mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 10:04:09 +01:00
Auto Update 2020/08/16 12:11:09
This commit is contained in:
parent
a6f954bd82
commit
74222fb1c4
19 changed files with 68 additions and 101 deletions
|
@ -1,25 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 133421791,
|
|
||||||
"name": "CVE-2002-0200",
|
|
||||||
"full_name": "alt3kx\/CVE-2002-0200",
|
|
||||||
"owner": {
|
|
||||||
"login": "alt3kx",
|
|
||||||
"id": 3140111,
|
|
||||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/alt3kx"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0200",
|
|
||||||
"description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-05-14T21:09:20Z",
|
|
||||||
"updated_at": "2018-05-14T21:49:15Z",
|
|
||||||
"pushed_at": "2018-05-14T21:49:14Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-08-15T10:41:28Z",
|
"updated_at": "2020-08-16T00:36:16Z",
|
||||||
"pushed_at": "2020-07-30T05:31:08Z",
|
"pushed_at": "2020-07-30T05:31:08Z",
|
||||||
"stargazers_count": 639,
|
"stargazers_count": 640,
|
||||||
"watchers_count": 639,
|
"watchers_count": 640,
|
||||||
"forks_count": 152,
|
"forks_count": 152,
|
||||||
"forks": 152,
|
"forks": 152,
|
||||||
"watchers": 639,
|
"watchers": 640,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-08-15T10:41:28Z",
|
"updated_at": "2020-08-16T00:36:16Z",
|
||||||
"pushed_at": "2020-07-30T05:31:08Z",
|
"pushed_at": "2020-07-30T05:31:08Z",
|
||||||
"stargazers_count": 639,
|
"stargazers_count": 640,
|
||||||
"watchers_count": 639,
|
"watchers_count": 640,
|
||||||
"forks_count": 152,
|
"forks_count": 152,
|
||||||
"forks": 152,
|
"forks": 152,
|
||||||
"watchers": 639,
|
"watchers": 640,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-08-15T10:41:28Z",
|
"updated_at": "2020-08-16T00:36:16Z",
|
||||||
"pushed_at": "2020-07-30T05:31:08Z",
|
"pushed_at": "2020-07-30T05:31:08Z",
|
||||||
"stargazers_count": 639,
|
"stargazers_count": 640,
|
||||||
"watchers_count": 639,
|
"watchers_count": 640,
|
||||||
"forks_count": 152,
|
"forks_count": 152,
|
||||||
"forks": 152,
|
"forks": 152,
|
||||||
"watchers": 639,
|
"watchers": 640,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -450,13 +450,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-08-15T10:41:28Z",
|
"updated_at": "2020-08-16T00:36:16Z",
|
||||||
"pushed_at": "2020-07-30T05:31:08Z",
|
"pushed_at": "2020-07-30T05:31:08Z",
|
||||||
"stargazers_count": 639,
|
"stargazers_count": 640,
|
||||||
"watchers_count": 639,
|
"watchers_count": 640,
|
||||||
"forks_count": 152,
|
"forks_count": 152,
|
||||||
"forks": 152,
|
"forks": 152,
|
||||||
"watchers": 639,
|
"watchers": 640,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-08-13T13:25:54Z",
|
"pushed_at": "2020-08-13T13:25:54Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 8,
|
||||||
"forks": 0,
|
"forks": 8,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -63,8 +63,8 @@
|
||||||
"pushed_at": "2019-11-30T10:28:01Z",
|
"pushed_at": "2019-11-30T10:28:01Z",
|
||||||
"stargazers_count": 123,
|
"stargazers_count": 123,
|
||||||
"watchers_count": 123,
|
"watchers_count": 123,
|
||||||
"forks_count": 67,
|
"forks_count": 68,
|
||||||
"forks": 67,
|
"forks": 68,
|
||||||
"watchers": 123,
|
"watchers": 123,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-13T14:53:54Z",
|
"created_at": "2020-03-13T14:53:54Z",
|
||||||
"updated_at": "2020-08-12T19:13:39Z",
|
"updated_at": "2020-08-16T00:29:03Z",
|
||||||
"pushed_at": "2020-03-22T19:46:04Z",
|
"pushed_at": "2020-03-22T19:46:04Z",
|
||||||
"stargazers_count": 166,
|
"stargazers_count": 167,
|
||||||
"watchers_count": 166,
|
"watchers_count": 167,
|
||||||
"forks_count": 52,
|
"forks_count": 52,
|
||||||
"forks": 52,
|
"forks": 52,
|
||||||
"watchers": 166,
|
"watchers": 167,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -151,13 +151,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-08-15T10:41:28Z",
|
"updated_at": "2020-08-16T00:36:16Z",
|
||||||
"pushed_at": "2020-07-30T05:31:08Z",
|
"pushed_at": "2020-07-30T05:31:08Z",
|
||||||
"stargazers_count": 639,
|
"stargazers_count": 640,
|
||||||
"watchers_count": 639,
|
"watchers_count": 640,
|
||||||
"forks_count": 152,
|
"forks_count": 152,
|
||||||
"forks": 152,
|
"forks": 152,
|
||||||
"watchers": 639,
|
"watchers": 640,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1094,13 +1094,13 @@
|
||||||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-20T14:35:48Z",
|
"created_at": "2020-04-20T14:35:48Z",
|
||||||
"updated_at": "2020-08-12T11:28:10Z",
|
"updated_at": "2020-08-16T00:00:36Z",
|
||||||
"pushed_at": "2020-06-09T20:46:45Z",
|
"pushed_at": "2020-06-09T20:46:45Z",
|
||||||
"stargazers_count": 304,
|
"stargazers_count": 305,
|
||||||
"watchers_count": 304,
|
"watchers_count": 305,
|
||||||
"forks_count": 98,
|
"forks_count": 98,
|
||||||
"forks": 98,
|
"forks": 98,
|
||||||
"watchers": 304,
|
"watchers": 305,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1351,8 +1351,8 @@
|
||||||
"pushed_at": "2020-06-19T20:58:36Z",
|
"pushed_at": "2020-06-19T20:58:36Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 18,
|
||||||
"watchers_count": 18,
|
"watchers_count": 18,
|
||||||
"forks_count": 5,
|
"forks_count": 6,
|
||||||
"forks": 5,
|
"forks": 6,
|
||||||
"watchers": 18,
|
"watchers": 18,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
|
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-04T00:50:42Z",
|
"created_at": "2020-04-04T00:50:42Z",
|
||||||
"updated_at": "2020-08-12T16:27:01Z",
|
"updated_at": "2020-08-16T02:11:52Z",
|
||||||
"pushed_at": "2020-05-10T22:35:46Z",
|
"pushed_at": "2020-05-10T22:35:46Z",
|
||||||
"stargazers_count": 19,
|
"stargazers_count": 20,
|
||||||
"watchers_count": 19,
|
"watchers_count": 20,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 19,
|
"watchers": 20,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-21T08:01:20Z",
|
"created_at": "2020-07-21T08:01:20Z",
|
||||||
"updated_at": "2020-08-15T18:45:27Z",
|
"updated_at": "2020-08-15T23:59:58Z",
|
||||||
"pushed_at": "2020-07-21T10:28:42Z",
|
"pushed_at": "2020-07-21T10:28:42Z",
|
||||||
"stargazers_count": 111,
|
"stargazers_count": 112,
|
||||||
"watchers_count": 111,
|
"watchers_count": 112,
|
||||||
"forks_count": 18,
|
"forks_count": 19,
|
||||||
"forks": 18,
|
"forks": 19,
|
||||||
"watchers": 111,
|
"watchers": 112,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -82,13 +82,13 @@
|
||||||
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-08-12T10:05:36Z",
|
"created_at": "2020-08-12T10:05:36Z",
|
||||||
"updated_at": "2020-08-15T03:55:19Z",
|
"updated_at": "2020-08-16T01:47:02Z",
|
||||||
"pushed_at": "2020-08-13T07:16:12Z",
|
"pushed_at": "2020-08-13T07:16:12Z",
|
||||||
"stargazers_count": 96,
|
"stargazers_count": 97,
|
||||||
"watchers_count": 96,
|
"watchers_count": 97,
|
||||||
"forks_count": 24,
|
"forks_count": 24,
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 96,
|
"watchers": 97,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-08-04T20:14:54Z",
|
"pushed_at": "2020-08-04T20:14:54Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 3,
|
"watchers_count": 3,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 3,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-08-15T10:41:28Z",
|
"updated_at": "2020-08-16T00:36:16Z",
|
||||||
"pushed_at": "2020-07-30T05:31:08Z",
|
"pushed_at": "2020-07-30T05:31:08Z",
|
||||||
"stargazers_count": 639,
|
"stargazers_count": 640,
|
||||||
"watchers_count": 639,
|
"watchers_count": 640,
|
||||||
"forks_count": 152,
|
"forks_count": 152,
|
||||||
"forks": 152,
|
"forks": 152,
|
||||||
"watchers": 639,
|
"watchers": 640,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-15T15:20:09Z",
|
"created_at": "2020-07-15T15:20:09Z",
|
||||||
"updated_at": "2020-08-14T02:54:47Z",
|
"updated_at": "2020-08-16T02:14:08Z",
|
||||||
"pushed_at": "2020-07-23T19:45:25Z",
|
"pushed_at": "2020-07-23T19:45:25Z",
|
||||||
"stargazers_count": 114,
|
"stargazers_count": 115,
|
||||||
"watchers_count": 114,
|
"watchers_count": 115,
|
||||||
"forks_count": 38,
|
"forks_count": 38,
|
||||||
"forks": 38,
|
"forks": 38,
|
||||||
"watchers": 114,
|
"watchers": 115,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-08-15T07:42:50Z",
|
"created_at": "2020-08-15T07:42:50Z",
|
||||||
"updated_at": "2020-08-15T17:44:14Z",
|
"updated_at": "2020-08-15T21:49:19Z",
|
||||||
"pushed_at": "2020-08-15T10:17:21Z",
|
"pushed_at": "2020-08-15T10:17:21Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "Pi-hole Remote Code Execution authenticated Version >= 4.3.2",
|
"description": "Pi-hole Remote Code Execution authenticated Version >= 4.3.2",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-08-04T10:23:28Z",
|
"created_at": "2020-08-04T10:23:28Z",
|
||||||
"updated_at": "2020-08-14T19:08:37Z",
|
"updated_at": "2020-08-16T02:14:30Z",
|
||||||
"pushed_at": "2020-08-05T22:38:53Z",
|
"pushed_at": "2020-08-05T22:38:53Z",
|
||||||
"stargazers_count": 7,
|
"stargazers_count": 8,
|
||||||
"watchers_count": 7,
|
"watchers_count": 8,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 7,
|
"watchers": 8,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,8 +13,8 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-08-15T14:29:49Z",
|
"created_at": "2020-08-15T14:29:49Z",
|
||||||
"updated_at": "2020-08-15T14:50:55Z",
|
"updated_at": "2020-08-16T01:04:03Z",
|
||||||
"pushed_at": "2020-08-15T14:50:53Z",
|
"pushed_at": "2020-08-16T01:04:01Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -14766,14 +14766,6 @@ Directory traversal vulnerability in UnZip 5.50 allows attackers to overwrite ar
|
||||||
|
|
||||||
|
|
||||||
## 2002
|
## 2002
|
||||||
### CVE-2002-0200
|
|
||||||
|
|
||||||
<code>
|
|
||||||
Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [alt3kx/CVE-2002-0200](https://github.com/alt3kx/CVE-2002-0200)
|
|
||||||
|
|
||||||
### CVE-2002-0201
|
### CVE-2002-0201
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
|
Loading…
Add table
Reference in a new issue