Auto Update 2020/12/22 06:09:38

This commit is contained in:
motikan2010-bot 2020-12-22 06:09:38 +09:00
parent b710b11bbb
commit 26c639c15a
22 changed files with 187 additions and 82 deletions

View file

@ -90,5 +90,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 323381650,
"name": "CVE-2003-0264",
"full_name": "PepeTheRital\/CVE-2003-0264",
"owner": {
"login": "PepeTheRital",
"id": 65770864,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/65770864?v=4",
"html_url": "https:\/\/github.com\/PepeTheRital"
},
"html_url": "https:\/\/github.com\/PepeTheRital\/CVE-2003-0264",
"description": "Exploit CVE-2003-0264 ",
"fork": false,
"created_at": "2020-12-21T15:52:32Z",
"updated_at": "2020-12-21T15:58:48Z",
"pushed_at": "2020-12-21T15:58:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false,
"created_at": "2017-10-09T15:13:25Z",
"updated_at": "2020-12-20T20:39:57Z",
"updated_at": "2020-12-21T16:51:53Z",
"pushed_at": "2017-10-09T15:20:11Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 34,
"forks": 34,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2020-12-21T04:25:52Z",
"updated_at": "2020-12-21T15:15:05Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 33,
"forks": 33,
"watchers": 105,
"watchers": 106,
"score": 0
}
]

View file

@ -316,8 +316,8 @@
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 380,
"watchers_count": 380,
"forks_count": 136,
"forks": 136,
"forks_count": 137,
"forks": 137,
"watchers": 380,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2020-12-21T12:56:55Z",
"updated_at": "2020-12-21T18:50:46Z",
"pushed_at": "2020-12-21T12:56:53Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 33,
"forks": 33,
"watchers": 91,
"watchers": 90,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2020-09-30T09:10:48Z",
"updated_at": "2020-12-21T18:12:47Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 236,
"watchers_count": 236,
"forks_count": 76,
"forks": 76,
"watchers": 236,
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 77,
"forks": 77,
"watchers": 237,
"score": 0
},
{

View file

@ -136,5 +136,28 @@
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 323443725,
"name": "Larascript",
"full_name": "PwnedShell\/Larascript",
"owner": {
"login": "PwnedShell",
"id": 55540142,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/55540142?v=4",
"html_url": "https:\/\/github.com\/PwnedShell"
},
"html_url": "https:\/\/github.com\/PwnedShell\/Larascript",
"description": "Laravel exploit CVE-2018-15133",
"fork": false,
"created_at": "2020-12-21T20:44:29Z",
"updated_at": "2020-12-21T20:45:11Z",
"pushed_at": "2020-12-21T20:44:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-08-18T00:00:15Z",
"stargazers_count": 426,
"watchers_count": 426,
"forks_count": 140,
"forks": 140,
"forks_count": 141,
"forks": 141,
"watchers": 426,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Crash macOS and iOS devices with one packet",
"fork": false,
"created_at": "2018-11-01T17:03:25Z",
"updated_at": "2020-04-06T10:58:21Z",
"updated_at": "2020-12-21T17:36:52Z",
"pushed_at": "2018-11-15T21:13:37Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 18,
"forks": 18,
"watchers": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 19,
"forks": 19,
"watchers": 50,
"score": 0
},
{

View file

@ -1489,8 +1489,8 @@
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1049,
"watchers_count": 1049,
"forks_count": 352,
"forks": 352,
"forks_count": 353,
"forks": 353,
"watchers": 1049,
"score": 0
},

View file

@ -1,20 +1,20 @@
[
{
"id": 221713137,
"name": "CVE-2019-17234-Wordpress-DirStroyer",
"full_name": "administra1tor\/CVE-2019-17234-Wordpress-DirStroyer",
"name": "CVE-2019-17234b-Exploit",
"full_name": "administra1tor\/CVE-2019-17234b-Exploit",
"owner": {
"login": "administra1tor",
"id": 57760715,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/57760715?v=4",
"html_url": "https:\/\/github.com\/administra1tor"
},
"html_url": "https:\/\/github.com\/administra1tor\/CVE-2019-17234-Wordpress-DirStroyer",
"html_url": "https:\/\/github.com\/administra1tor\/CVE-2019-17234b-Exploit",
"description": "Wordpress IgniteUp plugin < 3.4.1 allows unauthenticated users to arbitrarily delete files on the webserver possibly causing DoS.",
"fork": false,
"created_at": "2019-11-14T14:12:36Z",
"updated_at": "2019-11-14T17:32:35Z",
"pushed_at": "2019-11-14T17:32:33Z",
"updated_at": "2020-12-21T16:31:31Z",
"pushed_at": "2020-12-21T16:31:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2020-12-02T21:00:03Z",
"updated_at": "2020-12-21T18:13:03Z",
"pushed_at": "2020-06-04T13:17:10Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 26,
"forks": 26,
"watchers": 76,
"watchers": 78,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2020-12-21T04:25:52Z",
"updated_at": "2020-12-21T15:15:05Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 33,
"forks": 33,
"watchers": 105,
"watchers": 106,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2020-12-21T04:59:08Z",
"updated_at": "2020-12-21T15:14:48Z",
"pushed_at": "2020-10-16T17:44:13Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 48,
"forks": 48,
"watchers": 174,
"watchers": 175,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
"fork": false,
"created_at": "2020-02-28T16:04:30Z",
"updated_at": "2020-12-15T08:00:57Z",
"updated_at": "2020-12-21T15:34:26Z",
"pushed_at": "2020-10-07T08:10:46Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 10,
"forks": 10,
"watchers": 29,
"watchers": 30,
"score": 0
},
{
@ -358,13 +358,13 @@
"description": "CVE-2020-0688 PoC",
"fork": false,
"created_at": "2020-10-23T01:18:13Z",
"updated_at": "2020-12-03T18:22:45Z",
"updated_at": "2020-12-21T20:27:18Z",
"pushed_at": "2020-10-26T03:35:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -933,13 +933,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-12-09T23:26:05Z",
"updated_at": "2020-12-21T19:18:30Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 82,
"forks": 82,
"watchers": 208,
"stargazers_count": 209,
"watchers_count": 209,
"forks_count": 83,
"forks": 83,
"watchers": 209,
"score": 0
},
{
@ -1140,13 +1140,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-12-18T09:01:29Z",
"updated_at": "2020-12-21T19:15:42Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 341,
"watchers_count": 341,
"forks_count": 114,
"forks": 114,
"watchers": 341,
"stargazers_count": 342,
"watchers_count": 342,
"forks_count": 115,
"forks": 115,
"watchers": 342,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
"fork": false,
"created_at": "2020-04-05T15:52:43Z",
"updated_at": "2020-12-14T13:48:05Z",
"updated_at": "2020-12-21T19:17:42Z",
"pushed_at": "2020-06-09T20:41:32Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 40,
"forks": 40,
"watchers": 126,
"watchers": 127,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-12-21T10:49:08Z",
"updated_at": "2020-12-21T17:36:55Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 249,
"watchers_count": 249,
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 88,
"forks": 88,
"watchers": 249,
"watchers": 250,
"score": 0
},
{

View file

@ -83,7 +83,7 @@
"fork": false,
"created_at": "2020-07-14T02:42:41Z",
"updated_at": "2020-12-08T09:52:23Z",
"pushed_at": "2020-12-02T18:46:16Z",
"pushed_at": "2020-12-21T17:05:44Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-12-14T19:39:42Z",
"updated_at": "2020-12-21T13:46:36Z",
"updated_at": "2020-12-21T19:51:30Z",
"pushed_at": "2020-12-20T17:29:07Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"watchers": 10,
"score": 0
}
]

25
2020/CVE-2020-29156.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 323442733,
"name": "CVE-2020-29156",
"full_name": "Ko-kn3t\/CVE-2020-29156",
"owner": {
"login": "Ko-kn3t",
"id": 57166441,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57166441?v=4",
"html_url": "https:\/\/github.com\/Ko-kn3t"
},
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-29156",
"description": "woocommerce wordpress plugin - Affected Version: V 4.5.2 [CVE-2020-29156]",
"fork": false,
"created_at": "2020-12-21T20:38:50Z",
"updated_at": "2020-12-21T20:48:23Z",
"pushed_at": "2020-12-21T20:48:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 322992127,
"name": "k8s-cve-2020-8554-mitigations",
"full_name": "twistlock\/k8s-cve-2020-8554-mitigations",
"owner": {
"login": "twistlock",
"id": 12218272,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12218272?v=4",
"html_url": "https:\/\/github.com\/twistlock"
},
"html_url": "https:\/\/github.com\/twistlock\/k8s-cve-2020-8554-mitigations",
"description": "Prisma Cloud Compute Admission rules to mitigate Kubernetes CVE-2020-8554",
"fork": false,
"created_at": "2020-12-20T04:22:43Z",
"updated_at": "2020-12-21T19:50:24Z",
"pushed_at": "2020-12-20T20:34:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1354,6 +1354,7 @@ DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.
### CVE-2020-8554
- [rancher/externalip-webhook](https://github.com/rancher/externalip-webhook)
- [jrmurray000/CVE-2020-8554](https://github.com/jrmurray000/CVE-2020-8554)
- [twistlock/k8s-cve-2020-8554-mitigations](https://github.com/twistlock/k8s-cve-2020-8554-mitigations)
### CVE-2020-8558 (2020-07-27)
@ -3066,7 +3067,12 @@ The Telnet service of Rubetek cameras RV-3406, RV-3409, and RV-3411 cameras (fir
- [t0gu/CVE-2020-25790](https://github.com/t0gu/CVE-2020-25790)
- [7Mitu/CVE-2020-25790](https://github.com/7Mitu/CVE-2020-25790)
### CVE-2020-25860
### CVE-2020-25860 (2020-12-21)
<code>
The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.
</code>
- [rauc/rauc-1.5-integration](https://github.com/rauc/rauc-1.5-integration)
### CVE-2020-25867 (2020-10-07)
@ -3303,6 +3309,9 @@ osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the
- [aslanemre/cve-2020-29070](https://github.com/aslanemre/cve-2020-29070)
### CVE-2020-29156
- [Ko-kn3t/CVE-2020-29156](https://github.com/Ko-kn3t/CVE-2020-29156)
### CVE-2020-29254 (2020-12-11)
<code>
@ -6391,7 +6400,7 @@ PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrate
includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress allows unauthenticated arbitrary file deletion.
</code>
- [administra1tor/CVE-2019-17234-Wordpress-DirStroyer](https://github.com/administra1tor/CVE-2019-17234-Wordpress-DirStroyer)
- [administra1tor/CVE-2019-17234b-Exploit](https://github.com/administra1tor/CVE-2019-17234b-Exploit)
### CVE-2019-17240 (2019-10-06)
@ -9155,6 +9164,7 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut
- [iansangaji/laravel-rce-cve-2018-15133](https://github.com/iansangaji/laravel-rce-cve-2018-15133)
- [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133)
- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133)
- [PwnedShell/Larascript](https://github.com/PwnedShell/Larascript)
### CVE-2018-15365 (2018-09-28)
@ -16636,6 +16646,7 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
- [PepeTheRital/CVE-2003-0264](https://github.com/PepeTheRital/CVE-2003-0264)
### CVE-2003-0282 (2003-05-14)