mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/05/17 00:12:43
This commit is contained in:
parent
b250364c99
commit
623e5a4bd0
27 changed files with 154 additions and 97 deletions
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2017-02-27T18:56:12Z",
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"forks_count": 132,
|
||||
"forks": 132,
|
||||
"forks_count": 133,
|
||||
"forks": 133,
|
||||
"watchers": 371,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous ",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-20T23:28:41Z",
|
||||
"updated_at": "2020-11-21T15:56:22Z",
|
||||
"updated_at": "2021-05-16T11:51:47Z",
|
||||
"pushed_at": "2016-08-23T21:06:44Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2021-05-14T22:31:20Z",
|
||||
"updated_at": "2021-05-16T12:41:04Z",
|
||||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 417,
|
||||
"watchers_count": 417,
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"forks_count": 399,
|
||||
"forks": 399,
|
||||
"watchers": 417,
|
||||
"watchers": 418,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-05-08T16:24:52Z",
|
||||
"updated_at": "2021-05-16T10:48:28Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 420,
|
||||
"watchers_count": 420,
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 420,
|
||||
"watchers": 421,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -345,21 +345,44 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367831586,
|
||||
"id": 367841847,
|
||||
"name": "CVE-2018-9995",
|
||||
"full_name": "kienquoc102\/CVE-2018-9995",
|
||||
"full_name": "quocquoc181\/CVE-2018-9995",
|
||||
"owner": {
|
||||
"login": "quocquoc181",
|
||||
"id": 84268932,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84268932?v=4",
|
||||
"html_url": "https:\/\/github.com\/quocquoc181"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/quocquoc181\/CVE-2018-9995",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T09:55:57Z",
|
||||
"updated_at": "2021-05-16T09:57:24Z",
|
||||
"pushed_at": "2021-05-16T09:57:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367859543,
|
||||
"name": "Exploit-CVE-2018-9995",
|
||||
"full_name": "kienquoc102\/Exploit-CVE-2018-9995",
|
||||
"owner": {
|
||||
"login": "kienquoc102",
|
||||
"id": 84182708,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84182708?v=4",
|
||||
"html_url": "https:\/\/github.com\/kienquoc102"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kienquoc102\/CVE-2018-9995",
|
||||
"html_url": "https:\/\/github.com\/kienquoc102\/Exploit-CVE-2018-9995",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T09:04:56Z",
|
||||
"updated_at": "2021-05-16T09:08:19Z",
|
||||
"pushed_at": "2021-05-16T09:08:17Z",
|
||||
"created_at": "2021-05-16T11:21:22Z",
|
||||
"updated_at": "2021-05-16T14:29:27Z",
|
||||
"pushed_at": "2021-05-16T14:29:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "S2-059(CVE-2019-0230)",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-11T03:40:04Z",
|
||||
"updated_at": "2021-05-11T07:34:58Z",
|
||||
"updated_at": "2021-05-16T10:15:04Z",
|
||||
"pushed_at": "2020-12-11T04:28:10Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1416,13 +1416,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2021-05-07T18:04:43Z",
|
||||
"updated_at": "2021-05-16T13:29:49Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1070,
|
||||
"watchers_count": 1070,
|
||||
"stargazers_count": 1071,
|
||||
"watchers_count": 1071,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1070,
|
||||
"watchers": 1071,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2019-0808-poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-25T11:53:35Z",
|
||||
"updated_at": "2021-04-28T23:23:59Z",
|
||||
"updated_at": "2021-05-16T11:45:07Z",
|
||||
"pushed_at": "2019-03-25T12:10:40Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Explotation framework for CVE-2019-11687",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-15T08:52:17Z",
|
||||
"updated_at": "2020-10-06T14:45:36Z",
|
||||
"pushed_at": "2020-07-22T11:27:29Z",
|
||||
"updated_at": "2021-05-16T13:16:37Z",
|
||||
"pushed_at": "2021-05-16T13:16:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
|
25
2019/CVE-2019-14322.json
Normal file
25
2019/CVE-2019-14322.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 367884859,
|
||||
"name": "CVE-2019-14322-scanner",
|
||||
"full_name": "faisalfs10x\/CVE-2019-14322-scanner",
|
||||
"owner": {
|
||||
"login": "faisalfs10x",
|
||||
"id": 51811615,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
|
||||
"html_url": "https:\/\/github.com\/faisalfs10x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faisalfs10x\/CVE-2019-14322-scanner",
|
||||
"description": "CVE-2019-14322: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T13:15:12Z",
|
||||
"updated_at": "2021-05-16T13:58:12Z",
|
||||
"pushed_at": "2021-05-16T13:58:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-05-15T04:53:57Z",
|
||||
"updated_at": "2021-05-16T12:08:38Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2568,
|
||||
"watchers_count": 2568,
|
||||
"stargazers_count": 2569,
|
||||
"watchers_count": 2569,
|
||||
"forks_count": 748,
|
||||
"forks": 748,
|
||||
"watchers": 2568,
|
||||
"watchers": 2569,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-01-19T10:49:21Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-05-16T08:49:28Z",
|
||||
"updated_at": "2021-05-16T11:32:58Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 567,
|
||||
"watchers_count": 567,
|
||||
"stargazers_count": 568,
|
||||
"watchers_count": 568,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 567,
|
||||
"watchers": 568,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-25T23:44:16Z",
|
||||
"updated_at": "2021-04-26T19:41:33Z",
|
||||
"updated_at": "2021-05-16T14:24:21Z",
|
||||
"pushed_at": "2020-02-26T00:58:39Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T13:08:21Z",
|
||||
"updated_at": "2021-05-14T22:49:59Z",
|
||||
"updated_at": "2021-05-16T13:10:50Z",
|
||||
"pushed_at": "2021-02-14T15:08:01Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-05-15T04:53:57Z",
|
||||
"updated_at": "2021-05-16T12:08:38Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2568,
|
||||
"watchers_count": 2568,
|
||||
"stargazers_count": 2569,
|
||||
"watchers_count": 2569,
|
||||
"forks_count": 748,
|
||||
"forks": 748,
|
||||
"watchers": 2568,
|
||||
"watchers": 2569,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-16T02:47:19Z",
|
||||
"updated_at": "2021-05-16T12:49:37Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 751,
|
||||
"watchers_count": 751,
|
||||
"stargazers_count": 752,
|
||||
"watchers_count": 752,
|
||||
"forks_count": 239,
|
||||
"forks": 239,
|
||||
"watchers": 751,
|
||||
"watchers": 752,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Writeup of CVE-2020-15906",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-23T09:20:53Z",
|
||||
"updated_at": "2021-05-11T16:56:27Z",
|
||||
"updated_at": "2021-05-16T09:37:27Z",
|
||||
"pushed_at": "2020-10-26T22:01:33Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2021-05-10T23:29:33Z",
|
||||
"updated_at": "2021-05-16T14:47:53Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 189,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit to SYSTEM for CVE-2021-21551",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:23:38Z",
|
||||
"updated_at": "2021-05-16T07:25:21Z",
|
||||
"updated_at": "2021-05-16T10:20:04Z",
|
||||
"pushed_at": "2021-05-13T15:22:07Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:48:57Z",
|
||||
"updated_at": "2021-05-15T18:44:01Z",
|
||||
"pushed_at": "2021-05-15T18:43:59Z",
|
||||
"updated_at": "2021-05-16T11:23:29Z",
|
||||
"pushed_at": "2021-05-16T11:23:27Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 13,
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-16T02:47:19Z",
|
||||
"updated_at": "2021-05-16T12:49:37Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 751,
|
||||
"watchers_count": 751,
|
||||
"stargazers_count": 752,
|
||||
"watchers_count": 752,
|
||||
"forks_count": 239,
|
||||
"forks": 239,
|
||||
"watchers": 751,
|
||||
"watchers": 752,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T01:40:47Z",
|
||||
"updated_at": "2021-05-16T09:03:53Z",
|
||||
"updated_at": "2021-05-16T14:55:16Z",
|
||||
"pushed_at": "2021-05-16T05:54:07Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-05-03T14:29:49Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-05-13T09:09:05Z",
|
||||
"updated_at": "2021-05-16T12:11:15Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 713,
|
||||
"watchers_count": 713,
|
||||
"stargazers_count": 714,
|
||||
"watchers_count": 714,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 713,
|
||||
"watchers": 714,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T10:39:42Z",
|
||||
"updated_at": "2021-05-16T08:21:36Z",
|
||||
"updated_at": "2021-05-16T11:13:32Z",
|
||||
"pushed_at": "2021-05-15T09:09:15Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -8434,6 +8434,14 @@ The TikTok (formerly Musical.ly) application 12.2.0 for Android and iOS performs
|
|||
|
||||
- [MelroyB/CVE-2019-14319](https://github.com/MelroyB/CVE-2019-14319)
|
||||
|
||||
### CVE-2019-14322 (2019-07-28)
|
||||
|
||||
<code>
|
||||
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
|
||||
</code>
|
||||
|
||||
- [faisalfs10x/CVE-2019-14322-scanner](https://github.com/faisalfs10x/CVE-2019-14322-scanner)
|
||||
|
||||
### CVE-2019-14326 (2020-04-14)
|
||||
|
||||
<code>
|
||||
|
@ -11173,7 +11181,8 @@ TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in
|
|||
- [akuhidayat/HTC](https://github.com/akuhidayat/HTC)
|
||||
- [g5q2/cve-2018-9995](https://github.com/g5q2/cve-2018-9995)
|
||||
- [HACKGM/CVE-2018-9995](https://github.com/HACKGM/CVE-2018-9995)
|
||||
- [kienquoc102/CVE-2018-9995](https://github.com/kienquoc102/CVE-2018-9995)
|
||||
- [quocquoc181/CVE-2018-9995](https://github.com/quocquoc181/CVE-2018-9995)
|
||||
- [kienquoc102/Exploit-CVE-2018-9995](https://github.com/kienquoc102/Exploit-CVE-2018-9995)
|
||||
|
||||
### CVE-2018-10118 (2018-04-15)
|
||||
|
||||
|
|
Loading…
Reference in a new issue