mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/07/12 18:09:57
This commit is contained in:
parent
cfe24b033e
commit
67958cf9bc
28 changed files with 161 additions and 161 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 178449456,
|
||||
"name": "CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
|
||||
"full_name": "schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
|
||||
"owner": {
|
||||
"login": "schwankner",
|
||||
"id": 1496765,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1496765?v=4",
|
||||
"html_url": "https:\/\/github.com\/schwankner"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
|
||||
"description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-29T17:31:14Z",
|
||||
"updated_at": "2019-08-26T16:40:59Z",
|
||||
"pushed_at": "2019-03-29T17:31:55Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-11T10:33:15Z",
|
||||
"updated_at": "2020-07-12T03:46:58Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-07-22T19:22:55Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-07-22T19:22:55Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-11T10:33:15Z",
|
||||
"updated_at": "2020-07-12T03:46:58Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-05-13T11:36:17Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-06-15T11:27:42Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-11T10:33:15Z",
|
||||
"updated_at": "2020-07-12T03:46:58Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-02T02:21:28Z",
|
||||
"updated_at": "2020-06-23T22:47:31Z",
|
||||
"updated_at": "2020-07-12T09:04:53Z",
|
||||
"pushed_at": "2019-05-09T07:07:25Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T15:44:29Z",
|
||||
"updated_at": "2020-07-02T12:26:05Z",
|
||||
"updated_at": "2020-07-12T05:33:09Z",
|
||||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 176,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-14T18:51:50Z",
|
||||
"updated_at": "2020-07-08T02:53:35Z",
|
||||
"updated_at": "2020-07-12T05:29:29Z",
|
||||
"pushed_at": "2018-09-27T07:32:19Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-11T10:33:15Z",
|
||||
"updated_at": "2020-07-12T03:46:58Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-07-06T06:55:12Z",
|
||||
"updated_at": "2020-07-12T08:01:51Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 665,
|
||||
"watchers_count": 665,
|
||||
"stargazers_count": 666,
|
||||
"watchers_count": 666,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 665,
|
||||
"watchers": 666,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-07-11T14:27:06Z",
|
||||
"updated_at": "2020-07-12T08:59:34Z",
|
||||
"pushed_at": "2020-07-08T10:09:00Z",
|
||||
"stargazers_count": 1220,
|
||||
"watchers_count": 1220,
|
||||
"stargazers_count": 1221,
|
||||
"watchers_count": 1221,
|
||||
"forks_count": 309,
|
||||
"forks": 309,
|
||||
"watchers": 1220,
|
||||
"watchers": 1221,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 338,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-11T10:33:15Z",
|
||||
"updated_at": "2020-07-12T03:46:58Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2020-07-09T07:18:20Z",
|
||||
"updated_at": "2020-07-12T06:46:48Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-07-08T10:59:45Z",
|
||||
"updated_at": "2020-07-12T04:39:31Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 813,
|
||||
"watchers_count": 813,
|
||||
"stargazers_count": 814,
|
||||
"watchers_count": 814,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 813,
|
||||
"watchers": 814,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T21:33:17Z",
|
||||
"updated_at": "2020-07-05T17:27:27Z",
|
||||
"updated_at": "2020-07-12T03:30:20Z",
|
||||
"pushed_at": "2020-07-05T17:27:24Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2020-07-07T01:32:10Z",
|
||||
"updated_at": "2020-07-12T05:46:26Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-07-05T05:03:18Z",
|
||||
"updated_at": "2020-07-12T07:50:20Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"watchers": 192,
|
||||
"watchers": 194,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1416,13 +1416,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2020-07-11T19:38:55Z",
|
||||
"updated_at": "2020-07-12T03:37:47Z",
|
||||
"pushed_at": "2020-07-08T08:26:24Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1439,13 +1439,13 @@
|
|||
"description": "This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-19T20:38:11Z",
|
||||
"updated_at": "2020-07-01T08:58:49Z",
|
||||
"updated_at": "2020-07-12T04:19:41Z",
|
||||
"pushed_at": "2020-06-19T20:58:36Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-11T10:33:15Z",
|
||||
"updated_at": "2020-07-12T03:46:58Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-07-11T14:27:06Z",
|
||||
"updated_at": "2020-07-12T08:59:34Z",
|
||||
"pushed_at": "2020-07-08T10:09:00Z",
|
||||
"stargazers_count": 1220,
|
||||
"watchers_count": 1220,
|
||||
"stargazers_count": 1221,
|
||||
"watchers_count": 1221,
|
||||
"forks_count": 309,
|
||||
"forks": 309,
|
||||
"watchers": 1220,
|
||||
"watchers": 1221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2020-07-11T21:54:00Z",
|
||||
"updated_at": "2020-07-12T07:45:58Z",
|
||||
"pushed_at": "2020-07-07T09:36:24Z",
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 267,
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,13 +289,13 @@
|
|||
"description": "F5 Big-IP CVE-2020-5902 - LFI and RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T04:03:58Z",
|
||||
"updated_at": "2020-07-09T06:36:11Z",
|
||||
"updated_at": "2020-07-12T04:14:21Z",
|
||||
"pushed_at": "2020-07-07T05:22:19Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -427,13 +427,13 @@
|
|||
"description": "批量扫描CVE-2020-5902,远程代码执行,已测试",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T09:16:36Z",
|
||||
"updated_at": "2020-07-09T09:24:57Z",
|
||||
"updated_at": "2020-07-12T07:53:49Z",
|
||||
"pushed_at": "2020-07-09T09:24:55Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -864,13 +864,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T07:44:07Z",
|
||||
"updated_at": "2020-07-10T04:08:17Z",
|
||||
"updated_at": "2020-07-12T07:49:15Z",
|
||||
"pushed_at": "2020-07-09T08:06:07Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -891,8 +891,8 @@
|
|||
"pushed_at": "2020-07-11T14:10:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -933,13 +933,13 @@
|
|||
"description": "Checker CVE-2020-5902: BIG-IP versions 15.0.0 through 15.1.0.3, 14.1.0 through 14.1.2.5, 13.1.0 through 13.1.3.3, 12.1.0 through 12.1.5.1, and 11.6.1 through 11.6.5.1 suffer from Traffic Management User Interface (TMUI) arbitrary file read and command execution vulnerabilities.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T07:00:35Z",
|
||||
"updated_at": "2020-07-10T15:31:09Z",
|
||||
"updated_at": "2020-07-12T07:16:19Z",
|
||||
"pushed_at": "2020-07-10T15:31:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -979,13 +979,13 @@
|
|||
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T15:33:00Z",
|
||||
"updated_at": "2020-07-11T18:38:36Z",
|
||||
"updated_at": "2020-07-12T04:13:18Z",
|
||||
"pushed_at": "2020-07-11T18:38:34Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-7693.json
Normal file
25
2020/CVE-2020-7693.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 276879560,
|
||||
"name": "sockjs-dos-py",
|
||||
"full_name": "andsnw\/sockjs-dos-py",
|
||||
"owner": {
|
||||
"login": "andsnw",
|
||||
"id": 20721160,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20721160?v=4",
|
||||
"html_url": "https:\/\/github.com\/andsnw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/andsnw\/sockjs-dos-py",
|
||||
"description": "CVE-2020-7693: SockJS 0.3.19 Denial of Service POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-03T11:04:48Z",
|
||||
"updated_at": "2020-07-12T09:11:18Z",
|
||||
"pushed_at": "2020-07-10T01:51:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Citrix ADC Vulns",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T20:00:17Z",
|
||||
"updated_at": "2020-07-12T03:06:16Z",
|
||||
"updated_at": "2020-07-12T08:11:49Z",
|
||||
"pushed_at": "2020-07-10T21:03:20Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 28,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
16
README.md
16
README.md
|
@ -784,6 +784,14 @@ In certain situations, all versions of Citrix ShareFile StorageZones (aka storag
|
|||
|
||||
- [DimitriNL/CTX-CVE-2020-7473](https://github.com/DimitriNL/CTX-CVE-2020-7473)
|
||||
|
||||
### CVE-2020-7693
|
||||
|
||||
<code>
|
||||
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
|
||||
</code>
|
||||
|
||||
- [andsnw/sockjs-dos-py](https://github.com/andsnw/sockjs-dos-py)
|
||||
|
||||
### CVE-2020-7799
|
||||
|
||||
<code>
|
||||
|
@ -14129,14 +14137,6 @@ Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded app
|
|||
|
||||
- [tagatac/libsafe-CVE-2005-1125](https://github.com/tagatac/libsafe-CVE-2005-1125)
|
||||
|
||||
### CVE-2005-2428
|
||||
|
||||
<code>
|
||||
Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
|
||||
</code>
|
||||
|
||||
- [schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit](https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit)
|
||||
|
||||
|
||||
## 2004
|
||||
### CVE-2004-0558
|
||||
|
|
Loading…
Reference in a new issue