Auto Update 2020/11/14 00:09:22

This commit is contained in:
motikan2010-bot 2020-11-14 00:09:22 +09:00
parent 44e99cef54
commit 47018cb949
25 changed files with 162 additions and 86 deletions

View file

@ -13,8 +13,8 @@
"description": "A very simple buffer overflow using CVE-2013-4730 against PCman's FTP server",
"fork": false,
"created_at": "2020-11-12T08:20:35Z",
"updated_at": "2020-11-12T08:25:59Z",
"pushed_at": "2020-11-12T08:25:56Z",
"updated_at": "2020-11-13T09:59:25Z",
"pushed_at": "2020-11-13T09:59:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-09-06T18:03:10Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 37,
"forks": 37,
"forks_count": 38,
"forks": 38,
"watchers": 98,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2020-11-05T16:38:03Z",
"updated_at": "2020-11-13T11:07:52Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 350,
"watchers_count": 350,
"stargazers_count": 351,
"watchers_count": 351,
"forks_count": 131,
"forks": 131,
"watchers": 350,
"watchers": 351,
"score": 0
},
{

View file

@ -251,5 +251,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 312564506,
"name": "apache-struts-cve-2017-9805",
"full_name": "rvermeulen\/apache-struts-cve-2017-9805",
"owner": {
"login": "rvermeulen",
"id": 636626,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/636626?v=4",
"html_url": "https:\/\/github.com\/rvermeulen"
},
"html_url": "https:\/\/github.com\/rvermeulen\/apache-struts-cve-2017-9805",
"description": null,
"fork": false,
"created_at": "2020-11-13T12:04:32Z",
"updated_at": "2020-11-13T12:12:37Z",
"pushed_at": "2020-11-13T12:07:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-14T12:23:52Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"score": 0
}

View file

@ -86,8 +86,8 @@
"pushed_at": "2019-11-21T15:03:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 82,
"forks": 82,
"forks_count": 83,
"forks": 83,
"watchers": 269,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-06-10T22:10:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}

View file

@ -59,13 +59,13 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2020-10-18T20:58:15Z",
"updated_at": "2020-11-13T14:27:22Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 76,
"forks": 76,
"watchers": 127,
"watchers": 128,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-05-26T03:19:49Z",
"updated_at": "2020-07-21T05:45:26Z",
"updated_at": "2020-11-13T14:30:30Z",
"pushed_at": "2020-07-01T23:13:17Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 24,
"forks": 24,
"watchers": 109,
"watchers": 110,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-17558 Solr模板注入漏洞图形化一键检测工具。CVE-2019-17558 Solr Velocity Template Vul POC Tool.",
"fork": false,
"created_at": "2019-11-25T10:54:20Z",
"updated_at": "2020-09-15T06:07:55Z",
"updated_at": "2020-11-13T10:23:15Z",
"pushed_at": "2020-01-10T10:58:44Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 2,
"forks": 2,
"watchers": 14,
"watchers": 15,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-13T05:05:13Z",
"updated_at": "2020-11-13T10:01:52Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2048,
"watchers_count": 2048,
"forks_count": 547,
"forks": 547,
"watchers": 2048,
"stargazers_count": 2049,
"watchers_count": 2049,
"forks_count": 548,
"forks": 548,
"watchers": 2049,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
"fork": false,
"created_at": "2020-02-07T02:41:44Z",
"updated_at": "2020-11-12T18:44:44Z",
"updated_at": "2020-11-13T09:15:25Z",
"pushed_at": "2020-02-19T03:47:33Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 17,
"forks": 17,
"watchers": 49,
"watchers": 50,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-11-09T13:34:24Z",
"updated_at": "2020-11-13T12:33:36Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 664,
"watchers_count": 664,
"stargazers_count": 665,
"watchers_count": 665,
"forks_count": 137,
"forks": 137,
"watchers": 664,
"watchers": 665,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-11T16:21:01Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 17,
"score": 0
}

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-09-14T16:53:07Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 6,
"forks": 6,
"forks_count": 5,
"forks": 5,
"watchers": 27,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-13T05:05:13Z",
"updated_at": "2020-11-13T10:01:52Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2048,
"watchers_count": 2048,
"forks_count": 547,
"forks": 547,
"watchers": 2048,
"stargazers_count": 2049,
"watchers_count": 2049,
"forks_count": 548,
"forks": 548,
"watchers": 2049,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web漏洞扫描和验证工具可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2020-11-13T07:43:33Z",
"updated_at": "2020-11-13T10:08:32Z",
"pushed_at": "2020-11-10T02:58:25Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 335,
"watchers_count": 335,
"forks_count": 56,
"forks": 56,
"watchers": 333,
"watchers": 335,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-11-13T06:40:00Z",
"updated_at": "2020-11-13T14:07:33Z",
"pushed_at": "2020-11-04T02:26:59Z",
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 29,
"forks": 29,
"watchers": 174,
"stargazers_count": 176,
"watchers_count": 176,
"forks_count": 30,
"forks": 30,
"watchers": 176,
"score": 0
},
{
@ -293,8 +293,8 @@
"pushed_at": "2020-11-05T03:29:09Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 11,
"forks": 11,
"forks_count": 12,
"forks": 12,
"watchers": 41,
"score": 0
},

25
2020/CVE-2020-15349.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 312567868,
"name": "Forklift_LPE",
"full_name": "Traxes\/Forklift_LPE",
"owner": {
"login": "Traxes",
"id": 6783032,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6783032?v=4",
"html_url": "https:\/\/github.com\/Traxes"
},
"html_url": "https:\/\/github.com\/Traxes\/Forklift_LPE",
"description": "Vulnerability Description of CVE-2020-15349",
"fork": false,
"created_at": "2020-11-13T12:20:07Z",
"updated_at": "2020-11-13T13:41:44Z",
"pushed_at": "2020-11-13T13:41:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 6,
"watchers": 24,
"score": 0
},
{
"id": 312566882,
"name": "WPKiller",
"full_name": "Dark-Grizzly\/WPKiller",
"owner": {
"login": "Dark-Grizzly",
"id": 53230336,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53230336?v=4",
"html_url": "https:\/\/github.com\/Dark-Grizzly"
},
"html_url": "https:\/\/github.com\/Dark-Grizzly\/WPKiller",
"description": "CVE-2020-25213 Wordpress File Manager 6.7 Plugin 0day exploit",
"fork": false,
"created_at": "2020-11-13T12:15:26Z",
"updated_at": "2020-11-13T14:58:52Z",
"pushed_at": "2020-11-13T14:58:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-2555 Python POC",
"fork": false,
"created_at": "2020-03-06T16:02:59Z",
"updated_at": "2020-10-25T12:53:18Z",
"updated_at": "2020-11-13T15:09:03Z",
"pushed_at": "2020-04-16T12:04:18Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 21,
"forks": 21,
"watchers": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 22,
"forks": 22,
"watchers": 45,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-11-04T12:02:34Z",
"updated_at": "2020-11-08T12:28:57Z",
"updated_at": "2020-11-13T12:46:18Z",
"pushed_at": "2020-11-04T13:10:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "my exp for CVE-2020-27194, tested on linux kernel 5.8.14.",
"fork": false,
"created_at": "2020-11-09T11:58:34Z",
"updated_at": "2020-11-10T14:50:08Z",
"updated_at": "2020-11-13T12:46:12Z",
"pushed_at": "2020-11-09T12:11:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 187,
"watchers_count": 187,
"forks_count": 25,
"forks": 25,
"forks_count": 26,
"forks": 26,
"watchers": 187,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 135,
"watchers_count": 135,
"forks_count": 45,
"forks": 45,
"forks_count": 44,
"forks": 44,
"watchers": 135,
"score": 0
},

View file

@ -36,8 +36,8 @@
"description": null,
"fork": false,
"created_at": "2020-11-13T09:01:12Z",
"updated_at": "2020-11-13T09:07:07Z",
"pushed_at": "2020-11-13T09:07:05Z",
"updated_at": "2020-11-13T09:52:13Z",
"pushed_at": "2020-11-13T09:50:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-07-23T12:55:28Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 43,
"score": 0
}

View file

@ -2379,6 +2379,9 @@ In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVari
- [guettli/fix-CVE-2020-15228](https://github.com/guettli/fix-CVE-2020-15228)
### CVE-2020-15349
- [Traxes/Forklift_LPE](https://github.com/Traxes/Forklift_LPE)
### CVE-2020-15367 (2020-07-07)
<code>
@ -2647,6 +2650,7 @@ The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote
</code>
- [mansoorr123/wp-file-manager-CVE-2020-25213](https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213)
- [Dark-Grizzly/WPKiller](https://github.com/Dark-Grizzly/WPKiller)
### CVE-2020-25270 (2020-10-08)
@ -10965,6 +10969,7 @@ The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x bef
- [UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit](https://github.com/UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit)
- [0xd3vil/CVE-2017-9805-Exploit](https://github.com/0xd3vil/CVE-2017-9805-Exploit)
- [AvishkaSenadheera20/CVE-2017-9805---Documentation---IT19143378](https://github.com/AvishkaSenadheera20/CVE-2017-9805---Documentation---IT19143378)
- [rvermeulen/apache-struts-cve-2017-9805](https://github.com/rvermeulen/apache-struts-cve-2017-9805)
### CVE-2017-9822 (2017-07-20)