mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/12/22 00:09:50
This commit is contained in:
parent
cc76a222c5
commit
b710b11bbb
30 changed files with 146 additions and 94 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-21T04:37:36Z",
|
||||
"updated_at": "2020-12-21T09:23:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 841,
|
||||
"watchers": 842,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -910,13 +910,13 @@
|
|||
"description": "Shellshock exploit + vulnerable environment",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-07T23:38:50Z",
|
||||
"updated_at": "2020-12-16T06:03:16Z",
|
||||
"updated_at": "2020-12-21T13:33:09Z",
|
||||
"pushed_at": "2017-10-30T22:46:11Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-21T04:37:36Z",
|
||||
"updated_at": "2020-12-21T09:23:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 841,
|
||||
"watchers": 842,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-21T04:37:36Z",
|
||||
"updated_at": "2020-12-21T09:23:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 841,
|
||||
"watchers": 842,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2020-12-21T02:59:03Z",
|
||||
"pushed_at": "2020-12-21T02:59:00Z",
|
||||
"updated_at": "2020-12-21T12:56:55Z",
|
||||
"pushed_at": "2020-12-21T12:56:53Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -71,14 +71,14 @@
|
|||
{
|
||||
"id": 302983632,
|
||||
"name": "CVE-2018-16763-Exploit-Python3",
|
||||
"full_name": "n3m1-sys\/CVE-2018-16763-Exploit-Python3",
|
||||
"full_name": "n3m1dotsys\/CVE-2018-16763-Exploit-Python3",
|
||||
"owner": {
|
||||
"login": "n3m1-sys",
|
||||
"login": "n3m1dotsys",
|
||||
"id": 30940342,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30940342?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3m1-sys"
|
||||
"html_url": "https:\/\/github.com\/n3m1dotsys"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3m1-sys\/CVE-2018-16763-Exploit-Python3",
|
||||
"html_url": "https:\/\/github.com\/n3m1dotsys\/CVE-2018-16763-Exploit-Python3",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T20:23:59Z",
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-14T19:20:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-21T04:37:36Z",
|
||||
"updated_at": "2020-12-21T09:23:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 841,
|
||||
"watchers": 842,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1010,5 +1010,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323352519,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "shadofren\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "shadofren",
|
||||
"id": 8515519,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8515519?v=4",
|
||||
"html_url": "https:\/\/github.com\/shadofren"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shadofren\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T14:01:41Z",
|
||||
"updated_at": "2020-12-21T14:05:31Z",
|
||||
"pushed_at": "2020-12-21T14:05:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2314,11 +2314,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2020-12-14T07:06:23Z",
|
||||
"pushed_at": "2020-11-21T23:47:20Z",
|
||||
"pushed_at": "2020-12-21T14:26:14Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 268,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1622,
|
||||
"watchers_count": 1622,
|
||||
"forks_count": 244,
|
||||
"forks": 244,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 1622,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-05-05T23:34:04Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-21T04:58:44Z",
|
||||
"updated_at": "2020-12-21T11:48:24Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2186,
|
||||
"watchers_count": 2186,
|
||||
"stargazers_count": 2187,
|
||||
"watchers_count": 2187,
|
||||
"forks_count": 616,
|
||||
"forks": 616,
|
||||
"watchers": 2186,
|
||||
"watchers": 2187,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-21T04:37:36Z",
|
||||
"updated_at": "2020-12-21T09:23:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 841,
|
||||
"watchers": 842,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "poc for cve-2020-0022",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-15T16:55:44Z",
|
||||
"updated_at": "2020-12-14T19:45:46Z",
|
||||
"updated_at": "2020-12-21T10:29:06Z",
|
||||
"pushed_at": "2020-07-16T06:51:16Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -910,13 +910,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-12-20T22:20:48Z",
|
||||
"updated_at": "2020-12-21T14:32:23Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1043,
|
||||
"watchers_count": 1043,
|
||||
"stargazers_count": 1044,
|
||||
"watchers_count": 1044,
|
||||
"forks_count": 353,
|
||||
"forks": 353,
|
||||
"watchers": 1043,
|
||||
"watchers": 1044,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-05T23:34:04Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-02T14:48:55Z",
|
||||
"updated_at": "2020-12-16T04:33:37Z",
|
||||
"updated_at": "2020-12-21T11:12:38Z",
|
||||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,8 +36,8 @@
|
|||
"description": "CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-19T08:22:17Z",
|
||||
"updated_at": "2020-11-29T10:04:26Z",
|
||||
"pushed_at": "2020-11-29T08:20:58Z",
|
||||
"updated_at": "2020-12-21T12:48:51Z",
|
||||
"pushed_at": "2020-12-21T12:48:48Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-12-21T02:19:20Z",
|
||||
"updated_at": "2020-12-21T10:49:08Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-21T04:58:44Z",
|
||||
"updated_at": "2020-12-21T11:48:24Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2186,
|
||||
"watchers_count": 2186,
|
||||
"stargazers_count": 2187,
|
||||
"watchers_count": 2187,
|
||||
"forks_count": 616,
|
||||
"forks": 616,
|
||||
"watchers": 2186,
|
||||
"watchers": 2187,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2020-12-21T02:00:54Z",
|
||||
"updated_at": "2020-12-21T12:23:24Z",
|
||||
"pushed_at": "2020-12-15T02:33:45Z",
|
||||
"stargazers_count": 465,
|
||||
"watchers_count": 465,
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 465,
|
||||
"watchers": 467,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-12-09T10:32:44Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "批量扫描TomcatAJP漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T14:55:40Z",
|
||||
"updated_at": "2020-12-09T15:03:21Z",
|
||||
"updated_at": "2020-12-21T09:31:46Z",
|
||||
"pushed_at": "2020-02-22T01:58:22Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-21T04:37:36Z",
|
||||
"updated_at": "2020-12-21T09:23:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 841,
|
||||
"watchers": 842,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-25860.json
Normal file
25
2020/CVE-2020-25860.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 317284918,
|
||||
"name": "rauc-1.5-integration",
|
||||
"full_name": "rauc\/rauc-1.5-integration",
|
||||
"owner": {
|
||||
"login": "rauc",
|
||||
"id": 23232203,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/23232203?v=4",
|
||||
"html_url": "https:\/\/github.com\/rauc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rauc\/rauc-1.5-integration",
|
||||
"description": "integration examples for the CVE-2020-25860 fix",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-30T16:39:51Z",
|
||||
"updated_at": "2020-12-21T11:10:14Z",
|
||||
"pushed_at": "2020-12-16T07:49:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-14T19:39:42Z",
|
||||
"updated_at": "2020-12-20T17:29:10Z",
|
||||
"updated_at": "2020-12-21T13:46:36Z",
|
||||
"pushed_at": "2020-12-20T17:29:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"forks_count": 103,
|
||||
"forks": 103,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 328,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-02T00:58:32Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -3066,6 +3066,9 @@ The Telnet service of Rubetek cameras RV-3406, RV-3409, and RV-3411 cameras (fir
|
|||
- [t0gu/CVE-2020-25790](https://github.com/t0gu/CVE-2020-25790)
|
||||
- [7Mitu/CVE-2020-25790](https://github.com/7Mitu/CVE-2020-25790)
|
||||
|
||||
### CVE-2020-25860
|
||||
- [rauc/rauc-1.5-integration](https://github.com/rauc/rauc-1.5-integration)
|
||||
|
||||
### CVE-2020-25867 (2020-10-07)
|
||||
|
||||
<code>
|
||||
|
@ -7868,6 +7871,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [Yashrk078/Test_CVE-2018-6574](https://github.com/Yashrk078/Test_CVE-2018-6574)
|
||||
- [azzzzzzzzzzzzzzzzz/CVE-2018-6574](https://github.com/azzzzzzzzzzzzzzzzz/CVE-2018-6574)
|
||||
- [FilipeFraqueiro/CVE-2018-6574](https://github.com/FilipeFraqueiro/CVE-2018-6574)
|
||||
- [shadofren/CVE-2018-6574](https://github.com/shadofren/CVE-2018-6574)
|
||||
|
||||
### CVE-2018-6622 (2018-08-17)
|
||||
|
||||
|
@ -9526,7 +9530,7 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
|
|||
- [dinhbaouit/CVE-2018-16763](https://github.com/dinhbaouit/CVE-2018-16763)
|
||||
- [SalimAlk/CVE-2018-16763-](https://github.com/SalimAlk/CVE-2018-16763-)
|
||||
- [ecebotarosh/CVE-2018-16763-exploit](https://github.com/ecebotarosh/CVE-2018-16763-exploit)
|
||||
- [n3m1-sys/CVE-2018-16763-Exploit-Python3](https://github.com/n3m1-sys/CVE-2018-16763-Exploit-Python3)
|
||||
- [n3m1dotsys/CVE-2018-16763-Exploit-Python3](https://github.com/n3m1dotsys/CVE-2018-16763-Exploit-Python3)
|
||||
|
||||
### CVE-2018-16854 (2018-11-26)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue