mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/11/29 12:13:28
This commit is contained in:
parent
43cca42316
commit
4e88de0586
40 changed files with 281 additions and 198 deletions
|
@ -121,17 +121,17 @@
|
|||
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T04:01:56Z",
|
||||
"updated_at": "2021-10-31T01:22:55Z",
|
||||
"updated_at": "2021-11-29T10:21:51Z",
|
||||
"pushed_at": "2021-09-28T16:14:13Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 19,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 36888918,
|
||||
"name": "CVE-2013-1965",
|
||||
"full_name": "cinno\/CVE-2013-1965",
|
||||
"owner": {
|
||||
"login": "cinno",
|
||||
"id": 11706497,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11706497?v=4",
|
||||
"html_url": "https:\/\/github.com\/cinno"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cinno\/CVE-2013-1965",
|
||||
"description": "A proof of concept exploit for the CVE-2013-1965 vulnerability affecting Apache Struts 2",
|
||||
"fork": false,
|
||||
"created_at": "2015-06-04T18:47:35Z",
|
||||
"updated_at": "2016-09-22T09:01:38Z",
|
||||
"pushed_at": "2015-06-02T22:28:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -429,17 +429,17 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-11-29T02:55:38Z",
|
||||
"updated_at": "2021-11-29T06:49:17Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 307,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Hikvision camera CVE-2017-7921-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-27T11:49:40Z",
|
||||
"updated_at": "2021-11-25T19:17:21Z",
|
||||
"updated_at": "2021-11-29T07:01:28Z",
|
||||
"pushed_at": "2020-08-09T15:35:16Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "php-fpm+Nginx RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T23:26:57Z",
|
||||
"updated_at": "2021-11-24T06:41:00Z",
|
||||
"updated_at": "2021-11-29T10:56:53Z",
|
||||
"pushed_at": "2020-08-20T04:43:25Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 39,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 88,
|
||||
"forks": 40,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-11-29T02:16:53Z",
|
||||
"updated_at": "2021-11-29T06:35:54Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3011,
|
||||
"watchers_count": 3011,
|
||||
"stargazers_count": 3012,
|
||||
"watchers_count": 3012,
|
||||
"forks_count": 891,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 891,
|
||||
"watchers": 3011,
|
||||
"watchers": 3012,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-11-29T02:55:38Z",
|
||||
"updated_at": "2021-11-29T06:49:17Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 307,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -202,17 +202,17 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2021-11-26T01:12:08Z",
|
||||
"updated_at": "2021-11-29T10:02:04Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 410,
|
||||
"watchers_count": 410,
|
||||
"stargazers_count": 411,
|
||||
"watchers_count": 411,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 410,
|
||||
"watchers": 411,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -46,17 +46,17 @@
|
|||
"description": "CVE-2020-3992 & CVE-2019-5544",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T15:15:22Z",
|
||||
"updated_at": "2021-08-31T11:17:23Z",
|
||||
"updated_at": "2021-11-29T10:33:40Z",
|
||||
"pushed_at": "2021-02-05T06:40:50Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 23,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -28,6 +28,33 @@
|
|||
},
|
||||
{
|
||||
"id": 431907402,
|
||||
"name": "CVE-2020-0074-frameworks_base_old1",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0074-frameworks_base_old1",
|
||||
"owner": {
|
||||
"login": "Nivaskumark",
|
||||
"id": 90234286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0074-frameworks_base_old1",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-25T16:17:23Z",
|
||||
"updated_at": "2021-11-29T06:17:46Z",
|
||||
"pushed_at": "2021-11-25T16:21:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 432927026,
|
||||
"name": "CVE-2020-0074-frameworks_base",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0074-frameworks_base",
|
||||
"owner": {
|
||||
|
@ -39,9 +66,36 @@
|
|||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0074-frameworks_base",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-25T16:17:23Z",
|
||||
"updated_at": "2021-11-25T16:26:54Z",
|
||||
"pushed_at": "2021-11-25T16:21:11Z",
|
||||
"created_at": "2021-11-29T06:18:01Z",
|
||||
"updated_at": "2021-11-29T08:09:36Z",
|
||||
"pushed_at": "2021-11-29T06:51:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 432940123,
|
||||
"name": "CVE-2020-0074-frameworks_base_after",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0074-frameworks_base_after",
|
||||
"owner": {
|
||||
"login": "Nivaskumark",
|
||||
"id": 90234286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0074-frameworks_base_after",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-29T07:13:33Z",
|
||||
"updated_at": "2021-11-29T08:09:08Z",
|
||||
"pushed_at": "2021-11-29T07:53:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -82,19 +82,19 @@
|
|||
},
|
||||
{
|
||||
"id": 432889770,
|
||||
"name": "CVE-2020-0097-frameworks_base_beforefix",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base_beforefix",
|
||||
"name": "CVE-2020-0097-frameworks_base",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base",
|
||||
"owner": {
|
||||
"login": "Nivaskumark",
|
||||
"id": 90234286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base_beforefix",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-29T03:12:16Z",
|
||||
"updated_at": "2021-11-29T03:59:58Z",
|
||||
"updated_at": "2021-11-29T08:17:23Z",
|
||||
"pushed_at": "2021-11-29T03:46:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -109,19 +109,19 @@
|
|||
},
|
||||
{
|
||||
"id": 432899300,
|
||||
"name": "CVE-2020-0097-frameworks_base",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base",
|
||||
"name": "CVE-2020-0097-frameworks_base_afterfix",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base_afterfix",
|
||||
"owner": {
|
||||
"login": "Nivaskumark",
|
||||
"id": 90234286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base_afterfix",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-29T04:00:19Z",
|
||||
"updated_at": "2021-11-29T04:38:04Z",
|
||||
"updated_at": "2021-11-29T08:16:57Z",
|
||||
"pushed_at": "2021-11-29T04:38:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -163,19 +163,19 @@
|
|||
},
|
||||
{
|
||||
"id": 432870892,
|
||||
"name": "CVE-2020-0114-frameworks_base_before",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base_before",
|
||||
"name": "CVE-2020-0114-frameworks_base",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base",
|
||||
"owner": {
|
||||
"login": "Nivaskumark",
|
||||
"id": 90234286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base_before",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-29T01:37:12Z",
|
||||
"updated_at": "2021-11-29T02:24:08Z",
|
||||
"updated_at": "2021-11-29T08:23:47Z",
|
||||
"pushed_at": "2021-11-29T02:07:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -190,19 +190,19 @@
|
|||
},
|
||||
{
|
||||
"id": 432880702,
|
||||
"name": "CVE-2020-0114-frameworks_base",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base",
|
||||
"name": "CVE-2020-0114-frameworks_base_afterfix",
|
||||
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base_afterfix",
|
||||
"owner": {
|
||||
"login": "Nivaskumark",
|
||||
"id": 90234286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base",
|
||||
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base_afterfix",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-29T02:27:53Z",
|
||||
"updated_at": "2021-11-29T02:58:19Z",
|
||||
"updated_at": "2021-11-29T08:20:51Z",
|
||||
"pushed_at": "2021-11-29T02:57:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -1045,10 +1045,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-11-29T06:03:14Z",
|
||||
"updated_at": "2021-11-29T08:43:35Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1162,
|
||||
"watchers_count": 1162,
|
||||
"stargazers_count": 1163,
|
||||
"watchers_count": 1163,
|
||||
"forks_count": 366,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1061,7 +1061,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 366,
|
||||
"watchers": 1162,
|
||||
"watchers": 1163,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -136,12 +136,12 @@
|
|||
"pushed_at": "2020-07-10T09:30:47Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 40,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"forks": 41,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-11-29T02:16:53Z",
|
||||
"updated_at": "2021-11-29T06:35:54Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3011,
|
||||
"watchers_count": 3011,
|
||||
"stargazers_count": 3012,
|
||||
"watchers_count": 3012,
|
||||
"forks_count": 891,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 891,
|
||||
"watchers": 3011,
|
||||
"watchers": 3012,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T08:14:03Z",
|
||||
"updated_at": "2021-11-17T09:54:51Z",
|
||||
"updated_at": "2021-11-29T08:59:09Z",
|
||||
"pushed_at": "2021-02-07T09:42:36Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -202,17 +202,17 @@
|
|||
"description": "在一定条件下可执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T08:42:50Z",
|
||||
"updated_at": "2021-06-14T07:38:36Z",
|
||||
"updated_at": "2021-11-29T06:42:22Z",
|
||||
"pushed_at": "2020-02-21T08:45:51Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Disclosure of Accfly camera vulnerabilities: CVE-2020-25782, CVE-2020-25783, CVE-2020-25784, CVE-2020-25785.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-26T15:48:27Z",
|
||||
"updated_at": "2021-02-05T08:28:01Z",
|
||||
"updated_at": "2021-11-29T06:21:50Z",
|
||||
"pushed_at": "2021-01-26T17:03:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2020/CVE-2020-28148.json
Normal file
29
2020/CVE-2020-28148.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 432963715,
|
||||
"name": "CVE-2020-28148",
|
||||
"full_name": "fengchenzxc\/CVE-2020-28148",
|
||||
"owner": {
|
||||
"login": "fengchenzxc",
|
||||
"id": 41096522,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41096522?v=4",
|
||||
"html_url": "https:\/\/github.com\/fengchenzxc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fengchenzxc\/CVE-2020-28148",
|
||||
"description": "攻击WIFI的常用方式",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-29T08:38:27Z",
|
||||
"updated_at": "2021-11-29T08:57:41Z",
|
||||
"pushed_at": "2021-11-29T08:57:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -46,17 +46,17 @@
|
|||
"description": "CVE-2020-3992 & CVE-2019-5544",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T15:15:22Z",
|
||||
"updated_at": "2021-08-31T11:17:23Z",
|
||||
"updated_at": "2021-11-29T10:33:40Z",
|
||||
"pushed_at": "2021-02-05T06:40:50Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 23,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -207,8 +207,8 @@
|
|||
"description": "Proof of concept for CVE-2020-7247 for educational purposes.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T17:28:56Z",
|
||||
"updated_at": "2021-11-26T18:12:45Z",
|
||||
"pushed_at": "2021-11-26T18:12:41Z",
|
||||
"updated_at": "2021-11-29T10:08:58Z",
|
||||
"pushed_at": "2021-11-29T10:08:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"description": "XMLRPC - RCE in MovableTypePoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-30T09:15:56Z",
|
||||
"updated_at": "2021-11-19T16:16:58Z",
|
||||
"pushed_at": "2021-11-19T16:16:55Z",
|
||||
"updated_at": "2021-11-29T11:40:02Z",
|
||||
"pushed_at": "2021-11-29T11:40:00Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 8,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2021-11-22T19:24:18Z",
|
||||
"updated_at": "2021-11-29T10:40:21Z",
|
||||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-08T16:12:17Z",
|
||||
"updated_at": "2021-11-02T13:51:36Z",
|
||||
"updated_at": "2021-11-29T09:27:35Z",
|
||||
"pushed_at": "2021-08-08T16:41:28Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Windows MDM LPE",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-27T00:37:07Z",
|
||||
"updated_at": "2021-11-27T01:27:12Z",
|
||||
"updated_at": "2021-11-29T11:40:47Z",
|
||||
"pushed_at": "2021-11-27T00:38:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-28T09:48:36Z",
|
||||
"updated_at": "2021-11-29T01:51:30Z",
|
||||
"updated_at": "2021-11-29T09:54:59Z",
|
||||
"pushed_at": "2021-11-28T13:10:48Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-12T12:43:24Z",
|
||||
"updated_at": "2021-11-21T01:10:57Z",
|
||||
"updated_at": "2021-11-29T06:50:08Z",
|
||||
"pushed_at": "2021-09-20T09:58:17Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -206,12 +206,12 @@
|
|||
"pushed_at": "2021-09-02T07:36:51Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"forks": 25,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-11-24T04:32:07Z",
|
||||
"updated_at": "2021-11-29T07:20:28Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 202,
|
||||
"watchers": 203,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-30807",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T20:11:42Z",
|
||||
"updated_at": "2021-11-29T04:59:55Z",
|
||||
"updated_at": "2021-11-29T12:11:41Z",
|
||||
"pushed_at": "2021-11-28T22:25:13Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 6,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"forks": 8,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-32849.json
Normal file
29
2021/CVE-2021-32849.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 432931846,
|
||||
"name": "CVE-2021-32849",
|
||||
"full_name": "ohnonoyesyes\/CVE-2021-32849",
|
||||
"owner": {
|
||||
"login": "ohnonoyesyes",
|
||||
"id": 93457304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4",
|
||||
"html_url": "https:\/\/github.com\/ohnonoyesyes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2021-32849",
|
||||
"description": "Gerapy clone background remote command execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-29T06:39:27Z",
|
||||
"updated_at": "2021-11-29T06:41:11Z",
|
||||
"pushed_at": "2021-11-29T06:41:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,17 +121,17 @@
|
|||
"description": "对Exchange Proxyshell 做了二次修改,精确的拆分、实现辅助性安全测试。",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T07:47:09Z",
|
||||
"updated_at": "2021-11-24T09:19:43Z",
|
||||
"updated_at": "2021-11-29T07:24:25Z",
|
||||
"pushed_at": "2021-11-23T09:56:37Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-08-25T19:26:21Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 41,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"forks": 40,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-07-10T13:43:54Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2021-40438 exploit PoC with Docker setup.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-24T10:18:08Z",
|
||||
"updated_at": "2021-11-04T23:39:11Z",
|
||||
"updated_at": "2021-11-29T12:10:34Z",
|
||||
"pushed_at": "2021-10-24T10:21:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-11-26T19:31:29Z",
|
||||
"updated_at": "2021-11-29T08:38:58Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1318,
|
||||
"watchers_count": 1318,
|
||||
"stargazers_count": 1319,
|
||||
"watchers_count": 1319,
|
||||
"forks_count": 428,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 428,
|
||||
"watchers": 1318,
|
||||
"watchers": 1319,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -553,10 +553,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2021-11-27T03:55:36Z",
|
||||
"updated_at": "2021-11-29T08:15:59Z",
|
||||
"pushed_at": "2021-10-12T23:05:07Z",
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"stargazers_count": 509,
|
||||
"watchers_count": 509,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -570,7 +570,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 508,
|
||||
"watchers": 509,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A demo exploiting CVE-2021-40531, a vulnerability in Sketch.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-19T17:38:34Z",
|
||||
"updated_at": "2021-11-29T02:38:38Z",
|
||||
"updated_at": "2021-11-29T09:53:27Z",
|
||||
"pushed_at": "2021-11-22T14:52:04Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-40865",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T10:09:40Z",
|
||||
"updated_at": "2021-11-29T02:05:52Z",
|
||||
"updated_at": "2021-11-29T09:45:04Z",
|
||||
"pushed_at": "2021-11-26T10:10:33Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-11-28T01:16:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Microsoft Exchange Server Poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-23T02:26:26Z",
|
||||
"updated_at": "2021-11-29T02:15:27Z",
|
||||
"updated_at": "2021-11-29T09:38:47Z",
|
||||
"pushed_at": "2021-11-23T02:33:47Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 35,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T01:51:57Z",
|
||||
"updated_at": "2021-11-29T03:09:04Z",
|
||||
"updated_at": "2021-11-29T11:08:27Z",
|
||||
"pushed_at": "2021-11-28T01:12:40Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
20
README.md
20
README.md
|
@ -2147,6 +2147,9 @@ Squirrelly is a template engine implemented in JavaScript that works out of the
|
|||
|
||||
- [Abady0x1/CVE-2021-32819](https://github.com/Abady0x1/CVE-2021-32819)
|
||||
|
||||
### CVE-2021-32849
|
||||
- [ohnonoyesyes/CVE-2021-32849](https://github.com/ohnonoyesyes/CVE-2021-32849)
|
||||
|
||||
### CVE-2021-33026 (2021-05-13)
|
||||
|
||||
<code>
|
||||
|
@ -3571,7 +3574,9 @@ In verifyIntentFiltersIfNeeded of PackageManagerService.java, there is a possibl
|
|||
</code>
|
||||
|
||||
- [Nivaskumark/CVE-2020-0074-frameworks_base_old](https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_old)
|
||||
- [Nivaskumark/CVE-2020-0074-frameworks_base_old1](https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_old1)
|
||||
- [Nivaskumark/CVE-2020-0074-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base)
|
||||
- [Nivaskumark/CVE-2020-0074-frameworks_base_after](https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_after)
|
||||
|
||||
### CVE-2020-0082 (2020-04-17)
|
||||
|
||||
|
@ -3600,8 +3605,8 @@ In various methods of PackageManagerService.java, there is a possible permission
|
|||
- [Nivaskumark/CVE-2020-0097-frameworks_base_before](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_before)
|
||||
- [Nivaskumark/CVE-2020-0097-frameworks_base_after](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_after)
|
||||
- [Nivaskumark/CVE-2020-0097-frameworks_ba](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_ba)
|
||||
- [Nivaskumark/CVE-2020-0097-frameworks_base_beforefix](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_beforefix)
|
||||
- [Nivaskumark/CVE-2020-0097-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base)
|
||||
- [Nivaskumark/CVE-2020-0097-frameworks_base_afterfix](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_afterfix)
|
||||
|
||||
### CVE-2020-0108 (2020-08-11)
|
||||
|
||||
|
@ -3631,8 +3636,8 @@ In onCreateSliceProvider of KeyguardSliceProvider.java, there is a possible conf
|
|||
- [Nivaskumark/CVE-2020-0114-frameworks](https://github.com/Nivaskumark/CVE-2020-0114-frameworks)
|
||||
- [Nivaskumark/CVE-2020-0114-frameworks_basegbdgb](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basegbdgb)
|
||||
- [Nivaskumark/CVE-2020-0114-frameworks_basety](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basety)
|
||||
- [Nivaskumark/CVE-2020-0114-frameworks_base_before](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base_before)
|
||||
- [Nivaskumark/CVE-2020-0114-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base)
|
||||
- [Nivaskumark/CVE-2020-0114-frameworks_base_afterfix](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base_afterfix)
|
||||
|
||||
### CVE-2020-0121 (2020-06-10)
|
||||
|
||||
|
@ -7755,6 +7760,9 @@ JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authoriz
|
|||
|
||||
- [VoidSec/Tivoli-Madness](https://github.com/VoidSec/Tivoli-Madness)
|
||||
|
||||
### CVE-2020-28148
|
||||
- [fengchenzxc/CVE-2020-28148](https://github.com/fengchenzxc/CVE-2020-28148)
|
||||
|
||||
### CVE-2020-28169 (2020-12-24)
|
||||
|
||||
<code>
|
||||
|
@ -20576,14 +20584,6 @@ sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or
|
|||
|
||||
- [bekhzod0725/perl-CVE-2013-1775](https://github.com/bekhzod0725/perl-CVE-2013-1775)
|
||||
|
||||
### CVE-2013-1965 (2013-07-10)
|
||||
|
||||
<code>
|
||||
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
|
||||
</code>
|
||||
|
||||
- [cinno/CVE-2013-1965](https://github.com/cinno/CVE-2013-1965)
|
||||
|
||||
### CVE-2013-2028 (2013-07-17)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue