Auto Update 2020/03/08 06:08:27

This commit is contained in:
motikan2010-bot 2020-03-08 06:08:27 +09:00
parent 8c8ee35bf7
commit 1179c52426
11 changed files with 109 additions and 28 deletions

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-10-26T17:54:54Z",
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 33,
"forks": 33,
"forks_count": 34,
"forks": 34,
"watchers": 87,
"score": 0
},
@ -86,8 +86,8 @@
"pushed_at": "2018-10-24T17:42:47Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 23,
"forks": 23,
"forks_count": 24,
"forks": 24,
"watchers": 59,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-3245-PoC",
"fork": false,
"created_at": "2018-10-24T06:49:33Z",
"updated_at": "2020-03-07T10:30:39Z",
"updated_at": "2020-03-07T18:10:16Z",
"pushed_at": "2018-10-27T01:41:18Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 58,
"forks": 58,
"watchers": 135,
"watchers": 136,
"score": 0
},
{

View file

@ -1623,13 +1623,13 @@
"description": "Porting BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2020-03-06T15:27:44Z",
"updated_at": "2020-03-07T17:07:06Z",
"pushed_at": "2019-07-20T04:48:43Z",
"stargazers_count": 319,
"watchers_count": 319,
"stargazers_count": 320,
"watchers_count": 320,
"forks_count": 116,
"forks": 116,
"watchers": 319,
"watchers": 320,
"score": 0
},
{

25
2019/CVE-2019-19905.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 245700108,
"name": "CVE-2019-19905",
"full_name": "dpmdpm2\/CVE-2019-19905",
"owner": {
"login": "dpmdpm2",
"id": 60997239,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/60997239?v=4",
"html_url": "https:\/\/github.com\/dpmdpm2"
},
"html_url": "https:\/\/github.com\/dpmdpm2\/CVE-2019-19905",
"description": null,
"fork": false,
"created_at": "2020-03-07T20:23:04Z",
"updated_at": "2020-03-07T20:27:08Z",
"pushed_at": "2020-03-07T20:27:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false,
"created_at": "2020-01-21T21:33:17Z",
"updated_at": "2020-03-07T13:22:08Z",
"updated_at": "2020-03-07T16:09:11Z",
"pushed_at": "2020-02-03T09:20:44Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 1,
"forks": 1,
"watchers": 21,
"watchers": 23,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-03-06T11:15:07Z",
"updated_at": "2020-03-07T16:59:37Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 26,
"forks": 26,
"watchers": 82,
"watchers": 83,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 31,
"forks": 31,
"forks_count": 32,
"forks": 32,
"watchers": 47,
"score": 0
},
@ -86,8 +86,8 @@
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 58,
"forks": 58,
"forks_count": 59,
"forks": 59,
"watchers": 139,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-03-07T09:19:14Z",
"updated_at": "2020-03-07T19:07:56Z",
"pushed_at": "2020-03-04T16:16:58Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 26,
"forks": 26,
"watchers": 118,
"watchers": 119,
"score": 0
}
]

View file

@ -67,5 +67,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 245688520,
"name": "CVE-2020-2555",
"full_name": "Y4er\/CVE-2020-2555",
"owner": {
"login": "Y4er",
"id": 40487319,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40487319?v=4",
"html_url": "https:\/\/github.com\/Y4er"
},
"html_url": "https:\/\/github.com\/Y4er\/CVE-2020-2555",
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-03-07T19:07:52Z",
"pushed_at": "2020-03-07T19:06:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 245688871,
"name": "CVE-2020-8597",
"full_name": "WinMin\/CVE-2020-8597",
"owner": {
"login": "WinMin",
"id": 18380453,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18380453?v=4",
"html_url": "https:\/\/github.com\/WinMin"
},
"html_url": "https:\/\/github.com\/WinMin\/CVE-2020-8597",
"description": "CVE-2020-8597 poc",
"fork": false,
"created_at": "2020-03-07T19:00:46Z",
"updated_at": "2020-03-07T19:18:09Z",
"pushed_at": "2020-03-07T19:07:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -195,6 +195,7 @@ Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (compo
- [Hu3sky/CVE-2020-2555](https://github.com/Hu3sky/CVE-2020-2555)
- [wsfengfan/CVE-2020-2555](https://github.com/wsfengfan/CVE-2020-2555)
- [0nise/CVE-2020-2555](https://github.com/0nise/CVE-2020-2555)
- [Y4er/CVE-2020-2555](https://github.com/Y4er/CVE-2020-2555)
### CVE-2020-2655
@ -333,6 +334,7 @@ eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the
- [marcinguy/CVE-2020-8597](https://github.com/marcinguy/CVE-2020-8597)
- [mentalburden/MrsEAPers](https://github.com/mentalburden/MrsEAPers)
- [WinMin/CVE-2020-8597](https://github.com/WinMin/CVE-2020-8597)
### CVE-2020-8809
@ -2501,6 +2503,14 @@ In onSetSampleX of SkSwizzler.cpp, there is a possible out of bounds write due t
### CVE-2019-19871
- [VDISEC/CVE-2019-19871-AuditGuide](https://github.com/VDISEC/CVE-2019-19871-AuditGuide)
### CVE-2019-19905
<code>
NetHack 3.6.x before 3.6.4 is prone to a buffer overflow vulnerability when reading very long lines from configuration files. This affects systems that have NetHack installed suid/sgid, and shared systems that allow users to upload their own configuration files.
</code>
- [dpmdpm2/CVE-2019-19905](https://github.com/dpmdpm2/CVE-2019-19905)
### CVE-2019-19943
<code>