Auto Update 2020/08/26 12:09:10

This commit is contained in:
motikan2010-bot 2020-08-26 12:09:10 +09:00
parent f4c9fe5df0
commit 626ca30beb
18 changed files with 210 additions and 53 deletions

View file

@ -178,8 +178,8 @@
"pushed_at": "2016-01-22T00:42:35Z",
"stargazers_count": 309,
"watchers_count": 309,
"forks_count": 81,
"forks": 81,
"forks_count": 82,
"forks": 82,
"watchers": 309,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "POC Code to exploite CVE-2014-3120",
"fork": false,
"created_at": "2014-07-07T20:28:34Z",
"updated_at": "2020-05-07T17:40:05Z",
"updated_at": "2020-08-26T00:54:13Z",
"pushed_at": "2014-07-07T20:35:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 29,
"forks": 29,
"forks_count": 30,
"forks": 30,
"watchers": 29,
"score": 0
}

View file

@ -128,13 +128,13 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2020-08-24T11:58:00Z",
"updated_at": "2020-08-25T22:14:35Z",
"pushed_at": "2017-11-27T16:28:14Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 201,
"watchers_count": 201,
"forks_count": 69,
"forks": 69,
"watchers": 200,
"watchers": 201,
"score": 0
},
{

View file

@ -132,8 +132,8 @@
"pushed_at": "2018-10-27T01:07:49Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"forks_count": 6,
"forks": 6,
"watchers": 5,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-0230 & s2-059 poc.",
"fork": false,
"created_at": "2020-08-20T08:21:54Z",
"updated_at": "2020-08-25T09:44:49Z",
"updated_at": "2020-08-26T02:54:57Z",
"pushed_at": "2020-08-21T12:41:14Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 8,
"forks": 8,
"watchers": 18,
"watchers": 19,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-25T07:48:55Z",
"updated_at": "2020-08-26T02:57:47Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1534,
"watchers_count": 1534,
"stargazers_count": 1536,
"watchers_count": 1536,
"forks_count": 398,
"forks": 398,
"watchers": 1534,
"watchers": 1536,
"score": 0
},
{

View file

@ -1,4 +1,27 @@
[
{
"id": 233959211,
"name": "CVE-2020-0601",
"full_name": "nissan-sudo\/CVE-2020-0601",
"owner": {
"login": "nissan-sudo",
"id": 58976920,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/58976920?v=4",
"html_url": "https:\/\/github.com\/nissan-sudo"
},
"html_url": "https:\/\/github.com\/nissan-sudo\/CVE-2020-0601",
"description": "Remote Code Execution Exploit ",
"fork": false,
"created_at": "2020-01-14T23:53:18Z",
"updated_at": "2020-01-27T17:28:37Z",
"pushed_at": "2020-01-14T23:56:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 233960159,
"name": "cve-2020-0601",
@ -22,6 +45,29 @@
"watchers": 34,
"score": 0
},
{
"id": 234134766,
"name": "CVE-2020-0601",
"full_name": "SherlockSec\/CVE-2020-0601",
"owner": {
"login": "SherlockSec",
"id": 37545173,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37545173?v=4",
"html_url": "https:\/\/github.com\/SherlockSec"
},
"html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601",
"description": "A Windows Crypto Exploit",
"fork": false,
"created_at": "2020-01-15T17:26:58Z",
"updated_at": "2020-01-16T20:56:07Z",
"pushed_at": "2020-01-15T17:28:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 234146234,
"name": "CVE-2020-0601",
@ -160,6 +206,29 @@
"watchers": 1,
"score": 0
},
{
"id": 234378948,
"name": "CVE-2020-0601",
"full_name": "apmunch\/CVE-2020-0601",
"owner": {
"login": "apmunch",
"id": 7328483,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/7328483?v=4",
"html_url": "https:\/\/github.com\/apmunch"
},
"html_url": "https:\/\/github.com\/apmunch\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-16T17:54:36Z",
"updated_at": "2020-01-16T18:04:01Z",
"pushed_at": "2020-01-16T18:03:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234433419,
"name": "badecparams",

View file

@ -36,13 +36,13 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2020-08-25T17:32:08Z",
"updated_at": "2020-08-25T21:16:00Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 53,
"forks": 53,
"watchers": 168,
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 54,
"forks": 54,
"watchers": 169,
"score": 0
}
]

View file

@ -197,7 +197,7 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-08-11T19:48:30Z",
"updated_at": "2020-08-26T01:27:02Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 217,
"watchers_count": 217,

View file

@ -910,13 +910,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-08-22T21:37:34Z",
"updated_at": "2020-08-25T22:14:03Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 199,
"watchers_count": 199,
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 77,
"forks": 77,
"watchers": 199,
"watchers": 200,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-25T05:25:45Z",
"updated_at": "2020-08-25T16:15:09Z",
"updated_at": "2020-08-26T02:25:53Z",
"pushed_at": "2020-08-25T05:46:30Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"forks": 4,
"watchers": 13,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"forks": 6,
"watchers": 16,
"score": 0
}
]

25
2020/CVE-2020-24597.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 290375222,
"name": "CVE-2020-24597",
"full_name": "HoangKien1020\/CVE-2020-24597",
"owner": {
"login": "HoangKien1020",
"id": 24661746,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24661746?v=4",
"html_url": "https:\/\/github.com\/HoangKien1020"
},
"html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2020-24597",
"description": "Directory traversal in com_media to RCE",
"fork": false,
"created_at": "2020-08-26T02:31:21Z",
"updated_at": "2020-08-26T03:07:17Z",
"pushed_at": "2020-08-26T03:07:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -114,6 +114,29 @@
"watchers": 219,
"score": 0
},
{
"id": 253468631,
"name": "CVE-2020-2551",
"full_name": "cnsimo\/CVE-2020-2551",
"owner": {
"login": "cnsimo",
"id": 22788893,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22788893?v=4",
"html_url": "https:\/\/github.com\/cnsimo"
},
"html_url": "https:\/\/github.com\/cnsimo\/CVE-2020-2551",
"description": "Use shell to build weblogic debug environment for CVE-2020-2551",
"fork": false,
"created_at": "2020-04-06T10:47:35Z",
"updated_at": "2020-08-26T02:34:02Z",
"pushed_at": "2020-04-06T10:59:36Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 0,
"forks": 0,
"watchers": 13,
"score": 0
},
{
"id": 264347023,
"name": "weblogicPoc",

25
2020/CVE-2020-5509.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 231982886,
"name": "CVE-2020-5509",
"full_name": "FULLSHADE\/CVE-2020-5509",
"owner": {
"login": "FULLSHADE",
"id": 54753063,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54753063?v=4",
"html_url": "https:\/\/github.com\/FULLSHADE"
},
"html_url": "https:\/\/github.com\/FULLSHADE\/CVE-2020-5509",
"description": "Car Rental Project v.1.0 Remote Code Execution",
"fork": false,
"created_at": "2020-01-05T22:13:24Z",
"updated_at": "2020-06-26T14:46:10Z",
"pushed_at": "2020-01-05T22:23:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-25T07:48:55Z",
"updated_at": "2020-08-26T02:57:47Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1534,
"watchers_count": 1534,
"stargazers_count": 1536,
"watchers_count": 1536,
"forks_count": 398,
"forks": 398,
"watchers": 1534,
"watchers": 1536,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-05T06:19:09Z",
"updated_at": "2020-08-20T22:19:43Z",
"updated_at": "2020-08-26T00:13:02Z",
"pushed_at": "2020-07-07T07:19:16Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 17,
"forks": 17,
"watchers": 38,
"watchers": 39,
"score": 0
},
{
@ -86,8 +86,8 @@
"pushed_at": "2020-07-15T02:52:33Z",
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 93,
"forks": 93,
"forks_count": 94,
"forks": 94,
"watchers": 301,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2020-08-20T10:37:08Z",
"updated_at": "2020-08-26T01:30:02Z",
"pushed_at": "2020-08-20T10:37:06Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 0,
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -88,13 +88,16 @@ Race condition in the Intel(R) Driver and Support Assistant before version 20.1.
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
</code>
- [nissan-sudo/CVE-2020-0601](https://github.com/nissan-sudo/CVE-2020-0601)
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
- [ollypwn/CurveBall](https://github.com/ollypwn/CurveBall)
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
- [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601)
- [apmunch/CVE-2020-0601](https://github.com/apmunch/CVE-2020-0601)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
- [MarkusZehnle/CVE-2020-0601](https://github.com/MarkusZehnle/CVE-2020-0601)
@ -571,6 +574,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551)
- [0nise/CVE-2020-2551](https://github.com/0nise/CVE-2020-2551)
- [Y4er/CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551)
- [cnsimo/CVE-2020-2551](https://github.com/cnsimo/CVE-2020-2551)
- [zzwlpx/weblogicPoc](https://github.com/zzwlpx/weblogicPoc)
- [Dido1960/Weblogic-CVE-2020-2551-To-Internet](https://github.com/Dido1960/Weblogic-CVE-2020-2551-To-Internet)
@ -750,6 +754,14 @@ Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.
- [dead5nd/config-demo](https://github.com/dead5nd/config-demo)
- [osamahamad/CVE-2020-5410-POC](https://github.com/osamahamad/CVE-2020-5410-POC)
### CVE-2020-5509
<code>
PHPGurukul Car Rental Project v1.0 allows Remote Code Execution via an executable file in an upload of a new profile image.
</code>
- [FULLSHADE/CVE-2020-5509](https://github.com/FULLSHADE/CVE-2020-5509)
### CVE-2020-5837
<code>
@ -1959,6 +1971,9 @@ An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authentic
- [lb0x/cve-2020-24572](https://github.com/lb0x/cve-2020-24572)
### CVE-2020-24597
- [HoangKien1020/CVE-2020-24597](https://github.com/HoangKien1020/CVE-2020-24597)
### CVE-2020-72381
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)