Auto Update 2020/07/01 12:08:07

This commit is contained in:
motikan2010-bot 2020-07-01 12:08:07 +09:00
parent 825b8c98e8
commit 2c4a3d3a7c
23 changed files with 140 additions and 83 deletions

View file

@ -13,8 +13,8 @@
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
"fork": false,
"created_at": "2020-06-30T13:07:31Z",
"updated_at": "2020-06-30T13:07:35Z",
"pushed_at": "2020-06-30T13:07:33Z",
"updated_at": "2020-06-30T22:21:48Z",
"pushed_at": "2020-06-30T22:21:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 35,
"forks": 35,
"forks_count": 34,
"forks": 34,
"watchers": 74,
"score": 0
},

View file

@ -106,7 +106,7 @@
"fork": false,
"created_at": "2019-12-19T07:45:21Z",
"updated_at": "2019-12-19T08:09:43Z",
"pushed_at": "2020-06-18T17:03:27Z",
"pushed_at": "2020-06-30T21:22:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)",
"fork": false,
"created_at": "2019-03-31T08:51:07Z",
"updated_at": "2020-05-10T07:22:19Z",
"updated_at": "2020-06-30T23:07:01Z",
"pushed_at": "2019-03-31T08:52:24Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 3,
"forks": 3,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-30T19:26:49Z",
"updated_at": "2020-07-01T02:48:17Z",
"pushed_at": "2020-06-30T05:28:32Z",
"stargazers_count": 1067,
"watchers_count": 1067,
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 265,
"forks": 265,
"watchers": 1067,
"watchers": 1072,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-20T18:47:25Z",
"stargazers_count": 245,
"watchers_count": 245,
"forks_count": 84,
"forks": 84,
"forks_count": 85,
"forks": 85,
"watchers": 245,
"score": 0
}

View file

@ -44,5 +44,28 @@
"forks": 17,
"watchers": 37,
"score": 0
},
{
"id": 276237731,
"name": "Bluefrag_CVE-2020-0022",
"full_name": "k3vinlusec\/Bluefrag_CVE-2020-0022",
"owner": {
"login": "k3vinlusec",
"id": 19988136,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19988136?v=4",
"html_url": "https:\/\/github.com\/k3vinlusec"
},
"html_url": "https:\/\/github.com\/k3vinlusec\/Bluefrag_CVE-2020-0022",
"description": "This is a RCE bluetooth vulnerability on Android 8.0 and 9.0",
"fork": false,
"created_at": "2020-07-01T00:23:33Z",
"updated_at": "2020-07-01T00:47:52Z",
"pushed_at": "2020-07-01T00:47:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2020-03-24T13:10:39Z",
"updated_at": "2020-06-30T09:40:47Z",
"updated_at": "2020-07-01T02:56:48Z",
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 17,
"forks": 17,
"watchers": 67,
"watchers": 68,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-06-30T07:15:44Z",
"updated_at": "2020-07-01T02:52:30Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 188,
"watchers_count": 188,
"stargazers_count": 189,
"watchers_count": 189,
"forks_count": 74,
"forks": 74,
"watchers": 188,
"watchers": 189,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-06-30T14:52:30Z",
"updated_at": "2020-07-01T02:33:14Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 336,
"watchers_count": 336,
"stargazers_count": 339,
"watchers_count": 339,
"forks_count": 71,
"forks": 71,
"watchers": 336,
"watchers": 339,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-06-30T15:55:00Z",
"updated_at": "2020-06-30T22:35:52Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 506,
"watchers_count": 506,
"stargazers_count": 507,
"watchers_count": 507,
"forks_count": 168,
"forks": 168,
"watchers": 506,
"watchers": 507,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-06-11T13:09:05Z",
"updated_at": "2020-06-30T22:35:34Z",
"pushed_at": "2020-03-16T17:25:51Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 8,
"forks": 8,
"watchers": 19,
"watchers": 20,
"score": 0
},
{
@ -1186,13 +1186,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-06-30T13:25:27Z",
"updated_at": "2020-07-01T02:11:33Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 280,
"watchers_count": 280,
"forks_count": 84,
"forks": 84,
"watchers": 280,
"stargazers_count": 281,
"watchers_count": 281,
"forks_count": 85,
"forks": 85,
"watchers": 281,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-30T19:26:49Z",
"updated_at": "2020-07-01T02:48:17Z",
"pushed_at": "2020-06-30T05:28:32Z",
"stargazers_count": 1067,
"watchers_count": 1067,
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 265,
"forks": 265,
"watchers": 1067,
"watchers": 1072,
"score": 0
},
{

25
2020/CVE-2020-11519.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 276226715,
"name": "winmagic_sd",
"full_name": "patois\/winmagic_sd",
"owner": {
"login": "patois",
"id": 2330989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/2330989?v=4",
"html_url": "https:\/\/github.com\/patois"
},
"html_url": "https:\/\/github.com\/patois\/winmagic_sd",
"description": "Technical Write-Up on and Poc Exploit for CVE-2020-11519 and CVE-2020-11520",
"fork": false,
"created_at": "2020-06-30T23:01:33Z",
"updated_at": "2020-06-30T23:05:04Z",
"pushed_at": "2020-06-30T23:04:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2020-06-30T02:33:10Z",
"updated_at": "2020-07-01T02:05:11Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 309,
"watchers_count": 309,
"forks_count": 51,
"forks": 51,
"watchers": 309,
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 53,
"forks": 53,
"watchers": 310,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-12828 PoC and Analysis. ",
"fork": false,
"created_at": "2020-06-30T15:18:58Z",
"updated_at": "2020-06-30T19:34:55Z",
"updated_at": "2020-07-01T02:32:02Z",
"pushed_at": "2020-06-30T16:03:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,
"forks": 4,
"watchers": 8,
"score": 0
}
]

View file

@ -312,13 +312,13 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2020-06-27T11:23:56Z",
"updated_at": "2020-07-01T02:36:43Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 37,
"forks": 37,
"watchers": 110,
"watchers": 111,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-29T17:21:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 17,
"forks": 17,
"forks_count": 18,
"forks": 18,
"watchers": 85,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 36,
"forks": 36,
"forks_count": 37,
"forks": 37,
"watchers": 96,
"score": 0
},
@ -36,13 +36,13 @@
"description": "Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)",
"fork": false,
"created_at": "2020-04-03T18:49:35Z",
"updated_at": "2020-05-23T17:01:55Z",
"updated_at": "2020-07-01T00:52:12Z",
"pushed_at": "2020-04-03T19:23:54Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-22T16:33:31Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 62,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
"fork": false,
"created_at": "2020-02-19T02:29:14Z",
"updated_at": "2020-06-29T16:42:25Z",
"updated_at": "2020-07-01T02:25:34Z",
"pushed_at": "2020-03-12T02:25:31Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 11,
"forks": 11,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2020-06-15T02:49:52Z",
"updated_at": "2020-07-01T02:56:09Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 32,
"forks": 32,
"watchers": 182,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 33,
"forks": 33,
"watchers": 183,
"score": 0
},
{

View file

@ -9,6 +9,7 @@ In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bou
- [marcinguy/CVE-2020-0022](https://github.com/marcinguy/CVE-2020-0022)
- [leommxj/cve-2020-0022](https://github.com/leommxj/cve-2020-0022)
- [k3vinlusec/Bluefrag_CVE-2020-0022](https://github.com/k3vinlusec/Bluefrag_CVE-2020-0022)
### CVE-2020-0041
@ -531,6 +532,14 @@ An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local
- [joshfinley/CVE-2020-11492](https://github.com/joshfinley/CVE-2020-11492)
- [CrackerCat/CVE-2020-11492](https://github.com/CrackerCat/CVE-2020-11492)
### CVE-2020-11519
<code>
The SDDisk2k.sys driver of WinMagic SecureDoc v8.5 and earlier allows local users to read or write to physical disc sectors via a \\.\SecureDocDevice handle. Exploiting this vulnerability results in privileged code execution.
</code>
- [patois/winmagic_sd](https://github.com/patois/winmagic_sd)
### CVE-2020-11539
<code>