mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/06/03 12:09:00
This commit is contained in:
parent
7b63bade94
commit
40c7579baa
23 changed files with 171 additions and 114 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2020-05-30T19:53:22Z",
|
||||
"updated_at": "2020-06-03T00:38:16Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 261,
|
||||
"watchers": 260,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2015-7547",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-10T21:13:54Z",
|
||||
"updated_at": "2020-03-27T04:40:03Z",
|
||||
"updated_at": "2020-06-03T00:35:39Z",
|
||||
"pushed_at": "2016-02-20T07:57:58Z",
|
||||
"stargazers_count": 549,
|
||||
"watchers_count": 549,
|
||||
"stargazers_count": 548,
|
||||
"watchers_count": 548,
|
||||
"forks_count": 175,
|
||||
"forks": 175,
|
||||
"watchers": 549,
|
||||
"watchers": 548,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2020-06-02T08:33:34Z",
|
||||
"updated_at": "2020-06-03T01:46:18Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 456,
|
||||
"watchers_count": 456,
|
||||
"stargazers_count": 457,
|
||||
"watchers_count": 457,
|
||||
"forks_count": 237,
|
||||
"forks": 237,
|
||||
"watchers": 456,
|
||||
"watchers": 457,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An exploit for Microsoft IIS 6.0 CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-29T05:59:30Z",
|
||||
"updated_at": "2020-06-02T01:44:01Z",
|
||||
"updated_at": "2020-06-03T02:48:00Z",
|
||||
"pushed_at": "2017-03-29T07:26:41Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2020-05-20T23:14:06Z",
|
||||
"updated_at": "2020-06-03T00:42:12Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 90,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 321,
|
||||
"forks": 321,
|
||||
"forks_count": 320,
|
||||
"forks": 320,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -228,5 +228,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 268969538,
|
||||
"name": "exim-cve-2019-10149-data",
|
||||
"full_name": "area1\/exim-cve-2019-10149-data",
|
||||
"owner": {
|
||||
"login": "area1",
|
||||
"id": 7005099,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7005099?v=4",
|
||||
"html_url": "https:\/\/github.com\/area1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/area1\/exim-cve-2019-10149-data",
|
||||
"description": "Data Collection Related to Exim CVE-2019-10149",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-03T02:27:01Z",
|
||||
"updated_at": "2020-06-03T02:38:24Z",
|
||||
"pushed_at": "2020-06-03T02:37:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2020-05-27T05:43:15Z",
|
||||
"updated_at": "2020-06-03T02:32:07Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 231,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-02T15:46:35Z",
|
||||
"updated_at": "2020-06-03T02:01:55Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 852,
|
||||
"watchers_count": 852,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 852,
|
||||
"stargazers_count": 854,
|
||||
"watchers_count": 854,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 854,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2020-06-02T17:48:48Z",
|
||||
"updated_at": "2020-06-02T21:40:01Z",
|
||||
"pushed_at": "2020-05-01T20:00:12Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 140,
|
||||
"watchers": 141,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-02-20T02:41:44Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-17T11:13:29Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,8 +82,8 @@
|
|||
"description": "Try to reproduce this issue with Docker",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T22:09:43Z",
|
||||
"updated_at": "2020-06-01T21:31:29Z",
|
||||
"pushed_at": "2020-06-01T21:31:27Z",
|
||||
"updated_at": "2020-06-02T22:00:03Z",
|
||||
"pushed_at": "2020-06-02T22:00:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-06-02T15:00:36Z",
|
||||
"updated_at": "2020-06-03T03:10:07Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"forks_count": 132,
|
||||
"forks": 132,
|
||||
"watchers": 443,
|
||||
"stargazers_count": 450,
|
||||
"watchers_count": 450,
|
||||
"forks_count": 137,
|
||||
"forks": 137,
|
||||
"watchers": 450,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -404,13 +404,13 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2020-06-02T08:43:26Z",
|
||||
"updated_at": "2020-06-03T03:08:16Z",
|
||||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 222,
|
||||
"watchers": 223,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T19:33:18Z",
|
||||
"updated_at": "2020-05-28T02:53:31Z",
|
||||
"updated_at": "2020-06-03T02:44:15Z",
|
||||
"pushed_at": "2020-03-13T07:38:43Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -933,13 +933,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-06-02T16:54:20Z",
|
||||
"updated_at": "2020-06-03T03:00:45Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 906,
|
||||
"watchers_count": 906,
|
||||
"forks_count": 280,
|
||||
"forks": 280,
|
||||
"watchers": 906,
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"forks_count": 283,
|
||||
"forks": 283,
|
||||
"watchers": 913,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -956,13 +956,13 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2020-06-02T14:36:23Z",
|
||||
"updated_at": "2020-06-03T01:15:08Z",
|
||||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 162,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 164,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1071,13 +1071,13 @@
|
|||
"description": "该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-02T12:12:03Z",
|
||||
"updated_at": "2020-05-10T02:32:36Z",
|
||||
"updated_at": "2020-06-03T03:07:59Z",
|
||||
"pushed_at": "2020-04-07T08:58:57Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 8,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1186,13 +1186,13 @@
|
|||
"description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T09:09:02Z",
|
||||
"updated_at": "2020-05-08T12:32:27Z",
|
||||
"updated_at": "2020-06-03T02:39:21Z",
|
||||
"pushed_at": "2020-04-22T01:07:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE 2020-10135 a.k.a BIAS (Bluetooth Impersonation Attack)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T07:36:37Z",
|
||||
"updated_at": "2020-06-02T13:19:12Z",
|
||||
"updated_at": "2020-06-02T22:47:17Z",
|
||||
"pushed_at": "2020-06-01T10:11:32Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T04:44:05Z",
|
||||
"updated_at": "2020-06-02T16:13:14Z",
|
||||
"updated_at": "2020-06-03T03:07:58Z",
|
||||
"pushed_at": "2020-06-01T09:04:18Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 82,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-02T15:46:35Z",
|
||||
"updated_at": "2020-06-03T02:01:55Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 852,
|
||||
"watchers_count": 852,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 852,
|
||||
"stargazers_count": 854,
|
||||
"watchers_count": 854,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 854,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A proof-of-concept for CVE-2020-12753",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T21:58:42Z",
|
||||
"updated_at": "2020-06-02T16:54:46Z",
|
||||
"updated_at": "2020-06-03T02:49:02Z",
|
||||
"pushed_at": "2020-06-01T22:55:46Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T18:26:32Z",
|
||||
"updated_at": "2020-06-02T17:54:36Z",
|
||||
"updated_at": "2020-06-03T03:05:07Z",
|
||||
"pushed_at": "2020-06-02T08:30:22Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 28,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-5410.json
Normal file
25
2020/CVE-2020-5410.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 268974025,
|
||||
"name": "config-demo",
|
||||
"full_name": "dead5nd\/config-demo",
|
||||
"owner": {
|
||||
"login": "dead5nd",
|
||||
"id": 29460919,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29460919?v=4",
|
||||
"html_url": "https:\/\/github.com\/dead5nd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dead5nd\/config-demo",
|
||||
"description": "CVE-2020-5410",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-03T02:52:09Z",
|
||||
"updated_at": "2020-06-03T02:58:48Z",
|
||||
"pushed_at": "2020-06-03T02:58:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T13:57:14Z",
|
||||
"updated_at": "2020-05-26T14:39:06Z",
|
||||
"updated_at": "2020-06-03T02:17:12Z",
|
||||
"pushed_at": "2020-02-13T12:56:31Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-08T07:39:06Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -824,6 +824,14 @@ In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.
|
|||
|
||||
- [motikan2010/CVE-2020-5398](https://github.com/motikan2010/CVE-2020-5398)
|
||||
|
||||
### CVE-2020-5410
|
||||
|
||||
<code>
|
||||
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
|
||||
</code>
|
||||
|
||||
- [dead5nd/config-demo](https://github.com/dead5nd/config-demo)
|
||||
|
||||
### CVE-2020-5509
|
||||
|
||||
<code>
|
||||
|
@ -1558,6 +1566,7 @@ A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation
|
|||
- [darsigovrustam/CVE-2019-10149](https://github.com/darsigovrustam/CVE-2019-10149)
|
||||
- [Diefunction/CVE-2019-10149](https://github.com/Diefunction/CVE-2019-10149)
|
||||
- [Dilshan-Eranda/CVE-2019-10149](https://github.com/Dilshan-Eranda/CVE-2019-10149)
|
||||
- [area1/exim-cve-2019-10149-data](https://github.com/area1/exim-cve-2019-10149-data)
|
||||
|
||||
### CVE-2019-10207
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue