Auto Update 2020/10/14 00:09:17

This commit is contained in:
motikan2010-bot 2020-10-14 00:09:17 +09:00
parent 9eed7c91c6
commit 13a5d7618b
22 changed files with 117 additions and 93 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2020-09-29T21:07:22Z",
"updated_at": "2020-10-13T12:48:08Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 87,
"forks": 87,
"watchers": 271,
"watchers": 272,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC exploit for CVE-2016-4622",
"fork": false,
"created_at": "2016-10-09T15:22:06Z",
"updated_at": "2020-09-27T08:27:05Z",
"updated_at": "2020-10-13T12:04:41Z",
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 35,
"forks": 35,
"watchers": 82,
"watchers": 83,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2020-10-10T02:19:59Z",
"updated_at": "2020-10-13T11:18:56Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"forks_count": 282,
"forks": 282,
"watchers": 629,
"watchers": 630,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2020-10-12T09:51:52Z",
"updated_at": "2020-10-13T12:18:30Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 429,
"watchers_count": 429,
"stargazers_count": 430,
"watchers_count": 430,
"forks_count": 191,
"forks": 191,
"watchers": 429,
"watchers": 430,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Scan\/Exploit Blueborne CVE-2017-0785",
"fork": false,
"created_at": "2017-10-04T20:41:12Z",
"updated_at": "2020-09-30T09:13:12Z",
"updated_at": "2020-10-13T12:20:38Z",
"pushed_at": "2018-02-28T07:04:05Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 21,
"forks": 21,
"watchers": 29,
"watchers": 30,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2020-10-09T09:07:44Z",
"updated_at": "2020-10-13T09:42:39Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 474,
"watchers_count": 474,
"stargazers_count": 475,
"watchers_count": 475,
"forks_count": 199,
"forks": 199,
"watchers": 474,
"watchers": 475,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361",
"fork": false,
"created_at": "2017-10-17T17:08:22Z",
"updated_at": "2018-12-21T08:28:16Z",
"updated_at": "2020-10-13T11:26:22Z",
"pushed_at": "2017-10-23T19:39:21Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "fixed msf module for cve-2017-7269",
"fork": false,
"created_at": "2017-03-30T22:20:36Z",
"updated_at": "2020-09-12T15:36:50Z",
"updated_at": "2020-10-13T13:30:11Z",
"pushed_at": "2017-03-30T22:20:51Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 58,
"forks": 58,
"watchers": 107,
"watchers": 108,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-13T22:09:50Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 23,
"score": 0
}

View file

@ -335,13 +335,13 @@
"description": "CVE-2018-9995 هک دوربین مداربسته با آسیب پذیری ",
"fork": false,
"created_at": "2020-06-13T05:00:21Z",
"updated_at": "2020-08-16T13:34:16Z",
"updated_at": "2020-10-13T10:12:25Z",
"pushed_at": "2020-06-13T05:09:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-19T12:03:44Z",
"updated_at": "2020-10-13T07:25:20Z",
"updated_at": "2020-10-13T12:08:49Z",
"pushed_at": "2020-07-19T12:23:34Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 6,
"forks": 6,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-06-14T10:16:02Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 19,
"forks": 19,
"forks_count": 18,
"forks": 18,
"watchers": 23,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-10-13T07:13:49Z",
"updated_at": "2020-10-13T11:22:21Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1609,
"watchers_count": 1609,
"stargazers_count": 1608,
"watchers_count": 1608,
"forks_count": 235,
"forks": 235,
"watchers": 1609,
"watchers": 1608,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2020-10-12T11:44:50Z",
"updated_at": "2020-10-13T11:57:47Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 333,
"watchers_count": 333,
"forks_count": 132,
"forks": 132,
"watchers": 332,
"watchers": 333,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-10-06T02:27:03Z",
"updated_at": "2020-10-13T13:51:19Z",
"pushed_at": "2020-08-28T14:09:20Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 33,
"forks": 33,
"watchers": 87,
"watchers": 88,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-10T21:34:16Z",
"updated_at": "2020-09-25T15:34:04Z",
"updated_at": "2020-10-13T14:57:48Z",
"pushed_at": "2020-08-11T21:48:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 6,
"forks": 6,
"watchers": 15,
"watchers": 14,
"score": 0
},
{

View file

@ -201,8 +201,8 @@
"pushed_at": "2020-03-12T14:03:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.",
"fork": false,
"created_at": "2020-06-17T12:15:56Z",
"updated_at": "2020-10-10T13:49:58Z",
"updated_at": "2020-10-13T12:09:49Z",
"pushed_at": "2020-09-26T13:33:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-10-13T01:06:40Z",
"updated_at": "2020-10-13T10:04:09Z",
"pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 657,
"watchers_count": 657,
"stargazers_count": 658,
"watchers_count": 658,
"forks_count": 189,
"forks": 189,
"watchers": 657,
"watchers": 658,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-10-13T07:23:03Z",
"updated_at": "2020-10-13T11:07:08Z",
"pushed_at": "2020-09-17T18:06:57Z",
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 69,
"forks": 69,
"watchers": 183,
"stargazers_count": 184,
"watchers_count": 184,
"forks_count": 70,
"forks": 70,
"watchers": 184,
"score": 0
},
{
@ -335,13 +335,13 @@
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2020-10-12T09:56:31Z",
"updated_at": "2020-10-13T14:19:18Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 6,
"forks": 6,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -1,4 +1,27 @@
[
{
"id": 246425449,
"name": "CVE-2020-1947",
"full_name": "5l1v3r1\/CVE-2020-1947",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-1947",
"description": "CVE-2020-1947 poc",
"fork": false,
"created_at": "2020-03-10T22:55:43Z",
"updated_at": "2020-10-13T11:46:58Z",
"pushed_at": "2020-03-10T12:48:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 16,
"forks": 16,
"watchers": 0,
"score": 0
},
{
"id": 246463480,
"name": "CVE-2020-1947",

View file

@ -13,7 +13,7 @@
"description": "💣 CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false,
"created_at": "2020-01-17T05:35:01Z",
"updated_at": "2020-10-12T16:14:31Z",
"updated_at": "2020-10-13T11:04:34Z",
"pushed_at": "2020-01-22T04:58:59Z",
"stargazers_count": 74,
"watchers_count": 74,

View file

@ -59,13 +59,13 @@
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-05T06:19:09Z",
"updated_at": "2020-10-10T21:24:56Z",
"updated_at": "2020-10-13T11:11:46Z",
"pushed_at": "2020-07-07T07:19:16Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 19,
"forks": 19,
"watchers": 41,
"watchers": 42,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": "Python script to exploit F5 Big-IP CVE-2020-5902 ",
"fork": false,
"created_at": "2020-07-06T04:03:58Z",
"updated_at": "2020-10-10T21:25:03Z",
"updated_at": "2020-10-13T11:11:34Z",
"pushed_at": "2020-07-28T08:43:11Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 9,
"forks": 9,
"watchers": 35,
"watchers": 36,
"score": 0
},
{
@ -1002,13 +1002,13 @@
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
"fork": false,
"created_at": "2020-07-10T15:33:00Z",
"updated_at": "2020-10-10T21:25:12Z",
"updated_at": "2020-10-13T11:11:38Z",
"pushed_at": "2020-07-12T10:36:20Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"forks": 10,
"watchers": 41,
"watchers": 42,
"score": 0
},
{

View file

@ -594,6 +594,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
</code>
- [5l1v3r1/CVE-2020-1947](https://github.com/5l1v3r1/CVE-2020-1947)
- [jas502n/CVE-2020-1947](https://github.com/jas502n/CVE-2020-1947)
- [wsfengfan/CVE-2020-1947](https://github.com/wsfengfan/CVE-2020-1947)
- [shadowsock5/ShardingSphere_CVE-2020-1947](https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947)