mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/07/05 06:09:10
This commit is contained in:
parent
553f403cf8
commit
6a5a77d08a
20 changed files with 78 additions and 234 deletions
|
@ -1,50 +1,4 @@
|
||||||
[
|
[
|
||||||
{
|
|
||||||
"id": 13021222,
|
|
||||||
"name": "debian-ssh",
|
|
||||||
"full_name": "g0tmi1k\/debian-ssh",
|
|
||||||
"owner": {
|
|
||||||
"login": "g0tmi1k",
|
|
||||||
"id": 535942,
|
|
||||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/535942?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/g0tmi1k"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/g0tmi1k\/debian-ssh",
|
|
||||||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2013-09-22T21:20:31Z",
|
|
||||||
"updated_at": "2020-06-29T01:07:51Z",
|
|
||||||
"pushed_at": "2017-04-24T14:16:56Z",
|
|
||||||
"stargazers_count": 260,
|
|
||||||
"watchers_count": 260,
|
|
||||||
"forks_count": 85,
|
|
||||||
"forks": 85,
|
|
||||||
"watchers": 260,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": 163681865,
|
|
||||||
"name": "vulnkeys",
|
|
||||||
"full_name": "avarx\/vulnkeys",
|
|
||||||
"owner": {
|
|
||||||
"login": "avarx",
|
|
||||||
"id": 1161946,
|
|
||||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1161946?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/avarx"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/avarx\/vulnkeys",
|
|
||||||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-12-31T16:09:49Z",
|
|
||||||
"updated_at": "2018-12-31T16:11:19Z",
|
|
||||||
"pushed_at": "2018-12-31T16:11:18Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 173164801,
|
"id": 173164801,
|
||||||
"name": "debian-ssh",
|
"name": "debian-ssh",
|
||||||
|
|
|
@ -1,25 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 90186634,
|
|
||||||
"name": "CVE-2008-1613",
|
|
||||||
"full_name": "SECFORCE\/CVE-2008-1613",
|
|
||||||
"owner": {
|
|
||||||
"login": "SECFORCE",
|
|
||||||
"id": 8157384,
|
|
||||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613",
|
|
||||||
"description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2017-05-03T19:39:27Z",
|
|
||||||
"updated_at": "2020-05-18T10:42:05Z",
|
|
||||||
"pushed_at": "2017-05-03T19:40:32Z",
|
|
||||||
"stargazers_count": 3,
|
|
||||||
"watchers_count": 3,
|
|
||||||
"forks_count": 9,
|
|
||||||
"forks": 9,
|
|
||||||
"watchers": 3,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -1,25 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 276735337,
|
|
||||||
"name": "AudioCaptchaBypass-CVE-2008-2019",
|
|
||||||
"full_name": "TheRook\/AudioCaptchaBypass-CVE-2008-2019",
|
|
||||||
"owner": {
|
|
||||||
"login": "TheRook",
|
|
||||||
"id": 521783,
|
|
||||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/521783?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/TheRook"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/TheRook\/AudioCaptchaBypass-CVE-2008-2019",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2020-07-02T20:04:05Z",
|
|
||||||
"updated_at": "2020-07-02T21:27:53Z",
|
|
||||||
"pushed_at": "2020-07-02T21:27:50Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -1,25 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 58223324,
|
|
||||||
"name": "sockstress",
|
|
||||||
"full_name": "marcelki\/sockstress",
|
|
||||||
"owner": {
|
|
||||||
"login": "marcelki",
|
|
||||||
"id": 8465322,
|
|
||||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8465322?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/marcelki"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/marcelki\/sockstress",
|
|
||||||
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2016-05-06T17:21:32Z",
|
|
||||||
"updated_at": "2020-06-04T09:57:06Z",
|
|
||||||
"pushed_at": "2016-07-02T18:52:16Z",
|
|
||||||
"stargazers_count": 12,
|
|
||||||
"watchers_count": 12,
|
|
||||||
"forks_count": 4,
|
|
||||||
"forks": 4,
|
|
||||||
"watchers": 12,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -1,25 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 268011635,
|
|
||||||
"name": "CVE-2008-4687-exploit",
|
|
||||||
"full_name": "nmurilo\/CVE-2008-4687-exploit",
|
|
||||||
"owner": {
|
|
||||||
"login": "nmurilo",
|
|
||||||
"id": 22617810,
|
|
||||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22617810?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/nmurilo"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/nmurilo\/CVE-2008-4687-exploit",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2020-05-30T04:53:07Z",
|
|
||||||
"updated_at": "2020-05-30T05:14:42Z",
|
|
||||||
"pushed_at": "2020-05-30T05:14:40Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-11-21T05:55:53Z",
|
"created_at": "2017-11-21T05:55:53Z",
|
||||||
"updated_at": "2020-07-04T02:35:24Z",
|
"updated_at": "2020-07-04T17:06:29Z",
|
||||||
"pushed_at": "2017-11-29T03:33:53Z",
|
"pushed_at": "2017-11-29T03:33:53Z",
|
||||||
"stargazers_count": 460,
|
"stargazers_count": 461,
|
||||||
"watchers_count": 460,
|
"watchers_count": 461,
|
||||||
"forks_count": 238,
|
"forks_count": 238,
|
||||||
"forks": 238,
|
"forks": 238,
|
||||||
"watchers": 460,
|
"watchers": 461,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -105,13 +105,13 @@
|
||||||
"description": " An exploit for Apache Struts CVE-2018-11776",
|
"description": " An exploit for Apache Struts CVE-2018-11776",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-08-25T01:53:30Z",
|
"created_at": "2018-08-25T01:53:30Z",
|
||||||
"updated_at": "2020-07-04T13:09:40Z",
|
"updated_at": "2020-07-04T18:14:22Z",
|
||||||
"pushed_at": "2018-08-26T02:31:39Z",
|
"pushed_at": "2018-08-26T02:31:39Z",
|
||||||
"stargazers_count": 289,
|
"stargazers_count": 290,
|
||||||
"watchers_count": 289,
|
"watchers_count": 290,
|
||||||
"forks_count": 100,
|
"forks_count": 100,
|
||||||
"forks": 100,
|
"forks": 100,
|
||||||
"watchers": 289,
|
"watchers": 290,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-08-21T08:40:26Z",
|
"created_at": "2019-08-21T08:40:26Z",
|
||||||
"updated_at": "2020-07-01T15:24:54Z",
|
"updated_at": "2020-07-04T15:43:00Z",
|
||||||
"pushed_at": "2020-01-11T13:55:33Z",
|
"pushed_at": "2020-01-11T13:55:33Z",
|
||||||
"stargazers_count": 319,
|
"stargazers_count": 318,
|
||||||
"watchers_count": 319,
|
"watchers_count": 318,
|
||||||
"forks_count": 127,
|
"forks_count": 127,
|
||||||
"forks": 127,
|
"forks": 127,
|
||||||
"watchers": 319,
|
"watchers": 318,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260",
|
"description": "Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-11-12T20:43:46Z",
|
"created_at": "2019-11-12T20:43:46Z",
|
||||||
"updated_at": "2020-06-10T15:13:58Z",
|
"updated_at": "2020-07-04T20:50:43Z",
|
||||||
"pushed_at": "2019-11-28T20:16:35Z",
|
"pushed_at": "2019-11-28T20:16:35Z",
|
||||||
"stargazers_count": 11,
|
"stargazers_count": 12,
|
||||||
"watchers_count": 11,
|
"watchers_count": 12,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 11,
|
"watchers": 12,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-11T00:08:27Z",
|
"created_at": "2020-01-11T00:08:27Z",
|
||||||
"updated_at": "2020-07-04T14:34:01Z",
|
"updated_at": "2020-07-04T16:37:18Z",
|
||||||
"pushed_at": "2020-01-22T20:23:51Z",
|
"pushed_at": "2020-01-22T20:23:51Z",
|
||||||
"stargazers_count": 491,
|
"stargazers_count": 492,
|
||||||
"watchers_count": 491,
|
"watchers_count": 492,
|
||||||
"forks_count": 114,
|
"forks_count": 114,
|
||||||
"forks": 114,
|
"forks": 114,
|
||||||
"watchers": 491,
|
"watchers": 492,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -63,8 +63,8 @@
|
||||||
"pushed_at": "2019-10-15T01:04:08Z",
|
"pushed_at": "2019-10-15T01:04:08Z",
|
||||||
"stargazers_count": 51,
|
"stargazers_count": 51,
|
||||||
"watchers_count": 51,
|
"watchers_count": 51,
|
||||||
"forks_count": 37,
|
"forks_count": 36,
|
||||||
"forks": 37,
|
"forks": 36,
|
||||||
"watchers": 51,
|
"watchers": 51,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -128,13 +128,13 @@
|
||||||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T23:07:41Z",
|
"created_at": "2020-01-15T23:07:41Z",
|
||||||
"updated_at": "2020-06-27T15:49:30Z",
|
"updated_at": "2020-07-04T17:51:06Z",
|
||||||
"pushed_at": "2020-01-20T23:33:19Z",
|
"pushed_at": "2020-01-20T23:33:19Z",
|
||||||
"stargazers_count": 812,
|
"stargazers_count": 811,
|
||||||
"watchers_count": 812,
|
"watchers_count": 811,
|
||||||
"forks_count": 209,
|
"forks_count": 209,
|
||||||
"forks": 209,
|
"forks": 209,
|
||||||
"watchers": 812,
|
"watchers": 811,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-16T23:22:15Z",
|
"created_at": "2020-06-16T23:22:15Z",
|
||||||
"updated_at": "2020-07-04T13:46:56Z",
|
"updated_at": "2020-07-04T18:49:33Z",
|
||||||
"pushed_at": "2020-06-17T18:10:30Z",
|
"pushed_at": "2020-06-17T18:10:30Z",
|
||||||
"stargazers_count": 61,
|
"stargazers_count": 62,
|
||||||
"watchers_count": 61,
|
"watchers_count": 62,
|
||||||
"forks_count": 21,
|
"forks_count": 22,
|
||||||
"forks": 21,
|
"forks": 22,
|
||||||
"watchers": 61,
|
"watchers": 62,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-08T07:37:49Z",
|
"created_at": "2020-06-08T07:37:49Z",
|
||||||
"updated_at": "2020-07-02T07:49:51Z",
|
"updated_at": "2020-07-04T15:48:05Z",
|
||||||
"pushed_at": "2020-06-17T13:41:23Z",
|
"pushed_at": "2020-06-17T13:41:23Z",
|
||||||
"stargazers_count": 314,
|
"stargazers_count": 315,
|
||||||
"watchers_count": 314,
|
"watchers_count": 315,
|
||||||
"forks_count": 53,
|
"forks_count": 54,
|
||||||
"forks": 53,
|
"forks": 54,
|
||||||
"watchers": 314,
|
"watchers": 315,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2020-12828 PoC and Analysis. ",
|
"description": "CVE-2020-12828 PoC and Analysis. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-30T15:18:58Z",
|
"created_at": "2020-06-30T15:18:58Z",
|
||||||
"updated_at": "2020-07-04T01:21:24Z",
|
"updated_at": "2020-07-04T15:22:41Z",
|
||||||
"pushed_at": "2020-06-30T16:03:35Z",
|
"pushed_at": "2020-06-30T16:03:35Z",
|
||||||
"stargazers_count": 21,
|
"stargazers_count": 22,
|
||||||
"watchers_count": 21,
|
"watchers_count": 22,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 21,
|
"watchers": 22,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947",
|
"description": "The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-02T16:40:52Z",
|
"created_at": "2020-07-02T16:40:52Z",
|
||||||
"updated_at": "2020-07-04T12:20:16Z",
|
"updated_at": "2020-07-04T19:27:59Z",
|
||||||
"pushed_at": "2020-07-02T16:46:10Z",
|
"pushed_at": "2020-07-02T16:46:10Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 5,
|
"watchers_count": 6,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 5,
|
"watchers": 6,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2020-5902",
|
"description": "CVE-2020-5902",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-04T14:12:57Z",
|
"created_at": "2020-07-04T14:12:57Z",
|
||||||
"updated_at": "2020-07-04T14:21:29Z",
|
"updated_at": "2020-07-04T19:10:37Z",
|
||||||
"pushed_at": "2020-07-04T14:21:27Z",
|
"pushed_at": "2020-07-04T14:21:27Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 0,
|
"watchers_count": 2,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Hacking Artifactory with server side template injection",
|
"description": "Hacking Artifactory with server side template injection",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T13:56:43Z",
|
"created_at": "2020-03-11T13:56:43Z",
|
||||||
"updated_at": "2020-03-17T12:38:31Z",
|
"updated_at": "2020-07-04T21:00:01Z",
|
||||||
"pushed_at": "2020-03-12T06:55:39Z",
|
"pushed_at": "2020-03-12T06:55:39Z",
|
||||||
"stargazers_count": 14,
|
"stargazers_count": 15,
|
||||||
"watchers_count": 14,
|
"watchers_count": 15,
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"forks": 5,
|
"forks": 5,
|
||||||
"watchers": 14,
|
"watchers": 15,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -44,5 +44,28 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 277140244,
|
||||||
|
"name": "Rick_write_exp_CVE-2020-8835",
|
||||||
|
"full_name": "snappyJack\/Rick_write_exp_CVE-2020-8835",
|
||||||
|
"owner": {
|
||||||
|
"login": "snappyJack",
|
||||||
|
"id": 16055573,
|
||||||
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16055573?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/snappyJack"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/snappyJack\/Rick_write_exp_CVE-2020-8835",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2020-07-04T15:51:14Z",
|
||||||
|
"updated_at": "2020-07-04T16:40:22Z",
|
||||||
|
"pushed_at": "2020-07-04T16:40:18Z",
|
||||||
|
"stargazers_count": 1,
|
||||||
|
"watchers_count": 1,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 1,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
35
README.md
35
README.md
|
@ -885,6 +885,7 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di
|
||||||
|
|
||||||
- [Prabhashaka/IT19147192-CVE-2020-8835](https://github.com/Prabhashaka/IT19147192-CVE-2020-8835)
|
- [Prabhashaka/IT19147192-CVE-2020-8835](https://github.com/Prabhashaka/IT19147192-CVE-2020-8835)
|
||||||
- [socketcall/CVE-2020-8835](https://github.com/socketcall/CVE-2020-8835)
|
- [socketcall/CVE-2020-8835](https://github.com/socketcall/CVE-2020-8835)
|
||||||
|
- [snappyJack/Rick_write_exp_CVE-2020-8835](https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835)
|
||||||
|
|
||||||
### CVE-2020-8840
|
### CVE-2020-8840
|
||||||
|
|
||||||
|
@ -13770,8 +13771,6 @@ The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apach
|
||||||
OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
|
OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh)
|
|
||||||
- [avarx/vulnkeys](https://github.com/avarx/vulnkeys)
|
|
||||||
- [nu11secur1ty/debian-ssh](https://github.com/nu11secur1ty/debian-ssh)
|
- [nu11secur1ty/debian-ssh](https://github.com/nu11secur1ty/debian-ssh)
|
||||||
|
|
||||||
### CVE-2008-0228
|
### CVE-2008-0228
|
||||||
|
@ -13790,22 +13789,6 @@ Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote atta
|
||||||
|
|
||||||
- [Axua/CVE-2008-1611](https://github.com/Axua/CVE-2008-1611)
|
- [Axua/CVE-2008-1611](https://github.com/Axua/CVE-2008-1611)
|
||||||
|
|
||||||
### CVE-2008-1613
|
|
||||||
|
|
||||||
<code>
|
|
||||||
SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [SECFORCE/CVE-2008-1613](https://github.com/SECFORCE/CVE-2008-1613)
|
|
||||||
|
|
||||||
### CVE-2008-2019
|
|
||||||
|
|
||||||
<code>
|
|
||||||
Simple Machines Forum (SMF), probably 1.1.4, relies on "randomly generated static" to hinder brute-force attacks on the WAV file (aka audio) CAPTCHA, which allows remote attackers to pass the CAPTCHA test via an automated attack that considers Hamming distances. NOTE: this issue reportedly exists because of an insufficient fix for CVE-2007-3308.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [TheRook/AudioCaptchaBypass-CVE-2008-2019](https://github.com/TheRook/AudioCaptchaBypass-CVE-2008-2019)
|
|
||||||
|
|
||||||
### CVE-2008-2938
|
### CVE-2008-2938
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
@ -13822,14 +13805,6 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
|
||||||
|
|
||||||
- [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts)
|
- [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts)
|
||||||
|
|
||||||
### CVE-2008-4609
|
|
||||||
|
|
||||||
<code>
|
|
||||||
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [marcelki/sockstress](https://github.com/marcelki/sockstress)
|
|
||||||
|
|
||||||
### CVE-2008-4654
|
### CVE-2008-4654
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
@ -13839,14 +13814,6 @@ Stack-based buffer overflow in the parse_master function in the Ty demux plugin
|
||||||
- [bongbongco/CVE-2008-4654](https://github.com/bongbongco/CVE-2008-4654)
|
- [bongbongco/CVE-2008-4654](https://github.com/bongbongco/CVE-2008-4654)
|
||||||
- [KernelErr/VLC-CVE-2008-4654-Exploit](https://github.com/KernelErr/VLC-CVE-2008-4654-Exploit)
|
- [KernelErr/VLC-CVE-2008-4654-Exploit](https://github.com/KernelErr/VLC-CVE-2008-4654-Exploit)
|
||||||
|
|
||||||
### CVE-2008-4687
|
|
||||||
|
|
||||||
<code>
|
|
||||||
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [nmurilo/CVE-2008-4687-exploit](https://github.com/nmurilo/CVE-2008-4687-exploit)
|
|
||||||
|
|
||||||
### CVE-2008-5416
|
### CVE-2008-5416
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
|
Loading…
Reference in a new issue