Auto Update 2020/05/05 18:08:34

This commit is contained in:
motikan2010-bot 2020-05-05 18:08:34 +09:00
parent 5eb2058539
commit 0d70c496a4
27 changed files with 171 additions and 115 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2020-04-27T13:31:04Z",
"updated_at": "2020-05-05T03:53:35Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 257,
"watchers_count": 257,
"forks_count": 79,
"forks": 79,
"watchers": 256,
"watchers": 257,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2020-04-01T09:11:05Z",
"updated_at": "2020-05-05T07:37:53Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 462,
"watchers_count": 462,
"stargazers_count": 463,
"watchers_count": 463,
"forks_count": 196,
"forks": 196,
"watchers": 462,
"watchers": 463,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2020-04-14T15:35:34Z",
"updated_at": "2020-05-05T05:56:52Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 341,
"watchers_count": 341,
"stargazers_count": 342,
"watchers_count": 342,
"forks_count": 130,
"forks": 130,
"watchers": 341,
"watchers": 342,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
"fork": false,
"created_at": "2018-06-21T15:44:29Z",
"updated_at": "2020-04-18T20:39:02Z",
"updated_at": "2020-05-05T03:21:01Z",
"pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 59,
"forks": 59,
"watchers": 168,
"watchers": 169,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 334,
"watchers_count": 334,
"forks_count": 310,
"forks": 310,
"forks_count": 311,
"forks": 311,
"watchers": 334,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
"fork": false,
"created_at": "2018-08-17T23:48:15Z",
"updated_at": "2020-05-03T23:47:57Z",
"updated_at": "2020-05-05T03:54:36Z",
"pushed_at": "2019-11-15T08:12:32Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 26,
"forks": 26,
"watchers": 106,
"watchers": 107,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
"fork": false,
"created_at": "2018-10-15T07:44:43Z",
"updated_at": "2020-03-25T11:06:29Z",
"updated_at": "2020-05-05T03:55:47Z",
"pushed_at": "2018-10-15T08:19:54Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 2,
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -221,11 +221,11 @@
"fork": false,
"created_at": "2018-12-25T07:08:55Z",
"updated_at": "2018-12-25T07:48:09Z",
"pushed_at": "2018-12-25T07:40:49Z",
"pushed_at": "2020-05-05T05:28:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)",
"fork": false,
"created_at": "2019-03-02T18:31:11Z",
"updated_at": "2020-01-15T12:34:12Z",
"updated_at": "2020-05-05T03:07:52Z",
"pushed_at": "2020-01-15T12:34:10Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 73,
"forks": 73,
"forks_count": 74,
"forks": 74,
"watchers": 253,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-05-04T19:37:09Z",
"updated_at": "2020-05-05T08:48:45Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1569,
"watchers_count": 1569,
"stargazers_count": 1568,
"watchers_count": 1568,
"forks_count": 224,
"forks": 224,
"watchers": 1569,
"watchers": 1568,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-05-04T04:46:18Z",
"updated_at": "2020-05-05T07:32:43Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 31,
"forks": 31,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-04-28T04:52:30Z",
"updated_at": "2020-05-05T06:17:29Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 662,
"watchers_count": 662,
"stargazers_count": 663,
"watchers_count": 663,
"forks_count": 55,
"forks": 55,
"watchers": 662,
"watchers": 663,
"score": 0
}
]

View file

@ -174,13 +174,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-04T23:23:42Z",
"updated_at": "2020-05-05T05:53:20Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 630,
"watchers_count": 630,
"stargazers_count": 631,
"watchers_count": 631,
"forks_count": 130,
"forks": 130,
"watchers": 630,
"watchers": 631,
"score": 0
}
]

View file

@ -178,8 +178,8 @@
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 325,
"watchers_count": 325,
"forks_count": 144,
"forks": 144,
"forks_count": 145,
"forks": 145,
"watchers": 325,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2019-12-06T08:46:31Z",
"updated_at": "2020-04-30T17:59:17Z",
"updated_at": "2020-05-05T08:25:27Z",
"pushed_at": "2019-12-06T09:18:56Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 21,
"forks": 21,
"watchers": 77,
"watchers": 78,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SQL Server Reporting Services(CVE-2020-0618)中的RCE",
"fork": false,
"created_at": "2020-02-15T06:40:23Z",
"updated_at": "2020-05-04T16:12:08Z",
"updated_at": "2020-05-05T05:56:11Z",
"pushed_at": "2020-02-15T06:41:54Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 32,
"forks": 32,
"watchers": 161,
"watchers": 163,
"score": 0
},
{

View file

@ -956,13 +956,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-05-05T03:04:18Z",
"updated_at": "2020-05-05T03:24:19Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 865,
"watchers_count": 865,
"stargazers_count": 866,
"watchers_count": 866,
"forks_count": 246,
"forks": 246,
"watchers": 865,
"watchers": 866,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-04T23:23:42Z",
"updated_at": "2020-05-05T05:53:20Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 630,
"watchers_count": 630,
"stargazers_count": 631,
"watchers_count": 631,
"forks_count": 130,
"forks": 130,
"watchers": 630,
"watchers": 631,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-04T08:01:37Z",
"updated_at": "2020-05-05T02:26:14Z",
"updated_at": "2020-05-05T08:56:39Z",
"pushed_at": "2020-05-04T08:11:21Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 10,
"forks": 10,
"watchers": 24,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 12,
"forks": 12,
"watchers": 31,
"score": 0
},
{
@ -82,12 +82,12 @@
"description": "CVE-2020-11651: Proof of Concept",
"fork": false,
"created_at": "2020-05-04T11:47:56Z",
"updated_at": "2020-05-05T03:07:36Z",
"pushed_at": "2020-05-05T03:07:34Z",
"updated_at": "2020-05-05T08:56:12Z",
"pushed_at": "2020-05-05T03:27:11Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"score": 0
},
@ -105,36 +105,36 @@
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
"fork": false,
"created_at": "2020-05-04T11:52:28Z",
"updated_at": "2020-05-05T01:15:56Z",
"updated_at": "2020-05-05T06:33:19Z",
"pushed_at": "2020-05-04T16:06:46Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"score": 0
},
{
"id": 261202396,
"id": 261203600,
"name": "SaltStack-Exp",
"full_name": "Imanfeng\/SaltStack-Exp",
"full_name": "thelostworldFree\/SaltStack-Exp",
"owner": {
"login": "Imanfeng",
"id": 24694387,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24694387?v=4",
"html_url": "https:\/\/github.com\/Imanfeng"
"login": "thelostworldFree",
"id": 24971604,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24971604?v=4",
"html_url": "https:\/\/github.com\/thelostworldFree"
},
"html_url": "https:\/\/github.com\/Imanfeng\/SaltStack-Exp",
"html_url": "https:\/\/github.com\/thelostworldFree\/SaltStack-Exp",
"description": "CVE-2020-11651&&CVE-2020-11652 EXP",
"fork": false,
"created_at": "2020-05-04T14:21:58Z",
"updated_at": "2020-05-04T19:33:34Z",
"pushed_at": "2020-05-04T14:23:13Z",
"stargazers_count": 4,
"watchers_count": 4,
"created_at": "2020-05-04T14:25:13Z",
"updated_at": "2020-05-05T03:18:21Z",
"pushed_at": "2020-05-05T06:31:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"watchers": 0,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE",
"fork": false,
"created_at": "2020-04-22T06:42:50Z",
"updated_at": "2020-05-01T22:41:24Z",
"updated_at": "2020-05-05T08:19:02Z",
"pushed_at": "2020-04-22T10:29:16Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 6,
"forks": 6,
"watchers": 49,
"watchers": 50,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-05-05T00:18:57Z",
"updated_at": "2020-05-05T04:26:14Z",
"pushed_at": "2020-04-27T15:17:46Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 20,
"forks": 20,
"watchers": 79,
"watchers": 81,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-04-27T11:25:51Z",
"updated_at": "2020-05-05T08:24:33Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 33,
"forks": 33,
"watchers": 99,
"watchers": 100,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-8597 pppd buffer overflow poc",
"fork": false,
"created_at": "2020-03-07T19:00:46Z",
"updated_at": "2020-04-28T10:29:59Z",
"updated_at": "2020-05-05T06:35:50Z",
"pushed_at": "2020-03-12T11:10:31Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 3,
"forks": 3,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

25
2020/CVE-2020-9332.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 261396094,
"name": "CVE-2020-9332",
"full_name": "Sentinel-One\/CVE-2020-9332",
"owner": {
"login": "Sentinel-One",
"id": 8438799,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8438799?v=4",
"html_url": "https:\/\/github.com\/Sentinel-One"
},
"html_url": "https:\/\/github.com\/Sentinel-One\/CVE-2020-9332",
"description": null,
"fork": false,
"created_at": "2020-05-05T08:06:05Z",
"updated_at": "2020-05-05T08:34:36Z",
"pushed_at": "2020-05-05T08:06:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-9361.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 261396252,
"name": "CVE-2020-9361",
"full_name": "Sentinel-One\/CVE-2020-9361",
"owner": {
"login": "Sentinel-One",
"id": 8438799,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8438799?v=4",
"html_url": "https:\/\/github.com\/Sentinel-One"
},
"html_url": "https:\/\/github.com\/Sentinel-One\/CVE-2020-9361",
"description": null,
"fork": false,
"created_at": "2020-05-05T08:06:58Z",
"updated_at": "2020-05-05T08:34:48Z",
"pushed_at": "2020-05-05T08:07:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -422,7 +422,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
- [dozernz/cve-2020-11651](https://github.com/dozernz/cve-2020-11651)
- [0xc0d/CVE-2020-11651](https://github.com/0xc0d/CVE-2020-11651)
- [jasperla/CVE-2020-11651-poc](https://github.com/jasperla/CVE-2020-11651-poc)
- [Imanfeng/SaltStack-Exp](https://github.com/Imanfeng/SaltStack-Exp)
- [thelostworldFree/SaltStack-Exp](https://github.com/thelostworldFree/SaltStack-Exp)
- [kevthehermit/CVE-2020-11651](https://github.com/kevthehermit/CVE-2020-11651)
### CVE-2020-11890
@ -852,6 +852,12 @@ Joplin through 1.0.184 allows Arbitrary File Read via XSS.
- [JavierOlmedo/CVE-2020-9038](https://github.com/JavierOlmedo/CVE-2020-9038)
### CVE-2020-9332
- [Sentinel-One/CVE-2020-9332](https://github.com/Sentinel-One/CVE-2020-9332)
### CVE-2020-9361
- [Sentinel-One/CVE-2020-9361](https://github.com/Sentinel-One/CVE-2020-9361)
### CVE-2020-9375
<code>