Auto Update 2020/06/23 00:09:15

This commit is contained in:
motikan2010-bot 2020-06-23 00:09:15 +09:00
parent 4b2add1b95
commit 7ac42760fc
29 changed files with 169 additions and 122 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 132968731,
"name": "CVE-2001-0680",
"full_name": "alt3kx\/CVE-2001-0680",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0680",
"description": "Directory traversal vulnerability in ftpd in QPC QVT\/Net 4.0 and AVT\/Term 5.0",
"fork": false,
"created_at": "2018-05-11T00:29:56Z",
"updated_at": "2018-05-11T09:19:48Z",
"pushed_at": "2018-05-11T09:19:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 274131989,
"name": "CVE-2004-1561",
"full_name": "darrynb89\/CVE-2004-1561",
"owner": {
"login": "darrynb89",
"id": 23241437,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23241437?v=4",
"html_url": "https:\/\/github.com\/darrynb89"
},
"html_url": "https:\/\/github.com\/darrynb89\/CVE-2004-1561",
"description": "Python version of Metasploit exploit for CVE-2004-1561",
"fork": false,
"created_at": "2020-06-22T12:33:49Z",
"updated_at": "2020-06-22T12:35:21Z",
"pushed_at": "2020-06-22T12:35:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -454,8 +454,8 @@
"pushed_at": "2017-01-27T10:04:07Z",
"stargazers_count": 247,
"watchers_count": 247,
"forks_count": 109,
"forks": 109,
"forks_count": 108,
"forks": 108,
"watchers": 247,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel\/createFromParcel mismatch)",
"fork": false,
"created_at": "2018-06-03T09:04:50Z",
"updated_at": "2020-04-10T03:52:06Z",
"updated_at": "2020-06-22T13:09:19Z",
"pushed_at": "2018-06-03T09:06:00Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 8,
"forks": 8,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-06-17T02:28:29Z",
"updated_at": "2020-06-22T12:27:47Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 66,
"forks": 66,
"watchers": 199,
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 67,
"forks": 67,
"watchers": 200,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "😳 Extremely simple yet effective PoC for CVE-2017-16934",
"fork": false,
"created_at": "2020-05-15T12:09:06Z",
"updated_at": "2020-06-13T15:37:34Z",
"updated_at": "2020-06-22T14:51:46Z",
"pushed_at": "2020-05-15T13:03:31Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false,
"created_at": "2018-03-12T16:44:12Z",
"updated_at": "2020-06-17T09:12:48Z",
"updated_at": "2020-06-22T11:33:07Z",
"pushed_at": "2018-03-12T16:50:20Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 21,
"forks": 21,
"watchers": 49,
"watchers": 50,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "PoC CVE-2017-5123 - LPE - Bypassing SMEP\/SMAP. No KASLR",
"fork": false,
"created_at": "2020-05-08T15:10:38Z",
"updated_at": "2020-06-22T01:54:43Z",
"updated_at": "2020-06-22T14:23:29Z",
"pushed_at": "2020-06-19T15:12:31Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"forks": 3,
"watchers": 10,
"watchers": 12,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2020-06-19T02:12:36Z",
"updated_at": "2020-06-22T09:50:41Z",
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 86,
"forks": 86,
"watchers": 237,
"watchers": 238,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Proof of concept showing how to exploit the CVE-2018-11759",
"fork": false,
"created_at": "2018-11-01T09:11:07Z",
"updated_at": "2020-04-06T11:00:03Z",
"updated_at": "2020-06-22T13:29:00Z",
"pushed_at": "2018-12-11T12:59:26Z",
"stargazers_count": 34,
"watchers_count": 34,

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-03-06T10:52:19Z",
"stargazers_count": 405,
"watchers_count": 405,
"forks_count": 127,
"forks": 127,
"forks_count": 126,
"forks": 126,
"watchers": 405,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "Pulse Secure SSL VPN pre-auth file reading",
"fork": false,
"created_at": "2019-08-22T08:18:19Z",
"updated_at": "2020-06-18T11:27:27Z",
"updated_at": "2020-06-22T09:44:45Z",
"pushed_at": "2019-08-26T19:33:43Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 16,
"forks": 16,
"watchers": 45,
"watchers": 46,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-22T03:22:14Z",
"updated_at": "2020-06-22T13:43:18Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 960,
"watchers_count": 960,
"forks_count": 242,
"forks": 242,
"watchers": 960,
"stargazers_count": 961,
"watchers_count": 961,
"forks_count": 244,
"forks": 244,
"watchers": 961,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "CVE 2019-2215 Android Binder Use After Free",
"fork": false,
"created_at": "2019-10-16T11:27:44Z",
"updated_at": "2020-04-30T11:43:48Z",
"updated_at": "2020-06-22T13:49:33Z",
"pushed_at": "2020-03-16T07:20:14Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 11,
"forks": 11,
"watchers": 49,
"watchers": 50,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-06-17T02:28:29Z",
"updated_at": "2020-06-22T12:27:47Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 66,
"forks": 66,
"watchers": 199,
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 67,
"forks": 67,
"watchers": 200,
"score": 0
},
{

View file

@ -174,8 +174,8 @@
"description": "CVE-2019-5736 POCs",
"fork": false,
"created_at": "2019-02-20T12:23:13Z",
"updated_at": "2020-06-17T03:19:02Z",
"pushed_at": "2020-06-16T18:20:12Z",
"updated_at": "2020-06-22T13:04:58Z",
"pushed_at": "2020-06-22T13:04:55Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 17,

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-10-23T07:10:35Z",
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 32,
"forks": 32,
"forks_count": 31,
"forks": 31,
"watchers": 89,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 42,
"forks": 42,
"forks_count": 43,
"forks": 43,
"watchers": 170,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-06-22T09:09:28Z",
"updated_at": "2020-06-22T15:03:52Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 280,
"watchers_count": 280,
"forks_count": 59,
"forks": 59,
"watchers": 268,
"watchers": 280,
"score": 0
}
]

View file

@ -1443,8 +1443,8 @@
"pushed_at": "2020-06-19T01:20:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 8,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-1015",
"fork": false,
"created_at": "2020-05-13T16:42:17Z",
"updated_at": "2020-06-18T09:09:16Z",
"updated_at": "2020-06-22T14:48:34Z",
"pushed_at": "2020-05-16T05:15:35Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 7,
"forks": 7,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
"fork": false,
"created_at": "2020-06-16T23:22:15Z",
"updated_at": "2020-06-22T06:35:41Z",
"updated_at": "2020-06-22T14:47:51Z",
"pushed_at": "2020-06-17T18:10:30Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 19,
"forks": 19,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-22T03:22:14Z",
"updated_at": "2020-06-22T13:43:18Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 960,
"watchers_count": 960,
"forks_count": 242,
"forks": 242,
"watchers": 960,
"stargazers_count": 961,
"watchers_count": 961,
"forks_count": 244,
"forks": 244,
"watchers": 961,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2020-06-21T17:04:11Z",
"updated_at": "2020-06-22T14:19:45Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 47,
"forks": 47,
"watchers": 300,
"watchers": 301,
"score": 0
},
{

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-13646",
"description": null,
"description": "liebaowifi",
"fork": false,
"created_at": "2020-05-29T13:43:03Z",
"updated_at": "2020-06-06T05:15:50Z",
"updated_at": "2020-06-22T11:59:51Z",
"pushed_at": "2020-06-06T05:15:48Z",
"stargazers_count": 0,
"watchers_count": 0,

25
2020/CVE-2020-14955.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 270064911,
"name": "CVE-2020-14955",
"full_name": "y5s5k5\/CVE-2020-14955",
"owner": {
"login": "y5s5k5",
"id": 53048989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-14955",
"description": "Jiangmin",
"fork": false,
"created_at": "2020-06-06T18:15:35Z",
"updated_at": "2020-06-22T12:49:46Z",
"pushed_at": "2020-06-19T15:08:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-14957.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 272884163,
"name": "CVE-2020-14957-CVE-2020-14956",
"full_name": "y5s5k5\/CVE-2020-14957-CVE-2020-14956",
"owner": {
"login": "y5s5k5",
"id": 53048989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-14957-CVE-2020-14956",
"description": " windows cleaning assistant",
"fork": false,
"created_at": "2020-06-17T05:16:08Z",
"updated_at": "2020-06-22T12:50:04Z",
"pushed_at": "2020-06-17T05:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-20T04:27:52Z",
"updated_at": "2020-06-21T03:20:42Z",
"updated_at": "2020-06-22T14:24:33Z",
"pushed_at": "2020-06-06T11:18:28Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"forks": 2,
"watchers": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"forks": 3,
"watchers": 12,
"score": 0
}
]

View file

@ -766,6 +766,12 @@ showAlert() in the administration panel in Bludit 3.12.0 allows XSS.
- [gh0st56/CVE-2020-13889](https://github.com/gh0st56/CVE-2020-13889)
### CVE-2020-14955
- [y5s5k5/CVE-2020-14955](https://github.com/y5s5k5/CVE-2020-14955)
### CVE-2020-14957
- [y5s5k5/CVE-2020-14957-CVE-2020-14956](https://github.com/y5s5k5/CVE-2020-14957-CVE-2020-14956)
### CVE-2020-1611
<code>
@ -13912,6 +13918,7 @@ Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute
</code>
- [ivanitlearning/CVE-2004-1561](https://github.com/ivanitlearning/CVE-2004-1561)
- [darrynb89/CVE-2004-1561](https://github.com/darrynb89/CVE-2004-1561)
### CVE-2004-1769
@ -14061,14 +14068,6 @@ Buffer overflows in the cifslogin command for HP CIFS/9000 Client A.01.06 and ea
## 2001
### CVE-2001-0680
<code>
Directory traversal vulnerability in ftpd in QPC QVT/Net 4.0 and AVT/Term 5.0 allows a remote attacker to traverse directories on the web server via a &quot;dot dot&quot; attack in a LIST (ls) command.
</code>
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
### CVE-2001-0758
<code>