mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/05/14 00:11:40
This commit is contained in:
parent
3bec01005b
commit
ddb9d06714
22 changed files with 256 additions and 66 deletions
|
@ -312,7 +312,7 @@
|
|||
"description": "CVE-2014-6271の検証用Vagrantfileです",
|
||||
"fork": false,
|
||||
"created_at": "2014-09-25T16:19:41Z",
|
||||
"updated_at": "2014-09-25T16:19:46Z",
|
||||
"updated_at": "2021-05-13T14:11:03Z",
|
||||
"pushed_at": "2014-09-28T04:25:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2021-04-23T13:54:50Z",
|
||||
"updated_at": "2021-05-13T11:23:59Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "iis6 exploit 2017 CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-05T23:21:12Z",
|
||||
"updated_at": "2021-05-06T15:33:16Z",
|
||||
"updated_at": "2021-05-13T13:33:12Z",
|
||||
"pushed_at": "2017-04-05T23:29:03Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2021-04-27T15:44:11Z",
|
||||
"updated_at": "2021-05-13T09:56:39Z",
|
||||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -910,13 +910,13 @@
|
|||
"description": "dump",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T06:57:19Z",
|
||||
"updated_at": "2021-04-20T04:48:38Z",
|
||||
"updated_at": "2021-05-13T09:20:17Z",
|
||||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 471,
|
||||
"watchers_count": 471,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"watchers": 471,
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 472,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-14T17:27:37Z",
|
||||
"updated_at": "2021-03-18T12:26:02Z",
|
||||
"updated_at": "2021-05-13T13:30:44Z",
|
||||
"pushed_at": "2019-10-15T01:04:08Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2021-05-12T02:54:02Z",
|
||||
"updated_at": "2021-05-13T13:35:02Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 761,
|
||||
"watchers_count": 761,
|
||||
"stargazers_count": 762,
|
||||
"watchers_count": 762,
|
||||
"forks_count": 160,
|
||||
"forks": 160,
|
||||
"watchers": 761,
|
||||
"watchers": 762,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2021-05-01T17:32:28Z",
|
||||
"updated_at": "2021-05-13T12:10:51Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"stargazers_count": 503,
|
||||
"watchers_count": 503,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 502,
|
||||
"watchers": 503,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -979,13 +979,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T01:46:08Z",
|
||||
"updated_at": "2021-05-12T13:19:23Z",
|
||||
"updated_at": "2021-05-13T10:26:42Z",
|
||||
"pushed_at": "2020-04-01T01:46:17Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-05-12T08:04:18Z",
|
||||
"updated_at": "2021-05-13T12:59:57Z",
|
||||
"pushed_at": "2021-02-25T17:19:39Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-05-13T05:54:36Z",
|
||||
"updated_at": "2021-05-13T12:42:15Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1278,
|
||||
"watchers_count": 1278,
|
||||
"stargazers_count": 1279,
|
||||
"watchers_count": 1279,
|
||||
"forks_count": 294,
|
||||
"forks": 294,
|
||||
"watchers": 1278,
|
||||
"watchers": 1279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-05-11T10:57:20Z",
|
||||
"updated_at": "2021-05-13T12:45:11Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 790,
|
||||
"watchers_count": 790,
|
||||
"stargazers_count": 791,
|
||||
"watchers_count": 791,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 790,
|
||||
"watchers": 791,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2021-04-30T09:43:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -297,5 +297,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367014200,
|
||||
"name": "CVE-2020-27955",
|
||||
"full_name": "qzyqzynb\/CVE-2020-27955",
|
||||
"owner": {
|
||||
"login": "qzyqzynb",
|
||||
"id": 62465887,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62465887?v=4",
|
||||
"html_url": "https:\/\/github.com\/qzyqzynb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qzyqzynb\/CVE-2020-27955",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T10:30:28Z",
|
||||
"updated_at": "2021-05-13T10:33:03Z",
|
||||
"pushed_at": "2021-05-13T10:33:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2020-28502 node-XMLHttpRequest RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-12T12:11:03Z",
|
||||
"updated_at": "2021-05-12T23:31:57Z",
|
||||
"updated_at": "2021-05-13T11:33:03Z",
|
||||
"pushed_at": "2021-05-12T12:18:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367057442,
|
||||
"name": "ofbiz-poc",
|
||||
"full_name": "yuaneuro\/ofbiz-poc",
|
||||
"owner": {
|
||||
"login": "yuaneuro",
|
||||
"id": 42265015,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
|
||||
"html_url": "https:\/\/github.com\/yuaneuro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yuaneuro\/ofbiz-poc",
|
||||
"description": "CVE-2020-9496和CVE-2021-2109利用dnslog批量验证漏洞poc及exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:28:15Z",
|
||||
"updated_at": "2021-05-13T15:13:38Z",
|
||||
"pushed_at": "2021-05-13T13:53:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-14562.json
Normal file
25
2021/CVE-2021-14562.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 367006674,
|
||||
"name": "CVE-2021-14562",
|
||||
"full_name": "Jarry1sec\/CVE-2021-14562",
|
||||
"owner": {
|
||||
"login": "Jarry1sec",
|
||||
"id": 54568928,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54568928?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jarry1sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jarry1sec\/CVE-2021-14562",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T09:59:38Z",
|
||||
"updated_at": "2021-05-13T09:59:38Z",
|
||||
"pushed_at": "2021-05-13T09:59:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-05-12T21:07:34Z",
|
||||
"updated_at": "2021-05-13T14:23:40Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 286,
|
||||
"watchers": 287,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2021/CVE-2021-20202.json
Normal file
25
2021/CVE-2021-20202.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 367001041,
|
||||
"name": "CVE-2021-20202",
|
||||
"full_name": "Jarry1sec\/CVE-2021-20202",
|
||||
"owner": {
|
||||
"login": "Jarry1sec",
|
||||
"id": 54568928,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54568928?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jarry1sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jarry1sec\/CVE-2021-20202",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T09:36:50Z",
|
||||
"updated_at": "2021-05-13T09:36:50Z",
|
||||
"pushed_at": "2021-05-13T09:36:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,51 @@
|
|||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367057442,
|
||||
"name": "ofbiz-poc",
|
||||
"full_name": "yuaneuro\/ofbiz-poc",
|
||||
"owner": {
|
||||
"login": "yuaneuro",
|
||||
"id": 42265015,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
|
||||
"html_url": "https:\/\/github.com\/yuaneuro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yuaneuro\/ofbiz-poc",
|
||||
"description": "CVE-2020-9496和CVE-2021-2109利用dnslog批量验证漏洞poc及exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:28:15Z",
|
||||
"updated_at": "2021-05-13T15:13:38Z",
|
||||
"pushed_at": "2021-05-13T13:53:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367086891,
|
||||
"name": "weblogic_CVE-2021-2109_poc",
|
||||
"full_name": "yuaneuro\/weblogic_CVE-2021-2109_poc",
|
||||
"owner": {
|
||||
"login": "yuaneuro",
|
||||
"id": 42265015,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
|
||||
"html_url": "https:\/\/github.com\/yuaneuro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yuaneuro\/weblogic_CVE-2021-2109_poc",
|
||||
"description": "weblogic CVE-2021-2109批量验证poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T15:10:03Z",
|
||||
"updated_at": "2021-05-13T15:10:06Z",
|
||||
"pushed_at": "2021-05-13T15:10:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21551.json
Normal file
25
2021/CVE-2021-21551.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 367056155,
|
||||
"name": "CVE-2021-21551",
|
||||
"full_name": "waldo-irc\/CVE-2021-21551",
|
||||
"owner": {
|
||||
"login": "waldo-irc",
|
||||
"id": 10516272,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10516272?v=4",
|
||||
"html_url": "https:\/\/github.com\/waldo-irc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/waldo-irc\/CVE-2021-21551",
|
||||
"description": "Exploit to SYSTEM for CVE-2021-21551",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:23:38Z",
|
||||
"updated_at": "2021-05-13T14:59:44Z",
|
||||
"pushed_at": "2021-05-13T13:47:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-05-12T08:04:18Z",
|
||||
"updated_at": "2021-05-13T12:59:57Z",
|
||||
"pushed_at": "2021-02-25T17:19:39Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 713,
|
||||
"watchers_count": 713,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 713,
|
||||
"score": 0
|
||||
},
|
||||
|
|
23
README.md
23
README.md
|
@ -70,6 +70,8 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
|
||||
- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109)
|
||||
- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109)
|
||||
- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
|
||||
- [yuaneuro/weblogic_CVE-2021-2109_poc](https://github.com/yuaneuro/weblogic_CVE-2021-2109_poc)
|
||||
|
||||
### CVE-2021-2321 (2021-04-28)
|
||||
|
||||
|
@ -297,6 +299,17 @@ The overlayfs implementation in the linux kernel did not properly validate with
|
|||
### CVE-2021-11123
|
||||
- [chenanu123/cve-2021-11123](https://github.com/chenanu123/cve-2021-11123)
|
||||
|
||||
### CVE-2021-14562
|
||||
- [Jarry1sec/CVE-2021-14562](https://github.com/Jarry1sec/CVE-2021-14562)
|
||||
|
||||
### CVE-2021-20202 (2021-05-12)
|
||||
|
||||
<code>
|
||||
A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
|
||||
</code>
|
||||
|
||||
- [Jarry1sec/CVE-2021-20202](https://github.com/Jarry1sec/CVE-2021-20202)
|
||||
|
||||
### CVE-2021-20716 (2021-04-27)
|
||||
|
||||
<code>
|
||||
|
@ -446,6 +459,14 @@ Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnera
|
|||
|
||||
- [JamesGeee/CVE-2021-21536](https://github.com/JamesGeee/CVE-2021-21536)
|
||||
|
||||
### CVE-2021-21551 (2021-05-04)
|
||||
|
||||
<code>
|
||||
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
|
||||
</code>
|
||||
|
||||
- [waldo-irc/CVE-2021-21551](https://github.com/waldo-irc/CVE-2021-21551)
|
||||
|
||||
### CVE-2021-21972 (2021-02-24)
|
||||
|
||||
<code>
|
||||
|
@ -3234,6 +3255,7 @@ XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scriptin
|
|||
- [Vulnmachines/apache-ofbiz-CVE-2020-9496](https://github.com/Vulnmachines/apache-ofbiz-CVE-2020-9496)
|
||||
- [g33xter/CVE-2020-9496](https://github.com/g33xter/CVE-2020-9496)
|
||||
- [cyber-niz/CVE-2020-9496](https://github.com/cyber-niz/CVE-2020-9496)
|
||||
- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
|
||||
|
||||
### CVE-2020-9547 (2020-03-01)
|
||||
|
||||
|
@ -5330,6 +5352,7 @@ Git LFS 2.12.0 allows Remote Code Execution.
|
|||
- [DeeLMind/CVE-2020-27955-LFS](https://github.com/DeeLMind/CVE-2020-27955-LFS)
|
||||
- [exileddb/CVE-2020-27955](https://github.com/exileddb/CVE-2020-27955)
|
||||
- [IanSmith123/CVE-2020-27955](https://github.com/IanSmith123/CVE-2020-27955)
|
||||
- [qzyqzynb/CVE-2020-27955](https://github.com/qzyqzynb/CVE-2020-27955)
|
||||
|
||||
### CVE-2020-27976 (2020-10-28)
|
||||
|
||||
|
|
Loading…
Reference in a new issue