Auto Update 2021/02/17 18:08:58

This commit is contained in:
motikan2010-bot 2021-02-17 18:08:58 +09:00
parent f6fdfc4355
commit 995aec3166
18 changed files with 103 additions and 70 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2021-02-03T23:57:06Z",
"updated_at": "2021-02-17T08:36:51Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"forks_count": 90,
"forks": 90,
"watchers": 285,
"watchers": 286,
"score": 0
},
{

25
2015/CVE-2015-1769.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 339600302,
"name": "CVE-2015-1769",
"full_name": "int0\/CVE-2015-1769",
"owner": {
"login": "int0",
"id": 3078184,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3078184?v=4",
"html_url": "https:\/\/github.com\/int0"
},
"html_url": "https:\/\/github.com\/int0\/CVE-2015-1769",
"description": "PoC for CVE-2015-1769",
"fork": false,
"created_at": "2021-02-17T03:25:53Z",
"updated_at": "2021-02-17T03:45:51Z",
"pushed_at": "2021-02-17T03:45:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2021-02-06T06:08:29Z",
"updated_at": "2021-02-17T06:48:58Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 40,
"forks": 40,
"watchers": 213,
"watchers": 214,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2021-01-24T17:05:53Z",
"updated_at": "2021-02-17T06:49:27Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 8,
"forks": 8,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
"fork": false,
"created_at": "2018-08-08T14:41:20Z",
"updated_at": "2021-02-15T08:14:12Z",
"updated_at": "2021-02-17T07:34:22Z",
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 32,
"forks": 32,
"watchers": 155,
"watchers": 156,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "CVE-2019-14899",
"fork": false,
"created_at": "2020-01-18T19:05:19Z",
"updated_at": "2020-11-15T16:49:55Z",
"pushed_at": "2020-01-18T19:09:07Z",
"updated_at": "2021-02-17T04:42:24Z",
"pushed_at": "2021-02-17T04:42:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-02-15T14:57:10Z",
"updated_at": "2021-02-17T04:32:35Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2335,
"watchers_count": 2335,
"forks_count": 659,
"forks": 659,
"watchers": 2335,
"stargazers_count": 2336,
"watchers_count": 2336,
"forks_count": 660,
"forks": 660,
"watchers": 2336,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-02-14T02:15:44Z",
"updated_at": "2021-02-17T08:38:14Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 717,
"watchers_count": 717,
"stargazers_count": 718,
"watchers_count": 718,
"forks_count": 150,
"forks": 150,
"watchers": 717,
"watchers": 718,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 499,
"watchers_count": 499,
"forks_count": 120,
"forks": 120,
"forks_count": 121,
"forks": 121,
"watchers": 499,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1239,
"watchers_count": 1239,
"forks_count": 287,
"forks": 287,
"forks_count": 288,
"forks": 288,
"watchers": 1239,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-02-15T14:57:10Z",
"updated_at": "2021-02-17T04:32:35Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2335,
"watchers_count": 2335,
"forks_count": 659,
"forks": 659,
"watchers": 2335,
"stargazers_count": 2336,
"watchers_count": 2336,
"forks_count": 660,
"forks": 660,
"watchers": 2336,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2021-02-15T15:41:53Z",
"updated_at": "2021-02-17T07:03:02Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 259,
"watchers_count": 259,
"stargazers_count": 260,
"watchers_count": 260,
"forks_count": 68,
"forks": 68,
"watchers": 259,
"watchers": 260,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2021-02-16T16:28:35Z",
"updated_at": "2021-02-17T03:28:57Z",
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"forks_count": 51,
"forks": 51,
"watchers": 149,
"watchers": 150,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-16T16:55:46Z",
"updated_at": "2021-02-16T19:09:52Z",
"updated_at": "2021-02-17T03:25:07Z",
"pushed_at": "2021-02-16T16:59:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-15T14:41:25Z",
"updated_at": "2021-02-16T20:36:58Z",
"updated_at": "2021-02-17T04:46:38Z",
"pushed_at": "2021-02-15T15:11:00Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "RCE in NPM VSCode Extention",
"fork": false,
"created_at": "2021-02-14T14:01:04Z",
"updated_at": "2021-02-16T22:46:47Z",
"updated_at": "2021-02-17T03:31:12Z",
"pushed_at": "2021-02-14T14:01:40Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 0,
"forks": 0,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-02-12T07:32:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}

View file

@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-02-16T22:31:52Z",
"updated_at": "2021-02-17T04:30:25Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 89,
"forks": 89,
"watchers": 336,
"stargazers_count": 337,
"watchers_count": 337,
"forks_count": 90,
"forks": 90,
"watchers": 337,
"score": 0
},
{
@ -795,13 +795,13 @@
"description": "CVE-2021-3156非交互式执行命令",
"fork": false,
"created_at": "2021-02-09T19:25:18Z",
"updated_at": "2021-02-16T10:44:55Z",
"updated_at": "2021-02-17T03:23:22Z",
"pushed_at": "2021-02-09T19:31:33Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 11,
"forks": 11,
"watchers": 98,
"watchers": 99,
"score": 0
},
{

View file

@ -14295,6 +14295,14 @@ Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vist
- [hfiref0x/CVE-2015-1701](https://github.com/hfiref0x/CVE-2015-1701)
### CVE-2015-1769 (2015-08-14)
<code>
Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka &quot;Mount Manager Elevation of Privilege Vulnerability.&quot;
</code>
- [int0/CVE-2015-1769](https://github.com/int0/CVE-2015-1769)
### CVE-2015-1805 (2015-08-08)
<code>