Auto Update 2020/08/12 12:08:32

This commit is contained in:
motikan2010-bot 2020-08-12 12:08:32 +09:00
parent f4127acb42
commit 702af287dd
22 changed files with 91 additions and 148 deletions

View file

@ -63,8 +63,8 @@
"pushed_at": "2014-10-25T10:45:32Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 22,
"forks": 22,
"forks_count": 23,
"forks": 23,
"watchers": 41,
"score": 0
},

View file

@ -82,13 +82,13 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2020-07-31T03:52:19Z",
"updated_at": "2020-08-11T22:30:19Z",
"pushed_at": "2020-07-21T09:46:40Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 55,
"forks": 55,
"watchers": 189,
"watchers": 190,
"score": 0
}
]

View file

@ -201,8 +201,8 @@
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 187,
"watchers_count": 187,
"forks_count": 93,
"forks": 93,
"forks_count": 94,
"forks": 94,
"watchers": 187,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2020-06-27T12:05:12Z",
"updated_at": "2020-08-11T23:17:42Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 547,
"watchers_count": 547,
"stargazers_count": 546,
"watchers_count": 546,
"forks_count": 73,
"forks": 73,
"watchers": 547,
"watchers": 546,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2020-08-10T00:51:48Z",
"updated_at": "2020-08-12T01:49:56Z",
"pushed_at": "2017-11-27T16:28:14Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 68,
"forks": 68,
"watchers": 196,
"watchers": 197,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 153,
"watchers_count": 153,
"forks_count": 31,
"forks": 31,
"forks_count": 30,
"forks": 30,
"watchers": 153,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-17570 details and proof of concept",
"fork": false,
"created_at": "2020-01-24T11:32:18Z",
"updated_at": "2020-08-05T10:07:44Z",
"updated_at": "2020-08-11T23:50:33Z",
"pushed_at": "2020-06-15T22:01:13Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 7,
"forks": 7,
"watchers": 70,
"watchers": 71,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 5,
"watchers": 30,
"score": 0
},
{
"id": 286660173,
"name": "SpringCloudConfig-CVEs",
"full_name": "DSO-Lab\/SpringCloudConfig-CVEs",
"owner": {
"login": "DSO-Lab",
"id": 57984701,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57984701?v=4",
"html_url": "https:\/\/github.com\/DSO-Lab"
},
"html_url": "https:\/\/github.com\/DSO-Lab\/SpringCloudConfig-CVEs",
"description": "CVE-2019-3799CVE-2020-5405CVE-2020-5410 三个漏洞的验证笔记。",
"fork": false,
"created_at": "2020-08-11T06:07:34Z",
"updated_at": "2020-08-11T06:08:59Z",
"pushed_at": "2020-08-11T06:07:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-08-10T21:34:16Z",
"updated_at": "2020-08-11T05:55:17Z",
"pushed_at": "2020-08-10T21:43:35Z",
"pushed_at": "2020-08-11T21:48:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE-2020-0108",
"fork": false,
"created_at": "2020-08-05T02:52:57Z",
"updated_at": "2020-08-05T03:46:04Z",
"updated_at": "2020-08-12T01:07:12Z",
"pushed_at": "2020-08-05T02:55:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-08-11T13:57:35Z",
"updated_at": "2020-08-12T01:41:02Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 210,
"watchers_count": 210,
"stargazers_count": 211,
"watchers_count": 211,
"forks_count": 76,
"forks": 76,
"watchers": 210,
"watchers": 211,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-16T05:15:35Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 37,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-17T18:10:30Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 22,
"forks": 22,
"forks_count": 23,
"forks": 23,
"watchers": 72,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-06-10T08:21:53Z",
"updated_at": "2020-06-14T08:52:20Z",
"updated_at": "2020-08-12T00:39:20Z",
"pushed_at": "2020-06-10T08:22:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false,
"created_at": "2020-07-21T08:01:20Z",
"updated_at": "2020-08-11T21:02:04Z",
"updated_at": "2020-08-12T03:03:32Z",
"pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"watchers": 19,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2020-1048 bypass: binary planting PoC",
"fork": false,
"created_at": "2020-08-11T14:34:07Z",
"updated_at": "2020-08-11T19:49:40Z",
"updated_at": "2020-08-12T01:42:59Z",
"pushed_at": "2020-08-11T15:22:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-08-05T08:03:23Z",
"updated_at": "2020-08-12T02:47:35Z",
"pushed_at": "2020-07-27T16:36:37Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 8,
"forks": 8,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -22,29 +22,6 @@
"watchers": 9,
"score": 0
},
{
"id": 276601762,
"name": "Dubbo-CVE-2020-1948",
"full_name": "DSO-Lab\/Dubbo-CVE-2020-1948",
"owner": {
"login": "DSO-Lab",
"id": 57984701,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57984701?v=4",
"html_url": "https:\/\/github.com\/DSO-Lab"
},
"html_url": "https:\/\/github.com\/DSO-Lab\/Dubbo-CVE-2020-1948",
"description": "Apache Dubbo CVE-2020-1948 漏洞测试环境,亲测可用。",
"fork": false,
"created_at": "2020-07-02T09:15:14Z",
"updated_at": "2020-08-11T11:17:13Z",
"pushed_at": "2020-07-03T02:46:53Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 276609219,
"name": "cve-2020-1948-poc",
@ -68,6 +45,29 @@
"watchers": 2,
"score": 0
},
{
"id": 277021315,
"name": "Dubbo-CVE-2020-1948",
"full_name": "txrw\/Dubbo-CVE-2020-1948",
"owner": {
"login": "txrw",
"id": 32354358,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32354358?v=4",
"html_url": "https:\/\/github.com\/txrw"
},
"html_url": "https:\/\/github.com\/txrw\/Dubbo-CVE-2020-1948",
"description": "Apache Dubbo CVE-2020-1948 漏洞测试环境,亲测可用。",
"fork": false,
"created_at": "2020-07-04T02:06:28Z",
"updated_at": "2020-08-12T01:48:59Z",
"pushed_at": "2020-07-03T02:46:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 279463521,
"name": "Dubbo-deserialization",

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-2551",
"fork": false,
"created_at": "2020-02-24T02:36:46Z",
"updated_at": "2020-08-11T08:39:51Z",
"updated_at": "2020-08-12T02:33:35Z",
"pushed_at": "2020-06-30T12:54:47Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 3,
"forks": 3,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -1,25 +0,0 @@
[
{
"id": 286660173,
"name": "SpringCloudConfig-CVEs",
"full_name": "DSO-Lab\/SpringCloudConfig-CVEs",
"owner": {
"login": "DSO-Lab",
"id": 57984701,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57984701?v=4",
"html_url": "https:\/\/github.com\/DSO-Lab"
},
"html_url": "https:\/\/github.com\/DSO-Lab\/SpringCloudConfig-CVEs",
"description": "CVE-2019-3799CVE-2020-5405CVE-2020-5410 三个漏洞的验证笔记。",
"fork": false,
"created_at": "2020-08-11T06:07:34Z",
"updated_at": "2020-08-11T06:08:59Z",
"pushed_at": "2020-08-11T06:07:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-09T08:25:40Z",
"updated_at": "2020-08-11T19:10:37Z",
"updated_at": "2020-08-12T01:35:36Z",
"pushed_at": "2020-08-10T18:16:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 9,
"forks": 9,
"watchers": 15,
"watchers": 17,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2020-08-11T08:19:42Z",
"updated_at": "2020-08-11T22:20:38Z",
"pushed_at": "2020-05-21T10:15:35Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 19,
"forks": 19,
"watchers": 74,
"watchers": 75,
"score": 0
},
{

View file

@ -506,8 +506,8 @@ This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An
</code>
- [ctlyz123/CVE-2020-1948](https://github.com/ctlyz123/CVE-2020-1948)
- [DSO-Lab/Dubbo-CVE-2020-1948](https://github.com/DSO-Lab/Dubbo-CVE-2020-1948)
- [askDing/cve-2020-1948-poc](https://github.com/askDing/cve-2020-1948-poc)
- [txrw/Dubbo-CVE-2020-1948](https://github.com/txrw/Dubbo-CVE-2020-1948)
- [L0kiii/Dubbo-deserialization](https://github.com/L0kiii/Dubbo-deserialization)
### CVE-2020-1967
@ -707,14 +707,6 @@ In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.
- [motikan2010/CVE-2020-5398](https://github.com/motikan2010/CVE-2020-5398)
### CVE-2020-5405
<code>
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
</code>
- [DSO-Lab/SpringCloudConfig-CVEs](https://github.com/DSO-Lab/SpringCloudConfig-CVEs)
### CVE-2020-5410
<code>
@ -2658,7 +2650,6 @@ Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.
</code>
- [mpgn/CVE-2019-3799](https://github.com/mpgn/CVE-2019-3799)
- [DSO-Lab/SpringCloudConfig-CVEs](https://github.com/DSO-Lab/SpringCloudConfig-CVEs)
### CVE-2019-3847