mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/03/13 00:07:17
This commit is contained in:
parent
c0749d8796
commit
d189d203f0
20 changed files with 219 additions and 123 deletions
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2020-03-10T07:02:59Z",
|
||||
"updated_at": "2020-03-12T13:28:45Z",
|
||||
"pushed_at": "2017-09-27T02:35:13Z",
|
||||
"stargazers_count": 824,
|
||||
"watchers_count": 824,
|
||||
"forks_count": 388,
|
||||
"forks": 388,
|
||||
"watchers": 824,
|
||||
"stargazers_count": 825,
|
||||
"watchers_count": 825,
|
||||
"forks_count": 389,
|
||||
"forks": 389,
|
||||
"watchers": 825,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-03-10T03:30:12Z",
|
||||
"updated_at": "2020-03-12T09:39:46Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 179,
|
||||
"watchers": 180,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2543,8 +2543,8 @@
|
|||
"description": "这篇文章将分享Windows远程桌面服务漏洞(CVE-2019-0708),并详细讲解该漏洞及防御措施。作者作为网络安全的小白,分享一些自学基础教程给大家,主要是关于安全工具和实践操作的在线笔记,希望您们喜欢。同时,更希望您能与我一起操作和进步,后续将深入学习网络安全和系统安全知识并分享相关实验。总之,希望该系列文章对博友有所帮助,写文不易,大神们不喜勿喷,谢谢!",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T05:40:22Z",
|
||||
"updated_at": "2020-03-12T06:59:23Z",
|
||||
"pushed_at": "2020-03-12T06:59:21Z",
|
||||
"updated_at": "2020-03-12T13:57:00Z",
|
||||
"pushed_at": "2020-03-12T13:56:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-17T07:54:38Z",
|
||||
"updated_at": "2020-03-12T08:06:42Z",
|
||||
"updated_at": "2020-03-12T09:27:09Z",
|
||||
"pushed_at": "2019-07-18T10:03:28Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2020-03-12T09:05:59Z",
|
||||
"updated_at": "2020-03-12T10:16:57Z",
|
||||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2020-03-12T08:58:38Z",
|
||||
"updated_at": "2020-03-12T10:27:17Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 34,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T02:41:44Z",
|
||||
"updated_at": "2020-02-28T19:40:00Z",
|
||||
"updated_at": "2020-03-12T09:20:15Z",
|
||||
"pushed_at": "2020-02-19T03:47:33Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 35,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2020-03-06T14:01:26Z",
|
||||
"updated_at": "2020-03-12T13:22:33Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 469,
|
||||
"watchers_count": 469,
|
||||
"stargazers_count": 470,
|
||||
"watchers_count": 470,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 469,
|
||||
"watchers": 470,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-03-12T08:18:48Z",
|
||||
"updated_at": "2020-03-12T13:22:40Z",
|
||||
"pushed_at": "2020-02-17T13:28:02Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-2107",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T14:18:33Z",
|
||||
"updated_at": "2020-02-23T11:45:03Z",
|
||||
"updated_at": "2020-03-12T14:22:59Z",
|
||||
"pushed_at": "2019-07-25T08:01:07Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 305,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-03-10T03:30:12Z",
|
||||
"updated_at": "2020-03-12T09:39:46Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 179,
|
||||
"watchers": 180,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Automated Root Script for MTK ARM64 based chipsets based on diplomatic's CVE-2020-0069 (mtk-su) exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2020-03-12T04:04:31Z",
|
||||
"updated_at": "2020-03-12T09:56:56Z",
|
||||
"pushed_at": "2020-03-09T20:40:50Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -734,5 +734,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246794448,
|
||||
"name": "twoplustwo",
|
||||
"full_name": "ShayNehmad\/twoplustwo",
|
||||
"owner": {
|
||||
"login": "ShayNehmad",
|
||||
"id": 48879847,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/48879847?v=4",
|
||||
"html_url": "https:\/\/github.com\/ShayNehmad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ShayNehmad\/twoplustwo",
|
||||
"description": "Implementing CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T09:30:19Z",
|
||||
"updated_at": "2020-03-12T09:58:51Z",
|
||||
"pushed_at": "2020-03-12T09:58:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-03-11T11:03:48Z",
|
||||
"updated_at": "2020-03-12T09:11:05Z",
|
||||
"pushed_at": "2020-03-01T12:58:01Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 116,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T06:51:58Z",
|
||||
"updated_at": "2020-03-12T08:50:26Z",
|
||||
"updated_at": "2020-03-12T14:03:57Z",
|
||||
"pushed_at": "2020-03-12T08:50:23Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-03-12T08:59:47Z",
|
||||
"pushed_at": "2020-03-12T07:08:08Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 140,
|
||||
"updated_at": "2020-03-12T14:56:27Z",
|
||||
"pushed_at": "2020-03-12T11:34:17Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T16:23:03Z",
|
||||
"updated_at": "2020-03-11T22:50:42Z",
|
||||
"updated_at": "2020-03-12T10:10:28Z",
|
||||
"pushed_at": "2020-03-11T22:50:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,8 +151,8 @@
|
|||
"description": "Identifying and Mitigating the CVE-2020–0796 flaw in the fly",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T18:42:32Z",
|
||||
"updated_at": "2020-03-11T19:31:00Z",
|
||||
"pushed_at": "2020-03-11T19:30:57Z",
|
||||
"updated_at": "2020-03-12T10:19:37Z",
|
||||
"pushed_at": "2020-03-12T10:19:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T02:20:07Z",
|
||||
"updated_at": "2020-03-12T02:49:12Z",
|
||||
"updated_at": "2020-03-12T13:37:24Z",
|
||||
"pushed_at": "2020-03-12T02:49:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -205,5 +205,74 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246795620,
|
||||
"name": "eternalghosttest",
|
||||
"full_name": "awareseven\/eternalghosttest",
|
||||
"owner": {
|
||||
"login": "awareseven",
|
||||
"id": 53170037,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53170037?v=4",
|
||||
"html_url": "https:\/\/github.com\/awareseven"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/awareseven\/eternalghosttest",
|
||||
"description": "This repository contains a test case for CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T09:35:57Z",
|
||||
"updated_at": "2020-03-12T14:03:31Z",
|
||||
"pushed_at": "2020-03-12T14:03:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246837546,
|
||||
"name": "CVE-2020-0796-PoC",
|
||||
"full_name": "weidutech\/CVE-2020-0796-PoC",
|
||||
"owner": {
|
||||
"login": "weidutech",
|
||||
"id": 30208579,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30208579?v=4",
|
||||
"html_url": "https:\/\/github.com\/weidutech"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/weidutech\/CVE-2020-0796-PoC",
|
||||
"description": " CVE-2020-0796 - a wormable SMBv3 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T13:11:02Z",
|
||||
"updated_at": "2020-03-12T13:12:16Z",
|
||||
"pushed_at": "2020-03-12T13:12:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246857266,
|
||||
"name": "CVE-2020-0796",
|
||||
"full_name": "OfJAAH\/CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "OfJAAH",
|
||||
"id": 28729614,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28729614?v=4",
|
||||
"html_url": "https:\/\/github.com\/OfJAAH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/OfJAAH\/CVE-2020-0796",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T14:37:56Z",
|
||||
"updated_at": "2020-03-12T14:45:51Z",
|
||||
"pushed_at": "2020-03-12T14:45:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Powershell SMBv3 Compression checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T09:13:48Z",
|
||||
"updated_at": "2020-03-12T08:38:15Z",
|
||||
"updated_at": "2020-03-12T11:43:26Z",
|
||||
"pushed_at": "2020-03-11T17:10:12Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "CVE-2020-1947 poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T12:44:01Z",
|
||||
"updated_at": "2020-03-12T09:04:07Z",
|
||||
"updated_at": "2020-03-12T11:22:43Z",
|
||||
"pushed_at": "2020-03-10T12:48:10Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T03:15:25Z",
|
||||
"updated_at": "2020-03-12T02:19:32Z",
|
||||
"updated_at": "2020-03-12T13:53:16Z",
|
||||
"pushed_at": "2020-03-11T03:54:34Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-1947 Python POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T12:35:56Z",
|
||||
"updated_at": "2020-03-11T15:06:31Z",
|
||||
"updated_at": "2020-03-12T09:44:14Z",
|
||||
"pushed_at": "2020-03-11T15:06:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,7 +59,7 @@
|
|||
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-03-11T02:05:08Z",
|
||||
"updated_at": "2020-03-12T11:39:42Z",
|
||||
"pushed_at": "2020-03-10T15:46:18Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
|
@ -82,8 +82,8 @@
|
|||
"description": "CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-24T02:36:46Z",
|
||||
"updated_at": "2020-03-10T07:09:00Z",
|
||||
"pushed_at": "2020-03-10T07:08:58Z",
|
||||
"updated_at": "2020-03-12T09:18:27Z",
|
||||
"pushed_at": "2020-03-12T09:18:25Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-03-10T12:24:10Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-2555",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T12:02:26Z",
|
||||
"updated_at": "2020-03-12T02:34:50Z",
|
||||
"pushed_at": "2020-03-12T02:34:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"updated_at": "2020-03-12T10:20:31Z",
|
||||
"pushed_at": "2020-03-12T09:20:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-03-12T09:06:17Z",
|
||||
"updated_at": "2020-03-12T09:58:35Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Hacking Artifactory with server side template injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T13:56:43Z",
|
||||
"updated_at": "2020-03-12T08:58:00Z",
|
||||
"updated_at": "2020-03-12T13:44:57Z",
|
||||
"pushed_at": "2020-03-12T06:55:39Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-8597 pppd buffer overflow poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T19:00:46Z",
|
||||
"updated_at": "2020-03-12T08:42:10Z",
|
||||
"pushed_at": "2020-03-10T14:03:24Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"updated_at": "2020-03-12T13:03:55Z",
|
||||
"pushed_at": "2020-03-12T11:10:31Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -61,6 +61,7 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
|
|||
- [gremwell/cve-2020-0601_poc](https://github.com/gremwell/cve-2020-0601_poc)
|
||||
- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball)
|
||||
- [TechHexagon/CVE-2020-0601-spoofkey](https://github.com/TechHexagon/CVE-2020-0601-spoofkey)
|
||||
- [ShayNehmad/twoplustwo](https://github.com/ShayNehmad/twoplustwo)
|
||||
|
||||
### CVE-2020-0609
|
||||
|
||||
|
@ -152,6 +153,9 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
|
|||
- [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796)
|
||||
- [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner)
|
||||
- [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796)
|
||||
- [awareseven/eternalghosttest](https://github.com/awareseven/eternalghosttest)
|
||||
- [weidutech/CVE-2020-0796-PoC](https://github.com/weidutech/CVE-2020-0796-PoC)
|
||||
- [OfJAAH/CVE-2020-0796](https://github.com/OfJAAH/CVE-2020-0796)
|
||||
|
||||
### CVE-2020-0976
|
||||
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
|
||||
|
|
Loading…
Reference in a new issue