Auto Update 2020/10/20 06:09:27

This commit is contained in:
motikan2010-bot 2020-10-20 06:09:27 +09:00
parent f0dcc28a24
commit 66e83c26ee
12 changed files with 56 additions and 51 deletions

View file

@ -59,13 +59,13 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2020-10-11T09:11:57Z",
"updated_at": "2020-10-19T16:23:48Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 29,
"forks": 29,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-10-09T15:20:11Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 32,
"forks": 32,
"forks_count": 33,
"forks": 33,
"watchers": 69,
"score": 0
},

View file

@ -1213,8 +1213,8 @@
"pushed_at": "2020-09-29T05:21:44Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 138,
"forks": 138,
"forks_count": 144,
"forks": 144,
"watchers": 8,
"score": 0
},

View file

@ -2393,19 +2393,19 @@
},
{
"id": 222191780,
"name": "sudoku.py",
"full_name": "lwtz\/sudoku.py",
"name": "CVE-2019-0708",
"full_name": "lwtz\/CVE-2019-0708",
"owner": {
"login": "lwtz",
"id": 25403119,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25403119?v=4",
"html_url": "https:\/\/github.com\/lwtz"
},
"html_url": "https:\/\/github.com\/lwtz\/sudoku.py",
"html_url": "https:\/\/github.com\/lwtz\/CVE-2019-0708",
"description": "CVE-2019-0708",
"fork": false,
"created_at": "2019-11-17T03:28:28Z",
"updated_at": "2020-07-19T00:58:26Z",
"updated_at": "2020-10-19T18:21:25Z",
"pushed_at": "2020-07-19T00:58:08Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-10-15T19:48:38Z",
"updated_at": "2020-10-19T15:20:29Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 51,
"forks": 51,
"watchers": 125,
"watchers": 126,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-10-16T06:29:41Z",
"updated_at": "2020-10-19T15:20:39Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 64,
"forks": 64,
"watchers": 226,
"watchers": 227,
"score": 0
},
{
@ -266,13 +266,13 @@
"description": "Exploitation Script for CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\"",
"fork": false,
"created_at": "2020-03-31T15:29:52Z",
"updated_at": "2020-10-18T19:03:58Z",
"updated_at": "2020-10-19T15:20:34Z",
"pushed_at": "2020-04-01T06:57:50Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
"fork": false,
"created_at": "2020-03-10T21:40:57Z",
"updated_at": "2020-08-17T01:35:29Z",
"updated_at": "2020-10-19T15:31:42Z",
"pushed_at": "2020-04-01T19:34:36Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 2,
"forks": 2,
"watchers": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"forks": 3,
"watchers": 20,
"score": 0
},
{

View file

@ -132,8 +132,8 @@
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 73,
"forks": 73,
"forks_count": 74,
"forks": 74,
"watchers": 190,
"score": 0
},

View file

@ -201,8 +201,8 @@
"pushed_at": "2020-10-16T23:12:52Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"forks_count": 1,
"forks": 1,
"watchers": 13,
"score": 0
},
@ -224,8 +224,8 @@
"pushed_at": "2020-10-17T04:32:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
"fork": false,
"created_at": "2020-10-15T14:32:25Z",
"updated_at": "2020-10-19T07:50:40Z",
"updated_at": "2020-10-19T17:57:12Z",
"pushed_at": "2020-10-15T14:57:31Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 27,
"forks": 27,
"watchers": 88,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 28,
"forks": 28,
"watchers": 89,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-10-14T17:42:24Z",
"updated_at": "2020-10-19T19:35:34Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 58,
"forks": 58,
"watchers": 237,
"watchers": 238,
"score": 0
},
{

View file

@ -14,11 +14,11 @@
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2020-10-12T06:24:29Z",
"pushed_at": "2020-08-27T06:41:01Z",
"pushed_at": "2020-10-19T18:03:23Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 13,
"score": 0
}

View file

@ -2257,7 +2257,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
### CVE-2020-16270
<code>
OLIMPOKS before 5.1.0 allows Auth/Admin ErrorMessage XSS.
OLIMPOKS under 3.3.39 allows Auth/Admin ErrorMessage XSS. Remote Attacker can use discovered vulnerability to inject malicious JavaScript payload to victims browsers in context of vulnerable applications. Executed code can be used to steal administrators cookies, influence HTML content of targeted application and perform phishing-related attacks. Vulnerable application used in more than 3000 organizations in different sectors from retail to industries.
</code>
- [Security-AVS/CVE-2020-16270](https://github.com/Security-AVS/CVE-2020-16270)
@ -2766,7 +2766,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [shishibabyq/CVE-2019-0708](https://github.com/shishibabyq/CVE-2019-0708)
- [pwnhacker0x18/Wincrash](https://github.com/pwnhacker0x18/Wincrash)
- [R4v3nG/CVE-2019-0708-DOS](https://github.com/R4v3nG/CVE-2019-0708-DOS)
- [lwtz/sudoku.py](https://github.com/lwtz/sudoku.py)
- [lwtz/CVE-2019-0708](https://github.com/lwtz/CVE-2019-0708)
- [ulisesrc/-2-CVE-2019-0708](https://github.com/ulisesrc/-2-CVE-2019-0708)
- [worawit/CVE-2019-0708](https://github.com/worawit/CVE-2019-0708)
- [cbwang505/CVE-2019-0708-EXP-Windows](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows)
@ -4899,6 +4899,11 @@ In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image f
- [Crystalware/CVE-2019-13600](https://github.com/Crystalware/CVE-2019-13600)
### CVE-2019-13633
<code>
Blinger.io v.1.0.2519 is vulnerable to Blind/Persistent XSS. An attacker can send arbitrary JavaScript code via a built-in communication channel, such as Telegram, WhatsApp, Viber, Skype, Facebook, Vkontakte, or Odnoklassniki. This is mishandled within the administration panel for conversations/all, conversations/inbox, conversations/unassigned, and conversations/closed.
</code>
- [Security-AVS/CVE-2019-13633](https://github.com/Security-AVS/CVE-2019-13633)
### CVE-2019-13720