Auto Update 2020/04/10 00:08:14

This commit is contained in:
motikan2010-bot 2020-04-10 00:08:14 +09:00
parent 6dcc745de7
commit e25a0a072a
29 changed files with 143 additions and 138 deletions

View file

@ -2,14 +2,14 @@
{
"id": 245464308,
"name": "CVE-2012-2688",
"full_name": "hackerSMinh\/CVE-2012-2688",
"full_name": "shelld3v\/CVE-2012-2688",
"owner": {
"login": "hackerSMinh",
"login": "shelld3v",
"id": 59408894,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/59408894?v=4",
"html_url": "https:\/\/github.com\/hackerSMinh"
"html_url": "https:\/\/github.com\/shelld3v"
},
"html_url": "https:\/\/github.com\/hackerSMinh\/CVE-2012-2688",
"html_url": "https:\/\/github.com\/shelld3v\/CVE-2012-2688",
"description": "A CVE-2012-2688 shell",
"fork": false,
"created_at": "2020-03-06T16:12:39Z",

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-09T08:59:20Z",
"updated_at": "2020-04-09T14:38:45Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 72,
"forks": 72,
"watchers": 354,
"watchers": 355,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-09T08:59:20Z",
"updated_at": "2020-04-09T14:38:45Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 72,
"forks": 72,
"watchers": 354,
"watchers": 355,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-10-30T22:29:20Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 23,
"forks": 23,
"forks_count": 24,
"forks": 24,
"watchers": 44,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-09T08:59:20Z",
"updated_at": "2020-04-09T14:38:45Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 72,
"forks": 72,
"watchers": 354,
"watchers": 355,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2020-03-24T03:58:49Z",
"updated_at": "2020-04-09T09:24:46Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 101,
"forks": 101,
"watchers": 171,
"watchers": 172,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-25T16:09:21Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 14,
"forks": 14,
"forks_count": 15,
"forks": 15,
"watchers": 19,
"score": 0
},

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-09T08:59:20Z",
"updated_at": "2020-04-09T14:38:45Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 72,
"forks": 72,
"watchers": 354,
"watchers": 355,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-04-08T10:04:52Z",
"updated_at": "2020-04-09T14:39:11Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 41,
"forks": 41,
"watchers": 225,
"watchers": 227,
"score": 0
}
]

View file

@ -1140,13 +1140,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-04-03T04:01:02Z",
"updated_at": "2020-04-09T14:54:16Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1095,
"watchers_count": 1095,
"stargazers_count": 1096,
"watchers_count": 1096,
"forks_count": 370,
"forks": 370,
"watchers": 1095,
"watchers": 1096,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-04-09T02:41:18Z",
"updated_at": "2020-04-09T13:44:27Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1555,
"watchers_count": 1555,
"stargazers_count": 1556,
"watchers_count": 1556,
"forks_count": 220,
"forks": 220,
"watchers": 1555,
"watchers": 1556,
"score": 0
},
{

View file

@ -25,14 +25,14 @@
{
"id": 245476096,
"name": "CVE-2019-11580",
"full_name": "hackerSMinh\/CVE-2019-11580",
"full_name": "shelld3v\/CVE-2019-11580",
"owner": {
"login": "hackerSMinh",
"login": "shelld3v",
"id": 59408894,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/59408894?v=4",
"html_url": "https:\/\/github.com\/hackerSMinh"
"html_url": "https:\/\/github.com\/shelld3v"
},
"html_url": "https:\/\/github.com\/hackerSMinh\/CVE-2019-11580",
"html_url": "https:\/\/github.com\/shelld3v\/CVE-2019-11580",
"description": "A CVE-2019-11580 shell",
"fork": false,
"created_at": "2020-03-06T17:09:26Z",

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2020-04-04T16:58:46Z",
"updated_at": "2020-04-09T12:28:24Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 26,
"forks": 26,
"watchers": 64,
"watchers": 65,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2020-04-08T11:05:15Z",
"updated_at": "2020-04-09T10:34:00Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 15,
"forks": 15,
"watchers": 61,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 16,
"forks": 16,
"watchers": 64,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-09-19T15:27:48Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 18,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-02-29T21:36:46Z",
"updated_at": "2020-03-10T07:31:37Z",
"updated_at": "2020-04-09T09:46:37Z",
"pushed_at": "2020-03-05T12:29:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-09T08:59:20Z",
"updated_at": "2020-04-09T14:38:45Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 72,
"forks": 72,
"watchers": 354,
"watchers": 355,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本均为亲测可用的脚本文件优先更新高危且易利用的漏洞利用脚本最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-09T08:57:42Z",
"pushed_at": "2020-04-09T08:10:11Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 21,
"forks": 21,
"watchers": 82,
"updated_at": "2020-04-09T14:50:49Z",
"pushed_at": "2020-04-09T10:06:05Z",
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 22,
"forks": 22,
"watchers": 129,
"score": 0
}
]

View file

@ -178,8 +178,8 @@
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 319,
"watchers_count": 319,
"forks_count": 140,
"forks": 140,
"forks_count": 141,
"forks": 141,
"watchers": 319,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-09-25T16:22:56Z",
"updated_at": "2020-01-19T08:02:50Z",
"updated_at": "2020-04-09T10:01:00Z",
"pushed_at": "2019-09-25T16:33:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2019-04-15T03:59:44Z",
"updated_at": "2019-07-09T11:39:30Z",
"updated_at": "2020-04-09T12:10:47Z",
"pushed_at": "2019-04-15T04:13:30Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2020-04-09T03:19:43Z",
"updated_at": "2020-04-09T11:24:38Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 7,
"forks": 7,
"watchers": 68,
"watchers": 71,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-04-07T21:05:36Z",
"updated_at": "2020-04-09T14:56:49Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 796,
"watchers_count": 796,
"stargazers_count": 797,
"watchers_count": 797,
"forks_count": 200,
"forks": 200,
"watchers": 796,
"watchers": 797,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2020-04-09T02:14:56Z",
"updated_at": "2020-04-09T11:44:31Z",
"pushed_at": "2020-02-11T21:34:28Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 39,
"forks": 39,
"watchers": 180,
"watchers": 181,
"score": 0
}
]

View file

@ -979,13 +979,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-09T06:23:10Z",
"updated_at": "2020-04-09T14:57:01Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 789,
"watchers_count": 789,
"stargazers_count": 790,
"watchers_count": 790,
"forks_count": 214,
"forks": 214,
"watchers": 789,
"watchers": 790,
"score": 0
},
{
@ -1117,13 +1117,13 @@
"description": "该资源为CVE-2020-0796漏洞复现包括Python版本和C++版本。主要是集合了github大神们的资源希望您喜欢~",
"fork": false,
"created_at": "2020-04-02T12:12:03Z",
"updated_at": "2020-04-09T07:28:30Z",
"updated_at": "2020-04-09T13:42:33Z",
"pushed_at": "2020-04-07T08:58:57Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -1163,13 +1163,13 @@
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
"fork": false,
"created_at": "2020-04-06T15:16:10Z",
"updated_at": "2020-04-09T06:25:12Z",
"updated_at": "2020-04-09T10:40:13Z",
"pushed_at": "2020-04-06T15:22:01Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 5,
"forks": 5,
"watchers": 37,
"watchers": 39,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-04-07T13:23:12Z",
"updated_at": "2020-04-09T08:22:15Z",
"updated_at": "2020-04-09T14:25:22Z",
"pushed_at": "2020-04-07T13:56:17Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 0,
"forks": 0,
"watchers": 10,
"watchers": 14,
"score": 0
},
{
@ -56,11 +56,11 @@
"html_url": "https:\/\/github.com\/magicming200"
},
"html_url": "https:\/\/github.com\/magicming200\/CVE-2020-10199_CVE-2020-10204",
"description": "CVE-2020-10199漏洞一键检测工具图形化界面。CVE-2020-10199 Nexus RCE Vul POC Tool with GUI.",
"description": "CVE-2020-10199、CVE-2020-10204漏洞一键检测工具图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.",
"fork": false,
"created_at": "2020-04-08T11:08:35Z",
"updated_at": "2020-04-09T05:50:41Z",
"pushed_at": "2020-04-09T01:55:37Z",
"updated_at": "2020-04-09T10:12:53Z",
"pushed_at": "2020-04-09T10:08:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-04-09T06:21:35Z",
"updated_at": "2020-04-09T06:23:51Z",
"updated_at": "2020-04-09T09:38:46Z",
"pushed_at": "2020-04-09T06:23:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -312,13 +312,13 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2020-04-08T04:04:43Z",
"updated_at": "2020-04-09T09:42:49Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 29,
"forks": 29,
"watchers": 79,
"watchers": 80,
"score": 0
},
{
@ -450,13 +450,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本均为亲测可用的脚本文件优先更新高危且易利用的漏洞利用脚本最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-09T08:57:42Z",
"pushed_at": "2020-04-09T08:10:11Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 21,
"forks": 21,
"watchers": 82,
"updated_at": "2020-04-09T14:50:49Z",
"pushed_at": "2020-04-09T10:06:05Z",
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 22,
"forks": 22,
"watchers": 129,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-09T08:59:20Z",
"updated_at": "2020-04-09T14:38:45Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 72,
"forks": 72,
"watchers": 354,
"watchers": 355,
"score": 0
},
{
@ -56,10 +56,10 @@
"html_url": "https:\/\/github.com\/hktalent"
},
"html_url": "https:\/\/github.com\/hktalent\/CVE-2020-2551",
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-04-08T05:37:28Z",
"updated_at": "2020-04-09T09:24:40Z",
"pushed_at": "2020-04-07T02:57:46Z",
"stargazers_count": 91,
"watchers_count": 91,
@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-04-08T10:22:40Z",
"updated_at": "2020-04-09T10:48:34Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 39,
"forks": 39,
"watchers": 160,
"watchers": 161,
"score": 0
},
{

View file

@ -267,6 +267,11 @@ An issue was discovered in Joomla! before 3.9.16. The lack of type casting of a
- [HoangKien1020/CVE-2020-10243](https://github.com/HoangKien1020/CVE-2020-10243)
### CVE-2020-10551
<code>
QQBrowser before 10.5.3870.400 installs a Windows service TsService.exe. This file is writable by anyone belonging to the NT AUTHORITY\Authenticated Users group, which includes all local and remote users. This can be abused by local attackers to escalate privileges to NT AUTHORITY\SYSTEM by writing a malicious executable to the location of TsService.
</code>
- [seqred-s-a/CVE-2020-10551](https://github.com/seqred-s-a/CVE-2020-10551)
### CVE-2020-10558
@ -1324,7 +1329,7 @@ Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin inco
</code>
- [jas502n/CVE-2019-11580](https://github.com/jas502n/CVE-2019-11580)
- [hackerSMinh/CVE-2019-11580](https://github.com/hackerSMinh/CVE-2019-11580)
- [shelld3v/CVE-2019-11580](https://github.com/shelld3v/CVE-2019-11580)
### CVE-2019-11581
@ -11946,7 +11951,7 @@ sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6
Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an &quot;overflow.&quot;
</code>
- [hackerSMinh/CVE-2012-2688](https://github.com/hackerSMinh/CVE-2012-2688)
- [shelld3v/CVE-2012-2688](https://github.com/shelld3v/CVE-2012-2688)
### CVE-2012-3137