Auto Update 2020/08/24 12:08:32

This commit is contained in:
motikan2010-bot 2020-08-24 12:08:32 +09:00
parent c8d5b70c7e
commit 2a73aa3525
13 changed files with 118 additions and 94 deletions

View file

@ -1,4 +1,27 @@
[
{
"id": 250585913,
"name": "CVE-2004-1561",
"full_name": "ivanitlearning\/CVE-2004-1561",
"owner": {
"login": "ivanitlearning",
"id": 52420671,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/52420671?v=4",
"html_url": "https:\/\/github.com\/ivanitlearning"
},
"html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2004-1561",
"description": "Icecast Header Overwrite buffer overflow RCE < 2.0.1 (Win32)",
"fork": false,
"created_at": "2020-03-27T16:30:22Z",
"updated_at": "2020-03-27T17:54:42Z",
"pushed_at": "2020-03-27T17:53:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 274131989,
"name": "CVE-2004-1561",

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 263513846,
"name": "shiguresh",
"full_name": "Redsplit\/shiguresh",
"owner": {
"login": "Redsplit",
"id": 65139960,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/65139960?v=4",
"html_url": "https:\/\/github.com\/Redsplit"
},
"html_url": "https:\/\/github.com\/Redsplit\/shiguresh",
"description": "CVE-2004-1769 \/\/ Mass cPanel Reset password",
"fork": false,
"created_at": "2020-05-13T03:18:46Z",
"updated_at": "2020-06-19T02:20:21Z",
"pushed_at": "2020-04-21T22:24:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 158419232,
"name": "4062-1",
"full_name": "ngyanch\/4062-1",
"owner": {
"login": "ngyanch",
"id": 26293983,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26293983?v=4",
"html_url": "https:\/\/github.com\/ngyanch"
},
"html_url": "https:\/\/github.com\/ngyanch\/4062-1",
"description": "CVE-2008-0128",
"fork": false,
"created_at": "2018-11-20T16:26:21Z",
"updated_at": "2018-11-23T07:10:19Z",
"pushed_at": "2018-11-23T07:10:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,28 +44,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173164801,
"name": "debian-ssh",
"full_name": "nu11secur1ty\/debian-ssh",
"owner": {
"login": "nu11secur1ty",
"id": 3677559,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3677559?v=4",
"html_url": "https:\/\/github.com\/nu11secur1ty"
},
"html_url": "https:\/\/github.com\/nu11secur1ty\/debian-ssh",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166) http:\/\/web.archive.org\/web\/20110723091928\/http:\/\/digitaloffense.net\/tools\/debian-openssl\/",
"fork": false,
"created_at": "2019-02-28T18:22:06Z",
"updated_at": "2019-07-09T17:47:06Z",
"pushed_at": "2019-02-28T18:30:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2010/CVE-2010-3490.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 226908489,
"name": "CVE-2010-3490",
"full_name": "moayadalmalat\/CVE-2010-3490",
"owner": {
"login": "moayadalmalat",
"id": 42471675,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42471675?v=4",
"html_url": "https:\/\/github.com\/moayadalmalat"
},
"html_url": "https:\/\/github.com\/moayadalmalat\/CVE-2010-3490",
"description": "FreePBX exploit <= 2.8.0",
"fork": false,
"created_at": "2019-12-09T15:49:21Z",
"updated_at": "2019-12-09T15:57:52Z",
"pushed_at": "2019-12-09T15:57:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1305,8 +1305,8 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 754,
"watchers_count": 754,
"forks_count": 181,
"forks": 181,
"forks_count": 182,
"forks": 182,
"watchers": 754,
"score": 0
},
@ -1773,14 +1773,14 @@
{
"id": 191491863,
"name": "CVE-2019-0708-Msf--",
"full_name": "cream492\/CVE-2019-0708-Msf--",
"full_name": "cream-sec\/CVE-2019-0708-Msf--",
"owner": {
"login": "cream492",
"login": "cream-sec",
"id": 29266660,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29266660?v=4",
"html_url": "https:\/\/github.com\/cream492"
"html_url": "https:\/\/github.com\/cream-sec"
},
"html_url": "https:\/\/github.com\/cream492\/CVE-2019-0708-Msf--",
"html_url": "https:\/\/github.com\/cream-sec\/CVE-2019-0708-Msf--",
"description": "CVE-2019-0708-Msf-验证",
"fork": false,
"created_at": "2019-06-12T03:37:39Z",

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-22T13:28:14Z",
"updated_at": "2020-08-24T01:47:20Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1526,
"watchers_count": 1526,
"forks_count": 397,
"forks": 397,
"watchers": 1526,
"stargazers_count": 1527,
"watchers_count": 1527,
"forks_count": 398,
"forks": 398,
"watchers": 1527,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Exploit CVE-2020-13886 - LFI Intelbras TIP 200 \/ 200 LITE \/ ",
"fork": false,
"created_at": "2020-06-08T20:52:04Z",
"updated_at": "2020-08-06T22:43:54Z",
"pushed_at": "2020-08-04T20:14:54Z",
"updated_at": "2020-08-23T23:19:46Z",
"pushed_at": "2020-08-23T23:19:44Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-18T05:15:05Z",
"updated_at": "2020-08-23T07:03:54Z",
"updated_at": "2020-08-23T22:33:58Z",
"pushed_at": "2020-07-18T11:52:31Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 8,
"forks": 8,
"watchers": 63,
"watchers": 64,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2020-08-22T06:33:07Z",
"updated_at": "2020-08-24T01:39:40Z",
"pushed_at": "2020-08-20T07:56:36Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 3,
"forks": 3,
"watchers": 18,
"watchers": 19,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-22T13:28:14Z",
"updated_at": "2020-08-24T01:47:20Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1526,
"watchers_count": 1526,
"forks_count": 397,
"forks": 397,
"watchers": 1526,
"stargazers_count": 1527,
"watchers_count": 1527,
"forks_count": 398,
"forks": 398,
"watchers": 1527,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Proof of concept for CVE-2020-5902",
"fork": false,
"created_at": "2020-07-05T17:01:27Z",
"updated_at": "2020-08-10T11:23:37Z",
"updated_at": "2020-08-24T02:01:44Z",
"pushed_at": "2020-07-06T17:47:17Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 21,
"forks": 21,
"watchers": 71,
"watchers": 72,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation",
"fork": false,
"created_at": "2020-02-28T01:27:08Z",
"updated_at": "2020-03-15T05:45:55Z",
"updated_at": "2020-08-23T22:22:47Z",
"pushed_at": "2020-02-28T02:22:03Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 4,
"forks": 4,
"watchers": 26,
"watchers": 25,
"score": 0
}
]

View file

@ -2153,7 +2153,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [Wileysec/CVE-2019-0708-Batch-Blue-Screen](https://github.com/Wileysec/CVE-2019-0708-Batch-Blue-Screen)
- [Pa55w0rd/CVE-2019-0708](https://github.com/Pa55w0rd/CVE-2019-0708)
- [at0mik/CVE-2019-0708-PoC](https://github.com/at0mik/CVE-2019-0708-PoC)
- [cream492/CVE-2019-0708-Msf--](https://github.com/cream492/CVE-2019-0708-Msf--)
- [cream-sec/CVE-2019-0708-Msf--](https://github.com/cream-sec/CVE-2019-0708-Msf--)
- [wdfcc/CVE-2019-0708](https://github.com/wdfcc/CVE-2019-0708)
- [cvencoder/cve-2019-0708](https://github.com/cvencoder/cve-2019-0708)
- [ze0r/CVE-2019-0708-exp](https://github.com/ze0r/CVE-2019-0708-exp)
@ -14211,6 +14211,14 @@ Integer signedness error in the pkt_find_dev_from_minor function in drivers/bloc
- [huang-emily/CVE-2010-3437](https://github.com/huang-emily/CVE-2010-3437)
### CVE-2010-3490
<code>
Directory traversal vulnerability in page.recordings.php in the System Recordings component in the configuration interface in FreePBX 2.8.0 and earlier allows remote authenticated administrators to create arbitrary files via a .. (dot dot) in the usersnum parameter to admin/config.php, as demonstrated by creating a .php file under the web root.
</code>
- [moayadalmalat/CVE-2010-3490](https://github.com/moayadalmalat/CVE-2010-3490)
### CVE-2010-3600
<code>
@ -14437,14 +14445,6 @@ DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.
## 2008
### CVE-2008-0128
<code>
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
</code>
- [ngyanch/4062-1](https://github.com/ngyanch/4062-1)
### CVE-2008-0166
<code>
@ -14453,7 +14453,6 @@ OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating system
- [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh)
- [avarx/vulnkeys](https://github.com/avarx/vulnkeys)
- [nu11secur1ty/debian-ssh](https://github.com/nu11secur1ty/debian-ssh)
### CVE-2008-0228
@ -14733,6 +14732,7 @@ The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows
Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a large number of headers.
</code>
- [ivanitlearning/CVE-2004-1561](https://github.com/ivanitlearning/CVE-2004-1561)
- [darrynb89/CVE-2004-1561](https://github.com/darrynb89/CVE-2004-1561)
### CVE-2004-1769
@ -14742,6 +14742,7 @@ The &quot;Allow cPanel users to reset their password via email&quot; feature in
</code>
- [sinkaroid/shiguresh](https://github.com/sinkaroid/shiguresh)
- [Redsplit/shiguresh](https://github.com/Redsplit/shiguresh)
### CVE-2004-2167