Auto Update 2020/08/15 06:08:54

This commit is contained in:
motikan2010-bot 2020-08-15 06:08:54 +09:00
parent 6838874b48
commit 59a3003f8d
30 changed files with 103 additions and 259 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 168247796,
"name": "CVE-2006-1236",
"full_name": "Axua\/CVE-2006-1236",
"owner": {
"login": "Axua",
"id": 28788087,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
"html_url": "https:\/\/github.com\/Axua"
},
"html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236",
"description": "Exploit script for Crossfire 1.9.0",
"fork": false,
"created_at": "2019-01-29T23:46:59Z",
"updated_at": "2019-01-29T23:50:30Z",
"pushed_at": "2019-01-29T23:50:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 276101400,
"name": "CVE-2006-3392",
"full_name": "Ziani52\/CVE-2006-3392",
"owner": {
"login": "Ziani52",
"id": 53442065,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53442065?v=4",
"html_url": "https:\/\/github.com\/Ziani52"
},
"html_url": "https:\/\/github.com\/Ziani52\/CVE-2006-3392",
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
"fork": false,
"created_at": "2020-06-30T13:07:31Z",
"updated_at": "2020-08-05T16:17:06Z",
"pushed_at": "2020-06-30T22:21:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 186166548,
"name": "CVE-2006-3592",
"full_name": "adenkiewicz\/CVE-2006-3592",
"owner": {
"login": "adenkiewicz",
"id": 1060275,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4",
"html_url": "https:\/\/github.com\/adenkiewicz"
},
"html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2006-3592",
"description": "Exploit for Easy File Sharing FTP Server 3.5 on Win7 32",
"fork": false,
"created_at": "2019-05-11T18:11:34Z",
"updated_at": "2019-05-11T18:12:45Z",
"pushed_at": "2019-05-11T18:12:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 63907042,
"name": "cve-2006-6184",
"full_name": "shauntdergrigorian\/cve-2006-6184",
"owner": {
"login": "shauntdergrigorian",
"id": 7718028,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7718028?v=4",
"html_url": "https:\/\/github.com\/shauntdergrigorian"
},
"html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
"description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.",
"fork": false,
"created_at": "2016-07-21T22:43:43Z",
"updated_at": "2020-08-05T03:19:30Z",
"pushed_at": "2016-07-22T15:12:43Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks": 8,
"watchers": 10,
"score": 0
},
{
"id": 205628184,
"name": "CVE-2006-6184",
"full_name": "b03902043\/CVE-2006-6184",
"owner": {
"login": "b03902043",
"id": 9023845,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9023845?v=4",
"html_url": "https:\/\/github.com\/b03902043"
},
"html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184",
"description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
"fork": false,
"created_at": "2019-09-01T04:18:53Z",
"updated_at": "2019-09-01T04:23:25Z",
"pushed_at": "2019-09-01T04:23:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC Java exploit based on http:\/\/www.contextis.com\/research\/blog\/java-pwn2own\/",
"fork": false,
"created_at": "2015-04-16T07:12:19Z",
"updated_at": "2019-11-12T04:55:13Z",
"updated_at": "2020-08-14T20:04:22Z",
"pushed_at": "2015-04-16T07:12:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploiting CVE-2016-0040 uninitialized pointer",
"fork": false,
"created_at": "2016-02-26T18:00:30Z",
"updated_at": "2020-04-28T11:12:49Z",
"updated_at": "2020-08-14T17:05:54Z",
"pushed_at": "2016-07-17T07:59:10Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 28,
"forks": 28,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2020-08-04T01:19:49Z",
"updated_at": "2020-08-14T20:56:38Z",
"pushed_at": "2017-09-27T02:35:13Z",
"stargazers_count": 830,
"watchers_count": 830,
"stargazers_count": 829,
"watchers_count": 829,
"forks_count": 396,
"forks": 396,
"watchers": 830,
"watchers": 829,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "A code demonstrating CVE-2018-0886",
"fork": false,
"created_at": "2018-04-02T12:52:07Z",
"updated_at": "2020-07-27T02:51:20Z",
"pushed_at": "2018-06-02T10:33:41Z",
"updated_at": "2020-08-14T16:33:46Z",
"pushed_at": "2020-08-14T16:33:44Z",
"stargazers_count": 243,
"watchers_count": 243,
"forks_count": 59,

View file

@ -59,13 +59,13 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2020-08-02T05:35:01Z",
"updated_at": "2020-08-14T20:12:05Z",
"pushed_at": "2020-03-06T10:52:19Z",
"stargazers_count": 411,
"watchers_count": 411,
"stargazers_count": 412,
"watchers_count": 412,
"forks_count": 134,
"forks": 134,
"watchers": 411,
"watchers": 412,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2020-08-04T07:00:10Z",
"updated_at": "2020-08-14T16:36:24Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 422,
"watchers_count": 422,
"stargazers_count": 423,
"watchers_count": 423,
"forks_count": 178,
"forks": 178,
"watchers": 422,
"watchers": 423,
"score": 0
},
{

View file

@ -24,20 +24,20 @@
},
{
"id": 287558673,
"name": "s2-059-cve-2019-0230",
"full_name": "cellanu\/s2-059-cve-2019-0230",
"name": "cve-2019-0230",
"full_name": "cellanu\/cve-2019-0230",
"owner": {
"login": "cellanu",
"id": 65203371,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/65203371?v=4",
"html_url": "https:\/\/github.com\/cellanu"
},
"html_url": "https:\/\/github.com\/cellanu\/s2-059-cve-2019-0230",
"html_url": "https:\/\/github.com\/cellanu\/cve-2019-0230",
"description": "s2-059漏洞环境加验证",
"fork": false,
"created_at": "2020-08-14T15:00:03Z",
"updated_at": "2020-08-14T15:00:08Z",
"pushed_at": "2020-08-14T15:00:05Z",
"updated_at": "2020-08-14T16:08:25Z",
"pushed_at": "2020-08-14T16:08:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-08-12T14:11:11Z",
"updated_at": "2020-08-14T17:11:57Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1600,
"watchers_count": 1600,
"stargazers_count": 1601,
"watchers_count": 1601,
"forks_count": 232,
"forks": 232,
"watchers": 1600,
"watchers": 1601,
"score": 0
},
{

View file

@ -266,13 +266,13 @@
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
"fork": false,
"created_at": "2020-04-22T21:11:27Z",
"updated_at": "2020-07-07T11:57:00Z",
"updated_at": "2020-08-14T17:56:50Z",
"pushed_at": "2020-04-28T04:25:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-09-24T02:06:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 1,
"score": 0
}

View file

@ -197,13 +197,13 @@
"description": "Vbulletin RCE Exploit",
"fork": false,
"created_at": "2020-08-13T19:11:37Z",
"updated_at": "2020-08-14T08:01:15Z",
"updated_at": "2020-08-14T17:08:37Z",
"pushed_at": "2020-08-14T08:01:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-14T13:16:14Z",
"updated_at": "2020-08-14T15:46:55Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1483,
"watchers_count": 1483,
"forks_count": 379,
"forks": 379,
"watchers": 1483,
"stargazers_count": 1484,
"watchers_count": 1484,
"forks_count": 380,
"forks": 380,
"watchers": 1484,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-07-14T04:37:00Z",
"updated_at": "2020-08-14T17:11:28Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 23,
"forks": 23,
"watchers": 126,
"watchers": 127,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 495,
"watchers_count": 495,
"forks_count": 118,
"forks": 118,
"forks_count": 119,
"forks": 119,
"watchers": 495,
"score": 0
},
@ -109,8 +109,8 @@
"pushed_at": "2020-01-11T14:03:52Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 18,
"forks": 18,
"forks_count": 19,
"forks": 19,
"watchers": 67,
"score": 0
},

View file

@ -132,8 +132,8 @@
"pushed_at": "2020-04-14T07:04:15Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 26,
"score": 0
},

View file

@ -14,11 +14,11 @@
"fork": false,
"created_at": "2019-02-21T22:49:53Z",
"updated_at": "2020-07-03T07:56:48Z",
"pushed_at": "2020-07-03T07:56:56Z",
"pushed_at": "2020-08-14T20:41:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"score": 0
}

View file

@ -496,13 +496,13 @@
"description": "PoC for CVE-2020-0601 - CryptoAPI exploit",
"fork": false,
"created_at": "2020-01-28T21:24:54Z",
"updated_at": "2020-03-24T05:22:40Z",
"updated_at": "2020-08-14T20:36:50Z",
"pushed_at": "2020-01-28T22:06:57Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 2,
"forks": 2,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -220,13 +220,13 @@
"description": "PoC for Forgot2kEyXCHANGE (CVE-2020-0688) written in PowerShell",
"fork": false,
"created_at": "2020-03-04T22:02:30Z",
"updated_at": "2020-05-18T10:43:41Z",
"updated_at": "2020-08-14T17:15:13Z",
"pushed_at": "2020-03-05T08:02:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -427,13 +427,13 @@
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
"fork": false,
"created_at": "2020-03-12T19:33:18Z",
"updated_at": "2020-08-05T16:26:23Z",
"updated_at": "2020-08-14T20:35:45Z",
"pushed_at": "2020-03-13T07:38:43Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 21,
"forks": 21,
"watchers": 50,
"watchers": 51,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Telia Technicolor TG389ac v.17.1.7992 Samba privilege escalation exploit",
"fork": false,
"created_at": "2020-08-14T11:47:37Z",
"updated_at": "2020-08-14T13:06:21Z",
"pushed_at": "2020-08-14T14:34:52Z",
"updated_at": "2020-08-14T17:50:58Z",
"pushed_at": "2020-08-14T17:50:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-03T18:55:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false,
"created_at": "2020-07-21T08:01:20Z",
"updated_at": "2020-08-14T13:50:23Z",
"updated_at": "2020-08-14T17:23:57Z",
"pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 103,
"watchers_count": 103,
"forks_count": 17,
"forks": 17,
"watchers": 101,
"watchers": 103,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false,
"created_at": "2020-08-12T10:05:36Z",
"updated_at": "2020-08-14T13:02:06Z",
"updated_at": "2020-08-14T19:04:18Z",
"pushed_at": "2020-08-13T07:16:12Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 24,
"forks": 24,
"watchers": 90,
"watchers": 94,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
"fork": false,
"created_at": "2020-07-20T03:27:24Z",
"updated_at": "2020-08-06T16:06:09Z",
"updated_at": "2020-08-14T19:16:57Z",
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 9,
"forks": 9,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-14T13:16:14Z",
"updated_at": "2020-08-14T15:46:55Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1483,
"watchers_count": 1483,
"forks_count": 379,
"forks": 379,
"watchers": 1483,
"stargazers_count": 1484,
"watchers_count": 1484,
"forks_count": 380,
"forks": 380,
"watchers": 1484,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-08-04T09:20:20Z",
"updated_at": "2020-08-14T18:23:15Z",
"pushed_at": "2020-07-15T02:52:33Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 92,
"forks": 92,
"watchers": 302,
"watchers": 301,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Pi-hole Remote Code Execution authenticated Version >= 4.3.2",
"fork": false,
"created_at": "2020-08-04T10:23:28Z",
"updated_at": "2020-08-08T12:27:52Z",
"updated_at": "2020-08-14T19:08:37Z",
"pushed_at": "2020-08-05T22:38:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -1961,7 +1961,7 @@ A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4
### CVE-2019-0230
- [xiyan123/CVE-2019-0230](https://github.com/xiyan123/CVE-2019-0230)
- [cellanu/s2-059-cve-2019-0230](https://github.com/cellanu/s2-059-cve-2019-0230)
- [cellanu/cve-2019-0230](https://github.com/cellanu/cve-2019-0230)
### CVE-2019-0232
@ -14591,30 +14591,6 @@ March Networks DVR 3204 stores sensitive information under the web root with ins
## 2006
### CVE-2006-1236
<code>
Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 allows remote attackers to execute arbitrary code via a long setup sound command, a different vulnerability than CVE-2006-1010.
</code>
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
### CVE-2006-3392
<code>
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using &quot;..%01&quot; sequences, which bypass the removal of &quot;../&quot; sequences before bytes such as &quot;%01&quot; are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
</code>
- [Ziani52/CVE-2006-3392](https://github.com/Ziani52/CVE-2006-3392)
### CVE-2006-3592
<code>
Unspecified vulnerability in the command line interface (CLI) in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows local users to execute arbitrary commands with elevated privileges via unspecified vectors, involving &quot;certain CLI commands,&quot; aka bug CSCse11005.
</code>
- [adenkiewicz/CVE-2006-3592](https://github.com/adenkiewicz/CVE-2006-3592)
### CVE-2006-3747
<code>
@ -14639,15 +14615,6 @@ The mincore function in the Linux kernel before 2.4.33.6 does not properly lock
- [tagatac/linux-CVE-2006-4814](https://github.com/tagatac/linux-CVE-2006-4814)
### CVE-2006-6184
<code>
Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
</code>
- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184)
- [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184)
## 2005
### CVE-2005-1125