Auto Update 2020/10/14 00:09:17

This commit is contained in:
motikan2010-bot 2020-10-14 00:09:17 +09:00
parent 9eed7c91c6
commit 13a5d7618b
22 changed files with 117 additions and 93 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false, "fork": false,
"created_at": "2013-09-22T21:20:31Z", "created_at": "2013-09-22T21:20:31Z",
"updated_at": "2020-09-29T21:07:22Z", "updated_at": "2020-10-13T12:48:08Z",
"pushed_at": "2017-04-24T14:16:56Z", "pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 271, "stargazers_count": 272,
"watchers_count": 271, "watchers_count": 272,
"forks_count": 87, "forks_count": 87,
"forks": 87, "forks": 87,
"watchers": 271, "watchers": 272,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "PoC exploit for CVE-2016-4622", "description": "PoC exploit for CVE-2016-4622",
"fork": false, "fork": false,
"created_at": "2016-10-09T15:22:06Z", "created_at": "2016-10-09T15:22:06Z",
"updated_at": "2020-09-27T08:27:05Z", "updated_at": "2020-10-13T12:04:41Z",
"pushed_at": "2016-10-27T20:23:15Z", "pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 82, "stargazers_count": 83,
"watchers_count": 82, "watchers_count": 83,
"forks_count": 35, "forks_count": 35,
"forks": 35, "forks": 35,
"watchers": 82, "watchers": 83,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false, "fork": false,
"created_at": "2017-04-17T08:10:07Z", "created_at": "2017-04-17T08:10:07Z",
"updated_at": "2020-10-10T02:19:59Z", "updated_at": "2020-10-13T11:18:56Z",
"pushed_at": "2017-11-19T11:01:16Z", "pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 629, "stargazers_count": 630,
"watchers_count": 629, "watchers_count": 630,
"forks_count": 282, "forks_count": 282,
"forks": 282, "forks": 282,
"watchers": 629, "watchers": 630,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability", "description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false, "fork": false,
"created_at": "2017-09-20T23:32:29Z", "created_at": "2017-09-20T23:32:29Z",
"updated_at": "2020-10-12T09:51:52Z", "updated_at": "2020-10-13T12:18:30Z",
"pushed_at": "2017-09-23T05:11:45Z", "pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 429, "stargazers_count": 430,
"watchers_count": 429, "watchers_count": 430,
"forks_count": 191, "forks_count": 191,
"forks": 191, "forks": 191,
"watchers": 429, "watchers": 430,
"score": 0 "score": 0
}, },
{ {
@ -105,13 +105,13 @@
"description": "Scan\/Exploit Blueborne CVE-2017-0785", "description": "Scan\/Exploit Blueborne CVE-2017-0785",
"fork": false, "fork": false,
"created_at": "2017-10-04T20:41:12Z", "created_at": "2017-10-04T20:41:12Z",
"updated_at": "2020-09-30T09:13:12Z", "updated_at": "2020-10-13T12:20:38Z",
"pushed_at": "2018-02-28T07:04:05Z", "pushed_at": "2018-02-28T07:04:05Z",
"stargazers_count": 29, "stargazers_count": 30,
"watchers_count": 29, "watchers_count": 30,
"forks_count": 21, "forks_count": 21,
"forks": 21, "forks": 21,
"watchers": 29, "watchers": 30,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882", "description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false, "fork": false,
"created_at": "2017-11-20T16:35:30Z", "created_at": "2017-11-20T16:35:30Z",
"updated_at": "2020-10-09T09:07:44Z", "updated_at": "2020-10-13T09:42:39Z",
"pushed_at": "2017-11-29T16:13:23Z", "pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 474, "stargazers_count": 475,
"watchers_count": 474, "watchers_count": 475,
"forks_count": 199, "forks_count": 199,
"forks": 199, "forks": 199,
"watchers": 474, "watchers": 475,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361", "description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361",
"fork": false, "fork": false,
"created_at": "2017-10-17T17:08:22Z", "created_at": "2017-10-17T17:08:22Z",
"updated_at": "2018-12-21T08:28:16Z", "updated_at": "2020-10-13T11:26:22Z",
"pushed_at": "2017-10-23T19:39:21Z", "pushed_at": "2017-10-23T19:39:21Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"forks_count": 5, "forks_count": 5,
"forks": 5, "forks": 5,
"watchers": 9, "watchers": 10,
"score": 0 "score": 0
}, },
{ {

View file

@ -128,13 +128,13 @@
"description": "fixed msf module for cve-2017-7269", "description": "fixed msf module for cve-2017-7269",
"fork": false, "fork": false,
"created_at": "2017-03-30T22:20:36Z", "created_at": "2017-03-30T22:20:36Z",
"updated_at": "2020-09-12T15:36:50Z", "updated_at": "2020-10-13T13:30:11Z",
"pushed_at": "2017-03-30T22:20:51Z", "pushed_at": "2017-03-30T22:20:51Z",
"stargazers_count": 107, "stargazers_count": 108,
"watchers_count": 107, "watchers_count": 108,
"forks_count": 58, "forks_count": 58,
"forks": 58, "forks": 58,
"watchers": 107, "watchers": 108,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-13T22:09:50Z", "pushed_at": "2020-04-13T22:09:50Z",
"stargazers_count": 23, "stargazers_count": 23,
"watchers_count": 23, "watchers_count": 23,
"forks_count": 9, "forks_count": 10,
"forks": 9, "forks": 10,
"watchers": 23, "watchers": 23,
"score": 0 "score": 0
} }

View file

@ -335,13 +335,13 @@
"description": "CVE-2018-9995 هک دوربین مداربسته با آسیب پذیری ", "description": "CVE-2018-9995 هک دوربین مداربسته با آسیب پذیری ",
"fork": false, "fork": false,
"created_at": "2020-06-13T05:00:21Z", "created_at": "2020-06-13T05:00:21Z",
"updated_at": "2020-08-16T13:34:16Z", "updated_at": "2020-10-13T10:12:25Z",
"pushed_at": "2020-06-13T05:09:08Z", "pushed_at": "2020-06-13T05:09:08Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-07-19T12:03:44Z", "created_at": "2020-07-19T12:03:44Z",
"updated_at": "2020-10-13T07:25:20Z", "updated_at": "2020-10-13T12:08:49Z",
"pushed_at": "2020-07-19T12:23:34Z", "pushed_at": "2020-07-19T12:23:34Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 6, "forks_count": 6,
"forks": 6, "forks": 6,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
} }
] ]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-06-14T10:16:02Z", "pushed_at": "2019-06-14T10:16:02Z",
"stargazers_count": 23, "stargazers_count": 23,
"watchers_count": 23, "watchers_count": 23,
"forks_count": 19, "forks_count": 18,
"forks": 19, "forks": 18,
"watchers": 23, "watchers": 23,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043", "description": "Exploit for CVE-2019-11043",
"fork": false, "fork": false,
"created_at": "2019-09-23T21:37:27Z", "created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-10-13T07:13:49Z", "updated_at": "2020-10-13T11:22:21Z",
"pushed_at": "2019-11-12T18:53:14Z", "pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1609, "stargazers_count": 1608,
"watchers_count": 1609, "watchers_count": 1608,
"forks_count": 235, "forks_count": 235,
"forks": 235, "forks": 235,
"watchers": 1609, "watchers": 1608,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)", "description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false, "fork": false,
"created_at": "2019-08-21T08:40:26Z", "created_at": "2019-08-21T08:40:26Z",
"updated_at": "2020-10-12T11:44:50Z", "updated_at": "2020-10-13T11:57:47Z",
"pushed_at": "2020-01-11T13:55:33Z", "pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 332, "stargazers_count": 333,
"watchers_count": 332, "watchers_count": 333,
"forks_count": 132, "forks_count": 132,
"forks": 132, "forks": 132,
"watchers": 332, "watchers": 333,
"score": 0 "score": 0
}, },
{ {

View file

@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false, "fork": false,
"created_at": "2020-01-11T09:49:17Z", "created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-10-06T02:27:03Z", "updated_at": "2020-10-13T13:51:19Z",
"pushed_at": "2020-08-28T14:09:20Z", "pushed_at": "2020-08-28T14:09:20Z",
"stargazers_count": 87, "stargazers_count": 88,
"watchers_count": 87, "watchers_count": 88,
"forks_count": 33, "forks_count": 33,
"forks": 33, "forks": 33,
"watchers": 87, "watchers": 88,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-08-10T21:34:16Z", "created_at": "2020-08-10T21:34:16Z",
"updated_at": "2020-09-25T15:34:04Z", "updated_at": "2020-10-13T14:57:48Z",
"pushed_at": "2020-08-11T21:48:12Z", "pushed_at": "2020-08-11T21:48:12Z",
"stargazers_count": 15, "stargazers_count": 14,
"watchers_count": 15, "watchers_count": 14,
"forks_count": 6, "forks_count": 6,
"forks": 6, "forks": 6,
"watchers": 15, "watchers": 14,
"score": 0 "score": 0
}, },
{ {

View file

@ -201,8 +201,8 @@
"pushed_at": "2020-03-12T14:03:29Z", "pushed_at": "2020-03-12T14:03:29Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 1, "forks_count": 2,
"forks": 1, "forks": 2,
"watchers": 1, "watchers": 1,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.", "description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.",
"fork": false, "fork": false,
"created_at": "2020-06-17T12:15:56Z", "created_at": "2020-06-17T12:15:56Z",
"updated_at": "2020-10-10T13:49:58Z", "updated_at": "2020-10-13T12:09:49Z",
"pushed_at": "2020-09-26T13:33:27Z", "pushed_at": "2020-09-26T13:33:27Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
} }
] ]

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:56:51Z", "created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-10-13T01:06:40Z", "updated_at": "2020-10-13T10:04:09Z",
"pushed_at": "2020-09-25T15:32:01Z", "pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 657, "stargazers_count": 658,
"watchers_count": 657, "watchers_count": 658,
"forks_count": 189, "forks_count": 189,
"forks": 189, "forks": 189,
"watchers": 657, "watchers": 658,
"score": 0 "score": 0
}, },
{ {
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-10-13T07:23:03Z", "updated_at": "2020-10-13T11:07:08Z",
"pushed_at": "2020-09-17T18:06:57Z", "pushed_at": "2020-09-17T18:06:57Z",
"stargazers_count": 183, "stargazers_count": 184,
"watchers_count": 183, "watchers_count": 184,
"forks_count": 69, "forks_count": 70,
"forks": 69, "forks": 70,
"watchers": 183, "watchers": 184,
"score": 0 "score": 0
}, },
{ {
@ -335,13 +335,13 @@
"description": "cve-2020-1472 复现利用及其exp", "description": "cve-2020-1472 复现利用及其exp",
"fork": false, "fork": false,
"created_at": "2020-09-16T03:40:47Z", "created_at": "2020-09-16T03:40:47Z",
"updated_at": "2020-10-12T09:56:31Z", "updated_at": "2020-10-13T14:19:18Z",
"pushed_at": "2020-09-16T15:03:32Z", "pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 32, "stargazers_count": 33,
"watchers_count": 32, "watchers_count": 33,
"forks_count": 6, "forks_count": 6,
"forks": 6, "forks": 6,
"watchers": 32, "watchers": 33,
"score": 0 "score": 0
}, },
{ {

View file

@ -1,4 +1,27 @@
[ [
{
"id": 246425449,
"name": "CVE-2020-1947",
"full_name": "5l1v3r1\/CVE-2020-1947",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-1947",
"description": "CVE-2020-1947 poc",
"fork": false,
"created_at": "2020-03-10T22:55:43Z",
"updated_at": "2020-10-13T11:46:58Z",
"pushed_at": "2020-03-10T12:48:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 16,
"forks": 16,
"watchers": 0,
"score": 0
},
{ {
"id": 246463480, "id": 246463480,
"name": "CVE-2020-1947", "name": "CVE-2020-1947",

View file

@ -13,7 +13,7 @@
"description": "💣 CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC", "description": "💣 CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false, "fork": false,
"created_at": "2020-01-17T05:35:01Z", "created_at": "2020-01-17T05:35:01Z",
"updated_at": "2020-10-12T16:14:31Z", "updated_at": "2020-10-13T11:04:34Z",
"pushed_at": "2020-01-22T04:58:59Z", "pushed_at": "2020-01-22T04:58:59Z",
"stargazers_count": 74, "stargazers_count": 74,
"watchers_count": 74, "watchers_count": 74,

View file

@ -59,13 +59,13 @@
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.", "description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false, "fork": false,
"created_at": "2020-07-05T06:19:09Z", "created_at": "2020-07-05T06:19:09Z",
"updated_at": "2020-10-10T21:24:56Z", "updated_at": "2020-10-13T11:11:46Z",
"pushed_at": "2020-07-07T07:19:16Z", "pushed_at": "2020-07-07T07:19:16Z",
"stargazers_count": 41, "stargazers_count": 42,
"watchers_count": 41, "watchers_count": 42,
"forks_count": 19, "forks_count": 19,
"forks": 19, "forks": 19,
"watchers": 41, "watchers": 42,
"score": 0 "score": 0
}, },
{ {
@ -289,13 +289,13 @@
"description": "Python script to exploit F5 Big-IP CVE-2020-5902 ", "description": "Python script to exploit F5 Big-IP CVE-2020-5902 ",
"fork": false, "fork": false,
"created_at": "2020-07-06T04:03:58Z", "created_at": "2020-07-06T04:03:58Z",
"updated_at": "2020-10-10T21:25:03Z", "updated_at": "2020-10-13T11:11:34Z",
"pushed_at": "2020-07-28T08:43:11Z", "pushed_at": "2020-07-28T08:43:11Z",
"stargazers_count": 35, "stargazers_count": 36,
"watchers_count": 35, "watchers_count": 36,
"forks_count": 9, "forks_count": 9,
"forks": 9, "forks": 9,
"watchers": 35, "watchers": 36,
"score": 0 "score": 0
}, },
{ {
@ -1002,13 +1002,13 @@
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool", "description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
"fork": false, "fork": false,
"created_at": "2020-07-10T15:33:00Z", "created_at": "2020-07-10T15:33:00Z",
"updated_at": "2020-10-10T21:25:12Z", "updated_at": "2020-10-13T11:11:38Z",
"pushed_at": "2020-07-12T10:36:20Z", "pushed_at": "2020-07-12T10:36:20Z",
"stargazers_count": 41, "stargazers_count": 42,
"watchers_count": 41, "watchers_count": 42,
"forks_count": 10, "forks_count": 10,
"forks": 10, "forks": 10,
"watchers": 41, "watchers": 42,
"score": 0 "score": 0
}, },
{ {

View file

@ -594,6 +594,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE. In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
</code> </code>
- [5l1v3r1/CVE-2020-1947](https://github.com/5l1v3r1/CVE-2020-1947)
- [jas502n/CVE-2020-1947](https://github.com/jas502n/CVE-2020-1947) - [jas502n/CVE-2020-1947](https://github.com/jas502n/CVE-2020-1947)
- [wsfengfan/CVE-2020-1947](https://github.com/wsfengfan/CVE-2020-1947) - [wsfengfan/CVE-2020-1947](https://github.com/wsfengfan/CVE-2020-1947)
- [shadowsock5/ShardingSphere_CVE-2020-1947](https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947) - [shadowsock5/ShardingSphere_CVE-2020-1947](https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947)