mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/05/12 06:07:31
This commit is contained in:
parent
1be483b56a
commit
f1dcc62c7b
27 changed files with 227 additions and 107 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 257,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -136,5 +136,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263118464,
|
||||
"name": "TKEY-remote-DoS-vulnerability-exploit",
|
||||
"full_name": "xycloops123\/TKEY-remote-DoS-vulnerability-exploit",
|
||||
"owner": {
|
||||
"login": "xycloops123",
|
||||
"id": 7406483,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7406483?v=4",
|
||||
"html_url": "https:\/\/github.com\/xycloops123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xycloops123\/TKEY-remote-DoS-vulnerability-exploit",
|
||||
"description": "Exploit code for CVE-2015-5477 POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-11T18:01:09Z",
|
||||
"updated_at": "2020-05-11T18:06:45Z",
|
||||
"pushed_at": "2020-05-11T18:06:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -665,5 +665,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263137313,
|
||||
"name": "Dirty-Cow-Explanation-CVE-2016-5195-",
|
||||
"full_name": "shanuka-ashen\/Dirty-Cow-Explanation-CVE-2016-5195-",
|
||||
"owner": {
|
||||
"login": "shanuka-ashen",
|
||||
"id": 61181660,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/61181660?v=4",
|
||||
"html_url": "https:\/\/github.com\/shanuka-ashen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shanuka-ashen\/Dirty-Cow-Explanation-CVE-2016-5195-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-11T19:25:26Z",
|
||||
"updated_at": "2020-05-11T19:26:44Z",
|
||||
"pushed_at": "2020-05-11T19:26:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-05-10T10:10:06Z",
|
||||
"updated_at": "2020-05-11T16:58:09Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 189,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2020-04-20T11:34:40Z",
|
||||
"updated_at": "2020-05-11T18:53:35Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Creating a vulnerable environment and the PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-23T20:06:17Z",
|
||||
"updated_at": "2019-11-25T21:32:38Z",
|
||||
"updated_at": "2020-05-11T21:00:33Z",
|
||||
"pushed_at": "2019-11-25T21:21:55Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-08T18:06:10Z",
|
||||
"updated_at": "2020-04-21T00:37:45Z",
|
||||
"updated_at": "2020-05-11T17:57:42Z",
|
||||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 196,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2386,8 +2386,8 @@
|
|||
"pushed_at": "2019-10-16T01:04:12Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-09T16:49:19Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 216,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-07-08T18:25:12Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "USB device fuzzing on Android Phone",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T05:45:29Z",
|
||||
"updated_at": "2020-05-10T21:36:16Z",
|
||||
"pushed_at": "2020-04-05T05:48:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2020-05-11T21:06:31Z",
|
||||
"pushed_at": "2020-05-11T21:06:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -274,5 +274,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263100309,
|
||||
"name": "Exploit-CVE-2019-14287",
|
||||
"full_name": "SachinthaDeSilva-cmd\/Exploit-CVE-2019-14287",
|
||||
"owner": {
|
||||
"login": "SachinthaDeSilva-cmd",
|
||||
"id": 65182737,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/65182737?v=4",
|
||||
"html_url": "https:\/\/github.com\/SachinthaDeSilva-cmd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SachinthaDeSilva-cmd\/Exploit-CVE-2019-14287",
|
||||
"description": "Documentation for Sudo Security Bypass - CVE 2019-14287",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-11T16:40:12Z",
|
||||
"updated_at": "2020-05-11T16:43:41Z",
|
||||
"pushed_at": "2020-05-11T16:43:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263135881,
|
||||
"name": "CVE-2019-14287-IT18030372-",
|
||||
"full_name": "HussyCool\/CVE-2019-14287-IT18030372-",
|
||||
"owner": {
|
||||
"login": "HussyCool",
|
||||
"id": 39041533,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/39041533?v=4",
|
||||
"html_url": "https:\/\/github.com\/HussyCool"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HussyCool\/CVE-2019-14287-IT18030372-",
|
||||
"description": "Sudo Security Policy bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-11T19:19:17Z",
|
||||
"updated_at": "2020-05-11T19:21:07Z",
|
||||
"pushed_at": "2020-05-11T19:19:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-05-10T10:10:06Z",
|
||||
"updated_at": "2020-05-11T16:58:09Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 189,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2020-05-11T13:33:58Z",
|
||||
"updated_at": "2020-05-11T17:23:30Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 328,
|
||||
"watchers": 329,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-24T13:10:39Z",
|
||||
"updated_at": "2020-05-08T10:15:47Z",
|
||||
"updated_at": "2020-05-11T19:14:41Z",
|
||||
"pushed_at": "2020-03-24T13:19:34Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -979,13 +979,13 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2020-05-09T22:55:32Z",
|
||||
"updated_at": "2020-05-11T17:39:44Z",
|
||||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 156,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1263,5 +1263,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263146475,
|
||||
"name": "CVE-2020-0796",
|
||||
"full_name": "gyannx\/CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "gyannx",
|
||||
"id": 64989206,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/64989206?v=4",
|
||||
"html_url": "https:\/\/github.com\/gyannx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gyannx\/CVE-2020-0796",
|
||||
"description": "Remote code execution module for CVE-2020-0796 (SMBGhost).",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-11T20:06:18Z",
|
||||
"updated_at": "2020-05-11T20:06:54Z",
|
||||
"pushed_at": "2020-05-11T20:06:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-04T00:50:42Z",
|
||||
"updated_at": "2020-05-11T01:37:06Z",
|
||||
"updated_at": "2020-05-11T15:16:44Z",
|
||||
"pushed_at": "2020-05-10T22:35:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-05-08T01:28:39Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-11651: Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T11:47:56Z",
|
||||
"updated_at": "2020-05-08T12:21:55Z",
|
||||
"updated_at": "2020-05-11T19:14:20Z",
|
||||
"pushed_at": "2020-05-05T03:27:11Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -160,29 +160,6 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 261289637,
|
||||
"name": "CVE-2020-11651",
|
||||
"full_name": "kevthehermit\/CVE-2020-11651",
|
||||
"owner": {
|
||||
"login": "kevthehermit",
|
||||
"id": 2545096,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2545096?v=4",
|
||||
"html_url": "https:\/\/github.com\/kevthehermit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kevthehermit\/CVE-2020-11651",
|
||||
"description": "PoC for CVE-2020-11651",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T20:34:04Z",
|
||||
"updated_at": "2020-05-09T11:22:20Z",
|
||||
"pushed_at": "2020-05-04T20:39:49Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 261951068,
|
||||
"name": "cve-2020-11651-exp-plus",
|
||||
|
@ -229,6 +206,29 @@
|
|||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 262555019,
|
||||
"name": "CVE-2020-11651",
|
||||
"full_name": "RakhithJK\/CVE-2020-11651",
|
||||
"owner": {
|
||||
"login": "RakhithJK",
|
||||
"id": 37833354,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37833354?v=4",
|
||||
"html_url": "https:\/\/github.com\/RakhithJK"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RakhithJK\/CVE-2020-11651",
|
||||
"description": "PoC for CVE-2020-11651",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-09T11:22:25Z",
|
||||
"updated_at": "2020-05-11T19:17:30Z",
|
||||
"pushed_at": "2020-05-04T20:39:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 262782431,
|
||||
"name": "CVE-2020-11651",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T15:25:59Z",
|
||||
"updated_at": "2020-05-11T14:39:47Z",
|
||||
"updated_at": "2020-05-11T15:48:35Z",
|
||||
"pushed_at": "2020-05-10T15:32:54Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 27,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-28T13:48:27Z",
|
||||
"updated_at": "2020-05-08T01:59:20Z",
|
||||
"updated_at": "2020-05-11T18:21:39Z",
|
||||
"pushed_at": "2020-04-28T13:51:17Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 97,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2020-05-11T10:19:09Z",
|
||||
"updated_at": "2020-05-11T15:47:12Z",
|
||||
"pushed_at": "2020-05-11T02:14:55Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-05-11T10:54:52Z",
|
||||
"updated_at": "2020-05-11T15:48:36Z",
|
||||
"pushed_at": "2020-04-26T11:54:57Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic coherence.jar RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T09:04:43Z",
|
||||
"updated_at": "2020-05-11T14:45:05Z",
|
||||
"updated_at": "2020-05-11T16:28:52Z",
|
||||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 51,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T05:53:47Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-14T12:31:19Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -256,6 +256,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [thelostworldFree/CVE-2020-0796](https://github.com/thelostworldFree/CVE-2020-0796)
|
||||
- [syadg123/CVE-2020-0796](https://github.com/syadg123/CVE-2020-0796)
|
||||
- [section-c/CVE-2020-0796](https://github.com/section-c/CVE-2020-0796)
|
||||
- [gyannx/CVE-2020-0796](https://github.com/gyannx/CVE-2020-0796)
|
||||
|
||||
### CVE-2020-0798
|
||||
|
||||
|
@ -433,9 +434,9 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
|
|||
- [jasperla/CVE-2020-11651-poc](https://github.com/jasperla/CVE-2020-11651-poc)
|
||||
- [Imanfeng/SaltStack-Exp](https://github.com/Imanfeng/SaltStack-Exp)
|
||||
- [bravery9/SaltStack-Exp](https://github.com/bravery9/SaltStack-Exp)
|
||||
- [kevthehermit/CVE-2020-11651](https://github.com/kevthehermit/CVE-2020-11651)
|
||||
- [lovelyjuice/cve-2020-11651-exp-plus](https://github.com/lovelyjuice/cve-2020-11651-exp-plus)
|
||||
- [heikanet/CVE-2020-11651-CVE-2020-11652-EXP](https://github.com/heikanet/CVE-2020-11651-CVE-2020-11652-EXP)
|
||||
- [RakhithJK/CVE-2020-11651](https://github.com/RakhithJK/CVE-2020-11651)
|
||||
- [gyannx/CVE-2020-11651](https://github.com/gyannx/CVE-2020-11651)
|
||||
|
||||
### CVE-2020-11794
|
||||
|
@ -2313,6 +2314,8 @@ In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can
|
|||
- [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271)
|
||||
- [Unam3dd/sudo-vulnerability-CVE-2019-14287](https://github.com/Unam3dd/sudo-vulnerability-CVE-2019-14287)
|
||||
- [CMNatic/Dockerized-CVE-2019-14287](https://github.com/CMNatic/Dockerized-CVE-2019-14287)
|
||||
- [SachinthaDeSilva-cmd/Exploit-CVE-2019-14287](https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287)
|
||||
- [HussyCool/CVE-2019-14287-IT18030372-](https://github.com/HussyCool/CVE-2019-14287-IT18030372-)
|
||||
|
||||
### CVE-2019-14314
|
||||
|
||||
|
@ -10022,6 +10025,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
|
|||
- [Brucetg/DirtyCow-EXP](https://github.com/Brucetg/DirtyCow-EXP)
|
||||
- [jas502n/CVE-2016-5195](https://github.com/jas502n/CVE-2016-5195)
|
||||
- [imust6226/dirtcow](https://github.com/imust6226/dirtcow)
|
||||
- [shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-](https://github.com/shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-)
|
||||
|
||||
### CVE-2016-5345
|
||||
|
||||
|
@ -10930,6 +10934,7 @@ named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote
|
|||
- [knqyf263/cve-2015-5477](https://github.com/knqyf263/cve-2015-5477)
|
||||
- [ilanyu/cve-2015-5477](https://github.com/ilanyu/cve-2015-5477)
|
||||
- [denmilu/ShareDoc_cve-2015-5477](https://github.com/denmilu/ShareDoc_cve-2015-5477)
|
||||
- [xycloops123/TKEY-remote-DoS-vulnerability-exploit](https://github.com/xycloops123/TKEY-remote-DoS-vulnerability-exploit)
|
||||
|
||||
### CVE-2015-5602
|
||||
|
||||
|
|
Loading…
Reference in a new issue