mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/06/23 00:09:15
This commit is contained in:
parent
4b2add1b95
commit
7ac42760fc
29 changed files with 169 additions and 122 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132968731,
|
||||
"name": "CVE-2001-0680",
|
||||
"full_name": "alt3kx\/CVE-2001-0680",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0680",
|
||||
"description": "Directory traversal vulnerability in ftpd in QPC QVT\/Net 4.0 and AVT\/Term 5.0",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-11T00:29:56Z",
|
||||
"updated_at": "2018-05-11T09:19:48Z",
|
||||
"pushed_at": "2018-05-11T09:19:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 274131989,
|
||||
"name": "CVE-2004-1561",
|
||||
"full_name": "darrynb89\/CVE-2004-1561",
|
||||
"owner": {
|
||||
"login": "darrynb89",
|
||||
"id": 23241437,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23241437?v=4",
|
||||
"html_url": "https:\/\/github.com\/darrynb89"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/darrynb89\/CVE-2004-1561",
|
||||
"description": "Python version of Metasploit exploit for CVE-2004-1561",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-22T12:33:49Z",
|
||||
"updated_at": "2020-06-22T12:35:21Z",
|
||||
"pushed_at": "2020-06-22T12:35:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2017-01-27T10:04:07Z",
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel\/createFromParcel mismatch)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-03T09:04:50Z",
|
||||
"updated_at": "2020-04-10T03:52:06Z",
|
||||
"updated_at": "2020-06-22T13:09:19Z",
|
||||
"pushed_at": "2018-06-03T09:06:00Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-06-17T02:28:29Z",
|
||||
"updated_at": "2020-06-22T12:27:47Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 199,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "😳 Extremely simple yet effective PoC for CVE-2017-16934",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-15T12:09:06Z",
|
||||
"updated_at": "2020-06-13T15:37:34Z",
|
||||
"updated_at": "2020-06-22T14:51:46Z",
|
||||
"pushed_at": "2020-05-15T13:03:31Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-12T16:44:12Z",
|
||||
"updated_at": "2020-06-17T09:12:48Z",
|
||||
"updated_at": "2020-06-22T11:33:07Z",
|
||||
"pushed_at": "2018-03-12T16:50:20Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC CVE-2017-5123 - LPE - Bypassing SMEP\/SMAP. No KASLR",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-08T15:10:38Z",
|
||||
"updated_at": "2020-06-22T01:54:43Z",
|
||||
"updated_at": "2020-06-22T14:23:29Z",
|
||||
"pushed_at": "2020-06-19T15:12:31Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2020-06-19T02:12:36Z",
|
||||
"updated_at": "2020-06-22T09:50:41Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Proof of concept showing how to exploit the CVE-2018-11759",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-01T09:11:07Z",
|
||||
"updated_at": "2020-04-06T11:00:03Z",
|
||||
"updated_at": "2020-06-22T13:29:00Z",
|
||||
"pushed_at": "2018-12-11T12:59:26Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-03-06T10:52:19Z",
|
||||
"stargazers_count": 405,
|
||||
"watchers_count": 405,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"forks_count": 126,
|
||||
"forks": 126,
|
||||
"watchers": 405,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Pulse Secure SSL VPN pre-auth file reading",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-22T08:18:19Z",
|
||||
"updated_at": "2020-06-18T11:27:27Z",
|
||||
"updated_at": "2020-06-22T09:44:45Z",
|
||||
"pushed_at": "2019-08-26T19:33:43Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-22T03:22:14Z",
|
||||
"updated_at": "2020-06-22T13:43:18Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 960,
|
||||
"watchers_count": 960,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 960,
|
||||
"stargazers_count": 961,
|
||||
"watchers_count": 961,
|
||||
"forks_count": 244,
|
||||
"forks": 244,
|
||||
"watchers": 961,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE 2019-2215 Android Binder Use After Free",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T11:27:44Z",
|
||||
"updated_at": "2020-04-30T11:43:48Z",
|
||||
"updated_at": "2020-06-22T13:49:33Z",
|
||||
"pushed_at": "2020-03-16T07:20:14Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-06-17T02:28:29Z",
|
||||
"updated_at": "2020-06-22T12:27:47Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 199,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,8 +174,8 @@
|
|||
"description": "CVE-2019-5736 POCs",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-20T12:23:13Z",
|
||||
"updated_at": "2020-06-17T03:19:02Z",
|
||||
"pushed_at": "2020-06-16T18:20:12Z",
|
||||
"updated_at": "2020-06-22T13:04:58Z",
|
||||
"pushed_at": "2020-06-22T13:04:55Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 17,
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-10-23T07:10:35Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-06-22T09:09:28Z",
|
||||
"updated_at": "2020-06-22T15:03:52Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 268,
|
||||
"watchers": 280,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1443,8 +1443,8 @@
|
|||
"pushed_at": "2020-06-19T01:20:59Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-1015",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-13T16:42:17Z",
|
||||
"updated_at": "2020-06-18T09:09:16Z",
|
||||
"updated_at": "2020-06-22T14:48:34Z",
|
||||
"pushed_at": "2020-05-16T05:15:35Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T23:22:15Z",
|
||||
"updated_at": "2020-06-22T06:35:41Z",
|
||||
"updated_at": "2020-06-22T14:47:51Z",
|
||||
"pushed_at": "2020-06-17T18:10:30Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-22T03:22:14Z",
|
||||
"updated_at": "2020-06-22T13:43:18Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 960,
|
||||
"watchers_count": 960,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 960,
|
||||
"stargazers_count": 961,
|
||||
"watchers_count": 961,
|
||||
"forks_count": 244,
|
||||
"forks": 244,
|
||||
"watchers": 961,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2020-06-21T17:04:11Z",
|
||||
"updated_at": "2020-06-22T14:19:45Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 300,
|
||||
"watchers": 301,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-13646",
|
||||
"description": null,
|
||||
"description": "liebaowifi",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-29T13:43:03Z",
|
||||
"updated_at": "2020-06-06T05:15:50Z",
|
||||
"updated_at": "2020-06-22T11:59:51Z",
|
||||
"pushed_at": "2020-06-06T05:15:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
25
2020/CVE-2020-14955.json
Normal file
25
2020/CVE-2020-14955.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 270064911,
|
||||
"name": "CVE-2020-14955",
|
||||
"full_name": "y5s5k5\/CVE-2020-14955",
|
||||
"owner": {
|
||||
"login": "y5s5k5",
|
||||
"id": 53048989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
|
||||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-14955",
|
||||
"description": "Jiangmin",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-06T18:15:35Z",
|
||||
"updated_at": "2020-06-22T12:49:46Z",
|
||||
"pushed_at": "2020-06-19T15:08:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-14957.json
Normal file
25
2020/CVE-2020-14957.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 272884163,
|
||||
"name": "CVE-2020-14957-CVE-2020-14956",
|
||||
"full_name": "y5s5k5\/CVE-2020-14957-CVE-2020-14956",
|
||||
"owner": {
|
||||
"login": "y5s5k5",
|
||||
"id": 53048989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
|
||||
"html_url": "https:\/\/github.com\/y5s5k5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-14957-CVE-2020-14956",
|
||||
"description": " windows cleaning assistant",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-17T05:16:08Z",
|
||||
"updated_at": "2020-06-22T12:50:04Z",
|
||||
"pushed_at": "2020-06-17T05:31:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T04:27:52Z",
|
||||
"updated_at": "2020-06-21T03:20:42Z",
|
||||
"updated_at": "2020-06-22T14:24:33Z",
|
||||
"pushed_at": "2020-06-06T11:18:28Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -766,6 +766,12 @@ showAlert() in the administration panel in Bludit 3.12.0 allows XSS.
|
|||
|
||||
- [gh0st56/CVE-2020-13889](https://github.com/gh0st56/CVE-2020-13889)
|
||||
|
||||
### CVE-2020-14955
|
||||
- [y5s5k5/CVE-2020-14955](https://github.com/y5s5k5/CVE-2020-14955)
|
||||
|
||||
### CVE-2020-14957
|
||||
- [y5s5k5/CVE-2020-14957-CVE-2020-14956](https://github.com/y5s5k5/CVE-2020-14957-CVE-2020-14956)
|
||||
|
||||
### CVE-2020-1611
|
||||
|
||||
<code>
|
||||
|
@ -13912,6 +13918,7 @@ Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute
|
|||
</code>
|
||||
|
||||
- [ivanitlearning/CVE-2004-1561](https://github.com/ivanitlearning/CVE-2004-1561)
|
||||
- [darrynb89/CVE-2004-1561](https://github.com/darrynb89/CVE-2004-1561)
|
||||
|
||||
### CVE-2004-1769
|
||||
|
||||
|
@ -14061,14 +14068,6 @@ Buffer overflows in the cifslogin command for HP CIFS/9000 Client A.01.06 and ea
|
|||
|
||||
|
||||
## 2001
|
||||
### CVE-2001-0680
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in ftpd in QPC QVT/Net 4.0 and AVT/Term 5.0 allows a remote attacker to traverse directories on the web server via a "dot dot" attack in a LIST (ls) command.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
|
||||
|
||||
### CVE-2001-0758
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue