
"description": null,
"fork": false,
"created_at": "2020-07-28T11:33:38Z",
"updated_at": "2021-01-24T17:07:02Z",
"pushed_at": "2020-07-28T13:36:41Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"score": 0
}
]

View file

@ -21,5 +21,304 @@
"forks": 15,
"watchers": 54,
"score": 0
},
{
"id": 279675165,
"name": "CVE-2020-1350",
"full_name": "mr-r3b00t\/CVE-2020-1350",
"owner": {
"login": "mr-r3b00t",
"id": 14963690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
"html_url": "https:\/\/github.com\/mr-r3b00t"
},
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350",
"description": null,
"fork": false,
"created_at": "2020-07-14T19:28:46Z",
"updated_at": "2020-10-10T20:44:29Z",
"pushed_at": "2020-07-20T06:15:56Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 6,
"forks": 6,
"watchers": 6,
"score": 0
},
{
"id": 279701266,
"name": "Fake_CVE-2020-1350",
"full_name": "zoomerxsec\/Fake_CVE-2020-1350",
"owner": {
"login": "zoomerxsec",
"id": 56858864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56858864?v=4",
"html_url": "https:\/\/github.com\/zoomerxsec"
},
"html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350",
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
"fork": false,
"created_at": "2020-07-14T21:55:57Z",
"updated_at": "2020-10-10T20:44:46Z",
"pushed_at": "2020-07-19T02:29:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 279776271,
"name": "CVE-2020-1350",
"full_name": "T13nn3s\/CVE-2020-1350",
"owner": {
"login": "T13nn3s",
"id": 29333776,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4",
"html_url": "https:\/\/github.com\/T13nn3s"
},
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350",
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
"fork": false,
"created_at": "2020-07-15T05:46:31Z",
"updated_at": "2020-10-26T00:13:06Z",
"pushed_at": "2020-07-18T06:38:11Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 10,
"forks": 10,
"watchers": 14,
"score": 0
},
{
"id": 279778118,
"name": "SIGRed",
"full_name": "corelight\/SIGRed",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/SIGRed",
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
"fork": false,
"created_at": "2020-07-15T05:55:20Z",
"updated_at": "2021-01-14T18:47:12Z",
"pushed_at": "2020-07-20T02:20:43Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
},
{
"id": 279961698,
"name": "dRMM-CVE-2020-1350-response",
"full_name": "jmaddington\/dRMM-CVE-2020-1350-response",
"owner": {
"login": "jmaddington",
"id": 2353597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
"html_url": "https:\/\/github.com\/jmaddington"
},
"html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response",
"description": "Windows registry mitigation response to CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T19:43:39Z",
"updated_at": "2020-10-10T20:38:31Z",
"pushed_at": "2020-07-15T19:59:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 279999285,
"name": "CVE-2020-1350-DoS",
"full_name": "maxpl0it\/CVE-2020-1350-DoS",
"owner": {
"login": "maxpl0it",
"id": 27973683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4",
"html_url": "https:\/\/github.com\/maxpl0it"
},
"html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS",
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2021-03-31T07:43:42Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 52,
"forks": 52,
"watchers": 228,
"score": 0
},
{
"id": 280207373,
"name": "CVE-2020-1350",
"full_name": "captainGeech42\/CVE-2020-1350",
"owner": {
"login": "captainGeech42",
"id": 4255667,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4255667?v=4",
"html_url": "https:\/\/github.com\/captainGeech42"
},
"html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350",
"description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)",
"fork": false,
"created_at": "2020-07-16T16:46:48Z",
"updated_at": "2021-01-10T20:47:19Z",
"pushed_at": "2020-07-16T18:32:04Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"score": 0
},
{
"id": 280336928,
"name": "CVE-2020-1350",
"full_name": "connormcgarr\/CVE-2020-1350",
"owner": {
"login": "connormcgarr",
"id": 45445720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4",
"html_url": "https:\/\/github.com\/connormcgarr"
},
"html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350",
"description": "CVE-2020-1350 Proof-of-Concept",
"fork": false,
"created_at": "2020-07-17T05:41:19Z",
"updated_at": "2021-03-13T12:31:18Z",
"pushed_at": "2020-07-27T16:20:06Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 280665873,
"name": "CVE-2020-1350",
"full_name": "graph-inc\/CVE-2020-1350",
"owner": {
"login": "graph-inc",
"id": 68469953,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68469953?v=4",
"html_url": "https:\/\/github.com\/graph-inc"
},
"html_url": "https:\/\/github.com\/graph-inc\/CVE-2020-1350",
"description": "Scanner and Mitigator for CVE 2020-1350",
"fork": false,
"created_at": "2020-07-18T13:49:54Z",
"updated_at": "2021-01-27T17:38:05Z",
"pushed_at": "2020-07-18T14:05:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 280916907,
"name": "CVE-2020-1350",
"full_name": "CVEmaster\/CVE-2020-1350",
"owner": {
"login": "CVEmaster",
"id": 68512490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4",
"html_url": "https:\/\/github.com\/CVEmaster"
},
"html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350",
"description": "DNS Vulnerability - CVE-2020-1350",
"fork": false,
"created_at": "2020-07-19T17:32:47Z",
"updated_at": "2020-10-10T20:39:05Z",
"pushed_at": "2020-07-20T14:25:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 281069444,
"name": "CVE-2020-1350-checker.ps1",
"full_name": "Secuora-Org\/CVE-2020-1350-checker.ps1",
"owner": {
"login": "Secuora-Org",
"id": 67636594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67636594?v=4",
"html_url": "https:\/\/github.com\/Secuora-Org"
},
"html_url": "https:\/\/github.com\/Secuora-Org\/CVE-2020-1350-checker.ps1",
"description": "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código.",
"fork": false,
"created_at": "2020-07-20T09:12:07Z",
"updated_at": "2020-10-10T20:40:44Z",
"pushed_at": "2020-07-20T09:12:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 281667659,
"name": "cve-2020-1350",
"full_name": "gdwnet\/cve-2020-1350",
"owner": {
"login": "gdwnet",
"id": 19855556,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4",
"html_url": "https:\/\/github.com\/gdwnet"
},
"html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350",
"description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-22T12:11:33Z",
"updated_at": "2020-10-10T20:40:26Z",
"pushed_at": "2020-07-22T12:15:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 282558950,
"name": "CVE-2020-1350-Fix",
"full_name": "simeononsecurity\/CVE-2020-1350-Fix",
"owner": {
"login": "simeononsecurity",
"id": 4913771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4",
"html_url": "https:\/\/github.com\/simeononsecurity"
},
"html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix",
"description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.",
"fork": false,
"created_at": "2020-07-26T02:12:36Z",
"updated_at": "2020-10-10T20:40:04Z",
"pushed_at": "2020-07-26T02:13:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

25
2020/CVE-2020-1362.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 280358563,
"name": "CVE-2020-1362",
"full_name": "Q4n\/CVE-2020-1362",
"owner": {
"login": "Q4n",
"id": 48317526,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48317526?v=4",
"html_url": "https:\/\/github.com\/Q4n"
},
"html_url": "https:\/\/github.com\/Q4n\/CVE-2020-1362",
"description": "writeup of CVE-2020-1362",
"fork": false,
"created_at": "2020-07-17T07:35:05Z",
"updated_at": "2021-03-12T18:18:45Z",
"pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 223,
"watchers_count": 223,
"forks_count": 44,
"forks": 44,
"watchers": 223,
"score": 0
}
]

25
2020/CVE-2020-13640.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277377386,
"name": "CVE-2020-13640",
"full_name": "asterite3\/CVE-2020-13640",
"owner": {
"login": "asterite3",
"id": 5569241,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5569241?v=4",
"html_url": "https:\/\/github.com\/asterite3"
},
"html_url": "https:\/\/github.com\/asterite3\/CVE-2020-13640",
"description": "CVE-2020-13640 - SQL injection in wpDiscuz WordPress plugin <= 5.3.5",
"fork": false,
"created_at": "2020-07-05T20:22:16Z",
"updated_at": "2020-07-29T06:32:34Z",
"pushed_at": "2020-07-05T20:24:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-13925.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 281088072,
"name": "CVE-2020-13925",
"full_name": "bit4woo\/CVE-2020-13925",
"owner": {
"login": "bit4woo",
"id": 8793481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8793481?v=4",
"html_url": "https:\/\/github.com\/bit4woo"
},
"html_url": "https:\/\/github.com\/bit4woo\/CVE-2020-13925",
"description": null,
"fork": false,
"created_at": "2020-07-20T10:38:14Z",
"updated_at": "2020-09-01T02:28:05Z",
"pushed_at": "2020-07-20T10:56:28Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 1,
"forks": 1,
"watchers": 15,
"score": 0
}
]

48
2020/CVE-2020-13933.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 294077686,
"name": "CVE-2020-13933",
"full_name": "lyy289065406\/CVE-2020-13933",
"owner": {
"login": "lyy289065406",
"id": 17040287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17040287?v=4",
"html_url": "https:\/\/github.com\/lyy289065406"
},
"html_url": "https:\/\/github.com\/lyy289065406\/CVE-2020-13933",
"description": "CVE-2020-13933 靶场: shiro 认证绕过漏洞",
"fork": false,
"created_at": "2020-09-09T10:20:25Z",
"updated_at": "2020-11-20T06:30:05Z",
"pushed_at": "2020-09-11T17:14:19Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 297823317,
"name": "cve-2020-13933",
"full_name": "0xkami\/cve-2020-13933",
"owner": {
"login": "0xkami",
"id": 19571618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
"html_url": "https:\/\/github.com\/0xkami"
},
"html_url": "https:\/\/github.com\/0xkami\/cve-2020-13933",
"description": "cve-2020-13933 apache shiro权限绕过漏洞",
"fork": false,
"created_at": "2020-09-23T01:55:46Z",
"updated_at": "2020-12-14T07:27:56Z",
"pushed_at": "2020-09-23T02:00:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

25
2020/CVE-2020-13935.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 309400991,
"name": "CVE-2020-13935",
"full_name": "RedTeamPentesting\/CVE-2020-13935",
"owner": {
"login": "RedTeamPentesting",
"id": 34096076,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34096076?v=4",
"html_url": "https:\/\/github.com\/RedTeamPentesting"
},
"html_url": "https:\/\/github.com\/RedTeamPentesting\/CVE-2020-13935",
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
"fork": false,
"created_at": "2020-11-02T14:48:55Z",
"updated_at": "2021-04-07T13:37:56Z",
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 27,
"forks": 27,
"watchers": 119,
"score": 0
}
]

25
2020/CVE-2020-13996.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 284481729,
"name": "CVE-2020-13996",
"full_name": "mkelepce\/CVE-2020-13996",
"owner": {
"login": "mkelepce",
"id": 10780392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10780392?v=4",
"html_url": "https:\/\/github.com\/mkelepce"
},
"html_url": "https:\/\/github.com\/mkelepce\/CVE-2020-13996",
"description": " Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection",
"fork": false,
"created_at": "2020-08-02T14:50:04Z",
"updated_at": "2020-08-02T14:52:24Z",
"pushed_at": "2020-08-02T14:52:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 300843760,
"name": "CVE-2020-14064",
"full_name": "masoud-zivari\/CVE-2020-14064",
"owner": {
"login": "masoud-zivari",
"id": 72297087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72297087?v=4",
"html_url": "https:\/\/github.com\/masoud-zivari"
},
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14064",
"description": null,
"fork": false,
"created_at": "2020-10-03T09:30:34Z",
"updated_at": "2020-10-03T09:30:47Z",
"pushed_at": "2020-10-03T09:30:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 300840687,
"name": "CVE-2020-14065",
"full_name": "masoud-zivari\/CVE-2020-14065",
"owner": {
"login": "masoud-zivari",
"id": 72297087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72297087?v=4",
"html_url": "https:\/\/github.com\/masoud-zivari"
},
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14065",
"description": null,
"fork": false,
"created_at": "2020-10-03T09:13:19Z",
"updated_at": "2020-10-03T09:13:34Z",
"pushed_at": "2020-10-03T09:13:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 300841463,
"name": "CVE-2020-14066",
"full_name": "masoud-zivari\/CVE-2020-14066",
"owner": {
"login": "masoud-zivari",
"id": 72297087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72297087?v=4",
"html_url": "https:\/\/github.com\/masoud-zivari"
},
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14066",
"description": null,
"fork": false,
"created_at": "2020-10-03T09:17:35Z",
"updated_at": "2020-10-03T09:17:50Z",
"pushed_at": "2020-10-03T09:17:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 307446561,
"name": "CVE-2020-14181",
"full_name": "Rival420\/CVE-2020-14181",
"owner": {
"login": "Rival420",
"id": 51548322,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51548322?v=4",
"html_url": "https:\/\/github.com\/Rival420"
},
"html_url": "https:\/\/github.com\/Rival420\/CVE-2020-14181",
"description": "POC For CVE-2020-1481 - Jira Username Enumerator\/Validator",
"fork": false,
"created_at": "2020-10-26T17:07:28Z",
"updated_at": "2021-03-29T07:28:14Z",
"pushed_at": "2020-10-30T09:36:23Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 336200955,
"name": "CVE-2020-14181",

25
2020/CVE-2020-14199.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 280435778,
"name": "CVE-2020-14199",
"full_name": "nondejus\/CVE-2020-14199",
"owner": {
"login": "nondejus",
"id": 56696825,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56696825?v=4",
"html_url": "https:\/\/github.com\/nondejus"
},
"html_url": "https:\/\/github.com\/nondejus\/CVE-2020-14199",
"description": null,
"fork": false,
"created_at": "2020-07-17T13:48:01Z",
"updated_at": "2020-07-17T13:58:07Z",
"pushed_at": "2020-07-17T13:58:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-14292.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 288914124,
"name": "CVE-2020-14292",
"full_name": "alwentiu\/CVE-2020-14292",
"owner": {
"login": "alwentiu",
"id": 39551518,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39551518?v=4",
"html_url": "https:\/\/github.com\/alwentiu"
},
"html_url": "https:\/\/github.com\/alwentiu\/CVE-2020-14292",
"description": "Details of CVE-2020-14292",
"fork": false,
"created_at": "2020-08-20T05:24:30Z",
"updated_at": "2020-09-08T02:14:25Z",
"pushed_at": "2020-09-08T02:13:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-14293.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 298228408,
"name": "CVE-2020-14293",
"full_name": "patrickhener\/CVE-2020-14293",
"owner": {
"login": "patrickhener",
"id": 7579055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7579055?v=4",
"html_url": "https:\/\/github.com\/patrickhener"
},
"html_url": "https:\/\/github.com\/patrickhener\/CVE-2020-14293",
"description": "This repository holds the advisory, exploits and vulnerable software of the CVE-2020-14293",
"fork": false,
"created_at": "2020-09-24T09:17:38Z",
"updated_at": "2020-10-06T10:32:07Z",
"pushed_at": "2020-10-02T10:38:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-14294.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 298221475,
"name": "CVE-2020-14294",
"full_name": "patrickhener\/CVE-2020-14294",
"owner": {
"login": "patrickhener",
"id": 7579055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7579055?v=4",
"html_url": "https:\/\/github.com\/patrickhener"
},
"html_url": "https:\/\/github.com\/patrickhener\/CVE-2020-14294",
"description": "This repository holds the advisory of the CVE-2020-14294",
"fork": false,
"created_at": "2020-09-24T08:49:05Z",
"updated_at": "2020-10-02T10:37:49Z",
"pushed_at": "2020-10-02T10:37:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-14321.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 282554130,
"name": "CVE-2020-14321",
"full_name": "HoangKien1020\/CVE-2020-14321",
"owner": {
"login": "HoangKien1020",
"id": 24661746,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24661746?v=4",
"html_url": "https:\/\/github.com\/HoangKien1020"
},
"html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2020-14321",
"description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE",
"fork": false,
"created_at": "2020-07-26T01:28:53Z",
"updated_at": "2021-04-05T13:39:48Z",
"pushed_at": "2020-07-26T01:36:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

25
2020/CVE-2020-14386.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 296445764,
"name": "cve-2020-14386",
"full_name": "cgwalters\/cve-2020-14386",
"owner": {
"login": "cgwalters",
"id": 244096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/244096?v=4",
"html_url": "https:\/\/github.com\/cgwalters"
},
"html_url": "https:\/\/github.com\/cgwalters\/cve-2020-14386",
"description": null,
"fork": false,
"created_at": "2020-09-17T21:25:18Z",
"updated_at": "2021-03-04T03:23:26Z",
"pushed_at": "2020-09-18T00:01:00Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 15,
"forks": 15,
"watchers": 34,
"score": 0
}
]

25
2020/CVE-2020-14644.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 305639848,
"name": "cve-2020-14644",
"full_name": "0xkami\/cve-2020-14644",
"owner": {
"login": "0xkami",
"id": 19571618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
"html_url": "https:\/\/github.com\/0xkami"
},
"html_url": "https:\/\/github.com\/0xkami\/cve-2020-14644",
"description": "cve-2020-14644 漏洞环境",
"fork": false,
"created_at": "2020-10-20T08:25:40Z",
"updated_at": "2020-10-20T09:11:28Z",
"pushed_at": "2020-10-20T09:11:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 281003266,
"name": "CVE-2020-14645",
"full_name": "Y4er\/CVE-2020-14645",
"owner": {
"login": "Y4er",
"id": 40487319,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40487319?v=4",
"html_url": "https:\/\/github.com\/Y4er"
},
"html_url": "https:\/\/github.com\/Y4er\/CVE-2020-14645",
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
"fork": false,
"created_at": "2020-07-20T03:27:24Z",
"updated_at": "2021-03-16T07:32:45Z",
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 13,
"forks": 13,
"watchers": 80,
"score": 0
},
{
"id": 281100240,
"name": "CVE-2020-14645",
"full_name": "DaBoQuan\/CVE-2020-14645",
"owner": {
"login": "DaBoQuan",
"id": 13045485,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13045485?v=4",
"html_url": "https:\/\/github.com\/DaBoQuan"
},
"html_url": "https:\/\/github.com\/DaBoQuan\/CVE-2020-14645",
"description": null,
"fork": false,
"created_at": "2020-07-20T11:40:09Z",
"updated_at": "2020-08-31T02:50:43Z",
"pushed_at": "2020-07-20T14:03:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 283214659,
"name": "CVE-2020-14645",
"full_name": "ChenZIDu\/CVE-2020-14645",
"owner": {
"login": "ChenZIDu",
"id": 49174343,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49174343?v=4",
"html_url": "https:\/\/github.com\/ChenZIDu"
},
"html_url": "https:\/\/github.com\/ChenZIDu\/CVE-2020-14645",
"description": "环境下载",
"fork": false,
"created_at": "2020-07-28T13:05:13Z",
"updated_at": "2020-07-29T04:25:51Z",
"pushed_at": "2020-07-29T04:25:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 305992602,
"name": "CVE-2020-14645-code",

View file

@ -1,4 +1,510 @@
[
{
"id": 287009597,
"name": "CVE-2020-1472-visualizer",
"full_name": "Tobey123\/CVE-2020-1472-visualizer",
"owner": {
"login": "Tobey123",
"id": 5292815,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5292815?v=4",
"html_url": "https:\/\/github.com\/Tobey123"
},
"html_url": "https:\/\/github.com\/Tobey123\/CVE-2020-1472-visualizer",
"description": null,
"fork": false,
"created_at": "2020-08-12T12:35:56Z",
"updated_at": "2020-11-05T15:16:46Z",
"pushed_at": "2020-08-06T22:24:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 293756101,
"name": "CVE-2020-1472",
"full_name": "SecuraBV\/CVE-2020-1472",
"owner": {
"login": "SecuraBV",
"id": 46344423,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46344423?v=4",
"html_url": "https:\/\/github.com\/SecuraBV"
},
"html_url": "https:\/\/github.com\/SecuraBV\/CVE-2020-1472",
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-04-07T13:30:25Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1269,
"watchers_count": 1269,
"forks_count": 292,
"forks": 292,
"watchers": 1269,
"score": 0
},
{
"id": 295480770,
"name": "CVE-2020-1472",
"full_name": "cube0x0\/CVE-2020-1472",
"owner": {
"login": "cube0x0",
"id": 39370848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
"html_url": "https:\/\/github.com\/cube0x0"
},
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-14T16:52:37Z",
"updated_at": "2021-04-08T01:07:35Z",
"pushed_at": "2020-09-14T16:53:07Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 9,
"forks": 9,
"watchers": 31,
"score": 0
},
{
"id": 295481822,
"name": "CVE-2020-1472",
"full_name": "dirkjanm\/CVE-2020-1472",
"owner": {
"login": "dirkjanm",
"id": 1773762,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1773762?v=4",
"html_url": "https:\/\/github.com\/dirkjanm"
},
"html_url": "https:\/\/github.com\/dirkjanm\/CVE-2020-1472",
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-04-08T10:22:43Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 779,
"watchers_count": 779,
"forks_count": 227,
"forks": 227,
"watchers": 779,
"score": 0
},
{
"id": 295482050,
"name": "CVE-2020-1472",
"full_name": "VoidSec\/CVE-2020-1472",
"owner": {
"login": "VoidSec",
"id": 5717603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4",
"html_url": "https:\/\/github.com\/VoidSec"
},
"html_url": "https:\/\/github.com\/VoidSec\/CVE-2020-1472",
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-04-07T12:53:44Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 198,
"watchers_count": 198,
"forks_count": 38,
"forks": 38,
"watchers": 198,
"score": 0
},
{
"id": 295515909,
"name": "zerologon",
"full_name": "risksense\/zerologon",
"owner": {
"login": "risksense",
"id": 1999284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1999284?v=4",
"html_url": "https:\/\/github.com\/risksense"
},
"html_url": "https:\/\/github.com\/risksense\/zerologon",
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-04-07T11:37:32Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 297,
"watchers_count": 297,
"forks_count": 98,
"forks": 98,
"watchers": 297,
"score": 0
},
{
"id": 295517706,
"name": "zer0dump",
"full_name": "bb00\/zer0dump",
"owner": {
"login": "bb00",
"id": 11166320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11166320?v=4",
"html_url": "https:\/\/github.com\/bb00"
},
"html_url": "https:\/\/github.com\/bb00\/zer0dump",
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false,
"created_at": "2020-09-14T19:27:14Z",
"updated_at": "2021-04-02T22:09:33Z",
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 36,
"forks": 36,
"watchers": 147,
"score": 0
},
{
"id": 295692006,
"name": "CVE-2020-1472",
"full_name": "0xkami\/CVE-2020-1472",
"owner": {
"login": "0xkami",
"id": 19571618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
"html_url": "https:\/\/github.com\/0xkami"
},
"html_url": "https:\/\/github.com\/0xkami\/CVE-2020-1472",
"description": "CVE-2020-1472漏洞复现过程",
"fork": false,
"created_at": "2020-09-15T10:25:47Z",
"updated_at": "2020-11-07T02:11:06Z",
"pushed_at": "2020-09-15T10:39:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 295716616,
"name": "CVE-2020-1472",
"full_name": "NAXG\/CVE-2020-1472",
"owner": {
"login": "NAXG",
"id": 28560949,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28560949?v=4",
"html_url": "https:\/\/github.com\/NAXG"
},
"html_url": "https:\/\/github.com\/NAXG\/CVE-2020-1472",
"description": "CVE-2020-1472复现流程",
"fork": false,
"created_at": "2020-09-15T12:11:49Z",
"updated_at": "2020-09-17T20:50:53Z",
"pushed_at": "2020-09-16T08:45:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 295743213,
"name": "CVE-2020-1472",
"full_name": "s0wr0b1ndef\/CVE-2020-1472",
"owner": {
"login": "s0wr0b1ndef",
"id": 37288034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37288034?v=4",
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
},
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-15T13:50:01Z",
"updated_at": "2020-09-20T18:17:37Z",
"pushed_at": "2021-03-20T05:07:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 295754317,
"name": "zerologon-CVE-2020-1472",
"full_name": "harshil-shah004\/zerologon-CVE-2020-1472",
"owner": {
"login": "harshil-shah004",
"id": 34110198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34110198?v=4",
"html_url": "https:\/\/github.com\/harshil-shah004"
},
"html_url": "https:\/\/github.com\/harshil-shah004\/zerologon-CVE-2020-1472",
"description": "PoC for Zerologon (CVE-2020-1472) - Exploit",
"fork": false,
"created_at": "2020-09-15T14:29:24Z",
"updated_at": "2021-01-27T07:28:51Z",
"pushed_at": "2020-09-16T11:06:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 295781919,
"name": "CVE-2020-1472-EXP",
"full_name": "k8gege\/CVE-2020-1472-EXP",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/CVE-2020-1472-EXP",
"description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器",
"fork": false,
"created_at": "2020-09-15T16:10:21Z",
"updated_at": "2021-02-11T11:15:16Z",
"pushed_at": "2020-09-15T16:40:53Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 17,
"forks": 17,
"watchers": 49,
"score": 0
},
{
"id": 295788757,
"name": "CVE-2020-1472",
"full_name": "422926799\/CVE-2020-1472",
"owner": {
"login": "422926799",
"id": 29516567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29516567?v=4",
"html_url": "https:\/\/github.com\/422926799"
},
"html_url": "https:\/\/github.com\/422926799\/CVE-2020-1472",
"description": "CVE-2020-1472",
"fork": false,
"created_at": "2020-09-15T16:36:40Z",
"updated_at": "2020-09-16T03:58:43Z",
"pushed_at": "2020-09-15T16:38:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 295903888,
"name": "zabbix-template-CVE-2020-1472",
"full_name": "scv-m\/zabbix-template-CVE-2020-1472",
"owner": {
"login": "scv-m",
"id": 965541,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/965541?v=4",
"html_url": "https:\/\/github.com\/scv-m"
},
"html_url": "https:\/\/github.com\/scv-m\/zabbix-template-CVE-2020-1472",
"description": "Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472",
"fork": false,
"created_at": "2020-09-16T02:37:52Z",
"updated_at": "2021-02-08T22:22:05Z",
"pushed_at": "2020-09-16T02:47:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 295915198,
"name": "cve-2020-1472",
"full_name": "mstxq17\/cve-2020-1472",
"owner": {
"login": "mstxq17",
"id": 29624427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4",
"html_url": "https:\/\/github.com\/mstxq17"
},
"html_url": "https:\/\/github.com\/mstxq17\/cve-2020-1472",
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2021-03-01T01:00:35Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 10,
"forks": 10,
"watchers": 46,
"score": 0
},
{
"id": 295917575,
"name": "CVE-2020-1472",
"full_name": "Fa1c0n35\/CVE-2020-1472",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-16T03:54:27Z",
"updated_at": "2020-09-19T17:56:42Z",
"pushed_at": "2020-09-16T03:54:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 295917979,
"name": "SecuraBV-CVE-2020-1472",
"full_name": "Fa1c0n35\/SecuraBV-CVE-2020-1472",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/SecuraBV-CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-16T03:57:04Z",
"updated_at": "2020-09-25T06:08:29Z",
"pushed_at": "2021-03-20T05:06:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 295956141,
"name": "CVE-2020-1472",
"full_name": "CanciuCostin\/CVE-2020-1472",
"owner": {
"login": "CanciuCostin",
"id": 27332434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27332434?v=4",
"html_url": "https:\/\/github.com\/CanciuCostin"
},
"html_url": "https:\/\/github.com\/CanciuCostin\/CVE-2020-1472",
"description": "CVE-2020-1472 - Zero Logon vulnerability Python implementation",
"fork": false,
"created_at": "2020-09-16T07:25:22Z",
"updated_at": "2020-09-17T07:17:13Z",
"pushed_at": "2020-09-16T08:39:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 295972450,
"name": "cve-2020-1472_Tool-collection",
"full_name": "0xcccc666\/cve-2020-1472_Tool-collection",
"owner": {
"login": "0xcccc666",
"id": 71364553,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71364553?v=4",
"html_url": "https:\/\/github.com\/0xcccc666"
},
"html_url": "https:\/\/github.com\/0xcccc666\/cve-2020-1472_Tool-collection",
"description": "cve-2020-1472_Tool collection",
"fork": false,
"created_at": "2020-09-16T08:32:52Z",
"updated_at": "2020-11-28T04:59:11Z",
"pushed_at": "2020-09-16T09:13:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 295984599,
"name": "CVE-2020-1472",
"full_name": "murataydemir\/CVE-2020-1472",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-1472",
"description": "[CVE-2020-1472] Netlogon Remote Protocol Call (MS-NRPC) Privilege Escalation (Zerologon)",
"fork": false,
"created_at": "2020-09-16T09:22:30Z",
"updated_at": "2021-01-15T04:57:38Z",
"pushed_at": "2020-09-16T20:59:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 295992280,
"name": "CVE-2020-1472",
"full_name": "npocmak\/CVE-2020-1472",
"owner": {
"login": "npocmak",
"id": 33814019,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33814019?v=4",
"html_url": "https:\/\/github.com\/npocmak"
},
"html_url": "https:\/\/github.com\/npocmak\/CVE-2020-1472",
"description": "https:\/\/github.com\/dirkjanm\/CVE-2020-1472",
"fork": false,
"created_at": "2020-09-16T09:54:09Z",
"updated_at": "2020-10-10T11:45:35Z",
"pushed_at": "2020-09-16T09:58:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 296056571,
"name": "CVE-2020-1472",
"full_name": "victim10wq3\/CVE-2020-1472",
"owner": {
"login": "victim10wq3",
"id": 46973456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46973456?v=4",
"html_url": "https:\/\/github.com\/victim10wq3"
},
"html_url": "https:\/\/github.com\/victim10wq3\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-16T14:25:54Z",
"updated_at": "2020-09-19T17:56:06Z",
"pushed_at": "2020-09-16T14:28:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 296388474,
"name": "zerologon",
@ -22,6 +528,190 @@
"watchers": 41,
"score": 0
},
{
"id": 296468860,
"name": "CVE-2020-1472",
"full_name": "sv3nbeast\/CVE-2020-1472",
"owner": {
"login": "sv3nbeast",
"id": 55974091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55974091?v=4",
"html_url": "https:\/\/github.com\/sv3nbeast"
},
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-1472",
"description": " CVE-2020-1472复现时使用的py文件整理打包",
"fork": false,
"created_at": "2020-09-18T00:02:26Z",
"updated_at": "2020-12-09T05:06:51Z",
"pushed_at": "2020-09-18T00:20:46Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
},
{
"id": 296948762,
"name": "CVE-2020-1472-Easy",
"full_name": "midpipps\/CVE-2020-1472-Easy",
"owner": {
"login": "midpipps",
"id": 4256983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4256983?v=4",
"html_url": "https:\/\/github.com\/midpipps"
},
"html_url": "https:\/\/github.com\/midpipps\/CVE-2020-1472-Easy",
"description": "A simple implementation\/code smash of a bunch of other repos",
"fork": false,
"created_at": "2020-09-19T20:44:40Z",
"updated_at": "2020-09-19T21:27:41Z",
"pushed_at": "2020-09-19T21:27:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 296966855,
"name": "CVE-2020-1472",
"full_name": "hectorgie\/CVE-2020-1472",
"owner": {
"login": "hectorgie",
"id": 56555336,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56555336?v=4",
"html_url": "https:\/\/github.com\/hectorgie"
},
"html_url": "https:\/\/github.com\/hectorgie\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-19T23:15:41Z",
"updated_at": "2020-09-19T23:15:54Z",
"pushed_at": "2020-09-19T23:15:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 297085240,
"name": "zerologon-cve-2020-1472-notes",
"full_name": "johnpathe\/zerologon-cve-2020-1472-notes",
"owner": {
"login": "johnpathe",
"id": 8648275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8648275?v=4",
"html_url": "https:\/\/github.com\/johnpathe"
},
"html_url": "https:\/\/github.com\/johnpathe\/zerologon-cve-2020-1472-notes",
"description": null,
"fork": false,
"created_at": "2020-09-20T13:44:16Z",
"updated_at": "2020-10-19T06:55:24Z",
"pushed_at": "2020-10-19T06:55:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 297260718,
"name": "CVE-2020-1472",
"full_name": "t31m0\/CVE-2020-1472",
"owner": {
"login": "t31m0",
"id": 13071219,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13071219?v=4",
"html_url": "https:\/\/github.com\/t31m0"
},
"html_url": "https:\/\/github.com\/t31m0\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-21T07:24:03Z",
"updated_at": "2020-09-21T07:24:16Z",
"pushed_at": "2020-09-21T07:24:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 298383438,
"name": "CVE-2020-1472",
"full_name": "grupooruss\/CVE-2020-1472",
"owner": {
"login": "grupooruss",
"id": 43943489,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4",
"html_url": "https:\/\/github.com\/grupooruss"
},
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2020-1472",
"description": "CVE 2020-1472 Script de validación ",
"fork": false,
"created_at": "2020-09-24T20:05:21Z",
"updated_at": "2020-09-24T20:08:43Z",
"pushed_at": "2020-09-24T20:08:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 298771178,
"name": "CVE-2020-1472",
"full_name": "striveben\/CVE-2020-1472",
"owner": {
"login": "striveben",
"id": 61238912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61238912?v=4",
"html_url": "https:\/\/github.com\/striveben"
},
"html_url": "https:\/\/github.com\/striveben\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-26T08:31:47Z",
"updated_at": "2021-01-21T09:02:23Z",
"pushed_at": "2020-09-26T08:44:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 299216120,
"name": "CVE-2020-1472-02-",
"full_name": "Fa1c0n35\/CVE-2020-1472-02-",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2020-1472-02-",
"description": null,
"fork": false,
"created_at": "2020-09-28T06:53:41Z",
"updated_at": "2020-09-28T06:53:54Z",
"pushed_at": "2021-03-20T05:09:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 299264416,
"name": "CVE-2020-1472",
@ -45,6 +735,121 @@
"watchers": 0,
"score": 0
},
{
"id": 299708288,
"name": "Zerologon_CVE-2020-1472",
"full_name": "WiIs0n\/Zerologon_CVE-2020-1472",
"owner": {
"login": "WiIs0n",
"id": 40162782,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40162782?v=4",
"html_url": "https:\/\/github.com\/WiIs0n"
},
"html_url": "https:\/\/github.com\/WiIs0n\/Zerologon_CVE-2020-1472",
"description": "POC for checking multiple hosts for Zerologon vulnerability",
"fork": false,
"created_at": "2020-09-29T18:45:44Z",
"updated_at": "2021-03-30T12:54:34Z",
"pushed_at": "2020-10-05T07:47:02Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 299733711,
"name": "ADZero",
"full_name": "Privia-Security\/ADZero",
"owner": {
"login": "Privia-Security",
"id": 69091374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69091374?v=4",
"html_url": "https:\/\/github.com\/Privia-Security"
},
"html_url": "https:\/\/github.com\/Privia-Security\/ADZero",
"description": "Zerologon AutoExploit Tool | CVE-2020-1472",
"fork": false,
"created_at": "2020-09-29T20:43:06Z",
"updated_at": "2021-04-03T01:16:58Z",
"pushed_at": "2020-10-02T13:00:21Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"forks": 1,
"watchers": 17,
"score": 0
},
{
"id": 299845895,
"name": "cve-2020-1472",
"full_name": "Ken-Abruzzi\/cve-2020-1472",
"owner": {
"login": "Ken-Abruzzi",
"id": 68931768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68931768?v=4",
"html_url": "https:\/\/github.com\/Ken-Abruzzi"
},
"html_url": "https:\/\/github.com\/Ken-Abruzzi\/cve-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-30T07:45:50Z",
"updated_at": "2020-09-30T07:57:36Z",
"pushed_at": "2020-09-30T07:57:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 299977188,
"name": "Set-ZerologonMitigation",
"full_name": "rhymeswithmogul\/Set-ZerologonMitigation",
"owner": {
"login": "rhymeswithmogul",
"id": 19931245,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19931245?v=4",
"html_url": "https:\/\/github.com\/rhymeswithmogul"
},
"html_url": "https:\/\/github.com\/rhymeswithmogul\/Set-ZerologonMitigation",
"description": "Protect your domain controllers against Zerologon (CVE-2020-1472).",
"fork": false,
"created_at": "2020-09-30T16:10:26Z",
"updated_at": "2020-10-13T15:41:20Z",
"pushed_at": "2020-09-30T16:34:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 302859573,
"name": "cve-2020-1472",
"full_name": "shanfenglan\/cve-2020-1472",
"owner": {
"login": "shanfenglan",
"id": 49781523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49781523?v=4",
"html_url": "https:\/\/github.com\/shanfenglan"
},
"html_url": "https:\/\/github.com\/shanfenglan\/cve-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-10-10T09:00:41Z",
"updated_at": "2020-10-18T05:46:12Z",
"pushed_at": "2020-10-10T09:02:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 304362194,
"name": "zerologon",
@ -68,6 +873,75 @@
"watchers": 0,
"score": 0
},
{
"id": 304764704,
"name": "CVE-2020-1472_ZeroLogonChecker",
"full_name": "CPO-EH\/CVE-2020-1472_ZeroLogonChecker",
"owner": {
"login": "CPO-EH",
"id": 56457033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
"html_url": "https:\/\/github.com\/CPO-EH"
},
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-1472_ZeroLogonChecker",
"description": "C# Vulnerability Checker for CVE-2020-1472 Aka Zerologon",
"fork": false,
"created_at": "2020-10-17T00:14:08Z",
"updated_at": "2020-10-17T11:03:34Z",
"pushed_at": "2020-10-17T10:29:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 305977168,
"name": "CVE-2020-1472",
"full_name": "puckiestyle\/CVE-2020-1472",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-10-21T09:42:34Z",
"updated_at": "2020-10-21T09:42:48Z",
"pushed_at": "2021-03-20T05:18:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 310337744,
"name": "CVE-2020-1472-visualizer",
"full_name": "mingchen-script\/CVE-2020-1472-visualizer",
"owner": {
"login": "mingchen-script",
"id": 68715366,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68715366?v=4",
"html_url": "https:\/\/github.com\/mingchen-script"
},
"html_url": "https:\/\/github.com\/mingchen-script\/CVE-2020-1472-visualizer",
"description": null,
"fork": false,
"created_at": "2020-11-05T15:17:14Z",
"updated_at": "2020-11-05T15:19:05Z",
"pushed_at": "2020-11-05T15:19:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 311790363,
"name": "dirkjanm_CVE-2020-1472_static_binaries",

View file

@ -45,6 +45,29 @@
"watchers": 221,
"score": 0
},
{
"id": 308145197,
"name": "CVE-2020-14882",
"full_name": "s1kr10s\/CVE-2020-14882",
"owner": {
"login": "s1kr10s",
"id": 5374475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5374475?v=4",
"html_url": "https:\/\/github.com\/s1kr10s"
},
"html_url": "https:\/\/github.com\/s1kr10s\/CVE-2020-14882",
"description": "CVE-202014882 by Jang",
"fork": false,
"created_at": "2020-10-28T21:28:12Z",
"updated_at": "2021-03-18T23:50:58Z",
"pushed_at": "2020-10-29T03:57:09Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 19,
"forks": 19,
"watchers": 28,
"score": 0
},
{
"id": 308184758,
"name": "-Patched-McMaster-University-Blind-Command-Injection",
@ -68,6 +91,98 @@
"watchers": 0,
"score": 0
},
{
"id": 308238126,
"name": "CVE-2020-14882",
"full_name": "RedTeamWing\/CVE-2020-14882",
"owner": {
"login": "RedTeamWing",
"id": 25416365,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25416365?v=4",
"html_url": "https:\/\/github.com\/RedTeamWing"
},
"html_url": "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882",
"description": "CVE-2020-14882 Weblogic-Exp",
"fork": false,
"created_at": "2020-10-29T06:30:30Z",
"updated_at": "2021-03-14T05:03:17Z",
"pushed_at": "2020-10-29T06:36:01Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 8,
"forks": 8,
"watchers": 13,
"score": 0
},
{
"id": 308343789,
"name": "cve-2020-14882",
"full_name": "0thm4n3\/cve-2020-14882",
"owner": {
"login": "0thm4n3",
"id": 12746014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12746014?v=4",
"html_url": "https:\/\/github.com\/0thm4n3"
},
"html_url": "https:\/\/github.com\/0thm4n3\/cve-2020-14882",
"description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882",
"fork": false,
"created_at": "2020-10-29T13:53:31Z",
"updated_at": "2021-03-18T23:46:12Z",
"pushed_at": "2020-10-31T13:03:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 308374913,
"name": "cve-2020-14882",
"full_name": "wsfengfan\/cve-2020-14882",
"owner": {
"login": "wsfengfan",
"id": 33821840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33821840?v=4",
"html_url": "https:\/\/github.com\/wsfengfan"
},
"html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882",
"description": "CVE-2020-14882 EXP 回显",
"fork": false,
"created_at": "2020-10-29T15:44:23Z",
"updated_at": "2020-12-06T17:09:24Z",
"pushed_at": "2020-11-09T09:55:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 308605927,
"name": "CVE-2020-14882",
"full_name": "alexfrancow\/CVE-2020-14882",
"owner": {
"login": "alexfrancow",
"id": 23419929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23419929?v=4",
"html_url": "https:\/\/github.com\/alexfrancow"
},
"html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-10-30T11:07:11Z",
"updated_at": "2020-10-31T15:57:21Z",
"pushed_at": "2020-10-31T15:57:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 308782228,
"name": "CVE-2020-14882_POC",
@ -91,6 +206,29 @@
"watchers": 12,
"score": 0
},
{
"id": 309098912,
"name": "Weblogic_Unauthorized-bypass-RCE",
"full_name": "ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev"
},
"html_url": "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
"description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script",
"fork": false,
"created_at": "2020-11-01T13:12:27Z",
"updated_at": "2021-03-18T23:50:26Z",
"pushed_at": "2020-11-01T13:56:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 309655403,
"name": "CVE-2020-14882_ALL",
@ -114,6 +252,75 @@
"watchers": 85,
"score": 0
},
{
"id": 309666360,
"name": "CVE-2020-14882-checker",
"full_name": "ovProphet\/CVE-2020-14882-checker",
"owner": {
"login": "ovProphet",
"id": 12277617,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12277617?v=4",
"html_url": "https:\/\/github.com\/ovProphet"
},
"html_url": "https:\/\/github.com\/ovProphet\/CVE-2020-14882-checker",
"description": "CVE-2020-14882 detection script",
"fork": false,
"created_at": "2020-11-03T11:34:38Z",
"updated_at": "2021-03-18T23:48:22Z",
"pushed_at": "2020-11-03T11:34:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 309868259,
"name": "CVE-2020-14882",
"full_name": "NS-Sp4ce\/CVE-2020-14882",
"owner": {
"login": "NS-Sp4ce",
"id": 33349032,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4",
"html_url": "https:\/\/github.com\/NS-Sp4ce"
},
"html_url": "https:\/\/github.com\/NS-Sp4ce\/CVE-2020-14882",
"description": "CVE-2020-14882\/14883\/14750",
"fork": false,
"created_at": "2020-11-04T03:09:13Z",
"updated_at": "2021-01-19T07:12:06Z",
"pushed_at": "2020-11-04T03:15:33Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"forks": 1,
"watchers": 11,
"score": 0
},
{
"id": 310303375,
"name": "cve-2020-14882",
"full_name": "mmioimm\/cve-2020-14882",
"owner": {
"login": "mmioimm",
"id": 19258899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19258899?v=4",
"html_url": "https:\/\/github.com\/mmioimm"
},
"html_url": "https:\/\/github.com\/mmioimm\/cve-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-11-05T13:12:28Z",
"updated_at": "2021-01-29T03:18:00Z",
"pushed_at": "2020-11-05T13:14:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 311265070,
"name": "CVE-2020-14882",
@ -381,13 +588,13 @@
"description": null,
"fork": false,
"created_at": "2021-04-07T09:48:49Z",
"updated_at": "2021-04-08T18:38:38Z",
"updated_at": "2021-04-09T00:41:55Z",
"pushed_at": "2021-04-08T15:17:01Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"watchers": 9,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-08T17:57:00Z",
"updated_at": "2021-04-09T02:58:50Z",
"pushed_at": "2021-04-08T13:53:46Z",
"stargazers_count": 338,
"watchers_count": 338,
"forks_count": 77,
"forks": 77,
"watchers": 338,
"stargazers_count": 346,
"watchers_count": 346,
"forks_count": 80,
"forks": 80,
"watchers": 346,
"score": 0
}
]

25
2020/CVE-2020-1493.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 290121561,
"name": "CVE-2020-1493",
"full_name": "0neb1n\/CVE-2020-1493",
"owner": {
"login": "0neb1n",
"id": 22587350,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22587350?v=4",
"html_url": "https:\/\/github.com\/0neb1n"
},
"html_url": "https:\/\/github.com\/0neb1n\/CVE-2020-1493",
"description": null,
"fork": false,
"created_at": "2020-08-25T05:25:45Z",
"updated_at": "2021-01-24T17:07:03Z",
"pushed_at": "2020-08-25T05:46:30Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 15,
"forks": 15,
"watchers": 27,
"score": 0
}
]

25
2020/CVE-2020-14947.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 276697965,
"name": "CVE-2020-14947",
"full_name": "mhaskar\/CVE-2020-14947",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2020-14947",
"description": "The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947",
"fork": false,
"created_at": "2020-07-02T16:40:52Z",
"updated_at": "2020-10-21T22:17:41Z",
"pushed_at": "2020-07-02T16:46:10Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"forks": 6,
"watchers": 17,
"score": 0
}
]

25
2020/CVE-2020-14955.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 302371253,
"name": "CVE-2020-14955",
"full_name": "intrigus-lgtm\/CVE-2020-14955",
"owner": {
"login": "intrigus-lgtm",
"id": 60750685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60750685?v=4",
"html_url": "https:\/\/github.com\/intrigus-lgtm"
},
"html_url": "https:\/\/github.com\/intrigus-lgtm\/CVE-2020-14955",
"description": "Jiangmin",
"fork": false,
"created_at": "2020-10-08T14:41:23Z",
"updated_at": "2020-10-10T08:24:37Z",
"pushed_at": "2020-10-09T03:46:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-15051.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277732389,
"name": "CVE-2020-15051",
"full_name": "pratikshad19\/CVE-2020-15051",
"owner": {
"login": "pratikshad19",
"id": 67833998,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833998?v=4",
"html_url": "https:\/\/github.com\/pratikshad19"
},
"html_url": "https:\/\/github.com\/pratikshad19\/CVE-2020-15051",
"description": "CVE-2020-15051 : Artica Proxy before 4.30.000000 Community Edition allows Stored Cross Site Scripting.",
"fork": false,
"created_at": "2020-07-07T06:11:04Z",
"updated_at": "2020-07-20T16:22:23Z",
"pushed_at": "2020-07-20T16:22:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-15052.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277770540,
"name": "CVE-2020-15052",
"full_name": "pratikshad19\/CVE-2020-15052",
"owner": {
"login": "pratikshad19",
"id": 67833998,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833998?v=4",
"html_url": "https:\/\/github.com\/pratikshad19"
},
"html_url": "https:\/\/github.com\/pratikshad19\/CVE-2020-15052",
"description": "Artica Proxy before 4.30.000000 Community Edition allows SQL Injection.",
"fork": false,
"created_at": "2020-07-07T09:13:18Z",
"updated_at": "2020-07-21T13:24:54Z",
"pushed_at": "2020-07-20T16:21:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-15053.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277772338,
"name": "CVE-2020-15053",
"full_name": "pratikshad19\/CVE-2020-15053",
"owner": {
"login": "pratikshad19",
"id": 67833998,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833998?v=4",
"html_url": "https:\/\/github.com\/pratikshad19"
},
"html_url": "https:\/\/github.com\/pratikshad19\/CVE-2020-15053",
"description": "Artica Proxy before 4.30.000000 Community Edition allows Reflected Cross Site Scripting.",
"fork": false,
"created_at": "2020-07-07T09:21:30Z",
"updated_at": "2020-07-20T16:21:09Z",
"pushed_at": "2020-07-20T16:21:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

48
2020/CVE-2020-15148.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 297223360,
"name": "CVE-2020-15148-bypasses",
"full_name": "Maskhe\/CVE-2020-15148-bypasses",
"owner": {
"login": "Maskhe",
"id": 30264078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30264078?v=4",
"html_url": "https:\/\/github.com\/Maskhe"
},
"html_url": "https:\/\/github.com\/Maskhe\/CVE-2020-15148-bypasses",
"description": "几条关于CVE-2020-15148yii2反序列化的绕过",
"fork": false,
"created_at": "2020-09-21T03:55:55Z",
"updated_at": "2021-03-11T10:41:35Z",
"pushed_at": "2020-09-21T04:04:39Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 6,
"forks": 6,
"watchers": 67,
"score": 0
},
{
"id": 307620612,
"name": "cve-2020-15148",
"full_name": "0xkami\/cve-2020-15148",
"owner": {
"login": "0xkami",
"id": 19571618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
"html_url": "https:\/\/github.com\/0xkami"
},
"html_url": "https:\/\/github.com\/0xkami\/cve-2020-15148",
"description": "cve-2020-15148",
"fork": false,
"created_at": "2020-10-27T07:33:47Z",
"updated_at": "2020-12-17T09:04:51Z",
"pushed_at": "2020-10-27T07:35:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-15169.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 302388307,
"name": "CVE-2020-15169",
"full_name": "glasses618\/CVE-2020-15169",
"owner": {
"login": "glasses618",
"id": 10650655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10650655?v=4",
"html_url": "https:\/\/github.com\/glasses618"
},
"html_url": "https:\/\/github.com\/glasses618\/CVE-2020-15169",
"description": null,
"fork": false,
"created_at": "2020-10-08T15:42:37Z",
"updated_at": "2020-10-08T15:43:15Z",
"pushed_at": "2020-10-08T15:43:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 302645381,
"name": "CVE-2020-15227",
"full_name": "Langriklol\/CVE-2020-15227",
"owner": {
"login": "Langriklol",
"id": 20239181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20239181?v=4",
"html_url": "https:\/\/github.com\/Langriklol"
},
"html_url": "https:\/\/github.com\/Langriklol\/CVE-2020-15227",
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-09T13:13:14Z",
"updated_at": "2020-11-08T21:38:22Z",
"pushed_at": "2020-11-05T21:29:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 302798857,
"name": "CVE-2020-15227",
"full_name": "hu4wufu\/CVE-2020-15227",
"owner": {
"login": "hu4wufu",
"id": 22029831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22029831?v=4",
"html_url": "https:\/\/github.com\/hu4wufu"
},
"html_url": "https:\/\/github.com\/hu4wufu\/CVE-2020-15227",
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-10T02:38:15Z",
"updated_at": "2020-11-24T04:00:06Z",
"pushed_at": "2020-10-09T16:39:54Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"forks": 4,
"watchers": 16,
"score": 0
},
{
"id": 313061696,
"name": "CVE-2020-15227",

25
2020/CVE-2020-15399.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 284479027,
"name": "CVE-2020-15399",
"full_name": "mkelepce\/CVE-2020-15399",
"owner": {
"login": "mkelepce",
"id": 10780392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10780392?v=4",
"html_url": "https:\/\/github.com\/mkelepce"
},
"html_url": "https:\/\/github.com\/mkelepce\/CVE-2020-15399",
"description": " Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection",
"fork": false,
"created_at": "2020-08-02T14:35:26Z",
"updated_at": "2020-08-02T14:38:26Z",
"pushed_at": "2020-08-02T14:38:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-15492.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 298218272,
"name": "CVE-2020-15492",
"full_name": "patrickhener\/CVE-2020-15492",
"owner": {
"login": "patrickhener",
"id": 7579055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7579055?v=4",
"html_url": "https:\/\/github.com\/patrickhener"
},
"html_url": "https:\/\/github.com\/patrickhener\/CVE-2020-15492",
"description": "This repository holds the advisory, exploits and vulnerable software of the CVE-2020-15492",
"fork": false,
"created_at": "2020-09-24T08:36:40Z",
"updated_at": "2020-09-29T13:45:47Z",
"pushed_at": "2020-09-29T13:45:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-15873.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 295692158,
"name": "cs4239-cve-2020-15873",
"full_name": "limerencee\/cs4239-cve-2020-15873",
"owner": {
"login": "limerencee",
"id": 25873970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25873970?v=4",
"html_url": "https:\/\/github.com\/limerencee"
},
"html_url": "https:\/\/github.com\/limerencee\/cs4239-cve-2020-15873",
"description": "Proof of Concept of CVE-2020-15873 - Blind SQL Injection in Librenms < v1.65.1",
"fork": false,
"created_at": "2020-09-15T10:26:26Z",
"updated_at": "2020-10-05T04:34:32Z",
"pushed_at": "2020-09-21T12:14:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-15906.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 281907147,
"name": "CVE-2020-15906",
"full_name": "S1lkys\/CVE-2020-15906",
"owner": {
"login": "S1lkys",
"id": 40408435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
"html_url": "https:\/\/github.com\/S1lkys"
},
"html_url": "https:\/\/github.com\/S1lkys\/CVE-2020-15906",
"description": "Writeup of CVE-2020-15906",
"fork": false,
"created_at": "2020-07-23T09:20:53Z",
"updated_at": "2021-03-22T04:03:34Z",
"pushed_at": "2020-10-26T22:01:33Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 4,
"forks": 4,
"watchers": 40,
"score": 0
}
]

25
2020/CVE-2020-15956.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 284867344,
"name": "cve-2020-15956",
"full_name": "megamagnus\/cve-2020-15956",
"owner": {
"login": "megamagnus",
"id": 68912653,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68912653?v=4",
"html_url": "https:\/\/github.com\/megamagnus"
},
"html_url": "https:\/\/github.com\/megamagnus\/cve-2020-15956",
"description": "ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unauthenticated attackers to trigger a buffer overflow and application termination via a malformed payload.",
"fork": false,
"created_at": "2020-08-04T03:27:24Z",
"updated_at": "2020-08-07T04:39:24Z",
"pushed_at": "2020-08-04T15:50:13Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
}
]

25
2020/CVE-2020-16152.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291464552,
"name": "CVE-2020-16152",
"full_name": "eriknl\/CVE-2020-16152",
"owner": {
"login": "eriknl",
"id": 7977955,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7977955?v=4",
"html_url": "https:\/\/github.com\/eriknl"
},
"html_url": "https:\/\/github.com\/eriknl\/CVE-2020-16152",
"description": "Explanation and PoC for CVE-2020-16152",
"fork": false,
"created_at": "2020-08-30T12:18:12Z",
"updated_at": "2020-12-30T11:03:03Z",
"pushed_at": "2020-09-01T05:22:23Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"forks": 6,
"watchers": 7,
"score": 0
}
]

25
2020/CVE-2020-16270.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 304345770,
"name": "CVE-2020-16270",
"full_name": "Security-AVS\/CVE-2020-16270",
"owner": {
"login": "Security-AVS",
"id": 72926885,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
"html_url": "https:\/\/github.com\/Security-AVS"
},
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2020-16270",
"description": null,
"fork": false,
"created_at": "2020-10-15T14:06:28Z",
"updated_at": "2020-10-15T15:07:15Z",
"pushed_at": "2020-10-15T15:07:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

324
2020/CVE-2020-16898.json Normal file
View file

@ -0,0 +1,324 @@
[
{
"id": 302145941,
"name": "CVE-2020-16898",
"full_name": "advanced-threat-research\/CVE-2020-16898",
"owner": {
"login": "advanced-threat-research",
"id": 27901279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
"html_url": "https:\/\/github.com\/advanced-threat-research"
},
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16898",
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2021-01-27T09:05:22Z",
"pushed_at": "2020-10-26T10:15:32Z",
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 31,
"forks": 31,
"watchers": 207,
"score": 0
},
{
"id": 303891965,
"name": "CVE-2020-16898",
"full_name": "corelight\/CVE-2020-16898",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2020-16898",
"description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)",
"fork": false,
"created_at": "2020-10-14T03:25:00Z",
"updated_at": "2021-02-24T17:35:51Z",
"pushed_at": "2020-10-22T15:22:55Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 304024639,
"name": "CVE-2020-16898_Check",
"full_name": "Maliek\/CVE-2020-16898_Check",
"owner": {
"login": "Maliek",
"id": 8858341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8858341?v=4",
"html_url": "https:\/\/github.com\/Maliek"
},
"html_url": "https:\/\/github.com\/Maliek\/CVE-2020-16898_Check",
"description": "Minor powershell script that checks for vulnerable interfaces.",
"fork": false,
"created_at": "2020-10-14T13:30:38Z",
"updated_at": "2020-10-16T09:20:02Z",
"pushed_at": "2020-10-16T09:20:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 304044860,
"name": "CVE-2020-16898",
"full_name": "ZephrFish\/CVE-2020-16898",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-16898",
"description": "HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
"fork": false,
"created_at": "2020-10-14T14:42:52Z",
"updated_at": "2021-03-19T01:24:50Z",
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"score": 0
},
{
"id": 304075693,
"name": "cve-2020-16898",
"full_name": "esnet-security\/cve-2020-16898",
"owner": {
"login": "esnet-security",
"id": 46755983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46755983?v=4",
"html_url": "https:\/\/github.com\/esnet-security"
},
"html_url": "https:\/\/github.com\/esnet-security\/cve-2020-16898",
"description": "Detects CVE-2020-16898: \"Bad Neighbor\"",
"fork": false,
"created_at": "2020-10-14T16:38:06Z",
"updated_at": "2020-10-15T15:39:52Z",
"pushed_at": "2020-10-15T23:00:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 304139222,
"name": "CVE-2020-16898-Bad-Neighbor",
"full_name": "initconf\/CVE-2020-16898-Bad-Neighbor",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf"
},
"html_url": "https:\/\/github.com\/initconf\/CVE-2020-16898-Bad-Neighbor",
"description": "Zeek detection for CVE-2020-16898-\"Bad Neighbor\"",
"fork": false,
"created_at": "2020-10-14T21:25:09Z",
"updated_at": "2020-10-22T21:12:06Z",
"pushed_at": "2020-10-22T21:12:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 304538917,
"name": "CVE-2020-16898",
"full_name": "Q1984\/CVE-2020-16898",
"owner": {
"login": "Q1984",
"id": 50952023,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50952023?v=4",
"html_url": "https:\/\/github.com\/Q1984"
},
"html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898",
"description": "PoC Bad Neighbor BSOD exploit",
"fork": false,
"created_at": "2020-10-16T06:27:24Z",
"updated_at": "2020-10-16T11:17:23Z",
"pushed_at": "2020-10-16T11:17:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 304755825,
"name": "cve-2020-16898",
"full_name": "0xeb-bp\/cve-2020-16898",
"owner": {
"login": "0xeb-bp",
"id": 53204152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53204152?v=4",
"html_url": "https:\/\/github.com\/0xeb-bp"
},
"html_url": "https:\/\/github.com\/0xeb-bp\/cve-2020-16898",
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
"fork": false,
"created_at": "2020-10-16T23:03:15Z",
"updated_at": "2021-01-13T11:23:25Z",
"pushed_at": "2020-10-16T23:12:52Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 19,
"score": 0
},
{
"id": 304797048,
"name": "cve-2020-16898",
"full_name": "jiansiting\/cve-2020-16898",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/cve-2020-16898",
"description": "PoC BSOD for CVE-2020-16898",
"fork": false,
"created_at": "2020-10-17T04:32:11Z",
"updated_at": "2020-10-28T03:38:27Z",
"pushed_at": "2020-10-17T04:32:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 304819444,
"name": "CVE-2020-16898_Workaround",
"full_name": "CPO-EH\/CVE-2020-16898_Workaround",
"owner": {
"login": "CPO-EH",
"id": 56457033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
"html_url": "https:\/\/github.com\/CPO-EH"
},
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Workaround",
"description": "PowerShell Script Workaround for VCE-220-16898 Vulnerability",
"fork": false,
"created_at": "2020-10-17T07:09:58Z",
"updated_at": "2020-10-21T16:45:04Z",
"pushed_at": "2020-10-21T16:45:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 304851828,
"name": "CVE-2020-16898_Checker",
"full_name": "CPO-EH\/CVE-2020-16898_Checker",
"owner": {
"login": "CPO-EH",
"id": 56457033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
"html_url": "https:\/\/github.com\/CPO-EH"
},
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Checker",
"description": "Check all Network Interfaces for CVE-2020-16898 Vulnerability",
"fork": false,
"created_at": "2020-10-17T10:23:56Z",
"updated_at": "2020-10-21T17:45:24Z",
"pushed_at": "2020-10-21T17:45:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 304888543,
"name": "CVE-2020-16898-exp",
"full_name": "momika233\/CVE-2020-16898-exp",
"owner": {
"login": "momika233",
"id": 56291820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
"html_url": "https:\/\/github.com\/momika233"
},
"html_url": "https:\/\/github.com\/momika233\/CVE-2020-16898-exp",
"description": null,
"fork": false,
"created_at": "2020-10-17T13:52:08Z",
"updated_at": "2021-01-06T08:49:01Z",
"pushed_at": "2020-10-17T13:52:38Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,
"forks": 8,
"watchers": 15,
"score": 0
},
{
"id": 305598825,
"name": "CVE-2020-16898-EXP-POC",
"full_name": "komomon\/CVE-2020-16898-EXP-POC",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898-EXP-POC",
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-20T05:24:47Z",
"updated_at": "2021-01-29T10:23:15Z",
"pushed_at": "2020-10-28T11:21:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 307994197,
"name": "CVE-2020-16898--EXP-POC",
"full_name": "komomon\/CVE-2020-16898--EXP-POC",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898--EXP-POC",
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-28T11:25:58Z",
"updated_at": "2021-03-22T03:25:52Z",
"pushed_at": "2020-10-28T11:27:17Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"forks": 6,
"watchers": 7,
"score": 0
}
]

48
2020/CVE-2020-16899.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 303511670,
"name": "CVE-2020-16899",
"full_name": "advanced-threat-research\/CVE-2020-16899",
"owner": {
"login": "advanced-threat-research",
"id": 27901279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
"html_url": "https:\/\/github.com\/advanced-threat-research"
},
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16899",
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-12T20:59:03Z",
"updated_at": "2020-11-19T21:34:47Z",
"pushed_at": "2020-10-19T13:58:46Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"forks": 6,
"watchers": 16,
"score": 0
},
{
"id": 304597619,
"name": "CVE-2020-16899",
"full_name": "bkerler\/CVE-2020-16899",
"owner": {
"login": "bkerler",
"id": 6317772,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6317772?v=4",
"html_url": "https:\/\/github.com\/bkerler"
},
"html_url": "https:\/\/github.com\/bkerler\/CVE-2020-16899",
"description": "Windows RDNSS RCE",
"fork": false,
"created_at": "2020-10-16T10:44:22Z",
"updated_at": "2020-10-16T18:38:19Z",
"pushed_at": "2020-10-16T00:15:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-16938.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 306071294,
"name": "CVE-2020-16938",
"full_name": "ioncodes\/CVE-2020-16938",
"owner": {
"login": "ioncodes",
"id": 18533297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18533297?v=4",
"html_url": "https:\/\/github.com\/ioncodes"
},
"html_url": "https:\/\/github.com\/ioncodes\/CVE-2020-16938",
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
"fork": false,
"created_at": "2020-10-21T15:38:22Z",
"updated_at": "2021-04-02T06:26:06Z",
"pushed_at": "2020-10-21T15:39:00Z",
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 37,
"forks": 37,
"watchers": 169,
"score": 0
}
]

25
2020/CVE-2020-16939.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 303857222,
"name": "CVE-2020-16939",
"full_name": "rogue-kdc\/CVE-2020-16939",
"owner": {
"login": "rogue-kdc",
"id": 49311295,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49311295?v=4",
"html_url": "https:\/\/github.com\/rogue-kdc"
},
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2020-16939",
"description": "PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation",
"fork": false,
"created_at": "2020-10-14T00:03:49Z",
"updated_at": "2021-01-29T03:13:14Z",
"pushed_at": "2020-10-27T16:42:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 7,
"forks": 7,
"watchers": 12,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 304353448,
"name": "CVE-2020-16947",
"full_name": "0neb1n\/CVE-2020-16947",
"owner": {
"login": "0neb1n",
"id": 22587350,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22587350?v=4",
"html_url": "https:\/\/github.com\/0neb1n"
},
"html_url": "https:\/\/github.com\/0neb1n\/CVE-2020-16947",
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
"fork": false,
"created_at": "2020-10-15T14:32:25Z",
"updated_at": "2021-02-07T14:56:21Z",
"pushed_at": "2020-10-20T20:09:58Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 34,
"forks": 34,
"watchers": 119,
"score": 0
},
{
"id": 314771487,
"name": "CVE-2020-16947",

25
2020/CVE-2020-17382.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 296409739,
"name": "CVE-2020-17382",
"full_name": "uf0o\/CVE-2020-17382",
"owner": {
"login": "uf0o",
"id": 24236867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24236867?v=4",
"html_url": "https:\/\/github.com\/uf0o"
},
"html_url": "https:\/\/github.com\/uf0o\/CVE-2020-17382",
"description": "PoC exploits for CVE-2020-17382",
"fork": false,
"created_at": "2020-09-17T18:26:32Z",
"updated_at": "2021-03-07T01:19:33Z",
"pushed_at": "2020-10-02T18:45:43Z",
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 24,
"forks": 24,
"watchers": 106,
"score": 0
}
]

48
2020/CVE-2020-17496.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 288998463,
"name": "CVE-2020-17496",
"full_name": "ctlyz123\/CVE-2020-17496",
"owner": {
"login": "ctlyz123",
"id": 50359597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50359597?v=4",
"html_url": "https:\/\/github.com\/ctlyz123"
},
"html_url": "https:\/\/github.com\/ctlyz123\/CVE-2020-17496",
"description": null,
"fork": false,
"created_at": "2020-08-20T12:20:03Z",
"updated_at": "2020-09-07T14:06:34Z",
"pushed_at": "2020-08-20T12:24:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 292596829,
"name": "vBulletin_5.x-tab_panel-RCE",
"full_name": "ludy-dev\/vBulletin_5.x-tab_panel-RCE",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev"
},
"html_url": "https:\/\/github.com\/ludy-dev\/vBulletin_5.x-tab_panel-RCE",
"description": "(CVE-2020-17496) vBulletin 5.x Widget_tabbedcontainer_tab_panel RCE Vuln Test script",
"fork": false,
"created_at": "2020-09-03T14:41:29Z",
"updated_at": "2020-11-07T13:03:43Z",
"pushed_at": "2020-11-07T13:03:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}
]

25
2020/CVE-2020-1764.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277557089,
"name": "cve-2020-1764-poc",
"full_name": "jpts\/cve-2020-1764-poc",
"owner": {
"login": "jpts",
"id": 5352661,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5352661?v=4",
"html_url": "https:\/\/github.com\/jpts"
},
"html_url": "https:\/\/github.com\/jpts\/cve-2020-1764-poc",
"description": "Auth Bypass PoC for Kiali",
"fork": false,
"created_at": "2020-07-06T13:59:52Z",
"updated_at": "2020-09-21T13:51:22Z",
"pushed_at": "2020-07-06T14:02:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -482,6 +482,29 @@
"watchers": 1,
"score": 0
},
{
"id": 280544880,
"name": "ghostcatch",
"full_name": "MateoSec\/ghostcatch",
"owner": {
"login": "MateoSec",
"id": 68019458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68019458?v=4",
"html_url": "https:\/\/github.com\/MateoSec"
},
"html_url": "https:\/\/github.com\/MateoSec\/ghostcatch",
"description": "Disables AJP connectors to remediate CVE-2020-1938!",
"fork": false,
"created_at": "2020-07-17T23:34:47Z",
"updated_at": "2020-07-18T00:06:32Z",
"pushed_at": "2020-07-18T00:06:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 312827286,
"name": "cve-2020-1938",

View file

@ -22,6 +22,52 @@
"watchers": 11,
"score": 0
},
{
"id": 277021315,
"name": "Dubbo-CVE-2020-1948",
"full_name": "txrw\/Dubbo-CVE-2020-1948",
"owner": {
"login": "txrw",
"id": 32354358,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32354358?v=4",
"html_url": "https:\/\/github.com\/txrw"
},
"html_url": "https:\/\/github.com\/txrw\/Dubbo-CVE-2020-1948",
"description": "Apache Dubbo CVE-2020-1948 漏洞测试环境,亲测可用。",
"fork": false,
"created_at": "2020-07-04T02:06:28Z",
"updated_at": "2021-01-10T06:10:22Z",
"pushed_at": "2020-07-03T02:46:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 278242568,
"name": "cve-2020-1948-poc",
"full_name": "M3g4Byt3\/cve-2020-1948-poc",
"owner": {
"login": "M3g4Byt3",
"id": 25048908,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25048908?v=4",
"html_url": "https:\/\/github.com\/M3g4Byt3"
},
"html_url": "https:\/\/github.com\/M3g4Byt3\/cve-2020-1948-poc",
"description": null,
"fork": false,
"created_at": "2020-07-09T02:27:54Z",
"updated_at": "2020-09-02T09:32:18Z",
"pushed_at": "2020-07-02T10:03:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 279463521,
"name": "Dubbo-deserialization",

25
2020/CVE-2020-2034.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 286057021,
"name": "CVE-2020-2034-POC",
"full_name": "blackhatethicalhacking\/CVE-2020-2034-POC",
"owner": {
"login": "blackhatethicalhacking",
"id": 13942386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13942386?v=4",
"html_url": "https:\/\/github.com\/blackhatethicalhacking"
},
"html_url": "https:\/\/github.com\/blackhatethicalhacking\/CVE-2020-2034-POC",
"description": "Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal",
"fork": false,
"created_at": "2020-08-08T14:19:44Z",
"updated_at": "2021-01-03T06:31:44Z",
"pushed_at": "2020-08-14T09:24:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 5,
"forks": 5,
"watchers": 2,
"score": 0
}
]

25
2020/CVE-2020-24028.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291787379,
"name": "CVE-2020-24028",
"full_name": "underprotection\/CVE-2020-24028",
"owner": {
"login": "underprotection",
"id": 60452208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452208?v=4",
"html_url": "https:\/\/github.com\/underprotection"
},
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24028",
"description": null,
"fork": false,
"created_at": "2020-08-31T18:00:21Z",
"updated_at": "2020-08-31T18:24:01Z",
"pushed_at": "2020-08-31T18:23:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-24029.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291793224,
"name": "CVE-2020-24029",
"full_name": "underprotection\/CVE-2020-24029",
"owner": {
"login": "underprotection",
"id": 60452208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452208?v=4",
"html_url": "https:\/\/github.com\/underprotection"
},
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24029",
"description": null,
"fork": false,
"created_at": "2020-08-31T18:26:05Z",
"updated_at": "2020-08-31T18:46:30Z",
"pushed_at": "2020-08-31T18:46:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-24030.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291795866,
"name": "CVE-2020-24030",
"full_name": "underprotection\/CVE-2020-24030",
"owner": {
"login": "underprotection",
"id": 60452208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452208?v=4",
"html_url": "https:\/\/github.com\/underprotection"
},
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24030",
"description": null,
"fork": false,
"created_at": "2020-08-31T18:38:58Z",
"updated_at": "2020-08-31T18:46:09Z",
"pushed_at": "2020-08-31T18:46:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-24616.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 292535943,
"name": "cve-2020-24616-poc",
"full_name": "0xkami\/cve-2020-24616-poc",
"owner": {
"login": "0xkami",
"id": 19571618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
"html_url": "https:\/\/github.com\/0xkami"
},
"html_url": "https:\/\/github.com\/0xkami\/cve-2020-24616-poc",
"description": "cve-2020-24616 poc",
"fork": false,
"created_at": "2020-09-03T10:18:39Z",
"updated_at": "2020-09-13T13:31:03Z",
"pushed_at": "2020-09-07T06:22:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-24765.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277878269,
"name": "CVE-2020-24765",
"full_name": "trump88\/CVE-2020-24765",
"owner": {
"login": "trump88",
"id": 67972622,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67972622?v=4",
"html_url": "https:\/\/github.com\/trump88"
},
"html_url": "https:\/\/github.com\/trump88\/CVE-2020-24765",
"description": null,
"fork": false,
"created_at": "2020-07-07T17:15:57Z",
"updated_at": "2020-10-08T13:03:10Z",
"pushed_at": "2020-10-08T13:03:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-24955.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 292162147,
"name": "CVE-2020-24955",
"full_name": "b1nary0x1\/CVE-2020-24955",
"owner": {
"login": "b1nary0x1",
"id": 68638314,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68638314?v=4",
"html_url": "https:\/\/github.com\/b1nary0x1"
},
"html_url": "https:\/\/github.com\/b1nary0x1\/CVE-2020-24955",
"description": "SUPERAntiSyware Professional X Trial <= 10.0.1206 Local Privilege Escalation",
"fork": false,
"created_at": "2020-09-02T02:48:36Z",
"updated_at": "2020-09-02T03:01:10Z",
"pushed_at": "2020-09-02T03:00:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-25068.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 292313004,
"name": "CVE-2020-25068",
"full_name": "bryanroma\/CVE-2020-25068",
"owner": {
"login": "bryanroma",
"id": 16670696,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16670696?v=4",
"html_url": "https:\/\/github.com\/bryanroma"
},
"html_url": "https:\/\/github.com\/bryanroma\/CVE-2020-25068",
"description": "Python script to exploit CVE-2020-25068. ",
"fork": false,
"created_at": "2020-09-02T14:53:57Z",
"updated_at": "2020-09-10T06:05:05Z",
"pushed_at": "2020-09-03T13:28:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-25200.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 293369835,
"name": "pritunl-CVE-2020-25200",
"full_name": "lukaszstu\/pritunl-CVE-2020-25200",
"owner": {
"login": "lukaszstu",
"id": 70864053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70864053?v=4",
"html_url": "https:\/\/github.com\/lukaszstu"
},
"html_url": "https:\/\/github.com\/lukaszstu\/pritunl-CVE-2020-25200",
"description": "pritunl-CVE-2020-25200",
"fork": false,
"created_at": "2020-09-06T22:11:24Z",
"updated_at": "2021-03-03T17:07:50Z",
"pushed_at": "2020-09-08T05:48:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 302958732,
"name": "wp-file-manager-CVE-2020-25213",
"full_name": "mansoorr123\/wp-file-manager-CVE-2020-25213",
"owner": {
"login": "mansoorr123",
"id": 54185552,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54185552?v=4",
"html_url": "https:\/\/github.com\/mansoorr123"
},
"html_url": "https:\/\/github.com\/mansoorr123\/wp-file-manager-CVE-2020-25213",
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2021-04-07T04:47:04Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 13,
"forks": 13,
"watchers": 34,
"score": 0
},
{
"id": 312602621,
"name": "WPKiller",

25
2020/CVE-2020-25270.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 297838971,
"name": "CVE-2020-25270",
"full_name": "Ko-kn3t\/CVE-2020-25270",
"owner": {
"login": "Ko-kn3t",
"id": 57166441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
"html_url": "https:\/\/github.com\/Ko-kn3t"
},
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25270",
"description": "PHPGurukul hostel-management-system 2.1 allows XSS via Guardian Name, Guardian Relation, Guardian Contact no, Address, City",
"fork": false,
"created_at": "2020-09-23T03:16:08Z",
"updated_at": "2020-09-27T13:34:18Z",
"pushed_at": "2020-09-23T03:22:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-25271.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 297840535,
"name": "CVE-2020-25271",
"full_name": "Ko-kn3t\/CVE-2020-25271",
"owner": {
"login": "Ko-kn3t",
"id": 57166441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
"html_url": "https:\/\/github.com\/Ko-kn3t"
},
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25271",
"description": null,
"fork": false,
"created_at": "2020-09-23T03:24:20Z",
"updated_at": "2020-09-23T03:49:17Z",
"pushed_at": "2020-09-23T03:49:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-25272.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 297850617,
"name": "CVE-2020-25272",
"full_name": "Ko-kn3t\/CVE-2020-25272",
"owner": {
"login": "Ko-kn3t",
"id": 57166441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
"html_url": "https:\/\/github.com\/Ko-kn3t"
},
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25272",
"description": "Online Bus Booking System 1.0,there is XSS through the name parameter in book_now.php",
"fork": false,
"created_at": "2020-09-23T04:20:16Z",
"updated_at": "2020-09-27T13:37:22Z",
"pushed_at": "2020-09-23T04:28:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-25273.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 297852230,
"name": "CVE-2020-25273",
"full_name": "Ko-kn3t\/CVE-2020-25273",
"owner": {
"login": "Ko-kn3t",
"id": 57166441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
"html_url": "https:\/\/github.com\/Ko-kn3t"
},
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25273",
"description": "Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.",
"fork": false,
"created_at": "2020-09-23T04:29:29Z",
"updated_at": "2020-09-26T16:07:01Z",
"pushed_at": "2020-09-26T03:43:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-25398.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 279259540,
"name": "CVE-2020-25398",
"full_name": "h3llraiser\/CVE-2020-25398",
"owner": {
"login": "h3llraiser",
"id": 52741391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52741391?v=4",
"html_url": "https:\/\/github.com\/h3llraiser"
},
"html_url": "https:\/\/github.com\/h3llraiser\/CVE-2020-25398",
"description": "CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv export functionality.",
"fork": false,
"created_at": "2020-07-13T09:37:11Z",
"updated_at": "2020-11-05T15:00:19Z",
"pushed_at": "2020-11-05T10:17:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-25399.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 279259641,
"name": "CVE-2020-25399",
"full_name": "h3llraiser\/CVE-2020-25399",
"owner": {
"login": "h3llraiser",
"id": 52741391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52741391?v=4",
"html_url": "https:\/\/github.com\/h3llraiser"
},
"html_url": "https:\/\/github.com\/h3llraiser\/CVE-2020-25399",
"description": "Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack another user's session by sending a malicious file in the chat.",
"fork": false,
"created_at": "2020-07-13T09:37:38Z",
"updated_at": "2020-11-05T15:00:40Z",
"pushed_at": "2020-11-05T10:43:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-25487.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 297710280,
"name": "CVE-2020-25487",
"full_name": "Ko-kn3t\/CVE-2020-25487",
"owner": {
"login": "Ko-kn3t",
"id": 57166441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
"html_url": "https:\/\/github.com\/Ko-kn3t"
},
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25487",
"description": "SQL injection Vulnerability in Zoo Management System",
"fork": false,
"created_at": "2020-09-22T16:37:46Z",
"updated_at": "2020-09-23T09:31:19Z",
"pushed_at": "2020-09-22T16:41:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-25488.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 297708009,
"name": "CVE-2020-25488",
"full_name": "Ko-kn3t\/CVE-2020-25488",
"owner": {
"login": "Ko-kn3t",
"id": 57166441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4",
"html_url": "https:\/\/github.com\/Ko-kn3t"
},
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25488",
"description": "Login Bypass in Zoo Management System V1.0",
"fork": false,
"created_at": "2020-09-22T16:28:34Z",
"updated_at": "2020-09-22T17:06:49Z",
"pushed_at": "2020-09-22T17:06:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

Some files were not shown because too many files have changed in this diff Show more