mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/05/14 12:07:47
This commit is contained in:
parent
fcc7802e23
commit
add062cf6d
28 changed files with 183 additions and 107 deletions
|
@ -128,13 +128,13 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2020-04-11T10:42:11Z",
|
||||
"updated_at": "2020-05-14T01:08:52Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"watchers": 267,
|
||||
"watchers": 268,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"forks_count": 320,
|
||||
"forks": 320,
|
||||
"forks_count": 319,
|
||||
"forks": 319,
|
||||
"watchers": 342,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-27T06:30:32Z",
|
||||
"updated_at": "2020-05-11T09:46:32Z",
|
||||
"updated_at": "2020-05-14T02:22:54Z",
|
||||
"pushed_at": "2018-12-30T11:53:08Z",
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 295,
|
||||
"watchers": 297,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2020-05-08T14:02:33Z",
|
||||
"updated_at": "2020-05-13T22:30:50Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 148,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-09T16:01:14Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-13T14:51:52Z",
|
||||
"updated_at": "2020-05-14T02:50:07Z",
|
||||
"pushed_at": "2020-05-11T04:14:46Z",
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"stargazers_count": 702,
|
||||
"watchers_count": 702,
|
||||
"forks_count": 150,
|
||||
"forks": 150,
|
||||
"watchers": 694,
|
||||
"watchers": 702,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-05-01T20:00:12Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -82,8 +82,8 @@
|
|||
"description": "Test a host for susceptibility to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2020-05-13T15:19:39Z",
|
||||
"pushed_at": "2020-05-13T17:33:19Z",
|
||||
"updated_at": "2020-05-13T21:41:56Z",
|
||||
"pushed_at": "2020-05-13T21:41:51Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 25,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-05-13T12:07:38Z",
|
||||
"updated_at": "2020-05-14T02:16:34Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 543,
|
||||
"watchers_count": 543,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 543,
|
||||
"stargazers_count": 544,
|
||||
"watchers_count": 544,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"watchers": 544,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2020-05-12T11:14:18Z",
|
||||
"updated_at": "2020-05-14T00:26:59Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 330,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"forks_count": 146,
|
||||
"forks": 146,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -320,5 +320,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263799335,
|
||||
"name": "CVE-2019-3396",
|
||||
"full_name": "123qwerqwer\/CVE-2019-3396",
|
||||
"owner": {
|
||||
"login": "123qwerqwer",
|
||||
"id": 54263715,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/54263715?v=4",
|
||||
"html_url": "https:\/\/github.com\/123qwerqwer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/123qwerqwer\/CVE-2019-3396",
|
||||
"description": "CVE-2019-3396批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-14T02:53:05Z",
|
||||
"updated_at": "2020-05-14T02:53:05Z",
|
||||
"pushed_at": "2020-05-14T02:53:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263799687,
|
||||
"name": "CVE-2019-3396",
|
||||
"full_name": "Flash1201\/CVE-2019-3396",
|
||||
"owner": {
|
||||
"login": "Flash1201",
|
||||
"id": 41565767,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/41565767?v=4",
|
||||
"html_url": "https:\/\/github.com\/Flash1201"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Flash1201\/CVE-2019-3396",
|
||||
"description": "CVE-2019-3396批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-14T02:55:02Z",
|
||||
"updated_at": "2020-05-14T02:55:02Z",
|
||||
"pushed_at": "2020-05-14T02:55:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2020-05-01T11:36:42Z",
|
||||
"updated_at": "2020-05-14T02:01:28Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2020-05-05T18:00:51Z",
|
||||
"updated_at": "2020-05-14T00:26:51Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-05-06T20:29:22Z",
|
||||
"updated_at": "2020-05-13T21:12:19Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 433,
|
||||
"watchers": 434,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-1015",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-13T16:42:17Z",
|
||||
"updated_at": "2020-05-13T20:29:02Z",
|
||||
"updated_at": "2020-05-14T02:14:41Z",
|
||||
"pushed_at": "2020-05-13T17:37:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-13T14:51:52Z",
|
||||
"updated_at": "2020-05-14T02:50:07Z",
|
||||
"pushed_at": "2020-05-11T04:14:46Z",
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"stargazers_count": 702,
|
||||
"watchers_count": 702,
|
||||
"forks_count": 150,
|
||||
"forks": 150,
|
||||
"watchers": 694,
|
||||
"watchers": 702,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-04T00:50:42Z",
|
||||
"updated_at": "2020-05-12T04:03:22Z",
|
||||
"updated_at": "2020-05-14T01:54:12Z",
|
||||
"pushed_at": "2020-05-10T22:35:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-08T15:56:26Z",
|
||||
"updated_at": "2020-05-13T14:55:01Z",
|
||||
"updated_at": "2020-05-14T03:07:13Z",
|
||||
"pushed_at": "2020-05-08T17:10:48Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 262085427,
|
||||
"name": "CVE-2020-12696",
|
||||
"full_name": "Guilherme-Rubert\/CVE-2020-12696",
|
||||
"full_name": "g-rubert\/CVE-2020-12696",
|
||||
"owner": {
|
||||
"login": "Guilherme-Rubert",
|
||||
"login": "g-rubert",
|
||||
"id": 40837605,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40837605?v=4",
|
||||
"html_url": "https:\/\/github.com\/Guilherme-Rubert"
|
||||
"html_url": "https:\/\/github.com\/g-rubert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Guilherme-Rubert\/CVE-2020-12696",
|
||||
"html_url": "https:\/\/github.com\/g-rubert\/CVE-2020-12696",
|
||||
"description": "Stored Cross Site Scripting - Iframe Plugin - WordPress - By Guilherme Rubert",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T15:16:39Z",
|
||||
|
|
25
2020/CVE-2020-12717.json
Normal file
25
2020/CVE-2020-12717.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 263045751,
|
||||
"name": "covidsafe-CVE-2020-12717-exploit",
|
||||
"full_name": "wabzqem\/covidsafe-CVE-2020-12717-exploit",
|
||||
"owner": {
|
||||
"login": "wabzqem",
|
||||
"id": 1582274,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1582274?v=4",
|
||||
"html_url": "https:\/\/github.com\/wabzqem"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wabzqem\/covidsafe-CVE-2020-12717-exploit",
|
||||
"description": "Code for exploit for CVE-2020-12717",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-11T13:09:52Z",
|
||||
"updated_at": "2020-05-14T01:38:10Z",
|
||||
"pushed_at": "2020-05-14T02:36:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-05-08T17:33:26Z",
|
||||
"updated_at": "2020-05-14T01:30:20Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2020-05-12T04:56:54Z",
|
||||
"updated_at": "2020-05-14T02:13:29Z",
|
||||
"pushed_at": "2020-05-11T02:14:55Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-05-11T11:18:58Z",
|
||||
"updated_at": "2020-05-14T02:14:59Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2020-2555",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T08:06:08Z",
|
||||
"updated_at": "2020-04-30T03:16:17Z",
|
||||
"updated_at": "2020-05-14T02:14:56Z",
|
||||
"pushed_at": "2020-03-10T08:15:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic coherence.jar RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T09:04:43Z",
|
||||
"updated_at": "2020-05-13T16:34:57Z",
|
||||
"updated_at": "2020-05-14T02:48:42Z",
|
||||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 64,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 245220968,
|
||||
"name": "CVE-2020-9460",
|
||||
"full_name": "Guilherme-Rubert\/CVE-2020-9460",
|
||||
"full_name": "g-rubert\/CVE-2020-9460",
|
||||
"owner": {
|
||||
"login": "Guilherme-Rubert",
|
||||
"login": "g-rubert",
|
||||
"id": 40837605,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40837605?v=4",
|
||||
"html_url": "https:\/\/github.com\/Guilherme-Rubert"
|
||||
"html_url": "https:\/\/github.com\/g-rubert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Guilherme-Rubert\/CVE-2020-9460",
|
||||
"html_url": "https:\/\/github.com\/g-rubert\/CVE-2020-9460",
|
||||
"description": "Stored Cross Site Scripting - Oempro - by Guilherme Rubert",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-05T17:03:03Z",
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 245221085,
|
||||
"name": "CVE-2020-9461",
|
||||
"full_name": "Guilherme-Rubert\/CVE-2020-9461",
|
||||
"full_name": "g-rubert\/CVE-2020-9461",
|
||||
"owner": {
|
||||
"login": "Guilherme-Rubert",
|
||||
"login": "g-rubert",
|
||||
"id": 40837605,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40837605?v=4",
|
||||
"html_url": "https:\/\/github.com\/Guilherme-Rubert"
|
||||
"html_url": "https:\/\/github.com\/g-rubert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Guilherme-Rubert\/CVE-2020-9461",
|
||||
"html_url": "https:\/\/github.com\/g-rubert\/CVE-2020-9461",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-05T17:03:25Z",
|
||||
|
|
11
README.md
11
README.md
|
@ -512,7 +512,10 @@ include/class.sla.php in osTicket before 1.14.2 allows XSS via the SLA Name.
|
|||
The iframe plugin before 4.5 for WordPress does not sanitize a URL.
|
||||
</code>
|
||||
|
||||
- [Guilherme-Rubert/CVE-2020-12696](https://github.com/Guilherme-Rubert/CVE-2020-12696)
|
||||
- [g-rubert/CVE-2020-12696](https://github.com/g-rubert/CVE-2020-12696)
|
||||
|
||||
### CVE-2020-12717
|
||||
- [wabzqem/covidsafe-CVE-2020-12717-exploit](https://github.com/wabzqem/covidsafe-CVE-2020-12717-exploit)
|
||||
|
||||
### CVE-2020-1611
|
||||
|
||||
|
@ -990,7 +993,7 @@ OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\
|
|||
Octech Oempro 4.7 through 4.11 allow XSS by an authenticated user. The parameter CampaignName in Campaign.Create is vulnerable.
|
||||
</code>
|
||||
|
||||
- [Guilherme-Rubert/CVE-2020-9460](https://github.com/Guilherme-Rubert/CVE-2020-9460)
|
||||
- [g-rubert/CVE-2020-9460](https://github.com/g-rubert/CVE-2020-9460)
|
||||
|
||||
### CVE-2020-9461
|
||||
|
||||
|
@ -998,7 +1001,7 @@ Octech Oempro 4.7 through 4.11 allow XSS by an authenticated user. The parameter
|
|||
Octech Oempro 4.7 through 4.11 allow stored XSS by an authenticated user. The FolderName parameter of the Media.CreateFolder command is vulnerable.
|
||||
</code>
|
||||
|
||||
- [Guilherme-Rubert/CVE-2020-9461](https://github.com/Guilherme-Rubert/CVE-2020-9461)
|
||||
- [g-rubert/CVE-2020-9461](https://github.com/g-rubert/CVE-2020-9461)
|
||||
|
||||
### CVE-2020-9547
|
||||
|
||||
|
@ -3481,6 +3484,8 @@ The Widget Connector macro in Atlassian Confluence Server before version 6.6.12
|
|||
- [JonathanZhou348/CVE-2019-3396TEST](https://github.com/JonathanZhou348/CVE-2019-3396TEST)
|
||||
- [am6539/CVE-2019-3396](https://github.com/am6539/CVE-2019-3396)
|
||||
- [W2Ning/CVE-2019-3396](https://github.com/W2Ning/CVE-2019-3396)
|
||||
- [123qwerqwer/CVE-2019-3396](https://github.com/123qwerqwer/CVE-2019-3396)
|
||||
- [Flash1201/CVE-2019-3396](https://github.com/Flash1201/CVE-2019-3396)
|
||||
|
||||
### CVE-2019-3398
|
||||
|
||||
|
|
Loading…
Reference in a new issue