Auto Update 2020/08/16 12:11:09

This commit is contained in:
motikan2010-bot 2020-08-16 12:11:09 +09:00
parent a6f954bd82
commit 74222fb1c4
19 changed files with 68 additions and 101 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 133421791,
"name": "CVE-2002-0200",
"full_name": "alt3kx\/CVE-2002-0200",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0200",
"description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.",
"fork": false,
"created_at": "2018-05-14T21:09:20Z",
"updated_at": "2018-05-14T21:49:15Z",
"pushed_at": "2018-05-14T21:49:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-15T10:41:28Z", "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z", "pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 639, "stargazers_count": 640,
"watchers_count": 639, "watchers_count": 640,
"forks_count": 152, "forks_count": 152,
"forks": 152, "forks": 152,
"watchers": 639, "watchers": 640,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-15T10:41:28Z", "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z", "pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 639, "stargazers_count": 640,
"watchers_count": 639, "watchers_count": 640,
"forks_count": 152, "forks_count": 152,
"forks": 152, "forks": 152,
"watchers": 639, "watchers": 640,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-15T10:41:28Z", "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z", "pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 639, "stargazers_count": 640,
"watchers_count": 639, "watchers_count": 640,
"forks_count": 152, "forks_count": 152,
"forks": 152, "forks": 152,
"watchers": 639, "watchers": 640,
"score": 0 "score": 0
} }
] ]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-15T10:41:28Z", "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z", "pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 639, "stargazers_count": 640,
"watchers_count": 639, "watchers_count": 640,
"forks_count": 152, "forks_count": 152,
"forks": 152, "forks": 152,
"watchers": 639, "watchers": 640,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-13T13:25:54Z", "pushed_at": "2020-08-13T13:25:54Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 8,
"forks": 0, "forks": 8,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-11-30T10:28:01Z", "pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 123, "stargazers_count": 123,
"watchers_count": 123, "watchers_count": 123,
"forks_count": 67, "forks_count": 68,
"forks": 67, "forks": 68,
"watchers": 123, "watchers": 123,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability", "description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false, "fork": false,
"created_at": "2020-03-13T14:53:54Z", "created_at": "2020-03-13T14:53:54Z",
"updated_at": "2020-08-12T19:13:39Z", "updated_at": "2020-08-16T00:29:03Z",
"pushed_at": "2020-03-22T19:46:04Z", "pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 166, "stargazers_count": 167,
"watchers_count": 166, "watchers_count": 167,
"forks_count": 52, "forks_count": 52,
"forks": 52, "forks": 52,
"watchers": 166, "watchers": 167,
"score": 0 "score": 0
}, },
{ {

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-15T10:41:28Z", "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z", "pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 639, "stargazers_count": 640,
"watchers_count": 639, "watchers_count": 640,
"forks_count": 152, "forks_count": 152,
"forks": 152, "forks": 152,
"watchers": 639, "watchers": 640,
"score": 0 "score": 0
} }
] ]

View file

@ -1094,13 +1094,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC", "description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false, "fork": false,
"created_at": "2020-04-20T14:35:48Z", "created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-08-12T11:28:10Z", "updated_at": "2020-08-16T00:00:36Z",
"pushed_at": "2020-06-09T20:46:45Z", "pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 304, "stargazers_count": 305,
"watchers_count": 304, "watchers_count": 305,
"forks_count": 98, "forks_count": 98,
"forks": 98, "forks": 98,
"watchers": 304, "watchers": 305,
"score": 0 "score": 0
}, },
{ {
@ -1351,8 +1351,8 @@
"pushed_at": "2020-06-19T20:58:36Z", "pushed_at": "2020-06-19T20:58:36Z",
"stargazers_count": 18, "stargazers_count": 18,
"watchers_count": 18, "watchers_count": 18,
"forks_count": 5, "forks_count": 6,
"forks": 5, "forks": 6,
"watchers": 18, "watchers": 18,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole", "description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
"fork": false, "fork": false,
"created_at": "2020-04-04T00:50:42Z", "created_at": "2020-04-04T00:50:42Z",
"updated_at": "2020-08-12T16:27:01Z", "updated_at": "2020-08-16T02:11:52Z",
"pushed_at": "2020-05-10T22:35:46Z", "pushed_at": "2020-05-10T22:35:46Z",
"stargazers_count": 19, "stargazers_count": 20,
"watchers_count": 19, "watchers_count": 20,
"forks_count": 6, "forks_count": 6,
"forks": 6, "forks": 6,
"watchers": 19, "watchers": 20,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation", "description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2020-07-21T08:01:20Z", "created_at": "2020-07-21T08:01:20Z",
"updated_at": "2020-08-15T18:45:27Z", "updated_at": "2020-08-15T23:59:58Z",
"pushed_at": "2020-07-21T10:28:42Z", "pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 111, "stargazers_count": 112,
"watchers_count": 111, "watchers_count": 112,
"forks_count": 18, "forks_count": 19,
"forks": 18, "forks": 19,
"watchers": 111, "watchers": 112,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)", "description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false, "fork": false,
"created_at": "2020-08-12T10:05:36Z", "created_at": "2020-08-12T10:05:36Z",
"updated_at": "2020-08-15T03:55:19Z", "updated_at": "2020-08-16T01:47:02Z",
"pushed_at": "2020-08-13T07:16:12Z", "pushed_at": "2020-08-13T07:16:12Z",
"stargazers_count": 96, "stargazers_count": 97,
"watchers_count": 96, "watchers_count": 97,
"forks_count": 24, "forks_count": 24,
"forks": 24, "forks": 24,
"watchers": 96, "watchers": 97,
"score": 0 "score": 0
} }
] ]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-04T20:14:54Z", "pushed_at": "2020-08-04T20:14:54Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"forks_count": 0, "forks_count": 1,
"forks": 0, "forks": 1,
"watchers": 3, "watchers": 3,
"score": 0 "score": 0
} }

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-15T10:41:28Z", "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z", "pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 639, "stargazers_count": 640,
"watchers_count": 639, "watchers_count": 640,
"forks_count": 152, "forks_count": 152,
"forks": 152, "forks": 152,
"watchers": 639, "watchers": 640,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)", "description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false, "fork": false,
"created_at": "2020-07-15T15:20:09Z", "created_at": "2020-07-15T15:20:09Z",
"updated_at": "2020-08-14T02:54:47Z", "updated_at": "2020-08-16T02:14:08Z",
"pushed_at": "2020-07-23T19:45:25Z", "pushed_at": "2020-07-23T19:45:25Z",
"stargazers_count": 114, "stargazers_count": 115,
"watchers_count": 114, "watchers_count": 115,
"forks_count": 38, "forks_count": 38,
"forks": 38, "forks": 38,
"watchers": 114, "watchers": 115,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.", "description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false, "fork": false,
"created_at": "2020-08-15T07:42:50Z", "created_at": "2020-08-15T07:42:50Z",
"updated_at": "2020-08-15T17:44:14Z", "updated_at": "2020-08-15T21:49:19Z",
"pushed_at": "2020-08-15T10:17:21Z", "pushed_at": "2020-08-15T10:17:21Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
} }
] ]

View file

@ -59,13 +59,13 @@
"description": "Pi-hole Remote Code Execution authenticated Version >= 4.3.2", "description": "Pi-hole Remote Code Execution authenticated Version >= 4.3.2",
"fork": false, "fork": false,
"created_at": "2020-08-04T10:23:28Z", "created_at": "2020-08-04T10:23:28Z",
"updated_at": "2020-08-14T19:08:37Z", "updated_at": "2020-08-16T02:14:30Z",
"pushed_at": "2020-08-05T22:38:53Z", "pushed_at": "2020-08-05T22:38:53Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"forks_count": 1, "forks_count": 1,
"forks": 1, "forks": 1,
"watchers": 7, "watchers": 8,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,8 +13,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-08-15T14:29:49Z", "created_at": "2020-08-15T14:29:49Z",
"updated_at": "2020-08-15T14:50:55Z", "updated_at": "2020-08-16T01:04:03Z",
"pushed_at": "2020-08-15T14:50:53Z", "pushed_at": "2020-08-16T01:04:01Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -14766,14 +14766,6 @@ Directory traversal vulnerability in UnZip 5.50 allows attackers to overwrite ar
## 2002 ## 2002
### CVE-2002-0200
<code>
Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.
</code>
- [alt3kx/CVE-2002-0200](https://github.com/alt3kx/CVE-2002-0200)
### CVE-2002-0201 ### CVE-2002-0201
<code> <code>