mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/04/23 12:16:30
This commit is contained in:
parent
d9e78059f6
commit
7804b236b7
49 changed files with 267 additions and 1893 deletions
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-06-20T09:37:58Z",
|
||||
"updated_at": "2022-04-14T11:48:26Z",
|
||||
"updated_at": "2022-04-23T10:14:48Z",
|
||||
"pushed_at": "2020-08-20T11:02:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"forks_count": 113,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"forks": 112,
|
||||
"watchers": 317,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"forks_count": 113,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"forks": 112,
|
||||
"watchers": 317,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 42,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"forks": 43,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -74,10 +74,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2022-04-23T04:49:49Z",
|
||||
"updated_at": "2022-04-23T08:43:41Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 518,
|
||||
"watchers_count": 518,
|
||||
"stargazers_count": 520,
|
||||
"watchers_count": 520,
|
||||
"forks_count": 171,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 171,
|
||||
"watchers": 518,
|
||||
"watchers": 520,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1705,17 +1705,17 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2022-04-20T17:03:21Z",
|
||||
"updated_at": "2022-04-23T11:42:56Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1114,
|
||||
"watchers_count": 1114,
|
||||
"stargazers_count": 1113,
|
||||
"watchers_count": 1113,
|
||||
"forks_count": 356,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 356,
|
||||
"watchers": 1114,
|
||||
"watchers": 1113,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-04-22T06:06:52Z",
|
||||
"updated_at": "2022-04-23T10:48:43Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3271,
|
||||
"watchers_count": 3271,
|
||||
"stargazers_count": 3272,
|
||||
"watchers_count": 3272,
|
||||
"forks_count": 973,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 973,
|
||||
"watchers": 3271,
|
||||
"watchers": 3272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2022-04-20T10:43:33Z",
|
||||
"updated_at": "2022-04-23T07:34:55Z",
|
||||
"pushed_at": "2022-01-05T04:09:42Z",
|
||||
"stargazers_count": 578,
|
||||
"watchers_count": 578,
|
||||
"stargazers_count": 579,
|
||||
"watchers_count": 579,
|
||||
"forks_count": 154,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 154,
|
||||
"watchers": 578,
|
||||
"watchers": 579,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2020/CVE-2020-0137.json
Normal file
29
2020/CVE-2020-0137.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 484673073,
|
||||
"name": "framework_base_AOSP10_r33_CVE-2020-0137",
|
||||
"full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2020-0137",
|
||||
"owner": {
|
||||
"login": "nanopathi",
|
||||
"id": 26024136,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
|
||||
"html_url": "https:\/\/github.com\/nanopathi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2020-0137",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-23T07:02:41Z",
|
||||
"updated_at": "2022-04-23T07:23:26Z",
|
||||
"pushed_at": "2022-04-23T07:22:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 484687788,
|
||||
"name": "framework_base_AOSP10_r33_CVE-2020-0401",
|
||||
"full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2020-0401",
|
||||
"owner": {
|
||||
"login": "nanopathi",
|
||||
"id": 26024136,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
|
||||
"html_url": "https:\/\/github.com\/nanopathi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2020-0401",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-23T08:17:35Z",
|
||||
"updated_at": "2022-04-23T09:43:07Z",
|
||||
"pushed_at": "2022-04-23T09:42:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1649,65 +1649,6 @@
|
|||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277568818,
|
||||
"name": "SMBGhost-SMBleed-scanner",
|
||||
"full_name": "ZecOps\/SMBGhost-SMBleed-scanner",
|
||||
"owner": {
|
||||
"login": "ZecOps",
|
||||
"id": 31035096,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31035096?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZecOps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZecOps\/SMBGhost-SMBleed-scanner",
|
||||
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T14:45:07Z",
|
||||
"updated_at": "2021-12-29T11:15:53Z",
|
||||
"pushed_at": "2020-07-06T19:00:06Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2020-0796",
|
||||
"cve-2020-1206",
|
||||
"smbghost",
|
||||
"smbleed"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279475059,
|
||||
"name": "smbghost-5",
|
||||
"full_name": "5l1v3r1\/smbghost-5",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/smbghost-5",
|
||||
"description": "CVE-2020-0796. Smbghost Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-14T03:49:09Z",
|
||||
"updated_at": "2021-02-05T22:53:54Z",
|
||||
"pushed_at": "2020-07-12T09:59:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296190446,
|
||||
"name": "CVE-2020-0796-BOF",
|
||||
|
@ -2095,33 +2036,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435273567,
|
||||
"name": "CVE-2020-0796-PoC-3",
|
||||
"full_name": "5l1v3r1\/CVE-2020-0796-PoC-3",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0796-PoC-3",
|
||||
"description": " CVE-2020-0796 - a wormable SMBv3 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-05T20:38:58Z",
|
||||
"updated_at": "2021-12-15T13:13:03Z",
|
||||
"pushed_at": "2020-03-12T13:12:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 474851127,
|
||||
"name": "ECE9069_SMBGhost_Exploit_CVE-2020-0796-",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 300210711,
|
||||
"name": "CVE-2020-10205",
|
||||
"full_name": "5l1v3r1\/CVE-2020-10205",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-10205",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-01T08:49:47Z",
|
||||
"updated_at": "2021-01-30T16:15:20Z",
|
||||
"pushed_at": "2020-04-17T04:00:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -30,60 +30,6 @@
|
|||
"watchers": 145,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277048370,
|
||||
"name": "CVE-2020-1206-Exploit",
|
||||
"full_name": "Info-Security-Solution-Kolkata\/CVE-2020-1206-Exploit",
|
||||
"owner": {
|
||||
"login": "Info-Security-Solution-Kolkata",
|
||||
"id": 67817658,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67817658?v=4",
|
||||
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata\/CVE-2020-1206-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T05:54:58Z",
|
||||
"updated_at": "2020-07-04T05:54:58Z",
|
||||
"pushed_at": "2020-07-04T05:54:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277049855,
|
||||
"name": "Smbleed-CVE-2020-1206-Exploit",
|
||||
"full_name": "Info-Security-Solution-Kolkata\/Smbleed-CVE-2020-1206-Exploit",
|
||||
"owner": {
|
||||
"login": "Info-Security-Solution-Kolkata",
|
||||
"id": 67817658,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67817658?v=4",
|
||||
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata\/Smbleed-CVE-2020-1206-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T06:06:52Z",
|
||||
"updated_at": "2020-07-04T06:06:52Z",
|
||||
"pushed_at": "2020-07-04T06:06:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 327546936,
|
||||
"name": "CVE-2020-1206",
|
||||
|
|
|
@ -181,33 +181,6 @@
|
|||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279961698,
|
||||
"name": "dRMM-CVE-2020-1350-response",
|
||||
"full_name": "jmaddington\/dRMM-CVE-2020-1350-response",
|
||||
"owner": {
|
||||
"login": "jmaddington",
|
||||
"id": 2353597,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
|
||||
"html_url": "https:\/\/github.com\/jmaddington"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response",
|
||||
"description": "Windows registry mitigation response to CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T19:43:39Z",
|
||||
"updated_at": "2020-10-10T20:38:31Z",
|
||||
"pushed_at": "2020-07-15T19:59:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279999285,
|
||||
"name": "CVE-2020-1350-DoS",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 277377386,
|
||||
"name": "CVE-2020-13640",
|
||||
"full_name": "asterite3\/CVE-2020-13640",
|
||||
"owner": {
|
||||
"login": "asterite3",
|
||||
"id": 5569241,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5569241?v=4",
|
||||
"html_url": "https:\/\/github.com\/asterite3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/asterite3\/CVE-2020-13640",
|
||||
"description": "CVE-2020-13640 - SQL injection in wpDiscuz WordPress plugin <= 5.3.5",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T20:22:16Z",
|
||||
"updated_at": "2020-07-29T06:32:34Z",
|
||||
"pushed_at": "2020-07-05T20:24:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-08-01T12:25:59Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
|
|
29
2020/CVE-2020-14356.json
Normal file
29
2020/CVE-2020-14356.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 484669847,
|
||||
"name": "linux-4.19.72_CVE-2020-14356",
|
||||
"full_name": "ShaikUsaf\/linux-4.19.72_CVE-2020-14356",
|
||||
"owner": {
|
||||
"login": "ShaikUsaf",
|
||||
"id": 100413972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf\/linux-4.19.72_CVE-2020-14356",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-23T06:45:44Z",
|
||||
"updated_at": "2022-04-23T07:00:03Z",
|
||||
"pushed_at": "2022-04-23T06:57:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-04-22T06:06:52Z",
|
||||
"updated_at": "2022-04-23T10:48:43Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3271,
|
||||
"watchers_count": 3271,
|
||||
"stargazers_count": 3272,
|
||||
"watchers_count": 3272,
|
||||
"forks_count": 973,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 973,
|
||||
"watchers": 3271,
|
||||
"watchers": 3272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 276697965,
|
||||
"name": "CVE-2020-14947",
|
||||
"full_name": "mhaskar\/CVE-2020-14947",
|
||||
"owner": {
|
||||
"login": "mhaskar",
|
||||
"id": 6861215,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
|
||||
"html_url": "https:\/\/github.com\/mhaskar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2020-14947",
|
||||
"description": "The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-02T16:40:52Z",
|
||||
"updated_at": "2021-12-22T06:41:55Z",
|
||||
"pushed_at": "2020-07-02T16:46:10Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 277557089,
|
||||
"name": "cve-2020-1764-poc",
|
||||
"full_name": "jpts\/cve-2020-1764-poc",
|
||||
"owner": {
|
||||
"login": "jpts",
|
||||
"id": 5352661,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5352661?v=4",
|
||||
"html_url": "https:\/\/github.com\/jpts"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jpts\/cve-2020-1764-poc",
|
||||
"description": "Auth Bypass PoC for Kiali",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T13:59:52Z",
|
||||
"updated_at": "2020-09-21T13:51:22Z",
|
||||
"pushed_at": "2020-07-06T14:02:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -26,60 +26,6 @@
|
|||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277021315,
|
||||
"name": "Dubbo-CVE-2020-1948",
|
||||
"full_name": "txrw\/Dubbo-CVE-2020-1948",
|
||||
"owner": {
|
||||
"login": "txrw",
|
||||
"id": 32354358,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32354358?v=4",
|
||||
"html_url": "https:\/\/github.com\/txrw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/txrw\/Dubbo-CVE-2020-1948",
|
||||
"description": "Apache Dubbo CVE-2020-1948 漏洞测试环境,亲测可用。",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T02:06:28Z",
|
||||
"updated_at": "2021-01-10T06:10:22Z",
|
||||
"pushed_at": "2020-07-03T02:46:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278242568,
|
||||
"name": "cve-2020-1948-poc",
|
||||
"full_name": "M3g4Byt3\/cve-2020-1948-poc",
|
||||
"owner": {
|
||||
"login": "M3g4Byt3",
|
||||
"id": 25048908,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25048908?v=4",
|
||||
"html_url": "https:\/\/github.com\/M3g4Byt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M3g4Byt3\/cve-2020-1948-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T02:27:54Z",
|
||||
"updated_at": "2022-01-06T08:36:41Z",
|
||||
"pushed_at": "2020-07-02T10:03:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279463521,
|
||||
"name": "Dubbo-deserialization",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC DoS CVE-2020-36109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-13T16:03:36Z",
|
||||
"updated_at": "2022-04-11T10:13:18Z",
|
||||
"updated_at": "2022-04-23T09:43:20Z",
|
||||
"pushed_at": "2021-02-15T09:25:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,32 +25,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 319340829,
|
||||
"name": "CVE-2020-5509",
|
||||
"full_name": "5l1v3r1\/CVE-2020-5509",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-5509",
|
||||
"description": "Car Rental Project v.1.0 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-07T14:13:15Z",
|
||||
"updated_at": "2021-08-06T01:59:53Z",
|
||||
"pushed_at": "2020-01-05T22:23:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 277122836,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "dwisiswant0\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "dwisiswant0",
|
||||
"id": 25837540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
|
||||
"html_url": "https:\/\/github.com\/dwisiswant0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dwisiswant0\/CVE-2020-5902",
|
||||
"description": "CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T14:12:57Z",
|
||||
"updated_at": "2021-05-10T22:58:02Z",
|
||||
"pushed_at": "2020-07-04T14:21:27Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277243283,
|
||||
"name": "CVE-2020-5902-Scanner",
|
||||
|
@ -86,141 +59,6 @@
|
|||
"watchers": 361,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277342677,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "ar0dd\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "ar0dd",
|
||||
"id": 42455358,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42455358?v=4",
|
||||
"html_url": "https:\/\/github.com\/ar0dd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ar0dd\/CVE-2020-5902",
|
||||
"description": "POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:36Z",
|
||||
"updated_at": "2021-03-05T14:05:58Z",
|
||||
"pushed_at": "2020-07-05T16:44:03Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277346592,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "yassineaboukir\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "yassineaboukir",
|
||||
"id": 9937267,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9937267?v=4",
|
||||
"html_url": "https:\/\/github.com\/yassineaboukir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yassineaboukir\/CVE-2020-5902",
|
||||
"description": "Proof of concept for CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T17:01:27Z",
|
||||
"updated_at": "2022-02-19T13:35:53Z",
|
||||
"pushed_at": "2020-07-06T17:47:17Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277354676,
|
||||
"name": "CVE-2020-5902-NSE",
|
||||
"full_name": "rwincey\/CVE-2020-5902-NSE",
|
||||
"owner": {
|
||||
"login": "rwincey",
|
||||
"id": 5438659,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5438659?v=4",
|
||||
"html_url": "https:\/\/github.com\/rwincey"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rwincey\/CVE-2020-5902-NSE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T17:51:38Z",
|
||||
"updated_at": "2021-09-30T13:33:15Z",
|
||||
"pushed_at": "2020-07-06T17:10:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277360749,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "Un4gi\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "Un4gi",
|
||||
"id": 47873286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47873286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Un4gi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Un4gi\/CVE-2020-5902",
|
||||
"description": "Proof of Concept for CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T18:29:37Z",
|
||||
"updated_at": "2020-09-05T23:07:17Z",
|
||||
"pushed_at": "2020-07-08T21:44:17Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277376523,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "nsflabs\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "nsflabs",
|
||||
"id": 64648766,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64648766?v=4",
|
||||
"html_url": "https:\/\/github.com\/nsflabs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nsflabs\/CVE-2020-5902",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T20:16:07Z",
|
||||
"updated_at": "2021-12-15T14:39:45Z",
|
||||
"pushed_at": "2020-07-05T20:32:18Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277412358,
|
||||
"name": "CVE-2020-5902",
|
||||
|
@ -255,33 +93,6 @@
|
|||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277422712,
|
||||
"name": "RCE-CVE-2020-5902",
|
||||
"full_name": "JSec1337\/RCE-CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "JSec1337",
|
||||
"id": 62246378,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62246378?v=4",
|
||||
"html_url": "https:\/\/github.com\/JSec1337"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JSec1337\/RCE-CVE-2020-5902",
|
||||
"description": "BIG-IP F5 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T02:21:18Z",
|
||||
"updated_at": "2021-12-01T00:39:47Z",
|
||||
"pushed_at": "2020-07-06T02:53:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277438754,
|
||||
"name": "CVE-2020-5902",
|
||||
|
@ -309,357 +120,6 @@
|
|||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277448062,
|
||||
"name": "cve-2020-5902",
|
||||
"full_name": "r0ttenbeef\/cve-2020-5902",
|
||||
"owner": {
|
||||
"login": "r0ttenbeef",
|
||||
"id": 48027449,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48027449?v=4",
|
||||
"html_url": "https:\/\/github.com\/r0ttenbeef"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r0ttenbeef\/cve-2020-5902",
|
||||
"description": "cve-2020-5902 POC exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T05:11:37Z",
|
||||
"updated_at": "2022-03-23T10:36:40Z",
|
||||
"pushed_at": "2020-07-06T22:35:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277463829,
|
||||
"name": "CVE-2020-5902_RCE",
|
||||
"full_name": "sv3nbeast\/CVE-2020-5902_RCE",
|
||||
"owner": {
|
||||
"login": "sv3nbeast",
|
||||
"id": 55974091,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55974091?v=4",
|
||||
"html_url": "https:\/\/github.com\/sv3nbeast"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-5902_RCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T06:45:21Z",
|
||||
"updated_at": "2020-07-08T03:03:42Z",
|
||||
"pushed_at": "2020-07-06T09:18:11Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277466351,
|
||||
"name": "scanner-CVE-2020-5902",
|
||||
"full_name": "cybersecurityworks553\/scanner-CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "cybersecurityworks553",
|
||||
"id": 63910792,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
|
||||
"html_url": "https:\/\/github.com\/cybersecurityworks553"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cybersecurityworks553\/scanner-CVE-2020-5902",
|
||||
"description": "CVE-2020-5902 scanner",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T06:58:29Z",
|
||||
"updated_at": "2021-10-06T13:26:18Z",
|
||||
"pushed_at": "2020-07-06T07:16:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277496316,
|
||||
"name": "CVE-2020-5902-POC-EXP",
|
||||
"full_name": "lijiaxing1997\/CVE-2020-5902-POC-EXP",
|
||||
"owner": {
|
||||
"login": "lijiaxing1997",
|
||||
"id": 34918652,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34918652?v=4",
|
||||
"html_url": "https:\/\/github.com\/lijiaxing1997"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lijiaxing1997\/CVE-2020-5902-POC-EXP",
|
||||
"description": "批量扫描CVE-2020-5902,远程代码执行,已测试",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T09:16:36Z",
|
||||
"updated_at": "2021-07-06T04:53:24Z",
|
||||
"pushed_at": "2020-07-09T09:24:55Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277513237,
|
||||
"name": "poc-CVE-2020-5902",
|
||||
"full_name": "qlkwej\/poc-CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "qlkwej",
|
||||
"id": 25258929,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25258929?v=4",
|
||||
"html_url": "https:\/\/github.com\/qlkwej"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qlkwej\/poc-CVE-2020-5902",
|
||||
"description": "dummy poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T10:36:07Z",
|
||||
"updated_at": "2020-07-07T02:31:59Z",
|
||||
"pushed_at": "2020-07-06T10:41:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277549906,
|
||||
"name": "F5-BIG-IP-CVE-2020-5902",
|
||||
"full_name": "Zinkuth\/F5-BIG-IP-CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "Zinkuth",
|
||||
"id": 36253549,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36253549?v=4",
|
||||
"html_url": "https:\/\/github.com\/Zinkuth"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Zinkuth\/F5-BIG-IP-CVE-2020-5902",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T13:30:44Z",
|
||||
"updated_at": "2020-07-06T13:47:41Z",
|
||||
"pushed_at": "2020-07-06T13:40:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277567865,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "0xAbdullah\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "0xAbdullah",
|
||||
"id": 29471278,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29471278?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xAbdullah"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xAbdullah\/CVE-2020-5902",
|
||||
"description": "Python script to check CVE-2020-5902 (F5 BIG-IP devices).",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T14:41:29Z",
|
||||
"updated_at": "2020-07-07T12:48:34Z",
|
||||
"pushed_at": "2020-07-07T12:48:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277584668,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "jinnywc\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "jinnywc",
|
||||
"id": 30540295,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30540295?v=4",
|
||||
"html_url": "https:\/\/github.com\/jinnywc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jinnywc\/CVE-2020-5902",
|
||||
"description": "CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T15:49:46Z",
|
||||
"updated_at": "2020-07-06T15:55:37Z",
|
||||
"pushed_at": "2020-07-06T15:53:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277626606,
|
||||
"name": "F5-Patch",
|
||||
"full_name": "GoodiesHQ\/F5-Patch",
|
||||
"owner": {
|
||||
"login": "GoodiesHQ",
|
||||
"id": 4576046,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4576046?v=4",
|
||||
"html_url": "https:\/\/github.com\/GoodiesHQ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GoodiesHQ\/F5-Patch",
|
||||
"description": "Patch F5 appliance CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T19:07:33Z",
|
||||
"updated_at": "2020-07-06T19:07:34Z",
|
||||
"pushed_at": "2020-07-06T19:07:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277692329,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "jiansiting\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "jiansiting",
|
||||
"id": 28823754,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiansiting"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2020-5902",
|
||||
"description": "F5 BIG-IP Scanner (CVE-2020-5902)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T02:03:39Z",
|
||||
"updated_at": "2021-10-26T09:25:22Z",
|
||||
"pushed_at": "2020-07-07T02:03:40Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277704969,
|
||||
"name": "CVE-2020-5902-fix",
|
||||
"full_name": "wdlid\/CVE-2020-5902-fix",
|
||||
"owner": {
|
||||
"login": "wdlid",
|
||||
"id": 12636756,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12636756?v=4",
|
||||
"html_url": "https:\/\/github.com\/wdlid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wdlid\/CVE-2020-5902-fix",
|
||||
"description": "Fix CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T03:16:02Z",
|
||||
"updated_at": "2020-07-07T13:20:47Z",
|
||||
"pushed_at": "2020-07-07T03:18:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277725875,
|
||||
"name": "CVE-2020-5902-F5BIG",
|
||||
"full_name": "Any3ite\/CVE-2020-5902-F5BIG",
|
||||
"owner": {
|
||||
"login": "Any3ite",
|
||||
"id": 20638313,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20638313?v=4",
|
||||
"html_url": "https:\/\/github.com\/Any3ite"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Any3ite\/CVE-2020-5902-F5BIG",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T05:32:46Z",
|
||||
"updated_at": "2020-07-07T05:54:24Z",
|
||||
"pushed_at": "2020-07-07T05:54:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277800636,
|
||||
"name": "CVE-2020-5902-F5-BIGIP",
|
||||
"full_name": "inho28\/CVE-2020-5902-F5-BIGIP",
|
||||
"owner": {
|
||||
"login": "inho28",
|
||||
"id": 57725357,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57725357?v=4",
|
||||
"html_url": "https:\/\/github.com\/inho28"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/inho28\/CVE-2020-5902-F5-BIGIP",
|
||||
"description": "Scan from a given list for F5 BIG-IP and check for CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T11:42:34Z",
|
||||
"updated_at": "2020-07-07T12:00:28Z",
|
||||
"pushed_at": "2020-07-07T12:00:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277851560,
|
||||
"name": "f5_scanner",
|
||||
|
@ -687,87 +147,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277900768,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "ajdumanhug\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "ajdumanhug",
|
||||
"id": 9420289,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9420289?v=4",
|
||||
"html_url": "https:\/\/github.com\/ajdumanhug"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ajdumanhug\/CVE-2020-5902",
|
||||
"description": "POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T19:07:55Z",
|
||||
"updated_at": "2020-07-09T04:38:49Z",
|
||||
"pushed_at": "2020-07-09T04:38:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277985626,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "zhzyker\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "zhzyker",
|
||||
"id": 32918050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918050?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhzyker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhzyker\/CVE-2020-5902",
|
||||
"description": "F5 BIG-IP 任意文件读取+远程命令执行RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-08T04:02:07Z",
|
||||
"updated_at": "2022-04-21T04:22:13Z",
|
||||
"pushed_at": "2020-07-08T04:10:12Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278061523,
|
||||
"name": "EvilRip",
|
||||
"full_name": "GovindPalakkal\/EvilRip",
|
||||
"owner": {
|
||||
"login": "GovindPalakkal",
|
||||
"id": 62349500,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62349500?v=4",
|
||||
"html_url": "https:\/\/github.com\/GovindPalakkal"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GovindPalakkal\/EvilRip",
|
||||
"description": "It is a small script to fetch out the subdomains\/ip vulnerable to CVE-2020-5902 written in bash",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-08T10:38:35Z",
|
||||
"updated_at": "2020-07-13T08:20:12Z",
|
||||
"pushed_at": "2020-07-11T06:13:34Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278139122,
|
||||
"name": "CVE-2020-5902",
|
||||
|
@ -795,33 +174,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278201438,
|
||||
"name": "checkvulnCVE20205902",
|
||||
"full_name": "renanhsilva\/checkvulnCVE20205902",
|
||||
"owner": {
|
||||
"login": "renanhsilva",
|
||||
"id": 29900840,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29900840?v=4",
|
||||
"html_url": "https:\/\/github.com\/renanhsilva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/renanhsilva\/checkvulnCVE20205902",
|
||||
"description": "A powershell script to check vulnerability CVE-2020-5902 of ip list",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-08T21:50:32Z",
|
||||
"updated_at": "2021-04-04T00:01:08Z",
|
||||
"pushed_at": "2020-07-08T21:56:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278202552,
|
||||
"name": "f5scan",
|
||||
|
@ -853,87 +205,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278278361,
|
||||
"name": "GoF5-CVE-2020-5902",
|
||||
"full_name": "deepsecurity-pe\/GoF5-CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "deepsecurity-pe",
|
||||
"id": 55849696,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55849696?v=4",
|
||||
"html_url": "https:\/\/github.com\/deepsecurity-pe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/deepsecurity-pe\/GoF5-CVE-2020-5902",
|
||||
"description": "Script para validar CVE-2020-5902 hecho en Go.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T06:09:39Z",
|
||||
"updated_at": "2021-06-26T15:07:50Z",
|
||||
"pushed_at": "2020-07-09T06:37:05Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278297746,
|
||||
"name": "CVE-2020-5902-fofa-scan",
|
||||
"full_name": "Shu1L\/CVE-2020-5902-fofa-scan",
|
||||
"owner": {
|
||||
"login": "Shu1L",
|
||||
"id": 61683660,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61683660?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shu1L"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shu1L\/CVE-2020-5902-fofa-scan",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T07:44:07Z",
|
||||
"updated_at": "2021-05-21T13:50:04Z",
|
||||
"pushed_at": "2020-07-09T08:06:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278308798,
|
||||
"name": "F5-Big-IP-CVE-2020-5902-mass-exploiter",
|
||||
"full_name": "d4rk007\/F5-Big-IP-CVE-2020-5902-mass-exploiter",
|
||||
"owner": {
|
||||
"login": "d4rk007",
|
||||
"id": 44454186,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44454186?v=4",
|
||||
"html_url": "https:\/\/github.com\/d4rk007"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d4rk007\/F5-Big-IP-CVE-2020-5902-mass-exploiter",
|
||||
"description": "F5 Big-IP CVE-2020-5902 mass exploiter\/fuzzer.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T08:34:37Z",
|
||||
"updated_at": "2021-11-16T21:21:20Z",
|
||||
"pushed_at": "2020-07-11T14:10:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278380388,
|
||||
"name": "CVE-2020-5902-Vuln-Checker",
|
||||
|
@ -988,204 +259,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278562778,
|
||||
"name": "checker-CVE-2020-5902",
|
||||
"full_name": "MrCl0wnLab\/checker-CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "MrCl0wnLab",
|
||||
"id": 17049332,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
|
||||
"html_url": "https:\/\/github.com\/MrCl0wnLab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MrCl0wnLab\/checker-CVE-2020-5902",
|
||||
"description": "Checker CVE-2020-5902: BIG-IP versions 15.0.0 through 15.1.0.3, 14.1.0 through 14.1.2.5, 13.1.0 through 13.1.3.3, 12.1.0 through 12.1.5.1, and 11.6.1 through 11.6.5.1 suffer from Traffic Management User Interface (TMUI) arbitrary file read and command execution vulnerabilities.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T07:00:35Z",
|
||||
"updated_at": "2021-11-15T05:30:30Z",
|
||||
"pushed_at": "2020-07-10T15:31:07Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278572697,
|
||||
"name": "CVE-2020-5902-POC",
|
||||
"full_name": "qiong-qi\/CVE-2020-5902-POC",
|
||||
"owner": {
|
||||
"login": "qiong-qi",
|
||||
"id": 67992753,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67992753?v=4",
|
||||
"html_url": "https:\/\/github.com\/qiong-qi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qiong-qi\/CVE-2020-5902-POC",
|
||||
"description": "批量检测CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T07:49:23Z",
|
||||
"updated_at": "2020-07-10T07:54:22Z",
|
||||
"pushed_at": "2020-07-10T07:54:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278670349,
|
||||
"name": "f5-bigip-rce-cve-2020-5902",
|
||||
"full_name": "theLSA\/f5-bigip-rce-cve-2020-5902",
|
||||
"owner": {
|
||||
"login": "theLSA",
|
||||
"id": 28248956,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4",
|
||||
"html_url": "https:\/\/github.com\/theLSA"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/theLSA\/f5-bigip-rce-cve-2020-5902",
|
||||
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T15:33:00Z",
|
||||
"updated_at": "2022-02-09T10:16:48Z",
|
||||
"pushed_at": "2020-07-12T10:36:20Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"big-ip",
|
||||
"cve-2020-5902",
|
||||
"f5",
|
||||
"rce",
|
||||
"tmui"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278738841,
|
||||
"name": "CVE-2020-5902-Mass",
|
||||
"full_name": "pwnhacker0x18\/CVE-2020-5902-Mass",
|
||||
"owner": {
|
||||
"login": "pwnhacker0x18",
|
||||
"id": 51971493,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51971493?v=4",
|
||||
"html_url": "https:\/\/github.com\/pwnhacker0x18"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pwnhacker0x18\/CVE-2020-5902-Mass",
|
||||
"description": "Mass exploit for CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T21:43:11Z",
|
||||
"updated_at": "2020-07-18T04:08:12Z",
|
||||
"pushed_at": "2020-07-10T21:50:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278872820,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "Al1ex\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-5902",
|
||||
"description": "CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-11T14:01:08Z",
|
||||
"updated_at": "2022-01-21T05:58:53Z",
|
||||
"pushed_at": "2020-07-11T14:12:18Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2020-5902",
|
||||
"f5-big-ip"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279017452,
|
||||
"name": "CVE-2020-5902-fofa-scan",
|
||||
"full_name": "freeFV\/CVE-2020-5902-fofa-scan",
|
||||
"owner": {
|
||||
"login": "freeFV",
|
||||
"id": 32540878,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32540878?v=4",
|
||||
"html_url": "https:\/\/github.com\/freeFV"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/freeFV\/CVE-2020-5902-fofa-scan",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-12T07:49:18Z",
|
||||
"updated_at": "2021-04-11T14:53:19Z",
|
||||
"pushed_at": "2020-07-09T08:06:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279083082,
|
||||
"name": "cve-2020-5902",
|
||||
"full_name": "momika233\/cve-2020-5902",
|
||||
"owner": {
|
||||
"login": "momika233",
|
||||
"id": 56291820,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
|
||||
"html_url": "https:\/\/github.com\/momika233"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/momika233\/cve-2020-5902",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-12T14:37:25Z",
|
||||
"updated_at": "2020-07-12T14:40:28Z",
|
||||
"pushed_at": "2020-07-12T14:40:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 280314712,
|
||||
"name": "CVE-2020-5902-rce-gui",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 290087949,
|
||||
"name": "CVE-2020-5903",
|
||||
"full_name": "ltvthang\/CVE-2020-5903",
|
||||
"owner": {
|
||||
"login": "ltvthang",
|
||||
"id": 5304208,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5304208?v=4",
|
||||
"html_url": "https:\/\/github.com\/ltvthang"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ltvthang\/CVE-2020-5903",
|
||||
"description": "CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-25T02:07:41Z",
|
||||
"updated_at": "2020-10-25T06:02:24Z",
|
||||
"pushed_at": "2020-07-08T06:33:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 276879560,
|
||||
"name": "sockjs-dos-py",
|
||||
"full_name": "andsnw\/sockjs-dos-py",
|
||||
"owner": {
|
||||
"login": "andsnw",
|
||||
"id": 20721160,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20721160?v=4",
|
||||
"html_url": "https:\/\/github.com\/andsnw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/andsnw\/sockjs-dos-py",
|
||||
"description": "CVE-2020-7693: SockJS 0.3.19 Denial of Service POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-03T11:04:48Z",
|
||||
"updated_at": "2020-07-15T04:59:21Z",
|
||||
"pushed_at": "2020-07-15T04:59:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,137 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 278722641,
|
||||
"name": "CVE-2020-8193",
|
||||
"full_name": "jas502n\/CVE-2020-8193",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-8193",
|
||||
"description": "Citrix ADC Vulns",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T20:00:17Z",
|
||||
"updated_at": "2022-02-23T04:54:50Z",
|
||||
"pushed_at": "2020-07-10T21:03:20Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279066109,
|
||||
"name": "Citrix-ADC-RCE-CVE-2020-8193",
|
||||
"full_name": "Airboi\/Citrix-ADC-RCE-CVE-2020-8193",
|
||||
"owner": {
|
||||
"login": "Airboi",
|
||||
"id": 28615434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28615434?v=4",
|
||||
"html_url": "https:\/\/github.com\/Airboi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Airboi\/Citrix-ADC-RCE-CVE-2020-8193",
|
||||
"description": "Citrix ADC从权限绕过到RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-12T13:05:40Z",
|
||||
"updated_at": "2022-03-17T09:38:26Z",
|
||||
"pushed_at": "2020-07-12T13:10:50Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279071796,
|
||||
"name": "citrix_adc_netscaler_lfi",
|
||||
"full_name": "Zeop-CyberSec\/citrix_adc_netscaler_lfi",
|
||||
"owner": {
|
||||
"login": "Zeop-CyberSec",
|
||||
"id": 68154603,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
|
||||
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/citrix_adc_netscaler_lfi",
|
||||
"description": "This Metasploit-Framework module can be use to help companies to check the last Citrix vulnerability CVE-2020-8193, CVE-2020-8195 and CVE-2020-8196 (disclosed July 08, 2020).",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-12T13:37:53Z",
|
||||
"updated_at": "2021-10-10T19:00:30Z",
|
||||
"pushed_at": "2020-07-14T14:56:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279272932,
|
||||
"name": "CVE-2020-8193-Citrix-Scanner",
|
||||
"full_name": "PR3R00T\/CVE-2020-8193-Citrix-Scanner",
|
||||
"owner": {
|
||||
"login": "PR3R00T",
|
||||
"id": 50199640,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199640?v=4",
|
||||
"html_url": "https:\/\/github.com\/PR3R00T"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PR3R00T\/CVE-2020-8193-Citrix-Scanner",
|
||||
"description": "Scanning for CVE-2020-8193 - Auth Bypass check",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T10:36:43Z",
|
||||
"updated_at": "2021-12-15T14:39:48Z",
|
||||
"pushed_at": "2020-07-13T11:01:47Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 279894449,
|
||||
"name": "CVE-2020-8193",
|
||||
"full_name": "ctlyz123\/CVE-2020-8193",
|
||||
"owner": {
|
||||
"login": "ctlyz123",
|
||||
"id": 50359597,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50359597?v=4",
|
||||
"html_url": "https:\/\/github.com\/ctlyz123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ctlyz123\/CVE-2020-8193",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T14:43:03Z",
|
||||
"updated_at": "2021-09-07T02:51:42Z",
|
||||
"pushed_at": "2020-07-15T14:46:33Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -26,33 +26,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277140244,
|
||||
"name": "Rick_write_exp_CVE-2020-8835",
|
||||
"full_name": "snappyJack\/Rick_write_exp_CVE-2020-8835",
|
||||
"owner": {
|
||||
"login": "snappyJack",
|
||||
"id": 16055573,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4",
|
||||
"html_url": "https:\/\/github.com\/snappyJack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snappyJack\/Rick_write_exp_CVE-2020-8835",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T15:51:14Z",
|
||||
"updated_at": "2021-09-18T16:43:33Z",
|
||||
"pushed_at": "2020-07-04T16:40:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299816602,
|
||||
"name": "CVE-2020-8835",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 279328764,
|
||||
"name": "CVE-2020-9047",
|
||||
"full_name": "norrismw\/CVE-2020-9047",
|
||||
"owner": {
|
||||
"login": "norrismw",
|
||||
"id": 42365063,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42365063?v=4",
|
||||
"html_url": "https:\/\/github.com\/norrismw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/norrismw\/CVE-2020-9047",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T14:40:34Z",
|
||||
"updated_at": "2022-01-28T15:32:44Z",
|
||||
"pushed_at": "2020-07-13T14:47:02Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,34 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 278486856,
|
||||
"name": "dlink-dir610-exploits",
|
||||
"full_name": "renatoalencar\/dlink-dir610-exploits",
|
||||
"owner": {
|
||||
"login": "renatoalencar",
|
||||
"id": 6964593,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6964593?v=4",
|
||||
"html_url": "https:\/\/github.com\/renatoalencar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/renatoalencar\/dlink-dir610-exploits",
|
||||
"description": "Exploits for CVE-2020-9376 and CVE-2020-9377",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T22:48:51Z",
|
||||
"updated_at": "2021-12-15T14:39:46Z",
|
||||
"pushed_at": "2020-07-09T22:49:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"authentication-bypass",
|
||||
"dlink",
|
||||
"exploit",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -215,33 +215,6 @@
|
|||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 329004194,
|
||||
"name": "CVE-2020-9484-Scanner",
|
||||
"full_name": "DanQMoo\/CVE-2020-9484-Scanner",
|
||||
"owner": {
|
||||
"login": "DanQMoo",
|
||||
"id": 29651956,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29651956?v=4",
|
||||
"html_url": "https:\/\/github.com\/DanQMoo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DanQMoo\/CVE-2020-9484-Scanner",
|
||||
"description": "A smol bash script I threw together pretty quickly to scan for vulnerable versions of the Apache Tomcat RCE. I'll give it some love when I have the time. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T14:00:00Z",
|
||||
"updated_at": "2022-04-17T09:09:57Z",
|
||||
"pushed_at": "2020-06-10T07:08:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333238894,
|
||||
"name": "CVE-2020-9484",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 298576538,
|
||||
"name": "CVE-2020-9768",
|
||||
"full_name": "XorgX304\/CVE-2020-9768",
|
||||
"owner": {
|
||||
"login": "XorgX304",
|
||||
"id": 46254011,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46254011?v=4",
|
||||
"html_url": "https:\/\/github.com\/XorgX304"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/XorgX304\/CVE-2020-9768",
|
||||
"description": "AppleJPEGDriverUserClient : mach port use-after-free\/type-confusion via race condition",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-25T13:12:04Z",
|
||||
"updated_at": "2021-02-09T09:03:25Z",
|
||||
"pushed_at": "2020-03-26T22:29:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-0306.json
Normal file
29
2021/CVE-2021-0306.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 484710924,
|
||||
"name": "framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317",
|
||||
"full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317",
|
||||
"owner": {
|
||||
"login": "nanopathi",
|
||||
"id": 26024136,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
|
||||
"html_url": "https:\/\/github.com\/nanopathi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-23T10:05:37Z",
|
||||
"updated_at": "2022-04-23T10:29:35Z",
|
||||
"pushed_at": "2022-04-23T10:29:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-23T05:50:23Z",
|
||||
"updated_at": "2022-04-23T05:50:23Z",
|
||||
"pushed_at": "2022-04-23T05:50:24Z",
|
||||
"updated_at": "2022-04-23T06:23:48Z",
|
||||
"pushed_at": "2022-04-23T06:23:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T18:45:07Z",
|
||||
"updated_at": "2022-04-21T18:46:04Z",
|
||||
"updated_at": "2022-04-23T09:27:42Z",
|
||||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -599,10 +599,10 @@
|
|||
"description": "RCE exploit for Microsoft Exchange Server (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T13:04:07Z",
|
||||
"updated_at": "2022-04-23T00:21:04Z",
|
||||
"updated_at": "2022-04-23T09:42:57Z",
|
||||
"pushed_at": "2022-04-23T03:21:44Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -611,7 +611,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-02-17T04:12:08Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 9,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 432048812,
|
||||
"name": "CVE-2021-43267",
|
||||
"full_name": "zzhacked\/CVE-2021-43267",
|
||||
"owner": {
|
||||
"login": "zzhacked",
|
||||
"id": 8380809,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8380809?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzhacked"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzhacked\/CVE-2021-43267",
|
||||
"description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T04:00:56Z",
|
||||
"updated_at": "2022-04-03T09:26:42Z",
|
||||
"pushed_at": "2021-11-26T01:54:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -781,17 +781,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-08T02:58:18Z",
|
||||
"updated_at": "2022-04-21T10:04:26Z",
|
||||
"updated_at": "2022-04-23T08:28:15Z",
|
||||
"pushed_at": "2022-01-11T01:28:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -394,14 +394,14 @@
|
|||
"pushed_at": "2022-02-24T12:04:51Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"forks_count": 434,
|
||||
"forks_count": 435,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 434,
|
||||
"forks": 435,
|
||||
"watchers": 978,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -745,17 +745,17 @@
|
|||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:46:18Z",
|
||||
"updated_at": "2022-04-23T05:16:36Z",
|
||||
"updated_at": "2022-04-23T10:24:51Z",
|
||||
"pushed_at": "2021-12-13T22:27:25Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -833,10 +833,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-04-22T18:38:26Z",
|
||||
"updated_at": "2022-04-23T11:45:20Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 738,
|
||||
"watchers_count": 738,
|
||||
"stargazers_count": 739,
|
||||
"watchers_count": 739,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -863,7 +863,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 738,
|
||||
"watchers": 739,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6624,7 +6624,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T20:17:41Z",
|
||||
"updated_at": "2022-04-22T22:15:30Z",
|
||||
"updated_at": "2022-04-23T09:23:38Z",
|
||||
"pushed_at": "2022-04-22T00:16:27Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
|
|
|
@ -337,17 +337,17 @@
|
|||
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T11:49:40Z",
|
||||
"updated_at": "2022-04-20T10:00:35Z",
|
||||
"updated_at": "2022-04-23T09:10:34Z",
|
||||
"pushed_at": "2022-03-08T11:52:22Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 34,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0995 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T21:46:09Z",
|
||||
"updated_at": "2022-04-23T02:44:22Z",
|
||||
"updated_at": "2022-04-23T09:15:00Z",
|
||||
"pushed_at": "2022-03-27T09:07:01Z",
|
||||
"stargazers_count": 454,
|
||||
"watchers_count": 454,
|
||||
"stargazers_count": 455,
|
||||
"watchers_count": 455,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 454,
|
||||
"watchers": 455,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-04-22T17:55:37Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T10:23:07Z",
|
||||
"updated_at": "2022-04-22T16:54:46Z",
|
||||
"updated_at": "2022-04-23T10:50:56Z",
|
||||
"pushed_at": "2022-04-21T08:31:08Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,17 +67,17 @@
|
|||
"description": "CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T20:31:15Z",
|
||||
"updated_at": "2022-04-23T06:03:37Z",
|
||||
"updated_at": "2022-04-23T11:42:55Z",
|
||||
"pushed_at": "2022-04-21T12:04:10Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 15,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 57,
|
||||
"forks": 17,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1602,5 +1602,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 484697115,
|
||||
"name": "CVE-2022-22965",
|
||||
"full_name": "mariomamo\/CVE-2022-22965",
|
||||
"owner": {
|
||||
"login": "mariomamo",
|
||||
"id": 45656028,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45656028?v=4",
|
||||
"html_url": "https:\/\/github.com\/mariomamo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mariomamo\/CVE-2022-22965",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-23T09:01:22Z",
|
||||
"updated_at": "2022-04-23T09:34:20Z",
|
||||
"pushed_at": "2022-04-23T12:14:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-02-21T04:27:48Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 33,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 34,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2022-04-23T02:19:11Z",
|
||||
"updated_at": "2022-04-23T12:00:53Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 599,
|
||||
"watchers_count": 599,
|
||||
"forks_count": 93,
|
||||
"stargazers_count": 602,
|
||||
"watchers_count": 602,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"watchers": 599,
|
||||
"forks": 95,
|
||||
"watchers": 602,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-04-23T05:58:27Z",
|
||||
"updated_at": "2022-04-23T11:37:28Z",
|
||||
"pushed_at": "2022-04-22T07:26:00Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"forks_count": 29,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2022-29464"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 143,
|
||||
"forks": 30,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -150,11 +150,11 @@
|
|||
"description": " Repository containing nse script for vulnerability CVE-2022-29464 known as WSO2 RCE.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-22T21:23:57Z",
|
||||
"updated_at": "2022-04-22T22:33:52Z",
|
||||
"updated_at": "2022-04-23T10:37:54Z",
|
||||
"pushed_at": "2022-04-22T22:38:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -166,8 +166,8 @@
|
|||
"wso2"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
158
README.md
158
README.md
|
@ -662,6 +662,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
|
|||
- [0zvxr/CVE-2022-22965](https://github.com/0zvxr/CVE-2022-22965)
|
||||
- [Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-](https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-)
|
||||
- [c4mx/CVE-2022-22965_PoC](https://github.com/c4mx/CVE-2022-22965_PoC)
|
||||
- [mariomamo/CVE-2022-22965](https://github.com/mariomamo/CVE-2022-22965)
|
||||
|
||||
### CVE-2022-23046 (2022-01-19)
|
||||
|
||||
|
@ -1257,6 +1258,14 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
|
|||
|
||||
|
||||
## 2021
|
||||
### CVE-2021-0306 (2021-01-11)
|
||||
|
||||
<code>
|
||||
In addAllPermissions of PermissionManagerService.java, there is a possible permissions bypass when upgrading major Android versions which allows an app to gain the android.permission.ACTIVITY_RECOGNITION permission without user confirmation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11, Android-8.0, Android-8.1, Android-9, Android-10; Android ID: A-154505240.
|
||||
</code>
|
||||
|
||||
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317)
|
||||
|
||||
### CVE-2021-0314 (2021-02-10)
|
||||
|
||||
<code>
|
||||
|
@ -4564,14 +4573,6 @@ Windows Common Log File System Driver Information Disclosure Vulnerability
|
|||
|
||||
- [KaLendsi/CVE-2021-43224-POC](https://github.com/KaLendsi/CVE-2021-43224-POC)
|
||||
|
||||
### CVE-2021-43267 (2021-11-02)
|
||||
|
||||
<code>
|
||||
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
|
||||
</code>
|
||||
|
||||
- [zzhacked/CVE-2021-43267](https://github.com/zzhacked/CVE-2021-43267)
|
||||
|
||||
### CVE-2021-43297 (2022-01-10)
|
||||
|
||||
<code>
|
||||
|
@ -5649,6 +5650,14 @@ In updateUidProcState of AppOpsService.java, there is a possible permission bypa
|
|||
|
||||
- [mooneee/CVE-2020-0121](https://github.com/mooneee/CVE-2020-0121)
|
||||
|
||||
### CVE-2020-0137 (2020-06-11)
|
||||
|
||||
<code>
|
||||
In setIPv6AddrGenMode of NetworkManagementService.java, there is a possible bypass of networking permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141920289
|
||||
</code>
|
||||
|
||||
- [nanopathi/framework_base_AOSP10_r33_CVE-2020-0137](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0137)
|
||||
|
||||
### CVE-2020-0138 (2020-06-11)
|
||||
|
||||
<code>
|
||||
|
@ -5804,6 +5813,7 @@ In setInstallerPackageName of PackageManagerService.java, there is a missing per
|
|||
</code>
|
||||
|
||||
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2020-0401](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2020-0401)
|
||||
- [nanopathi/framework_base_AOSP10_r33_CVE-2020-0401](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0401)
|
||||
|
||||
### CVE-2020-0409 (2020-11-10)
|
||||
|
||||
|
@ -6149,8 +6159,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [Barriuso/SMBGhost_AutomateExploitation](https://github.com/Barriuso/SMBGhost_AutomateExploitation)
|
||||
- [1060275195/SMBGhost](https://github.com/1060275195/SMBGhost)
|
||||
- [Almorabea/SMBGhost-LPE-Metasploit-Module](https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module)
|
||||
- [ZecOps/SMBGhost-SMBleed-scanner](https://github.com/ZecOps/SMBGhost-SMBleed-scanner)
|
||||
- [5l1v3r1/smbghost-5](https://github.com/5l1v3r1/smbghost-5)
|
||||
- [rsmudge/CVE-2020-0796-BOF](https://github.com/rsmudge/CVE-2020-0796-BOF)
|
||||
- [codewithpradhan/SMBGhost-CVE-2020-0796-](https://github.com/codewithpradhan/SMBGhost-CVE-2020-0796-)
|
||||
- [GryllsAaron/CVE-2020-0796-POC](https://github.com/GryllsAaron/CVE-2020-0796-POC)
|
||||
|
@ -6165,7 +6173,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [Murasame-nc/CVE-2020-0796-LPE-POC](https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC)
|
||||
- [F6JO/CVE-2020-0796-Batch-scanning](https://github.com/F6JO/CVE-2020-0796-Batch-scanning)
|
||||
- [lisinan988/CVE-2020-0796-exp](https://github.com/lisinan988/CVE-2020-0796-exp)
|
||||
- [5l1v3r1/CVE-2020-0796-PoC-3](https://github.com/5l1v3r1/CVE-2020-0796-PoC-3)
|
||||
- [vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-](https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-)
|
||||
|
||||
### CVE-2020-0797 (2020-03-12)
|
||||
|
@ -6320,8 +6327,6 @@ An information disclosure vulnerability exists in the way that the Microsoft Ser
|
|||
</code>
|
||||
|
||||
- [ZecOps/CVE-2020-1206-POC](https://github.com/ZecOps/CVE-2020-1206-POC)
|
||||
- [Info-Security-Solution-Kolkata/CVE-2020-1206-Exploit](https://github.com/Info-Security-Solution-Kolkata/CVE-2020-1206-Exploit)
|
||||
- [Info-Security-Solution-Kolkata/Smbleed-CVE-2020-1206-Exploit](https://github.com/Info-Security-Solution-Kolkata/Smbleed-CVE-2020-1206-Exploit)
|
||||
- [datntsec/CVE-2020-1206](https://github.com/datntsec/CVE-2020-1206)
|
||||
|
||||
### CVE-2020-1283 (2020-06-09)
|
||||
|
@ -6380,7 +6385,6 @@ A remote code execution vulnerability exists in Windows Domain Name System serve
|
|||
- [zoomerxsec/Fake_CVE-2020-1350](https://github.com/zoomerxsec/Fake_CVE-2020-1350)
|
||||
- [T13nn3s/CVE-2020-1350](https://github.com/T13nn3s/CVE-2020-1350)
|
||||
- [corelight/SIGRed](https://github.com/corelight/SIGRed)
|
||||
- [jmaddington/dRMM-CVE-2020-1350-response](https://github.com/jmaddington/dRMM-CVE-2020-1350-response)
|
||||
- [maxpl0it/CVE-2020-1350-DoS](https://github.com/maxpl0it/CVE-2020-1350-DoS)
|
||||
- [captainGeech42/CVE-2020-1350](https://github.com/captainGeech42/CVE-2020-1350)
|
||||
- [connormcgarr/CVE-2020-1350](https://github.com/connormcgarr/CVE-2020-1350)
|
||||
|
@ -6478,14 +6482,6 @@ A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an a
|
|||
|
||||
- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611)
|
||||
|
||||
### CVE-2020-1764 (2020-03-26)
|
||||
|
||||
<code>
|
||||
A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
|
||||
</code>
|
||||
|
||||
- [jpts/cve-2020-1764-poc](https://github.com/jpts/cve-2020-1764-poc)
|
||||
|
||||
### CVE-2020-1937 (2020-02-24)
|
||||
|
||||
<code>
|
||||
|
@ -6549,8 +6545,6 @@ This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An
|
|||
</code>
|
||||
|
||||
- [ctlyz123/CVE-2020-1948](https://github.com/ctlyz123/CVE-2020-1948)
|
||||
- [txrw/Dubbo-CVE-2020-1948](https://github.com/txrw/Dubbo-CVE-2020-1948)
|
||||
- [M3g4Byt3/cve-2020-1948-poc](https://github.com/M3g4Byt3/cve-2020-1948-poc)
|
||||
- [L0kiii/Dubbo-deserialization](https://github.com/L0kiii/Dubbo-deserialization)
|
||||
|
||||
### CVE-2020-1956 (2020-05-22)
|
||||
|
@ -6945,7 +6939,6 @@ PHPGurukul Car Rental Project v1.0 allows Remote Code Execution via an executabl
|
|||
</code>
|
||||
|
||||
- [FULLSHADE/CVE-2020-5509](https://github.com/FULLSHADE/CVE-2020-5509)
|
||||
- [5l1v3r1/CVE-2020-5509](https://github.com/5l1v3r1/CVE-2020-5509)
|
||||
|
||||
### CVE-2020-5837 (2020-05-11)
|
||||
|
||||
|
@ -6985,49 +6978,15 @@ index.php?sec=godmode/extensions&sec2=extensions/files_repo in Pandora FMS v
|
|||
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
|
||||
</code>
|
||||
|
||||
- [dwisiswant0/CVE-2020-5902](https://github.com/dwisiswant0/CVE-2020-5902)
|
||||
- [aqhmal/CVE-2020-5902-Scanner](https://github.com/aqhmal/CVE-2020-5902-Scanner)
|
||||
- [jas502n/CVE-2020-5902](https://github.com/jas502n/CVE-2020-5902)
|
||||
- [ar0dd/CVE-2020-5902](https://github.com/ar0dd/CVE-2020-5902)
|
||||
- [yassineaboukir/CVE-2020-5902](https://github.com/yassineaboukir/CVE-2020-5902)
|
||||
- [rwincey/CVE-2020-5902-NSE](https://github.com/rwincey/CVE-2020-5902-NSE)
|
||||
- [Un4gi/CVE-2020-5902](https://github.com/Un4gi/CVE-2020-5902)
|
||||
- [nsflabs/CVE-2020-5902](https://github.com/nsflabs/CVE-2020-5902)
|
||||
- [yasserjanah/CVE-2020-5902](https://github.com/yasserjanah/CVE-2020-5902)
|
||||
- [JSec1337/RCE-CVE-2020-5902](https://github.com/JSec1337/RCE-CVE-2020-5902)
|
||||
- [dunderhay/CVE-2020-5902](https://github.com/dunderhay/CVE-2020-5902)
|
||||
- [r0ttenbeef/cve-2020-5902](https://github.com/r0ttenbeef/cve-2020-5902)
|
||||
- [sv3nbeast/CVE-2020-5902_RCE](https://github.com/sv3nbeast/CVE-2020-5902_RCE)
|
||||
- [cybersecurityworks553/scanner-CVE-2020-5902](https://github.com/cybersecurityworks553/scanner-CVE-2020-5902)
|
||||
- [lijiaxing1997/CVE-2020-5902-POC-EXP](https://github.com/lijiaxing1997/CVE-2020-5902-POC-EXP)
|
||||
- [qlkwej/poc-CVE-2020-5902](https://github.com/qlkwej/poc-CVE-2020-5902)
|
||||
- [Zinkuth/F5-BIG-IP-CVE-2020-5902](https://github.com/Zinkuth/F5-BIG-IP-CVE-2020-5902)
|
||||
- [0xAbdullah/CVE-2020-5902](https://github.com/0xAbdullah/CVE-2020-5902)
|
||||
- [jinnywc/CVE-2020-5902](https://github.com/jinnywc/CVE-2020-5902)
|
||||
- [GoodiesHQ/F5-Patch](https://github.com/GoodiesHQ/F5-Patch)
|
||||
- [jiansiting/CVE-2020-5902](https://github.com/jiansiting/CVE-2020-5902)
|
||||
- [wdlid/CVE-2020-5902-fix](https://github.com/wdlid/CVE-2020-5902-fix)
|
||||
- [Any3ite/CVE-2020-5902-F5BIG](https://github.com/Any3ite/CVE-2020-5902-F5BIG)
|
||||
- [inho28/CVE-2020-5902-F5-BIGIP](https://github.com/inho28/CVE-2020-5902-F5-BIGIP)
|
||||
- [cristiano-corrado/f5_scanner](https://github.com/cristiano-corrado/f5_scanner)
|
||||
- [ajdumanhug/CVE-2020-5902](https://github.com/ajdumanhug/CVE-2020-5902)
|
||||
- [zhzyker/CVE-2020-5902](https://github.com/zhzyker/CVE-2020-5902)
|
||||
- [GovindPalakkal/EvilRip](https://github.com/GovindPalakkal/EvilRip)
|
||||
- [dnerzker/CVE-2020-5902](https://github.com/dnerzker/CVE-2020-5902)
|
||||
- [renanhsilva/checkvulnCVE20205902](https://github.com/renanhsilva/checkvulnCVE20205902)
|
||||
- [halencarjunior/f5scan](https://github.com/halencarjunior/f5scan)
|
||||
- [deepsecurity-pe/GoF5-CVE-2020-5902](https://github.com/deepsecurity-pe/GoF5-CVE-2020-5902)
|
||||
- [Shu1L/CVE-2020-5902-fofa-scan](https://github.com/Shu1L/CVE-2020-5902-fofa-scan)
|
||||
- [d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiter](https://github.com/d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiter)
|
||||
- [TheCyberViking/CVE-2020-5902-Vuln-Checker](https://github.com/TheCyberViking/CVE-2020-5902-Vuln-Checker)
|
||||
- [itsjeffersonli/CVE-2020-5902](https://github.com/itsjeffersonli/CVE-2020-5902)
|
||||
- [MrCl0wnLab/checker-CVE-2020-5902](https://github.com/MrCl0wnLab/checker-CVE-2020-5902)
|
||||
- [qiong-qi/CVE-2020-5902-POC](https://github.com/qiong-qi/CVE-2020-5902-POC)
|
||||
- [theLSA/f5-bigip-rce-cve-2020-5902](https://github.com/theLSA/f5-bigip-rce-cve-2020-5902)
|
||||
- [pwnhacker0x18/CVE-2020-5902-Mass](https://github.com/pwnhacker0x18/CVE-2020-5902-Mass)
|
||||
- [Al1ex/CVE-2020-5902](https://github.com/Al1ex/CVE-2020-5902)
|
||||
- [freeFV/CVE-2020-5902-fofa-scan](https://github.com/freeFV/CVE-2020-5902-fofa-scan)
|
||||
- [momika233/cve-2020-5902](https://github.com/momika233/cve-2020-5902)
|
||||
- [rockmelodies/CVE-2020-5902-rce-gui](https://github.com/rockmelodies/CVE-2020-5902-rce-gui)
|
||||
- [f5devcentral/cve-2020-5902-ioc-bigip-checker](https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker)
|
||||
- [corelight/CVE-2020-5902-F5BigIP](https://github.com/corelight/CVE-2020-5902-F5BigIP)
|
||||
|
@ -7038,14 +6997,6 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
|
|||
- [faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner](https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner)
|
||||
- [haisenberg/CVE-2020-5902](https://github.com/haisenberg/CVE-2020-5902)
|
||||
|
||||
### CVE-2020-5903 (2020-07-01)
|
||||
|
||||
<code>
|
||||
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, a Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility.
|
||||
</code>
|
||||
|
||||
- [ltvthang/CVE-2020-5903](https://github.com/ltvthang/CVE-2020-5903)
|
||||
|
||||
### CVE-2020-6207 (2020-03-10)
|
||||
|
||||
<code>
|
||||
|
@ -7272,14 +7223,6 @@ all versions of url-regex are vulnerable to Regular Expression Denial of Service
|
|||
|
||||
- [spamscanner/url-regex-safe](https://github.com/spamscanner/url-regex-safe)
|
||||
|
||||
### CVE-2020-7693 (2020-07-09)
|
||||
|
||||
<code>
|
||||
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
|
||||
</code>
|
||||
|
||||
- [andsnw/sockjs-dos-py](https://github.com/andsnw/sockjs-dos-py)
|
||||
|
||||
### CVE-2020-7699 (2020-07-30)
|
||||
|
||||
<code>
|
||||
|
@ -7405,18 +7348,6 @@ Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker t
|
|||
- [knokbak/get-pixels-updated](https://github.com/knokbak/get-pixels-updated)
|
||||
- [knokbak/save-pixels-updated](https://github.com/knokbak/save-pixels-updated)
|
||||
|
||||
### CVE-2020-8193 (2020-07-10)
|
||||
|
||||
<code>
|
||||
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.
|
||||
</code>
|
||||
|
||||
- [jas502n/CVE-2020-8193](https://github.com/jas502n/CVE-2020-8193)
|
||||
- [Airboi/Citrix-ADC-RCE-CVE-2020-8193](https://github.com/Airboi/Citrix-ADC-RCE-CVE-2020-8193)
|
||||
- [Zeop-CyberSec/citrix_adc_netscaler_lfi](https://github.com/Zeop-CyberSec/citrix_adc_netscaler_lfi)
|
||||
- [PR3R00T/CVE-2020-8193-Citrix-Scanner](https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner)
|
||||
- [ctlyz123/CVE-2020-8193](https://github.com/ctlyz123/CVE-2020-8193)
|
||||
|
||||
### CVE-2020-8209 (2020-08-17)
|
||||
|
||||
<code>
|
||||
|
@ -7621,7 +7552,6 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di
|
|||
</code>
|
||||
|
||||
- [Prabhashaka/Exploitation-CVE-2020-8835](https://github.com/Prabhashaka/Exploitation-CVE-2020-8835)
|
||||
- [snappyJack/Rick_write_exp_CVE-2020-8835](https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835)
|
||||
- [zilong3033/CVE-2020-8835](https://github.com/zilong3033/CVE-2020-8835)
|
||||
- [SplendidSky/CVE-2020-8835](https://github.com/SplendidSky/CVE-2020-8835)
|
||||
- [digamma-ai/CVE-2020-8835-verification](https://github.com/digamma-ai/CVE-2020-8835-verification)
|
||||
|
@ -7691,14 +7621,6 @@ Joplin through 1.0.184 allows Arbitrary File Read via XSS.
|
|||
|
||||
- [JavierOlmedo/CVE-2020-9038](https://github.com/JavierOlmedo/CVE-2020-9038)
|
||||
|
||||
### CVE-2020-9047 (2020-06-26)
|
||||
|
||||
<code>
|
||||
A vulnerability exists that could allow the execution of unauthorized code or operating system commands on systems running exacqVision Web Service versions 20.06.3.0 and prior and exacqVision Enterprise Manager versions 20.06.4.0 and prior. An attacker with administrative privileges could potentially download and run a malicious executable that could allow OS command injection on the system.
|
||||
</code>
|
||||
|
||||
- [norrismw/CVE-2020-9047](https://github.com/norrismw/CVE-2020-9047)
|
||||
|
||||
### CVE-2020-9054 (2020-03-04)
|
||||
|
||||
<code>
|
||||
|
@ -7739,14 +7661,6 @@ TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attac
|
|||
|
||||
- [thewhiteh4t/cve-2020-9375](https://github.com/thewhiteh4t/cve-2020-9375)
|
||||
|
||||
### CVE-2020-9376 (2020-07-09)
|
||||
|
||||
<code>
|
||||
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
||||
</code>
|
||||
|
||||
- [renatoalencar/dlink-dir610-exploits](https://github.com/renatoalencar/dlink-dir610-exploits)
|
||||
|
||||
### CVE-2020-9380 (2020-03-05)
|
||||
|
||||
<code>
|
||||
|
@ -7818,7 +7732,6 @@ When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.
|
|||
- [osamahamad/CVE-2020-9484-Mass-Scan](https://github.com/osamahamad/CVE-2020-9484-Mass-Scan)
|
||||
- [anjai94/CVE-2020-9484-exploit](https://github.com/anjai94/CVE-2020-9484-exploit)
|
||||
- [PenTestical/CVE-2020-9484](https://github.com/PenTestical/CVE-2020-9484)
|
||||
- [DanQMoo/CVE-2020-9484-Scanner](https://github.com/DanQMoo/CVE-2020-9484-Scanner)
|
||||
- [AssassinUKG/CVE-2020-9484](https://github.com/AssassinUKG/CVE-2020-9484)
|
||||
- [VICXOR/CVE-2020-9484](https://github.com/VICXOR/CVE-2020-9484)
|
||||
- [DXY0411/CVE-2020-9484](https://github.com/DXY0411/CVE-2020-9484)
|
||||
|
@ -7887,14 +7800,6 @@ A vulnerability related to Dynamic-link Library (“DLL”) loading in the Zoom
|
|||
|
||||
- [shubham0d/Zoom-dll-hijacking](https://github.com/shubham0d/Zoom-dll-hijacking)
|
||||
|
||||
### CVE-2020-9768 (2020-04-01)
|
||||
|
||||
<code>
|
||||
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2. An application may be able to execute arbitrary code with system privileges.
|
||||
</code>
|
||||
|
||||
- [XorgX304/CVE-2020-9768](https://github.com/XorgX304/CVE-2020-9768)
|
||||
|
||||
### CVE-2020-9781 (2020-04-01)
|
||||
|
||||
<code>
|
||||
|
@ -7973,9 +7878,6 @@ Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
|
|||
|
||||
- [zhzyker/CVE-2020-10204](https://github.com/zhzyker/CVE-2020-10204)
|
||||
|
||||
### CVE-2020-10205
|
||||
- [5l1v3r1/CVE-2020-10205](https://github.com/5l1v3r1/CVE-2020-10205)
|
||||
|
||||
### CVE-2020-10238 (2020-03-16)
|
||||
|
||||
<code>
|
||||
|
@ -8608,14 +8510,6 @@ The XCloner component before 3.5.4 for Joomla! allows Authenticated Local File D
|
|||
### CVE-2020-13457
|
||||
- [alt3kx/CVE-2020-13457](https://github.com/alt3kx/CVE-2020-13457)
|
||||
|
||||
### CVE-2020-13640 (2020-06-18)
|
||||
|
||||
<code>
|
||||
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.)
|
||||
</code>
|
||||
|
||||
- [asterite3/CVE-2020-13640](https://github.com/asterite3/CVE-2020-13640)
|
||||
|
||||
### CVE-2020-13699 (2020-07-29)
|
||||
|
||||
<code>
|
||||
|
@ -8855,6 +8749,14 @@ A vulnerability was discovered in the PyYAML library in versions before 5.4, whe
|
|||
- [raul23/pyyaml-CVE-2020-14343](https://github.com/raul23/pyyaml-CVE-2020-14343)
|
||||
- [j4k0m/loader-CVE-2020-14343](https://github.com/j4k0m/loader-CVE-2020-14343)
|
||||
|
||||
### CVE-2020-14356 (2020-08-19)
|
||||
|
||||
<code>
|
||||
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
|
||||
</code>
|
||||
|
||||
- [ShaikUsaf/linux-4.19.72_CVE-2020-14356](https://github.com/ShaikUsaf/linux-4.19.72_CVE-2020-14356)
|
||||
|
||||
### CVE-2020-14364 (2020-08-31)
|
||||
|
||||
<code>
|
||||
|
@ -8988,14 +8890,6 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [Osyanina/westone-CVE-2020-14883-scanner](https://github.com/Osyanina/westone-CVE-2020-14883-scanner)
|
||||
- [1n7erface/PocList](https://github.com/1n7erface/PocList)
|
||||
|
||||
### CVE-2020-14947 (2020-06-30)
|
||||
|
||||
<code>
|
||||
OCS Inventory NG 2.7 allows Remote Command Execution via shell metacharacters to require/commandLine/CommandLine.php because mib_file in plugins/main_sections/ms_config/ms_snmp_config.php is mishandled in get_mib_oid.
|
||||
</code>
|
||||
|
||||
- [mhaskar/CVE-2020-14947](https://github.com/mhaskar/CVE-2020-14947)
|
||||
|
||||
### CVE-2020-14955 (2020-06-26)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue