Auto Update 2020/11/06 00:09:18

This commit is contained in:
motikan2010-bot 2020-11-06 00:09:18 +09:00
parent d4a26fe13a
commit 2a10f624ab
34 changed files with 248 additions and 125 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T15:42:42Z",
"updated_at": "2020-11-05T09:28:18Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 747,
"watchers_count": 747,
"forks_count": 182,
"forks": 182,
"watchers": 745,
"watchers": 747,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T15:42:42Z",
"updated_at": "2020-11-05T09:28:18Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 747,
"watchers_count": 747,
"forks_count": 182,
"forks": 182,
"watchers": 745,
"watchers": 747,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Local privilege escalation through macOS 10.12.1 via CVE-2016-1825 or CVE-2016-7617.",
"fork": false,
"created_at": "2016-12-25T05:07:22Z",
"updated_at": "2020-10-21T22:14:55Z",
"updated_at": "2020-11-05T10:40:06Z",
"pushed_at": "2017-01-16T18:13:15Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 12,
"forks": 12,
"watchers": 59,
"watchers": 58,
"score": 0
}
]

View file

@ -404,13 +404,13 @@
"description": "Android APK Based On Public Information Using DirtyCOW CVE-2016-5195 Exploit",
"fork": false,
"created_at": "2017-01-16T10:41:26Z",
"updated_at": "2020-01-27T21:16:48Z",
"updated_at": "2020-11-05T09:34:40Z",
"pushed_at": "2017-01-19T09:02:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-11-02T16:53:59Z",
"updated_at": "2020-11-05T14:38:46Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 477,
"watchers_count": 477,
"stargazers_count": 478,
"watchers_count": 478,
"forks_count": 244,
"forks": 244,
"watchers": 477,
"watchers": 478,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T15:42:42Z",
"updated_at": "2020-11-05T09:28:18Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 747,
"watchers_count": 747,
"forks_count": 182,
"forks": 182,
"watchers": 745,
"watchers": 747,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-07-10T18:19:59Z",
"updated_at": "2020-01-11T17:14:19Z",
"updated_at": "2020-11-05T10:54:13Z",
"pushed_at": "2019-07-15T13:39:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T15:42:42Z",
"updated_at": "2020-11-05T09:28:18Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 747,
"watchers_count": 747,
"forks_count": 182,
"forks": 182,
"watchers": 745,
"watchers": 747,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 55,
"forks": 55,
"forks_count": 56,
"forks": 56,
"watchers": 199,
"score": 0
}

View file

@ -933,13 +933,13 @@
"description": "CVE-2019-0708 远程代码执行漏洞批量检测",
"fork": false,
"created_at": "2019-05-21T05:38:54Z",
"updated_at": "2020-08-18T10:01:04Z",
"updated_at": "2020-11-05T09:47:37Z",
"pushed_at": "2019-05-30T02:43:06Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 27,
"forks": 27,
"watchers": 74,
"watchers": 75,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-11-03T15:12:59Z",
"updated_at": "2020-11-05T14:52:39Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1610,
"watchers_count": 1610,
"stargazers_count": 1611,
"watchers_count": 1611,
"forks_count": 236,
"forks": 236,
"watchers": 1610,
"watchers": 1611,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "php-fpm+Nginx RCE",
"fork": false,
"created_at": "2019-10-23T23:26:57Z",
"updated_at": "2020-10-25T16:42:35Z",
"updated_at": "2020-11-05T10:08:03Z",
"pushed_at": "2020-08-20T04:43:25Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 34,
"forks": 34,
"watchers": 81,
"watchers": 80,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2020-10-21T22:17:16Z",
"updated_at": "2020-11-05T12:18:59Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 578,
"watchers_count": 578,
"stargazers_count": 579,
"watchers_count": 579,
"forks_count": 79,
"forks": 79,
"watchers": 578,
"watchers": 579,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Interactive-Like Command-Line Console for CVE-2019-16759",
"fork": false,
"created_at": "2019-10-12T18:51:16Z",
"updated_at": "2020-04-16T18:56:32Z",
"updated_at": "2020-11-05T14:03:56Z",
"pushed_at": "2019-10-12T18:56:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-05T08:40:04Z",
"updated_at": "2020-11-05T14:42:10Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 2006,
"watchers_count": 2006,
"stargazers_count": 2009,
"watchers_count": 2009,
"forks_count": 526,
"forks": 526,
"watchers": 2006,
"watchers": 2009,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-10-16T17:44:13Z",
"stargazers_count": 162,
"watchers_count": 162,
"forks_count": 44,
"forks": 44,
"forks_count": 45,
"forks": 45,
"watchers": 162,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T15:42:42Z",
"updated_at": "2020-11-05T09:28:18Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 747,
"watchers_count": 747,
"forks_count": 182,
"forks": 182,
"watchers": 745,
"watchers": 747,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2020-03-24T13:10:39Z",
"updated_at": "2020-10-21T22:17:33Z",
"updated_at": "2020-11-05T11:11:15Z",
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 19,
"forks": 19,
"watchers": 72,
"watchers": 73,
"score": 0
}
]

View file

@ -1094,13 +1094,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-11-02T20:56:31Z",
"updated_at": "2020-11-05T13:35:12Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 331,
"watchers_count": 331,
"stargazers_count": 332,
"watchers_count": 332,
"forks_count": 108,
"forks": 108,
"watchers": 331,
"watchers": 332,
"score": 0
},
{

25
2020/CVE-2020-11547.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 250392759,
"name": "CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure",
"full_name": "ch-rigu\/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure",
"owner": {
"login": "ch-rigu",
"id": 40671439,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40671439?v=4",
"html_url": "https:\/\/github.com\/ch-rigu"
},
"html_url": "https:\/\/github.com\/ch-rigu\/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure",
"description": null,
"fork": false,
"created_at": "2020-03-26T23:14:55Z",
"updated_at": "2020-11-05T11:40:08Z",
"pushed_at": "2020-10-20T21:00:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
"fork": false,
"created_at": "2020-11-02T14:48:55Z",
"updated_at": "2020-11-05T08:17:40Z",
"updated_at": "2020-11-05T13:36:19Z",
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 3,
"forks": 3,
"watchers": 64,
"watchers": 67,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
"fork": false,
"created_at": "2020-07-20T03:27:24Z",
"updated_at": "2020-09-22T02:36:37Z",
"updated_at": "2020-11-05T14:33:45Z",
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 12,
"forks": 12,
"watchers": 74,
"watchers": 75,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-11-04T09:29:58Z",
"updated_at": "2020-11-05T13:36:56Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 687,
"watchers_count": 687,
"stargazers_count": 689,
"watchers_count": 689,
"forks_count": 199,
"forks": 199,
"watchers": 687,
"watchers": 689,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-11-05T09:03:17Z",
"updated_at": "2020-11-05T13:06:19Z",
"pushed_at": "2020-11-04T02:26:59Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 25,
"forks": 25,
"watchers": 126,
"watchers": 134,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "CVE-2020-14882_ALL综合利用工具支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
"updated_at": "2020-11-05T07:01:23Z",
"updated_at": "2020-11-05T09:44:20Z",
"pushed_at": "2020-11-05T03:29:09Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 5,
"forks": 5,
"watchers": 28,
"watchers": 29,
"score": 0
},
{
@ -289,13 +289,36 @@
"description": "CVE-2020-14882\/14883\/14750",
"fork": false,
"created_at": "2020-11-04T03:09:13Z",
"updated_at": "2020-11-05T05:43:01Z",
"updated_at": "2020-11-05T15:04:12Z",
"pushed_at": "2020-11-04T03:15:33Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"watchers": 10,
"score": 0
},
{
"id": 310303375,
"name": "cve-2020-14882",
"full_name": "mmioimm\/cve-2020-14882",
"owner": {
"login": "mmioimm",
"id": 19258899,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19258899?v=4",
"html_url": "https:\/\/github.com\/mmioimm"
},
"html_url": "https:\/\/github.com\/mmioimm\/cve-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-11-05T13:12:28Z",
"updated_at": "2020-11-05T13:14:59Z",
"pushed_at": "2020-11-05T13:14:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2020-11-04T09:12:46Z",
"updated_at": "2020-11-05T13:32:05Z",
"pushed_at": "2020-10-26T10:15:32Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"forks_count": 27,
"forks": 27,
"watchers": 197,
"watchers": 198,
"score": 0
},
{

View file

@ -316,8 +316,8 @@
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 51,
"forks": 51,
"forks_count": 52,
"forks": 52,
"watchers": 148,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2020-10-19T03:16:34Z",
"updated_at": "2020-10-19T03:25:00Z",
"pushed_at": "2020-10-19T03:24:58Z",
"updated_at": "2020-11-05T10:43:23Z",
"pushed_at": "2020-11-05T10:43:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,7 +13,7 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2020-11-02T01:01:35Z",
"updated_at": "2020-11-05T13:15:55Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 22,
"watchers_count": 22,

25
2020/CVE-2020-25398.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 279259540,
"name": "CVE-2020-25398",
"full_name": "h3llraiser\/CVE-2020-25398",
"owner": {
"login": "h3llraiser",
"id": 52741391,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/52741391?v=4",
"html_url": "https:\/\/github.com\/h3llraiser"
},
"html_url": "https:\/\/github.com\/h3llraiser\/CVE-2020-25398",
"description": "CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv export functionality.",
"fork": false,
"created_at": "2020-07-13T09:37:11Z",
"updated_at": "2020-11-05T15:00:19Z",
"pushed_at": "2020-11-05T10:17:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-25399.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 279259641,
"name": "CVE-2020-25399",
"full_name": "h3llraiser\/CVE-2020-25399",
"owner": {
"login": "h3llraiser",
"id": 52741391,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/52741391?v=4",
"html_url": "https:\/\/github.com\/h3llraiser"
},
"html_url": "https:\/\/github.com\/h3llraiser\/CVE-2020-25399",
"description": "Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack another user's session by sending a malicious file in the chat.",
"fork": false,
"created_at": "2020-07-13T09:37:38Z",
"updated_at": "2020-11-05T15:00:40Z",
"pushed_at": "2020-11-05T10:43:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T15:42:42Z",
"updated_at": "2020-11-05T09:28:18Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 747,
"watchers_count": 747,
"forks_count": 182,
"forks": 182,
"watchers": 745,
"watchers": 747,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2020-10-23T06:02:28Z",
"updated_at": "2020-11-04T16:31:54Z",
"pushed_at": "2020-11-04T16:31:52Z",
"updated_at": "2020-11-05T14:51:51Z",
"pushed_at": "2020-11-05T14:51:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-11-04T16:43:04Z",
"updated_at": "2020-11-05T07:37:31Z",
"updated_at": "2020-11-05T14:28:44Z",
"pushed_at": "2020-11-04T19:09:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 6,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-05T08:40:04Z",
"updated_at": "2020-11-05T14:42:10Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 2006,
"watchers_count": 2006,
"stargazers_count": 2009,
"watchers_count": 2009,
"forks_count": 526,
"forks": 526,
"watchers": 2006,
"watchers": 2009,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-05T06:19:09Z",
"updated_at": "2020-10-13T11:11:46Z",
"updated_at": "2020-11-05T09:46:35Z",
"pushed_at": "2020-07-07T07:19:16Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 19,
"forks": 19,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

View file

@ -1721,6 +1721,14 @@ An issue was discovered on Tata Sonata Smart SF Rush 1.12 devices. It has been i
- [the-girl-who-lived/CVE-2020-11539](https://github.com/the-girl-who-lived/CVE-2020-11539)
### CVE-2020-11547 (2020-04-04)
<code>
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
</code>
- [ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure](https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure)
### CVE-2020-11579 (2020-09-03)
<code>
@ -2209,6 +2217,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [GGyao/CVE-2020-14882_ALL](https://github.com/GGyao/CVE-2020-14882_ALL)
- [ovProphet/CVE-2020-14882-checker](https://github.com/ovProphet/CVE-2020-14882-checker)
- [NS-Sp4ce/CVE-2020-14882](https://github.com/NS-Sp4ce/CVE-2020-14882)
- [mmioimm/cve-2020-14882](https://github.com/mmioimm/cve-2020-14882)
### CVE-2020-14947 (2020-06-30)
@ -2568,6 +2577,12 @@ In SourceCodester Online Bus Booking System 1.0, there is Authentication bypass
- [Ko-kn3t/CVE-2020-25273](https://github.com/Ko-kn3t/CVE-2020-25273)
### CVE-2020-25398
- [h3llraiser/CVE-2020-25398](https://github.com/h3llraiser/CVE-2020-25398)
### CVE-2020-25399
- [h3llraiser/CVE-2020-25399](https://github.com/h3llraiser/CVE-2020-25399)
### CVE-2020-25487 (2020-09-22)
<code>
@ -2698,7 +2713,12 @@ An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's
- [seb1055/cve-2020-27358-27359](https://github.com/seb1055/cve-2020-27358-27359)
### CVE-2020-27688
### CVE-2020-27688 (-)
<code>
RVToolsPasswordEncryption.exe in RVTools 4.0.6 allows users to encrypt passwords to be used in the configuration files. This encryption used a static IV and key, and thus using the Decrypt() method from VISKD.cs from the RVTools.exe executable allows for decrypting the encrypted passwords. The accounts used in the configuration files have access to vSphere instances.
</code>
- [matthiasmaes/CVE-2020-27688](https://github.com/matthiasmaes/CVE-2020-27688)
### CVE-2020-27747 (2020-10-29)
@ -2709,7 +2729,12 @@ An issue was discovered in Click Studios Passwordstate 8.9 (Build 8973).If the u
- [jet-pentest/CVE-2020-27747](https://github.com/jet-pentest/CVE-2020-27747)
### CVE-2020-27955
### CVE-2020-27955 (-)
<code>
Git LFS 2.12.0 allows Remote Code Execution.
</code>
- [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955)
- [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go)