Auto Update 2020/10/20 00:10:34

This commit is contained in:
motikan2010-bot 2020-10-20 00:10:34 +09:00
parent 0a54a70e4e
commit f0dcc28a24
34 changed files with 194 additions and 161 deletions

View file

@ -36,13 +36,13 @@
"description": "Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass",
"fork": false,
"created_at": "2019-02-04T21:12:56Z",
"updated_at": "2019-05-28T14:22:07Z",
"updated_at": "2020-10-19T12:46:43Z",
"pushed_at": "2019-05-28T14:21:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "OpenSSH remote DOS exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-09T15:22:38Z",
"updated_at": "2020-08-19T13:21:14Z",
"updated_at": "2020-10-19T12:52:58Z",
"pushed_at": "2017-10-30T22:29:20Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 26,
"forks": 26,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-10-19T02:24:24Z",
"updated_at": "2020-10-19T13:32:57Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 230,
"watchers_count": 230,
"stargazers_count": 231,
"watchers_count": 231,
"forks_count": 80,
"forks": 80,
"watchers": 230,
"watchers": 231,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-18T20:53:40Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 8,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false,
"created_at": "2018-03-12T16:44:12Z",
"updated_at": "2020-08-21T01:49:06Z",
"updated_at": "2020-10-19T15:05:03Z",
"pushed_at": "2018-03-12T16:50:20Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 21,
"forks": 21,
"watchers": 54,
"watchers": 55,
"score": 0
},
{

View file

@ -1213,8 +1213,8 @@
"pushed_at": "2020-09-29T05:21:44Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 137,
"forks": 137,
"forks_count": 138,
"forks": 138,
"watchers": 8,
"score": 0
},

View file

@ -312,13 +312,13 @@
"description": null,
"fork": false,
"created_at": "2018-04-28T04:11:45Z",
"updated_at": "2020-10-15T06:41:19Z",
"updated_at": "2020-10-19T13:28:13Z",
"pushed_at": "2018-04-28T04:47:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-08-18T00:00:15Z",
"stargazers_count": 423,
"watchers_count": 423,
"forks_count": 139,
"forks": 139,
"forks_count": 140,
"forks": 140,
"watchers": 423,
"score": 0
},
@ -86,8 +86,8 @@
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"score": 0
},
@ -132,8 +132,8 @@
"pushed_at": "2018-10-27T01:07:49Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 5,
"score": 0
},
@ -224,8 +224,8 @@
"pushed_at": "2019-01-23T07:30:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 31,
"forks": 31,
"forks_count": 30,
"forks": 30,
"watchers": 152,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 56,
"forks": 56,
"forks_count": 55,
"forks": 55,
"watchers": 199,
"score": 0
}

View file

@ -132,8 +132,8 @@
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 40,
"forks": 40,
"forks_count": 41,
"forks": 41,
"watchers": 78,
"score": 0
},

View file

@ -312,13 +312,13 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2020-10-13T07:38:43Z",
"updated_at": "2020-10-19T10:59:35Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 339,
"watchers_count": 339,
"forks_count": 189,
"forks": 189,
"watchers": 339,
"stargazers_count": 340,
"watchers_count": 340,
"forks_count": 190,
"forks": 190,
"watchers": 340,
"score": 0
},
{

View file

@ -23,26 +23,26 @@
"score": 0
},
{
"id": 203567273,
"id": 203575464,
"name": "Pulse",
"full_name": "ladyleet1337\/Pulse",
"full_name": "nuc13us\/Pulse",
"owner": {
"login": "ladyleet1337",
"id": 26109832,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26109832?v=4",
"html_url": "https:\/\/github.com\/ladyleet1337"
"login": "nuc13us",
"id": 22916937,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22916937?v=4",
"html_url": "https:\/\/github.com\/nuc13us"
},
"html_url": "https:\/\/github.com\/ladyleet1337\/Pulse",
"html_url": "https:\/\/github.com\/nuc13us\/Pulse",
"description": "Pulse Secure VPN CVE-2019-11510",
"fork": false,
"created_at": "2019-08-21T11:08:48Z",
"updated_at": "2020-07-13T08:26:29Z",
"pushed_at": "2020-07-13T08:26:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"created_at": "2019-08-21T12:03:14Z",
"updated_at": "2020-10-19T12:40:24Z",
"pushed_at": "2019-08-21T12:03:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-10-15T16:01:26Z",
"updated_at": "2020-10-19T10:47:17Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 41,
"forks": 41,
"watchers": 93,
"watchers": 94,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2020-09-21T12:48:50Z",
"updated_at": "2020-10-19T11:46:02Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 578,
"watchers_count": 578,
"stargazers_count": 577,
"watchers_count": 577,
"forks_count": 79,
"forks": 79,
"watchers": 578,
"watchers": 577,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2020-10-12T07:34:06Z",
"updated_at": "2020-10-19T09:28:08Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 53,
"forks": 53,
"watchers": 174,
"watchers": 173,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-19T04:33:59Z",
"updated_at": "2020-10-19T13:28:23Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1946,
"watchers_count": 1946,
"stargazers_count": 1947,
"watchers_count": 1947,
"forks_count": 511,
"forks": 511,
"watchers": 1946,
"watchers": 1947,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-10-16T07:14:47Z",
"updated_at": "2020-10-19T10:55:50Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 348,
"watchers_count": 348,
"forks_count": 113,
"forks": 113,
"watchers": 347,
"watchers": 348,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-10-16T13:51:37Z",
"updated_at": "2020-10-19T10:47:11Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 502,
"watchers_count": 502,
"stargazers_count": 503,
"watchers_count": 503,
"forks_count": 120,
"forks": 120,
"watchers": 502,
"watchers": 503,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-10-19T02:24:24Z",
"updated_at": "2020-10-19T13:32:57Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 230,
"watchers_count": 230,
"stargazers_count": 231,
"watchers_count": 231,
"forks_count": 80,
"forks": 80,
"watchers": 230,
"watchers": 231,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2020-09-30T20:37:18Z",
"updated_at": "2020-10-19T09:12:35Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 42,
"forks": 42,
"watchers": 133,
"watchers": 134,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.",
"fork": false,
"created_at": "2020-01-10T09:19:10Z",
"updated_at": "2020-09-01T11:22:35Z",
"updated_at": "2020-10-19T09:12:25Z",
"pushed_at": "2020-01-15T08:36:05Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 6,
"forks": 6,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 83,
"forks": 83,
"forks_count": 84,
"forks": 84,
"watchers": 232,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 432,
"watchers_count": 432,
"forks_count": 101,
"forks": 101,
"forks_count": 102,
"forks": 102,
"watchers": 432,
"score": 0
}

View file

@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-10-19T06:26:04Z",
"updated_at": "2020-10-19T09:27:57Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 1020,
"watchers_count": 1020,
"stargazers_count": 1019,
"watchers_count": 1019,
"forks_count": 333,
"forks": 333,
"watchers": 1020,
"watchers": 1019,
"score": 0
},
{
@ -1094,13 +1094,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-10-19T06:32:20Z",
"updated_at": "2020-10-19T11:54:32Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 325,
"watchers_count": 325,
"stargazers_count": 326,
"watchers_count": 326,
"forks_count": 108,
"forks": 108,
"watchers": 325,
"watchers": 326,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2020-10-19T05:24:19Z",
"pushed_at": "2020-10-15T02:57:22Z",
"stargazers_count": 188,
"watchers_count": 188,
"updated_at": "2020-10-19T13:57:40Z",
"pushed_at": "2020-10-19T13:57:36Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 23,
"forks": 23,
"watchers": 188,
"watchers": 191,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
"fork": false,
"created_at": "2020-10-16T23:03:15Z",
"updated_at": "2020-10-18T19:51:57Z",
"updated_at": "2020-10-19T11:47:27Z",
"pushed_at": "2020-10-16T23:12:52Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"watchers": 13,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "PoC BSOD for CVE-2020-16898",
"fork": false,
"created_at": "2020-10-17T04:32:11Z",
"updated_at": "2020-10-19T09:05:12Z",
"updated_at": "2020-10-19T14:27:59Z",
"pushed_at": "2020-10-17T04:32:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-12T20:59:03Z",
"updated_at": "2020-10-17T11:39:36Z",
"pushed_at": "2020-10-15T02:58:42Z",
"updated_at": "2020-10-19T13:58:48Z",
"pushed_at": "2020-10-19T13:58:46Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 6,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-15T14:57:31Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 88,
"score": 0
}

View file

@ -82,13 +82,13 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2020-10-16T22:53:25Z",
"updated_at": "2020-10-19T14:07:51Z",
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"forks_count": 88,
"forks": 88,
"watchers": 197,
"watchers": 198,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2020-10-18T21:52:06Z",
"updated_at": "2020-10-19T14:25:17Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks": 3,
"watchers": 16,
"watchers": 18,
"score": 0
}
]

25
2020/CVE-2020-25540.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 305338473,
"name": "CVE-2020-25540",
"full_name": "ChaoYangDongYongGuaiGe\/CVE-2020-25540",
"owner": {
"login": "ChaoYangDongYongGuaiGe",
"id": 57404930,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/57404930?v=4",
"html_url": "https:\/\/github.com\/ChaoYangDongYongGuaiGe"
},
"html_url": "https:\/\/github.com\/ChaoYangDongYongGuaiGe\/CVE-2020-25540",
"description": "ThinkAdmin CVE-2020-25540 poc",
"fork": false,
"created_at": "2020-10-19T09:56:20Z",
"updated_at": "2020-10-19T10:16:49Z",
"pushed_at": "2020-10-19T10:16:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check",
"fork": false,
"created_at": "2020-07-24T15:04:45Z",
"updated_at": "2020-10-08T15:24:21Z",
"updated_at": "2020-10-19T10:47:24Z",
"pushed_at": "2020-08-30T21:34:41Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-10-19T03:58:51Z",
"updated_at": "2020-10-19T12:39:12Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 50,
"forks": 50,
"watchers": 211,
"watchers": 212,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-19T04:33:59Z",
"updated_at": "2020-10-19T13:28:23Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1946,
"watchers_count": 1946,
"stargazers_count": 1947,
"watchers_count": 1947,
"forks_count": 511,
"forks": 511,
"watchers": 1946,
"watchers": 1947,
"score": 0
},
{
@ -86,8 +86,8 @@
"pushed_at": "2020-07-15T02:52:33Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 97,
"forks": 97,
"forks_count": 98,
"forks": 98,
"watchers": 313,
"score": 0
},
@ -289,13 +289,13 @@
"description": "Python script to exploit F5 Big-IP CVE-2020-5902 ",
"fork": false,
"created_at": "2020-07-06T04:03:58Z",
"updated_at": "2020-10-13T11:11:34Z",
"updated_at": "2020-10-19T10:55:32Z",
"pushed_at": "2020-07-28T08:43:11Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 9,
"forks": 9,
"watchers": 36,
"watchers": 37,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/13852\/commits\/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s):\/\/IP:Port",
"fork": false,
"created_at": "2020-07-20T18:45:53Z",
"updated_at": "2020-08-31T12:12:01Z",
"updated_at": "2020-10-19T10:56:00Z",
"pushed_at": "2020-07-21T18:50:07Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 19,
"forks": 19,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Citrix ADC Vulns",
"fork": false,
"created_at": "2020-07-10T20:00:17Z",
"updated_at": "2020-09-09T02:51:05Z",
"updated_at": "2020-10-19T10:55:24Z",
"pushed_at": "2020-07-10T21:03:20Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 14,
"forks": 14,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -2462,6 +2462,14 @@ Sourcecodester Simple Library Management System 1.0 is affected by Insecure Perm
### CVE-2020-25518
- [g-rubert/wordpress_DoS](https://github.com/g-rubert/wordpress_DoS)
### CVE-2020-25540
<code>
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
</code>
- [ChaoYangDongYongGuaiGe/CVE-2020-25540](https://github.com/ChaoYangDongYongGuaiGe/CVE-2020-25540)
### CVE-2020-25747
<code>
@ -4308,7 +4316,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7
</code>
- [projectzeroindia/CVE-2019-11510](https://github.com/projectzeroindia/CVE-2019-11510)
- [ladyleet1337/Pulse](https://github.com/ladyleet1337/Pulse)
- [nuc13us/Pulse](https://github.com/nuc13us/Pulse)
- [imjdl/CVE-2019-11510-poc](https://github.com/imjdl/CVE-2019-11510-poc)
- [es0/CVE-2019-11510_poc](https://github.com/es0/CVE-2019-11510_poc)
- [r00tpgp/http-pulse_ssl_vpn.nse](https://github.com/r00tpgp/http-pulse_ssl_vpn.nse)