mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/07/28 06:11:54
This commit is contained in:
parent
582c7a18b5
commit
f3d4c5ca60
34 changed files with 185 additions and 152 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "I'll submit the poc after blackhat",
|
||||
"fork": false,
|
||||
"created_at": "2015-07-17T06:09:41Z",
|
||||
"updated_at": "2021-02-05T08:32:28Z",
|
||||
"updated_at": "2021-07-27T16:18:50Z",
|
||||
"pushed_at": "2015-08-30T19:24:32Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 112,
|
||||
"watchers": 113,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-26T13:39:03Z",
|
||||
"updated_at": "2021-07-19T01:55:05Z",
|
||||
"updated_at": "2021-07-27T18:55:22Z",
|
||||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 363,
|
||||
"watchers_count": 363,
|
||||
"forks_count": 141,
|
||||
"forks": 141,
|
||||
"watchers": 363,
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"forks_count": 142,
|
||||
"forks": 142,
|
||||
"watchers": 364,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2021-07-12T17:21:15Z",
|
||||
"updated_at": "2021-07-27T20:44:20Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 871,
|
||||
"watchers_count": 871,
|
||||
"stargazers_count": 872,
|
||||
"watchers_count": 872,
|
||||
"forks_count": 412,
|
||||
"forks": 412,
|
||||
"watchers": 871,
|
||||
"watchers": 872,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2021-07-02T21:31:02Z",
|
||||
"updated_at": "2021-07-27T16:58:19Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"watchers": 430,
|
||||
"watchers": 431,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-06T14:47:17Z",
|
||||
"updated_at": "2021-07-10T05:28:39Z",
|
||||
"updated_at": "2021-07-27T15:27:12Z",
|
||||
"pushed_at": "2019-06-06T14:53:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-06T01:11:32Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-16T14:45:44Z",
|
||||
"updated_at": "2021-06-11T18:11:51Z",
|
||||
"updated_at": "2021-07-27T16:56:48Z",
|
||||
"pushed_at": "2020-10-20T14:30:01Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 79,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-23T14:53:19Z",
|
||||
"updated_at": "2021-07-27T13:13:17Z",
|
||||
"updated_at": "2021-07-27T20:51:31Z",
|
||||
"pushed_at": "2020-08-08T16:58:05Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-07-26T18:17:14Z",
|
||||
"updated_at": "2021-07-27T20:38:01Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2714,
|
||||
"watchers_count": 2714,
|
||||
"stargazers_count": 2713,
|
||||
"watchers_count": 2713,
|
||||
"forks_count": 789,
|
||||
"forks": 789,
|
||||
"watchers": 2714,
|
||||
"watchers": 2713,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2021-07-13T20:16:43Z",
|
||||
"updated_at": "2021-07-27T19:37:42Z",
|
||||
"pushed_at": "2020-06-04T13:17:10Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Test a host for susceptibility to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2021-04-29T19:28:51Z",
|
||||
"updated_at": "2021-07-27T15:19:41Z",
|
||||
"pushed_at": "2020-10-23T19:35:42Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2020-01-17T22:01:20Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-14T12:20:18Z",
|
||||
"updated_at": "2021-05-12T16:44:38Z",
|
||||
"updated_at": "2021-07-27T20:27:52Z",
|
||||
"pushed_at": "2020-01-17T10:10:31Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "getshell test",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T09:22:27Z",
|
||||
"updated_at": "2021-03-26T20:00:24Z",
|
||||
"updated_at": "2021-07-27T17:25:50Z",
|
||||
"pushed_at": "2019-02-15T09:49:46Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 595,
|
||||
"watchers_count": 595,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 595,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T07:32:31Z",
|
||||
"updated_at": "2021-07-20T02:42:17Z",
|
||||
"updated_at": "2021-07-27T20:38:00Z",
|
||||
"pushed_at": "2019-12-20T14:28:44Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 36,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2021-07-13T02:44:28Z",
|
||||
"updated_at": "2021-07-27T20:29:33Z",
|
||||
"pushed_at": "2021-05-31T21:22:33Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-01T20:53:49Z",
|
||||
"updated_at": "2020-12-02T08:10:41Z",
|
||||
"updated_at": "2021-07-27T20:38:01Z",
|
||||
"pushed_at": "2020-05-18T17:36:18Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 109,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-12593.json
Normal file
25
2020/CVE-2020-12593.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 354342880,
|
||||
"name": "CVE-2020-12593",
|
||||
"full_name": "nasbench\/CVE-2020-12593",
|
||||
"owner": {
|
||||
"login": "nasbench",
|
||||
"id": 8741929,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8741929?v=4",
|
||||
"html_url": "https:\/\/github.com\/nasbench"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nasbench\/CVE-2020-12593",
|
||||
"description": "CVE-2020-12593 POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-03T16:41:24Z",
|
||||
"updated_at": "2021-07-27T20:42:53Z",
|
||||
"pushed_at": "2021-04-03T16:42:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T23:00:00Z",
|
||||
"updated_at": "2021-07-18T08:15:11Z",
|
||||
"updated_at": "2021-07-27T20:38:01Z",
|
||||
"pushed_at": "2020-07-17T13:07:29Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 230,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-07-27T07:58:39Z",
|
||||
"updated_at": "2021-07-27T18:05:55Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"forks_count": 106,
|
||||
"forks": 106,
|
||||
"watchers": 345,
|
||||
"watchers": 346,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,13 +266,13 @@
|
|||
"description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T16:10:21Z",
|
||||
"updated_at": "2021-07-19T01:26:31Z",
|
||||
"updated_at": "2021-07-27T15:37:33Z",
|
||||
"pushed_at": "2020-09-15T16:40:53Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-07-26T18:17:14Z",
|
||||
"updated_at": "2021-07-27T20:38:01Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2714,
|
||||
"watchers_count": 2714,
|
||||
"stargazers_count": 2713,
|
||||
"watchers_count": 2713,
|
||||
"forks_count": 789,
|
||||
"forks": 789,
|
||||
"watchers": 2714,
|
||||
"watchers": 2713,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2021-07-19T08:29:56Z",
|
||||
"updated_at": "2021-07-27T20:38:02Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 229,
|
||||
"watchers": 228,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "[CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T08:22:27Z",
|
||||
"updated_at": "2021-07-27T14:58:34Z",
|
||||
"updated_at": "2021-07-27T16:57:10Z",
|
||||
"pushed_at": "2020-09-16T20:50:02Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Python PoC for CVE-2020-35846 targeting Cockpit 0.11.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-25T05:05:14Z",
|
||||
"updated_at": "2021-07-26T20:07:04Z",
|
||||
"updated_at": "2021-07-27T15:52:27Z",
|
||||
"pushed_at": "2021-07-25T05:28:51Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 244,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-07-27T08:12:11Z",
|
||||
"updated_at": "2021-07-27T18:23:46Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1254,
|
||||
"watchers_count": 1254,
|
||||
"stargazers_count": 1257,
|
||||
"watchers_count": 1257,
|
||||
"forks_count": 450,
|
||||
"forks": 450,
|
||||
"watchers": 1254,
|
||||
"watchers": 1257,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-1675 Detection Info",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T18:32:17Z",
|
||||
"updated_at": "2021-07-27T06:18:05Z",
|
||||
"updated_at": "2021-07-27T18:27:46Z",
|
||||
"pushed_at": "2021-07-07T15:43:05Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 197,
|
||||
"watchers": 198,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:47:13Z",
|
||||
"updated_at": "2021-07-27T08:58:11Z",
|
||||
"updated_at": "2021-07-27T20:28:22Z",
|
||||
"pushed_at": "2021-07-05T06:46:12Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 277,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-07-27T12:10:28Z",
|
||||
"updated_at": "2021-07-27T18:04:04Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 521,
|
||||
"watchers_count": 521,
|
||||
"stargazers_count": 522,
|
||||
"watchers_count": 522,
|
||||
"forks_count": 139,
|
||||
"forks": 139,
|
||||
"watchers": 521,
|
||||
"watchers": 522,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-10T09:23:52Z",
|
||||
"updated_at": "2021-07-02T16:42:52Z",
|
||||
"updated_at": "2021-07-27T18:39:45Z",
|
||||
"pushed_at": "2021-04-28T17:56:04Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -243,13 +243,13 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2021-07-19T15:58:20Z",
|
||||
"updated_at": "2021-07-27T15:57:16Z",
|
||||
"pushed_at": "2021-03-17T11:21:52Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -772,13 +772,13 @@
|
|||
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T01:12:48Z",
|
||||
"updated_at": "2021-07-25T10:27:17Z",
|
||||
"updated_at": "2021-07-27T15:19:29Z",
|
||||
"pushed_at": "2021-03-24T01:25:05Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-07-26T19:35:44Z",
|
||||
"updated_at": "2021-07-27T19:07:25Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "XSS-Askey",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T16:14:48Z",
|
||||
"updated_at": "2021-03-23T02:07:49Z",
|
||||
"updated_at": "2021-07-27T20:33:30Z",
|
||||
"pushed_at": "2021-02-18T17:09:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T06:40:49Z",
|
||||
"updated_at": "2021-07-26T01:17:44Z",
|
||||
"updated_at": "2021-07-27T17:17:21Z",
|
||||
"pushed_at": "2021-06-21T00:51:49Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-07-19T01:22:40Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "openam-CVE-2021-35464 tomcat 执行命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T03:51:32Z",
|
||||
"updated_at": "2021-07-17T01:55:09Z",
|
||||
"updated_at": "2021-07-27T18:10:12Z",
|
||||
"pushed_at": "2021-07-01T03:56:55Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -243,13 +243,13 @@
|
|||
"description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-24T12:55:05Z",
|
||||
"updated_at": "2021-07-27T11:49:23Z",
|
||||
"updated_at": "2021-07-27T17:07:04Z",
|
||||
"pushed_at": "2021-07-25T15:41:33Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 147,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -4142,6 +4142,14 @@ The WOPI API integration for Vereign Collabora CODE through 4.2.2 does not prope
|
|||
|
||||
- [d7x/CVE-2020-12432](https://github.com/d7x/CVE-2020-12432)
|
||||
|
||||
### CVE-2020-12593 (2020-11-18)
|
||||
|
||||
<code>
|
||||
Symantec Endpoint Detection & Response, prior to 4.5, may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.
|
||||
</code>
|
||||
|
||||
- [nasbench/CVE-2020-12593](https://github.com/nasbench/CVE-2020-12593)
|
||||
|
||||
### CVE-2020-12629 (2020-05-04)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue