Auto Update 2020/04/27 00:08:39

This commit is contained in:
motikan2010-bot 2020-04-27 00:08:39 +09:00
parent 44460cd104
commit 933d13b9b9
28 changed files with 165 additions and 92 deletions

View file

@ -1,4 +1,27 @@
[
{
"id": 114424141,
"name": "privesc-CVE-2010-0426",
"full_name": "t0kx\/privesc-CVE-2010-0426",
"owner": {
"login": "t0kx",
"id": 24924517,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24924517?v=4",
"html_url": "https:\/\/github.com\/t0kx"
},
"html_url": "https:\/\/github.com\/t0kx\/privesc-CVE-2010-0426",
"description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container",
"fork": false,
"created_at": "2017-12-16T01:16:44Z",
"updated_at": "2020-04-20T12:29:23Z",
"pushed_at": "2017-12-16T01:19:11Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"watchers": 5,
"score": 0
},
{
"id": 164330369,
"name": "cve-2010-0426",

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2020-04-22T18:15:00Z",
"updated_at": "2020-04-26T14:04:45Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2243,
"watchers_count": 2243,
"stargazers_count": 2242,
"watchers_count": 2242,
"forks_count": 484,
"forks": 484,
"watchers": 2243,
"watchers": 2242,
"score": 0
},
{

View file

@ -2,14 +2,14 @@
{
"id": 62805078,
"name": "cve-2014-9707",
"full_name": "ench4nt3r\/cve-2014-9707",
"full_name": "zhw-01\/cve-2014-9707",
"owner": {
"login": "ench4nt3r",
"login": "zhw-01",
"id": 17694288,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17694288?v=4",
"html_url": "https:\/\/github.com\/ench4nt3r"
"html_url": "https:\/\/github.com\/zhw-01"
},
"html_url": "https:\/\/github.com\/ench4nt3r\/cve-2014-9707",
"html_url": "https:\/\/github.com\/zhw-01\/cve-2014-9707",
"description": null,
"fork": false,
"created_at": "2016-07-07T12:27:56Z",

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2020-04-23T16:37:04Z",
"updated_at": "2020-04-26T11:17:12Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 259,
"watchers_count": 259,
"forks_count": 102,
"forks": 102,
"watchers": 258,
"watchers": 259,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-12T07:14:25Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 19,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "CVE-2017-12149 jboss反序列化 可回显",
"fork": false,
"created_at": "2017-11-28T02:52:47Z",
"updated_at": "2020-04-23T09:18:35Z",
"updated_at": "2020-04-26T13:01:27Z",
"pushed_at": "2019-03-13T08:57:50Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 33,
"forks": 33,
"watchers": 90,
"watchers": 91,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-9506 - SSRF",
"fork": false,
"created_at": "2018-04-25T11:25:18Z",
"updated_at": "2020-04-26T08:20:38Z",
"updated_at": "2020-04-26T14:53:20Z",
"pushed_at": "2018-04-26T12:47:54Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 39,
"forks": 39,
"watchers": 140,
"watchers": 142,
"score": 0
},
{

View file

@ -220,13 +220,13 @@
"description": "Struts 2.5 - 2.5.12 REST Plugin XStream RCE",
"fork": false,
"created_at": "2020-04-05T16:00:48Z",
"updated_at": "2020-04-05T16:01:42Z",
"updated_at": "2020-04-26T14:09:41Z",
"pushed_at": "2020-04-05T16:01:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "POC CVE-2018-14714",
"fork": false,
"created_at": "2020-04-25T03:43:44Z",
"updated_at": "2020-04-25T03:44:21Z",
"pushed_at": "2020-04-25T03:44:19Z",
"updated_at": "2020-04-26T09:57:36Z",
"pushed_at": "2020-04-26T09:57:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
"fork": false,
"created_at": "2018-08-17T23:48:15Z",
"updated_at": "2020-04-06T11:36:21Z",
"updated_at": "2020-04-26T12:26:28Z",
"pushed_at": "2019-11-15T08:12:32Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 26,
"forks": 26,
"watchers": 103,
"watchers": 104,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2020-04-22T18:09:50Z",
"updated_at": "2020-04-26T12:10:22Z",
"pushed_at": "2020-03-06T10:52:19Z",
"stargazers_count": 394,
"watchers_count": 394,
"stargazers_count": 395,
"watchers_count": 395,
"forks_count": 120,
"forks": 120,
"watchers": 394,
"watchers": 395,
"score": 0
},
{

View file

@ -132,8 +132,8 @@
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 34,
"forks": 34,
"forks_count": 35,
"forks": 35,
"watchers": 64,
"score": 0
},

View file

@ -1140,13 +1140,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-04-14T13:18:19Z",
"updated_at": "2020-04-26T09:15:25Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1098,
"watchers_count": 1098,
"stargazers_count": 1099,
"watchers_count": 1099,
"forks_count": 370,
"forks": 370,
"watchers": 1098,
"watchers": 1099,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2020-04-25T09:32:26Z",
"updated_at": "2020-04-26T09:46:40Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 73,
"forks": 73,
"watchers": 252,
"watchers": 253,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2020-04-26T07:40:57Z",
"updated_at": "2020-04-26T10:13:29Z",
"pushed_at": "2020-03-20T09:11:20Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 162,
"watchers_count": 162,
"forks_count": 57,
"forks": 57,
"watchers": 161,
"watchers": 162,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2020-04-13T07:52:26Z",
"updated_at": "2020-04-26T12:46:32Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 16,
"forks": 16,
"watchers": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 17,
"forks": 17,
"watchers": 77,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-21T16:21:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-04-23T10:34:25Z",
"updated_at": "2020-04-26T14:14:34Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 21,
"forks": 21,
"watchers": 119,
"watchers": 118,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-04-26T08:32:03Z",
"pushed_at": "2020-04-26T09:03:43Z",
"stargazers_count": 527,
"watchers_count": 527,
"forks_count": 115,
"forks": 115,
"watchers": 527,
"updated_at": "2020-04-26T10:23:55Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 529,
"watchers_count": 529,
"forks_count": 116,
"forks": 116,
"watchers": 529,
"score": 0
},
{
@ -178,8 +178,8 @@
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 606,
"watchers_count": 606,
"forks_count": 121,
"forks": 121,
"forks_count": 122,
"forks": 122,
"watchers": 606,
"score": 0
}

25
2019/CVE-2019-8936.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 259009327,
"name": "CVE-2019-8936",
"full_name": "snappyJack\/CVE-2019-8936",
"owner": {
"login": "snappyJack",
"id": 16055573,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16055573?v=4",
"html_url": "https:\/\/github.com\/snappyJack"
},
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2019-8936",
"description": null,
"fork": false,
"created_at": "2020-04-26T11:07:19Z",
"updated_at": "2020-04-26T11:21:31Z",
"pushed_at": "2020-04-26T11:21:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,8 +59,8 @@
"description": "This is a recurrence of cve-2019-9787 on Wordpress and a hash-based defense.",
"fork": false,
"created_at": "2020-04-23T09:20:54Z",
"updated_at": "2020-04-26T02:53:22Z",
"pushed_at": "2020-04-26T02:53:21Z",
"updated_at": "2020-04-26T12:29:49Z",
"pushed_at": "2020-04-26T12:29:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 29,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 171,
"watchers_count": 171,
"forks_count": 65,
"forks": 65,
"forks_count": 66,
"forks": 66,
"watchers": 171,
"score": 0
},

View file

@ -960,8 +960,8 @@
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 844,
"watchers_count": 844,
"forks_count": 240,
"forks": 240,
"forks_count": 241,
"forks": 241,
"watchers": 844,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 606,
"watchers_count": 606,
"forks_count": 121,
"forks": 121,
"forks_count": 122,
"forks": 122,
"watchers": 606,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-04-26T08:28:03Z",
"updated_at": "2020-04-26T12:46:04Z",
"pushed_at": "2020-04-17T14:24:31Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 16,
"forks": 16,
"watchers": 50,
"watchers": 52,
"score": 0
}
]

View file

@ -59,8 +59,8 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-04-26T01:41:13Z",
"pushed_at": "2020-04-25T12:55:25Z",
"updated_at": "2020-04-26T11:55:26Z",
"pushed_at": "2020-04-26T11:54:57Z",
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 29,

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-03-26T01:34:38Z",
"updated_at": "2020-04-26T04:14:10Z",
"updated_at": "2020-04-26T10:47:28Z",
"pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 29,
"forks": 29,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -3793,6 +3793,14 @@ A memory corruption issue was addressed with improved state management. This iss
- [A2nkF/macOS-Kernel-Exploit](https://github.com/A2nkF/macOS-Kernel-Exploit)
- [TrungNguyen1909/CVE-2019-8781-macOS](https://github.com/TrungNguyen1909/CVE-2019-8781-macOS)
### CVE-2019-8936
<code>
NTP through 4.2.8p12 has a NULL Pointer Dereference.
</code>
- [snappyJack/CVE-2019-8936](https://github.com/snappyJack/CVE-2019-8936)
### CVE-2019-8942
<code>
@ -11782,7 +11790,7 @@ Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4,
EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
</code>
- [ench4nt3r/cve-2014-9707](https://github.com/ench4nt3r/cve-2014-9707)
- [zhw-01/cve-2014-9707](https://github.com/zhw-01/cve-2014-9707)
## 2013
@ -12543,6 +12551,7 @@ mpack 1.6 has information disclosure via eavesdropping on mails sent by other us
sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
</code>
- [t0kx/privesc-CVE-2010-0426](https://github.com/t0kx/privesc-CVE-2010-0426)
- [cved-sources/cve-2010-0426](https://github.com/cved-sources/cve-2010-0426)
### CVE-2010-0738
@ -12594,6 +12603,22 @@ Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
### CVE-2010-3437
<code>
Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
</code>
- [huang-emily/CVE-2010-3437](https://github.com/huang-emily/CVE-2010-3437)
### CVE-2010-3490
<code>
Directory traversal vulnerability in page.recordings.php in the System Recordings component in the configuration interface in FreePBX 2.8.0 and earlier allows remote authenticated administrators to create arbitrary files via a .. (dot dot) in the usersnum parameter to admin/config.php, as demonstrated by creating a .php file under the web root.
</code>
- [moayadalmalat/CVE-2010-3490](https://github.com/moayadalmalat/CVE-2010-3490)
### CVE-2010-3600
<code>