mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/10/04 00:08:59
This commit is contained in:
parent
e4aa304b2a
commit
98c06dc8e7
24 changed files with 155 additions and 83 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": ":hocho: CRIME attack PoC : a compression oracle attacks CVE-2012-4929 :hocho:",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-21T09:28:31Z",
|
||||
"updated_at": "2020-06-30T15:54:55Z",
|
||||
"updated_at": "2020-10-03T12:12:01Z",
|
||||
"pushed_at": "2019-03-23T10:53:09Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "NTP monlist scanner CVE-2013-5211",
|
||||
"fork": false,
|
||||
"created_at": "2014-12-14T18:58:26Z",
|
||||
"updated_at": "2018-06-07T13:35:38Z",
|
||||
"updated_at": "2020-10-03T10:23:06Z",
|
||||
"pushed_at": "2014-12-14T19:04:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "Python script for automatically protecting your systems against POODLE vulnerability (CVE-2014-3566)",
|
||||
"fork": false,
|
||||
"created_at": "2014-10-16T07:49:23Z",
|
||||
"updated_at": "2018-07-15T08:46:05Z",
|
||||
"updated_at": "2020-10-03T13:37:36Z",
|
||||
"pushed_at": "2014-10-20T14:28:52Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-30T06:35:40Z",
|
||||
"updated_at": "2020-10-03T14:26:02Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 709,
|
||||
"watchers": 710,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-02T12:18:57Z",
|
||||
"updated_at": "2020-09-27T05:43:57Z",
|
||||
"updated_at": "2020-10-03T12:27:25Z",
|
||||
"pushed_at": "2019-08-13T07:14:01Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 95,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-30T06:35:40Z",
|
||||
"updated_at": "2020-10-03T14:26:02Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 709,
|
||||
"watchers": 710,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,7 +381,7 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-10-03T06:36:51Z",
|
||||
"updated_at": "2020-10-03T11:57:35Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-30T06:35:40Z",
|
||||
"updated_at": "2020-10-03T14:26:02Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 709,
|
||||
"watchers": 710,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE 2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-06T08:32:01Z",
|
||||
"updated_at": "2020-09-23T06:38:31Z",
|
||||
"updated_at": "2020-10-03T12:54:16Z",
|
||||
"pushed_at": "2020-08-31T04:34:29Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Tool to try multiple paths for PHPunit RCE CVE-2017-9841",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-18T20:55:05Z",
|
||||
"updated_at": "2020-08-18T23:02:26Z",
|
||||
"updated_at": "2020-10-03T10:08:47Z",
|
||||
"pushed_at": "2020-07-27T12:40:39Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-30T06:35:40Z",
|
||||
"updated_at": "2020-10-03T14:26:02Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 709,
|
||||
"watchers": 710,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2020-09-21T09:37:10Z",
|
||||
"updated_at": "2020-10-03T09:27:16Z",
|
||||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-03T04:00:24Z",
|
||||
"updated_at": "2020-10-03T12:35:59Z",
|
||||
"pushed_at": "2020-10-03T04:00:20Z",
|
||||
"stargazers_count": 1904,
|
||||
"watchers_count": 1904,
|
||||
"forks_count": 494,
|
||||
"forks": 494,
|
||||
"watchers": 1904,
|
||||
"stargazers_count": 1905,
|
||||
"watchers_count": 1905,
|
||||
"forks_count": 495,
|
||||
"forks": 495,
|
||||
"watchers": 1905,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-30T06:35:40Z",
|
||||
"updated_at": "2020-10-03T14:26:02Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 709,
|
||||
"watchers": 710,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-10-03T06:36:51Z",
|
||||
"updated_at": "2020-10-03T11:57:35Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
|
|
|
@ -1301,13 +1301,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2020-10-02T08:10:20Z",
|
||||
"updated_at": "2020-10-03T11:19:27Z",
|
||||
"pushed_at": "2020-07-08T08:26:24Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 300843760,
|
||||
"name": "CVE-2020-14064",
|
||||
"full_name": "masoud-zivari\/CVE-2020-14064",
|
||||
"owner": {
|
||||
"login": "masoud-zivari",
|
||||
"id": 72297087,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4",
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14064",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-03T09:30:34Z",
|
||||
"updated_at": "2020-10-03T09:30:47Z",
|
||||
"pushed_at": "2020-10-03T09:30:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 300840687,
|
||||
"name": "CVE-2020-14065",
|
||||
"full_name": "masoud-zivari\/CVE-2020-14065",
|
||||
"owner": {
|
||||
"login": "masoud-zivari",
|
||||
"id": 72297087,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4",
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14065",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-03T09:13:19Z",
|
||||
"updated_at": "2020-10-03T09:13:34Z",
|
||||
"pushed_at": "2020-10-03T09:13:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,36 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-06-13T08:57:45Z",
|
||||
"updated_at": "2020-07-27T08:27:33Z",
|
||||
"pushed_at": "2020-07-27T08:27:31Z",
|
||||
"updated_at": "2020-10-03T09:19:26Z",
|
||||
"pushed_at": "2020-10-03T09:19:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 300841463,
|
||||
"name": "CVE-2020-14066",
|
||||
"full_name": "masoud-zivari\/CVE-2020-14066",
|
||||
"owner": {
|
||||
"login": "masoud-zivari",
|
||||
"id": 72297087,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4",
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14066",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-03T09:17:35Z",
|
||||
"updated_at": "2020-10-03T09:17:50Z",
|
||||
"pushed_at": "2020-10-03T09:17:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-10-03T04:46:27Z",
|
||||
"updated_at": "2020-10-03T12:36:43Z",
|
||||
"pushed_at": "2020-09-23T07:04:58Z",
|
||||
"stargazers_count": 1096,
|
||||
"watchers_count": 1096,
|
||||
"stargazers_count": 1097,
|
||||
"watchers_count": 1097,
|
||||
"forks_count": 231,
|
||||
"forks": 231,
|
||||
"watchers": 1096,
|
||||
"watchers": 1097,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-10-03T00:06:48Z",
|
||||
"updated_at": "2020-10-03T09:33:19Z",
|
||||
"pushed_at": "2020-09-17T18:06:57Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 156,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:27:14Z",
|
||||
"updated_at": "2020-10-02T19:12:46Z",
|
||||
"updated_at": "2020-10-03T10:01:07Z",
|
||||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-30T06:35:40Z",
|
||||
"updated_at": "2020-10-03T14:26:02Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 709,
|
||||
"watchers": 710,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-03T04:00:24Z",
|
||||
"updated_at": "2020-10-03T12:35:59Z",
|
||||
"pushed_at": "2020-10-03T04:00:20Z",
|
||||
"stargazers_count": 1904,
|
||||
"watchers_count": 1904,
|
||||
"forks_count": 494,
|
||||
"forks": 494,
|
||||
"watchers": 1904,
|
||||
"stargazers_count": 1905,
|
||||
"watchers_count": 1905,
|
||||
"forks_count": 495,
|
||||
"forks": 495,
|
||||
"watchers": 1905,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2008,6 +2008,7 @@ IceWarp Email Server 12.3.0.1 has Incorrect Access Control for user accounts.
|
|||
</code>
|
||||
|
||||
- [networksecure/CVE-2020-14064](https://github.com/networksecure/CVE-2020-14064)
|
||||
- [masoud-zivari/CVE-2020-14064](https://github.com/masoud-zivari/CVE-2020-14064)
|
||||
|
||||
### CVE-2020-14065
|
||||
|
||||
|
@ -2016,6 +2017,7 @@ IceWarp Email Server 12.3.0.1 allows remote attackers to upload files and consum
|
|||
</code>
|
||||
|
||||
- [networksecure/CVE-2020-14065](https://github.com/networksecure/CVE-2020-14065)
|
||||
- [masoud-zivari/CVE-2020-14065](https://github.com/masoud-zivari/CVE-2020-14065)
|
||||
|
||||
### CVE-2020-14066
|
||||
|
||||
|
@ -2024,6 +2026,7 @@ IceWarp Email Server 12.3.0.1 allows remote attackers to upload JavaScript files
|
|||
</code>
|
||||
|
||||
- [networksecure/CVE-2020-14066](https://github.com/networksecure/CVE-2020-14066)
|
||||
- [masoud-zivari/CVE-2020-14066](https://github.com/masoud-zivari/CVE-2020-14066)
|
||||
|
||||
### CVE-2020-14195
|
||||
|
||||
|
|
Loading…
Reference in a new issue