Auto Update 2020/03/01 06:07:31

This commit is contained in:
motikan2010-bot 2020-03-01 06:07:31 +09:00
parent 64b0a83bbc
commit 46aa6e9fe5
32 changed files with 203 additions and 185 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-01-17T22:01:39Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},

View file

@ -1,27 +1,4 @@
[
{
"id": 132565257,
"name": "metasploitable2",
"full_name": "noondi\/metasploitable2",
"owner": {
"login": "noondi",
"id": 33064962,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/33064962?v=4",
"html_url": "https:\/\/github.com\/noondi"
},
"html_url": "https:\/\/github.com\/noondi\/metasploitable2",
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
"fork": false,
"created_at": "2018-05-08T06:37:50Z",
"updated_at": "2019-07-26T08:58:34Z",
"pushed_at": "2018-07-11T18:22:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 143461594,
"name": "CVE-2007-2447",
@ -68,29 +45,6 @@
"watchers": 0,
"score": 0
},
{
"id": 225688290,
"name": "exploit_smb_usermap_script",
"full_name": "Unam3dd\/exploit_smb_usermap_script",
"owner": {
"login": "Unam3dd",
"id": 34691959,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34691959?v=4",
"html_url": "https:\/\/github.com\/Unam3dd"
},
"html_url": "https:\/\/github.com\/Unam3dd\/exploit_smb_usermap_script",
"description": "Python Script Exploit SMB Usermap Script CVE-2007-2447",
"fork": false,
"created_at": "2019-12-03T18:25:41Z",
"updated_at": "2019-12-04T21:34:38Z",
"pushed_at": "2019-12-03T18:36:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 235003634,
"name": "CVE-2007-2447",

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-28T06:15:16Z",
"updated_at": "2020-02-29T15:19:36Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 42,
"forks": 42,
"watchers": 238,
"watchers": 239,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-28T06:15:16Z",
"updated_at": "2020-02-29T15:19:36Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 42,
"forks": 42,
"watchers": 238,
"watchers": 239,
"score": 0
}
]

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/wetw0rk"
},
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2020-02-19T23:57:44Z",
"pushed_at": "2020-02-19T23:57:42Z",
"updated_at": "2020-02-29T20:59:18Z",
"pushed_at": "2020-02-29T20:57:55Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 24,

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/wetw0rk"
},
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2020-02-19T23:57:44Z",
"pushed_at": "2020-02-19T23:57:42Z",
"updated_at": "2020-02-29T20:59:18Z",
"pushed_at": "2020-02-29T20:57:55Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 24,

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-28T06:15:16Z",
"updated_at": "2020-02-29T15:19:36Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 42,
"forks": 42,
"watchers": 238,
"watchers": 239,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2020-02-27T17:22:08Z",
"updated_at": "2020-02-29T16:01:43Z",
"pushed_at": "2020-01-14T12:35:09Z",
"stargazers_count": 316,
"watchers_count": 316,
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 283,
"forks": 283,
"watchers": 316,
"watchers": 317,
"score": 0
},
{

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/wetw0rk"
},
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2020-02-19T23:57:44Z",
"pushed_at": "2020-02-19T23:57:42Z",
"updated_at": "2020-02-29T21:04:33Z",
"pushed_at": "2020-02-29T21:04:31Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 24,

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-28T06:15:16Z",
"updated_at": "2020-02-29T15:19:36Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 42,
"forks": 42,
"watchers": 238,
"watchers": 239,
"score": 0
}
]

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/wetw0rk"
},
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2020-02-19T23:57:44Z",
"pushed_at": "2020-02-19T23:57:42Z",
"updated_at": "2020-02-29T21:04:33Z",
"pushed_at": "2020-02-29T21:04:31Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 24,

View file

@ -174,12 +174,12 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-02-21T08:49:18Z",
"updated_at": "2020-02-29T20:52:30Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 24,
"forks": 24,
"forks_count": 25,
"forks": 25,
"watchers": 65,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-12-22T19:14:05Z",
"updated_at": "2020-02-29T00:25:16Z",
"updated_at": "2020-02-29T19:33:18Z",
"pushed_at": "2019-12-22T19:18:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -128,8 +128,8 @@
"description": "Mass Exploit CVE-2019-16759",
"fork": false,
"created_at": "2020-02-20T23:14:52Z",
"updated_at": "2020-02-21T00:41:11Z",
"pushed_at": "2020-02-21T00:41:09Z",
"updated_at": "2020-02-29T21:05:46Z",
"pushed_at": "2020-02-29T21:05:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-28T06:15:16Z",
"updated_at": "2020-02-29T15:19:36Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 42,
"forks": 42,
"watchers": 238,
"watchers": 239,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "CVE-2019-3396 confluence SSTI RCE",
"fork": false,
"created_at": "2019-04-10T02:15:47Z",
"updated_at": "2020-02-28T11:11:56Z",
"updated_at": "2020-02-29T16:32:15Z",
"pushed_at": "2019-04-12T01:46:33Z",
"stargazers_count": 141,
"watchers_count": 141,
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 59,
"forks": 59,
"watchers": 141,
"watchers": 142,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Python script to exploit confluence path traversal vulnerability cve-2019-3398",
"fork": false,
"created_at": "2019-04-20T08:07:49Z",
"updated_at": "2019-12-04T09:49:36Z",
"updated_at": "2020-02-29T17:02:55Z",
"pushed_at": "2019-06-06T21:17:09Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -83,7 +83,7 @@
"fork": false,
"created_at": "2019-03-23T02:52:31Z",
"updated_at": "2020-02-20T03:15:14Z",
"pushed_at": "2020-02-29T01:25:30Z",
"pushed_at": "2020-02-29T16:09:13Z",
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 16,

View file

@ -13,8 +13,8 @@
"description": "A small python script that checks for CVE-2019-8446",
"fork": false,
"created_at": "2020-02-29T04:29:02Z",
"updated_at": "2020-02-29T04:30:08Z",
"pushed_at": "2020-02-29T04:30:06Z",
"updated_at": "2020-02-29T20:50:33Z",
"pushed_at": "2020-02-29T20:50:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -33,11 +33,11 @@
"html_url": "https:\/\/github.com\/charlesLoiseau"
},
"html_url": "https:\/\/github.com\/charlesLoiseau\/CVE-2019-9193",
"description": "honeypot for cve CVE-20199193 in rust",
"description": "honeypot for cve CVE-20199193 in python",
"fork": false,
"created_at": "2020-02-28T19:18:48Z",
"updated_at": "2020-02-28T19:24:11Z",
"pushed_at": "2020-02-28T19:24:09Z",
"updated_at": "2020-02-29T19:11:40Z",
"pushed_at": "2020-02-29T19:11:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

25
2019/CVE-2019-9465.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 241634998,
"name": "CVE-2019-9465",
"full_name": "alexbakker\/CVE-2019-9465",
"owner": {
"login": "alexbakker",
"id": 2387841,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2387841?v=4",
"html_url": "https:\/\/github.com\/alexbakker"
},
"html_url": "https:\/\/github.com\/alexbakker\/CVE-2019-9465",
"description": "Demo Android application for CVE-2019-9465",
"fork": false,
"created_at": "2020-02-19T13:57:11Z",
"updated_at": "2020-02-29T19:08:14Z",
"pushed_at": "2020-02-19T13:57:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-12-28T18:25:10Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 48,
"forks": 48,
"forks_count": 49,
"forks": 49,
"watchers": 191,
"score": 0
}

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-16T17:18:01Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
}

View file

@ -36,8 +36,8 @@
"description": "CVE-2020-0618 Honeypot",
"fork": false,
"created_at": "2020-02-18T16:17:19Z",
"updated_at": "2020-02-21T15:04:41Z",
"pushed_at": "2020-02-21T15:04:39Z",
"updated_at": "2020-02-29T18:46:45Z",
"pushed_at": "2020-02-29T18:46:43Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 23,
"forks": 23,
"forks_count": 24,
"forks": 24,
"watchers": 131,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-25T23:44:16Z",
"updated_at": "2020-02-29T14:27:29Z",
"updated_at": "2020-02-29T16:33:52Z",
"pushed_at": "2020-02-26T00:58:39Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 34,
"forks": 34,
"watchers": 125,
"watchers": 128,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2020-0688 - Exchange",
"fork": false,
"created_at": "2020-02-26T12:28:11Z",
"updated_at": "2020-02-29T06:52:15Z",
"updated_at": "2020-02-29T15:33:59Z",
"pushed_at": "2020-02-27T03:50:07Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 7,
"forks": 7,
"watchers": 15,
"watchers": 16,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-02-29T14:28:30Z",
"updated_at": "2020-02-29T19:05:26Z",
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 34,
"forks": 34,
"watchers": 108,
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 35,
"forks": 35,
"watchers": 113,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-02-29T14:34:34Z",
"updated_at": "2020-02-29T16:22:08Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 10,
"forks": 10,
"watchers": 35,
"watchers": 37,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "CVE-2020-0688",
"fork": false,
"created_at": "2020-02-28T17:03:53Z",
"updated_at": "2020-02-29T06:53:07Z",
"updated_at": "2020-02-29T15:34:30Z",
"pushed_at": "2020-02-28T17:07:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-02-29T10:13:21Z",
"updated_at": "2020-02-29T18:49:05Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 63,
"forks": 63,
"watchers": 113,
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 64,
"forks": 64,
"watchers": 114,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-02-20T17:00:02Z",
"updated_at": "2020-02-29T10:13:11Z",
"updated_at": "2020-02-29T18:49:09Z",
"pushed_at": "2020-02-20T17:01:53Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 8,
"forks": 8,
"watchers": 16,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 9,
"forks": 9,
"watchers": 18,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
"fork": false,
"created_at": "2020-02-20T17:57:54Z",
"updated_at": "2020-02-29T07:15:50Z",
"updated_at": "2020-02-29T18:48:59Z",
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 19,
"forks": 19,
"watchers": 31,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 21,
"forks": 21,
"watchers": 33,
"score": 0
},
{
@ -86,8 +86,8 @@
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 53,
"forks": 53,
"forks_count": 54,
"forks": 54,
"watchers": 132,
"score": 0
},
@ -105,13 +105,13 @@
"description": "CVE-2020-1938漏洞复现",
"fork": false,
"created_at": "2020-02-21T02:36:37Z",
"updated_at": "2020-02-29T12:06:53Z",
"updated_at": "2020-02-29T18:49:14Z",
"pushed_at": "2020-02-21T02:49:57Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 18,
"watchers": 19,
"score": 0
},
{
@ -293,8 +293,8 @@
"pushed_at": "2020-02-24T08:18:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
@ -312,13 +312,13 @@
"description": "Ghostcat read\/execute file,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2020-02-29T12:03:09Z",
"updated_at": "2020-02-29T18:14:07Z",
"pushed_at": "2020-02-26T02:58:10Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 6,
"forks": 6,
"watchers": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 7,
"forks": 7,
"watchers": 24,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-02-29T14:54:58Z",
"updated_at": "2020-02-29T15:14:38Z",
"pushed_at": "2020-02-28T09:34:19Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 9,
"forks": 9,
"watchers": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 10,
"forks": 10,
"watchers": 31,
"score": 0
}
]

25
2020/CVE-2020-8012.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 89426502,
"name": "Exploit-Development",
"full_name": "wetw0rk\/Exploit-Development",
"owner": {
"login": "wetw0rk",
"id": 20763546,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/20763546?v=4",
"html_url": "https:\/\/github.com\/wetw0rk"
},
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2020-02-29T21:04:33Z",
"pushed_at": "2020-02-29T21:04:31Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 24,
"forks": 24,
"watchers": 49,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-8840",
"fork": false,
"created_at": "2020-02-24T14:32:24Z",
"updated_at": "2020-02-29T14:27:23Z",
"updated_at": "2020-02-29T15:48:50Z",
"pushed_at": "2020-02-28T09:12:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation",
"fork": false,
"created_at": "2020-02-28T01:27:08Z",
"updated_at": "2020-02-29T09:44:54Z",
"updated_at": "2020-02-29T15:22:08Z",
"pushed_at": "2020-02-28T02:22:03Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -281,6 +281,14 @@ Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS command
- [Xh4H/Satellian-CVE-2020-7980](https://github.com/Xh4H/Satellian-CVE-2020-7980)
### CVE-2020-8012
<code>
CA Unified Infrastructure Management (Nimsoft/UIM) 9.20 and below contains a buffer overflow vulnerability in the robot (controller) component. A remote attacker can execute arbitrary code.
</code>
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
### CVE-2020-8417
<code>
@ -3193,6 +3201,14 @@ Nagios IM (component of Nagios XI) before 2.2.7 allows authenticated users to ex
- [polict/CVE-2019-9202](https://github.com/polict/CVE-2019-9202)
### CVE-2019-9465
<code>
In the Titan M handling of cryptographic operations, there is a possible information disclosure due to an unusual root cause. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10 Android ID: A-133258003
</code>
- [alexbakker/CVE-2019-9465](https://github.com/alexbakker/CVE-2019-9465)
### CVE-2019-9506
<code>
@ -12188,10 +12204,8 @@ Stack-based buffer overflow in War FTP Daemon 1.65, and possibly earlier, allows
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the &quot;username map script&quot; smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
</code>
- [noondi/metasploitable2](https://github.com/noondi/metasploitable2)
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
- [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script)
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
### CVE-2007-3830