Auto Update 2020/07/18 06:08:14

This commit is contained in:
motikan2010-bot 2020-07-18 06:08:14 +09:00
parent 70bb7a6163
commit 359e6f8da5
16 changed files with 73 additions and 101 deletions

View file

@ -36,13 +36,13 @@
"description": "CVE-2015-1805 root tool", "description": "CVE-2015-1805 root tool",
"fork": false, "fork": false,
"created_at": "2016-04-01T12:10:14Z", "created_at": "2016-04-01T12:10:14Z",
"updated_at": "2020-07-09T08:43:33Z", "updated_at": "2020-07-17T17:39:28Z",
"pushed_at": "2017-11-23T20:55:03Z", "pushed_at": "2017-11-23T20:55:03Z",
"stargazers_count": 250, "stargazers_count": 251,
"watchers_count": 250, "watchers_count": 251,
"forks_count": 148, "forks_count": 148,
"forks": 148, "forks": 148,
"watchers": 250, "watchers": 251,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-10-27T20:23:15Z", "pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 75, "stargazers_count": 75,
"watchers_count": 75, "watchers_count": 75,
"forks_count": 35, "forks_count": 36,
"forks": 35, "forks": 36,
"watchers": 75, "watchers": 75,
"score": 0 "score": 0
}, },

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-08T00:08:20Z", "pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 361, "stargazers_count": 361,
"watchers_count": 361, "watchers_count": 361,
"forks_count": 327, "forks_count": 328,
"forks": 327, "forks": 328,
"watchers": 361, "watchers": 361,
"score": 0 "score": 0
}, },

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z", "pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 152, "stargazers_count": 152,
"watchers_count": 152, "watchers_count": 152,
"forks_count": 29, "forks_count": 31,
"forks": 29, "forks": 31,
"watchers": 152, "watchers": 152,
"score": 0 "score": 0
} }

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-08T18:42:56Z", "pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 197, "stargazers_count": 197,
"watchers_count": 197, "watchers_count": 197,
"forks_count": 55, "forks_count": 56,
"forks": 55, "forks": 56,
"watchers": 197, "watchers": 197,
"score": 0 "score": 0
} }

View file

@ -2129,13 +2129,13 @@
"description": "initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data\/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.", "description": "initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data\/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.",
"fork": false, "fork": false,
"created_at": "2019-09-07T00:28:45Z", "created_at": "2019-09-07T00:28:45Z",
"updated_at": "2020-03-25T05:25:08Z", "updated_at": "2020-07-17T15:41:30Z",
"pushed_at": "2019-09-16T10:35:57Z", "pushed_at": "2019-09-16T10:35:57Z",
"stargazers_count": 10, "stargazers_count": 11,
"watchers_count": 10, "watchers_count": 11,
"forks_count": 3, "forks_count": 3,
"forks": 3, "forks": 3,
"watchers": 10, "watchers": 11,
"score": 0 "score": 0
}, },
{ {
@ -2497,7 +2497,7 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false, "fork": false,
"created_at": "2020-01-21T02:22:29Z", "created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-06-30T03:08:27Z", "updated_at": "2020-07-17T20:45:08Z",
"pushed_at": "2020-01-21T03:15:41Z", "pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 50, "stargazers_count": 50,
"watchers_count": 50, "watchers_count": 50,

View file

@ -59,13 +59,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-06-24T15:33:50Z", "created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-07-15T04:15:50Z", "updated_at": "2020-07-17T16:54:29Z",
"pushed_at": "2020-03-23T11:22:54Z", "pushed_at": "2020-03-23T11:22:54Z",
"stargazers_count": 219, "stargazers_count": 220,
"watchers_count": 219, "watchers_count": 220,
"forks_count": 46, "forks_count": 47,
"forks": 46, "forks": 47,
"watchers": 219, "watchers": 220,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043", "description": "Exploit for CVE-2019-11043",
"fork": false, "fork": false,
"created_at": "2019-09-23T21:37:27Z", "created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-07-16T17:26:27Z", "updated_at": "2020-07-17T19:37:12Z",
"pushed_at": "2019-11-12T18:53:14Z", "pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1593, "stargazers_count": 1594,
"watchers_count": 1593, "watchers_count": 1594,
"forks_count": 229, "forks_count": 229,
"forks": 229, "forks": 229,
"watchers": 1593, "watchers": 1594,
"score": 0 "score": 0
}, },
{ {

View file

@ -362,8 +362,8 @@
"pushed_at": "2020-01-14T15:53:14Z", "pushed_at": "2020-01-14T15:53:14Z",
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"forks_count": 2, "forks_count": 3,
"forks": 2, "forks": 3,
"watchers": 8, "watchers": 8,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version", "description": "Support ALL Windows Version",
"fork": false, "fork": false,
"created_at": "2020-06-16T08:57:51Z", "created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-07-16T13:47:30Z", "updated_at": "2020-07-17T20:45:00Z",
"pushed_at": "2020-06-18T00:42:57Z", "pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 372, "stargazers_count": 373,
"watchers_count": 372, "watchers_count": 373,
"forks_count": 84, "forks_count": 84,
"forks": 84, "forks": 84,
"watchers": 372, "watchers": 373,
"score": 0 "score": 0
} }
] ]

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false, "fork": false,
"created_at": "2020-03-11T15:21:27Z", "created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-07-13T00:32:31Z", "updated_at": "2020-07-17T19:45:51Z",
"pushed_at": "2020-03-13T09:54:16Z", "pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 511, "stargazers_count": 512,
"watchers_count": 511, "watchers_count": 512,
"forks_count": 171, "forks_count": 171,
"forks": 171, "forks": 171,
"watchers": 511, "watchers": 512,
"score": 0 "score": 0
}, },
{ {
@ -116,20 +116,20 @@
}, },
{ {
"id": 246641886, "id": 246641886,
"name": "CVE-2020-0796", "name": "NSE-scripts",
"full_name": "pr4jwal\/CVE-2020-0796", "full_name": "pr4jwal\/NSE-scripts",
"owner": { "owner": {
"login": "pr4jwal", "login": "pr4jwal",
"id": 4672886, "id": 4672886,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4672886?v=4", "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4672886?v=4",
"html_url": "https:\/\/github.com\/pr4jwal" "html_url": "https:\/\/github.com\/pr4jwal"
}, },
"html_url": "https:\/\/github.com\/pr4jwal\/CVE-2020-0796", "html_url": "https:\/\/github.com\/pr4jwal\/NSE-scripts",
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"", "description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
"fork": false, "fork": false,
"created_at": "2020-03-11T17:51:29Z", "created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-07-04T23:27:13Z", "updated_at": "2020-07-17T20:58:18Z",
"pushed_at": "2020-03-16T17:25:51Z", "pushed_at": "2020-07-17T20:58:16Z",
"stargazers_count": 21, "stargazers_count": 21,
"watchers_count": 21, "watchers_count": 21,
"forks_count": 7, "forks_count": 7,

View file

@ -13,13 +13,13 @@
"description": "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.", "description": "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
"fork": false, "fork": false,
"created_at": "2020-07-14T19:02:25Z", "created_at": "2020-07-14T19:02:25Z",
"updated_at": "2020-07-17T02:09:38Z", "updated_at": "2020-07-17T20:56:51Z",
"pushed_at": "2020-07-16T23:42:18Z", "pushed_at": "2020-07-16T23:42:18Z",
"stargazers_count": 175, "stargazers_count": 181,
"watchers_count": 175, "watchers_count": 181,
"forks_count": 56, "forks_count": 56,
"forks": 56, "forks": 56,
"watchers": 175, "watchers": 181,
"score": 0 "score": 0
}, },
{ {
@ -59,13 +59,13 @@
"description": "Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2003 up to Windows Server 2019.", "description": "Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2003 up to Windows Server 2019.",
"fork": false, "fork": false,
"created_at": "2020-07-14T22:45:48Z", "created_at": "2020-07-14T22:45:48Z",
"updated_at": "2020-07-17T12:09:08Z", "updated_at": "2020-07-17T18:34:13Z",
"pushed_at": "2020-07-15T13:53:24Z", "pushed_at": "2020-07-15T13:53:24Z",
"stargazers_count": 49, "stargazers_count": 52,
"watchers_count": 49, "watchers_count": 52,
"forks_count": 20, "forks_count": 19,
"forks": 20, "forks": 19,
"watchers": 49, "watchers": 52,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service", "description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
"fork": false, "fork": false,
"created_at": "2020-07-15T05:46:31Z", "created_at": "2020-07-15T05:46:31Z",
"updated_at": "2020-07-17T13:46:15Z", "updated_at": "2020-07-17T18:34:54Z",
"pushed_at": "2020-07-16T11:24:45Z", "pushed_at": "2020-07-16T11:24:45Z",
"stargazers_count": 5, "stargazers_count": 7,
"watchers_count": 5, "watchers_count": 7,
"forks_count": 8, "forks_count": 8,
"forks": 8, "forks": 8,
"watchers": 5, "watchers": 7,
"score": 0 "score": 0
}, },
{ {
@ -151,13 +151,13 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350", "description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false, "fork": false,
"created_at": "2020-07-15T23:00:00Z", "created_at": "2020-07-15T23:00:00Z",
"updated_at": "2020-07-17T14:20:43Z", "updated_at": "2020-07-17T20:58:01Z",
"pushed_at": "2020-07-17T13:07:29Z", "pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 137, "stargazers_count": 140,
"watchers_count": 137, "watchers_count": 140,
"forks_count": 28, "forks_count": 28,
"forks": 28, "forks": 28,
"watchers": 137, "watchers": 140,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "writeup of CVE-2020-1362", "description": "writeup of CVE-2020-1362",
"fork": false, "fork": false,
"created_at": "2020-07-17T07:35:05Z", "created_at": "2020-07-17T07:35:05Z",
"updated_at": "2020-07-17T15:00:45Z", "updated_at": "2020-07-17T18:25:33Z",
"pushed_at": "2020-07-17T07:54:26Z", "pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 29, "stargazers_count": 38,
"watchers_count": 29, "watchers_count": 38,
"forks_count": 6, "forks_count": 8,
"forks": 6, "forks": 8,
"watchers": 29, "watchers": 38,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)", "description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false, "fork": false,
"created_at": "2020-07-15T15:20:09Z", "created_at": "2020-07-15T15:20:09Z",
"updated_at": "2020-07-17T14:18:46Z", "updated_at": "2020-07-17T20:28:44Z",
"pushed_at": "2020-07-17T14:18:44Z", "pushed_at": "2020-07-17T14:18:44Z",
"stargazers_count": 70, "stargazers_count": 74,
"watchers_count": 70, "watchers_count": 74,
"forks_count": 19, "forks_count": 21,
"forks": 19, "forks": 21,
"watchers": 70, "watchers": 74,
"score": 0 "score": 0
} }
] ]

View file

@ -1,25 +0,0 @@
[
{
"id": 280454883,
"name": "tst-2020-8558",
"full_name": "tabbysable\/tst-2020-8558",
"owner": {
"login": "tabbysable",
"id": 51767484,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51767484?v=4",
"html_url": "https:\/\/github.com\/tabbysable"
},
"html_url": "https:\/\/github.com\/tabbysable\/tst-2020-8558",
"description": "Vulnerability test script for CVE-2020-8558",
"fork": false,
"created_at": "2020-07-17T15:06:27Z",
"updated_at": "2020-07-17T15:06:27Z",
"pushed_at": "2020-07-17T15:06:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -232,7 +232,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [T13nn3s/CVE-2020-0796](https://github.com/T13nn3s/CVE-2020-0796) - [T13nn3s/CVE-2020-0796](https://github.com/T13nn3s/CVE-2020-0796)
- [ollypwn/SMBGhost](https://github.com/ollypwn/SMBGhost) - [ollypwn/SMBGhost](https://github.com/ollypwn/SMBGhost)
- [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker) - [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker)
- [pr4jwal/CVE-2020-0796](https://github.com/pr4jwal/CVE-2020-0796) - [pr4jwal/NSE-scripts](https://github.com/pr4jwal/NSE-scripts)
- [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796) - [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796)
- [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner) - [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner)
- [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796) - [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796)
@ -937,9 +937,6 @@ DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.
- [imjdl/CVE-2020-8515-PoC](https://github.com/imjdl/CVE-2020-8515-PoC) - [imjdl/CVE-2020-8515-PoC](https://github.com/imjdl/CVE-2020-8515-PoC)
- [truerandom/nmap_draytek_rce](https://github.com/truerandom/nmap_draytek_rce) - [truerandom/nmap_draytek_rce](https://github.com/truerandom/nmap_draytek_rce)
### CVE-2020-8558
- [tabbysable/tst-2020-8558](https://github.com/tabbysable/tst-2020-8558)
### CVE-2020-8597 ### CVE-2020-8597
<code> <code>