From 587d24b0598688ca32bf4f7395c417e1d6fbe4b8 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 20 Jul 2020 12:08:27 +0900 Subject: [PATCH] Auto Update 2020/07/20 12:08:27 --- 2009/CVE-2009-0229.json | 25 +++++++++++++++++ 2009/CVE-2009-0689.json | 25 +++++++++++++++++ 2009/CVE-2009-1151.json | 25 +++++++++++++++++ 2009/CVE-2009-1244.json | 25 +++++++++++++++++ 2009/CVE-2009-1324.json | 25 +++++++++++++++++ 2009/CVE-2009-1330.json | 46 +++++++++++++++++++++++++++++++ 2009/CVE-2009-2698.json | 25 +++++++++++++++++ 2009/CVE-2009-4137.json | 25 +++++++++++++++++ 2009/CVE-2009-5147.json | 23 ++++++++++++++++ 2014/CVE-2014-4210.json | 8 +++--- 2016/CVE-2016-0638.json | 8 +++--- 2016/CVE-2016-4622.json | 4 +-- 2016/CVE-2016-9920.json | 8 +++--- 2017/CVE-2017-11882.json | 8 +++--- 2017/CVE-2017-3248.json | 8 +++--- 2018/CVE-2018-2628.json | 8 +++--- 2018/CVE-2018-4233.json | 4 +-- 2019/CVE-2019-0193.json | 8 +++--- 2019/CVE-2019-17558.json | 8 +++--- 2019/CVE-2019-2618.json | 16 +++++------ 2020/CVE-2020-0796.json | 8 +++--- 2020/CVE-2020-1054.json | 12 ++++---- 2020/CVE-2020-1350.json | 30 ++++++++++---------- 2020/CVE-2020-1362.json | 8 +++--- 2020/CVE-2020-2551.json | 8 +++--- 2020/CVE-2020-5902.json | 16 +++++------ 2020/CVE-2020-6287.json | 8 +++--- 2020/CVE-2020-7247.json | 8 +++--- README.md | 59 ++++++++++++++++++++++++++++++++++++++++ 29 files changed, 396 insertions(+), 93 deletions(-) create mode 100644 2009/CVE-2009-0229.json create mode 100644 2009/CVE-2009-0689.json create mode 100644 2009/CVE-2009-1151.json create mode 100644 2009/CVE-2009-1244.json create mode 100644 2009/CVE-2009-1324.json create mode 100644 2009/CVE-2009-2698.json create mode 100644 2009/CVE-2009-4137.json diff --git a/2009/CVE-2009-0229.json b/2009/CVE-2009-0229.json new file mode 100644 index 0000000000..72d012c2f3 --- /dev/null +++ b/2009/CVE-2009-0229.json @@ -0,0 +1,25 @@ +[ + { + "id": 264008888, + "name": "CVE-2009-0229-PoC", + "full_name": "zveriu\/CVE-2009-0229-PoC", + "owner": { + "login": "zveriu", + "id": 3428446, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3428446?v=4", + "html_url": "https:\/\/github.com\/zveriu" + }, + "html_url": "https:\/\/github.com\/zveriu\/CVE-2009-0229-PoC", + "description": "PoC for CVE-2009-0229 \"Print Spooler Read File Vulnerability\" LPE AFR (related to CVE-2020-1048)", + "fork": false, + "created_at": "2020-05-14T19:40:50Z", + "updated_at": "2020-05-20T20:29:49Z", + "pushed_at": "2020-05-15T11:32:42Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2009/CVE-2009-0689.json b/2009/CVE-2009-0689.json new file mode 100644 index 0000000000..402abbca20 --- /dev/null +++ b/2009/CVE-2009-0689.json @@ -0,0 +1,25 @@ +[ + { + "id": 162229782, + "name": "str2hax", + "full_name": "Fullmetal5\/str2hax", + "owner": { + "login": "Fullmetal5", + "id": 3742968, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3742968?v=4", + "html_url": "https:\/\/github.com\/Fullmetal5" + }, + "html_url": "https:\/\/github.com\/Fullmetal5\/str2hax", + "description": "An implementation of CVE-2009-0689 for the Nintendo Wii.", + "fork": false, + "created_at": "2018-12-18T04:24:43Z", + "updated_at": "2020-07-13T19:50:36Z", + "pushed_at": "2019-09-30T23:38:11Z", + "stargazers_count": 27, + "watchers_count": 27, + "forks_count": 4, + "forks": 4, + "watchers": 27, + "score": 0 + } +] \ No newline at end of file diff --git a/2009/CVE-2009-1151.json b/2009/CVE-2009-1151.json new file mode 100644 index 0000000000..c02f65819b --- /dev/null +++ b/2009/CVE-2009-1151.json @@ -0,0 +1,25 @@ +[ + { + "id": 120135334, + "name": "pocs", + "full_name": "minervais\/pocs", + "owner": { + "login": "minervais", + "id": 47587685, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/47587685?v=4", + "html_url": "https:\/\/github.com\/minervais" + }, + "html_url": "https:\/\/github.com\/minervais\/pocs", + "description": "phpMyAdmin '\/scripts\/setup.php' PHP Code Injection RCE PoC (CVE-2009-1151)", + "fork": false, + "created_at": "2018-02-03T22:26:09Z", + "updated_at": "2019-08-28T02:14:03Z", + "pushed_at": "2019-07-18T20:27:09Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2009/CVE-2009-1244.json b/2009/CVE-2009-1244.json new file mode 100644 index 0000000000..de05e8ad94 --- /dev/null +++ b/2009/CVE-2009-1244.json @@ -0,0 +1,25 @@ +[ + { + "id": 191334884, + "name": "vmware_exploit_pack_CVE-2009-1244", + "full_name": "piotrbania\/vmware_exploit_pack_CVE-2009-1244", + "owner": { + "login": "piotrbania", + "id": 51699228, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51699228?v=4", + "html_url": "https:\/\/github.com\/piotrbania" + }, + "html_url": "https:\/\/github.com\/piotrbania\/vmware_exploit_pack_CVE-2009-1244", + "description": "vmware cloudburst exploit CVE-2009-1244", + "fork": false, + "created_at": "2019-06-11T09:08:52Z", + "updated_at": "2020-04-14T09:22:50Z", + "pushed_at": "2019-06-11T13:49:03Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2009/CVE-2009-1324.json b/2009/CVE-2009-1324.json new file mode 100644 index 0000000000..b31af1ed1f --- /dev/null +++ b/2009/CVE-2009-1324.json @@ -0,0 +1,25 @@ +[ + { + "id": 164303291, + "name": "CVE-2009-1324", + "full_name": "war4uthor\/CVE-2009-1324", + "owner": { + "login": "war4uthor", + "id": 45926018, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45926018?v=4", + "html_url": "https:\/\/github.com\/war4uthor" + }, + "html_url": "https:\/\/github.com\/war4uthor\/CVE-2009-1324", + "description": "CVE-2009-1324 - ASX to MP3 Converter Local Buffer Overflow. Tested on Windows XP Professional SP3", + "fork": false, + "created_at": "2019-01-06T12:06:15Z", + "updated_at": "2019-01-06T12:30:37Z", + "pushed_at": "2019-01-06T12:30:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2009/CVE-2009-1330.json b/2009/CVE-2009-1330.json index 339186b574..39109d701a 100644 --- a/2009/CVE-2009-1330.json +++ b/2009/CVE-2009-1330.json @@ -1,4 +1,27 @@ [ + { + "id": 163585014, + "name": "CVE-2009-1330", + "full_name": "adenkiewicz\/CVE-2009-1330", + "owner": { + "login": "adenkiewicz", + "id": 1060275, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4", + "html_url": "https:\/\/github.com\/adenkiewicz" + }, + "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2009-1330", + "description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.", + "fork": false, + "created_at": "2018-12-30T12:17:08Z", + "updated_at": "2018-12-31T10:09:34Z", + "pushed_at": "2018-12-31T09:59:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 164236833, "name": "CVE-2009-1330", @@ -21,5 +44,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 171340357, + "name": "CVE-2009-1330_EasyRMToMp3Converter", + "full_name": "exploitwritter\/CVE-2009-1330_EasyRMToMp3Converter", + "owner": { + "login": "exploitwritter", + "id": 47488127, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/47488127?v=4", + "html_url": "https:\/\/github.com\/exploitwritter" + }, + "html_url": "https:\/\/github.com\/exploitwritter\/CVE-2009-1330_EasyRMToMp3Converter", + "description": "Easy RM to MP3 Converter es un software que sufre de una vulnerabiliad de desbordamiento de buffer basada en la pila o StackBufferOverflow lo cual puede permite a los atacantes remotos ejecutar código arbitrario a través de un nombre de archivo largo en un archivo de lista de reproducción (.pls)", + "fork": false, + "created_at": "2019-02-18T19:07:02Z", + "updated_at": "2019-02-28T20:19:32Z", + "pushed_at": "2019-02-28T20:19:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2009/CVE-2009-2698.json b/2009/CVE-2009-2698.json new file mode 100644 index 0000000000..fb5df0cf47 --- /dev/null +++ b/2009/CVE-2009-2698.json @@ -0,0 +1,25 @@ +[ + { + "id": 121771822, + "name": "CVE-2009-2698", + "full_name": "xiaoxiaoleo\/CVE-2009-2698", + "owner": { + "login": "xiaoxiaoleo", + "id": 9813186, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9813186?v=4", + "html_url": "https:\/\/github.com\/xiaoxiaoleo" + }, + "html_url": "https:\/\/github.com\/xiaoxiaoleo\/CVE-2009-2698", + "description": "CVE-2009-2698 compiled for CentOS 4.8", + "fork": false, + "created_at": "2018-02-16T16:17:24Z", + "updated_at": "2018-03-12T20:07:49Z", + "pushed_at": "2018-02-16T16:30:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2009/CVE-2009-4137.json b/2009/CVE-2009-4137.json new file mode 100644 index 0000000000..82a196bbb7 --- /dev/null +++ b/2009/CVE-2009-4137.json @@ -0,0 +1,25 @@ +[ + { + "id": 112379736, + "name": "CVE-2009-4137", + "full_name": "Alexeyan\/CVE-2009-4137", + "owner": { + "login": "Alexeyan", + "id": 6674109, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6674109?v=4", + "html_url": "https:\/\/github.com\/Alexeyan" + }, + "html_url": "https:\/\/github.com\/Alexeyan\/CVE-2009-4137", + "description": "Exploit for piwik CVE-2009-4140 RCE", + "fork": false, + "created_at": "2017-11-28T19:31:47Z", + "updated_at": "2019-12-19T19:46:29Z", + "pushed_at": "2018-01-15T10:40:23Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 3, + "forks": 3, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2009/CVE-2009-5147.json b/2009/CVE-2009-5147.json index 8175461fe0..e4a7718767 100644 --- a/2009/CVE-2009-5147.json +++ b/2009/CVE-2009-5147.json @@ -21,5 +21,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 183373457, + "name": "-Ruby-dl-handle.c-CVE-2009-5147-", + "full_name": "zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-", + "owner": { + "login": "zhangyongbo100", + "id": 49974023, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/49974023?v=4", + "html_url": "https:\/\/github.com\/zhangyongbo100" + }, + "html_url": "https:\/\/github.com\/zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-", + "description": null, + "fork": false, + "created_at": "2019-04-25T06:46:50Z", + "updated_at": "2020-05-20T03:19:01Z", + "pushed_at": "2019-04-25T06:49:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 884a7d9931..ae7f79c2d8 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-19T13:57:13Z", + "updated_at": "2020-07-20T02:12:14Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 512, - "watchers_count": 512, + "stargazers_count": 513, + "watchers_count": 513, "forks_count": 124, "forks": 124, - "watchers": 512, + "watchers": 513, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index ad02d7a75e..8ac680e81d 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-19T13:57:13Z", + "updated_at": "2020-07-20T02:12:14Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 512, - "watchers_count": 512, + "stargazers_count": 513, + "watchers_count": 513, "forks_count": 124, "forks": 124, - "watchers": 512, + "watchers": 513, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-4622.json b/2016/CVE-2016-4622.json index b1f07520b9..93c7e00180 100644 --- a/2016/CVE-2016-4622.json +++ b/2016/CVE-2016-4622.json @@ -17,8 +17,8 @@ "pushed_at": "2016-10-27T20:23:15Z", "stargazers_count": 75, "watchers_count": 75, - "forks_count": 36, - "forks": 36, + "forks_count": 35, + "forks": 35, "watchers": 75, "score": 0 }, diff --git a/2016/CVE-2016-9920.json b/2016/CVE-2016-9920.json index 4e5c906050..9bc2c781e2 100644 --- a/2016/CVE-2016-9920.json +++ b/2016/CVE-2016-9920.json @@ -13,13 +13,13 @@ "description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-06T17:55:44Z", - "updated_at": "2020-05-31T12:46:32Z", + "updated_at": "2020-07-19T22:56:31Z", "pushed_at": "2017-01-06T23:34:03Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "forks_count": 12, "forks": 12, - "watchers": 34, + "watchers": 35, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index fa911865e7..a3c7b9792f 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -59,13 +59,13 @@ "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "fork": false, "created_at": "2017-11-21T05:55:53Z", - "updated_at": "2020-07-19T12:17:54Z", + "updated_at": "2020-07-20T02:44:01Z", "pushed_at": "2017-11-29T03:33:53Z", - "stargazers_count": 465, - "watchers_count": 465, + "stargazers_count": 466, + "watchers_count": 466, "forks_count": 242, "forks": 242, - "watchers": 465, + "watchers": 466, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index e8586ded44..50fcefc390 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-19T13:57:13Z", + "updated_at": "2020-07-20T02:12:14Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 512, - "watchers_count": 512, + "stargazers_count": 513, + "watchers_count": 513, "forks_count": 124, "forks": 124, - "watchers": 512, + "watchers": 513, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index fb2b8b3d9b..01847f5b82 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-19T13:57:13Z", + "updated_at": "2020-07-20T02:12:14Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 512, - "watchers_count": 512, + "stargazers_count": 513, + "watchers_count": 513, "forks_count": 124, "forks": 124, - "watchers": 512, + "watchers": 513, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index 4d7476eef5..af2941d2ca 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -17,8 +17,8 @@ "pushed_at": "2018-08-17T23:31:46Z", "stargazers_count": 152, "watchers_count": 152, - "forks_count": 31, - "forks": 31, + "forks_count": 30, + "forks": 30, "watchers": 152, "score": 0 } diff --git a/2019/CVE-2019-0193.json b/2019/CVE-2019-0193.json index 13588498d6..dc21a9e044 100644 --- a/2019/CVE-2019-0193.json +++ b/2019/CVE-2019-0193.json @@ -59,13 +59,13 @@ "description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit", "fork": false, "created_at": "2019-08-12T07:17:21Z", - "updated_at": "2020-07-19T01:02:22Z", + "updated_at": "2020-07-20T00:49:33Z", "pushed_at": "2020-07-08T06:51:47Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 6, "forks": 6, - "watchers": 28, + "watchers": 29, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 09a25ffba1..3a8842dad2 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-07-19T14:53:13Z", + "updated_at": "2020-07-20T03:07:13Z", "pushed_at": "2020-07-14T10:20:14Z", - "stargazers_count": 1303, - "watchers_count": 1303, + "stargazers_count": 1308, + "watchers_count": 1308, "forks_count": 325, "forks": 325, - "watchers": 1303, + "watchers": 1308, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 7ba83e3159..431b82db0b 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2020-07-18T19:31:23Z", + "updated_at": "2020-07-20T01:48:31Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 613, - "watchers_count": 613, + "stargazers_count": 614, + "watchers_count": 614, "forks_count": 132, "forks": 132, - "watchers": 613, + "watchers": 614, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-19T13:57:13Z", + "updated_at": "2020-07-20T02:12:14Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 512, - "watchers_count": 512, + "stargazers_count": 513, + "watchers_count": 513, "forks_count": 124, "forks": 124, - "watchers": 512, + "watchers": 513, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index e7e2f7db71..ec59a09eec 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1439,13 +1439,13 @@ "description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner", "fork": false, "created_at": "2020-07-06T14:45:07Z", - "updated_at": "2020-07-12T22:42:23Z", + "updated_at": "2020-07-19T22:04:24Z", "pushed_at": "2020-07-06T19:00:06Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 4, "forks": 4, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2020/CVE-2020-1054.json b/2020/CVE-2020-1054.json index dd86a302c6..f9ed5ffb8d 100644 --- a/2020/CVE-2020-1054.json +++ b/2020/CVE-2020-1054.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2020-07-19T08:20:57Z", - "updated_at": "2020-07-19T08:24:13Z", + "updated_at": "2020-07-20T02:12:37Z", "pushed_at": "2020-07-19T08:24:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index edf0dc0171..b329ee89fd 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -13,13 +13,13 @@ "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST", "fork": false, "created_at": "2020-03-11T17:51:29Z", - "updated_at": "2020-07-19T17:49:30Z", + "updated_at": "2020-07-20T03:01:10Z", "pushed_at": "2020-07-17T20:58:16Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 27, + "watchers_count": 27, "forks_count": 7, "forks": 7, - "watchers": 24, + "watchers": 27, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.", "fork": false, "created_at": "2020-07-14T19:02:25Z", - "updated_at": "2020-07-19T20:38:10Z", - "pushed_at": "2020-07-18T10:32:27Z", - "stargazers_count": 190, - "watchers_count": 190, + "updated_at": "2020-07-20T01:44:16Z", + "pushed_at": "2020-07-20T01:44:14Z", + "stargazers_count": 191, + "watchers_count": 191, "forks_count": 60, "forks": 60, - "watchers": 190, + "watchers": 191, "score": 0 }, { @@ -151,8 +151,8 @@ "description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)", "fork": false, "created_at": "2020-07-15T05:55:20Z", - "updated_at": "2020-07-18T19:50:41Z", - "pushed_at": "2020-07-17T01:20:41Z", + "updated_at": "2020-07-20T02:20:45Z", + "pushed_at": "2020-07-20T02:20:43Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, @@ -197,13 +197,13 @@ "description": "A denial-of-service proof-of-concept for CVE-2020-1350", "fork": false, "created_at": "2020-07-15T23:00:00Z", - "updated_at": "2020-07-19T20:53:12Z", + "updated_at": "2020-07-20T02:16:48Z", "pushed_at": "2020-07-17T13:07:29Z", - "stargazers_count": 151, - "watchers_count": 151, + "stargazers_count": 153, + "watchers_count": 153, "forks_count": 31, "forks": 31, - "watchers": 151, + "watchers": 153, "score": 0 }, { diff --git a/2020/CVE-2020-1362.json b/2020/CVE-2020-1362.json index 940b601a73..773f852fef 100644 --- a/2020/CVE-2020-1362.json +++ b/2020/CVE-2020-1362.json @@ -13,13 +13,13 @@ "description": "writeup of CVE-2020-1362", "fork": false, "created_at": "2020-07-17T07:35:05Z", - "updated_at": "2020-07-19T18:38:02Z", + "updated_at": "2020-07-20T02:25:04Z", "pushed_at": "2020-07-17T07:54:26Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 125, + "watchers_count": 125, "forks_count": 22, "forks": 22, - "watchers": 118, + "watchers": 125, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index c07578f255..0de6e9062f 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-19T13:57:13Z", + "updated_at": "2020-07-20T02:12:14Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 512, - "watchers_count": 512, + "stargazers_count": 513, + "watchers_count": 513, "forks_count": 124, "forks": 124, - "watchers": 512, + "watchers": 513, "score": 0 }, { diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index afc2919f8b..3377c7f98e 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-07-19T14:53:13Z", + "updated_at": "2020-07-20T03:07:13Z", "pushed_at": "2020-07-14T10:20:14Z", - "stargazers_count": 1303, - "watchers_count": 1303, + "stargazers_count": 1308, + "watchers_count": 1308, "forks_count": 325, "forks": 325, - "watchers": 1303, + "watchers": 1308, "score": 0 }, { @@ -1071,13 +1071,13 @@ "description": "GUI", "fork": false, "created_at": "2020-07-17T03:13:30Z", - "updated_at": "2020-07-18T02:05:18Z", + "updated_at": "2020-07-20T02:32:16Z", "pushed_at": "2020-07-17T08:09:30Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json index 1fbc2529ae..0d913b54e2 100644 --- a/2020/CVE-2020-6287.json +++ b/2020/CVE-2020-6287.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)", "fork": false, "created_at": "2020-07-15T15:20:09Z", - "updated_at": "2020-07-19T07:12:46Z", + "updated_at": "2020-07-19T21:58:45Z", "pushed_at": "2020-07-17T14:18:44Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "forks_count": 24, "forks": 24, - "watchers": 85, + "watchers": 86, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7247.json b/2020/CVE-2020-7247.json index f8c5a83c41..d621dc7d8d 100644 --- a/2020/CVE-2020-7247.json +++ b/2020/CVE-2020-7247.json @@ -13,13 +13,13 @@ "description": "Python exploit of cve-2020-7247", "fork": false, "created_at": "2020-01-30T19:29:27Z", - "updated_at": "2020-06-29T16:29:30Z", + "updated_at": "2020-07-19T21:18:23Z", "pushed_at": "2020-02-19T10:55:15Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 8, "forks": 8, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/README.md b/README.md index e82c9eae06..b9e6436f95 100644 --- a/README.md +++ b/README.md @@ -13863,6 +13863,14 @@ Liferay Portal through 6.2.10 allows remote authenticated users to execute arbit ## 2009 +### CVE-2009-0229 + + +The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability." + + +- [zveriu/CVE-2009-0229-PoC](https://github.com/zveriu/CVE-2009-0229-PoC) + ### CVE-2009-0473 @@ -13871,13 +13879,47 @@ Open redirect vulnerability in the web interface in the Rockwell Automation Cont - [akbarq/CVE-2009-0473](https://github.com/akbarq/CVE-2009-0473) +### CVE-2009-0689 + + +Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number. + + +- [Fullmetal5/str2hax](https://github.com/Fullmetal5/str2hax) + +### CVE-2009-1151 + + +Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. + + +- [minervais/pocs](https://github.com/minervais/pocs) + +### CVE-2009-1244 + + +Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916. + + +- [piotrbania/vmware_exploit_pack_CVE-2009-1244](https://github.com/piotrbania/vmware_exploit_pack_CVE-2009-1244) + +### CVE-2009-1324 + + +Stack-based buffer overflow in Mini-stream ASX to MP3 Converter 3.0.0.7 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file. + + +- [war4uthor/CVE-2009-1324](https://github.com/war4uthor/CVE-2009-1324) + ### CVE-2009-1330 Stack-based buffer overflow in Easy RM to MP3 Converter allows remote attackers to execute arbitrary code via a long filename in a playlist (.pls) file. +- [adenkiewicz/CVE-2009-1330](https://github.com/adenkiewicz/CVE-2009-1330) - [war4uthor/CVE-2009-1330](https://github.com/war4uthor/CVE-2009-1330) +- [exploitwritter/CVE-2009-1330_EasyRMToMp3Converter](https://github.com/exploitwritter/CVE-2009-1330_EasyRMToMp3Converter) ### CVE-2009-1437 @@ -13903,6 +13945,14 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in - [jdvalentini/CVE-2009-2692](https://github.com/jdvalentini/CVE-2009-2692) +### CVE-2009-2698 + + +The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket. + + +- [xiaoxiaoleo/CVE-2009-2698](https://github.com/xiaoxiaoleo/CVE-2009-2698) + ### CVE-2009-3103 @@ -13927,6 +13977,14 @@ The StartServiceCtrlDispatcher function in the cvpnd service (cvpnd.exe) in Cisc - [alt3kx/CVE-2009-4118](https://github.com/alt3kx/CVE-2009-4118) +### CVE-2009-4137 + + +The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does not validate strings obtained from cookies before calling the unserialize function, which allows remote attackers to execute arbitrary code or upload arbitrary files via vectors related to the __destruct function in the Piwik_Config class; php://filter URIs; the __destruct functions in Zend Framework, as demonstrated by the Zend_Log destructor; the shutdown functions in Zend Framework, as demonstrated by the Zend_Log_Writer_Mail class; the render function in the Piwik_View class; Smarty templates; and the _eval function in Smarty. + + +- [Alexeyan/CVE-2009-4137](https://github.com/Alexeyan/CVE-2009-4137) + ### CVE-2009-4660 @@ -13942,6 +14000,7 @@ DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2. - [vpereira/CVE-2009-5147](https://github.com/vpereira/CVE-2009-5147) +- [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-) ## 2008