mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/02/27 06:07:50
This commit is contained in:
parent
20e9152bf1
commit
5efc5c1be3
22 changed files with 129 additions and 129 deletions
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 29914821,
|
||||
"name": "jboss-autopwn",
|
||||
"full_name": "ChristianPapathanasiou\/jboss-autopwn",
|
||||
"owner": {
|
||||
"login": "ChristianPapathanasiou",
|
||||
"id": 5354349,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5354349?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou\/jboss-autopwn",
|
||||
"description": "JBoss Autopwn as featured at BlackHat Europe 2010 - this version incorporates CVE-2010-0738 the JBoss authentication bypass VERB manipulation vulnerability as discovered by Minded Security",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T13:16:45Z",
|
||||
"updated_at": "2020-01-13T09:44:30Z",
|
||||
"pushed_at": "2015-01-27T13:23:18Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 62456741,
|
||||
"name": "jboss-autopwn",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2020-02-16T09:48:12Z",
|
||||
"updated_at": "2020-02-26T20:35:52Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2238,
|
||||
"watchers_count": 2238,
|
||||
"forks_count": 484,
|
||||
"forks": 484,
|
||||
"watchers": 2238,
|
||||
"stargazers_count": 2239,
|
||||
"watchers_count": 2239,
|
||||
"forks_count": 485,
|
||||
"forks": 485,
|
||||
"watchers": 2239,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-26T13:26:56Z",
|
||||
"updated_at": "2020-02-26T20:33:13Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 233,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-26T13:26:56Z",
|
||||
"updated_at": "2020-02-26T20:33:13Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 233,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 613,
|
||||
"watchers_count": 613,
|
||||
"forks_count": 273,
|
||||
"forks": 273,
|
||||
"forks_count": 274,
|
||||
"forks": 274,
|
||||
"watchers": 613,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-26T13:26:56Z",
|
||||
"updated_at": "2020-02-26T20:33:13Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 233,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 653,
|
||||
"watchers_count": 653,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"forks_count": 172,
|
||||
"forks": 172,
|
||||
"watchers": 653,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-26T13:26:56Z",
|
||||
"updated_at": "2020-02-26T20:33:13Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 233,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-8174_python",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T03:12:32Z",
|
||||
"updated_at": "2020-02-06T06:52:26Z",
|
||||
"updated_at": "2020-02-26T16:25:14Z",
|
||||
"pushed_at": "2018-05-30T03:33:14Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T10:28:40Z",
|
||||
"updated_at": "2019-11-09T17:32:18Z",
|
||||
"updated_at": "2020-02-26T16:27:43Z",
|
||||
"pushed_at": "2019-05-23T11:26:38Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-10T18:33:43Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"forks_count": 172,
|
||||
"forks": 172,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 285,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1140,13 +1140,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-02-24T18:16:09Z",
|
||||
"updated_at": "2020-02-26T20:32:37Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1083,
|
||||
"watchers_count": 1083,
|
||||
"forks_count": 361,
|
||||
"forks": 361,
|
||||
"watchers": 1083,
|
||||
"stargazers_count": 1084,
|
||||
"watchers_count": 1084,
|
||||
"forks_count": 362,
|
||||
"forks": 362,
|
||||
"watchers": 1084,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1558,8 +1558,8 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1006,
|
||||
"watchers_count": 1006,
|
||||
"forks_count": 347,
|
||||
"forks": 347,
|
||||
"forks_count": 348,
|
||||
"forks": 348,
|
||||
"watchers": 1006,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T10:28:40Z",
|
||||
"updated_at": "2019-11-09T17:32:18Z",
|
||||
"updated_at": "2020-02-26T16:27:43Z",
|
||||
"pushed_at": "2019-05-23T11:26:38Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-28T11:09:06Z",
|
||||
"updated_at": "2020-01-27T10:24:04Z",
|
||||
"updated_at": "2020-02-26T15:39:26Z",
|
||||
"pushed_at": "2019-10-29T15:47:02Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2020-02-26T07:46:59Z",
|
||||
"updated_at": "2020-02-26T15:21:59Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,12 +36,12 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2020-02-24T01:29:49Z",
|
||||
"updated_at": "2020-02-26T19:00:25Z",
|
||||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -358,13 +358,13 @@
|
|||
"description": "Automated script for Citrix ADC scanner (CVE-2019-19781) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-13T07:42:27Z",
|
||||
"updated_at": "2020-01-15T10:38:33Z",
|
||||
"updated_at": "2020-02-26T19:27:56Z",
|
||||
"pushed_at": "2020-01-14T15:53:14Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-26T13:26:56Z",
|
||||
"updated_at": "2020-02-26T20:33:13Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 233,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -688,5 +688,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 243353551,
|
||||
"name": "meetup-2-curveball",
|
||||
"full_name": "bsides-rijeka\/meetup-2-curveball",
|
||||
"owner": {
|
||||
"login": "bsides-rijeka",
|
||||
"id": 61519397,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/61519397?v=4",
|
||||
"html_url": "https:\/\/github.com\/bsides-rijeka"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bsides-rijeka\/meetup-2-curveball",
|
||||
"description": "Materials for the second Rijeka secuity meetup. We will be discussing Microsoft cryptoapi vulnerability dubbed CurveBall (CVE-2020-0601)",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-26T19:59:25Z",
|
||||
"updated_at": "2020-02-26T19:59:25Z",
|
||||
"pushed_at": "2020-02-26T19:59:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-11T09:08:02Z",
|
||||
"updated_at": "2020-02-26T12:19:10Z",
|
||||
"updated_at": "2020-02-26T15:21:39Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2020-02-26T14:51:41Z",
|
||||
"updated_at": "2020-02-26T16:09:53Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-25T23:44:16Z",
|
||||
"updated_at": "2020-02-26T14:50:51Z",
|
||||
"updated_at": "2020-02-26T19:50:49Z",
|
||||
"pushed_at": "2020-02-26T00:58:39Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 68,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-0688 - Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-26T12:28:11Z",
|
||||
"updated_at": "2020-02-26T14:06:56Z",
|
||||
"updated_at": "2020-02-26T16:28:44Z",
|
||||
"pushed_at": "2020-02-26T12:41:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2020-1938漏洞复现",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T02:36:37Z",
|
||||
"updated_at": "2020-02-25T18:52:03Z",
|
||||
"updated_at": "2020-02-26T15:14:20Z",
|
||||
"pushed_at": "2020-02-21T02:49:57Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -335,8 +335,8 @@
|
|||
"description": "Learnings on how to verify if vulnerable to Ghostcat (aka CVE-2020-1938)",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-26T14:40:12Z",
|
||||
"updated_at": "2020-02-26T14:41:37Z",
|
||||
"pushed_at": "2020-02-26T14:41:35Z",
|
||||
"updated_at": "2020-02-26T15:34:00Z",
|
||||
"pushed_at": "2020-02-26T15:33:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:27:41Z",
|
||||
"updated_at": "2020-02-26T13:37:56Z",
|
||||
"updated_at": "2020-02-26T17:16:44Z",
|
||||
"pushed_at": "2020-02-22T16:33:31Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -46,6 +46,7 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
|
|||
- [eastmountyxz/CVE-2020-0601-EXP](https://github.com/eastmountyxz/CVE-2020-0601-EXP)
|
||||
- [eastmountyxz/CVE-2018-20250-WinRAR](https://github.com/eastmountyxz/CVE-2018-20250-WinRAR)
|
||||
- [gremwell/cve-2020-0601_poc](https://github.com/gremwell/cve-2020-0601_poc)
|
||||
- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball)
|
||||
|
||||
### CVE-2020-0609
|
||||
|
||||
|
@ -11707,7 +11708,6 @@ sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is en
|
|||
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
|
||||
</code>
|
||||
|
||||
- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn)
|
||||
- [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn)
|
||||
|
||||
### CVE-2010-1205
|
||||
|
|
Loading…
Reference in a new issue