Auto Update 2021/02/24 00:09:11

This commit is contained in:
motikan2010-bot 2021-02-24 00:09:11 +09:00
parent 3bae5955cd
commit 2e37e1ad27
22 changed files with 117 additions and 108 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-23T07:47:34Z", "updated_at": "2021-02-23T10:06:38Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 922, "stargazers_count": 923,
"watchers_count": 922, "watchers_count": 923,
"forks_count": 217, "forks_count": 217,
"forks": 217, "forks": 217,
"watchers": 922, "watchers": 923,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-23T07:47:34Z", "updated_at": "2021-02-23T10:06:38Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 922, "stargazers_count": 923,
"watchers_count": 922, "watchers_count": 923,
"forks_count": 217, "forks_count": 217,
"forks": 217, "forks": 217,
"watchers": 922, "watchers": 923,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-23T07:47:34Z", "updated_at": "2021-02-23T10:06:38Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 922, "stargazers_count": 923,
"watchers_count": 922, "watchers_count": 923,
"forks_count": 217, "forks_count": 217,
"forks": 217, "forks": 217,
"watchers": 922, "watchers": 923,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-13379", "description": "CVE-2018-13379",
"fork": false, "fork": false,
"created_at": "2019-08-11T09:44:37Z", "created_at": "2019-08-11T09:44:37Z",
"updated_at": "2021-02-15T18:45:54Z", "updated_at": "2021-02-23T11:19:14Z",
"pushed_at": "2019-08-14T08:40:25Z", "pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 219, "stargazers_count": 220,
"watchers_count": 219, "watchers_count": 220,
"forks_count": 80, "forks_count": 80,
"forks": 80, "forks": 80,
"watchers": 219, "watchers": 220,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Tool for CVE-2018-16323", "description": "Tool for CVE-2018-16323",
"fork": false, "fork": false,
"created_at": "2018-11-18T15:30:46Z", "created_at": "2018-11-18T15:30:46Z",
"updated_at": "2020-02-12T14:15:20Z", "updated_at": "2021-02-23T11:06:19Z",
"pushed_at": "2019-01-17T21:01:56Z", "pushed_at": "2019-01-17T21:01:56Z",
"stargazers_count": 76, "stargazers_count": 77,
"watchers_count": 76, "watchers_count": 77,
"forks_count": 9, "forks_count": 9,
"forks": 9, "forks": 9,
"watchers": 76, "watchers": 77,
"score": 0 "score": 0
} }
] ]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-23T07:47:34Z", "updated_at": "2021-02-23T10:06:38Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 922, "stargazers_count": 923,
"watchers_count": 922, "watchers_count": 923,
"forks_count": 217, "forks_count": 217,
"forks": 217, "forks": 217,
"watchers": 922, "watchers": 923,
"score": 0 "score": 0
}, },
{ {

View file

@ -473,8 +473,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-10-18T14:01:59Z", "created_at": "2020-10-18T14:01:59Z",
"updated_at": "2021-02-21T22:54:13Z", "updated_at": "2021-02-23T10:16:09Z",
"pushed_at": "2021-02-21T22:54:11Z", "pushed_at": "2021-02-23T10:16:07Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-6574 POC : golang 'go get' remote command execution during source code build", "description": "CVE-2018-6574 POC : golang 'go get' remote command execution during source code build",
"fork": false, "fork": false,
"created_at": "2018-04-24T03:44:20Z", "created_at": "2018-04-24T03:44:20Z",
"updated_at": "2020-11-01T09:29:29Z", "updated_at": "2021-02-23T14:56:16Z",
"pushed_at": "2018-04-24T16:32:22Z", "pushed_at": "2018-04-24T16:32:22Z",
"stargazers_count": 22, "stargazers_count": 21,
"watchers_count": 22, "watchers_count": 21,
"forks_count": 13, "forks_count": 13,
"forks": 13, "forks": 13,
"watchers": 22, "watchers": 21,
"score": 0 "score": 0
}, },
{ {

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持", "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false, "fork": false,
"created_at": "2019-06-21T09:22:43Z", "created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-02-18T06:16:40Z", "updated_at": "2021-02-23T09:25:18Z",
"pushed_at": "2020-04-26T10:49:25Z", "pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 719, "stargazers_count": 720,
"watchers_count": 719, "watchers_count": 720,
"forks_count": 150, "forks_count": 150,
"forks": 150, "forks": 150,
"watchers": 719, "watchers": 720,
"score": 0 "score": 0
}, },
{ {
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-23T07:47:34Z", "updated_at": "2021-02-23T10:06:38Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 922, "stargazers_count": 923,
"watchers_count": 922, "watchers_count": 923,
"forks_count": 217, "forks_count": 217,
"forks": 217, "forks": 217,
"watchers": 922, "watchers": 923,
"score": 0 "score": 0
} }
] ]

25
2020/CVE-2020-0082.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 341573053,
"name": "CVE-2020-0082-ExternalVibration",
"full_name": "0x742\/CVE-2020-0082-ExternalVibration",
"owner": {
"login": "0x742",
"id": 66528191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66528191?v=4",
"html_url": "https:\/\/github.com\/0x742"
},
"html_url": "https:\/\/github.com\/0x742\/CVE-2020-0082-ExternalVibration",
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
"fork": false,
"created_at": "2021-02-23T14:00:55Z",
"updated_at": "2021-02-23T14:33:49Z",
"pushed_at": "2021-02-23T14:03:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-11T07:38:22Z", "pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 503, "stargazers_count": 503,
"watchers_count": 503, "watchers_count": 503,
"forks_count": 122, "forks_count": 123,
"forks": 122, "forks": 123,
"watchers": 503, "watchers": 503,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472", "description": "Test tool for CVE-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-08T08:58:37Z", "created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-02-23T06:36:46Z", "updated_at": "2021-02-23T10:26:17Z",
"pushed_at": "2020-10-21T12:10:28Z", "pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1245, "stargazers_count": 1246,
"watchers_count": 1245, "watchers_count": 1246,
"forks_count": 289, "forks_count": 289,
"forks": 289, "forks": 289,
"watchers": 1245, "watchers": 1246,
"score": 0 "score": 0
}, },
{ {
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-02-23T04:25:11Z", "updated_at": "2021-02-23T13:31:12Z",
"pushed_at": "2020-10-15T18:31:15Z", "pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 286, "stargazers_count": 287,
"watchers_count": 286, "watchers_count": 287,
"forks_count": 94, "forks_count": 94,
"forks": 94, "forks": 94,
"watchers": 286, "watchers": 287,
"score": 0 "score": 0
}, },
{ {

View file

@ -91,29 +91,6 @@
"watchers": 208, "watchers": 208,
"score": 0 "score": 0
}, },
{
"id": 242038197,
"name": "CVE-2020-1938",
"full_name": "laolisafe\/CVE-2020-1938",
"owner": {
"login": "laolisafe",
"id": 45027935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45027935?v=4",
"html_url": "https:\/\/github.com\/laolisafe"
},
"html_url": "https:\/\/github.com\/laolisafe\/CVE-2020-1938",
"description": "CVE-2020-1938漏洞复现",
"fork": false,
"created_at": "2020-02-21T02:36:37Z",
"updated_at": "2020-10-18T13:38:55Z",
"pushed_at": "2020-02-21T02:49:57Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 10,
"forks": 10,
"watchers": 35,
"score": 0
},
{ {
"id": 242054816, "id": 242054816,
"name": "CVE-2020-1938", "name": "CVE-2020-1938",

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-12T09:57:28Z", "pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 30, "stargazers_count": 30,
"watchers_count": 30, "watchers_count": 30,
"forks_count": 11, "forks_count": 12,
"forks": 11, "forks": 12,
"watchers": 30, "watchers": 30,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-23T07:47:34Z", "updated_at": "2021-02-23T10:06:38Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 922, "stargazers_count": 923,
"watchers_count": 922, "watchers_count": 923,
"forks_count": 217, "forks_count": 217,
"forks": 217, "forks": 217,
"watchers": 922, "watchers": 923,
"score": 0 "score": 0
}, },
{ {

View file

@ -25,14 +25,14 @@
{ {
"id": 256080140, "id": 256080140,
"name": "CVE-2020-3952", "name": "CVE-2020-3952",
"full_name": "frustreated\/CVE-2020-3952", "full_name": "avboy1337\/CVE-2020-3952",
"owner": { "owner": {
"login": "frustreated", "login": "avboy1337",
"id": 5463104, "id": 5463104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
"html_url": "https:\/\/github.com\/frustreated" "html_url": "https:\/\/github.com\/avboy1337"
}, },
"html_url": "https:\/\/github.com\/frustreated\/CVE-2020-3952", "html_url": "https:\/\/github.com\/avboy1337\/CVE-2020-3952",
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell", "description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
"fork": false, "fork": false,
"created_at": "2020-04-16T01:39:33Z", "created_at": "2020-04-16T01:39:33Z",

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-29T17:20:12Z", "pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 156, "stargazers_count": 156,
"watchers_count": 156, "watchers_count": 156,
"forks_count": 51, "forks_count": 52,
"forks": 51, "forks": 52,
"watchers": 156, "watchers": 156,
"score": 0 "score": 0
}, },

View file

@ -82,13 +82,13 @@
"description": "Scanning for CVE-2020-8193 - Auth Bypass check", "description": "Scanning for CVE-2020-8193 - Auth Bypass check",
"fork": false, "fork": false,
"created_at": "2020-07-13T10:36:43Z", "created_at": "2020-07-13T10:36:43Z",
"updated_at": "2020-11-24T17:20:22Z", "updated_at": "2021-02-23T14:47:52Z",
"pushed_at": "2020-07-13T11:01:47Z", "pushed_at": "2020-07-13T11:01:47Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"forks_count": 1, "forks_count": 1,
"forks": 1, "forks": 1,
"watchers": 4, "watchers": 5,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-02-16T16:55:46Z", "created_at": "2021-02-16T16:55:46Z",
"updated_at": "2021-02-23T04:48:46Z", "updated_at": "2021-02-23T11:49:39Z",
"pushed_at": "2021-02-16T16:59:09Z", "pushed_at": "2021-02-16T16:59:09Z",
"stargazers_count": 14, "stargazers_count": 15,
"watchers_count": 14, "watchers_count": 15,
"forks_count": 9, "forks_count": 9,
"forks": 9, "forks": 9,
"watchers": 14, "watchers": 15,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2021-3129", "description": "Exploit for CVE-2021-3129",
"fork": false, "fork": false,
"created_at": "2021-01-13T12:52:20Z", "created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-02-23T09:07:40Z", "updated_at": "2021-02-23T10:28:45Z",
"pushed_at": "2021-01-29T13:59:07Z", "pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 59, "stargazers_count": 62,
"watchers_count": 59, "watchers_count": 62,
"forks_count": 10, "forks_count": 10,
"forks": 10, "forks": 10,
"watchers": 59, "watchers": 62,
"score": 0 "score": 0
}, },
{ {

View file

@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)", "description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false, "fork": false,
"created_at": "2021-01-30T03:22:04Z", "created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-02-22T21:10:21Z", "updated_at": "2021-02-23T14:15:35Z",
"pushed_at": "2021-02-08T03:42:50Z", "pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 350, "stargazers_count": 353,
"watchers_count": 350, "watchers_count": 353,
"forks_count": 92, "forks_count": 93,
"forks": 92, "forks": 93,
"watchers": 350, "watchers": 353,
"score": 0 "score": 0
}, },
{ {
@ -381,13 +381,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-01-30T20:39:58Z", "created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-02-23T07:05:43Z", "updated_at": "2021-02-23T13:57:43Z",
"pushed_at": "2021-02-02T17:07:09Z", "pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 606, "stargazers_count": 608,
"watchers_count": 606, "watchers_count": 608,
"forks_count": 171, "forks_count": 171,
"forks": 171, "forks": 171,
"watchers": 606, "watchers": 608,
"score": 0 "score": 0
}, },
{ {
@ -634,7 +634,7 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-02-03T11:27:52Z", "created_at": "2021-02-03T11:27:52Z",
"updated_at": "2021-02-04T06:16:27Z", "updated_at": "2021-02-23T13:57:30Z",
"pushed_at": "2021-02-04T06:12:23Z", "pushed_at": "2021-02-04T06:12:23Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -316,6 +316,14 @@ In the ioctl handlers of the Mediatek Command Queue driver, there is a possible
- [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069) - [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069)
- [quarkslab/CVE-2020-0069_poc](https://github.com/quarkslab/CVE-2020-0069_poc) - [quarkslab/CVE-2020-0069_poc](https://github.com/quarkslab/CVE-2020-0069_poc)
### CVE-2020-0082 (2020-04-17)
<code>
In ExternalVibration of ExternalVibration.java, there is a possible activation of an arbitrary intent due to unsafe deserialization. This could lead to local escalation of privilege to system_server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140417434
</code>
- [0x742/CVE-2020-0082-ExternalVibration](https://github.com/0x742/CVE-2020-0082-ExternalVibration)
### CVE-2020-0096 (2020-05-14) ### CVE-2020-0096 (2020-05-14)
<code> <code>
@ -847,7 +855,6 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [xindongzhuaizhuai/CVE-2020-1938](https://github.com/xindongzhuaizhuai/CVE-2020-1938) - [xindongzhuaizhuai/CVE-2020-1938](https://github.com/xindongzhuaizhuai/CVE-2020-1938)
- [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC) - [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC)
- [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner) - [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner)
- [laolisafe/CVE-2020-1938](https://github.com/laolisafe/CVE-2020-1938)
- [DaemonShao/CVE-2020-1938](https://github.com/DaemonShao/CVE-2020-1938) - [DaemonShao/CVE-2020-1938](https://github.com/DaemonShao/CVE-2020-1938)
- [sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read](https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read) - [sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read](https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read)
- [fairyming/CVE-2020-1938](https://github.com/fairyming/CVE-2020-1938) - [fairyming/CVE-2020-1938](https://github.com/fairyming/CVE-2020-1938)
@ -1056,7 +1063,7 @@ Under certain conditions, vmdir that ships with VMware vCenter Server, as part o
</code> </code>
- [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952) - [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952)
- [frustreated/CVE-2020-3952](https://github.com/frustreated/CVE-2020-3952) - [avboy1337/CVE-2020-3952](https://github.com/avboy1337/CVE-2020-3952)
- [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952) - [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952)
- [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952) - [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952)
- [Fa1c0n35/vmware_vcenter_cve_2020_3952](https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952) - [Fa1c0n35/vmware_vcenter_cve_2020_3952](https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952)