Auto Update 2020/04/13 06:15:27

This commit is contained in:
motikan2010-bot 2020-04-13 06:15:27 +09:00
parent 31dea70ef4
commit 89c6c75543
32 changed files with 205 additions and 140 deletions

View file

@ -13,13 +13,13 @@
"description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-09T20:08:56Z",
"updated_at": "2020-03-29T08:18:26Z",
"updated_at": "2020-04-12T20:09:02Z",
"pushed_at": "2018-04-07T00:30:52Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 9,
"forks": 9,
"watchers": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 10,
"forks": 10,
"watchers": 21,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2020-03-29T08:18:18Z",
"updated_at": "2020-04-12T20:12:49Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 23,
"forks": 23,
"watchers": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 24,
"forks": 24,
"watchers": 49,
"score": 0
},
{

View file

@ -36,8 +36,8 @@
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
"fork": false,
"created_at": "2020-04-07T00:46:19Z",
"updated_at": "2020-04-11T19:26:35Z",
"pushed_at": "2020-04-07T02:30:32Z",
"updated_at": "2020-04-12T19:46:43Z",
"pushed_at": "2020-04-12T19:46:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-06T17:55:44Z",
"updated_at": "2020-04-10T14:32:44Z",
"updated_at": "2020-04-12T20:11:57Z",
"pushed_at": "2017-01-06T23:34:03Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 9,
"forks": 9,
"watchers": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 10,
"forks": 10,
"watchers": 34,
"score": 0
}
]

View file

@ -155,8 +155,8 @@
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 121,
"forks": 121,
"forks_count": 122,
"forks": 122,
"watchers": 304,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 56,
"forks": 56,
"forks_count": 57,
"forks": 57,
"watchers": 168,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 326,
"watchers_count": 326,
"forks_count": 299,
"forks": 299,
"forks_count": 300,
"forks": 300,
"watchers": 326,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.",
"fork": false,
"created_at": "2019-01-26T03:41:24Z",
"updated_at": "2020-03-30T04:24:25Z",
"updated_at": "2020-04-12T20:14:06Z",
"pushed_at": "2019-01-26T03:49:09Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 13,
"forks": 13,
"watchers": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 14,
"forks": 14,
"watchers": 40,
"score": 0
},
{

25
2018/CVE-2018-19320.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 255170065,
"name": "CVE-2018-19320",
"full_name": "fdiskyou\/CVE-2018-19320",
"owner": {
"login": "fdiskyou",
"id": 6840612,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6840612?v=4",
"html_url": "https:\/\/github.com\/fdiskyou"
},
"html_url": "https:\/\/github.com\/fdiskyou\/CVE-2018-19320",
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
"fork": false,
"created_at": "2020-04-12T21:06:26Z",
"updated_at": "2020-04-12T21:12:00Z",
"pushed_at": "2020-04-12T21:11:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 394,
"watchers_count": 394,
"forks_count": 171,
"forks": 171,
"forks_count": 172,
"forks": 172,
"watchers": 394,
"score": 0
},

View file

@ -611,13 +611,13 @@
"description": "CVE-2018-7600【Drupa7】批量扫描工具。",
"fork": false,
"created_at": "2020-04-12T07:37:14Z",
"updated_at": "2020-04-12T14:45:44Z",
"updated_at": "2020-04-12T17:10:10Z",
"pushed_at": "2020-04-12T08:22:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -1278,13 +1278,13 @@
"description": "A social experiment",
"fork": false,
"created_at": "2019-05-23T15:08:30Z",
"updated_at": "2020-04-07T14:14:51Z",
"updated_at": "2020-04-12T19:58:32Z",
"pushed_at": "2019-05-29T17:12:33Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 12,
"forks": 12,
"watchers": 88,
"watchers": 89,
"score": 0
},
{
@ -1347,13 +1347,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-04-08T10:31:46Z",
"updated_at": "2020-04-12T19:55:05Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 705,
"watchers_count": 705,
"stargazers_count": 706,
"watchers_count": 706,
"forks_count": 165,
"forks": 165,
"watchers": 705,
"watchers": 706,
"score": 0
},
{
@ -2179,8 +2179,8 @@
"pushed_at": "2019-09-20T04:53:41Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 37,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-04-04T11:04:55Z",
"updated_at": "2020-04-12T20:03:31Z",
"pushed_at": "2020-03-23T11:22:54Z",
"stargazers_count": 211,
"watchers_count": 211,
"forks_count": 39,
"forks": 39,
"watchers": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 40,
"forks": 40,
"watchers": 212,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-12-16T22:32:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2020-04-11T19:38:33Z",
"updated_at": "2020-04-12T15:25:45Z",
"pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 32,
"forks": 32,
"watchers": 90,
"watchers": 91,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2020-04-08T19:40:16Z",
"updated_at": "2020-04-12T18:22:32Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 61,
"forks": 61,
"watchers": 185,
"stargazers_count": 186,
"watchers_count": 186,
"forks_count": 62,
"forks": 62,
"watchers": 186,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-04-06T09:50:29Z",
"updated_at": "2020-04-12T16:46:53Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 19,
"forks": 19,
"watchers": 120,
"watchers": 119,
"score": 0
}
]

View file

@ -174,13 +174,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本均为亲测可用的脚本文件优先更新高危且易利用的漏洞利用脚本最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-12T15:06:31Z",
"updated_at": "2020-04-12T18:17:09Z",
"pushed_at": "2020-04-10T10:00:48Z",
"stargazers_count": 409,
"watchers_count": 409,
"forks_count": 82,
"forks": 82,
"watchers": 409,
"stargazers_count": 415,
"watchers_count": 415,
"forks_count": 83,
"forks": 83,
"watchers": 415,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 255116667,
"name": "CVE-2019-5475-EXP",
"full_name": "rabbitmask\/CVE-2019-5475-EXP",
"owner": {
"login": "rabbitmask",
"id": 37649548,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37649548?v=4",
"html_url": "https:\/\/github.com\/rabbitmask"
},
"html_url": "https:\/\/github.com\/rabbitmask\/CVE-2019-5475-EXP",
"description": "CVE-2019-5475-EXP 【Nexus Repository Manager 2.x远程命令执行漏洞】",
"fork": false,
"created_at": "2020-04-12T15:49:36Z",
"updated_at": "2020-04-12T17:09:11Z",
"pushed_at": "2020-04-12T15:59:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
"updated_at": "2020-03-21T18:45:33Z",
"updated_at": "2020-04-12T19:58:38Z",
"pushed_at": "2019-10-23T07:10:35Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 29,
"forks": 29,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :).",
"fork": false,
"created_at": "2019-09-17T17:59:26Z",
"updated_at": "2020-03-28T13:30:35Z",
"updated_at": "2020-04-12T16:35:52Z",
"pushed_at": "2019-10-15T17:05:38Z",
"stargazers_count": 261,
"watchers_count": 261,
"stargazers_count": 260,
"watchers_count": 260,
"forks_count": 46,
"forks": 46,
"watchers": 261,
"watchers": 260,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
"fork": false,
"created_at": "2019-05-06T15:47:20Z",
"updated_at": "2020-04-06T18:18:46Z",
"updated_at": "2020-04-12T15:58:38Z",
"pushed_at": "2019-05-08T16:22:58Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 23,
"forks": 23,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-04-10T13:16:23Z",
"updated_at": "2020-04-12T19:17:36Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 798,
"watchers_count": 798,
"stargazers_count": 799,
"watchers_count": 799,
"forks_count": 201,
"forks": 201,
"watchers": 798,
"watchers": 799,
"score": 0
},
{
@ -155,8 +155,8 @@
"pushed_at": "2020-03-22T15:14:31Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 78,
"forks": 78,
"forks_count": 79,
"forks": 79,
"watchers": 313,
"score": 0
},

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-01-28T12:36:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2020-04-12T14:46:53Z",
"updated_at": "2020-04-12T19:57:06Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 8,
"forks": 8,
"watchers": 26,
"watchers": 27,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 61,
"forks": 61,
"forks_count": 62,
"forks": 62,
"watchers": 170,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-04-12T06:19:48Z",
"updated_at": "2020-04-12T19:20:20Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 421,
"watchers_count": 421,
"stargazers_count": 423,
"watchers_count": 423,
"forks_count": 119,
"forks": 119,
"watchers": 421,
"watchers": 423,
"score": 0
},
{
@ -427,13 +427,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-04-10T09:08:06Z",
"updated_at": "2020-04-12T16:22:16Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"forks_count": 76,
"forks": 76,
"watchers": 194,
"watchers": 195,
"score": 0
},
{
@ -979,13 +979,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-12T03:14:12Z",
"updated_at": "2020-04-12T16:02:45Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 803,
"watchers_count": 803,
"stargazers_count": 805,
"watchers_count": 805,
"forks_count": 221,
"forks": 221,
"watchers": 803,
"watchers": 805,
"score": 0
},
{
@ -1002,13 +1002,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-04-12T06:56:12Z",
"updated_at": "2020-04-12T17:25:34Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 40,
"forks": 40,
"watchers": 125,
"watchers": 126,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本均为亲测可用的脚本文件优先更新高危且易利用的漏洞利用脚本最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-12T15:06:31Z",
"updated_at": "2020-04-12T18:17:09Z",
"pushed_at": "2020-04-10T10:00:48Z",
"stargazers_count": 409,
"watchers_count": 409,
"forks_count": 82,
"forks": 82,
"watchers": 409,
"stargazers_count": 415,
"watchers_count": 415,
"forks_count": 83,
"forks": 83,
"watchers": 415,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1958 PoC",
"fork": false,
"created_at": "2020-04-11T13:31:02Z",
"updated_at": "2020-04-12T09:50:26Z",
"updated_at": "2020-04-12T17:34:56Z",
"pushed_at": "2020-04-11T14:52:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-04-09T09:24:40Z",
"updated_at": "2020-04-12T16:29:21Z",
"pushed_at": "2020-04-07T02:57:46Z",
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 26,
"forks": 26,
"watchers": 91,
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 27,
"forks": 27,
"watchers": 92,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-12T02:25:31Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 9,
"score": 0
}

View file

@ -3175,6 +3175,7 @@ The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution whe
</code>
- [jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-](https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-)
- [rabbitmask/CVE-2019-5475-EXP](https://github.com/rabbitmask/CVE-2019-5475-EXP)
### CVE-2019-5489
@ -5309,6 +5310,14 @@ OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerab
- [mpgn/CVE-2018-19276](https://github.com/mpgn/CVE-2018-19276)
### CVE-2018-19320
<code>
The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system.
</code>
- [fdiskyou/CVE-2018-19320](https://github.com/fdiskyou/CVE-2018-19320)
### CVE-2018-19466
<code>
@ -12971,6 +12980,14 @@ Xerver Free Web Server 2.10 and earlier allows remote attackers to cause a denia
- [alt3kx/CVE-2002-0448](https://github.com/alt3kx/CVE-2002-0448)
### CVE-2002-0740
<code>
Buffer overflow in slrnpull for the SLRN package, when installed setuid or setgid, allows local users to gain privileges via a long -d (SPOOLDIR) argument.
</code>
- [alt3kx/CVE-2002-0740](https://github.com/alt3kx/CVE-2002-0740)
### CVE-2002-0991
<code>