Auto Update 2021/01/15 06:11:43

This commit is contained in:
motikan2010-bot 2021-01-15 06:11:43 +09:00
parent 6bb54b806a
commit 8deb57d9db
14 changed files with 125 additions and 53 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 18,
"score": 0
},

View file

@ -1328,8 +1328,8 @@
"pushed_at": "2019-05-28T02:46:19Z",
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 39,
"forks": 39,
"forks_count": 40,
"forks": 40,
"watchers": 114,
"score": 0
},
@ -1439,13 +1439,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-01-09T12:21:20Z",
"updated_at": "2021-01-14T15:28:59Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1055,
"watchers_count": 1055,
"stargazers_count": 1056,
"watchers_count": 1056,
"forks_count": 354,
"forks": 354,
"watchers": 1055,
"watchers": 1056,
"score": 0
},
{
@ -2267,13 +2267,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2020-12-22T09:03:00Z",
"updated_at": "2021-01-14T16:46:27Z",
"pushed_at": "2020-12-21T14:26:14Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 65,
"forks": 65,
"watchers": 171,
"watchers": 172,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2021-01-12T15:33:58Z",
"updated_at": "2021-01-14T15:22:06Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 59,
"forks": 59,
"watchers": 184,
"watchers": 185,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-03T14:12:56Z",
"updated_at": "2021-01-14T13:35:47Z",
"updated_at": "2021-01-14T17:21:53Z",
"pushed_at": "2020-12-12T03:41:43Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"watchers": 11,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "POC to run system component in an untrusted-app process",
"fork": false,
"created_at": "2021-01-06T18:51:19Z",
"updated_at": "2021-01-08T10:26:51Z",
"updated_at": "2021-01-14T17:00:44Z",
"pushed_at": "2021-01-08T10:26:49Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -1167,8 +1167,8 @@
"pushed_at": "2020-06-05T16:21:55Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 10,
"score": 0
},
@ -1347,12 +1347,12 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2020-12-10T07:57:49Z",
"pushed_at": "2020-11-17T20:39:52Z",
"updated_at": "2021-01-14T18:50:17Z",
"pushed_at": "2021-01-14T18:50:13Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 29,
"forks": 29,
"forks_count": 30,
"forks": 30,
"watchers": 72,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
"fork": false,
"created_at": "2020-07-15T05:55:20Z",
"updated_at": "2020-11-14T00:21:43Z",
"updated_at": "2021-01-14T18:47:12Z",
"pushed_at": "2020-07-20T02:20:43Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-14T08:02:25Z",
"updated_at": "2021-01-14T15:46:45Z",
"pushed_at": "2021-01-13T10:38:48Z",
"stargazers_count": 748,
"watchers_count": 748,
"stargazers_count": 749,
"watchers_count": 749,
"forks_count": 133,
"forks": 133,
"watchers": 748,
"watchers": 749,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
"fork": false,
"created_at": "2021-01-14T10:49:40Z",
"updated_at": "2021-01-14T15:08:24Z",
"updated_at": "2021-01-14T15:43:05Z",
"pushed_at": "2021-01-14T13:35:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC CVE-2020-6308",
"fork": false,
"created_at": "2020-12-27T10:37:11Z",
"updated_at": "2021-01-14T05:07:58Z",
"updated_at": "2021-01-14T16:46:04Z",
"pushed_at": "2020-12-29T10:49:49Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 6,
"forks": 6,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

25
2020/CVE-2020-7200.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 329734215,
"name": "CVE-2020-7200",
"full_name": "alexfrancow\/CVE-2020-7200",
"owner": {
"login": "alexfrancow",
"id": 23419929,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4",
"html_url": "https:\/\/github.com\/alexfrancow"
},
"html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-7200",
"description": null,
"fork": false,
"created_at": "2021-01-14T21:05:29Z",
"updated_at": "2021-01-14T21:11:23Z",
"pushed_at": "2021-01-14T21:11:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -136,5 +136,28 @@
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 329711989,
"name": "CVE-2020-7961",
"full_name": "ShutdownRepo\/CVE-2020-7961",
"owner": {
"login": "ShutdownRepo",
"id": 40902872,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40902872?v=4",
"html_url": "https:\/\/github.com\/ShutdownRepo"
},
"html_url": "https:\/\/github.com\/ShutdownRepo\/CVE-2020-7961",
"description": "Exploit script for CVE-2020-7961",
"fork": false,
"created_at": "2021-01-14T19:18:13Z",
"updated_at": "2021-01-14T20:38:23Z",
"pushed_at": "2021-01-14T19:26:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
"fork": false,
"created_at": "2020-06-05T20:40:28Z",
"updated_at": "2021-01-14T08:28:27Z",
"updated_at": "2021-01-14T18:24:56Z",
"pushed_at": "2020-06-05T21:04:43Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 11,
"forks": 11,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -1198,6 +1198,14 @@ The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowe
- [ElmouradiAmine/CVE-2020-7048](https://github.com/ElmouradiAmine/CVE-2020-7048)
### CVE-2020-7200 (2020-12-18)
<code>
A potential security vulnerability has been identified in HPE Systems Insight Manager (SIM) version 7.6. The vulnerability could be exploited to allow remote code execution.
</code>
- [alexfrancow/CVE-2020-7200](https://github.com/alexfrancow/CVE-2020-7200)
### CVE-2020-7209 (2020-02-12)
<code>
@ -1307,6 +1315,7 @@ Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows
- [shacojx/GLiferay](https://github.com/shacojx/GLiferay)
- [shacojx/POC-CVE-2020-7961-Token-iterate](https://github.com/shacojx/POC-CVE-2020-7961-Token-iterate)
- [Udyz/CVE-2020-7961-Mass](https://github.com/Udyz/CVE-2020-7961-Mass)
- [ShutdownRepo/CVE-2020-7961](https://github.com/ShutdownRepo/CVE-2020-7961)
### CVE-2020-7980 (2020-01-25)
@ -3378,10 +3387,20 @@ An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-
- [lukaszstu/SmartAsset-CORS-CVE-2020-26527](https://github.com/lukaszstu/SmartAsset-CORS-CVE-2020-26527)
### CVE-2020-26732
### CVE-2020-26732 (2021-01-14)
<code>
Skyworth GN542VF Boa version 0.94.13 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.
</code>
- [swzhouu/CVE-2020-26732](https://github.com/swzhouu/CVE-2020-26732)
### CVE-2020-26733
### CVE-2020-26733 (2021-01-14)
<code>
Cross Site Scripting (XSS) in Configuration page in SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 allows authenticated attacker to inject their own script into the page via DDNS Configuration Section.
</code>
- [swzhouu/CVE-2020-26733](https://github.com/swzhouu/CVE-2020-26733)
### CVE-2020-27151 (2020-12-07)
@ -3420,7 +3439,12 @@ An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's
- [seb1055/cve-2020-27358-27359](https://github.com/seb1055/cve-2020-27358-27359)
### CVE-2020-27368
### CVE-2020-27368 (2021-01-14)
<code>
Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /icons/ directories via GET Parameter.
</code>
- [swzhouu/CVE-2020-27368](https://github.com/swzhouu/CVE-2020-27368)
### CVE-2020-27603 (2020-10-21)