Auto Update 2020/12/23 00:09:37

This commit is contained in:
motikan2010-bot 2020-12-23 00:09:37 +09:00
parent 12bf128fe8
commit 0a0cc70b29
24 changed files with 262 additions and 82 deletions

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 323613836,
"name": "CVE-2012-5106",
"full_name": "PepeTheRital\/CVE-2012-5106",
"owner": {
"login": "PepeTheRital",
"id": 65770864,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/65770864?v=4",
"html_url": "https:\/\/github.com\/PepeTheRital"
},
"html_url": "https:\/\/github.com\/PepeTheRital\/CVE-2012-5106",
"description": "RCE - Freefloat FTP Server 1.0",
"fork": false,
"created_at": "2020-12-22T12:02:34Z",
"updated_at": "2020-12-22T12:22:57Z",
"pushed_at": "2020-12-22T12:09:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2020-12-14T00:55:21Z",
"updated_at": "2020-12-22T12:35:03Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2246,
"watchers_count": 2246,
"stargazers_count": 2247,
"watchers_count": 2247,
"forks_count": 485,
"forks": 485,
"watchers": 2246,
"watchers": 2247,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright stsc MP4 Atom Integer Overflow Remote Code Execution",
"fork": false,
"created_at": "2015-09-10T23:00:59Z",
"updated_at": "2020-11-25T15:52:53Z",
"updated_at": "2020-12-22T09:40:25Z",
"pushed_at": "2015-09-10T23:01:09Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 121,
"forks": 121,
"watchers": 193,
"watchers": 192,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Shortest Path Bridging (SPB-Mac) vulnerability testing scripts. Used in a network pentest to enumerate a new vuln (CVE-2016-2783) in Avaya VOSS Ethernet switches.",
"fork": false,
"created_at": "2019-01-17T14:35:11Z",
"updated_at": "2020-04-07T18:08:40Z",
"updated_at": "2020-12-22T09:14:53Z",
"pushed_at": "2019-01-17T14:52:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-5636",
"fork": false,
"created_at": "2016-03-28T18:47:03Z",
"updated_at": "2020-08-11T07:34:40Z",
"updated_at": "2020-12-22T14:11:52Z",
"pushed_at": "2020-08-10T07:27:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 323575291,
"name": "CVE-2017-11610",
"full_name": "yaunsky\/CVE-2017-11610",
"owner": {
"login": "yaunsky",
"id": 48243087,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/48243087?v=4",
"html_url": "https:\/\/github.com\/yaunsky"
},
"html_url": "https:\/\/github.com\/yaunsky\/CVE-2017-11610",
"description": "Supervisord远程命令执行漏洞脚本",
"fork": false,
"created_at": "2020-12-22T09:08:49Z",
"updated_at": "2020-12-22T09:54:31Z",
"pushed_at": "2020-12-22T09:12:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2018/CVE-2018-16843.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 323590787,
"name": "-ingress-nginx-0.21-1.19.5",
"full_name": "flyniu666\/-ingress-nginx-0.21-1.19.5",
"owner": {
"login": "flyniu666",
"id": 52430647,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52430647?v=4",
"html_url": "https:\/\/github.com\/flyniu666"
},
"html_url": "https:\/\/github.com\/flyniu666\/-ingress-nginx-0.21-1.19.5",
"description": "based on nginx 1.19.5 to fix for CVE-2018-16843, CVE-2018-16844, CVE-2019-9511, CVE-2019-9513, and CVE-2019-9516",
"fork": false,
"created_at": "2020-12-22T10:16:11Z",
"updated_at": "2020-12-22T10:40:28Z",
"pushed_at": "2020-12-22T10:40:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-12-22T02:36:19Z",
"updated_at": "2020-12-22T15:04:08Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 246,
"watchers_count": 246,
"stargazers_count": 247,
"watchers_count": 247,
"forks_count": 51,
"forks": 51,
"watchers": 246,
"watchers": 247,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC of CVE",
"fork": false,
"created_at": "2020-03-21T16:21:16Z",
"updated_at": "2020-10-14T02:28:37Z",
"updated_at": "2020-12-22T13:49:29Z",
"pushed_at": "2020-03-21T16:21:58Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-12-21T11:48:24Z",
"updated_at": "2020-12-22T12:25:49Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2187,
"watchers_count": 2187,
"forks_count": 616,
"forks": 616,
"watchers": 2187,
"stargazers_count": 2188,
"watchers_count": 2188,
"forks_count": 617,
"forks": 617,
"watchers": 2188,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-12-18T20:54:37Z",
"updated_at": "2020-12-22T12:20:27Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 514,
"watchers_count": 514,
"stargazers_count": 515,
"watchers_count": 515,
"forks_count": 120,
"forks": 120,
"watchers": 514,
"watchers": 515,
"score": 0
},
{

View file

@ -59,8 +59,8 @@
"description": "CVE-2019-5475 靶场: RCE 命令注入漏洞",
"fork": false,
"created_at": "2020-12-16T14:03:16Z",
"updated_at": "2020-12-20T11:25:09Z",
"pushed_at": "2020-12-20T10:56:39Z",
"updated_at": "2020-12-22T15:09:47Z",
"pushed_at": "2020-12-22T15:09:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 419,
"watchers_count": 419,
"forks_count": 106,
"forks": 106,
"forks_count": 107,
"forks": 107,
"watchers": 419,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "FileReader Exploit",
"fork": false,
"created_at": "2019-03-20T18:43:49Z",
"updated_at": "2020-12-18T13:13:56Z",
"updated_at": "2020-12-22T13:08:19Z",
"pushed_at": "2019-03-20T18:47:25Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 252,
"watchers_count": 252,
"forks_count": 86,
"forks": 86,
"watchers": 251,
"watchers": 252,
"score": 0
}
]

25
2019/CVE-2019-9511.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 323590787,
"name": "-ingress-nginx-0.21-1.19.5",
"full_name": "flyniu666\/-ingress-nginx-0.21-1.19.5",
"owner": {
"login": "flyniu666",
"id": 52430647,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52430647?v=4",
"html_url": "https:\/\/github.com\/flyniu666"
},
"html_url": "https:\/\/github.com\/flyniu666\/-ingress-nginx-0.21-1.19.5",
"description": "based on nginx 1.19.5 to fix for CVE-2018-16843, CVE-2018-16844, CVE-2019-9511, CVE-2019-9513, and CVE-2019-9516",
"fork": false,
"created_at": "2020-12-22T10:16:11Z",
"updated_at": "2020-12-22T10:40:28Z",
"pushed_at": "2020-12-22T10:40:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2020-12-19T13:00:46Z",
"updated_at": "2020-12-22T12:21:42Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 40,
"forks": 40,
"watchers": 158,
"watchers": 159,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-12-21T17:36:55Z",
"updated_at": "2020-12-22T12:58:15Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 250,
"watchers_count": 250,
"stargazers_count": 251,
"watchers_count": 251,
"forks_count": 89,
"forks": 89,
"watchers": 250,
"watchers": 251,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-12-21T11:48:24Z",
"updated_at": "2020-12-22T12:25:49Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2187,
"watchers_count": 2187,
"forks_count": 616,
"forks": 616,
"watchers": 2187,
"stargazers_count": 2188,
"watchers_count": 2188,
"forks_count": 617,
"forks": 617,
"watchers": 2188,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web漏洞扫描和验证工具可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2020-12-22T08:50:17Z",
"updated_at": "2020-12-22T09:56:30Z",
"pushed_at": "2020-12-15T02:33:45Z",
"stargazers_count": 468,
"watchers_count": 468,
"forks_count": 87,
"forks": 87,
"watchers": 468,
"stargazers_count": 469,
"watchers_count": 469,
"forks_count": 88,
"forks": 88,
"watchers": 469,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "CVE-2020-14882 Weblogic-Exp",
"fork": false,
"created_at": "2020-10-29T06:30:30Z",
"updated_at": "2020-11-02T15:26:30Z",
"updated_at": "2020-12-22T09:47:47Z",
"pushed_at": "2020-10-29T06:36:01Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,
"forks": 8,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weaponized tool for CVE-2020-17144",
"fork": false,
"created_at": "2020-12-09T20:57:16Z",
"updated_at": "2020-12-20T05:53:40Z",
"updated_at": "2020-12-22T10:38:54Z",
"pushed_at": "2020-12-09T20:57:32Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 17,
"forks": 17,
"watchers": 95,
"watchers": 94,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "S2-061 的payload以及对应简单的PoC\/Exp",
"fork": false,
"created_at": "2020-12-10T17:42:37Z",
"updated_at": "2020-12-22T08:19:56Z",
"updated_at": "2020-12-22T12:32:20Z",
"pushed_at": "2020-12-18T00:57:50Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 11,
"forks": 11,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-12-22T07:54:09Z",
"updated_at": "2020-12-22T09:32:07Z",
"pushed_at": "2020-06-10T10:49:38Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 27,
"forks": 27,
"watchers": 127,
"watchers": 128,
"score": 0
}
]

25
2020/CVE-2020-27662.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 323584874,
"name": "CVE-2020-27662",
"full_name": "indevi0us\/CVE-2020-27662",
"owner": {
"login": "indevi0us",
"id": 72605728,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/72605728?v=4",
"html_url": "https:\/\/github.com\/indevi0us"
},
"html_url": "https:\/\/github.com\/indevi0us\/CVE-2020-27662",
"description": "Proof of Concept (PoC) for CVE-2020-27662.",
"fork": false,
"created_at": "2020-12-22T09:50:44Z",
"updated_at": "2020-12-22T09:52:27Z",
"pushed_at": "2020-12-22T09:52:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-27663.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 323585449,
"name": "CVE-2020-27663",
"full_name": "indevi0us\/CVE-2020-27663",
"owner": {
"login": "indevi0us",
"id": 72605728,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/72605728?v=4",
"html_url": "https:\/\/github.com\/indevi0us"
},
"html_url": "https:\/\/github.com\/indevi0us\/CVE-2020-27663",
"description": "Proof of Concept (PoC) for CVE-2020-27663.",
"fork": false,
"created_at": "2020-12-22T09:53:07Z",
"updated_at": "2020-12-22T09:53:32Z",
"pushed_at": "2020-12-22T09:53:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "for 供養",
"fork": false,
"created_at": "2020-06-13T07:32:24Z",
"updated_at": "2020-12-22T07:51:15Z",
"updated_at": "2020-12-22T13:54:21Z",
"pushed_at": "2020-06-13T07:41:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -3176,6 +3176,22 @@ BigBlueButton before 2.2.27 has an unsafe JODConverter setting in which LibreOff
- [hannob/CVE-2020-27603-bbb-libreoffice-poc](https://github.com/hannob/CVE-2020-27603-bbb-libreoffice-poc)
### CVE-2020-27662 (2020-11-26)
<code>
In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any database table (e.g., glpi_tickets, glpi_users, etc.).
</code>
- [indevi0us/CVE-2020-27662](https://github.com/indevi0us/CVE-2020-27662)
### CVE-2020-27663 (2020-11-26)
<code>
In GLPI before 9.5.3, ajax/getDropdownValue.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any itemType (e.g., Ticket, Users, etc.).
</code>
- [indevi0us/CVE-2020-27663](https://github.com/indevi0us/CVE-2020-27663)
### CVE-2020-27688 (2020-11-05)
<code>
@ -4855,6 +4871,14 @@ The Bluetooth BR/EDR specification up to and including version 5.1 permits suffi
- [francozappa/knob](https://github.com/francozappa/knob)
### CVE-2019-9511 (2019-08-13)
<code>
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
</code>
- [flyniu666/-ingress-nginx-0.21-1.19.5](https://github.com/flyniu666/-ingress-nginx-0.21-1.19.5)
### CVE-2019-9580 (2019-03-08)
<code>
@ -9543,6 +9567,14 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
- [ecebotarosh/CVE-2018-16763-exploit](https://github.com/ecebotarosh/CVE-2018-16763-exploit)
- [n3m1dotsys/CVE-2018-16763-Exploit-Python3](https://github.com/n3m1dotsys/CVE-2018-16763-Exploit-Python3)
### CVE-2018-16843 (2018-11-07)
<code>
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
</code>
- [flyniu666/-ingress-nginx-0.21-1.19.5](https://github.com/flyniu666/-ingress-nginx-0.21-1.19.5)
### CVE-2018-16854 (2018-11-26)
<code>
@ -11727,6 +11759,7 @@ The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before
</code>
- [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610)
- [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610)
### CVE-2017-11611 (2017-09-08)
@ -15710,6 +15743,7 @@ Stack-based buffer overflow in FreeFloat FTP Server 1.0 allows remote authentica
</code>
- [war4uthor/CVE-2012-5106](https://github.com/war4uthor/CVE-2012-5106)
- [PepeTheRital/CVE-2012-5106](https://github.com/PepeTheRital/CVE-2012-5106)
### CVE-2012-5575 (2013-08-19)