Auto Update 2021/02/14 18:09:13

This commit is contained in:
motikan2010-bot 2021-02-14 18:09:13 +09:00
parent 5290f6fb25
commit 94ad93ec3e
58 changed files with 3056 additions and 77 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-08T09:02:01Z",
"updated_at": "2021-02-14T03:20:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 917,
"watchers_count": 917,
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 217,
"forks": 217,
"watchers": 917,
"watchers": 916,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2021-02-11T16:18:16Z",
"updated_at": "2021-02-14T06:47:06Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 34,
"forks": 34,
"watchers": 68,
"watchers": 69,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-08T09:02:01Z",
"updated_at": "2021-02-14T03:20:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 917,
"watchers_count": 917,
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 217,
"forks": 217,
"watchers": 917,
"watchers": 916,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2021-01-27T03:18:37Z",
"updated_at": "2021-02-14T04:01:36Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 644,
"watchers_count": 644,
"stargazers_count": 645,
"watchers_count": 645,
"forks_count": 284,
"forks": 284,
"watchers": 644,
"watchers": 645,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-08T09:02:01Z",
"updated_at": "2021-02-14T03:20:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 917,
"watchers_count": 917,
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 217,
"forks": 217,
"watchers": 917,
"watchers": 916,
"score": 0
}
]

View file

@ -132,8 +132,8 @@
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 7,
"score": 0
},

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-08T09:02:01Z",
"updated_at": "2021-02-14T03:20:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 917,
"watchers_count": 917,
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 217,
"forks": 217,
"watchers": 917,
"watchers": 916,
"score": 0
},
{

View file

@ -270,8 +270,8 @@
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 39,
"forks": 39,
"forks_count": 40,
"forks": 40,
"watchers": 83,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 340,
"watchers_count": 340,
"forks_count": 138,
"forks": 138,
"forks_count": 137,
"forks": 137,
"watchers": 340,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-08T09:02:01Z",
"updated_at": "2021-02-14T03:20:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 917,
"watchers_count": 917,
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 217,
"forks": 217,
"watchers": 917,
"watchers": 916,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Full chain Chrome 71.0.3578.98 exploit",
"fork": false,
"created_at": "2020-12-18T21:57:26Z",
"updated_at": "2021-02-13T11:43:08Z",
"updated_at": "2021-02-14T06:19:38Z",
"pushed_at": "2020-12-18T22:12:57Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -21,5 +21,74 @@
"forks": 9,
"watchers": 53,
"score": 0
},
{
"id": 244758802,
"name": "mtk-su-reverse-cve-2020-0069",
"full_name": "TheRealJunior\/mtk-su-reverse-cve-2020-0069",
"owner": {
"login": "TheRealJunior",
"id": 8438895,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8438895?v=4",
"html_url": "https:\/\/github.com\/TheRealJunior"
},
"html_url": "https:\/\/github.com\/TheRealJunior\/mtk-su-reverse-cve-2020-0069",
"description": "reversing mtk-su",
"fork": false,
"created_at": "2020-03-03T22:55:42Z",
"updated_at": "2020-11-12T08:11:02Z",
"pushed_at": "2020-03-04T22:32:03Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},
{
"id": 245598253,
"name": "CVE-2020-0069",
"full_name": "yanglingxi1993\/CVE-2020-0069",
"owner": {
"login": "yanglingxi1993",
"id": 61902155,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61902155?v=4",
"html_url": "https:\/\/github.com\/yanglingxi1993"
},
"html_url": "https:\/\/github.com\/yanglingxi1993\/CVE-2020-0069",
"description": "simple poc for CVE-2020-0069",
"fork": false,
"created_at": "2020-03-07T08:50:48Z",
"updated_at": "2020-03-07T08:50:48Z",
"pushed_at": "2020-03-07T08:50:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 249711372,
"name": "CVE-2020-0069_poc",
"full_name": "quarkslab\/CVE-2020-0069_poc",
"owner": {
"login": "quarkslab",
"id": 3357711,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3357711?v=4",
"html_url": "https:\/\/github.com\/quarkslab"
},
"html_url": "https:\/\/github.com\/quarkslab\/CVE-2020-0069_poc",
"description": null,
"fork": false,
"created_at": "2020-03-24T13:10:39Z",
"updated_at": "2021-01-23T10:38:43Z",
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 22,
"forks": 22,
"watchers": 75,
"score": 0
}
]

25
2020/CVE-2020-0551.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 246358905,
"name": "lvi-lfb-attack-poc",
"full_name": "bitdefender\/lvi-lfb-attack-poc",
"owner": {
"login": "bitdefender",
"id": 32452258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32452258?v=4",
"html_url": "https:\/\/github.com\/bitdefender"
},
"html_url": "https:\/\/github.com\/bitdefender\/lvi-lfb-attack-poc",
"description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)",
"fork": false,
"created_at": "2020-03-10T17:00:01Z",
"updated_at": "2021-01-11T11:22:00Z",
"pushed_at": "2020-03-10T17:10:12Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 5,
"forks": 5,
"watchers": 20,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 234192123,
"name": "chainoffools",
"full_name": "kudelskisecurity\/chainoffools",
"owner": {
"login": "kudelskisecurity",
"id": 10771090,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10771090?v=4",
"html_url": "https:\/\/github.com\/kudelskisecurity"
},
"html_url": "https:\/\/github.com\/kudelskisecurity\/chainoffools",
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
"updated_at": "2021-02-02T02:53:26Z",
"pushed_at": "2020-03-22T15:14:31Z",
"stargazers_count": 337,
"watchers_count": 337,
"forks_count": 87,
"forks": 87,
"watchers": 337,
"score": 0
},
{
"id": 234433419,
"name": "badecparams",
"full_name": "saleemrashid\/badecparams",
"owner": {
"login": "saleemrashid",
"id": 22301423,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22301423?v=4",
"html_url": "https:\/\/github.com\/saleemrashid"
},
"html_url": "https:\/\/github.com\/saleemrashid\/badecparams",
"description": "Proof of Concept for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-16T23:44:37Z",
"updated_at": "2021-02-07T14:06:26Z",
"pushed_at": "2020-02-24T18:41:10Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 14,
"forks": 14,
"watchers": 61,
"score": 0
},
{
"id": 241136874,
"name": "CVE-2018-20250-WinRAR",
@ -21,5 +67,97 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 241412565,
"name": "cve-2020-0601_poc",
"full_name": "gremwell\/cve-2020-0601_poc",
"owner": {
"login": "gremwell",
"id": 633734,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/633734?v=4",
"html_url": "https:\/\/github.com\/gremwell"
},
"html_url": "https:\/\/github.com\/gremwell\/cve-2020-0601_poc",
"description": "CVE-2020-0601 proof of concept",
"fork": false,
"created_at": "2020-02-18T16:36:49Z",
"updated_at": "2020-10-14T19:20:02Z",
"pushed_at": "2020-02-19T08:46:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 243353551,
"name": "meetup-2-curveball",
"full_name": "bsides-rijeka\/meetup-2-curveball",
"owner": {
"login": "bsides-rijeka",
"id": 61519397,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61519397?v=4",
"html_url": "https:\/\/github.com\/bsides-rijeka"
},
"html_url": "https:\/\/github.com\/bsides-rijeka\/meetup-2-curveball",
"description": "Materials for the second Rijeka secuity meetup. We will be discussing Microsoft cryptoapi vulnerability dubbed CurveBall (CVE-2020-0601)",
"fork": false,
"created_at": "2020-02-26T19:59:25Z",
"updated_at": "2020-03-05T07:54:18Z",
"pushed_at": "2020-09-11T10:29:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 244585713,
"name": "CVE-2020-0601-spoofkey",
"full_name": "exploitblizzard\/CVE-2020-0601-spoofkey",
"owner": {
"login": "exploitblizzard",
"id": 61627070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
"html_url": "https:\/\/github.com\/exploitblizzard"
},
"html_url": "https:\/\/github.com\/exploitblizzard\/CVE-2020-0601-spoofkey",
"description": null,
"fork": false,
"created_at": "2020-03-03T08:49:47Z",
"updated_at": "2020-03-03T09:49:24Z",
"pushed_at": "2020-03-03T09:49:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246794448,
"name": "twoplustwo",
"full_name": "ShayNehmad\/twoplustwo",
"owner": {
"login": "ShayNehmad",
"id": 48879847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48879847?v=4",
"html_url": "https:\/\/github.com\/ShayNehmad"
},
"html_url": "https:\/\/github.com\/ShayNehmad\/twoplustwo",
"description": "Implementing CVE-2020-0601",
"fork": false,
"created_at": "2020-03-12T09:30:19Z",
"updated_at": "2020-03-12T09:58:51Z",
"pushed_at": "2020-03-12T09:58:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-0618.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 241408033,
"name": "cve-2020-0618",
"full_name": "wortell\/cve-2020-0618",
"owner": {
"login": "wortell",
"id": 54625905,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54625905?v=4",
"html_url": "https:\/\/github.com\/wortell"
},
"html_url": "https:\/\/github.com\/wortell\/cve-2020-0618",
"description": "CVE-2020-0618 Honeypot",
"fork": false,
"created_at": "2020-02-18T16:17:19Z",
"updated_at": "2021-01-07T02:04:31Z",
"pushed_at": "2020-03-03T17:21:54Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 4,
"forks": 4,
"watchers": 22,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 214392452,
"name": "SysTracingPoc",
"full_name": "itm4n\/SysTracingPoc",
"owner": {
"login": "itm4n",
"id": 30777390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30777390?v=4",
"html_url": "https:\/\/github.com\/itm4n"
},
"html_url": "https:\/\/github.com\/itm4n\/SysTracingPoc",
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2021-01-13T14:43:41Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 20,
"forks": 20,
"watchers": 54,
"score": 0
},
{
"id": 241809572,
"name": "CVE-2020-0668",
"full_name": "RedCursorSecurityConsulting\/CVE-2020-0668",
"owner": {
"login": "RedCursorSecurityConsulting",
"id": 61265565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61265565?v=4",
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting"
},
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting\/CVE-2020-0668",
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2021-02-12T22:44:42Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 176,
"watchers_count": 176,
"forks_count": 47,
"forks": 47,
"watchers": 176,
"score": 0
},
{
"id": 243248025,
"name": "CVE-2020-0668",

View file

@ -1,4 +1,50 @@
[
{
"id": 243126851,
"name": "cve-2020-0688",
"full_name": "random-robbie\/cve-2020-0688",
"owner": {
"login": "random-robbie",
"id": 4902869,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4",
"html_url": "https:\/\/github.com\/random-robbie"
},
"html_url": "https:\/\/github.com\/random-robbie\/cve-2020-0688",
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-25T23:44:16Z",
"updated_at": "2021-01-23T16:10:33Z",
"pushed_at": "2020-02-26T00:58:39Z",
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 47,
"forks": 47,
"watchers": 148,
"score": 0
},
{
"id": 243257176,
"name": "CVE-2020-0688",
"full_name": "Jumbo-WJB\/CVE-2020-0688",
"owner": {
"login": "Jumbo-WJB",
"id": 7954518,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7954518?v=4",
"html_url": "https:\/\/github.com\/Jumbo-WJB"
},
"html_url": "https:\/\/github.com\/Jumbo-WJB\/CVE-2020-0688",
"description": "CVE-2020-0688 - Exchange",
"fork": false,
"created_at": "2020-02-26T12:28:11Z",
"updated_at": "2021-02-01T07:23:40Z",
"pushed_at": "2020-02-27T03:50:07Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 24,
"forks": 24,
"watchers": 53,
"score": 0
},
{
"id": 243416592,
"name": "cve-2020-0688",
@ -22,6 +68,29 @@
"watchers": 261,
"score": 0
},
{
"id": 243531424,
"name": "CVE-2020-0688_EXP",
"full_name": "Yt1g3r\/CVE-2020-0688_EXP",
"owner": {
"login": "Yt1g3r",
"id": 12625147,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
"html_url": "https:\/\/github.com\/Yt1g3r"
},
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2020-0688_EXP",
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-12-21T21:53:51Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 57,
"forks": 57,
"watchers": 131,
"score": 0
},
{
"id": 243640997,
"name": "CVE-2020-0688",
@ -45,6 +114,29 @@
"watchers": 0,
"score": 0
},
{
"id": 243672879,
"name": "cve-2020-0688",
"full_name": "truongtn\/cve-2020-0688",
"owner": {
"login": "truongtn",
"id": 11813006,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11813006?v=4",
"html_url": "https:\/\/github.com\/truongtn"
},
"html_url": "https:\/\/github.com\/truongtn\/cve-2020-0688",
"description": "I made this script for conducting CVE-2020-0688 more rapidly. It helps to improve checking the vuln, reducing hugely steps for that",
"fork": false,
"created_at": "2020-02-28T03:47:40Z",
"updated_at": "2020-02-28T09:39:14Z",
"pushed_at": "2020-02-28T04:04:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 243801603,
"name": "CVE-2020-0688-Scanner",
@ -68,6 +160,98 @@
"watchers": 34,
"score": 0
},
{
"id": 243813543,
"name": "CVE-2020-0688",
"full_name": "youncyb\/CVE-2020-0688",
"owner": {
"login": "youncyb",
"id": 33374470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33374470?v=4",
"html_url": "https:\/\/github.com\/youncyb"
},
"html_url": "https:\/\/github.com\/youncyb\/CVE-2020-0688",
"description": "CVE-2020-0688",
"fork": false,
"created_at": "2020-02-28T17:03:53Z",
"updated_at": "2020-05-18T10:43:41Z",
"pushed_at": "2020-02-28T17:07:15Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
},
{
"id": 244149446,
"name": "CVE-2020-0688",
"full_name": "zcgonvh\/CVE-2020-0688",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2020-0688",
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2021-02-09T13:05:58Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 68,
"forks": 68,
"watchers": 267,
"score": 0
},
{
"id": 245013193,
"name": "PSForgot2kEyXCHANGE",
"full_name": "justin-p\/PSForgot2kEyXCHANGE",
"owner": {
"login": "justin-p",
"id": 8249280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8249280?v=4",
"html_url": "https:\/\/github.com\/justin-p"
},
"html_url": "https:\/\/github.com\/justin-p\/PSForgot2kEyXCHANGE",
"description": "PoC for Forgot2kEyXCHANGE (CVE-2020-0688) written in PowerShell",
"fork": false,
"created_at": "2020-03-04T22:02:30Z",
"updated_at": "2020-08-14T17:15:13Z",
"pushed_at": "2020-03-05T08:02:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 3,
"score": 0
},
{
"id": 248554405,
"name": "CVE-2020-0688",
"full_name": "cert-lv\/CVE-2020-0688",
"owner": {
"login": "cert-lv",
"id": 22764485,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22764485?v=4",
"html_url": "https:\/\/github.com\/cert-lv"
},
"html_url": "https:\/\/github.com\/cert-lv\/CVE-2020-0688",
"description": "Vulnerability scanner for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-19T16:39:56Z",
"updated_at": "2021-01-09T11:45:35Z",
"pushed_at": "2020-03-19T16:41:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 251646716,
"name": "CVE-2020-0688",

View file

@ -21,5 +21,28 @@
"forks": 11,
"watchers": 14,
"score": 0
},
{
"id": 242502226,
"name": "CVE-2020-0753-and-CVE-2020-0754",
"full_name": "VikasVarshney\/CVE-2020-0753-and-CVE-2020-0754",
"owner": {
"login": "VikasVarshney",
"id": 3353731,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3353731?v=4",
"html_url": "https:\/\/github.com\/VikasVarshney"
},
"html_url": "https:\/\/github.com\/VikasVarshney\/CVE-2020-0753-and-CVE-2020-0754",
"description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six unfixed Window DOS Vulnerabilities.",
"fork": false,
"created_at": "2020-02-23T11:10:49Z",
"updated_at": "2020-03-11T13:36:15Z",
"pushed_at": "2020-02-22T13:57:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 13,
"forks": 13,
"watchers": 3,
"score": 0
}
]

View file

@ -45,6 +45,29 @@
"watchers": 20,
"score": 0
},
{
"id": 246467738,
"name": "DisableSMBCompression",
"full_name": "technion\/DisableSMBCompression",
"owner": {
"login": "technion",
"id": 1948596,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1948596?v=4",
"html_url": "https:\/\/github.com\/technion"
},
"html_url": "https:\/\/github.com\/technion\/DisableSMBCompression",
"description": "CVE-2020-0796 Flaw Mitigation - Active Directory Administrative Templates",
"fork": false,
"created_at": "2020-03-11T03:43:29Z",
"updated_at": "2020-03-12T16:13:41Z",
"pushed_at": "2020-03-11T04:57:07Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 246525183,
"name": "CVE-2020-0796",
@ -91,6 +114,328 @@
"watchers": 579,
"score": 0
},
{
"id": 246621836,
"name": "CVE-2020-0796-Checker",
"full_name": "joaozietolie\/CVE-2020-0796-Checker",
"owner": {
"login": "joaozietolie",
"id": 26208666,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26208666?v=4",
"html_url": "https:\/\/github.com\/joaozietolie"
},
"html_url": "https:\/\/github.com\/joaozietolie\/CVE-2020-0796-Checker",
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
"fork": false,
"created_at": "2020-03-11T16:23:03Z",
"updated_at": "2021-01-03T15:58:32Z",
"pushed_at": "2020-03-11T22:50:40Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 9,
"forks": 9,
"watchers": 12,
"score": 0
},
{
"id": 246652992,
"name": "cve-2020-0796",
"full_name": "ButrintKomoni\/cve-2020-0796",
"owner": {
"login": "ButrintKomoni",
"id": 10991703,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10991703?v=4",
"html_url": "https:\/\/github.com\/ButrintKomoni"
},
"html_url": "https:\/\/github.com\/ButrintKomoni\/cve-2020-0796",
"description": "Identifying and Mitigating the CVE-20200796 flaw in the fly",
"fork": false,
"created_at": "2020-03-11T18:42:32Z",
"updated_at": "2021-02-03T12:02:35Z",
"pushed_at": "2020-03-12T10:19:35Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"score": 0
},
{
"id": 246724151,
"name": "cve-2020-0796-scanner",
"full_name": "dickens88\/cve-2020-0796-scanner",
"owner": {
"login": "dickens88",
"id": 8390209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8390209?v=4",
"html_url": "https:\/\/github.com\/dickens88"
},
"html_url": "https:\/\/github.com\/dickens88\/cve-2020-0796-scanner",
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
"fork": false,
"created_at": "2020-03-12T02:20:07Z",
"updated_at": "2021-01-18T07:54:35Z",
"pushed_at": "2020-03-12T02:49:10Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 10,
"forks": 10,
"watchers": 10,
"score": 0
},
{
"id": 246728549,
"name": "CVE-2020-0796",
"full_name": "kn6869610\/CVE-2020-0796",
"owner": {
"login": "kn6869610",
"id": 6917744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
"html_url": "https:\/\/github.com\/kn6869610"
},
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2020-0796",
"description": null,
"fork": false,
"created_at": "2020-03-12T02:47:49Z",
"updated_at": "2020-03-12T03:19:53Z",
"pushed_at": "2020-03-12T03:19:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 246795620,
"name": "eternalghosttest",
"full_name": "awareseven\/eternalghosttest",
"owner": {
"login": "awareseven",
"id": 53170037,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53170037?v=4",
"html_url": "https:\/\/github.com\/awareseven"
},
"html_url": "https:\/\/github.com\/awareseven\/eternalghosttest",
"description": "This repository contains a test case for CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T09:35:57Z",
"updated_at": "2020-03-15T11:39:18Z",
"pushed_at": "2020-03-12T14:03:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 246837546,
"name": "CVE-2020-0796-PoC",
"full_name": "weidutech\/CVE-2020-0796-PoC",
"owner": {
"login": "weidutech",
"id": 30208579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30208579?v=4",
"html_url": "https:\/\/github.com\/weidutech"
},
"html_url": "https:\/\/github.com\/weidutech\/CVE-2020-0796-PoC",
"description": " CVE-2020-0796 - a wormable SMBv3 vulnerability. ",
"fork": false,
"created_at": "2020-03-12T13:11:02Z",
"updated_at": "2020-03-12T13:12:16Z",
"pushed_at": "2020-03-12T13:12:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246870588,
"name": "CVE-2020-0796-Scanner",
"full_name": "xax007\/CVE-2020-0796-Scanner",
"owner": {
"login": "xax007",
"id": 44893059,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44893059?v=4",
"html_url": "https:\/\/github.com\/xax007"
},
"html_url": "https:\/\/github.com\/xax007\/CVE-2020-0796-Scanner",
"description": "CVE-2020-0796 SMBv3.1.1 Compression Capability Vulnerability Scanner",
"fork": false,
"created_at": "2020-03-12T15:36:43Z",
"updated_at": "2020-03-12T15:55:21Z",
"pushed_at": "2020-03-12T15:46:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 246883669,
"name": "Scanners-for-CVE-2020-0796-Testing",
"full_name": "Dhoomralochana\/Scanners-for-CVE-2020-0796-Testing",
"owner": {
"login": "Dhoomralochana",
"id": 56705549,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56705549?v=4",
"html_url": "https:\/\/github.com\/Dhoomralochana"
},
"html_url": "https:\/\/github.com\/Dhoomralochana\/Scanners-for-CVE-2020-0796-Testing",
"description": "Scanners List - Microsoft Windows SMBv3 Remote Code Execution Vulnerability (CVE-2020-0796) ",
"fork": false,
"created_at": "2020-03-12T16:39:41Z",
"updated_at": "2020-03-12T16:44:48Z",
"pushed_at": "2020-03-12T16:44:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246894204,
"name": "smbee",
"full_name": "UraSecTeam\/smbee",
"owner": {
"login": "UraSecTeam",
"id": 23280827,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23280827?v=4",
"html_url": "https:\/\/github.com\/UraSecTeam"
},
"html_url": "https:\/\/github.com\/UraSecTeam\/smbee",
"description": "Check system is vulnerable CVE-2020-0796 (SMB v3)",
"fork": false,
"created_at": "2020-03-12T17:32:56Z",
"updated_at": "2020-03-13T00:16:03Z",
"pushed_at": "2020-03-12T17:42:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 246900063,
"name": "SMBGhost",
"full_name": "netscylla\/SMBGhost",
"owner": {
"login": "netscylla",
"id": 25352732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25352732?v=4",
"html_url": "https:\/\/github.com\/netscylla"
},
"html_url": "https:\/\/github.com\/netscylla\/SMBGhost",
"description": "SMBGhost (CVE-2020-0796) threaded scanner",
"fork": false,
"created_at": "2020-03-12T18:03:45Z",
"updated_at": "2021-01-18T21:45:07Z",
"pushed_at": "2020-03-12T22:20:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 246905632,
"name": "CVE-2020-0796-PoC",
"full_name": "eerykitty\/CVE-2020-0796-PoC",
"owner": {
"login": "eerykitty",
"id": 10905603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10905603?v=4",
"html_url": "https:\/\/github.com\/eerykitty"
},
"html_url": "https:\/\/github.com\/eerykitty\/CVE-2020-0796-PoC",
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2021-02-12T05:08:07Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 264,
"watchers_count": 264,
"forks_count": 109,
"forks": 109,
"watchers": 264,
"score": 0
},
{
"id": 246914011,
"name": "SMBCompScan",
"full_name": "wneessen\/SMBCompScan",
"owner": {
"login": "wneessen",
"id": 542696,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/542696?v=4",
"html_url": "https:\/\/github.com\/wneessen"
},
"html_url": "https:\/\/github.com\/wneessen\/SMBCompScan",
"description": "Scanner script to identify hosts vulnerable to CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T19:22:36Z",
"updated_at": "2020-03-15T17:51:44Z",
"pushed_at": "2020-03-12T21:40:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 246915801,
"name": "SMBGhost",
"full_name": "ioncodes\/SMBGhost",
"owner": {
"login": "ioncodes",
"id": 18533297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18533297?v=4",
"html_url": "https:\/\/github.com\/ioncodes"
},
"html_url": "https:\/\/github.com\/ioncodes\/SMBGhost",
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
"fork": false,
"created_at": "2020-03-12T19:33:18Z",
"updated_at": "2021-02-05T18:49:00Z",
"pushed_at": "2020-03-13T07:38:43Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 21,
"forks": 21,
"watchers": 55,
"score": 0
},
{
"id": 246918199,
"name": "CVE-2020-0796",
"full_name": "laolisafe\/CVE-2020-0796",
"owner": {
"login": "laolisafe",
"id": 45027935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45027935?v=4",
"html_url": "https:\/\/github.com\/laolisafe"
},
"html_url": "https:\/\/github.com\/laolisafe\/CVE-2020-0796",
"description": "SMBv3 RCE vulnerability in SMBv3",
"fork": false,
"created_at": "2020-03-12T19:46:25Z",
"updated_at": "2020-03-13T05:36:21Z",
"pushed_at": "2020-03-13T05:36:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 246921709,
"name": "SMBScanner",
@ -114,6 +459,144 @@
"watchers": 13,
"score": 0
},
{
"id": 246927086,
"name": "SMBGhost-WorkaroundApplier",
"full_name": "Almorabea\/SMBGhost-WorkaroundApplier",
"owner": {
"login": "Almorabea",
"id": 13198863,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13198863?v=4",
"html_url": "https:\/\/github.com\/Almorabea"
},
"html_url": "https:\/\/github.com\/Almorabea\/SMBGhost-WorkaroundApplier",
"description": "This script will apply the workaround for the vulnerability CVE-2020-0796 for the SMBv3 unauthenticated RCE",
"fork": false,
"created_at": "2020-03-12T20:41:30Z",
"updated_at": "2020-03-13T14:52:51Z",
"pushed_at": "2020-03-13T14:52:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 246951836,
"name": "SMBGhosts",
"full_name": "IAreKyleW00t\/SMBGhosts",
"owner": {
"login": "IAreKyleW00t",
"id": 1072572,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1072572?v=4",
"html_url": "https:\/\/github.com\/IAreKyleW00t"
},
"html_url": "https:\/\/github.com\/IAreKyleW00t\/SMBGhosts",
"description": "Multithreaded Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-12T23:55:39Z",
"updated_at": "2020-03-13T02:27:41Z",
"pushed_at": "2020-03-13T02:27:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247023558,
"name": "CVE-2020-0796",
"full_name": "vysecurity\/CVE-2020-0796",
"owner": {
"login": "vysecurity",
"id": 3596242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
"html_url": "https:\/\/github.com\/vysecurity"
},
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2020-0796",
"description": "CVE-2020-0796 - Working PoC - 20200313",
"fork": false,
"created_at": "2020-03-13T08:34:31Z",
"updated_at": "2020-03-22T18:40:58Z",
"pushed_at": "2020-03-13T08:35:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 247064505,
"name": "CVE-2020-0796",
"full_name": "marcinguy\/CVE-2020-0796",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/CVE-2020-0796",
"description": "CVE-2020-0796 SMBGhost",
"fork": false,
"created_at": "2020-03-13T12:18:13Z",
"updated_at": "2020-03-13T15:21:33Z",
"pushed_at": "2020-03-13T15:21:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247111415,
"name": "cve-2020-0796",
"full_name": "plorinquer\/cve-2020-0796",
"owner": {
"login": "plorinquer",
"id": 17765872,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17765872?v=4",
"html_url": "https:\/\/github.com\/plorinquer"
},
"html_url": "https:\/\/github.com\/plorinquer\/cve-2020-0796",
"description": null,
"fork": false,
"created_at": "2020-03-13T16:08:46Z",
"updated_at": "2020-03-13T17:57:34Z",
"pushed_at": "2020-03-13T17:57:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 247147253,
"name": "SMBv3.1.1-scan---CVE-2020-0796",
"full_name": "BinaryShadow94\/SMBv3.1.1-scan---CVE-2020-0796",
"owner": {
"login": "BinaryShadow94",
"id": 26254187,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26254187?v=4",
"html_url": "https:\/\/github.com\/BinaryShadow94"
},
"html_url": "https:\/\/github.com\/BinaryShadow94\/SMBv3.1.1-scan---CVE-2020-0796",
"description": "Little scanner to know if a machine is runnig SMBv3 (possible vulnerability CVE-2020-0796)",
"fork": false,
"created_at": "2020-03-13T19:27:30Z",
"updated_at": "2020-07-22T12:58:52Z",
"pushed_at": "2020-03-13T20:01:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 247195467,
"name": "SMBGhost_Scanner",
@ -137,6 +620,98 @@
"watchers": 11,
"score": 0
},
{
"id": 247218948,
"name": "CVE-2020-0796",
"full_name": "wsfengfan\/CVE-2020-0796",
"owner": {
"login": "wsfengfan",
"id": 33821840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33821840?v=4",
"html_url": "https:\/\/github.com\/wsfengfan"
},
"html_url": "https:\/\/github.com\/wsfengfan\/CVE-2020-0796",
"description": "CVE-2020-0796 Python POC buffer overflow",
"fork": false,
"created_at": "2020-03-14T05:39:37Z",
"updated_at": "2020-03-14T05:51:50Z",
"pushed_at": "2020-03-14T05:51:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247370340,
"name": "aioScan_CVE-2020-0796",
"full_name": "GuoKerS\/aioScan_CVE-2020-0796",
"owner": {
"login": "GuoKerS",
"id": 31996804,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31996804?v=4",
"html_url": "https:\/\/github.com\/GuoKerS"
},
"html_url": "https:\/\/github.com\/GuoKerS\/aioScan_CVE-2020-0796",
"description": "基于asyncio协程的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。",
"fork": false,
"created_at": "2020-03-14T23:39:25Z",
"updated_at": "2020-06-14T08:47:04Z",
"pushed_at": "2020-03-18T04:48:23Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 13,
"forks": 13,
"watchers": 16,
"score": 0
},
{
"id": 247393369,
"name": "CVE-2020-0796-Scanner",
"full_name": "jiansiting\/CVE-2020-0796-Scanner",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2020-0796-Scanner",
"description": "CVE-2020-0796-Scanner",
"fork": false,
"created_at": "2020-03-15T03:17:47Z",
"updated_at": "2020-10-28T13:55:06Z",
"pushed_at": "2020-03-15T03:25:41Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks": 3,
"watchers": 9,
"score": 0
},
{
"id": 247561192,
"name": "Unauthenticated-CVE-2020-0796-PoC",
"full_name": "maxpl0it\/Unauthenticated-CVE-2020-0796-PoC",
"owner": {
"login": "maxpl0it",
"id": 27973683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4",
"html_url": "https:\/\/github.com\/maxpl0it"
},
"html_url": "https:\/\/github.com\/maxpl0it\/Unauthenticated-CVE-2020-0796-PoC",
"description": "An unauthenticated PoC for CVE-2020-0796",
"fork": false,
"created_at": "2020-03-15T22:17:50Z",
"updated_at": "2020-09-25T05:07:08Z",
"pushed_at": "2020-03-15T22:20:58Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 7,
"forks": 7,
"watchers": 21,
"score": 0
},
{
"id": 247578292,
"name": "CVE-2020-0796",
@ -160,6 +735,144 @@
"watchers": 0,
"score": 0
},
{
"id": 247747657,
"name": "smbghost",
"full_name": "sujitawake\/smbghost",
"owner": {
"login": "sujitawake",
"id": 50439521,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50439521?v=4",
"html_url": "https:\/\/github.com\/sujitawake"
},
"html_url": "https:\/\/github.com\/sujitawake\/smbghost",
"description": "CVE-2020-0796_CoronaBlue_SMBGhost",
"fork": false,
"created_at": "2020-03-16T15:31:52Z",
"updated_at": "2020-04-06T03:48:20Z",
"pushed_at": "2020-03-19T08:06:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 247749832,
"name": "CVE-2020-0796",
"full_name": "julixsalas\/CVE-2020-0796",
"owner": {
"login": "julixsalas",
"id": 7083476,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7083476?v=4",
"html_url": "https:\/\/github.com\/julixsalas"
},
"html_url": "https:\/\/github.com\/julixsalas\/CVE-2020-0796",
"description": "Scanner for CVE-2020-0796",
"fork": false,
"created_at": "2020-03-16T15:39:22Z",
"updated_at": "2020-03-16T15:46:24Z",
"pushed_at": "2020-03-16T15:46:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 248334368,
"name": "SMBGhost_Crash_Poc",
"full_name": "5l1v3r1\/SMBGhost_Crash_Poc",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/SMBGhost_Crash_Poc",
"description": "CVE-2020-0796.SMBGhost_Crash_Poc ",
"fork": false,
"created_at": "2020-03-18T20:21:01Z",
"updated_at": "2021-02-09T05:22:42Z",
"pushed_at": "2020-03-18T08:57:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 248334437,
"name": "CVE-2020-0796-PoC-and-Scan",
"full_name": "5l1v3r1\/CVE-2020-0796-PoC-and-Scan",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0796-PoC-and-Scan",
"description": "Lightweight PoC and Scanner for CVE-2020-0796 without authentication.",
"fork": false,
"created_at": "2020-03-18T20:21:25Z",
"updated_at": "2020-03-20T10:33:28Z",
"pushed_at": "2020-03-16T01:06:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 249034829,
"name": "CVE-2020-0796-DoS",
"full_name": "cory-zajicek\/CVE-2020-0796-DoS",
"owner": {
"login": "cory-zajicek",
"id": 62479809,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62479809?v=4",
"html_url": "https:\/\/github.com\/cory-zajicek"
},
"html_url": "https:\/\/github.com\/cory-zajicek\/CVE-2020-0796-DoS",
"description": "DoS PoC for CVE-2020-0796 (SMBGhost)",
"fork": false,
"created_at": "2020-03-21T18:17:10Z",
"updated_at": "2020-06-06T08:14:31Z",
"pushed_at": "2020-03-24T05:52:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 251207693,
"name": "cve-2020-0796-vuln",
"full_name": "tripledd\/cve-2020-0796-vuln",
"owner": {
"login": "tripledd",
"id": 25425306,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25425306?v=4",
"html_url": "https:\/\/github.com\/tripledd"
},
"html_url": "https:\/\/github.com\/tripledd\/cve-2020-0796-vuln",
"description": null,
"fork": false,
"created_at": "2020-03-30T05:13:16Z",
"updated_at": "2020-03-30T05:14:12Z",
"pushed_at": "2020-03-30T05:14:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 251287681,
"name": "CVE-2020-0796",
@ -174,13 +887,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-02-10T15:52:33Z",
"updated_at": "2021-02-14T08:15:34Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1071,
"watchers_count": 1071,
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 358,
"forks": 358,
"watchers": 1071,
"watchers": 1072,
"score": 0
},
{
@ -206,6 +919,29 @@
"watchers": 213,
"score": 0
},
{
"id": 251510910,
"name": "CVE-2020-0796-LPE",
"full_name": "TinToSer\/CVE-2020-0796-LPE",
"owner": {
"login": "TinToSer",
"id": 52107530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52107530?v=4",
"html_url": "https:\/\/github.com\/TinToSer"
},
"html_url": "https:\/\/github.com\/TinToSer\/CVE-2020-0796-LPE",
"description": "SMBGHOST local privilege escalation",
"fork": false,
"created_at": "2020-03-31T05:41:30Z",
"updated_at": "2020-03-31T05:47:04Z",
"pushed_at": "2020-03-31T05:45:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 251582597,
"name": "CVE-2020-0796-LPE-EXP",
@ -266,13 +1002,13 @@
"description": null,
"fork": false,
"created_at": "2020-04-01T01:46:08Z",
"updated_at": "2021-02-03T12:09:47Z",
"updated_at": "2021-02-14T08:18:47Z",
"pushed_at": "2020-04-01T01:46:17Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 13,
"forks": 13,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

25
2020/CVE-2020-0797.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 247988139,
"name": "CVE-2020-0797",
"full_name": "bonesg\/CVE-2020-0797",
"owner": {
"login": "bonesg",
"id": 48800752,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48800752?v=4",
"html_url": "https:\/\/github.com\/bonesg"
},
"html_url": "https:\/\/github.com\/bonesg\/CVE-2020-0797",
"description": "Exploiter la vulnérabilité CVE-2020-0796, Remote Code Execution du protocole SMB 3.1.1 (SMBv3).",
"fork": false,
"created_at": "2020-03-17T14:16:54Z",
"updated_at": "2020-05-27T20:02:49Z",
"pushed_at": "2020-03-17T12:31:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-0799.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 248334231,
"name": "CVE-2020-0799",
"full_name": "5l1v3r1\/CVE-2020-0799",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0799",
"description": null,
"fork": false,
"created_at": "2020-03-18T20:20:23Z",
"updated_at": "2021-01-26T12:54:03Z",
"pushed_at": "2020-03-12T17:50:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-0801.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 248334283,
"name": "CVE-2020-0801",
"full_name": "5l1v3r1\/CVE-2020-0801",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0801",
"description": null,
"fork": false,
"created_at": "2020-03-18T20:20:40Z",
"updated_at": "2020-09-04T04:40:40Z",
"pushed_at": "2020-03-12T14:45:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

48
2020/CVE-2020-10560.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 246300718,
"name": "CVE-2020-10560-Key-Recovery",
"full_name": "LucidUnicorn\/CVE-2020-10560-Key-Recovery",
"owner": {
"login": "LucidUnicorn",
"id": 25187197,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25187197?v=4",
"html_url": "https:\/\/github.com\/LucidUnicorn"
},
"html_url": "https:\/\/github.com\/LucidUnicorn\/CVE-2020-10560-Key-Recovery",
"description": null,
"fork": false,
"created_at": "2020-03-10T12:55:06Z",
"updated_at": "2020-05-27T08:37:16Z",
"pushed_at": "2020-03-28T23:37:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 250903418,
"name": "CVE-2020-10560",
"full_name": "kevthehermit\/CVE-2020-10560",
"owner": {
"login": "kevthehermit",
"id": 2545096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2545096?v=4",
"html_url": "https:\/\/github.com\/kevthehermit"
},
"html_url": "https:\/\/github.com\/kevthehermit\/CVE-2020-10560",
"description": "CVE-2020-10560 OSSN Arbitrary File Read",
"fork": false,
"created_at": "2020-03-28T22:09:39Z",
"updated_at": "2020-06-29T16:40:27Z",
"pushed_at": "2020-03-28T22:48:39Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 249383499,
"name": "CVE-2020-10673",
"full_name": "0nise\/CVE-2020-10673",
"owner": {
"login": "0nise",
"id": 18393907,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18393907?v=4",
"html_url": "https:\/\/github.com\/0nise"
},
"html_url": "https:\/\/github.com\/0nise\/CVE-2020-10673",
"description": "CVE-2020-10673",
"fork": false,
"created_at": "2020-03-23T09:10:54Z",
"updated_at": "2020-04-17T05:51:17Z",
"pushed_at": "2020-03-24T13:22:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"score": 0
},
{
"id": 265876544,
"name": "CVE-2020-10673",

View file

@ -1,4 +1,418 @@
[
{
"id": 241934230,
"name": "CVE-2020-1938",
"full_name": "0nise\/CVE-2020-1938",
"owner": {
"login": "0nise",
"id": 18393907,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18393907?v=4",
"html_url": "https:\/\/github.com\/0nise"
},
"html_url": "https:\/\/github.com\/0nise\/CVE-2020-1938",
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2021-01-26T08:03:16Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 218,
"watchers_count": 218,
"forks_count": 95,
"forks": 95,
"watchers": 218,
"score": 0
},
{
"id": 241940286,
"name": "CVE-2020-1938",
"full_name": "xindongzhuaizhuai\/CVE-2020-1938",
"owner": {
"login": "xindongzhuaizhuai",
"id": 18646159,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18646159?v=4",
"html_url": "https:\/\/github.com\/xindongzhuaizhuai"
},
"html_url": "https:\/\/github.com\/xindongzhuaizhuai\/CVE-2020-1938",
"description": null,
"fork": false,
"created_at": "2020-02-20T17:00:02Z",
"updated_at": "2020-09-10T02:40:29Z",
"pushed_at": "2020-03-02T20:25:35Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 24,
"forks": 24,
"watchers": 33,
"score": 0
},
{
"id": 241953243,
"name": "CNVD-2020-10487-Tomcat-ajp-POC",
"full_name": "nibiwodong\/CNVD-2020-10487-Tomcat-ajp-POC",
"owner": {
"login": "nibiwodong",
"id": 17465789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17465789?v=4",
"html_url": "https:\/\/github.com\/nibiwodong"
},
"html_url": "https:\/\/github.com\/nibiwodong\/CNVD-2020-10487-Tomcat-ajp-POC",
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
"fork": false,
"created_at": "2020-02-20T17:57:54Z",
"updated_at": "2021-01-11T01:02:16Z",
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 53,
"forks": 53,
"watchers": 73,
"score": 0
},
{
"id": 241988804,
"name": "CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner",
"full_name": "bkfish\/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner",
"owner": {
"login": "bkfish",
"id": 38547290,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38547290?v=4",
"html_url": "https:\/\/github.com\/bkfish"
},
"html_url": "https:\/\/github.com\/bkfish\/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner",
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2021-01-25T14:53:37Z",
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 91,
"forks": 91,
"watchers": 208,
"score": 0
},
{
"id": 242038197,
"name": "CVE-2020-1938",
"full_name": "laolisafe\/CVE-2020-1938",
"owner": {
"login": "laolisafe",
"id": 45027935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45027935?v=4",
"html_url": "https:\/\/github.com\/laolisafe"
},
"html_url": "https:\/\/github.com\/laolisafe\/CVE-2020-1938",
"description": "CVE-2020-1938漏洞复现",
"fork": false,
"created_at": "2020-02-21T02:36:37Z",
"updated_at": "2020-10-18T13:38:55Z",
"pushed_at": "2020-02-21T02:49:57Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 10,
"forks": 10,
"watchers": 35,
"score": 0
},
{
"id": 242054816,
"name": "CVE-2020-1938",
"full_name": "DaemonShao\/CVE-2020-1938",
"owner": {
"login": "DaemonShao",
"id": 24861334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24861334?v=4",
"html_url": "https:\/\/github.com\/DaemonShao"
},
"html_url": "https:\/\/github.com\/DaemonShao\/CVE-2020-1938",
"description": null,
"fork": false,
"created_at": "2020-02-21T04:34:40Z",
"updated_at": "2020-09-02T07:29:40Z",
"pushed_at": "2020-02-21T04:40:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 242083141,
"name": "CVE-2020-1938-Tomact-file_include-file_read",
"full_name": "sv3nbeast\/CVE-2020-1938-Tomact-file_include-file_read",
"owner": {
"login": "sv3nbeast",
"id": 55974091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55974091?v=4",
"html_url": "https:\/\/github.com\/sv3nbeast"
},
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-1938-Tomact-file_include-file_read",
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
"fork": false,
"created_at": "2020-02-21T07:48:50Z",
"updated_at": "2021-01-14T07:05:40Z",
"pushed_at": "2020-02-21T10:19:52Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 13,
"forks": 13,
"watchers": 23,
"score": 0
},
{
"id": 242093081,
"name": "CVE-2020-1938",
"full_name": "fairyming\/CVE-2020-1938",
"owner": {
"login": "fairyming",
"id": 44915879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44915879?v=4",
"html_url": "https:\/\/github.com\/fairyming"
},
"html_url": "https:\/\/github.com\/fairyming\/CVE-2020-1938",
"description": "在一定条件下可执行命令",
"fork": false,
"created_at": "2020-02-21T08:42:50Z",
"updated_at": "2020-07-26T11:21:58Z",
"pushed_at": "2020-02-21T08:45:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 8,
"forks": 8,
"watchers": 5,
"score": 0
},
{
"id": 242107452,
"name": "CVE-2020-1938",
"full_name": "dacade\/CVE-2020-1938",
"owner": {
"login": "dacade",
"id": 31815137,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31815137?v=4",
"html_url": "https:\/\/github.com\/dacade"
},
"html_url": "https:\/\/github.com\/dacade\/CVE-2020-1938",
"description": null,
"fork": false,
"created_at": "2020-02-21T09:56:19Z",
"updated_at": "2021-02-07T07:27:07Z",
"pushed_at": "2020-02-28T07:08:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 242163769,
"name": "CVE-2020-1938TomcatAjpScanner",
"full_name": "woaiqiukui\/CVE-2020-1938TomcatAjpScanner",
"owner": {
"login": "woaiqiukui",
"id": 49117752,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49117752?v=4",
"html_url": "https:\/\/github.com\/woaiqiukui"
},
"html_url": "https:\/\/github.com\/woaiqiukui\/CVE-2020-1938TomcatAjpScanner",
"description": "批量扫描TomcatAJP漏洞",
"fork": false,
"created_at": "2020-02-21T14:55:40Z",
"updated_at": "2021-01-26T08:06:51Z",
"pushed_at": "2020-02-22T01:58:22Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"score": 0
},
{
"id": 242193832,
"name": "tomcat-cve-2020-1938-check",
"full_name": "fatal0\/tomcat-cve-2020-1938-check",
"owner": {
"login": "fatal0",
"id": 6017581,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6017581?v=4",
"html_url": "https:\/\/github.com\/fatal0"
},
"html_url": "https:\/\/github.com\/fatal0\/tomcat-cve-2020-1938-check",
"description": null,
"fork": false,
"created_at": "2020-02-21T17:24:45Z",
"updated_at": "2020-03-16T07:38:08Z",
"pushed_at": "2020-02-25T08:55:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 242284250,
"name": "GhostCat-LFI-exp",
"full_name": "ze0r\/GhostCat-LFI-exp",
"owner": {
"login": "ze0r",
"id": 43227253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4",
"html_url": "https:\/\/github.com\/ze0r"
},
"html_url": "https:\/\/github.com\/ze0r\/GhostCat-LFI-exp",
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-22T05:17:09Z",
"updated_at": "2020-12-23T12:17:04Z",
"pushed_at": "2020-02-22T05:23:53Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"score": 0
},
{
"id": 242345920,
"name": "CNVD-2020-10487-Bulk-verification",
"full_name": "delsadan\/CNVD-2020-10487-Bulk-verification",
"owner": {
"login": "delsadan",
"id": 22538623,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22538623?v=4",
"html_url": "https:\/\/github.com\/delsadan"
},
"html_url": "https:\/\/github.com\/delsadan\/CNVD-2020-10487-Bulk-verification",
"description": "CNVD-2020-10487 OR CVE-2020-1938 批量验证脚本,批量验证,并自动截图,方便提交及复核",
"fork": false,
"created_at": "2020-02-22T13:25:57Z",
"updated_at": "2020-07-02T17:02:39Z",
"pushed_at": "2020-02-24T08:18:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 242371713,
"name": "Ghostcat-CNVD-2020-10487",
"full_name": "00theway\/Ghostcat-CNVD-2020-10487",
"owner": {
"login": "00theway",
"id": 25681235,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25681235?v=4",
"html_url": "https:\/\/github.com\/00theway"
},
"html_url": "https:\/\/github.com\/00theway\/Ghostcat-CNVD-2020-10487",
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2021-02-08T18:07:59Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 65,
"forks": 65,
"watchers": 173,
"score": 0
},
{
"id": 243285368,
"name": "ghostcat-verification",
"full_name": "shaunmclernon\/ghostcat-verification",
"owner": {
"login": "shaunmclernon",
"id": 54109164,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109164?v=4",
"html_url": "https:\/\/github.com\/shaunmclernon"
},
"html_url": "https:\/\/github.com\/shaunmclernon\/ghostcat-verification",
"description": "Learnings on how to verify if vulnerable to Ghostcat (aka CVE-2020-1938)",
"fork": false,
"created_at": "2020-02-26T14:40:12Z",
"updated_at": "2020-09-02T07:29:28Z",
"pushed_at": "2020-02-26T15:33:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 243545601,
"name": "Ghostcat-CVE-2020-1938",
"full_name": "Zaziki1337\/Ghostcat-CVE-2020-1938",
"owner": {
"login": "Zaziki1337",
"id": 3006203,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3006203?v=4",
"html_url": "https:\/\/github.com\/Zaziki1337"
},
"html_url": "https:\/\/github.com\/Zaziki1337\/Ghostcat-CVE-2020-1938",
"description": "Test Explo for Ghostcat CVE-2020-1938",
"fork": false,
"created_at": "2020-02-27T15:07:30Z",
"updated_at": "2020-02-27T15:12:15Z",
"pushed_at": "2020-02-27T15:12:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 244069452,
"name": "CVE-2020-1938-Clean-Version",
"full_name": "w4fz5uck5\/CVE-2020-1938-Clean-Version",
"owner": {
"login": "w4fz5uck5",
"id": 32375656,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32375656?v=4",
"html_url": "https:\/\/github.com\/w4fz5uck5"
},
"html_url": "https:\/\/github.com\/w4fz5uck5\/CVE-2020-1938-Clean-Version",
"description": "CVE-2020-1938(GhostCat) clean and readable code version",
"fork": false,
"created_at": "2020-03-01T01:45:23Z",
"updated_at": "2020-09-02T07:29:16Z",
"pushed_at": "2020-03-01T02:43:03Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,
"forks": 4,
"watchers": 8,
"score": 0
},
{
"id": 248716444,
"name": "CVE-2020-1938-Tool",
"full_name": "Just1ceP4rtn3r\/CVE-2020-1938-Tool",
"owner": {
"login": "Just1ceP4rtn3r",
"id": 49367740,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49367740?v=4",
"html_url": "https:\/\/github.com\/Just1ceP4rtn3r"
},
"html_url": "https:\/\/github.com\/Just1ceP4rtn3r\/CVE-2020-1938-Tool",
"description": "批量检测幽灵猫漏洞",
"fork": false,
"created_at": "2020-03-20T09:29:18Z",
"updated_at": "2020-09-18T05:13:11Z",
"pushed_at": "2020-03-20T09:37:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 250481242,
"name": "CNVD-2020-10487",

View file

@ -1,4 +1,96 @@
[
{
"id": 246425449,
"name": "CVE-2020-1947",
"full_name": "5l1v3r1\/CVE-2020-1947",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-1947",
"description": "CVE-2020-1947 poc",
"fork": false,
"created_at": "2020-03-10T22:55:43Z",
"updated_at": "2020-10-13T11:46:58Z",
"pushed_at": "2020-03-10T12:48:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 15,
"forks": 15,
"watchers": 0,
"score": 0
},
{
"id": 246463480,
"name": "CVE-2020-1947",
"full_name": "jas502n\/CVE-2020-1947",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-1947",
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
"fork": false,
"created_at": "2020-03-11T03:15:25Z",
"updated_at": "2020-12-14T07:23:46Z",
"pushed_at": "2020-03-11T03:54:34Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 12,
"forks": 12,
"watchers": 31,
"score": 0
},
{
"id": 246566519,
"name": "CVE-2020-1947",
"full_name": "wsfengfan\/CVE-2020-1947",
"owner": {
"login": "wsfengfan",
"id": 33821840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33821840?v=4",
"html_url": "https:\/\/github.com\/wsfengfan"
},
"html_url": "https:\/\/github.com\/wsfengfan\/CVE-2020-1947",
"description": "CVE-2020-1947 Python POC",
"fork": false,
"created_at": "2020-03-11T12:35:56Z",
"updated_at": "2020-05-08T12:45:34Z",
"pushed_at": "2020-03-11T15:06:29Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 5,
"score": 0
},
{
"id": 247037641,
"name": "ShardingSphere_CVE-2020-1947",
"full_name": "shadowsock5\/ShardingSphere_CVE-2020-1947",
"owner": {
"login": "shadowsock5",
"id": 30398606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30398606?v=4",
"html_url": "https:\/\/github.com\/shadowsock5"
},
"html_url": "https:\/\/github.com\/shadowsock5\/ShardingSphere_CVE-2020-1947",
"description": null,
"fork": false,
"created_at": "2020-03-13T09:47:33Z",
"updated_at": "2020-03-18T03:16:05Z",
"pushed_at": "2020-03-13T09:49:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 267802055,
"name": "CVE-2020-1947",

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-08T09:02:01Z",
"updated_at": "2021-02-14T03:20:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 917,
"watchers_count": 917,
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 217,
"forks": 217,
"watchers": 917,
"watchers": 916,
"score": 0
},
{

View file

@ -1,4 +1,27 @@
[
{
"id": 245452290,
"name": "CVE-2020-2555",
"full_name": "Hu3sky\/CVE-2020-2555",
"owner": {
"login": "Hu3sky",
"id": 37403964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37403964?v=4",
"html_url": "https:\/\/github.com\/Hu3sky"
},
"html_url": "https:\/\/github.com\/Hu3sky\/CVE-2020-2555",
"description": null,
"fork": false,
"created_at": "2020-03-06T15:20:17Z",
"updated_at": "2020-03-06T15:43:21Z",
"pushed_at": "2020-03-06T15:29:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 245462192,
"name": "CVE-2020-2555",
@ -45,6 +68,52 @@
"watchers": 28,
"score": 0
},
{
"id": 245688520,
"name": "CVE-2020-2555",
"full_name": "Y4er\/CVE-2020-2555",
"owner": {
"login": "Y4er",
"id": 40487319,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40487319?v=4",
"html_url": "https:\/\/github.com\/Y4er"
},
"html_url": "https:\/\/github.com\/Y4er\/CVE-2020-2555",
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2021-02-01T04:39:26Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 47,
"forks": 47,
"watchers": 143,
"score": 0
},
{
"id": 246241949,
"name": "cve-2020-2555",
"full_name": "Maskhe\/cve-2020-2555",
"owner": {
"login": "Maskhe",
"id": 30264078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30264078?v=4",
"html_url": "https:\/\/github.com\/Maskhe"
},
"html_url": "https:\/\/github.com\/Maskhe\/cve-2020-2555",
"description": "CVE-2020-2555",
"fork": false,
"created_at": "2020-03-10T08:06:08Z",
"updated_at": "2021-01-28T03:07:11Z",
"pushed_at": "2020-03-10T08:15:45Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 9,
"forks": 9,
"watchers": 10,
"score": 0
},
{
"id": 296616953,
"name": "CVE-2020-2555",

25
2020/CVE-2020-5250.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 246657341,
"name": "lblfixer_cve2020_5250",
"full_name": "drkbcn\/lblfixer_cve2020_5250",
"owner": {
"login": "drkbcn",
"id": 2090227,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2090227?v=4",
"html_url": "https:\/\/github.com\/drkbcn"
},
"html_url": "https:\/\/github.com\/drkbcn\/lblfixer_cve2020_5250",
"description": "Labelgrup Fixer for CVE-2020-5250 vulnerability",
"fork": false,
"created_at": "2020-03-11T19:04:14Z",
"updated_at": "2020-03-21T10:29:55Z",
"pushed_at": "2020-03-21T10:29:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-5254.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 246165139,
"name": "CVE-2020-5254",
"full_name": "dpmdpm2\/CVE-2020-5254",
"owner": {
"login": "dpmdpm2",
"id": 60997239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60997239?v=4",
"html_url": "https:\/\/github.com\/dpmdpm2"
},
"html_url": "https:\/\/github.com\/dpmdpm2\/CVE-2020-5254",
"description": null,
"fork": false,
"created_at": "2020-03-09T23:40:36Z",
"updated_at": "2020-04-09T15:13:37Z",
"pushed_at": "2020-03-09T23:42:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-5267.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 249481499,
"name": "legacy-rails-CVE-2020-5267-patch",
"full_name": "GUI\/legacy-rails-CVE-2020-5267-patch",
"owner": {
"login": "GUI",
"id": 12112,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12112?v=4",
"html_url": "https:\/\/github.com\/GUI"
},
"html_url": "https:\/\/github.com\/GUI\/legacy-rails-CVE-2020-5267-patch",
"description": "Patch CVE-2020-5267 for Rails 4 and Rails 3",
"fork": false,
"created_at": "2020-03-23T16:16:39Z",
"updated_at": "2020-03-23T17:50:41Z",
"pushed_at": "2020-03-23T17:50:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 243467005,
"name": "CVE-2020-6418",
"full_name": "ChoKyuWon\/CVE-2020-6418",
"owner": {
"login": "ChoKyuWon",
"id": 11254910,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11254910?v=4",
"html_url": "https:\/\/github.com\/ChoKyuWon"
},
"html_url": "https:\/\/github.com\/ChoKyuWon\/CVE-2020-6418",
"description": "PoC of CVE",
"fork": false,
"created_at": "2020-02-27T08:18:56Z",
"updated_at": "2020-12-22T07:51:17Z",
"pushed_at": "2020-03-08T05:53:47Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 10,
"forks": 10,
"watchers": 22,
"score": 0
},
{
"id": 271962450,
"name": "CVE-2020-6418-PoC",

25
2020/CVE-2020-6650.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 217626903,
"name": "Eaton-UPS-Companion-Exploit",
"full_name": "RavSS\/Eaton-UPS-Companion-Exploit",
"owner": {
"login": "RavSS",
"id": 31635233,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31635233?v=4",
"html_url": "https:\/\/github.com\/RavSS"
},
"html_url": "https:\/\/github.com\/RavSS\/Eaton-UPS-Companion-Exploit",
"description": "This repository details CVE-2020-6650, a vulnerability I discovered within Eaton's UPS Companion. All users should upgrade to v1.06 immediately or else they risk remote administrator access to their system.",
"fork": false,
"created_at": "2019-10-25T23:06:20Z",
"updated_at": "2020-03-20T12:55:05Z",
"pushed_at": "2020-03-20T12:45:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-7246.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 243797206,
"name": "CVE-2020-7246",
"full_name": "lnxcrew\/CVE-2020-7246",
"owner": {
"login": "lnxcrew",
"id": 61081854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61081854?v=4",
"html_url": "https:\/\/github.com\/lnxcrew"
},
"html_url": "https:\/\/github.com\/lnxcrew\/CVE-2020-7246",
"description": "[qdPM < 9.1 - Remote Code Execution](https:\/\/www.exploit-db.com\/exploits\/48146)",
"fork": false,
"created_at": "2020-02-28T15:44:53Z",
"updated_at": "2020-02-28T15:46:20Z",
"pushed_at": "2020-02-28T15:46:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 237289178,
"name": "cve-2020-7247-exploit",
"full_name": "FiroSolutions\/cve-2020-7247-exploit",
"owner": {
"login": "FiroSolutions",
"id": 43434507,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4",
"html_url": "https:\/\/github.com\/FiroSolutions"
},
"html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit",
"description": "Python exploit of cve-2020-7247",
"fork": false,
"created_at": "2020-01-30T19:29:27Z",
"updated_at": "2021-02-07T16:45:48Z",
"pushed_at": "2020-02-19T10:55:15Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 15,
"forks": 15,
"watchers": 24,
"score": 0
},
{
"id": 334951447,
"name": "CVE-2020-7247",

View file

@ -22,6 +22,29 @@
"watchers": 0,
"score": 0
},
{
"id": 242260909,
"name": "CVE-2020-7471",
"full_name": "SNCKER\/CVE-2020-7471",
"owner": {
"login": "SNCKER",
"id": 49559334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4",
"html_url": "https:\/\/github.com\/SNCKER"
},
"html_url": "https:\/\/github.com\/SNCKER\/CVE-2020-7471",
"description": "CVE-2020-7471 Potential SQL injection via StringAgg(delimiter)",
"fork": false,
"created_at": "2020-02-22T01:32:40Z",
"updated_at": "2020-12-07T13:52:27Z",
"pushed_at": "2020-02-22T01:42:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 289502738,
"name": "cve-2020-7471-Time_Blind_SQLi-",

25
2020/CVE-2020-7799.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 241617298,
"name": "CVE-2020-7799",
"full_name": "ianxtianxt\/CVE-2020-7799",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt"
},
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2020-7799",
"description": null,
"fork": false,
"created_at": "2020-02-19T12:33:24Z",
"updated_at": "2020-07-03T03:51:28Z",
"pushed_at": "2020-02-19T12:33:57Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}
]

25
2020/CVE-2020-7931.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 246585568,
"name": "CVE-2020-7931",
"full_name": "gquere\/CVE-2020-7931",
"owner": {
"login": "gquere",
"id": 1585000,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1585000?v=4",
"html_url": "https:\/\/github.com\/gquere"
},
"html_url": "https:\/\/github.com\/gquere\/CVE-2020-7931",
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2021-01-22T02:06:59Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 12,
"forks": 12,
"watchers": 40,
"score": 0
}
]

25
2020/CVE-2020-8012.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 89426502,
"name": "Exploit-Development",
"full_name": "wetw0rk\/Exploit-Development",
"owner": {
"login": "wetw0rk",
"id": 20763546,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20763546?v=4",
"html_url": "https:\/\/github.com\/wetw0rk"
},
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2021-01-27T00:03:57Z",
"pushed_at": "2020-02-29T21:27:15Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 30,
"forks": 30,
"watchers": 51,
"score": 0
}
]

25
2020/CVE-2020-8515.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 251192169,
"name": "CVE-2020-8515-PoC",
"full_name": "imjdl\/CVE-2020-8515-PoC",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2020-8515-PoC",
"description": "CVE-2020-8515-PoC",
"fork": false,
"created_at": "2020-03-30T03:31:26Z",
"updated_at": "2020-12-27T14:45:17Z",
"pushed_at": "2020-03-30T03:33:37Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 10,
"forks": 10,
"watchers": 13,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 242685090,
"name": "CVE-2020-8597",
"full_name": "marcinguy\/CVE-2020-8597",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/CVE-2020-8597",
"description": "CVE-2020-8597",
"fork": false,
"created_at": "2020-02-24T08:37:50Z",
"updated_at": "2021-02-11T17:06:42Z",
"pushed_at": "2020-03-10T19:01:21Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 24,
"forks": 24,
"watchers": 63,
"score": 0
},
{
"id": 245688871,
"name": "CVE-2020-8597",
"full_name": "WinMin\/CVE-2020-8597",
"owner": {
"login": "WinMin",
"id": 18380453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18380453?v=4",
"html_url": "https:\/\/github.com\/WinMin"
},
"html_url": "https:\/\/github.com\/WinMin\/CVE-2020-8597",
"description": "CVE-2020-8597 pppd buffer overflow poc",
"fork": false,
"created_at": "2020-03-07T19:00:46Z",
"updated_at": "2020-12-19T15:39:36Z",
"pushed_at": "2020-03-12T11:10:31Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 5,
"forks": 5,
"watchers": 37,
"score": 0
},
{
"id": 263383108,
"name": "Point-to-Point-Protocol-Daemon-RCE-Vulnerability-CVE-2020-8597-",

25
2020/CVE-2020-8809.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 242745604,
"name": "gxdlmsdirector-cve",
"full_name": "seqred-s-a\/gxdlmsdirector-cve",
"owner": {
"login": "seqred-s-a",
"id": 49437606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49437606?v=4",
"html_url": "https:\/\/github.com\/seqred-s-a"
},
"html_url": "https:\/\/github.com\/seqred-s-a\/gxdlmsdirector-cve",
"description": "CVE-2020-8809 and CVE-2020-8810",
"fork": false,
"created_at": "2020-02-24T13:38:35Z",
"updated_at": "2020-02-24T14:09:07Z",
"pushed_at": "2020-02-24T14:09:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-8813.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 242373353,
"name": "CVE-2020-8813",
"full_name": "mhaskar\/CVE-2020-8813",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2020-8813",
"description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813",
"fork": false,
"created_at": "2020-02-22T16:27:41Z",
"updated_at": "2020-08-29T14:05:25Z",
"pushed_at": "2020-02-22T16:33:31Z",
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 18,
"forks": 18,
"watchers": 64,
"score": 0
}
]

25
2020/CVE-2020-8825.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 239451773,
"name": "CVE-2020-8825",
"full_name": "hacky1997\/CVE-2020-8825",
"owner": {
"login": "hacky1997",
"id": 35650583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35650583?v=4",
"html_url": "https:\/\/github.com\/hacky1997"
},
"html_url": "https:\/\/github.com\/hacky1997\/CVE-2020-8825",
"description": "VanillaForum 2.6.3 allows stored XSS.",
"fork": false,
"created_at": "2020-02-10T07:24:37Z",
"updated_at": "2020-02-24T13:31:37Z",
"pushed_at": "2020-03-09T14:06:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 242176659,
"name": "jackson-CVE-2020-8840",
"full_name": "jas502n\/jackson-CVE-2020-8840",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/jackson-CVE-2020-8840",
"description": "FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-21T15:58:25Z",
"updated_at": "2021-01-06T03:46:09Z",
"pushed_at": "2020-02-21T16:03:28Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 16,
"forks": 16,
"watchers": 72,
"score": 0
},
{
"id": 242452403,
"name": "FastJson1.2.62-RCE",
@ -22,6 +45,52 @@
"watchers": 11,
"score": 0
},
{
"id": 242675357,
"name": "CVE-2020-8840",
"full_name": "fairyming\/CVE-2020-8840",
"owner": {
"login": "fairyming",
"id": 44915879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44915879?v=4",
"html_url": "https:\/\/github.com\/fairyming"
},
"html_url": "https:\/\/github.com\/fairyming\/CVE-2020-8840",
"description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-24T07:43:12Z",
"updated_at": "2021-01-14T09:13:19Z",
"pushed_at": "2020-02-24T07:45:37Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 8,
"forks": 8,
"watchers": 22,
"score": 0
},
{
"id": 242758333,
"name": "CVE-2020-8840",
"full_name": "0nise\/CVE-2020-8840",
"owner": {
"login": "0nise",
"id": 18393907,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18393907?v=4",
"html_url": "https:\/\/github.com\/0nise"
},
"html_url": "https:\/\/github.com\/0nise\/CVE-2020-8840",
"description": "CVE-2020-8840",
"fork": false,
"created_at": "2020-02-24T14:32:24Z",
"updated_at": "2020-05-31T05:18:22Z",
"pushed_at": "2020-02-28T09:12:59Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"forks": 1,
"watchers": 12,
"score": 0
},
{
"id": 269508362,
"name": "CVE-2020-8840",

25
2020/CVE-2020-9038.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 243498604,
"name": "CVE-2020-9038",
"full_name": "JavierOlmedo\/CVE-2020-9038",
"owner": {
"login": "JavierOlmedo",
"id": 15904748,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904748?v=4",
"html_url": "https:\/\/github.com\/JavierOlmedo"
},
"html_url": "https:\/\/github.com\/JavierOlmedo\/CVE-2020-9038",
"description": "Disclosure report of CVE-2020-9038",
"fork": false,
"created_at": "2020-02-27T11:02:16Z",
"updated_at": "2020-05-14T13:42:12Z",
"pushed_at": "2020-02-27T11:38:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

25
2020/CVE-2020-9375.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 250056587,
"name": "cve-2020-9375",
"full_name": "thewhiteh4t\/cve-2020-9375",
"owner": {
"login": "thewhiteh4t",
"id": 36354846,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
"html_url": "https:\/\/github.com\/thewhiteh4t"
},
"html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2020-9375",
"description": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.",
"fork": false,
"created_at": "2020-03-25T18:18:15Z",
"updated_at": "2020-11-27T12:39:10Z",
"pushed_at": "2020-03-29T20:32:16Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"score": 0
}
]

25
2020/CVE-2020-9380.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 241514668,
"name": "CVE-2020-9380",
"full_name": "migueltarga\/CVE-2020-9380",
"owner": {
"login": "migueltarga",
"id": 1177629,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1177629?v=4",
"html_url": "https:\/\/github.com\/migueltarga"
},
"html_url": "https:\/\/github.com\/migueltarga\/CVE-2020-9380",
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
"fork": false,
"created_at": "2020-02-19T02:29:14Z",
"updated_at": "2020-09-05T12:32:37Z",
"pushed_at": "2020-03-12T02:25:31Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 12,
"forks": 12,
"watchers": 12,
"score": 0
}
]

25
2020/CVE-2020-9442.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 243652977,
"name": "CVE-2020-9442",
"full_name": "hessandrew\/CVE-2020-9442",
"owner": {
"login": "hessandrew",
"id": 45692132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45692132?v=4",
"html_url": "https:\/\/github.com\/hessandrew"
},
"html_url": "https:\/\/github.com\/hessandrew\/CVE-2020-9442",
"description": "OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation",
"fork": false,
"created_at": "2020-02-28T01:27:08Z",
"updated_at": "2020-08-23T22:22:47Z",
"pushed_at": "2020-02-28T02:22:03Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 5,
"forks": 5,
"watchers": 25,
"score": 0
}
]

25
2020/CVE-2020-9547.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 244379753,
"name": "CVE-2020-9547",
"full_name": "fairyming\/CVE-2020-9547",
"owner": {
"login": "fairyming",
"id": 44915879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44915879?v=4",
"html_url": "https:\/\/github.com\/fairyming"
},
"html_url": "https:\/\/github.com\/fairyming\/CVE-2020-9547",
"description": "CVE-2020-9547FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-03-02T13:37:21Z",
"updated_at": "2020-12-13T17:16:07Z",
"pushed_at": "2020-03-02T14:18:24Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 18,
"score": 0
}
]

25
2020/CVE-2020-9548.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 244381163,
"name": "CVE-2020-9548",
"full_name": "fairyming\/CVE-2020-9548",
"owner": {
"login": "fairyming",
"id": 44915879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44915879?v=4",
"html_url": "https:\/\/github.com\/fairyming"
},
"html_url": "https:\/\/github.com\/fairyming\/CVE-2020-9548",
"description": "CVE-2020-9548FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-03-02T13:43:47Z",
"updated_at": "2021-01-12T23:06:26Z",
"pushed_at": "2020-03-02T14:18:48Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 10,
"forks": 10,
"watchers": 19,
"score": 0
}
]

25
2020/CVE-2020-9758.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 245618403,
"name": "CVE-2020-9758",
"full_name": "ari034\/CVE-2020-9758",
"owner": {
"login": "ari034",
"id": 61799666,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61799666?v=4",
"html_url": "https:\/\/github.com\/ari034"
},
"html_url": "https:\/\/github.com\/ari034\/CVE-2020-9758",
"description": "Form submission for vulnerability in livezilla",
"fork": false,
"created_at": "2020-03-07T11:13:49Z",
"updated_at": "2020-03-10T10:02:13Z",
"pushed_at": "2020-03-07T11:19:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2020/CVE-2020-9768.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 298576538,
"name": "CVE-2020-9768",
"full_name": "XorgX304\/CVE-2020-9768",
"owner": {
"login": "XorgX304",
"id": 46254011,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46254011?v=4",
"html_url": "https:\/\/github.com\/XorgX304"
},
"html_url": "https:\/\/github.com\/XorgX304\/CVE-2020-9768",
"description": "AppleJPEGDriverUserClient : mach port use-after-free\/type-confusion via race condition",
"fork": false,
"created_at": "2020-09-25T13:12:04Z",
"updated_at": "2021-02-09T09:03:25Z",
"pushed_at": "2020-03-26T22:29:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-9781.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 249063832,
"name": "Safari-Video-Permission-Spoof-CVE-2020-9781",
"full_name": "c0d3G33k\/Safari-Video-Permission-Spoof-CVE-2020-9781",
"owner": {
"login": "c0d3G33k",
"id": 16446505,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16446505?v=4",
"html_url": "https:\/\/github.com\/c0d3G33k"
},
"html_url": "https:\/\/github.com\/c0d3G33k\/Safari-Video-Permission-Spoof-CVE-2020-9781",
"description": null,
"fork": false,
"created_at": "2020-03-21T21:26:50Z",
"updated_at": "2020-05-18T10:43:45Z",
"pushed_at": "2020-03-25T05:54:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-12T18:53:37Z",
"updated_at": "2021-02-14T02:34:10Z",
"updated_at": "2021-02-14T07:57:35Z",
"pushed_at": "2021-02-13T16:04:17Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2021-01-27T16:03:34Z",
"updated_at": "2021-02-12T19:34:23Z",
"updated_at": "2021-02-14T07:43:03Z",
"pushed_at": "2021-01-31T04:56:56Z",
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 44,
"forks": 44,
"watchers": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 43,
"forks": 43,
"watchers": 100,
"score": 0
},
{
@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-02-13T14:25:02Z",
"updated_at": "2021-02-14T07:40:20Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 325,
"watchers_count": 325,
"stargazers_count": 327,
"watchers_count": 327,
"forks_count": 89,
"forks": 89,
"watchers": 325,
"watchers": 327,
"score": 0
},
{
@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-02-13T03:29:02Z",
"updated_at": "2021-02-14T06:11:37Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 569,
"watchers_count": 569,
"stargazers_count": 572,
"watchers_count": 572,
"forks_count": 162,
"forks": 162,
"watchers": 569,
"watchers": 572,
"score": 0
},
{
@ -427,13 +427,13 @@
"description": "复现别人家的CVEs系列",
"fork": false,
"created_at": "2021-01-31T07:01:50Z",
"updated_at": "2021-02-02T10:10:15Z",
"updated_at": "2021-02-14T03:50:57Z",
"pushed_at": "2021-01-31T07:02:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -2,14 +2,14 @@
{
"id": 336219056,
"name": "CVE-2021-3157",
"full_name": "Y3rbit4\/CVE-2021-3157",
"full_name": "y3rb1t4\/CVE-2021-3157",
"owner": {
"login": "Y3rbit4",
"login": "y3rb1t4",
"id": 12781133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12781133?v=4",
"html_url": "https:\/\/github.com\/Y3rbit4"
"html_url": "https:\/\/github.com\/y3rb1t4"
},
"html_url": "https:\/\/github.com\/Y3rbit4\/CVE-2021-3157",
"html_url": "https:\/\/github.com\/y3rb1t4\/CVE-2021-3157",
"description": null,
"fork": false,
"created_at": "2021-02-05T09:07:20Z",

305
README.md
View file

@ -119,7 +119,7 @@ Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalat
- [r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability](https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability)
### CVE-2021-3157
- [Y3rbit4/CVE-2021-3157](https://github.com/Y3rbit4/CVE-2021-3157)
- [y3rb1t4/CVE-2021-3157](https://github.com/y3rb1t4/CVE-2021-3157)
### CVE-2021-3164 (2021-01-21)
@ -266,6 +266,9 @@ In the ioctl handlers of the Mediatek Command Queue driver, there is a possible
</code>
- [R0rt1z2/AutomatedRoot](https://github.com/R0rt1z2/AutomatedRoot)
- [TheRealJunior/mtk-su-reverse-cve-2020-0069](https://github.com/TheRealJunior/mtk-su-reverse-cve-2020-0069)
- [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069)
- [quarkslab/CVE-2020-0069_poc](https://github.com/quarkslab/CVE-2020-0069_poc)
### CVE-2020-0096 (2020-05-14)
@ -309,6 +312,14 @@ In updateUidProcState of AppOpsService.java, there is a possible permission bypa
- [mooneee/CVE-2020-0121](https://github.com/mooneee/CVE-2020-0121)
### CVE-2020-0551 (2020-03-12)
<code>
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
</code>
- [bitdefender/lvi-lfb-attack-poc](https://github.com/bitdefender/lvi-lfb-attack-poc)
### CVE-2020-0557 (2020-04-15)
<code>
@ -331,7 +342,13 @@ Race condition in the Intel(R) Driver and Support Assistant before version 20.1.
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
</code>
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [eastmountyxz/CVE-2018-20250-WinRAR](https://github.com/eastmountyxz/CVE-2018-20250-WinRAR)
- [gremwell/cve-2020-0601_poc](https://github.com/gremwell/cve-2020-0601_poc)
- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball)
- [exploitblizzard/CVE-2020-0601-spoofkey](https://github.com/exploitblizzard/CVE-2020-0601-spoofkey)
- [ShayNehmad/twoplustwo](https://github.com/ShayNehmad/twoplustwo)
### CVE-2020-0609 (2020-01-14)
@ -341,6 +358,14 @@ A remote code execution vulnerability exists in Windows Remote Desktop Gateway (
- [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609)
### CVE-2020-0618 (2020-02-11)
<code>
A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'.
</code>
- [wortell/cve-2020-0618](https://github.com/wortell/cve-2020-0618)
### CVE-2020-0624 (2020-01-14)
<code>
@ -355,6 +380,8 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672.
</code>
- [itm4n/SysTracingPoc](https://github.com/itm4n/SysTracingPoc)
- [RedCursorSecurityConsulting/CVE-2020-0668](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
- [Nan3r/CVE-2020-0668](https://github.com/Nan3r/CVE-2020-0668)
### CVE-2020-0674 (2020-02-11)
@ -372,9 +399,17 @@ A remote code execution vulnerability exists in the way that the scripting engin
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.
</code>
- [random-robbie/cve-2020-0688](https://github.com/random-robbie/cve-2020-0688)
- [Jumbo-WJB/CVE-2020-0688](https://github.com/Jumbo-WJB/CVE-2020-0688)
- [Ridter/cve-2020-0688](https://github.com/Ridter/cve-2020-0688)
- [Yt1g3r/CVE-2020-0688_EXP](https://github.com/Yt1g3r/CVE-2020-0688_EXP)
- [righter83/CVE-2020-0688](https://github.com/righter83/CVE-2020-0688)
- [truongtn/cve-2020-0688](https://github.com/truongtn/cve-2020-0688)
- [onSec-fr/CVE-2020-0688-Scanner](https://github.com/onSec-fr/CVE-2020-0688-Scanner)
- [youncyb/CVE-2020-0688](https://github.com/youncyb/CVE-2020-0688)
- [zcgonvh/CVE-2020-0688](https://github.com/zcgonvh/CVE-2020-0688)
- [justin-p/PSForgot2kEyXCHANGE](https://github.com/justin-p/PSForgot2kEyXCHANGE)
- [cert-lv/CVE-2020-0688](https://github.com/cert-lv/CVE-2020-0688)
- [ravinacademy/CVE-2020-0688](https://github.com/ravinacademy/CVE-2020-0688)
- [ktpdpro/CVE-2020-0688](https://github.com/ktpdpro/CVE-2020-0688)
- [w4fz5uck5/cve-2020-0688-webshell-upload-technique](https://github.com/w4fz5uck5/cve-2020-0688-webshell-upload-technique)
@ -398,6 +433,7 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
</code>
- [afang5472/CVE-2020-0753-and-CVE-2020-0754](https://github.com/afang5472/CVE-2020-0753-and-CVE-2020-0754)
- [VikasVarshney/CVE-2020-0753-and-CVE-2020-0754](https://github.com/VikasVarshney/CVE-2020-0753-and-CVE-2020-0754)
### CVE-2020-0787 (2020-03-12)
@ -417,13 +453,45 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [k8gege/PyLadon](https://github.com/k8gege/PyLadon)
- [Aekras1a/CVE-2020-0796-PoC](https://github.com/Aekras1a/CVE-2020-0796-PoC)
- [technion/DisableSMBCompression](https://github.com/technion/DisableSMBCompression)
- [T13nn3s/CVE-2020-0796](https://github.com/T13nn3s/CVE-2020-0796)
- [ollypwn/SMBGhost](https://github.com/ollypwn/SMBGhost)
- [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker)
- [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796)
- [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner)
- [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796)
- [awareseven/eternalghosttest](https://github.com/awareseven/eternalghosttest)
- [weidutech/CVE-2020-0796-PoC](https://github.com/weidutech/CVE-2020-0796-PoC)
- [xax007/CVE-2020-0796-Scanner](https://github.com/xax007/CVE-2020-0796-Scanner)
- [Dhoomralochana/Scanners-for-CVE-2020-0796-Testing](https://github.com/Dhoomralochana/Scanners-for-CVE-2020-0796-Testing)
- [UraSecTeam/smbee](https://github.com/UraSecTeam/smbee)
- [netscylla/SMBGhost](https://github.com/netscylla/SMBGhost)
- [eerykitty/CVE-2020-0796-PoC](https://github.com/eerykitty/CVE-2020-0796-PoC)
- [wneessen/SMBCompScan](https://github.com/wneessen/SMBCompScan)
- [ioncodes/SMBGhost](https://github.com/ioncodes/SMBGhost)
- [laolisafe/CVE-2020-0796](https://github.com/laolisafe/CVE-2020-0796)
- [gabimarti/SMBScanner](https://github.com/gabimarti/SMBScanner)
- [Almorabea/SMBGhost-WorkaroundApplier](https://github.com/Almorabea/SMBGhost-WorkaroundApplier)
- [IAreKyleW00t/SMBGhosts](https://github.com/IAreKyleW00t/SMBGhosts)
- [vysecurity/CVE-2020-0796](https://github.com/vysecurity/CVE-2020-0796)
- [marcinguy/CVE-2020-0796](https://github.com/marcinguy/CVE-2020-0796)
- [plorinquer/cve-2020-0796](https://github.com/plorinquer/cve-2020-0796)
- [BinaryShadow94/SMBv3.1.1-scan---CVE-2020-0796](https://github.com/BinaryShadow94/SMBv3.1.1-scan---CVE-2020-0796)
- [w1ld3r/SMBGhost_Scanner](https://github.com/w1ld3r/SMBGhost_Scanner)
- [wsfengfan/CVE-2020-0796](https://github.com/wsfengfan/CVE-2020-0796)
- [GuoKerS/aioScan_CVE-2020-0796](https://github.com/GuoKerS/aioScan_CVE-2020-0796)
- [jiansiting/CVE-2020-0796-Scanner](https://github.com/jiansiting/CVE-2020-0796-Scanner)
- [maxpl0it/Unauthenticated-CVE-2020-0796-PoC](https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC)
- [ran-sama/CVE-2020-0796](https://github.com/ran-sama/CVE-2020-0796)
- [sujitawake/smbghost](https://github.com/sujitawake/smbghost)
- [julixsalas/CVE-2020-0796](https://github.com/julixsalas/CVE-2020-0796)
- [5l1v3r1/SMBGhost_Crash_Poc](https://github.com/5l1v3r1/SMBGhost_Crash_Poc)
- [5l1v3r1/CVE-2020-0796-PoC-and-Scan](https://github.com/5l1v3r1/CVE-2020-0796-PoC-and-Scan)
- [cory-zajicek/CVE-2020-0796-DoS](https://github.com/cory-zajicek/CVE-2020-0796-DoS)
- [tripledd/cve-2020-0796-vuln](https://github.com/tripledd/cve-2020-0796-vuln)
- [danigargu/CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796)
- [ZecOps/CVE-2020-0796-LPE-POC](https://github.com/ZecOps/CVE-2020-0796-LPE-POC)
- [TinToSer/CVE-2020-0796-LPE](https://github.com/TinToSer/CVE-2020-0796-LPE)
- [f1tz/CVE-2020-0796-LPE-EXP](https://github.com/f1tz/CVE-2020-0796-LPE-EXP)
- [tango-j/CVE-2020-0796](https://github.com/tango-j/CVE-2020-0796)
- [jiansiting/CVE-2020-0796](https://github.com/jiansiting/CVE-2020-0796)
@ -452,6 +520,30 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [MasterSploit/LPE---CVE-2020-0796](https://github.com/MasterSploit/LPE---CVE-2020-0796)
- [alexa872/CVE-2020-0796](https://github.com/alexa872/CVE-2020-0796)
### CVE-2020-0797 (2020-03-12)
<code>
An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations, aka 'Windows Work Folder Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0777, CVE-2020-0800, CVE-2020-0864, CVE-2020-0865, CVE-2020-0866, CVE-2020-0897.
</code>
- [bonesg/CVE-2020-0797](https://github.com/bonesg/CVE-2020-0797)
### CVE-2020-0799 (2020-03-12)
<code>
An elevation of privilege vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle parsing of certain symbolic links, aka 'Windows Kernel Elevation of Privilege Vulnerability'.
</code>
- [5l1v3r1/CVE-2020-0799](https://github.com/5l1v3r1/CVE-2020-0799)
### CVE-2020-0801 (2020-03-12)
<code>
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0807, CVE-2020-0809, CVE-2020-0869.
</code>
- [5l1v3r1/CVE-2020-0801](https://github.com/5l1v3r1/CVE-2020-0801)
### CVE-2020-0890 (2020-09-11)
<code>
@ -699,6 +791,24 @@ Kylin has some restful apis which will concatenate SQLs with the user input stri
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
</code>
- [0nise/CVE-2020-1938](https://github.com/0nise/CVE-2020-1938)
- [xindongzhuaizhuai/CVE-2020-1938](https://github.com/xindongzhuaizhuai/CVE-2020-1938)
- [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC)
- [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner)
- [laolisafe/CVE-2020-1938](https://github.com/laolisafe/CVE-2020-1938)
- [DaemonShao/CVE-2020-1938](https://github.com/DaemonShao/CVE-2020-1938)
- [sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read](https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read)
- [fairyming/CVE-2020-1938](https://github.com/fairyming/CVE-2020-1938)
- [dacade/CVE-2020-1938](https://github.com/dacade/CVE-2020-1938)
- [woaiqiukui/CVE-2020-1938TomcatAjpScanner](https://github.com/woaiqiukui/CVE-2020-1938TomcatAjpScanner)
- [fatal0/tomcat-cve-2020-1938-check](https://github.com/fatal0/tomcat-cve-2020-1938-check)
- [ze0r/GhostCat-LFI-exp](https://github.com/ze0r/GhostCat-LFI-exp)
- [delsadan/CNVD-2020-10487-Bulk-verification](https://github.com/delsadan/CNVD-2020-10487-Bulk-verification)
- [00theway/Ghostcat-CNVD-2020-10487](https://github.com/00theway/Ghostcat-CNVD-2020-10487)
- [shaunmclernon/ghostcat-verification](https://github.com/shaunmclernon/ghostcat-verification)
- [Zaziki1337/Ghostcat-CVE-2020-1938](https://github.com/Zaziki1337/Ghostcat-CVE-2020-1938)
- [w4fz5uck5/CVE-2020-1938-Clean-Version](https://github.com/w4fz5uck5/CVE-2020-1938-Clean-Version)
- [Just1ceP4rtn3r/CVE-2020-1938-Tool](https://github.com/Just1ceP4rtn3r/CVE-2020-1938-Tool)
- [ZhengHaoCHeng/CNVD-2020-10487](https://github.com/ZhengHaoCHeng/CNVD-2020-10487)
- [I-Runtime-Error/CVE-2020-1938](https://github.com/I-Runtime-Error/CVE-2020-1938)
- [Umesh2807/Ghostcat](https://github.com/Umesh2807/Ghostcat)
@ -712,6 +822,10 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
</code>
- [5l1v3r1/CVE-2020-1947](https://github.com/5l1v3r1/CVE-2020-1947)
- [jas502n/CVE-2020-1947](https://github.com/jas502n/CVE-2020-1947)
- [wsfengfan/CVE-2020-1947](https://github.com/wsfengfan/CVE-2020-1947)
- [shadowsock5/ShardingSphere_CVE-2020-1947](https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947)
- [HexChristmas/CVE-2020-1947](https://github.com/HexChristmas/CVE-2020-1947)
### CVE-2020-1948 (2020-07-14)
@ -788,8 +902,11 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
</code>
- [Hu3sky/CVE-2020-2555](https://github.com/Hu3sky/CVE-2020-2555)
- [wsfengfan/CVE-2020-2555](https://github.com/wsfengfan/CVE-2020-2555)
- [0nise/CVE-2020-2555](https://github.com/0nise/CVE-2020-2555)
- [Y4er/CVE-2020-2555](https://github.com/Y4er/CVE-2020-2555)
- [Maskhe/cve-2020-2555](https://github.com/Maskhe/cve-2020-2555)
- [Uvemode/CVE-2020-2555](https://github.com/Uvemode/CVE-2020-2555)
### CVE-2020-2883 (2020-04-15)
@ -941,6 +1058,22 @@ GLPI before before version 9.4.6 has a vulnerability involving a default encrypt
- [indevi0us/CVE-2020-5248](https://github.com/indevi0us/CVE-2020-5248)
### CVE-2020-5250 (2020-03-05)
<code>
In PrestaShop before version 1.7.6.4, when a customer edits their address, they can freely change the id_address in the form, and thus steal someone else's address. It is the same with CustomerForm, you are able to change the id_customer and change all information of all accounts. The problem is patched in version 1.7.6.4.
</code>
- [drkbcn/lblfixer_cve2020_5250](https://github.com/drkbcn/lblfixer_cve2020_5250)
### CVE-2020-5254 (2020-03-10)
<code>
In NetHack before 3.6.6, some out-of-bound values for the hilite_status option can be exploited. NetHack 3.6.6 resolves this issue.
</code>
- [dpmdpm2/CVE-2020-5254](https://github.com/dpmdpm2/CVE-2020-5254)
### CVE-2020-5260 (2020-04-14)
<code>
@ -951,6 +1084,14 @@ Affected versions of Git have a vulnerability whereby Git can be tricked into se
- [Asgavar/CVE-2020-5260](https://github.com/Asgavar/CVE-2020-5260)
- [sv3nbeast/CVE-2020-5260](https://github.com/sv3nbeast/CVE-2020-5260)
### CVE-2020-5267 (2020-03-19)
<code>
In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
</code>
- [GUI/legacy-rails-CVE-2020-5267-patch](https://github.com/GUI/legacy-rails-CVE-2020-5267-patch)
### CVE-2020-5410 (2020-06-02)
<code>
@ -1095,6 +1236,7 @@ SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410
Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
</code>
- [ChoKyuWon/CVE-2020-6418](https://github.com/ChoKyuWon/CVE-2020-6418)
- [Goyotan/CVE-2020-6418-PoC](https://github.com/Goyotan/CVE-2020-6418-PoC)
### CVE-2020-6468 (2020-05-20)
@ -1121,6 +1263,14 @@ Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote att
- [PerimeterX/CVE-2020-6519](https://github.com/PerimeterX/CVE-2020-6519)
### CVE-2020-6650 (2020-03-23)
<code>
UPS companion software v1.05 &amp; Prior is affected by Eval Injection vulnerability. The software does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call e.g.”eval” in “Update Manager” class when software attempts to see if there are updates available. This results in arbitrary code execution on the machine where software is installed.
</code>
- [RavSS/Eaton-UPS-Companion-Exploit](https://github.com/RavSS/Eaton-UPS-Companion-Exploit)
### CVE-2020-6861 (2020-05-06)
<code>
@ -1156,12 +1306,21 @@ LinuxKI v6.0-1 and earlier is vulnerable to an remote code execution which is re
- [cwinfosec/CVE-2020-7209](https://github.com/cwinfosec/CVE-2020-7209)
### CVE-2020-7246 (2020-01-21)
<code>
A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
</code>
- [lnxcrew/CVE-2020-7246](https://github.com/lnxcrew/CVE-2020-7246)
### CVE-2020-7247 (2020-01-29)
<code>
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the &quot;uncommented&quot; default configuration. The issue exists because of an incorrect return value upon failure of input validation.
</code>
- [FiroSolutions/cve-2020-7247-exploit](https://github.com/FiroSolutions/cve-2020-7247-exploit)
- [jopraveen/CVE-2020-7247](https://github.com/jopraveen/CVE-2020-7247)
- [QTranspose/CVE-2020-7247-exploit](https://github.com/QTranspose/CVE-2020-7247-exploit)
@ -1188,6 +1347,7 @@ Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL I
</code>
- [secoba/DjVul_StringAgg](https://github.com/secoba/DjVul_StringAgg)
- [SNCKER/CVE-2020-7471](https://github.com/SNCKER/CVE-2020-7471)
- [victomteng1997/cve-2020-7471-Time_Blind_SQLi-](https://github.com/victomteng1997/cve-2020-7471-Time_Blind_SQLi-)
### CVE-2020-7473 (2020-05-07)
@ -1214,9 +1374,25 @@ Incorrect handling of Upgrade header with the value websocket leads in crashing
- [andsnw/sockjs-dos-py](https://github.com/andsnw/sockjs-dos-py)
### CVE-2020-7799 (2020-01-28)
<code>
An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -&gt; Settings -&gt; Email Templates) or themes (Home -&gt; Settings -&gt; Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates.
</code>
- [ianxtianxt/CVE-2020-7799](https://github.com/ianxtianxt/CVE-2020-7799)
### CVE-2020-7897
- [mooneee/cve-2020-7897](https://github.com/mooneee/cve-2020-7897)
### CVE-2020-7931 (2020-01-23)
<code>
In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
</code>
- [gquere/CVE-2020-7931](https://github.com/gquere/CVE-2020-7931)
### CVE-2020-7934 (2020-01-28)
<code>
@ -1247,6 +1423,14 @@ STMicroelectronics STM32F1 devices have Incorrect Access Control.
- [wuxx/CVE-2020-8004](https://github.com/wuxx/CVE-2020-8004)
### CVE-2020-8012 (2020-02-17)
<code>
CA Unified Infrastructure Management (Nimsoft/UIM) 9.20 and below contains a buffer overflow vulnerability in the robot (controller) component. A remote attacker can execute arbitrary code.
</code>
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
### CVE-2020-8103 (2020-06-05)
<code>
@ -1372,6 +1556,14 @@ The bencoding parser in BitTorrent uTorrent through 3.5.5 (build 45505) misparse
- [guywhataguy/uTorrent-CVE-2020-8437](https://github.com/guywhataguy/uTorrent-CVE-2020-8437)
### CVE-2020-8515 (2020-02-01)
<code>
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
</code>
- [imjdl/CVE-2020-8515-PoC](https://github.com/imjdl/CVE-2020-8515-PoC)
### CVE-2020-8554 (2021-01-21)
<code>
@ -1408,6 +1600,8 @@ The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.1
eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
</code>
- [marcinguy/CVE-2020-8597](https://github.com/marcinguy/CVE-2020-8597)
- [WinMin/CVE-2020-8597](https://github.com/WinMin/CVE-2020-8597)
- [Dilan-Diaz/Point-to-Point-Protocol-Daemon-RCE-Vulnerability-CVE-2020-8597-](https://github.com/Dilan-Diaz/Point-to-Point-Protocol-Daemon-RCE-Vulnerability-CVE-2020-8597-)
- [lakwsh/CVE-2020-8597](https://github.com/lakwsh/CVE-2020-8597)
@ -1428,6 +1622,22 @@ Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions o
- [Al1ex/CVE-2020-8635](https://github.com/Al1ex/CVE-2020-8635)
### CVE-2020-8809 (2020-02-25)
<code>
Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker can modify the contents of downloaded files. In the case of add-ins (if the user is using those), this will lead to code execution. In case of OBIS codes (which the user is always using as they are needed to communicate with the energy meters), this can lead to code execution when combined with CVE-2020-8810.
</code>
- [seqred-s-a/gxdlmsdirector-cve](https://github.com/seqred-s-a/gxdlmsdirector-cve)
### CVE-2020-8813 (2020-02-21)
<code>
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
</code>
- [mhaskar/CVE-2020-8813](https://github.com/mhaskar/CVE-2020-8813)
### CVE-2020-8816 (2020-05-29)
<code>
@ -1439,6 +1649,14 @@ Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged das
- [cybervaca/CVE-2020-8816](https://github.com/cybervaca/CVE-2020-8816)
- [team0se7en/CVE-2020-8816](https://github.com/team0se7en/CVE-2020-8816)
### CVE-2020-8825 (2020-02-10)
<code>
index.php?p=/dashboard/settings/branding in Vanilla 2.6.3 allows stored XSS.
</code>
- [hacky1997/CVE-2020-8825](https://github.com/hacky1997/CVE-2020-8825)
### CVE-2020-8835 (2020-04-02)
<code>
@ -1456,7 +1674,10 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
</code>
- [jas502n/jackson-CVE-2020-8840](https://github.com/jas502n/jackson-CVE-2020-8840)
- [Wfzsec/FastJson1.2.62-RCE](https://github.com/Wfzsec/FastJson1.2.62-RCE)
- [fairyming/CVE-2020-8840](https://github.com/fairyming/CVE-2020-8840)
- [0nise/CVE-2020-8840](https://github.com/0nise/CVE-2020-8840)
- [Blyth0He/CVE-2020-8840](https://github.com/Blyth0He/CVE-2020-8840)
- [Veraxy00/CVE-2020-8840](https://github.com/Veraxy00/CVE-2020-8840)
- [dpredrag/CVE-2020-8840](https://github.com/dpredrag/CVE-2020-8840)
@ -1496,6 +1717,14 @@ Stored Cross-site scripting (XSS) vulnerability in Blackboard Learn/PeopleTool v
- [kyletimmermans/blackboard-xss](https://github.com/kyletimmermans/blackboard-xss)
### CVE-2020-9038 (2020-02-17)
<code>
Joplin through 1.0.184 allows Arbitrary File Read via XSS.
</code>
- [JavierOlmedo/CVE-2020-9038](https://github.com/JavierOlmedo/CVE-2020-9038)
### CVE-2020-9047 (2020-06-26)
<code>
@ -1528,6 +1757,14 @@ ftusbbus2.sys in FabulaTech USB for Remote Desktop through 2020-02-19 allows pri
- [Sentinel-One/CVE-2020-9332](https://github.com/Sentinel-One/CVE-2020-9332)
### CVE-2020-9375 (2020-03-25)
<code>
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
</code>
- [thewhiteh4t/cve-2020-9375](https://github.com/thewhiteh4t/cve-2020-9375)
### CVE-2020-9376 (2020-07-09)
<code>
@ -1536,6 +1773,22 @@ ftusbbus2.sys in FabulaTech USB for Remote Desktop through 2020-02-19 allows pri
- [renatoalencar/dlink-dir610-exploits](https://github.com/renatoalencar/dlink-dir610-exploits)
### CVE-2020-9380 (2020-03-05)
<code>
IPTV Smarters WEB TV PLAYER through 2020-02-22 allows attackers to execute OS commands by uploading a script.
</code>
- [migueltarga/CVE-2020-9380](https://github.com/migueltarga/CVE-2020-9380)
### CVE-2020-9442 (2020-02-28)
<code>
OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\OpenVPN Connect\drivers\tap\amd64\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there.
</code>
- [hessandrew/CVE-2020-9442](https://github.com/hessandrew/CVE-2020-9442)
### CVE-2020-9460 (2020-04-14)
<code>
@ -1603,6 +1856,30 @@ XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scriptin
- [dwisiswant0/CVE-2020-9496](https://github.com/dwisiswant0/CVE-2020-9496)
### CVE-2020-9547 (2020-03-01)
<code>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
</code>
- [fairyming/CVE-2020-9547](https://github.com/fairyming/CVE-2020-9547)
### CVE-2020-9548 (2020-03-01)
<code>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
</code>
- [fairyming/CVE-2020-9548](https://github.com/fairyming/CVE-2020-9548)
### CVE-2020-9758 (2020-03-09)
<code>
An issue was discovered in chat.php in LiveZilla Live Chat 8.0.1.3 (Helpdesk). A blind JavaScript injection lies in the name parameter. Triggering this can fetch the username and passwords of the helpdesk employees in the URI. This leads to a privilege escalation, from unauthenticated to user-level access, leading to full account takeover. The attack fetches multiple credentials because they are stored in the database (stored XSS). This affects the mobile/chat URI via the lgn and psswrd parameters.
</code>
- [ari034/CVE-2020-9758](https://github.com/ari034/CVE-2020-9758)
### CVE-2020-9767 (2020-08-14)
<code>
@ -1611,6 +1888,22 @@ A vulnerability related to Dynamic-link Library (“DLL”) loading in the Zoom
- [shubham0d/Zoom-dll-hijacking](https://github.com/shubham0d/Zoom-dll-hijacking)
### CVE-2020-9768 (2020-04-01)
<code>
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2. An application may be able to execute arbitrary code with system privileges.
</code>
- [XorgX304/CVE-2020-9768](https://github.com/XorgX304/CVE-2020-9768)
### CVE-2020-9781 (2020-04-01)
<code>
The issue was addressed by clearing website permission prompts after navigation. This issue is fixed in iOS 13.4 and iPadOS 13.4. A user may grant website permissions to a site they didn't intend to.
</code>
- [c0d3G33k/Safari-Video-Permission-Spoof-CVE-2020-9781](https://github.com/c0d3G33k/Safari-Video-Permission-Spoof-CVE-2020-9781)
### CVE-2020-9934 (2020-10-16)
<code>
@ -1700,6 +1993,15 @@ The driving interface of Tesla Model 3 vehicles in any release before 2020.4.10
- [nuzzl/CVE-2020-10558](https://github.com/nuzzl/CVE-2020-10558)
### CVE-2020-10560 (2020-03-30)
<code>
An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the SiteKey to insert into a crafted URL for components/OssnComments/ossn_com.php and/or libraries/ossn.lib.upgrade.php.
</code>
- [LucidUnicorn/CVE-2020-10560-Key-Recovery](https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery)
- [kevthehermit/CVE-2020-10560](https://github.com/kevthehermit/CVE-2020-10560)
### CVE-2020-10663 (2020-04-28)
<code>
@ -1722,6 +2024,7 @@ Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).
</code>
- [0nise/CVE-2020-10673](https://github.com/0nise/CVE-2020-10673)
- [Al1ex/CVE-2020-10673](https://github.com/Al1ex/CVE-2020-10673)
### CVE-2020-10713 (2020-07-30)