Auto Update 2020/02/12 00:08:03

This commit is contained in:
motikan2010-bot 2020-02-12 00:08:03 +09:00
parent a86ca76808
commit 499add8f04
21 changed files with 121 additions and 69 deletions

View file

@ -13,13 +13,13 @@
"description": "Win32k LPE vulnerability used in APT attack",
"fork": false,
"created_at": "2015-05-12T18:04:48Z",
"updated_at": "2020-02-05T16:44:31Z",
"updated_at": "2020-02-11T14:08:19Z",
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 257,
"watchers_count": 257,
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 177,
"forks": 177,
"watchers": 257,
"watchers": 258,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-13T07:14:01Z",
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 41,
"forks": 41,
"forks_count": 42,
"forks": 42,
"watchers": 87,
"score": 0
},

View file

@ -82,13 +82,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-02-06T09:45:40Z",
"updated_at": "2020-02-11T09:17:02Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 424,
"watchers_count": 424,
"stargazers_count": 425,
"watchers_count": 425,
"forks_count": 233,
"forks": 233,
"watchers": 424,
"watchers": 425,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2020-02-10T15:13:13Z",
"updated_at": "2020-02-11T12:29:51Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 101,
"forks": 101,
"watchers": 167,
"watchers": 168,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2020-02-11T04:42:02Z",
"updated_at": "2020-02-11T12:30:02Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 300,
"watchers_count": 300,
"forks_count": 124,
"forks": 124,
"watchers": 300,
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 125,
"forks": 125,
"watchers": 301,
"score": 0
},
{

View file

@ -21,5 +21,28 @@
"forks": 1,
"watchers": 12,
"score": 0
},
{
"id": 239721705,
"name": "CVE-2018-1335-Python3",
"full_name": "GEIGEI123\/CVE-2018-1335-Python3",
"owner": {
"login": "GEIGEI123",
"id": 46476997,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/46476997?v=4",
"html_url": "https:\/\/github.com\/GEIGEI123"
},
"html_url": "https:\/\/github.com\/GEIGEI123\/CVE-2018-1335-Python3",
"description": null,
"fork": false,
"created_at": "2020-02-11T09:19:57Z",
"updated_at": "2020-02-11T09:21:58Z",
"pushed_at": "2020-02-11T09:20:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-14T12:35:09Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 277,
"forks": 277,
"forks_count": 278,
"forks": 278,
"watchers": 313,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "CVE-2018-4878 样本",
"fork": false,
"created_at": "2018-02-22T02:38:30Z",
"updated_at": "2020-02-10T15:13:34Z",
"updated_at": "2020-02-11T12:30:08Z",
"pushed_at": "2018-02-22T07:10:21Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 48,
"forks": 48,
"watchers": 108,
"watchers": 109,
"score": 0
},
{

View file

@ -270,8 +270,8 @@
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 25,
"forks": 25,
"forks_count": 26,
"forks": 26,
"watchers": 69,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2020-02-09T09:00:31Z",
"updated_at": "2020-02-11T10:39:03Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 242,
"watchers_count": 242,
"forks_count": 67,
"forks": 67,
"watchers": 241,
"watchers": 242,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-01-06T22:34:16Z",
"updated_at": "2020-02-11T08:25:26Z",
"updated_at": "2020-02-11T14:29:37Z",
"pushed_at": "2020-01-07T14:29:45Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 32,
"forks": 32,
"watchers": 117,
"watchers": 118,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "guest→systemUAC手动提权",
"fork": false,
"created_at": "2019-11-27T02:47:37Z",
"updated_at": "2020-02-10T05:46:22Z",
"updated_at": "2020-02-11T13:16:10Z",
"pushed_at": "2020-02-05T07:08:21Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 12,
"forks": 12,
"watchers": 52,
"watchers": 54,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "https:\/\/dylankatz.com\/Analysis-of-CVE-2019-18634\/",
"fork": false,
"created_at": "2020-02-07T02:41:44Z",
"updated_at": "2020-02-10T08:30:55Z",
"updated_at": "2020-02-11T11:37:08Z",
"pushed_at": "2020-02-07T17:58:39Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 3,
"forks": 3,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2020-02-11T01:56:11Z",
"updated_at": "2020-02-11T14:14:35Z",
"pushed_at": "2019-12-18T15:32:15Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 18,
"forks": 18,
"watchers": 108,
"watchers": 109,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4",
"fork": false,
"created_at": "2020-02-02T16:42:32Z",
"updated_at": "2020-02-11T08:50:57Z",
"updated_at": "2020-02-11T14:31:05Z",
"pushed_at": "2020-02-03T15:11:25Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 6,
"forks": 6,
"watchers": 44,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 7,
"forks": 7,
"watchers": 48,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-02-11T09:05:41Z",
"updated_at": "2020-02-11T10:32:08Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 768,
"watchers_count": 768,
"stargazers_count": 769,
"watchers_count": 769,
"forks_count": 190,
"forks": 190,
"watchers": 768,
"watchers": 769,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 44,
"forks": 44,
"forks_count": 45,
"forks": 45,
"watchers": 181,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-2551 poc exploit python example, more see https:\/\/www.anquanke.com\/post\/id\/197605",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-02-09T16:44:17Z",
"pushed_at": "2020-02-09T16:44:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"updated_at": "2020-02-11T13:14:58Z",
"pushed_at": "2020-02-11T13:14:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

25
2020/CVE-2020-7471.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 239774776,
"name": "CVE-2020-7471",
"full_name": "Saferman\/CVE-2020-7471",
"owner": {
"login": "Saferman",
"id": 17509858,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/17509858?v=4",
"html_url": "https:\/\/github.com\/Saferman"
},
"html_url": "https:\/\/github.com\/Saferman\/CVE-2020-7471",
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2020-02-11T14:28:32Z",
"pushed_at": "2020-02-11T13:58:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC script that shows RCE vulnerability over Intellian Satellite controller",
"fork": false,
"created_at": "2020-01-28T23:27:20Z",
"updated_at": "2020-02-11T09:02:02Z",
"updated_at": "2020-02-11T14:16:04Z",
"pushed_at": "2020-01-30T11:42:26Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 3,
"forks": 3,
"watchers": 24,
"watchers": 33,
"score": 0
}
]

View file

@ -3138,6 +3138,7 @@
### CVE-2018-1335
- [SkyBlueEternal/CVE-2018-1335-EXP-GUI](https://github.com/SkyBlueEternal/CVE-2018-1335-EXP-GUI)
- [GEIGEI123/CVE-2018-1335-Python3](https://github.com/GEIGEI123/CVE-2018-1335-Python3)
### CVE-2018-13379
- [milo2012/CVE-2018-13379](https://github.com/milo2012/CVE-2018-13379)
@ -5608,6 +5609,9 @@
### CVE-2020-7247
- [FiroSolutions/cve-2020-7247-exploit](https://github.com/FiroSolutions/cve-2020-7247-exploit)
### CVE-2020-7471
- [Saferman/CVE-2020-7471](https://github.com/Saferman/CVE-2020-7471)
### CVE-2020-7799
- [Pikaqi/cve-2020-7799](https://github.com/Pikaqi/cve-2020-7799)