Auto Update 2020/09/29 06:09:04

This commit is contained in:
motikan2010-bot 2020-09-29 06:09:04 +09:00
parent 00645ba0fa
commit 69fa20230e
17 changed files with 104 additions and 48 deletions

View file

@ -128,13 +128,13 @@
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
"fork": false,
"created_at": "2018-01-03T06:14:28Z",
"updated_at": "2020-09-28T14:29:52Z",
"updated_at": "2020-09-28T15:26:33Z",
"pushed_at": "2018-01-03T00:42:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 39,
"forks": 39,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 13,
"score": 0
},

25
2018/CVE-2018-5353.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 299399882,
"name": "CVE-2018-5353",
"full_name": "missing0x00\/CVE-2018-5353",
"owner": {
"login": "missing0x00",
"id": 29318503,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29318503?v=4",
"html_url": "https:\/\/github.com\/missing0x00"
},
"html_url": "https:\/\/github.com\/missing0x00\/CVE-2018-5353",
"description": "CVE-2018-5353",
"fork": false,
"created_at": "2020-09-28T18:38:26Z",
"updated_at": "2020-09-28T20:13:00Z",
"pushed_at": "2020-09-28T20:09:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-5354.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 299421954,
"name": "CVE-2018-5354",
"full_name": "missing0x00\/CVE-2018-5354",
"owner": {
"login": "missing0x00",
"id": 29318503,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29318503?v=4",
"html_url": "https:\/\/github.com\/missing0x00"
},
"html_url": "https:\/\/github.com\/missing0x00\/CVE-2018-5354",
"description": "CVE-2018-5354",
"fork": false,
"created_at": "2020-09-28T20:17:50Z",
"updated_at": "2020-09-28T20:51:00Z",
"pushed_at": "2020-09-28T20:49:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-25T03:07:08Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 60,
"score": 0
}

View file

@ -2497,13 +2497,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-09-28T12:13:48Z",
"updated_at": "2020-09-28T15:55:56Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 20,
"forks": 20,
"watchers": 59,
"watchers": 58,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-09-23T18:49:23Z",
"updated_at": "2020-09-28T19:33:57Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 41,
"forks": 41,
"watchers": 87,
"watchers": 88,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
"fork": false,
"created_at": "2019-12-08T10:44:51Z",
"updated_at": "2020-08-14T13:33:22Z",
"updated_at": "2020-09-28T18:24:48Z",
"pushed_at": "2019-12-08T17:55:01Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 10,
"forks": 10,
"watchers": 32,
"watchers": 33,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-12T19:30:03Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 34,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-08-24T19:45:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}

View file

@ -109,8 +109,8 @@
"pushed_at": "2020-07-20T02:20:43Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-10T02:05:53Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-09-28T14:37:53Z",
"updated_at": "2020-09-28T17:46:39Z",
"pushed_at": "2020-09-23T07:04:58Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"stargazers_count": 1073,
"watchers_count": 1073,
"forks_count": 224,
"forks": 224,
"watchers": 1072,
"watchers": 1073,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-09-28T13:08:59Z",
"updated_at": "2020-09-28T21:00:59Z",
"pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 621,
"watchers_count": 621,
"stargazers_count": 623,
"watchers_count": 623,
"forks_count": 179,
"forks": 179,
"watchers": 621,
"watchers": 623,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2020-09-24T12:10:24Z",
"updated_at": "2020-09-28T16:59:19Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 141,
"watchers_count": 141,
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 21,
"forks": 21,
"watchers": 141,
"watchers": 142,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2020-09-28T12:55:50Z",
"updated_at": "2020-09-28T18:59:57Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 7,
"forks": 7,
"watchers": 22,
"watchers": 28,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)",
"fork": false,
"created_at": "2020-04-03T18:49:35Z",
"updated_at": "2020-09-25T21:11:02Z",
"updated_at": "2020-09-28T20:13:31Z",
"pushed_at": "2020-04-03T19:23:54Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -6468,6 +6468,12 @@ The Norton Core router prior to v237 may be susceptible to a command injection e
- [embedi/ble_norton_core](https://github.com/embedi/ble_norton_core)
### CVE-2018-5353
- [missing0x00/CVE-2018-5353](https://github.com/missing0x00/CVE-2018-5353)
### CVE-2018-5354
- [missing0x00/CVE-2018-5354](https://github.com/missing0x00/CVE-2018-5354)
### CVE-2018-5711
<code>