mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/12/03 18:09:32
This commit is contained in:
parent
215d386e2c
commit
5e061320d2
31 changed files with 277 additions and 109 deletions
|
@ -56,11 +56,11 @@
|
|||
"html_url": "https:\/\/github.com\/MisakaMikato"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang",
|
||||
"description": "Hikvision bypass exploit, using golang",
|
||||
"description": "Hikvision IP camera access bypass exploit, developed by golang. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T04:15:31Z",
|
||||
"updated_at": "2020-11-13T04:15:36Z",
|
||||
"pushed_at": "2020-11-18T06:55:52Z",
|
||||
"updated_at": "2020-12-03T07:22:56Z",
|
||||
"pushed_at": "2020-12-03T07:00:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-07-19T05:59:00Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-01-23T14:27:21Z",
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 180,
|
||||
"forks": 180,
|
||||
"forks_count": 181,
|
||||
"forks": 181,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 345,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1328,8 +1328,8 @@
|
|||
"pushed_at": "2019-05-22T22:32:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2474,13 +2474,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2020-12-02T13:31:06Z",
|
||||
"updated_at": "2020-12-03T08:14:42Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 152,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2524,8 +2524,8 @@
|
|||
"pushed_at": "2020-03-17T06:49:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-11-09T07:33:12Z",
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 244,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-23T14:53:19Z",
|
||||
"updated_at": "2020-10-04T12:04:07Z",
|
||||
"updated_at": "2020-12-03T04:24:17Z",
|
||||
"pushed_at": "2020-08-08T16:58:05Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-11-30T08:18:43Z",
|
||||
"updated_at": "2020-12-03T06:34:50Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 680,
|
||||
"watchers_count": 680,
|
||||
"stargazers_count": 679,
|
||||
"watchers_count": 679,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 680,
|
||||
"watchers": 679,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2020-11-30T08:27:19Z",
|
||||
"updated_at": "2020-12-03T03:49:07Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 260,
|
||||
"watchers": 261,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-03T01:35:58Z",
|
||||
"updated_at": "2020-12-03T08:37:47Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2113,
|
||||
"watchers_count": 2113,
|
||||
"forks_count": 590,
|
||||
"forks": 590,
|
||||
"watchers": 2113,
|
||||
"stargazers_count": 2115,
|
||||
"watchers_count": 2115,
|
||||
"forks_count": 591,
|
||||
"forks": 591,
|
||||
"watchers": 2115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-12-02T06:47:31Z",
|
||||
"updated_at": "2020-12-03T08:25:05Z",
|
||||
"pushed_at": "2020-08-28T14:09:20Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-12-02T08:29:08Z",
|
||||
"updated_at": "2020-12-03T05:13:51Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 678,
|
||||
"watchers_count": 678,
|
||||
"stargazers_count": 679,
|
||||
"watchers_count": 679,
|
||||
"forks_count": 142,
|
||||
"forks": 142,
|
||||
"watchers": 678,
|
||||
"watchers": 679,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2020-11-19T10:47:10Z",
|
||||
"updated_at": "2020-12-03T08:31:46Z",
|
||||
"pushed_at": "2019-01-22T21:00:36Z",
|
||||
"stargazers_count": 587,
|
||||
"watchers_count": 587,
|
||||
"stargazers_count": 588,
|
||||
"watchers_count": 588,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 587,
|
||||
"watchers": 588,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "A PoC for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:15:32Z",
|
||||
"updated_at": "2020-11-27T11:02:10Z",
|
||||
"updated_at": "2020-12-03T07:20:51Z",
|
||||
"pushed_at": "2020-03-22T15:14:31Z",
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"watchers": 332,
|
||||
"watchers": 333,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-12-02T13:53:22Z",
|
||||
"updated_at": "2020-12-03T06:34:20Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 559,
|
||||
"watchers_count": 559,
|
||||
"stargazers_count": 560,
|
||||
"watchers_count": 560,
|
||||
"forks_count": 189,
|
||||
"forks": 189,
|
||||
"watchers": 559,
|
||||
"watchers": 560,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1117,13 +1117,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-12-02T01:49:56Z",
|
||||
"updated_at": "2020-12-03T09:01:35Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 112,
|
||||
"forks": 112,
|
||||
"watchers": 335,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-23T10:24:07Z",
|
||||
"updated_at": "2020-12-02T06:22:27Z",
|
||||
"updated_at": "2020-12-03T08:13:54Z",
|
||||
"pushed_at": "2020-11-23T11:20:28Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T23:22:15Z",
|
||||
"updated_at": "2020-11-04T10:17:33Z",
|
||||
"updated_at": "2020-12-03T05:43:35Z",
|
||||
"pushed_at": "2020-06-17T18:10:30Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-21T08:48:46Z",
|
||||
"updated_at": "2020-12-02T07:05:01Z",
|
||||
"updated_at": "2020-12-03T06:10:35Z",
|
||||
"pushed_at": "2020-11-21T08:54:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-11-30T14:18:23Z",
|
||||
"updated_at": "2020-12-03T08:46:23Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 237,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-03T01:35:58Z",
|
||||
"updated_at": "2020-12-03T08:37:47Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2113,
|
||||
"watchers_count": 2113,
|
||||
"forks_count": 590,
|
||||
"forks": 590,
|
||||
"watchers": 2113,
|
||||
"stargazers_count": 2115,
|
||||
"watchers_count": 2115,
|
||||
"forks_count": 591,
|
||||
"forks": 591,
|
||||
"watchers": 2115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2020-12-02T14:06:13Z",
|
||||
"updated_at": "2020-12-03T03:33:28Z",
|
||||
"pushed_at": "2020-11-10T02:58:25Z",
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"watchers": 385,
|
||||
"watchers": 386,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Writeup of CVE-2020-15906",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-23T09:20:53Z",
|
||||
"updated_at": "2020-12-02T13:21:52Z",
|
||||
"updated_at": "2020-12-03T07:18:05Z",
|
||||
"pushed_at": "2020-10-26T22:01:33Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-23727.json
Normal file
25
2020/CVE-2020-23727.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 274891508,
|
||||
"name": "CVE-2020-23727",
|
||||
"full_name": "y5s5k5\/CVE-2020-23727",
|
||||
"owner": {
|
||||
"login": "y5s5k5",
|
||||
"id": 53048989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
|
||||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23727",
|
||||
"description": "antiy",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-25T10:47:06Z",
|
||||
"updated_at": "2020-12-03T03:14:16Z",
|
||||
"pushed_at": "2020-12-03T03:14:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-23736.json
Normal file
25
2020/CVE-2020-23736.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 276198311,
|
||||
"name": "CVE-2020-23736",
|
||||
"full_name": "y5s5k5\/CVE-2020-23736",
|
||||
"owner": {
|
||||
"login": "y5s5k5",
|
||||
"id": 53048989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
|
||||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23736",
|
||||
"description": "dadajiasu",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-30T20:10:09Z",
|
||||
"updated_at": "2020-12-03T05:00:36Z",
|
||||
"pushed_at": "2020-12-03T05:00:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-23738.json
Normal file
25
2020/CVE-2020-23738.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 276468990,
|
||||
"name": "CVE-2020-23738",
|
||||
"full_name": "y5s5k5\/CVE-2020-23738",
|
||||
"owner": {
|
||||
"login": "y5s5k5",
|
||||
"id": 53048989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
|
||||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23738",
|
||||
"description": "Advanced SystemCare 13 PRO",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-01T19:52:14Z",
|
||||
"updated_at": "2020-12-03T04:51:19Z",
|
||||
"pushed_at": "2020-12-03T04:48:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-23740.json
Normal file
25
2020/CVE-2020-23740.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 277009833,
|
||||
"name": "CVE-2020-23740",
|
||||
"full_name": "y5s5k5\/CVE-2020-23740",
|
||||
"owner": {
|
||||
"login": "y5s5k5",
|
||||
"id": 53048989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
|
||||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23740",
|
||||
"description": "Drive the elves",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T00:24:12Z",
|
||||
"updated_at": "2020-12-03T03:47:09Z",
|
||||
"pushed_at": "2020-12-03T03:47:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-23741.json
Normal file
25
2020/CVE-2020-23741.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 277201421,
|
||||
"name": "CVE-2020-23741",
|
||||
"full_name": "y5s5k5\/CVE-2020-23741",
|
||||
"owner": {
|
||||
"login": "y5s5k5",
|
||||
"id": 53048989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
|
||||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23741",
|
||||
"description": "AnyView",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T23:41:12Z",
|
||||
"updated_at": "2020-12-03T04:04:26Z",
|
||||
"pushed_at": "2020-12-03T04:04:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-27950 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-01T15:49:07Z",
|
||||
"updated_at": "2020-12-03T03:09:26Z",
|
||||
"updated_at": "2020-12-03T04:56:42Z",
|
||||
"pushed_at": "2020-12-01T15:50:45Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-28175.json
Normal file
25
2020/CVE-2020-28175.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 308822998,
|
||||
"name": "CVE-2020-28175",
|
||||
"full_name": "y5s5k5\/CVE-2020-28175",
|
||||
"owner": {
|
||||
"login": "y5s5k5",
|
||||
"id": 53048989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
|
||||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-28175",
|
||||
"description": "speedfan",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-31T06:53:41Z",
|
||||
"updated_at": "2020-12-03T03:57:15Z",
|
||||
"pushed_at": "2020-12-03T03:57:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2020-12-02T14:22:53Z",
|
||||
"updated_at": "2020-12-03T07:21:58Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 198,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2020-11-25T12:26:28Z",
|
||||
"updated_at": "2020-12-03T08:29:47Z",
|
||||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 322,
|
||||
"watchers": 323,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-13T12:56:31Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
|
|
18
README.md
18
README.md
|
@ -2687,9 +2687,24 @@ The import.json.php file before 8.9 for Avideo is vulnerable to a File Deletion
|
|||
### CVE-2020-23726
|
||||
- [y5s5k5/CVE-2020-23726](https://github.com/y5s5k5/CVE-2020-23726)
|
||||
|
||||
### CVE-2020-23727
|
||||
- [y5s5k5/CVE-2020-23727](https://github.com/y5s5k5/CVE-2020-23727)
|
||||
|
||||
### CVE-2020-23735
|
||||
- [y5s5k5/CVE-2020-23735](https://github.com/y5s5k5/CVE-2020-23735)
|
||||
|
||||
### CVE-2020-23736
|
||||
- [y5s5k5/CVE-2020-23736](https://github.com/y5s5k5/CVE-2020-23736)
|
||||
|
||||
### CVE-2020-23738
|
||||
- [y5s5k5/CVE-2020-23738](https://github.com/y5s5k5/CVE-2020-23738)
|
||||
|
||||
### CVE-2020-23740
|
||||
- [y5s5k5/CVE-2020-23740](https://github.com/y5s5k5/CVE-2020-23740)
|
||||
|
||||
### CVE-2020-23741
|
||||
- [y5s5k5/CVE-2020-23741](https://github.com/y5s5k5/CVE-2020-23741)
|
||||
|
||||
### CVE-2020-23968 (2020-11-10)
|
||||
|
||||
<code>
|
||||
|
@ -3049,6 +3064,9 @@ JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authoriz
|
|||
|
||||
- [VoidSec/Tivoli-Madness](https://github.com/VoidSec/Tivoli-Madness)
|
||||
|
||||
### CVE-2020-28175
|
||||
- [y5s5k5/CVE-2020-28175](https://github.com/y5s5k5/CVE-2020-28175)
|
||||
|
||||
### CVE-2020-28328 (2020-11-06)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue