Auto Update 2020/07/21 00:08:55

This commit is contained in:
motikan2010-bot 2020-07-21 00:08:55 +09:00
parent 64ec382edb
commit 92e6d256f4
26 changed files with 244 additions and 107 deletions

View file

@ -615,8 +615,8 @@
"pushed_at": "2018-05-27T08:24:17Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 30,
"forks": 30,
"forks_count": 31,
"forks": 31,
"watchers": 82,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-13379",
"fork": false,
"created_at": "2019-08-11T09:44:37Z",
"updated_at": "2020-07-03T04:08:05Z",
"updated_at": "2020-07-20T14:42:49Z",
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 204,
"watchers_count": 204,
"forks_count": 72,
"forks": 72,
"watchers": 203,
"watchers": 204,
"score": 0
},
{

View file

@ -1002,13 +1002,13 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2020-07-16T08:54:37Z",
"updated_at": "2020-07-20T14:42:46Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 463,
"watchers_count": 463,
"stargazers_count": 464,
"watchers_count": 464,
"forks_count": 188,
"forks": 188,
"watchers": 463,
"watchers": 464,
"score": 0
},
{
@ -1535,8 +1535,8 @@
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1037,
"watchers_count": 1037,
"forks_count": 348,
"forks": 348,
"forks_count": 347,
"forks": 347,
"watchers": 1037,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 219,
"watchers_count": 219,
"forks_count": 97,
"forks": 97,
"forks_count": 96,
"forks": 96,
"watchers": 219,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-04-10T09:44:38Z",
"updated_at": "2020-07-09T02:24:48Z",
"updated_at": "2020-07-20T14:35:51Z",
"pushed_at": "2019-09-11T08:46:24Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 17,
"forks": 17,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2020-07-13T02:46:58Z",
"updated_at": "2020-07-20T14:07:36Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 49,
"forks": 49,
"watchers": 159,
"watchers": 160,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-20T07:49:14Z",
"updated_at": "2020-07-20T14:41:12Z",
"pushed_at": "2020-07-14T10:20:14Z",
"stargazers_count": 1313,
"watchers_count": 1313,
"stargazers_count": 1315,
"watchers_count": 1315,
"forks_count": 327,
"forks": 327,
"watchers": 1313,
"watchers": 1315,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-02-29T21:36:46Z",
"updated_at": "2020-04-09T15:10:25Z",
"updated_at": "2020-07-20T14:16:30Z",
"pushed_at": "2020-03-05T12:29:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-2107",
"fork": false,
"created_at": "2019-07-08T14:18:33Z",
"updated_at": "2020-06-16T06:42:38Z",
"updated_at": "2020-07-20T13:31:27Z",
"pushed_at": "2019-07-25T08:01:07Z",
"stargazers_count": 307,
"watchers_count": 307,
"stargazers_count": 308,
"watchers_count": 308,
"forks_count": 95,
"forks": 95,
"watchers": 307,
"watchers": 308,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-07-19T19:33:08Z",
"updated_at": "2020-07-20T13:16:24Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 815,
"watchers_count": 815,
"stargazers_count": 816,
"watchers_count": 816,
"forks_count": 210,
"forks": 210,
"watchers": 815,
"watchers": 816,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "win32k use-after-free poc",
"fork": false,
"created_at": "2020-04-22T13:11:16Z",
"updated_at": "2020-07-13T02:05:09Z",
"updated_at": "2020-07-20T14:22:00Z",
"pushed_at": "2020-04-22T13:11:27Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 33,
"forks": 33,
"watchers": 58,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 34,
"forks": 34,
"watchers": 61,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-07-20T04:56:18Z",
"updated_at": "2020-07-20T10:11:22Z",
"pushed_at": "2020-07-17T20:58:16Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 7,
"forks": 7,
"watchers": 29,
"watchers": 30,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2020-07-20T08:29:40Z",
"updated_at": "2020-07-20T14:40:17Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 158,
"watchers_count": 158,
"forks_count": 33,
"forks": 33,
"watchers": 158,
"stargazers_count": 162,
"watchers_count": 162,
"forks_count": 36,
"forks": 36,
"watchers": 162,
"score": 0
},
{
@ -289,8 +289,8 @@
"description": "DNS Vulnerability - CVE-2020-1350",
"fork": false,
"created_at": "2020-07-19T17:32:47Z",
"updated_at": "2020-07-19T17:42:38Z",
"pushed_at": "2020-07-19T17:42:36Z",
"updated_at": "2020-07-20T14:26:02Z",
"pushed_at": "2020-07-20T14:25:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -312,7 +312,7 @@
"description": "A basic proof of concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-20T03:44:58Z",
"updated_at": "2020-07-20T04:03:13Z",
"updated_at": "2020-07-20T11:51:20Z",
"pushed_at": "2020-07-20T03:51:20Z",
"stargazers_count": 1,
"watchers_count": 1,
@ -320,5 +320,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 281069444,
"name": "CVE-2020-1350-checker.ps1",
"full_name": "Secuora-Org\/CVE-2020-1350-checker.ps1",
"owner": {
"login": "Secuora-Org",
"id": 67636594,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/67636594?v=4",
"html_url": "https:\/\/github.com\/Secuora-Org"
},
"html_url": "https:\/\/github.com\/Secuora-Org\/CVE-2020-1350-checker.ps1",
"description": "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código.",
"fork": false,
"created_at": "2020-07-20T09:12:07Z",
"updated_at": "2020-07-20T09:12:36Z",
"pushed_at": "2020-07-20T09:12:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "writeup of CVE-2020-1362",
"fork": false,
"created_at": "2020-07-17T07:35:05Z",
"updated_at": "2020-07-20T08:43:58Z",
"updated_at": "2020-07-20T13:11:49Z",
"pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 24,
"forks": 24,
"watchers": 133,
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 27,
"forks": 27,
"watchers": 140,
"score": 0
}
]

25
2020/CVE-2020-13925.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 281088072,
"name": "CVE-2020-13925",
"full_name": "bit4woo\/CVE-2020-13925",
"owner": {
"login": "bit4woo",
"id": 8793481,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8793481?v=4",
"html_url": "https:\/\/github.com\/bit4woo"
},
"html_url": "https:\/\/github.com\/bit4woo\/CVE-2020-13925",
"description": null,
"fork": false,
"created_at": "2020-07-20T10:38:14Z",
"updated_at": "2020-07-20T13:28:22Z",
"pushed_at": "2020-07-20T10:56:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,36 @@
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
"fork": false,
"created_at": "2020-07-20T03:27:24Z",
"updated_at": "2020-07-20T08:39:54Z",
"updated_at": "2020-07-20T14:58:04Z",
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"forks": 1,
"watchers": 17,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 2,
"forks": 2,
"watchers": 30,
"score": 0
},
{
"id": 281100240,
"name": "CVE-2020-14645",
"full_name": "DaBoQuan\/CVE-2020-14645",
"owner": {
"login": "DaBoQuan",
"id": 13045485,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13045485?v=4",
"html_url": "https:\/\/github.com\/DaBoQuan"
},
"html_url": "https:\/\/github.com\/DaBoQuan\/CVE-2020-14645",
"description": null,
"fork": false,
"created_at": "2020-07-20T11:40:09Z",
"updated_at": "2020-07-20T13:49:33Z",
"pushed_at": "2020-07-20T14:03:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-15052.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277770540,
"name": "CVE-2020-15052",
"full_name": "pratikshad19\/CVE-2020-15052",
"owner": {
"login": "pratikshad19",
"id": 67833998,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/67833998?v=4",
"html_url": "https:\/\/github.com\/pratikshad19"
},
"html_url": "https:\/\/github.com\/pratikshad19\/CVE-2020-15052",
"description": "Artica Proxy before 4.30.000000 Community Edition allows SQL Injection.",
"fork": false,
"created_at": "2020-07-07T09:13:18Z",
"updated_at": "2020-07-20T14:24:53Z",
"pushed_at": "2020-07-08T17:46:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-15053.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277772338,
"name": "CVE-2020-15053",
"full_name": "pratikshad19\/CVE-2020-15053",
"owner": {
"login": "pratikshad19",
"id": 67833998,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/67833998?v=4",
"html_url": "https:\/\/github.com\/pratikshad19"
},
"html_url": "https:\/\/github.com\/pratikshad19\/CVE-2020-15053",
"description": "Artica Proxy before 4.30.000000 Community Edition allows Reflected Cross Site Scripting.",
"fork": false,
"created_at": "2020-07-07T09:21:30Z",
"updated_at": "2020-07-20T14:25:38Z",
"pushed_at": "2020-07-08T17:45:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-07-16T04:38:22Z",
"updated_at": "2020-07-20T10:53:42Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 42,
"forks": 42,
"watchers": 121,
"watchers": 120,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof of concept for Weblogic CVE-2020-2883",
"fork": false,
"created_at": "2020-05-13T09:56:48Z",
"updated_at": "2020-07-20T03:52:40Z",
"updated_at": "2020-07-20T09:32:21Z",
"pushed_at": "2020-05-13T10:19:07Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"watchers": 8,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-5260演示记录",
"fork": false,
"created_at": "2020-04-16T16:19:23Z",
"updated_at": "2020-05-18T10:43:51Z",
"updated_at": "2020-07-20T14:12:27Z",
"pushed_at": "2020-04-16T17:01:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-20T07:49:14Z",
"updated_at": "2020-07-20T14:41:12Z",
"pushed_at": "2020-07-14T10:20:14Z",
"stargazers_count": 1313,
"watchers_count": 1313,
"stargazers_count": 1315,
"watchers_count": 1315,
"forks_count": 327,
"forks": 327,
"watchers": 1313,
"watchers": 1315,
"score": 0
},
{
@ -1071,13 +1071,13 @@
"description": "GUI",
"fork": false,
"created_at": "2020-07-17T03:13:30Z",
"updated_at": "2020-07-20T02:32:16Z",
"updated_at": "2020-07-20T14:05:10Z",
"pushed_at": "2020-07-17T08:09:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2020-07-19T21:58:45Z",
"updated_at": "2020-07-20T13:54:04Z",
"pushed_at": "2020-07-17T14:18:44Z",
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 24,
"forks": 24,
"watchers": 86,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 25,
"forks": 25,
"watchers": 90,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-04-07T11:17:27Z",
"updated_at": "2020-07-16T16:47:13Z",
"updated_at": "2020-07-20T14:26:53Z",
"pushed_at": "2020-07-14T06:39:31Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2020-07-04T07:47:07Z",
"updated_at": "2020-07-20T09:26:31Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 18,
"forks": 18,
"watchers": 86,
"watchers": 87,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Enviroment and exploit to rce test",
"fork": false,
"created_at": "2020-07-18T18:42:23Z",
"updated_at": "2020-07-19T00:48:25Z",
"updated_at": "2020-07-20T09:50:07Z",
"pushed_at": "2020-07-18T19:20:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -405,6 +405,7 @@ A remote code execution vulnerability exists in Windows Domain Name System serve
- [graph-inc/CVE-2020-1350](https://github.com/graph-inc/CVE-2020-1350)
- [CVEmaster/CVE-2020-1350](https://github.com/CVEmaster/CVE-2020-1350)
- [Plazmaz/CVE-2020-1350-poc](https://github.com/Plazmaz/CVE-2020-1350-poc)
- [Secuora-Org/CVE-2020-1350-checker.ps1](https://github.com/Secuora-Org/CVE-2020-1350-checker.ps1)
### CVE-2020-1362
@ -1598,6 +1599,14 @@ showAlert() in the administration panel in Bludit 3.12.0 allows XSS.
- [gh0st56/CVE-2020-13889](https://github.com/gh0st56/CVE-2020-13889)
### CVE-2020-13925
<code>
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.
</code>
- [bit4woo/CVE-2020-13925](https://github.com/bit4woo/CVE-2020-13925)
### CVE-2020-14199
<code>
@ -1613,6 +1622,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
</code>
- [Y4er/CVE-2020-14645](https://github.com/Y4er/CVE-2020-14645)
- [DaBoQuan/CVE-2020-14645](https://github.com/DaBoQuan/CVE-2020-14645)
### CVE-2020-14947
@ -1654,6 +1664,12 @@ An issue was discovered in Artica Proxy before 4.30.000000. Stored XSS exists vi
- [pratikshad19/CVE-2020-15051](https://github.com/pratikshad19/CVE-2020-15051)
### CVE-2020-15052
- [pratikshad19/CVE-2020-15052](https://github.com/pratikshad19/CVE-2020-15052)
### CVE-2020-15053
- [pratikshad19/CVE-2020-15053](https://github.com/pratikshad19/CVE-2020-15053)
### CVE-2020-15367
<code>