Auto Update 2020/08/11 06:09:23

This commit is contained in:
motikan2010-bot 2020-08-11 06:09:23 +09:00
parent 4aebaa25dc
commit 09c366bc3a
21 changed files with 138 additions and 81 deletions

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2020-08-07T21:33:14Z",
"updated_at": "2020-08-10T20:36:05Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2241,
"watchers_count": 2241,
"stargazers_count": 2242,
"watchers_count": 2242,
"forks_count": 482,
"forks": 482,
"watchers": 2241,
"watchers": 2242,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2020-08-10T06:51:33Z",
"updated_at": "2020-08-10T16:39:20Z",
"pushed_at": "2017-02-27T18:56:12Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 119,
"forks": 119,
"watchers": 335,
"watchers": 336,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2020-08-10T00:51:50Z",
"updated_at": "2020-08-10T18:57:16Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 269,
"watchers_count": 269,
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 107,
"forks": 107,
"watchers": 269,
"watchers": 268,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-08-07T19:50:32Z",
"updated_at": "2020-08-10T18:54:27Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 539,
"watchers_count": 539,
"stargazers_count": 538,
"watchers_count": 538,
"forks_count": 91,
"forks": 91,
"watchers": 539,
"watchers": 538,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-09T15:35:16Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 13,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-08-07T19:50:32Z",
"updated_at": "2020-08-10T18:54:27Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 539,
"watchers_count": 539,
"stargazers_count": 538,
"watchers_count": 538,
"forks_count": 91,
"forks": 91,
"watchers": 539,
"watchers": 538,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 429,
"watchers_count": 429,
"forks_count": 140,
"forks": 140,
"forks_count": 141,
"forks": 141,
"watchers": 429,
"score": 0
},
@ -619,5 +619,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 286360004,
"name": "Drupalgeddon2",
"full_name": "ruthvikvegunta\/Drupalgeddon2",
"owner": {
"login": "ruthvikvegunta",
"id": 49064045,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/49064045?v=4",
"html_url": "https:\/\/github.com\/ruthvikvegunta"
},
"html_url": "https:\/\/github.com\/ruthvikvegunta\/Drupalgeddon2",
"description": "CVE-2018-7600 | Drupal < 7.58 \/ < 8.3.9 \/ < 8.4.6 \/ < 8.5.1 - 'Drupalgeddon2' RCE",
"fork": false,
"created_at": "2020-08-10T02:46:18Z",
"updated_at": "2020-08-10T15:23:38Z",
"pushed_at": "2020-08-10T15:19:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -983,8 +983,8 @@
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 467,
"watchers_count": 467,
"forks_count": 186,
"forks": 186,
"forks_count": 187,
"forks": 187,
"watchers": 467,
"score": 0
},
@ -1094,13 +1094,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-08-06T09:33:25Z",
"updated_at": "2020-08-10T19:58:47Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1112,
"watchers_count": 1112,
"stargazers_count": 1113,
"watchers_count": 1113,
"forks_count": 378,
"forks": 378,
"watchers": 1112,
"watchers": 1113,
"score": 0
},
{
@ -1301,13 +1301,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-07-28T15:51:36Z",
"updated_at": "2020-08-10T19:56:47Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 750,
"watchers_count": 750,
"stargazers_count": 751,
"watchers_count": 751,
"forks_count": 182,
"forks": 182,
"watchers": 750,
"watchers": 751,
"score": 0
},
{
@ -2336,13 +2336,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2020-08-10T00:28:00Z",
"updated_at": "2020-08-10T18:28:37Z",
"pushed_at": "2019-10-16T01:04:12Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 57,
"forks": 57,
"watchers": 160,
"watchers": 161,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2020-08-06T22:07:33Z",
"updated_at": "2020-08-10T18:56:06Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 579,
"watchers_count": 579,
"stargazers_count": 578,
"watchers_count": 578,
"forks_count": 75,
"forks": 75,
"watchers": 579,
"watchers": 578,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-09-03T11:29:51Z",
"updated_at": "2020-08-08T18:41:03Z",
"updated_at": "2020-08-10T18:24:56Z",
"pushed_at": "2019-09-03T11:30:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"watchers": 5,
"score": 0
}
]

View file

@ -266,7 +266,7 @@
"description": "Webmin <=1.920 RCE",
"fork": false,
"created_at": "2020-08-08T10:17:03Z",
"updated_at": "2020-08-10T02:40:12Z",
"updated_at": "2020-08-10T15:24:26Z",
"pushed_at": "2020-08-10T02:40:09Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-10T09:01:38Z",
"updated_at": "2020-08-10T15:32:52Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1455,
"watchers_count": 1455,
"stargazers_count": 1456,
"watchers_count": 1456,
"forks_count": 377,
"forks": 377,
"watchers": 1455,
"watchers": 1456,
"score": 0
},
{

View file

@ -82,8 +82,8 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2020-07-14T03:26:32Z",
"pushed_at": "2020-07-31T16:18:29Z",
"updated_at": "2020-08-10T20:37:31Z",
"pushed_at": "2020-08-10T20:37:29Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 28,

View file

@ -224,8 +224,8 @@
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 56,
"forks": 56,
"forks_count": 57,
"forks": 57,
"watchers": 128,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-05-05T17:19:02Z",
"updated_at": "2020-08-02T00:27:42Z",
"updated_at": "2020-08-10T18:56:07Z",
"pushed_at": "2019-12-28T18:25:10Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 53,
"forks": 53,
"watchers": 197,
"watchers": 196,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-08-03T15:29:45Z",
"updated_at": "2020-08-10T16:44:17Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 383,
"watchers_count": 383,
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 89,
"forks": 89,
"watchers": 383,
"watchers": 382,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2020-08-09T12:58:02Z",
"updated_at": "2020-08-10T18:29:48Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 320,
"watchers_count": 320,
"forks_count": 56,
"forks": 56,
"watchers": 321,
"watchers": 320,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "CVE-2020-3452 exploit",
"fork": false,
"created_at": "2020-08-01T08:27:11Z",
"updated_at": "2020-08-04T03:11:10Z",
"updated_at": "2020-08-10T20:32:50Z",
"pushed_at": "2020-08-01T08:59:28Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 0,
"forks": 0,
"watchers": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 1,
"forks": 1,
"watchers": 18,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-10T09:01:38Z",
"updated_at": "2020-08-10T15:32:52Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1455,
"watchers_count": 1455,
"stargazers_count": 1456,
"watchers_count": 1456,
"forks_count": 377,
"forks": 377,
"watchers": 1455,
"watchers": 1456,
"score": 0
},
{
@ -201,8 +201,8 @@
"pushed_at": "2020-07-05T20:32:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 11,
"score": 0
},
@ -1121,8 +1121,8 @@
"pushed_at": "2020-07-22T09:53:30Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"score": 0
},

25
2020/CVE-2020-6519.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 286196933,
"name": "CVE-2020-6519",
"full_name": "PerimeterX\/CVE-2020-6519",
"owner": {
"login": "PerimeterX",
"id": 10051748,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/10051748?v=4",
"html_url": "https:\/\/github.com\/PerimeterX"
},
"html_url": "https:\/\/github.com\/PerimeterX\/CVE-2020-6519",
"description": null,
"fork": false,
"created_at": "2020-08-09T08:25:40Z",
"updated_at": "2020-08-10T18:16:14Z",
"pushed_at": "2020-08-10T18:16:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -806,6 +806,14 @@ Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 al
- [cudi1999/CVE-2020-6514](https://github.com/cudi1999/CVE-2020-6514)
### CVE-2020-6519
<code>
Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
</code>
- [PerimeterX/CVE-2020-6519](https://github.com/PerimeterX/CVE-2020-6519)
### CVE-2020-6650
<code>
@ -6277,6 +6285,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
- [zhzyker/CVE-2018-7600-Drupal-POC-EXP](https://github.com/zhzyker/CVE-2018-7600-Drupal-POC-EXP)
- [rabbitmask/CVE-2018-7600-Drupal7](https://github.com/rabbitmask/CVE-2018-7600-Drupal7)
- [ynsmroztas/drupalhunter](https://github.com/ynsmroztas/drupalhunter)
- [ruthvikvegunta/Drupalgeddon2](https://github.com/ruthvikvegunta/Drupalgeddon2)
### CVE-2018-7602