Auto Update 2021/09/05 00:12:45

This commit is contained in:
motikan2010-bot 2021-09-05 00:12:45 +09:00
parent 5ceca60cc2
commit d3931ea998
26 changed files with 333 additions and 92 deletions

View file

@ -105,13 +105,13 @@
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
"fork": false,
"created_at": "2021-09-04T04:01:56Z",
"updated_at": "2021-09-04T05:39:40Z",
"updated_at": "2021-09-04T13:45:49Z",
"pushed_at": "2021-09-04T07:25:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "This repository contains the POC of an exploit for node-jose < 0.11.0",
"fork": false,
"created_at": "2018-03-20T20:37:29Z",
"updated_at": "2021-06-06T07:37:15Z",
"pushed_at": "2019-07-30T13:12:41Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 9,
"forks": 9,
"watchers": 22,
"updated_at": "2021-09-04T13:41:47Z",
"pushed_at": "2021-09-04T13:48:49Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 10,
"forks": 10,
"watchers": 23,
"score": 0
},
{
@ -136,5 +136,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 402774667,
"name": "CVE-2018-0114",
"full_name": "RyouYoo\/CVE-2018-0114",
"owner": {
"login": "RyouYoo",
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
"html_url": "https:\/\/github.com\/RyouYoo"
},
"html_url": "https:\/\/github.com\/RyouYoo\/CVE-2018-0114",
"description": "Exploitation of a vulnerability in Cisco's node-jose, a JavaScript library created to manage JWT.",
"fork": false,
"created_at": "2021-09-03T13:11:28Z",
"updated_at": "2021-09-04T13:41:38Z",
"pushed_at": "2021-09-04T13:41:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -358,8 +358,8 @@
"description": null,
"fork": false,
"created_at": "2021-06-07T05:57:43Z",
"updated_at": "2021-08-31T07:15:17Z",
"pushed_at": "2021-08-31T07:15:15Z",
"updated_at": "2021-09-04T09:17:50Z",
"pushed_at": "2021-09-04T09:17:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 278,
"watchers_count": 278,
"forks_count": 68,
"forks": 68,
"forks_count": 69,
"forks": 69,
"watchers": 278,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2021-08-25T11:03:35Z",
"updated_at": "2021-09-04T15:08:24Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 34,
"forks": 34,
"watchers": 109,
"watchers": 110,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-09-03T13:21:22Z",
"updated_at": "2021-09-04T12:31:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2839,
"watchers_count": 2839,
"stargazers_count": 2841,
"watchers_count": 2841,
"forks_count": 832,
"forks": 832,
"watchers": 2839,
"watchers": 2841,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-2107",
"fork": false,
"created_at": "2019-07-08T14:18:33Z",
"updated_at": "2021-09-03T12:55:00Z",
"updated_at": "2021-09-04T10:00:41Z",
"pushed_at": "2020-11-02T06:43:15Z",
"stargazers_count": 311,
"watchers_count": 311,
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 97,
"forks": 97,
"watchers": 311,
"watchers": 310,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-03T14:12:56Z",
"updated_at": "2021-09-03T14:49:18Z",
"updated_at": "2021-09-04T10:36:21Z",
"pushed_at": "2020-12-12T03:41:43Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 6,
"forks": 6,
"watchers": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 7,
"forks": 7,
"watchers": 16,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2021-09-01T08:08:15Z",
"updated_at": "2021-09-04T13:07:17Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 171,
"watchers_count": 171,
"forks_count": 55,
"forks": 55,
"watchers": 170,
"watchers": 171,
"score": 0
},
{

View file

@ -960,8 +960,8 @@
"pushed_at": "2020-04-01T01:46:17Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 48,
"score": 0
},
@ -1585,5 +1585,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 403086776,
"name": "SMBGhost_CVE-2020-0796_checker",
"full_name": "Anonimo501\/SMBGhost_CVE-2020-0796_checker",
"owner": {
"login": "Anonimo501",
"id": 67207446,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67207446?v=4",
"html_url": "https:\/\/github.com\/Anonimo501"
},
"html_url": "https:\/\/github.com\/Anonimo501\/SMBGhost_CVE-2020-0796_checker",
"description": null,
"fork": false,
"created_at": "2021-09-04T15:07:15Z",
"updated_at": "2021-09-04T15:08:55Z",
"pushed_at": "2021-09-04T15:08:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-08-29T12:22:38Z",
"updated_at": "2021-09-04T13:18:50Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 48,
"forks": 48,
"watchers": 268,
"watchers": 269,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-09-03T13:21:22Z",
"updated_at": "2021-09-04T12:31:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2839,
"watchers_count": 2839,
"stargazers_count": 2841,
"watchers_count": 2841,
"forks_count": 832,
"forks": 832,
"watchers": 2839,
"watchers": 2841,
"score": 0
},
{

View file

@ -59,8 +59,8 @@
"description": "Draytek CVE-2020-8515 PoC",
"fork": false,
"created_at": "2021-09-01T22:47:54Z",
"updated_at": "2021-09-02T11:32:43Z",
"pushed_at": "2021-09-02T11:32:41Z",
"updated_at": "2021-09-04T10:45:20Z",
"pushed_at": "2021-09-04T10:45:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -703,13 +703,13 @@
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
"fork": false,
"created_at": "2021-09-01T11:25:04Z",
"updated_at": "2021-09-04T08:08:14Z",
"updated_at": "2021-09-04T12:54:28Z",
"pushed_at": "2021-09-01T11:25:22Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 9,
"forks": 9,
"watchers": 73,
"watchers": 74,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Backporting CVE-2021-1748 patch for iOS <=14.3",
"fork": false,
"created_at": "2021-09-03T22:48:11Z",
"updated_at": "2021-09-04T08:44:04Z",
"updated_at": "2021-09-04T12:07:00Z",
"pushed_at": "2021-09-03T22:50:08Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"score": 0
}
]

View file

@ -132,8 +132,8 @@
"pushed_at": "2021-06-07T01:44:03Z",
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 22,
"forks": 22,
"forks_count": 23,
"forks": 23,
"watchers": 70,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2021-09-01T00:50:30Z",
"updated_at": "2021-09-03T08:19:28Z",
"updated_at": "2021-09-04T11:07:55Z",
"pushed_at": "2021-09-01T01:17:58Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 17,
"forks": 17,
"watchers": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 18,
"forks": 18,
"watchers": 36,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2021-09-04T09:15:32Z",
"pushed_at": "2021-09-04T03:47:13Z",
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 39,
"forks": 39,
"watchers": 168,
"updated_at": "2021-09-04T14:52:43Z",
"pushed_at": "2021-09-04T14:50:15Z",
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 40,
"forks": 40,
"watchers": 174,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "CVE-2021-26084 - Confluence Pre-Auth RCE OGNL injection 命令回显+一键getshell",
"fork": false,
"created_at": "2021-09-01T07:45:55Z",
"updated_at": "2021-09-04T07:58:50Z",
"updated_at": "2021-09-04T15:14:25Z",
"pushed_at": "2021-09-01T10:27:12Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 9,
"forks": 9,
"watchers": 19,
"watchers": 20,
"score": 0
},
{
@ -458,5 +458,51 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 403064487,
"name": "CVE-2021-26084",
"full_name": "march0s1as\/CVE-2021-26084",
"owner": {
"login": "march0s1as",
"id": 44043159,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44043159?v=4",
"html_url": "https:\/\/github.com\/march0s1as"
},
"html_url": "https:\/\/github.com\/march0s1as\/CVE-2021-26084",
"description": "Confluence OGNL Injection [CVE-2021-26084].",
"fork": false,
"created_at": "2021-09-04T13:32:42Z",
"updated_at": "2021-09-04T14:38:56Z",
"pushed_at": "2021-09-04T13:57:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 403083297,
"name": "confluence-rce-poc",
"full_name": "wolf1892\/confluence-rce-poc",
"owner": {
"login": "wolf1892",
"id": 24608781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4",
"html_url": "https:\/\/github.com\/wolf1892"
},
"html_url": "https:\/\/github.com\/wolf1892\/confluence-rce-poc",
"description": "Setting up POC for CVE-2021-26084",
"fork": false,
"created_at": "2021-09-04T14:53:38Z",
"updated_at": "2021-09-04T15:16:43Z",
"pushed_at": "2021-09-04T15:16:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
"fork": false,
"created_at": "2021-09-01T22:59:29Z",
"updated_at": "2021-09-04T08:53:36Z",
"updated_at": "2021-09-04T14:11:43Z",
"pushed_at": "2021-09-03T10:24:34Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 5,
"forks": 5,
"watchers": 20,
"watchers": 22,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
"updated_at": "2021-09-02T11:28:16Z",
"updated_at": "2021-09-04T14:23:58Z",
"pushed_at": "2021-03-07T04:39:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

25
2021/CVE-2021-34646.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 403075256,
"name": "CVE-2021-34646",
"full_name": "motikan2010\/CVE-2021-34646",
"owner": {
"login": "motikan2010",
"id": 3177297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4",
"html_url": "https:\/\/github.com\/motikan2010"
},
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2021-34646",
"description": "CVE-2021-34646 PoC",
"fork": false,
"created_at": "2021-09-04T14:19:05Z",
"updated_at": "2021-09-04T15:10:08Z",
"pushed_at": "2021-09-04T14:23:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -243,13 +243,13 @@
"description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM",
"fork": false,
"created_at": "2021-07-24T12:55:05Z",
"updated_at": "2021-09-03T15:07:04Z",
"updated_at": "2021-09-04T12:54:47Z",
"pushed_at": "2021-07-25T15:41:33Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 49,
"forks": 49,
"watchers": 204,
"watchers": 205,
"score": 0
},
{
@ -381,8 +381,8 @@
"description": "SeriousSAM Auto Exploiter",
"fork": false,
"created_at": "2021-08-01T19:54:31Z",
"updated_at": "2021-08-06T10:23:26Z",
"pushed_at": "2021-08-06T10:23:24Z",
"updated_at": "2021-09-04T09:27:52Z",
"pushed_at": "2021-09-04T09:27:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

25
2021/CVE-2021-38704.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 402892991,
"name": "CVE-2021-38704",
"full_name": "sudonoodle\/CVE-2021-38704",
"owner": {
"login": "sudonoodle",
"id": 52385049,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52385049?v=4",
"html_url": "https:\/\/github.com\/sudonoodle"
},
"html_url": "https:\/\/github.com\/sudonoodle\/CVE-2021-38704",
"description": "Reflected Cross-Site Scripting (XSS) in ClinicCases 7.3.3 ",
"fork": false,
"created_at": "2021-09-03T20:41:58Z",
"updated_at": "2021-09-04T13:13:40Z",
"pushed_at": "2021-09-04T12:14:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2021/CVE-2021-38705.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 402893125,
"name": "CVE-2021-38705",
"full_name": "sudonoodle\/CVE-2021-38705",
"owner": {
"login": "sudonoodle",
"id": 52385049,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52385049?v=4",
"html_url": "https:\/\/github.com\/sudonoodle"
},
"html_url": "https:\/\/github.com\/sudonoodle\/CVE-2021-38705",
"description": "Cross-Site Request Forgery (CSRF) in ClinicCases 7.3.3",
"fork": false,
"created_at": "2021-09-03T20:42:43Z",
"updated_at": "2021-09-04T13:22:53Z",
"pushed_at": "2021-09-04T12:42:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2021/CVE-2021-38706.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 402893797,
"name": "CVE-2021-38706",
"full_name": "sudonoodle\/CVE-2021-38706",
"owner": {
"login": "sudonoodle",
"id": 52385049,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52385049?v=4",
"html_url": "https:\/\/github.com\/sudonoodle"
},
"html_url": "https:\/\/github.com\/sudonoodle\/CVE-2021-38706",
"description": "Blind SQL Injection in ClinicCases 7.3.3",
"fork": false,
"created_at": "2021-09-03T20:46:11Z",
"updated_at": "2021-09-04T13:29:14Z",
"pushed_at": "2021-09-04T13:11:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2021/CVE-2021-38707.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 402893433,
"name": "CVE-2021-38707",
"full_name": "sudonoodle\/CVE-2021-38707",
"owner": {
"login": "sudonoodle",
"id": 52385049,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52385049?v=4",
"html_url": "https:\/\/github.com\/sudonoodle"
},
"html_url": "https:\/\/github.com\/sudonoodle\/CVE-2021-38707",
"description": "Persistent Cross-Site Scripting (XSS) in ClinicCases 7.3.3 ",
"fork": false,
"created_at": "2021-09-03T20:44:20Z",
"updated_at": "2021-09-04T13:31:44Z",
"pushed_at": "2021-09-04T12:31:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1003,6 +1003,8 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [mr-r3bot/Confluence-CVE-2021-26084](https://github.com/mr-r3bot/Confluence-CVE-2021-26084)
- [Loneyers/CVE-2021-26084](https://github.com/Loneyers/CVE-2021-26084)
- [Xc1Ym/cve_2021_26084](https://github.com/Xc1Ym/cve_2021_26084)
- [march0s1as/CVE-2021-26084](https://github.com/march0s1as/CVE-2021-26084)
- [wolf1892/confluence-rce-poc](https://github.com/wolf1892/confluence-rce-poc)
### CVE-2021-26119 (2021-02-21)
@ -1873,6 +1875,14 @@ The crypto/tls package of Go through 1.16.5 does not properly assert that the ty
- [alexzorin/cve-2021-34558](https://github.com/alexzorin/cve-2021-34558)
### CVE-2021-34646 (2021-08-30)
<code>
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
</code>
- [motikan2010/CVE-2021-34646](https://github.com/motikan2010/CVE-2021-34646)
### CVE-2021-35042 (2021-07-02)
<code>
@ -2063,6 +2073,18 @@ TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and
- [HuskyHacks/CVE-2021-38699-Reflected-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS)
- [HuskyHacks/CVE-2021-38699-Stored-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS)
### CVE-2021-38704
- [sudonoodle/CVE-2021-38704](https://github.com/sudonoodle/CVE-2021-38704)
### CVE-2021-38705
- [sudonoodle/CVE-2021-38705](https://github.com/sudonoodle/CVE-2021-38705)
### CVE-2021-38706
- [sudonoodle/CVE-2021-38706](https://github.com/sudonoodle/CVE-2021-38706)
### CVE-2021-38707
- [sudonoodle/CVE-2021-38707](https://github.com/sudonoodle/CVE-2021-38707)
### CVE-2021-38710 (2021-08-18)
<code>
@ -2512,6 +2534,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [ORCA666/CVE-2020-0796](https://github.com/ORCA666/CVE-2020-0796)
- [Nephael/Nephael-CVE-2020-0796](https://github.com/Nephael/Nephael-CVE-2020-0796)
- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
### CVE-2020-0797 (2020-03-12)
@ -10608,6 +10631,7 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a
- [Eremiel/CVE-2018-0114](https://github.com/Eremiel/CVE-2018-0114)
- [Starry-lord/CVE-2018-0114](https://github.com/Starry-lord/CVE-2018-0114)
- [scumdestroy/CVE-2018-0114](https://github.com/scumdestroy/CVE-2018-0114)
- [RyouYoo/CVE-2018-0114](https://github.com/RyouYoo/CVE-2018-0114)
### CVE-2018-0202 (2018-03-27)