Auto Update 2020/02/27 06:07:50

This commit is contained in:
motikan2010-bot 2020-02-27 06:07:50 +09:00
parent 20e9152bf1
commit 5efc5c1be3
22 changed files with 129 additions and 129 deletions

View file

@ -1,27 +1,4 @@
[
{
"id": 29914821,
"name": "jboss-autopwn",
"full_name": "ChristianPapathanasiou\/jboss-autopwn",
"owner": {
"login": "ChristianPapathanasiou",
"id": 5354349,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5354349?v=4",
"html_url": "https:\/\/github.com\/ChristianPapathanasiou"
},
"html_url": "https:\/\/github.com\/ChristianPapathanasiou\/jboss-autopwn",
"description": "JBoss Autopwn as featured at BlackHat Europe 2010 - this version incorporates CVE-2010-0738 the JBoss authentication bypass VERB manipulation vulnerability as discovered by Minded Security",
"fork": false,
"created_at": "2015-01-27T13:16:45Z",
"updated_at": "2020-01-13T09:44:30Z",
"pushed_at": "2015-01-27T13:23:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"forks": 7,
"watchers": 11,
"score": 0
},
{
"id": 62456741,
"name": "jboss-autopwn",

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2020-02-16T09:48:12Z",
"updated_at": "2020-02-26T20:35:52Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2238,
"watchers_count": 2238,
"forks_count": 484,
"forks": 484,
"watchers": 2238,
"stargazers_count": 2239,
"watchers_count": 2239,
"forks_count": 485,
"forks": 485,
"watchers": 2239,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-26T13:26:56Z",
"updated_at": "2020-02-26T20:33:13Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 233,
"watchers_count": 233,
"forks_count": 41,
"forks": 41,
"watchers": 233,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 42,
"forks": 42,
"watchers": 235,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-26T13:26:56Z",
"updated_at": "2020-02-26T20:33:13Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 233,
"watchers_count": 233,
"forks_count": 41,
"forks": 41,
"watchers": 233,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 42,
"forks": 42,
"watchers": 235,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 613,
"watchers_count": 613,
"forks_count": 273,
"forks": 273,
"forks_count": 274,
"forks": 274,
"watchers": 613,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-26T13:26:56Z",
"updated_at": "2020-02-26T20:33:13Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 233,
"watchers_count": 233,
"forks_count": 41,
"forks": 41,
"watchers": 233,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 42,
"forks": 42,
"watchers": 235,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 653,
"watchers_count": 653,
"forks_count": 171,
"forks": 171,
"forks_count": 172,
"forks": 172,
"watchers": 653,
"score": 0
},

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-26T13:26:56Z",
"updated_at": "2020-02-26T20:33:13Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 233,
"watchers_count": 233,
"forks_count": 41,
"forks": 41,
"watchers": 233,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 42,
"forks": 42,
"watchers": 235,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2020-02-06T06:52:26Z",
"updated_at": "2020-02-26T16:25:14Z",
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 50,
"forks": 50,
"watchers": 120,
"watchers": 121,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
"fork": false,
"created_at": "2019-05-23T10:28:40Z",
"updated_at": "2019-11-09T17:32:18Z",
"updated_at": "2020-02-26T16:27:43Z",
"pushed_at": "2019-05-23T11:26:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 55,
"forks": 55,
"forks_count": 56,
"forks": 56,
"watchers": 197,
"score": 0
},

View file

@ -316,8 +316,8 @@
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 285,
"watchers_count": 285,
"forks_count": 172,
"forks": 172,
"forks_count": 173,
"forks": 173,
"watchers": 285,
"score": 0
},
@ -1140,13 +1140,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-02-24T18:16:09Z",
"updated_at": "2020-02-26T20:32:37Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1083,
"watchers_count": 1083,
"forks_count": 361,
"forks": 361,
"watchers": 1083,
"stargazers_count": 1084,
"watchers_count": 1084,
"forks_count": 362,
"forks": 362,
"watchers": 1084,
"score": 0
},
{
@ -1558,8 +1558,8 @@
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1006,
"watchers_count": 1006,
"forks_count": 347,
"forks": 347,
"forks_count": 348,
"forks": 348,
"watchers": 1006,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
"fork": false,
"created_at": "2019-05-23T10:28:40Z",
"updated_at": "2019-11-09T17:32:18Z",
"updated_at": "2020-02-26T16:27:43Z",
"pushed_at": "2019-05-23T11:26:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false,
"created_at": "2019-10-28T11:09:06Z",
"updated_at": "2020-01-27T10:24:04Z",
"updated_at": "2020-02-26T15:39:26Z",
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 22,
"forks": 22,
"watchers": 115,
"watchers": 116,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2020-02-26T07:46:59Z",
"updated_at": "2020-02-26T15:21:59Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 51,
"forks": 51,
"watchers": 108,
"watchers": 109,
"score": 0
},
{

View file

@ -36,12 +36,12 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-02-24T01:29:49Z",
"updated_at": "2020-02-26T19:00:25Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 85,
"forks": 85,
"forks_count": 86,
"forks": 86,
"watchers": 313,
"score": 0
},
@ -358,13 +358,13 @@
"description": "Automated script for Citrix ADC scanner (CVE-2019-19781) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2020-01-13T07:42:27Z",
"updated_at": "2020-01-15T10:38:33Z",
"updated_at": "2020-02-26T19:27:56Z",
"pushed_at": "2020-01-14T15:53:14Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-26T13:26:56Z",
"updated_at": "2020-02-26T20:33:13Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 233,
"watchers_count": 233,
"forks_count": 41,
"forks": 41,
"watchers": 233,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 42,
"forks": 42,
"watchers": 235,
"score": 0
}
]

View file

@ -688,5 +688,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 243353551,
"name": "meetup-2-curveball",
"full_name": "bsides-rijeka\/meetup-2-curveball",
"owner": {
"login": "bsides-rijeka",
"id": 61519397,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/61519397?v=4",
"html_url": "https:\/\/github.com\/bsides-rijeka"
},
"html_url": "https:\/\/github.com\/bsides-rijeka\/meetup-2-curveball",
"description": "Materials for the second Rijeka secuity meetup. We will be discussing Microsoft cryptoapi vulnerability dubbed CurveBall (CVE-2020-0601)",
"fork": false,
"created_at": "2020-02-26T19:59:25Z",
"updated_at": "2020-02-26T19:59:25Z",
"pushed_at": "2020-02-26T19:59:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2020-02-26T12:19:10Z",
"updated_at": "2020-02-26T15:21:39Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-02-26T14:51:41Z",
"updated_at": "2020-02-26T16:09:53Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 17,
"forks": 17,
"watchers": 114,
"watchers": 115,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-25T23:44:16Z",
"updated_at": "2020-02-26T14:50:51Z",
"updated_at": "2020-02-26T19:50:49Z",
"pushed_at": "2020-02-26T00:58:39Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 19,
"forks": 19,
"watchers": 68,
"watchers": 78,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2020-0688 - Exchange",
"fork": false,
"created_at": "2020-02-26T12:28:11Z",
"updated_at": "2020-02-26T14:06:56Z",
"updated_at": "2020-02-26T16:28:44Z",
"pushed_at": "2020-02-26T12:41:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "CVE-2020-1938漏洞复现",
"fork": false,
"created_at": "2020-02-21T02:36:37Z",
"updated_at": "2020-02-25T18:52:03Z",
"updated_at": "2020-02-26T15:14:20Z",
"pushed_at": "2020-02-21T02:49:57Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -335,8 +335,8 @@
"description": "Learnings on how to verify if vulnerable to Ghostcat (aka CVE-2020-1938)",
"fork": false,
"created_at": "2020-02-26T14:40:12Z",
"updated_at": "2020-02-26T14:41:37Z",
"pushed_at": "2020-02-26T14:41:35Z",
"updated_at": "2020-02-26T15:34:00Z",
"pushed_at": "2020-02-26T15:33:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813",
"fork": false,
"created_at": "2020-02-22T16:27:41Z",
"updated_at": "2020-02-26T13:37:56Z",
"updated_at": "2020-02-26T17:16:44Z",
"pushed_at": "2020-02-22T16:33:31Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 10,
"forks": 10,
"watchers": 51,
"watchers": 52,
"score": 0
}
]

View file

@ -46,6 +46,7 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
- [eastmountyxz/CVE-2020-0601-EXP](https://github.com/eastmountyxz/CVE-2020-0601-EXP)
- [eastmountyxz/CVE-2018-20250-WinRAR](https://github.com/eastmountyxz/CVE-2018-20250-WinRAR)
- [gremwell/cve-2020-0601_poc](https://github.com/gremwell/cve-2020-0601_poc)
- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball)
### CVE-2020-0609
@ -11707,7 +11708,6 @@ sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is en
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
</code>
- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn)
- [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn)
### CVE-2010-1205