mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2020/07/15 00:08:41
This commit is contained in:
parent
c69a12f0e5
commit
38402fa78c
25 changed files with 148 additions and 119 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2020-07-14T06:16:24Z",
|
||||
"updated_at": "2020-07-14T09:19:56Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 281,
|
||||
"watchers": 282,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2020-07-14T06:16:24Z",
|
||||
"updated_at": "2020-07-14T09:19:56Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 281,
|
||||
"watchers": 282,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -519,13 +519,13 @@
|
|||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-25T03:07:53Z",
|
||||
"updated_at": "2020-06-27T15:46:05Z",
|
||||
"updated_at": "2020-07-14T15:00:14Z",
|
||||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2017-11882 exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-22T01:11:39Z",
|
||||
"updated_at": "2020-06-19T07:56:14Z",
|
||||
"updated_at": "2020-07-14T09:19:15Z",
|
||||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Javascript Web-Kit exploit. CVE-2017-7061. By Lokihardt from Google Project Zero",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-22T21:14:30Z",
|
||||
"updated_at": "2019-08-21T04:38:54Z",
|
||||
"updated_at": "2020-07-14T10:02:28Z",
|
||||
"pushed_at": "2018-01-22T21:29:22Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "iis6 exploit 2017 CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-05T23:21:12Z",
|
||||
"updated_at": "2020-06-23T06:57:30Z",
|
||||
"updated_at": "2020-07-14T09:43:21Z",
|
||||
"pushed_at": "2017-04-05T23:29:03Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC CVE-2018-14714",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-25T03:43:44Z",
|
||||
"updated_at": "2020-05-18T07:50:07Z",
|
||||
"updated_at": "2020-07-14T09:53:13Z",
|
||||
"pushed_at": "2020-04-26T09:57:34Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -117,14 +117,14 @@
|
|||
{
|
||||
"id": 188679903,
|
||||
"name": "mikrotik-beast",
|
||||
"full_name": "krnull\/mikrotik-beast",
|
||||
"full_name": "mahmoodsabir\/mikrotik-beast",
|
||||
"owner": {
|
||||
"login": "krnull",
|
||||
"login": "mahmoodsabir",
|
||||
"id": 47719250,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/47719250?v=4",
|
||||
"html_url": "https:\/\/github.com\/krnull"
|
||||
"html_url": "https:\/\/github.com\/mahmoodsabir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/krnull\/mikrotik-beast",
|
||||
"html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
|
||||
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-26T12:26:55Z",
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "可以直接反弹shell",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-26T07:16:38Z",
|
||||
"updated_at": "2020-04-01T13:35:05Z",
|
||||
"updated_at": "2020-07-14T11:09:54Z",
|
||||
"pushed_at": "2018-07-26T07:50:15Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -362,8 +362,8 @@
|
|||
"pushed_at": "2019-04-08T08:58:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC helper scripts and Dockerfile for CVE-2019-1002101",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-03T16:36:58Z",
|
||||
"updated_at": "2020-03-29T07:07:14Z",
|
||||
"updated_at": "2020-07-14T14:11:03Z",
|
||||
"pushed_at": "2019-04-03T17:35:03Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2019-11931",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-16T11:06:52Z",
|
||||
"updated_at": "2020-07-07T12:15:06Z",
|
||||
"updated_at": "2020-07-14T09:22:51Z",
|
||||
"pushed_at": "2019-11-16T11:15:06Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-07-14T09:08:17Z",
|
||||
"pushed_at": "2020-07-08T10:09:00Z",
|
||||
"stargazers_count": 1247,
|
||||
"watchers_count": 1247,
|
||||
"updated_at": "2020-07-14T14:19:43Z",
|
||||
"pushed_at": "2020-07-14T10:20:14Z",
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 316,
|
||||
"forks": 316,
|
||||
"watchers": 1247,
|
||||
"watchers": 1248,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-25T03:07:53Z",
|
||||
"updated_at": "2020-06-27T15:46:05Z",
|
||||
"updated_at": "2020-07-14T15:00:14Z",
|
||||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-19T15:38:01Z",
|
||||
"updated_at": "2020-04-13T06:13:20Z",
|
||||
"updated_at": "2020-07-14T14:10:58Z",
|
||||
"pushed_at": "2019-03-21T17:26:06Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-07-14T08:41:22Z",
|
||||
"updated_at": "2020-07-14T10:29:42Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 367,
|
||||
"watchers_count": 367,
|
||||
"stargazers_count": 368,
|
||||
"watchers_count": 368,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 367,
|
||||
"watchers": 368,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-07-03T07:20:03Z",
|
||||
"updated_at": "2020-07-14T09:25:31Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T21:00:15Z",
|
||||
"updated_at": "2020-07-10T00:15:28Z",
|
||||
"updated_at": "2020-07-14T09:25:48Z",
|
||||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Use shell to build weblogic debug environment for CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T10:47:35Z",
|
||||
"updated_at": "2020-06-30T09:48:58Z",
|
||||
"updated_at": "2020-07-14T11:03:55Z",
|
||||
"pushed_at": "2020-04-06T10:59:36Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T18:59:26Z",
|
||||
"updated_at": "2020-06-15T10:52:05Z",
|
||||
"updated_at": "2020-07-14T09:53:12Z",
|
||||
"pushed_at": "2020-05-25T08:33:24Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-07-14T09:08:17Z",
|
||||
"pushed_at": "2020-07-08T10:09:00Z",
|
||||
"stargazers_count": 1247,
|
||||
"watchers_count": 1247,
|
||||
"updated_at": "2020-07-14T14:19:43Z",
|
||||
"pushed_at": "2020-07-14T10:20:14Z",
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 316,
|
||||
"forks": 316,
|
||||
"watchers": 1247,
|
||||
"watchers": 1248,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T06:19:09Z",
|
||||
"updated_at": "2020-07-12T00:57:57Z",
|
||||
"updated_at": "2020-07-14T10:33:25Z",
|
||||
"pushed_at": "2020-07-07T07:19:16Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2020-07-14T03:53:28Z",
|
||||
"pushed_at": "2020-07-07T09:36:24Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"updated_at": "2020-07-14T14:02:05Z",
|
||||
"pushed_at": "2020-07-14T14:02:02Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 277,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -979,13 +979,13 @@
|
|||
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T15:33:00Z",
|
||||
"updated_at": "2020-07-13T09:22:55Z",
|
||||
"updated_at": "2020-07-14T09:10:41Z",
|
||||
"pushed_at": "2020-07-12T10:36:20Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Citrix ADC Vulns",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T20:00:17Z",
|
||||
"updated_at": "2020-07-14T07:58:34Z",
|
||||
"updated_at": "2020-07-14T10:46:27Z",
|
||||
"pushed_at": "2020-07-10T21:03:20Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -45,6 +45,29 @@
|
|||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279071796,
|
||||
"name": "citrix_adc_netscaler_lfi",
|
||||
"full_name": "Zeop-CyberSec\/citrix_adc_netscaler_lfi",
|
||||
"owner": {
|
||||
"login": "Zeop-CyberSec",
|
||||
"id": 68154603,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/68154603?v=4",
|
||||
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/citrix_adc_netscaler_lfi",
|
||||
"description": "This Metasploit-Framework module can be use to help companies to check the last Citrix vulnerability CVE-2020-8193, CVE-2020-8195 and CVE-2020-8196 (disclosed July 08, 2020).",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-12T13:37:53Z",
|
||||
"updated_at": "2020-07-14T15:00:38Z",
|
||||
"pushed_at": "2020-07-14T14:56:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279272932,
|
||||
"name": "CVE-2020-8193-Citrix-Scanner",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-8617 (BIND)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T12:26:45Z",
|
||||
"updated_at": "2020-06-29T16:28:03Z",
|
||||
"updated_at": "2020-07-14T09:53:09Z",
|
||||
"pushed_at": "2020-05-20T13:03:50Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-8835 Exploit\/PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-06T01:53:36Z",
|
||||
"updated_at": "2020-06-30T20:51:18Z",
|
||||
"updated_at": "2020-07-14T09:22:03Z",
|
||||
"pushed_at": "2020-06-30T20:51:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T15:51:14Z",
|
||||
"updated_at": "2020-07-14T02:21:33Z",
|
||||
"updated_at": "2020-07-14T09:45:02Z",
|
||||
"pushed_at": "2020-07-04T16:40:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -449,6 +449,11 @@ In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's we
|
|||
- [HexChristmas/CVE-2020-1947](https://github.com/HexChristmas/CVE-2020-1947)
|
||||
|
||||
### CVE-2020-1948
|
||||
|
||||
<code>
|
||||
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
|
||||
</code>
|
||||
|
||||
- [ctlyz123/CVE-2020-1948](https://github.com/ctlyz123/CVE-2020-1948)
|
||||
- [DSO-Lab/Dubbo-CVE-2020-1948](https://github.com/DSO-Lab/Dubbo-CVE-2020-1948)
|
||||
- [askDing/cve-2020-1948-poc](https://github.com/askDing/cve-2020-1948-poc)
|
||||
|
@ -878,6 +883,7 @@ Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58
|
|||
|
||||
- [jas502n/CVE-2020-8193](https://github.com/jas502n/CVE-2020-8193)
|
||||
- [Airboi/Citrix-ADC-RCE-CVE-2020-8193](https://github.com/Airboi/Citrix-ADC-RCE-CVE-2020-8193)
|
||||
- [Zeop-CyberSec/citrix_adc_netscaler_lfi](https://github.com/Zeop-CyberSec/citrix_adc_netscaler_lfi)
|
||||
- [PR3R00T/CVE-2020-8193-Citrix-Scanner](https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner)
|
||||
|
||||
### CVE-2020-8417
|
||||
|
@ -7022,7 +7028,7 @@ MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read a
|
|||
- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot)
|
||||
- [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847)
|
||||
- [th3f3n1x87/winboxPOC](https://github.com/th3f3n1x87/winboxPOC)
|
||||
- [krnull/mikrotik-beast](https://github.com/krnull/mikrotik-beast)
|
||||
- [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast)
|
||||
- [sinichi449/Python-MikrotikLoginExploit](https://github.com/sinichi449/Python-MikrotikLoginExploit)
|
||||
- [yukar1z0e/CVE-2018-14847](https://github.com/yukar1z0e/CVE-2018-14847)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue