Auto Update 2020/07/20 12:08:27

This commit is contained in:
motikan2010-bot 2020-07-20 12:08:27 +09:00
parent 6b3e659f3a
commit 587d24b059
29 changed files with 396 additions and 93 deletions

25
2009/CVE-2009-0229.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 264008888,
"name": "CVE-2009-0229-PoC",
"full_name": "zveriu\/CVE-2009-0229-PoC",
"owner": {
"login": "zveriu",
"id": 3428446,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3428446?v=4",
"html_url": "https:\/\/github.com\/zveriu"
},
"html_url": "https:\/\/github.com\/zveriu\/CVE-2009-0229-PoC",
"description": "PoC for CVE-2009-0229 \"Print Spooler Read File Vulnerability\" LPE AFR (related to CVE-2020-1048)",
"fork": false,
"created_at": "2020-05-14T19:40:50Z",
"updated_at": "2020-05-20T20:29:49Z",
"pushed_at": "2020-05-15T11:32:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

25
2009/CVE-2009-0689.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 162229782,
"name": "str2hax",
"full_name": "Fullmetal5\/str2hax",
"owner": {
"login": "Fullmetal5",
"id": 3742968,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3742968?v=4",
"html_url": "https:\/\/github.com\/Fullmetal5"
},
"html_url": "https:\/\/github.com\/Fullmetal5\/str2hax",
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-12-18T04:24:43Z",
"updated_at": "2020-07-13T19:50:36Z",
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 4,
"forks": 4,
"watchers": 27,
"score": 0
}
]

25
2009/CVE-2009-1151.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 120135334,
"name": "pocs",
"full_name": "minervais\/pocs",
"owner": {
"login": "minervais",
"id": 47587685,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/47587685?v=4",
"html_url": "https:\/\/github.com\/minervais"
},
"html_url": "https:\/\/github.com\/minervais\/pocs",
"description": "phpMyAdmin '\/scripts\/setup.php' PHP Code Injection RCE PoC (CVE-2009-1151)",
"fork": false,
"created_at": "2018-02-03T22:26:09Z",
"updated_at": "2019-08-28T02:14:03Z",
"pushed_at": "2019-07-18T20:27:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}
]

25
2009/CVE-2009-1244.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 191334884,
"name": "vmware_exploit_pack_CVE-2009-1244",
"full_name": "piotrbania\/vmware_exploit_pack_CVE-2009-1244",
"owner": {
"login": "piotrbania",
"id": 51699228,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51699228?v=4",
"html_url": "https:\/\/github.com\/piotrbania"
},
"html_url": "https:\/\/github.com\/piotrbania\/vmware_exploit_pack_CVE-2009-1244",
"description": "vmware cloudburst exploit CVE-2009-1244",
"fork": false,
"created_at": "2019-06-11T09:08:52Z",
"updated_at": "2020-04-14T09:22:50Z",
"pushed_at": "2019-06-11T13:49:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2009/CVE-2009-1324.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 164303291,
"name": "CVE-2009-1324",
"full_name": "war4uthor\/CVE-2009-1324",
"owner": {
"login": "war4uthor",
"id": 45926018,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor"
},
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2009-1324",
"description": "CVE-2009-1324 - ASX to MP3 Converter Local Buffer Overflow. Tested on Windows XP Professional SP3",
"fork": false,
"created_at": "2019-01-06T12:06:15Z",
"updated_at": "2019-01-06T12:30:37Z",
"pushed_at": "2019-01-06T12:30:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 163585014,
"name": "CVE-2009-1330",
"full_name": "adenkiewicz\/CVE-2009-1330",
"owner": {
"login": "adenkiewicz",
"id": 1060275,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4",
"html_url": "https:\/\/github.com\/adenkiewicz"
},
"html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2009-1330",
"description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.",
"fork": false,
"created_at": "2018-12-30T12:17:08Z",
"updated_at": "2018-12-31T10:09:34Z",
"pushed_at": "2018-12-31T09:59:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 164236833,
"name": "CVE-2009-1330",
@ -21,5 +44,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 171340357,
"name": "CVE-2009-1330_EasyRMToMp3Converter",
"full_name": "exploitwritter\/CVE-2009-1330_EasyRMToMp3Converter",
"owner": {
"login": "exploitwritter",
"id": 47488127,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/47488127?v=4",
"html_url": "https:\/\/github.com\/exploitwritter"
},
"html_url": "https:\/\/github.com\/exploitwritter\/CVE-2009-1330_EasyRMToMp3Converter",
"description": "Easy RM to MP3 Converter es un software que sufre de una vulnerabiliad de desbordamiento de buffer basada en la pila o StackBufferOverflow lo cual puede permite a los atacantes remotos ejecutar código arbitrario a través de un nombre de archivo largo en un archivo de lista de reproducción (.pls)",
"fork": false,
"created_at": "2019-02-18T19:07:02Z",
"updated_at": "2019-02-28T20:19:32Z",
"pushed_at": "2019-02-28T20:19:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2009/CVE-2009-2698.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 121771822,
"name": "CVE-2009-2698",
"full_name": "xiaoxiaoleo\/CVE-2009-2698",
"owner": {
"login": "xiaoxiaoleo",
"id": 9813186,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9813186?v=4",
"html_url": "https:\/\/github.com\/xiaoxiaoleo"
},
"html_url": "https:\/\/github.com\/xiaoxiaoleo\/CVE-2009-2698",
"description": "CVE-2009-2698 compiled for CentOS 4.8",
"fork": false,
"created_at": "2018-02-16T16:17:24Z",
"updated_at": "2018-03-12T20:07:49Z",
"pushed_at": "2018-02-16T16:30:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2009/CVE-2009-4137.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 112379736,
"name": "CVE-2009-4137",
"full_name": "Alexeyan\/CVE-2009-4137",
"owner": {
"login": "Alexeyan",
"id": 6674109,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6674109?v=4",
"html_url": "https:\/\/github.com\/Alexeyan"
},
"html_url": "https:\/\/github.com\/Alexeyan\/CVE-2009-4137",
"description": "Exploit for piwik CVE-2009-4140 RCE",
"fork": false,
"created_at": "2017-11-28T19:31:47Z",
"updated_at": "2019-12-19T19:46:29Z",
"pushed_at": "2018-01-15T10:40:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 183373457,
"name": "-Ruby-dl-handle.c-CVE-2009-5147-",
"full_name": "zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-",
"owner": {
"login": "zhangyongbo100",
"id": 49974023,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/49974023?v=4",
"html_url": "https:\/\/github.com\/zhangyongbo100"
},
"html_url": "https:\/\/github.com\/zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-",
"description": null,
"fork": false,
"created_at": "2019-04-25T06:46:50Z",
"updated_at": "2020-05-20T03:19:01Z",
"pushed_at": "2019-04-25T06:49:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-19T13:57:13Z",
"updated_at": "2020-07-20T02:12:14Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 512,
"watchers_count": 512,
"stargazers_count": 513,
"watchers_count": 513,
"forks_count": 124,
"forks": 124,
"watchers": 512,
"watchers": 513,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-19T13:57:13Z",
"updated_at": "2020-07-20T02:12:14Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 512,
"watchers_count": 512,
"stargazers_count": 513,
"watchers_count": 513,
"forks_count": 124,
"forks": 124,
"watchers": 512,
"watchers": 513,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 36,
"forks": 36,
"forks_count": 35,
"forks": 35,
"watchers": 75,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-06T17:55:44Z",
"updated_at": "2020-05-31T12:46:32Z",
"updated_at": "2020-07-19T22:56:31Z",
"pushed_at": "2017-01-06T23:34:03Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 12,
"forks": 12,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-07-19T12:17:54Z",
"updated_at": "2020-07-20T02:44:01Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 465,
"watchers_count": 465,
"stargazers_count": 466,
"watchers_count": 466,
"forks_count": 242,
"forks": 242,
"watchers": 465,
"watchers": 466,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-19T13:57:13Z",
"updated_at": "2020-07-20T02:12:14Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 512,
"watchers_count": 512,
"stargazers_count": 513,
"watchers_count": 513,
"forks_count": 124,
"forks": 124,
"watchers": 512,
"watchers": 513,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-19T13:57:13Z",
"updated_at": "2020-07-20T02:12:14Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 512,
"watchers_count": 512,
"stargazers_count": 513,
"watchers_count": 513,
"forks_count": 124,
"forks": 124,
"watchers": 512,
"watchers": 513,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 31,
"forks": 31,
"forks_count": 30,
"forks": 30,
"watchers": 152,
"score": 0
}

View file

@ -59,13 +59,13 @@
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
"fork": false,
"created_at": "2019-08-12T07:17:21Z",
"updated_at": "2020-07-19T01:02:22Z",
"updated_at": "2020-07-20T00:49:33Z",
"pushed_at": "2020-07-08T06:51:47Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 6,
"forks": 6,
"watchers": 28,
"watchers": 29,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-19T14:53:13Z",
"updated_at": "2020-07-20T03:07:13Z",
"pushed_at": "2020-07-14T10:20:14Z",
"stargazers_count": 1303,
"watchers_count": 1303,
"stargazers_count": 1308,
"watchers_count": 1308,
"forks_count": 325,
"forks": 325,
"watchers": 1303,
"watchers": 1308,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-07-18T19:31:23Z",
"updated_at": "2020-07-20T01:48:31Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 613,
"watchers_count": 613,
"stargazers_count": 614,
"watchers_count": 614,
"forks_count": 132,
"forks": 132,
"watchers": 613,
"watchers": 614,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-19T13:57:13Z",
"updated_at": "2020-07-20T02:12:14Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 512,
"watchers_count": 512,
"stargazers_count": 513,
"watchers_count": 513,
"forks_count": 124,
"forks": 124,
"watchers": 512,
"watchers": 513,
"score": 0
}
]

View file

@ -1439,13 +1439,13 @@
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
"fork": false,
"created_at": "2020-07-06T14:45:07Z",
"updated_at": "2020-07-12T22:42:23Z",
"updated_at": "2020-07-19T22:04:24Z",
"pushed_at": "2020-07-06T19:00:06Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-19T08:20:57Z",
"updated_at": "2020-07-19T08:24:13Z",
"updated_at": "2020-07-20T02:12:37Z",
"pushed_at": "2020-07-19T08:24:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-07-19T17:49:30Z",
"updated_at": "2020-07-20T03:01:10Z",
"pushed_at": "2020-07-17T20:58:16Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"forks": 7,
"watchers": 24,
"watchers": 27,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
"fork": false,
"created_at": "2020-07-14T19:02:25Z",
"updated_at": "2020-07-19T20:38:10Z",
"pushed_at": "2020-07-18T10:32:27Z",
"stargazers_count": 190,
"watchers_count": 190,
"updated_at": "2020-07-20T01:44:16Z",
"pushed_at": "2020-07-20T01:44:14Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 60,
"forks": 60,
"watchers": 190,
"watchers": 191,
"score": 0
},
{
@ -151,8 +151,8 @@
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
"fork": false,
"created_at": "2020-07-15T05:55:20Z",
"updated_at": "2020-07-18T19:50:41Z",
"pushed_at": "2020-07-17T01:20:41Z",
"updated_at": "2020-07-20T02:20:45Z",
"pushed_at": "2020-07-20T02:20:43Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
@ -197,13 +197,13 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2020-07-19T20:53:12Z",
"updated_at": "2020-07-20T02:16:48Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 153,
"watchers_count": 153,
"forks_count": 31,
"forks": 31,
"watchers": 151,
"watchers": 153,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "writeup of CVE-2020-1362",
"fork": false,
"created_at": "2020-07-17T07:35:05Z",
"updated_at": "2020-07-19T18:38:02Z",
"updated_at": "2020-07-20T02:25:04Z",
"pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 22,
"forks": 22,
"watchers": 118,
"watchers": 125,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-19T13:57:13Z",
"updated_at": "2020-07-20T02:12:14Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 512,
"watchers_count": 512,
"stargazers_count": 513,
"watchers_count": 513,
"forks_count": 124,
"forks": 124,
"watchers": 512,
"watchers": 513,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-19T14:53:13Z",
"updated_at": "2020-07-20T03:07:13Z",
"pushed_at": "2020-07-14T10:20:14Z",
"stargazers_count": 1303,
"watchers_count": 1303,
"stargazers_count": 1308,
"watchers_count": 1308,
"forks_count": 325,
"forks": 325,
"watchers": 1303,
"watchers": 1308,
"score": 0
},
{
@ -1071,13 +1071,13 @@
"description": "GUI",
"fork": false,
"created_at": "2020-07-17T03:13:30Z",
"updated_at": "2020-07-18T02:05:18Z",
"updated_at": "2020-07-20T02:32:16Z",
"pushed_at": "2020-07-17T08:09:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2020-07-19T07:12:46Z",
"updated_at": "2020-07-19T21:58:45Z",
"pushed_at": "2020-07-17T14:18:44Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 24,
"forks": 24,
"watchers": 85,
"watchers": 86,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Python exploit of cve-2020-7247",
"fork": false,
"created_at": "2020-01-30T19:29:27Z",
"updated_at": "2020-06-29T16:29:30Z",
"updated_at": "2020-07-19T21:18:23Z",
"pushed_at": "2020-02-19T10:55:15Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 8,
"forks": 8,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13863,6 +13863,14 @@ Liferay Portal through 6.2.10 allows remote authenticated users to execute arbit
## 2009
### CVE-2009-0229
<code>
The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka &quot;Print Spooler Read File Vulnerability.&quot;
</code>
- [zveriu/CVE-2009-0229-PoC](https://github.com/zveriu/CVE-2009-0229-PoC)
### CVE-2009-0473
<code>
@ -13871,13 +13879,47 @@ Open redirect vulnerability in the web interface in the Rockwell Automation Cont
- [akbarq/CVE-2009-0473](https://github.com/akbarq/CVE-2009-0473)
### CVE-2009-0689
<code>
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
</code>
- [Fullmetal5/str2hax](https://github.com/Fullmetal5/str2hax)
### CVE-2009-1151
<code>
Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
</code>
- [minervais/pocs](https://github.com/minervais/pocs)
### CVE-2009-1244
<code>
Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916.
</code>
- [piotrbania/vmware_exploit_pack_CVE-2009-1244](https://github.com/piotrbania/vmware_exploit_pack_CVE-2009-1244)
### CVE-2009-1324
<code>
Stack-based buffer overflow in Mini-stream ASX to MP3 Converter 3.0.0.7 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file.
</code>
- [war4uthor/CVE-2009-1324](https://github.com/war4uthor/CVE-2009-1324)
### CVE-2009-1330
<code>
Stack-based buffer overflow in Easy RM to MP3 Converter allows remote attackers to execute arbitrary code via a long filename in a playlist (.pls) file.
</code>
- [adenkiewicz/CVE-2009-1330](https://github.com/adenkiewicz/CVE-2009-1330)
- [war4uthor/CVE-2009-1330](https://github.com/war4uthor/CVE-2009-1330)
- [exploitwritter/CVE-2009-1330_EasyRMToMp3Converter](https://github.com/exploitwritter/CVE-2009-1330_EasyRMToMp3Converter)
### CVE-2009-1437
@ -13903,6 +13945,14 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- [jdvalentini/CVE-2009-2692](https://github.com/jdvalentini/CVE-2009-2692)
### CVE-2009-2698
<code>
The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
</code>
- [xiaoxiaoleo/CVE-2009-2698](https://github.com/xiaoxiaoleo/CVE-2009-2698)
### CVE-2009-3103
<code>
@ -13927,6 +13977,14 @@ The StartServiceCtrlDispatcher function in the cvpnd service (cvpnd.exe) in Cisc
- [alt3kx/CVE-2009-4118](https://github.com/alt3kx/CVE-2009-4118)
### CVE-2009-4137
<code>
The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does not validate strings obtained from cookies before calling the unserialize function, which allows remote attackers to execute arbitrary code or upload arbitrary files via vectors related to the __destruct function in the Piwik_Config class; php://filter URIs; the __destruct functions in Zend Framework, as demonstrated by the Zend_Log destructor; the shutdown functions in Zend Framework, as demonstrated by the Zend_Log_Writer_Mail class; the render function in the Piwik_View class; Smarty templates; and the _eval function in Smarty.
</code>
- [Alexeyan/CVE-2009-4137](https://github.com/Alexeyan/CVE-2009-4137)
### CVE-2009-4660
<code>
@ -13942,6 +14000,7 @@ DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.
</code>
- [vpereira/CVE-2009-5147](https://github.com/vpereira/CVE-2009-5147)
- [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-)
## 2008