mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/04/14 00:11:18
This commit is contained in:
parent
edd375ab29
commit
ab2c21912d
25 changed files with 139 additions and 134 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "This was converted from a metasploit module as an exercise for OSCP studying",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-05T02:54:10Z",
|
||||
"updated_at": "2021-04-08T15:43:22Z",
|
||||
"updated_at": "2021-04-13T13:32:01Z",
|
||||
"pushed_at": "2020-10-30T19:56:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2021-04-11T15:02:16Z",
|
||||
"updated_at": "2021-04-13T11:21:14Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2254,
|
||||
"watchers_count": 2254,
|
||||
"stargazers_count": 2255,
|
||||
"watchers_count": 2255,
|
||||
"forks_count": 485,
|
||||
"forks": 485,
|
||||
"watchers": 2254,
|
||||
"watchers": 2255,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A code demonstrating CVE-2018-0886",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-02T12:52:07Z",
|
||||
"updated_at": "2021-03-05T13:55:16Z",
|
||||
"updated_at": "2021-04-13T09:35:15Z",
|
||||
"pushed_at": "2020-08-14T16:33:44Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,28 +44,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 356029378,
|
||||
"name": "CVE-2018-1133_POC",
|
||||
"full_name": "m1gnus\/CVE-2018-1133_POC",
|
||||
"owner": {
|
||||
"login": "m1gnus",
|
||||
"id": 50372764,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50372764?v=4",
|
||||
"html_url": "https:\/\/github.com\/m1gnus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/m1gnus\/CVE-2018-1133_POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-08T19:41:57Z",
|
||||
"updated_at": "2021-04-09T09:57:19Z",
|
||||
"pushed_at": "2021-04-09T09:57:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Apache Solr DataImport Handler RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T06:27:39Z",
|
||||
"updated_at": "2021-02-19T09:18:13Z",
|
||||
"updated_at": "2021-04-13T13:21:37Z",
|
||||
"pushed_at": "2019-08-12T02:23:38Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-04-10T20:06:38Z",
|
||||
"updated_at": "2021-04-13T12:18:16Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1649,
|
||||
"watchers_count": 1649,
|
||||
"stargazers_count": 1650,
|
||||
"watchers_count": 1650,
|
||||
"forks_count": 251,
|
||||
"forks": 251,
|
||||
"watchers": 1649,
|
||||
"watchers": 1650,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 856,
|
||||
"watchers_count": 856,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 856,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2021-04-11T06:14:30Z",
|
||||
"updated_at": "2021-04-13T10:28:37Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 279,
|
||||
"watchers": 280,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-13T08:09:12Z",
|
||||
"updated_at": "2021-04-13T14:27:31Z",
|
||||
"pushed_at": "2021-04-11T03:25:34Z",
|
||||
"stargazers_count": 552,
|
||||
"watchers_count": 552,
|
||||
"forks_count": 139,
|
||||
"forks": 139,
|
||||
"watchers": 552,
|
||||
"stargazers_count": 554,
|
||||
"watchers_count": 554,
|
||||
"forks_count": 141,
|
||||
"forks": 141,
|
||||
"watchers": 554,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -182,5 +182,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 357530624,
|
||||
"name": "CVE-2020-17519",
|
||||
"full_name": "givemefivw\/CVE-2020-17519",
|
||||
"owner": {
|
||||
"login": "givemefivw",
|
||||
"id": 65514141,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
|
||||
"html_url": "https:\/\/github.com\/givemefivw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/givemefivw\/CVE-2020-17519",
|
||||
"description": "CVE-2020-17519 Cheetah",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-13T11:38:18Z",
|
||||
"updated_at": "2021-04-13T11:44:17Z",
|
||||
"pushed_at": "2021-04-13T11:44:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2021-04-07T09:27:19Z",
|
||||
"updated_at": "2021-04-13T14:46:13Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 235,
|
||||
"watchers": 236,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T01:12:23Z",
|
||||
"updated_at": "2021-03-18T16:48:45Z",
|
||||
"updated_at": "2021-04-13T11:35:32Z",
|
||||
"pushed_at": "2020-07-06T01:36:32Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T15:20:09Z",
|
||||
"updated_at": "2021-04-12T14:38:50Z",
|
||||
"updated_at": "2021-04-13T09:42:14Z",
|
||||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 168,
|
||||
"watchers": 169,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 357488998,
|
||||
"name": "CVE-2021-100000",
|
||||
"full_name": "Henry4E36\/CVE-2021-100000",
|
||||
"owner": {
|
||||
"login": "Henry4E36",
|
||||
"id": 41940481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
|
||||
"html_url": "https:\/\/github.com\/Henry4E36"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Henry4E36\/CVE-2021-100000",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-13T09:02:14Z",
|
||||
"updated_at": "2021-04-13T09:02:24Z",
|
||||
"pushed_at": "2021-04-13T09:02:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2021-04-09T08:20:25Z",
|
||||
"updated_at": "2021-04-13T09:23:11Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T14:41:25Z",
|
||||
"updated_at": "2021-04-04T22:20:39Z",
|
||||
"updated_at": "2021-04-13T09:33:54Z",
|
||||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-13T08:09:12Z",
|
||||
"updated_at": "2021-04-13T14:27:31Z",
|
||||
"pushed_at": "2021-04-11T03:25:34Z",
|
||||
"stargazers_count": 552,
|
||||
"watchers_count": 552,
|
||||
"forks_count": 139,
|
||||
"forks": 139,
|
||||
"watchers": 552,
|
||||
"stargazers_count": 554,
|
||||
"watchers_count": 554,
|
||||
"forks_count": 141,
|
||||
"forks": 141,
|
||||
"watchers": 554,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2021-26855 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T08:39:05Z",
|
||||
"updated_at": "2021-04-08T09:24:45Z",
|
||||
"updated_at": "2021-04-13T14:33:07Z",
|
||||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -546,8 +546,8 @@
|
|||
"pushed_at": "2021-03-14T23:03:12Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-04-09T09:31:39Z",
|
||||
"updated_at": "2021-04-13T13:30:17Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Trigger-only for CVE-2021-29627",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-12T07:51:03Z",
|
||||
"updated_at": "2021-04-13T06:28:09Z",
|
||||
"updated_at": "2021-04-13T11:51:21Z",
|
||||
"pushed_at": "2021-04-12T07:51:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3138.json
Normal file
25
2021/CVE-2021-3138.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 329132844,
|
||||
"name": "CVE-2021-3138",
|
||||
"full_name": "Mesh3l911\/CVE-2021-3138",
|
||||
"owner": {
|
||||
"login": "Mesh3l911",
|
||||
"id": 74990355,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mesh3l911"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-3138",
|
||||
"description": "Disource POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T22:50:27Z",
|
||||
"updated_at": "2021-04-13T14:26:49Z",
|
||||
"pushed_at": "2021-04-11T23:12:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-04-12T06:19:27Z",
|
||||
"updated_at": "2021-04-13T11:48:19Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"stargazers_count": 684,
|
||||
"watchers_count": 684,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"watchers": 682,
|
||||
"watchers": 684,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
13
README.md
13
README.md
|
@ -120,6 +120,14 @@ The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded creden
|
|||
|
||||
- [jet-pentest/CVE-2021-3131](https://github.com/jet-pentest/CVE-2021-3131)
|
||||
|
||||
### CVE-2021-3138 (2021-01-13)
|
||||
|
||||
<code>
|
||||
In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2FA requirement for certain forms.
|
||||
</code>
|
||||
|
||||
- [Mesh3l911/CVE-2021-3138](https://github.com/Mesh3l911/CVE-2021-3138)
|
||||
|
||||
### CVE-2021-3156 (2021-01-26)
|
||||
|
||||
<code>
|
||||
|
@ -798,9 +806,6 @@ Composr 10.0.36 allows XSS in an XML script.
|
|||
|
||||
- [orionhridoy/CVE-2021-30150](https://github.com/orionhridoy/CVE-2021-30150)
|
||||
|
||||
### CVE-2021-100000
|
||||
- [Henry4E36/CVE-2021-100000](https://github.com/Henry4E36/CVE-2021-100000)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -3941,6 +3946,7 @@ A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as
|
|||
- [radbsie/CVE-2020-17519-Exp](https://github.com/radbsie/CVE-2020-17519-Exp)
|
||||
- [yaunsky/CVE-2020-17519-Apache-Flink](https://github.com/yaunsky/CVE-2020-17519-Apache-Flink)
|
||||
- [Osyanina/westone-CVE-2020-17519-scanner](https://github.com/Osyanina/westone-CVE-2020-17519-scanner)
|
||||
- [givemefivw/CVE-2020-17519](https://github.com/givemefivw/CVE-2020-17519)
|
||||
|
||||
### CVE-2020-17523 (2021-02-03)
|
||||
|
||||
|
@ -8774,7 +8780,6 @@ An issue was discovered in Moodle 3.x. A Teacher creating a Calculated question
|
|||
|
||||
- [darrynten/MoodleExploit](https://github.com/darrynten/MoodleExploit)
|
||||
- [Feidao-fei/MOODLE-3.X-Remote-Code-Execution](https://github.com/Feidao-fei/MOODLE-3.X-Remote-Code-Execution)
|
||||
- [m1gnus/CVE-2018-1133_POC](https://github.com/m1gnus/CVE-2018-1133_POC)
|
||||
|
||||
### CVE-2018-1160 (2018-12-20)
|
||||
|
||||
|
|
Loading…
Reference in a new issue