Auto Update 2020/09/10 00:09:54

This commit is contained in:
motikan2010-bot 2020-09-10 00:09:54 +09:00
parent 991ef6a552
commit 8fb114b1ca
21 changed files with 368 additions and 54 deletions

25
2015/CVE-2015-0006.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 19259219,
"name": "imposter",
"full_name": "bugch3ck\/imposter",
"owner": {
"login": "bugch3ck",
"id": 4165895,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4165895?v=4",
"html_url": "https:\/\/github.com\/bugch3ck"
},
"html_url": "https:\/\/github.com\/bugch3ck\/imposter",
"description": "Proof of concept for CVE-2015-0006. Fixed in MS15-005 https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2015\/ms15-005 .",
"fork": false,
"created_at": "2014-04-29T01:05:57Z",
"updated_at": "2018-06-26T21:10:14Z",
"pushed_at": "2014-06-07T23:45:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,188 @@
[
{
"id": 29925728,
"name": "ghost-checker",
"full_name": "fser\/ghost-checker",
"owner": {
"login": "fser",
"id": 774138,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/774138?v=4",
"html_url": "https:\/\/github.com\/fser"
},
"html_url": "https:\/\/github.com\/fser\/ghost-checker",
"description": "Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security",
"fork": false,
"created_at": "2015-01-27T17:31:33Z",
"updated_at": "2018-05-15T04:55:01Z",
"pushed_at": "2015-01-27T17:35:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 29933656,
"name": "CVE-2015-0235-cookbook",
"full_name": "mikesplain\/CVE-2015-0235-cookbook",
"owner": {
"login": "mikesplain",
"id": 881965,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/881965?v=4",
"html_url": "https:\/\/github.com\/mikesplain"
},
"html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
"description": "A chef cookbook to test the GHOST vulnerability",
"fork": false,
"created_at": "2015-01-27T20:34:42Z",
"updated_at": "2017-09-29T11:32:54Z",
"pushed_at": "2015-01-27T21:41:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 29941036,
"name": "CVE-2015-0235-test",
"full_name": "aaronfay\/CVE-2015-0235-test",
"owner": {
"login": "aaronfay",
"id": 1033941,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1033941?v=4",
"html_url": "https:\/\/github.com\/aaronfay"
},
"html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
"description": "Ansible playbook to check vulnerability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-27T23:45:22Z",
"updated_at": "2016-08-31T16:50:49Z",
"pushed_at": "2015-01-29T03:33:29Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"score": 0
},
{
"id": 29942046,
"name": "ghost",
"full_name": "piyokango\/ghost",
"owner": {
"login": "piyokango",
"id": 10733273,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10733273?v=4",
"html_url": "https:\/\/github.com\/piyokango"
},
"html_url": "https:\/\/github.com\/piyokango\/ghost",
"description": "glibc vulnerability GHOST(CVE-2015-0235) Affected software list",
"fork": false,
"created_at": "2015-01-28T00:14:35Z",
"updated_at": "2015-08-13T21:27:35Z",
"pushed_at": "2015-01-28T14:29:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 29948700,
"name": "GHOSTCHECK-cve-2015-0235",
"full_name": "LyricalSecurity\/GHOSTCHECK-cve-2015-0235",
"owner": {
"login": "LyricalSecurity",
"id": 10375093,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10375093?v=4",
"html_url": "https:\/\/github.com\/LyricalSecurity"
},
"html_url": "https:\/\/github.com\/LyricalSecurity\/GHOSTCHECK-cve-2015-0235",
"description": null,
"fork": false,
"created_at": "2015-01-28T03:30:21Z",
"updated_at": "2020-04-23T22:26:31Z",
"pushed_at": "2015-01-28T15:10:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 29950345,
"name": "CVE-2015-0235_GHOST",
"full_name": "mholzinger\/CVE-2015-0235_GHOST",
"owner": {
"login": "mholzinger",
"id": 235958,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/235958?v=4",
"html_url": "https:\/\/github.com\/mholzinger"
},
"html_url": "https:\/\/github.com\/mholzinger\/CVE-2015-0235_GHOST",
"description": null,
"fork": false,
"created_at": "2015-01-28T04:22:05Z",
"updated_at": "2016-02-26T05:46:40Z",
"pushed_at": "2015-01-28T05:26:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 29988916,
"name": "ansible-CVE-2015-0235-GHOST",
"full_name": "adherzog\/ansible-CVE-2015-0235-GHOST",
"owner": {
"login": "adherzog",
"id": 1744181,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1744181?v=4",
"html_url": "https:\/\/github.com\/adherzog"
},
"html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST",
"description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability",
"fork": false,
"created_at": "2015-01-28T21:22:33Z",
"updated_at": "2015-01-28T21:23:35Z",
"pushed_at": "2015-01-28T21:23:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 29993101,
"name": "lenny-libc6",
"full_name": "favoretti\/lenny-libc6",
"owner": {
"login": "favoretti",
"id": 805046,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/805046?v=4",
"html_url": "https:\/\/github.com\/favoretti"
},
"html_url": "https:\/\/github.com\/favoretti\/lenny-libc6",
"description": "CVE-2015-0235 patches lenny libc6 packages for amd64",
"fork": false,
"created_at": "2015-01-28T23:09:13Z",
"updated_at": "2015-01-28T23:09:13Z",
"pushed_at": "2015-01-28T23:11:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 30004399,
"name": "cfengine-CVE_2015_0235",

View file

@ -178,8 +178,8 @@
"pushed_at": "2017-11-28T03:06:32Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 49,
"forks": 49,
"forks_count": 50,
"forks": 50,
"watchers": 37,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2020-09-06T20:27:30Z",
"updated_at": "2020-09-09T14:57:12Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 181,
"forks": 181,
"watchers": 674,
"watchers": 675,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-01-11T09:23:05Z",
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 32,
"forks": 32,
"forks_count": 33,
"forks": 33,
"watchers": 68,
"score": 0
},

View file

@ -36,7 +36,7 @@
"description": "CVE-2019-0230 & s2-059 poc.",
"fork": false,
"created_at": "2020-08-20T08:21:54Z",
"updated_at": "2020-09-02T08:46:10Z",
"updated_at": "2020-09-09T09:44:35Z",
"pushed_at": "2020-08-21T12:41:14Z",
"stargazers_count": 22,
"watchers_count": 22,

View file

@ -979,13 +979,13 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2020-08-02T02:06:59Z",
"updated_at": "2020-09-09T14:43:43Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 467,
"watchers_count": 467,
"stargazers_count": 466,
"watchers_count": 466,
"forks_count": 188,
"forks": 188,
"watchers": 467,
"watchers": 466,
"score": 0
},
{
@ -1094,13 +1094,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-09-08T06:51:46Z",
"updated_at": "2020-09-09T14:43:43Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1118,
"watchers_count": 1118,
"stargazers_count": 1117,
"watchers_count": 1117,
"forks_count": 380,
"forks": 380,
"watchers": 1118,
"watchers": 1117,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-09-02T23:29:27Z",
"updated_at": "2020-09-09T13:43:30Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 672,
"watchers_count": 672,
"stargazers_count": 673,
"watchers_count": 673,
"forks_count": 58,
"forks": 58,
"watchers": 672,
"watchers": 673,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2020-08-26T07:04:54Z",
"updated_at": "2020-09-09T14:43:43Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 91,
"forks": 91,
"watchers": 238,
"watchers": 237,
"score": 0
},
{

View file

@ -266,8 +266,8 @@
"description": "(CVE-2019-16759) vBulletin_Routestring-RCE",
"fork": false,
"created_at": "2020-08-31T13:44:15Z",
"updated_at": "2020-09-03T14:47:06Z",
"pushed_at": "2020-09-03T14:32:40Z",
"updated_at": "2020-09-09T09:35:35Z",
"pushed_at": "2020-09-09T09:35:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-09-09T01:58:05Z",
"updated_at": "2020-09-09T14:38:54Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1589,
"watchers_count": 1589,
"stargazers_count": 1590,
"watchers_count": 1590,
"forks_count": 423,
"forks": 423,
"watchers": 1589,
"watchers": 1590,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-09-08T09:45:52Z",
"updated_at": "2020-09-09T09:37:55Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 529,
"watchers_count": 529,
"stargazers_count": 530,
"watchers_count": 530,
"forks_count": 180,
"forks": 180,
"watchers": 529,
"watchers": 530,
"score": 0
},
{
@ -1049,7 +1049,7 @@
"fork": false,
"created_at": "2020-04-06T15:16:10Z",
"updated_at": "2020-08-25T06:24:43Z",
"pushed_at": "2020-04-06T15:22:01Z",
"pushed_at": "2020-09-09T09:42:22Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 16,

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
"fork": false,
"created_at": "2020-04-05T15:52:43Z",
"updated_at": "2020-09-05T18:42:32Z",
"updated_at": "2020-09-09T14:06:59Z",
"pushed_at": "2020-06-09T20:41:32Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 35,
"forks": 35,
"watchers": 118,
"watchers": 119,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2020-09-07T06:42:37Z",
"updated_at": "2020-09-09T13:35:41Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 329,
"watchers_count": 329,
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 58,
"forks": 58,
"watchers": 329,
"watchers": 330,
"score": 0
},
{

25
2020/CVE-2020-13933.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 294077686,
"name": "CVE-2020-13933",
"full_name": "lyy289065406\/CVE-2020-13933",
"owner": {
"login": "lyy289065406",
"id": 17040287,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17040287?v=4",
"html_url": "https:\/\/github.com\/lyy289065406"
},
"html_url": "https:\/\/github.com\/lyy289065406\/CVE-2020-13933",
"description": "CVE-2020-13933 靶场: shiro < 1.6.0 认证绕过漏洞",
"fork": false,
"created_at": "2020-09-09T10:20:25Z",
"updated_at": "2020-09-09T10:47:53Z",
"pushed_at": "2020-09-09T10:47:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-10T10:49:38Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 112,
"score": 0
}

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2020-09-08T10:42:27Z",
"updated_at": "2020-09-09T09:16:38Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 18,
"forks": 18,
"watchers": 127,
"watchers": 128,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-09-09T01:58:05Z",
"updated_at": "2020-09-09T14:38:54Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1589,
"watchers_count": 1589,
"stargazers_count": 1590,
"watchers_count": 1590,
"forks_count": 423,
"forks": 423,
"watchers": 1589,
"watchers": 1590,
"score": 0
},
{

25
2020/CVE-2020-8150.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 294140303,
"name": "CVE-2020-8150",
"full_name": "geffner\/CVE-2020-8150",
"owner": {
"login": "geffner",
"id": 4524253,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4524253?v=4",
"html_url": "https:\/\/github.com\/geffner"
},
"html_url": "https:\/\/github.com\/geffner\/CVE-2020-8150",
"description": "CVE-2020-8150 Remote Code Execution as SYSTEM\/root via Backblaze",
"fork": false,
"created_at": "2020-09-09T14:39:16Z",
"updated_at": "2020-09-09T14:41:50Z",
"pushed_at": "2020-09-09T14:41:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-8152.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 294141202,
"name": "CVE-2020-8152",
"full_name": "geffner\/CVE-2020-8152",
"owner": {
"login": "geffner",
"id": 4524253,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4524253?v=4",
"html_url": "https:\/\/github.com\/geffner"
},
"html_url": "https:\/\/github.com\/geffner\/CVE-2020-8152",
"description": "CVE-2020-8152 Elevation of Privilege in Backblaze",
"fork": false,
"created_at": "2020-09-09T14:42:36Z",
"updated_at": "2020-09-09T14:43:36Z",
"pushed_at": "2020-09-09T14:43:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1067,6 +1067,12 @@ A vulnerability in the improper handling of symbolic links in Bitdefender Antivi
- [RedyOpsResearchLabs/-CVE-2020-8103-Bitdefender-Antivirus-Free-EoP](https://github.com/RedyOpsResearchLabs/-CVE-2020-8103-Bitdefender-Antivirus-Free-EoP)
### CVE-2020-8150
- [geffner/CVE-2020-8150](https://github.com/geffner/CVE-2020-8150)
### CVE-2020-8152
- [geffner/CVE-2020-8152](https://github.com/geffner/CVE-2020-8152)
### CVE-2020-8163
<code>
@ -1872,6 +1878,14 @@ Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the
- [bit4woo/CVE-2020-13925](https://github.com/bit4woo/CVE-2020-13925)
### CVE-2020-13933
<code>
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.
</code>
- [lyy289065406/CVE-2020-13933](https://github.com/lyy289065406/CVE-2020-13933)
### CVE-2020-13996
<code>
@ -11967,6 +11981,14 @@ Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing
## 2015
### CVE-2015-0006
<code>
The Network Location Awareness (NLA) service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not perform mutual authentication to determine a domain connection, which allows remote attackers to trigger an unintended permissive configuration by spoofing DNS and LDAP responses on a local network, aka &quot;NLA Security Feature Bypass Vulnerability.&quot;
</code>
- [bugch3ck/imposter](https://github.com/bugch3ck/imposter)
### CVE-2015-0057
<code>
@ -12008,6 +12030,14 @@ Use-after-free vulnerability in the process_nested_data function in ext/standard
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka &quot;GHOST.&quot;
</code>
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
- [piyokango/ghost](https://github.com/piyokango/ghost)
- [LyricalSecurity/GHOSTCHECK-cve-2015-0235](https://github.com/LyricalSecurity/GHOSTCHECK-cve-2015-0235)
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)