Auto Update 2020/07/05 06:09:10

This commit is contained in:
motikan2010-bot 2020-07-05 06:09:10 +09:00
parent 553f403cf8
commit 6a5a77d08a
20 changed files with 78 additions and 234 deletions

View file

@ -1,50 +1,4 @@
[
{
"id": 13021222,
"name": "debian-ssh",
"full_name": "g0tmi1k\/debian-ssh",
"owner": {
"login": "g0tmi1k",
"id": 535942,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/535942?v=4",
"html_url": "https:\/\/github.com\/g0tmi1k"
},
"html_url": "https:\/\/github.com\/g0tmi1k\/debian-ssh",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2020-06-29T01:07:51Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 260,
"watchers_count": 260,
"forks_count": 85,
"forks": 85,
"watchers": 260,
"score": 0
},
{
"id": 163681865,
"name": "vulnkeys",
"full_name": "avarx\/vulnkeys",
"owner": {
"login": "avarx",
"id": 1161946,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1161946?v=4",
"html_url": "https:\/\/github.com\/avarx"
},
"html_url": "https:\/\/github.com\/avarx\/vulnkeys",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2018-12-31T16:09:49Z",
"updated_at": "2018-12-31T16:11:19Z",
"pushed_at": "2018-12-31T16:11:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173164801,
"name": "debian-ssh",

View file

@ -1,25 +0,0 @@
[
{
"id": 90186634,
"name": "CVE-2008-1613",
"full_name": "SECFORCE\/CVE-2008-1613",
"owner": {
"login": "SECFORCE",
"id": 8157384,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE"
},
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613",
"description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.",
"fork": false,
"created_at": "2017-05-03T19:39:27Z",
"updated_at": "2020-05-18T10:42:05Z",
"pushed_at": "2017-05-03T19:40:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 9,
"forks": 9,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 276735337,
"name": "AudioCaptchaBypass-CVE-2008-2019",
"full_name": "TheRook\/AudioCaptchaBypass-CVE-2008-2019",
"owner": {
"login": "TheRook",
"id": 521783,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/521783?v=4",
"html_url": "https:\/\/github.com\/TheRook"
},
"html_url": "https:\/\/github.com\/TheRook\/AudioCaptchaBypass-CVE-2008-2019",
"description": null,
"fork": false,
"created_at": "2020-07-02T20:04:05Z",
"updated_at": "2020-07-02T21:27:53Z",
"pushed_at": "2020-07-02T21:27:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 58223324,
"name": "sockstress",
"full_name": "marcelki\/sockstress",
"owner": {
"login": "marcelki",
"id": 8465322,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8465322?v=4",
"html_url": "https:\/\/github.com\/marcelki"
},
"html_url": "https:\/\/github.com\/marcelki\/sockstress",
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
"fork": false,
"created_at": "2016-05-06T17:21:32Z",
"updated_at": "2020-06-04T09:57:06Z",
"pushed_at": "2016-07-02T18:52:16Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 12,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 268011635,
"name": "CVE-2008-4687-exploit",
"full_name": "nmurilo\/CVE-2008-4687-exploit",
"owner": {
"login": "nmurilo",
"id": 22617810,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22617810?v=4",
"html_url": "https:\/\/github.com\/nmurilo"
},
"html_url": "https:\/\/github.com\/nmurilo\/CVE-2008-4687-exploit",
"description": null,
"fork": false,
"created_at": "2020-05-30T04:53:07Z",
"updated_at": "2020-05-30T05:14:42Z",
"pushed_at": "2020-05-30T05:14:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-07-04T02:35:24Z",
"updated_at": "2020-07-04T17:06:29Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"forks_count": 238,
"forks": 238,
"watchers": 460,
"watchers": 461,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": " An exploit for Apache Struts CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T01:53:30Z",
"updated_at": "2020-07-04T13:09:40Z",
"updated_at": "2020-07-04T18:14:22Z",
"pushed_at": "2018-08-26T02:31:39Z",
"stargazers_count": 289,
"watchers_count": 289,
"stargazers_count": 290,
"watchers_count": 290,
"forks_count": 100,
"forks": 100,
"watchers": 289,
"watchers": 290,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2020-07-01T15:24:54Z",
"updated_at": "2020-07-04T15:43:00Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 319,
"watchers_count": 319,
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 127,
"forks": 127,
"watchers": 319,
"watchers": 318,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260",
"fork": false,
"created_at": "2019-11-12T20:43:46Z",
"updated_at": "2020-06-10T15:13:58Z",
"updated_at": "2020-07-04T20:50:43Z",
"pushed_at": "2019-11-28T20:16:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-07-04T14:34:01Z",
"updated_at": "2020-07-04T16:37:18Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 114,
"forks": 114,
"watchers": 491,
"watchers": 492,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 37,
"forks": 37,
"forks_count": 36,
"forks": 36,
"watchers": 51,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-06-27T15:49:30Z",
"updated_at": "2020-07-04T17:51:06Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 812,
"watchers_count": 812,
"stargazers_count": 811,
"watchers_count": 811,
"forks_count": 209,
"forks": 209,
"watchers": 812,
"watchers": 811,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
"fork": false,
"created_at": "2020-06-16T23:22:15Z",
"updated_at": "2020-07-04T13:46:56Z",
"updated_at": "2020-07-04T18:49:33Z",
"pushed_at": "2020-06-17T18:10:30Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 21,
"forks": 21,
"watchers": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 22,
"forks": 22,
"watchers": 62,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2020-07-02T07:49:51Z",
"updated_at": "2020-07-04T15:48:05Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 314,
"watchers_count": 314,
"forks_count": 53,
"forks": 53,
"watchers": 314,
"stargazers_count": 315,
"watchers_count": 315,
"forks_count": 54,
"forks": 54,
"watchers": 315,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-12828 PoC and Analysis. ",
"fork": false,
"created_at": "2020-06-30T15:18:58Z",
"updated_at": "2020-07-04T01:21:24Z",
"updated_at": "2020-07-04T15:22:41Z",
"pushed_at": "2020-06-30T16:03:35Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 6,
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947",
"fork": false,
"created_at": "2020-07-02T16:40:52Z",
"updated_at": "2020-07-04T12:20:16Z",
"updated_at": "2020-07-04T19:27:59Z",
"pushed_at": "2020-07-02T16:46:10Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-5902",
"fork": false,
"created_at": "2020-07-04T14:12:57Z",
"updated_at": "2020-07-04T14:21:29Z",
"updated_at": "2020-07-04T19:10:37Z",
"pushed_at": "2020-07-04T14:21:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2020-03-17T12:38:31Z",
"updated_at": "2020-07-04T21:00:01Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 277140244,
"name": "Rick_write_exp_CVE-2020-8835",
"full_name": "snappyJack\/Rick_write_exp_CVE-2020-8835",
"owner": {
"login": "snappyJack",
"id": 16055573,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16055573?v=4",
"html_url": "https:\/\/github.com\/snappyJack"
},
"html_url": "https:\/\/github.com\/snappyJack\/Rick_write_exp_CVE-2020-8835",
"description": null,
"fork": false,
"created_at": "2020-07-04T15:51:14Z",
"updated_at": "2020-07-04T16:40:22Z",
"pushed_at": "2020-07-04T16:40:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -885,6 +885,7 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di
- [Prabhashaka/IT19147192-CVE-2020-8835](https://github.com/Prabhashaka/IT19147192-CVE-2020-8835)
- [socketcall/CVE-2020-8835](https://github.com/socketcall/CVE-2020-8835)
- [snappyJack/Rick_write_exp_CVE-2020-8835](https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835)
### CVE-2020-8840
@ -13770,8 +13771,6 @@ The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apach
OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
</code>
- [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh)
- [avarx/vulnkeys](https://github.com/avarx/vulnkeys)
- [nu11secur1ty/debian-ssh](https://github.com/nu11secur1ty/debian-ssh)
### CVE-2008-0228
@ -13790,22 +13789,6 @@ Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote atta
- [Axua/CVE-2008-1611](https://github.com/Axua/CVE-2008-1611)
### CVE-2008-1613
<code>
SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter.
</code>
- [SECFORCE/CVE-2008-1613](https://github.com/SECFORCE/CVE-2008-1613)
### CVE-2008-2019
<code>
Simple Machines Forum (SMF), probably 1.1.4, relies on &quot;randomly generated static&quot; to hinder brute-force attacks on the WAV file (aka audio) CAPTCHA, which allows remote attackers to pass the CAPTCHA test via an automated attack that considers Hamming distances. NOTE: this issue reportedly exists because of an insufficient fix for CVE-2007-3308.
</code>
- [TheRook/AudioCaptchaBypass-CVE-2008-2019](https://github.com/TheRook/AudioCaptchaBypass-CVE-2008-2019)
### CVE-2008-2938
<code>
@ -13822,14 +13805,6 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
- [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts)
### CVE-2008-4609
<code>
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
</code>
- [marcelki/sockstress](https://github.com/marcelki/sockstress)
### CVE-2008-4654
<code>
@ -13839,14 +13814,6 @@ Stack-based buffer overflow in the parse_master function in the Ty demux plugin
- [bongbongco/CVE-2008-4654](https://github.com/bongbongco/CVE-2008-4654)
- [KernelErr/VLC-CVE-2008-4654-Exploit](https://github.com/KernelErr/VLC-CVE-2008-4654-Exploit)
### CVE-2008-4687
<code>
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
</code>
- [nmurilo/CVE-2008-4687-exploit](https://github.com/nmurilo/CVE-2008-4687-exploit)
### CVE-2008-5416
<code>