Auto Update 2020/07/12 18:09:57

This commit is contained in:
motikan2010-bot 2020-07-12 18:09:57 +09:00
parent cfe24b033e
commit 67958cf9bc
28 changed files with 161 additions and 161 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 178449456,
"name": "CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"full_name": "schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"owner": {
"login": "schwankner",
"id": 1496765,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1496765?v=4",
"html_url": "https:\/\/github.com\/schwankner"
},
"html_url": "https:\/\/github.com\/schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit",
"fork": false,
"created_at": "2019-03-29T17:31:14Z",
"updated_at": "2019-08-26T16:40:59Z",
"pushed_at": "2019-03-29T17:31:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-11T10:33:15Z",
"updated_at": "2020-07-12T03:46:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 493,
"watchers": 494,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-07-22T19:22:55Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 22,
"forks": 22,
"forks_count": 21,
"forks": 21,
"watchers": 50,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-07-22T19:22:55Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 22,
"forks": 22,
"forks_count": 21,
"forks": 21,
"watchers": 50,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-11T10:33:15Z",
"updated_at": "2020-07-12T03:46:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 493,
"watchers": 494,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-05-13T11:36:17Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 38,
"forks": 38,
"forks_count": 37,
"forks": 37,
"watchers": 82,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-06-15T11:27:42Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 22,
"forks": 22,
"forks_count": 21,
"forks": 21,
"watchers": 41,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-11T10:33:15Z",
"updated_at": "2020-07-12T03:46:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 493,
"watchers": 494,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 87,
"forks": 87,
"forks_count": 88,
"forks": 88,
"watchers": 239,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2018-07-02T02:21:28Z",
"updated_at": "2020-06-23T22:47:31Z",
"updated_at": "2020-07-12T09:04:53Z",
"pushed_at": "2019-05-09T07:07:25Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 12,
"forks": 12,
"watchers": 26,
"watchers": 27,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
"fork": false,
"created_at": "2018-06-21T15:44:29Z",
"updated_at": "2020-07-02T12:26:05Z",
"updated_at": "2020-07-12T05:33:09Z",
"pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 62,
"forks": 62,
"watchers": 176,
"watchers": 175,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2020-07-08T02:53:35Z",
"updated_at": "2020-07-12T05:29:29Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 30,
"forks": 30,
"watchers": 191,
"watchers": 192,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-11T10:33:15Z",
"updated_at": "2020-07-12T03:46:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 493,
"watchers": 494,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-07-06T06:55:12Z",
"updated_at": "2020-07-12T08:01:51Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 665,
"watchers_count": 665,
"stargazers_count": 666,
"watchers_count": 666,
"forks_count": 57,
"forks": 57,
"watchers": 665,
"watchers": 666,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-11T14:27:06Z",
"updated_at": "2020-07-12T08:59:34Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1220,
"watchers_count": 1220,
"stargazers_count": 1221,
"watchers_count": 1221,
"forks_count": 309,
"forks": 309,
"watchers": 1220,
"watchers": 1221,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 338,
"watchers_count": 338,
"forks_count": 107,
"forks": 107,
"forks_count": 108,
"forks": 108,
"watchers": 338,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-11T10:33:15Z",
"updated_at": "2020-07-12T03:46:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 493,
"watchers": 494,
"score": 0
}
]

View file

@ -220,13 +220,13 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2020-07-09T07:18:20Z",
"updated_at": "2020-07-12T06:46:48Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 55,
"forks": 55,
"watchers": 126,
"watchers": 127,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-07-08T10:59:45Z",
"updated_at": "2020-07-12T04:39:31Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 813,
"watchers_count": 813,
"stargazers_count": 814,
"watchers_count": 814,
"forks_count": 208,
"forks": 208,
"watchers": 813,
"watchers": 814,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false,
"created_at": "2020-01-21T21:33:17Z",
"updated_at": "2020-07-05T17:27:27Z",
"updated_at": "2020-07-12T03:30:20Z",
"pushed_at": "2020-07-05T17:27:24Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 2,
"forks": 2,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2020-07-07T01:32:10Z",
"updated_at": "2020-07-12T05:46:26Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 151,
"watchers_count": 151,
"forks_count": 48,
"forks": 48,
"watchers": 150,
"watchers": 151,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-07-05T05:03:18Z",
"updated_at": "2020-07-12T07:50:20Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 75,
"forks": 75,
"watchers": 192,
"watchers": 194,
"score": 0
},
{

View file

@ -1416,13 +1416,13 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2020-07-11T19:38:55Z",
"updated_at": "2020-07-12T03:37:47Z",
"pushed_at": "2020-07-08T08:26:24Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 21,
"forks": 21,
"watchers": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 22,
"forks": 22,
"watchers": 44,
"score": 0
},
{
@ -1439,13 +1439,13 @@
"description": "This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework",
"fork": false,
"created_at": "2020-06-19T20:38:11Z",
"updated_at": "2020-07-01T08:58:49Z",
"updated_at": "2020-07-12T04:19:41Z",
"pushed_at": "2020-06-19T20:58:36Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-11T10:33:15Z",
"updated_at": "2020-07-12T03:46:58Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 121,
"forks": 121,
"watchers": 493,
"watchers": 494,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-11T14:27:06Z",
"updated_at": "2020-07-12T08:59:34Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1220,
"watchers_count": 1220,
"stargazers_count": 1221,
"watchers_count": 1221,
"forks_count": 309,
"forks": 309,
"watchers": 1220,
"watchers": 1221,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-07-11T21:54:00Z",
"updated_at": "2020-07-12T07:45:58Z",
"pushed_at": "2020-07-07T09:36:24Z",
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 78,
"forks": 78,
"watchers": 267,
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 80,
"forks": 80,
"watchers": 269,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": "F5 Big-IP CVE-2020-5902 - LFI and RCE",
"fork": false,
"created_at": "2020-07-06T04:03:58Z",
"updated_at": "2020-07-09T06:36:11Z",
"updated_at": "2020-07-12T04:14:21Z",
"pushed_at": "2020-07-07T05:22:19Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 7,
"forks": 7,
"watchers": 27,
"watchers": 28,
"score": 0
},
{
@ -427,13 +427,13 @@
"description": "批量扫描CVE-2020-5902远程代码执行已测试",
"fork": false,
"created_at": "2020-07-06T09:16:36Z",
"updated_at": "2020-07-09T09:24:57Z",
"updated_at": "2020-07-12T07:53:49Z",
"pushed_at": "2020-07-09T09:24:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
},
{
@ -864,13 +864,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-09T07:44:07Z",
"updated_at": "2020-07-10T04:08:17Z",
"updated_at": "2020-07-12T07:49:15Z",
"pushed_at": "2020-07-09T08:06:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
},
{
@ -891,8 +891,8 @@
"pushed_at": "2020-07-11T14:10:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
@ -933,13 +933,13 @@
"description": "Checker CVE-2020-5902: BIG-IP versions 15.0.0 through 15.1.0.3, 14.1.0 through 14.1.2.5, 13.1.0 through 13.1.3.3, 12.1.0 through 12.1.5.1, and 11.6.1 through 11.6.5.1 suffer from Traffic Management User Interface (TMUI) arbitrary file read and command execution vulnerabilities.",
"fork": false,
"created_at": "2020-07-10T07:00:35Z",
"updated_at": "2020-07-10T15:31:09Z",
"updated_at": "2020-07-12T07:16:19Z",
"pushed_at": "2020-07-10T15:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -979,13 +979,13 @@
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
"fork": false,
"created_at": "2020-07-10T15:33:00Z",
"updated_at": "2020-07-11T18:38:36Z",
"updated_at": "2020-07-12T04:13:18Z",
"pushed_at": "2020-07-11T18:38:34Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
},
{

25
2020/CVE-2020-7693.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 276879560,
"name": "sockjs-dos-py",
"full_name": "andsnw\/sockjs-dos-py",
"owner": {
"login": "andsnw",
"id": 20721160,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20721160?v=4",
"html_url": "https:\/\/github.com\/andsnw"
},
"html_url": "https:\/\/github.com\/andsnw\/sockjs-dos-py",
"description": "CVE-2020-7693: SockJS 0.3.19 Denial of Service POC",
"fork": false,
"created_at": "2020-07-03T11:04:48Z",
"updated_at": "2020-07-12T09:11:18Z",
"pushed_at": "2020-07-10T01:51:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Citrix ADC Vulns",
"fork": false,
"created_at": "2020-07-10T20:00:17Z",
"updated_at": "2020-07-12T03:06:16Z",
"updated_at": "2020-07-12T08:11:49Z",
"pushed_at": "2020-07-10T21:03:20Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 3,
"forks": 3,
"watchers": 28,
"watchers": 32,
"score": 0
}
]

View file

@ -784,6 +784,14 @@ In certain situations, all versions of Citrix ShareFile StorageZones (aka storag
- [DimitriNL/CTX-CVE-2020-7473](https://github.com/DimitriNL/CTX-CVE-2020-7473)
### CVE-2020-7693
<code>
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
</code>
- [andsnw/sockjs-dos-py](https://github.com/andsnw/sockjs-dos-py)
### CVE-2020-7799
<code>
@ -14129,14 +14137,6 @@ Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded app
- [tagatac/libsafe-CVE-2005-1125](https://github.com/tagatac/libsafe-CVE-2005-1125)
### CVE-2005-2428
<code>
Lotus Domino R5 and R6 WebMail, with &quot;Generate HTML for all fields&quot; enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
</code>
- [schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit](https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit)
## 2004
### CVE-2004-0558