mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/06/18 18:09:27
This commit is contained in:
parent
ae86d80594
commit
aeb36ddda8
29 changed files with 173 additions and 125 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-25T14:20:34Z",
|
||||
"updated_at": "2020-01-15T07:29:47Z",
|
||||
"updated_at": "2020-06-18T09:00:49Z",
|
||||
"pushed_at": "2017-05-25T14:27:39Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"forks_count": 132,
|
||||
"forks": 132,
|
||||
"watchers": 346,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-10-27T20:23:15Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,8 +128,8 @@
|
|||
"description": "Exploit for NGiX 1.6.2 Remote Integer Overflow Vulnerability CVE-2017-7529",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-13T12:11:19Z",
|
||||
"updated_at": "2020-06-13T12:11:20Z",
|
||||
"pushed_at": "2020-06-13T12:11:20Z",
|
||||
"updated_at": "2020-06-18T06:46:05Z",
|
||||
"pushed_at": "2020-06-18T06:46:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Tool to try multiple paths for PHPunit RCE CVE-2017-9841",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-18T20:55:05Z",
|
||||
"updated_at": "2020-06-16T12:10:01Z",
|
||||
"updated_at": "2020-06-18T06:52:57Z",
|
||||
"pushed_at": "2020-05-19T09:24:38Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"forks_count": 321,
|
||||
"forks": 321,
|
||||
"forks_count": 322,
|
||||
"forks": 322,
|
||||
"watchers": 352,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-26T19:31:45Z",
|
||||
"updated_at": "2020-04-01T21:51:18Z",
|
||||
"updated_at": "2020-06-18T08:34:51Z",
|
||||
"pushed_at": "2018-07-27T12:09:40Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exploit for CVE-2018-4193",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T13:06:11Z",
|
||||
"updated_at": "2020-05-17T11:38:25Z",
|
||||
"updated_at": "2020-06-18T03:41:17Z",
|
||||
"pushed_at": "2019-02-13T13:07:25Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -289,7 +289,7 @@
|
|||
"description": "Exploit for CVE-2018-7600.. called drupalgeddon2, ",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-19T03:31:47Z",
|
||||
"updated_at": "2020-06-12T07:44:27Z",
|
||||
"updated_at": "2020-06-18T08:10:33Z",
|
||||
"pushed_at": "2018-04-19T03:38:24Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
@ -619,5 +619,28 @@
|
|||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 273180012,
|
||||
"name": "drupalhunter",
|
||||
"full_name": "ynsmroztas\/drupalhunter",
|
||||
"owner": {
|
||||
"login": "ynsmroztas",
|
||||
"id": 58443521,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/58443521?v=4",
|
||||
"html_url": "https:\/\/github.com\/ynsmroztas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ynsmroztas\/drupalhunter",
|
||||
"description": "CVE-2018-7600 0-Day Exploit (cyber-warrior.org)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-18T08:12:44Z",
|
||||
"updated_at": "2020-06-18T08:24:40Z",
|
||||
"pushed_at": "2020-06-18T08:24:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1991,13 +1991,13 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2020-06-17T07:09:01Z",
|
||||
"updated_at": "2020-06-18T06:48:00Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 272,
|
||||
"watchers": 273,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2520,13 +2520,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2020-06-18T02:51:41Z",
|
||||
"updated_at": "2020-06-18T07:37:03Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 36,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-06-17T13:29:03Z",
|
||||
"updated_at": "2020-06-18T08:26:08Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1579,
|
||||
"watchers_count": 1579,
|
||||
"stargazers_count": 1581,
|
||||
"watchers_count": 1581,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"watchers": 1579,
|
||||
"watchers": 1581,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-04T16:06:44Z",
|
||||
"updated_at": "2020-06-10T14:03:49Z",
|
||||
"updated_at": "2020-06-18T08:24:31Z",
|
||||
"pushed_at": "2020-06-05T09:43:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-18T02:57:55Z",
|
||||
"updated_at": "2020-06-18T04:06:57Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 946,
|
||||
"watchers_count": 946,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 946,
|
||||
"stargazers_count": 947,
|
||||
"watchers_count": 947,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 947,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-02-21T22:49:53Z",
|
||||
"updated_at": "2020-06-18T03:06:11Z",
|
||||
"pushed_at": "2020-06-18T03:06:28Z",
|
||||
"pushed_at": "2020-06-18T03:41:07Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-08-19T17:33:56Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T15:31:13Z",
|
||||
"updated_at": "2020-06-18T01:30:37Z",
|
||||
"updated_at": "2020-06-18T08:18:34Z",
|
||||
"pushed_at": "2019-10-23T07:10:35Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 83,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-25T06:38:15Z",
|
||||
"updated_at": "2020-06-17T10:26:06Z",
|
||||
"updated_at": "2020-06-18T08:47:33Z",
|
||||
"pushed_at": "2019-03-18T01:20:52Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 273191684,
|
||||
"name": "StrandHogg2",
|
||||
"full_name": "wrlu\/StrandHogg2",
|
||||
"owner": {
|
||||
"login": "wrlu",
|
||||
"id": 20199567,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20199567?v=4",
|
||||
"html_url": "https:\/\/github.com\/wrlu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wrlu\/StrandHogg2",
|
||||
"description": "PoC of StrandHogg2 (CVE-2020-0096)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-18T09:05:49Z",
|
||||
"updated_at": "2020-06-18T09:06:01Z",
|
||||
"pushed_at": "2020-06-18T09:05:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-06-18T03:00:40Z",
|
||||
"updated_at": "2020-06-18T08:58:33Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -10,16 +10,16 @@
|
|||
"html_url": "https:\/\/github.com\/cbwang505"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cbwang505\/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION",
|
||||
"description": null,
|
||||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-06-18T03:05:15Z",
|
||||
"updated_at": "2020-06-18T09:04:44Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 95,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T19:33:18Z",
|
||||
"updated_at": "2020-06-18T01:39:46Z",
|
||||
"updated_at": "2020-06-18T05:39:20Z",
|
||||
"pushed_at": "2020-03-13T07:38:43Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 46,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -841,13 +841,13 @@
|
|||
"description": "CVE-2020-0796.SMBGhost_Crash_Poc ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-18T08:29:28Z",
|
||||
"updated_at": "2020-06-15T18:14:09Z",
|
||||
"updated_at": "2020-06-18T07:50:51Z",
|
||||
"pushed_at": "2020-03-18T08:57:36Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1209,13 +1209,13 @@
|
|||
"description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T09:09:02Z",
|
||||
"updated_at": "2020-06-07T22:45:29Z",
|
||||
"updated_at": "2020-06-18T08:14:00Z",
|
||||
"pushed_at": "2020-06-05T16:21:55Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1439,13 +1439,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2020-06-17T23:04:01Z",
|
||||
"updated_at": "2020-06-18T08:15:38Z",
|
||||
"pushed_at": "2020-06-12T12:46:48Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-1015",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-13T16:42:17Z",
|
||||
"updated_at": "2020-06-18T00:14:13Z",
|
||||
"updated_at": "2020-06-18T09:09:16Z",
|
||||
"pushed_at": "2020-05-16T05:15:35Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T23:22:15Z",
|
||||
"updated_at": "2020-06-18T02:14:21Z",
|
||||
"updated_at": "2020-06-18T09:08:44Z",
|
||||
"pushed_at": "2020-06-17T18:10:30Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 25,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T04:44:05Z",
|
||||
"updated_at": "2020-06-17T18:15:23Z",
|
||||
"updated_at": "2020-06-18T05:19:15Z",
|
||||
"pushed_at": "2020-06-17T00:56:08Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 122,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-18T02:57:55Z",
|
||||
"updated_at": "2020-06-18T04:06:57Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 946,
|
||||
"watchers_count": 946,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 946,
|
||||
"stargazers_count": 947,
|
||||
"watchers_count": 947,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 947,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2020-06-18T02:21:44Z",
|
||||
"updated_at": "2020-06-18T08:54:31Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 285,
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 289,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1283 - Windows-Denial-of-Service-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-17T09:21:36Z",
|
||||
"updated_at": "2020-06-17T09:57:11Z",
|
||||
"updated_at": "2020-06-18T03:27:18Z",
|
||||
"pushed_at": "2020-06-16T08:08:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-06-17T04:17:04Z",
|
||||
"updated_at": "2020-06-18T05:04:34Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 173,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,6 +36,7 @@ In startActivities of ActivityStartController.java, there is a possible escalati
|
|||
</code>
|
||||
|
||||
- [wyu0hop/CVE-2020-0096](https://github.com/wyu0hop/CVE-2020-0096)
|
||||
- [wrlu/StrandHogg2](https://github.com/wrlu/StrandHogg2)
|
||||
|
||||
### CVE-2020-0551
|
||||
|
||||
|
@ -7341,6 +7342,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
|
|||
- [shellord/Drupalgeddon-Mass-Exploiter](https://github.com/shellord/Drupalgeddon-Mass-Exploiter)
|
||||
- [zhzyker/CVE-2018-7600-Drupal-POC-EXP](https://github.com/zhzyker/CVE-2018-7600-Drupal-POC-EXP)
|
||||
- [rabbitmask/CVE-2018-7600-Drupal7](https://github.com/rabbitmask/CVE-2018-7600-Drupal7)
|
||||
- [ynsmroztas/drupalhunter](https://github.com/ynsmroztas/drupalhunter)
|
||||
|
||||
### CVE-2018-7602
|
||||
|
||||
|
|
Loading…
Reference in a new issue