Auto Update 2020/05/29 06:07:44

This commit is contained in:
motikan2010-bot 2020-05-29 06:07:44 +09:00
parent 9c687f4b60
commit 9b3336c61b
20 changed files with 80 additions and 113 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2020-05-25T14:26:12Z",
"updated_at": "2020-05-28T17:46:31Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 259,
"watchers_count": 259,
"stargazers_count": 260,
"watchers_count": 260,
"forks_count": 83,
"forks": 83,
"watchers": 259,
"watchers": 260,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-12-18T04:24:43Z",
"updated_at": "2020-05-25T15:29:31Z",
"updated_at": "2020-05-28T17:11:00Z",
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 4,
"forks": 4,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 240369244,
"name": "CVE-2013-6987",
"full_name": "stoicboomer\/CVE-2013-6987",
"owner": {
"login": "stoicboomer",
"id": 45523448,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45523448?v=4",
"html_url": "https:\/\/github.com\/stoicboomer"
},
"html_url": "https:\/\/github.com\/stoicboomer\/CVE-2013-6987",
"description": "exploit for DNS 4.3",
"fork": false,
"created_at": "2020-02-13T21:42:24Z",
"updated_at": "2020-05-26T16:51:50Z",
"pushed_at": "2020-02-13T21:51:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "An implementation of CVE-2016-0974 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-04-01T00:39:28Z",
"updated_at": "2020-05-11T00:47:46Z",
"updated_at": "2020-05-28T20:33:17Z",
"pushed_at": "2019-09-30T23:40:01Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 18,
"watchers": 19,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 624,
"watchers_count": 624,
"forks_count": 278,
"forks": 278,
"forks_count": 277,
"forks": 277,
"watchers": 624,
"score": 0
},

View file

@ -174,13 +174,13 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2020-04-23T09:10:38Z",
"updated_at": "2020-05-28T16:34:27Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 21,
"forks": 21,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-8440 standalone exploit",
"fork": false,
"created_at": "2018-10-31T17:00:43Z",
"updated_at": "2020-05-06T19:14:55Z",
"updated_at": "2020-05-28T19:55:44Z",
"pushed_at": "2018-10-31T19:05:17Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 21,
"forks": 21,
"watchers": 66,
"watchers": 67,
"score": 0
}
]

View file

@ -1347,13 +1347,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-05-27T04:08:58Z",
"updated_at": "2020-05-28T16:27:41Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 733,
"watchers_count": 733,
"stargazers_count": 734,
"watchers_count": 734,
"forks_count": 173,
"forks": 173,
"watchers": 733,
"watchers": 734,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 73,
"forks": 73,
"forks_count": 74,
"forks": 74,
"watchers": 256,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Developed proof-of-concept exploits for various types of vulnerabilities and mitigation bypasses with user-mode Windows applications, New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
"fork": false,
"created_at": "2019-08-31T20:28:12Z",
"updated_at": "2020-05-26T15:41:21Z",
"updated_at": "2020-05-28T18:19:31Z",
"pushed_at": "2020-05-09T16:01:14Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 19,
"forks": 19,
"watchers": 82,
"watchers": 83,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-28T14:43:49Z",
"updated_at": "2020-05-28T19:01:58Z",
"pushed_at": "2020-05-27T10:27:11Z",
"stargazers_count": 800,
"watchers_count": 800,
"stargazers_count": 803,
"watchers_count": 803,
"forks_count": 181,
"forks": 181,
"watchers": 800,
"watchers": 803,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-19T03:47:33Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 41,
"score": 0
},

View file

@ -381,13 +381,13 @@
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
"fork": false,
"created_at": "2020-01-13T10:09:31Z",
"updated_at": "2020-05-28T08:32:18Z",
"updated_at": "2020-05-28T16:47:32Z",
"pushed_at": "2020-01-15T13:58:22Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 24,
"forks": 24,
"watchers": 93,
"watchers": 94,
"score": 0
},
{
@ -772,13 +772,13 @@
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts",
"fork": false,
"created_at": "2020-01-22T13:00:18Z",
"updated_at": "2020-05-18T19:29:43Z",
"updated_at": "2020-05-28T16:48:49Z",
"pushed_at": "2020-01-23T09:10:06Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-05-28T12:26:02Z",
"updated_at": "2020-05-28T17:10:37Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 339,
"watchers_count": 339,
"stargazers_count": 340,
"watchers_count": 340,
"forks_count": 148,
"forks": 148,
"watchers": 339,
"watchers": 340,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-28T14:43:49Z",
"updated_at": "2020-05-28T19:01:58Z",
"pushed_at": "2020-05-27T10:27:11Z",
"stargazers_count": 800,
"watchers_count": 800,
"stargazers_count": 803,
"watchers_count": 803,
"forks_count": 181,
"forks": 181,
"watchers": 800,
"watchers": 803,
"score": 0
},
{

View file

@ -1,25 +1,25 @@
[
{
"id": 267392741,
"id": 267493495,
"name": "CVE-2020-11492",
"full_name": "joshfinley\/CVE-2020-11492",
"full_name": "CrackerCat\/CVE-2020-11492",
"owner": {
"login": "joshfinley",
"id": 13423441,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13423441?v=4",
"html_url": "https:\/\/github.com\/joshfinley"
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat"
},
"html_url": "https:\/\/github.com\/joshfinley\/CVE-2020-11492",
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2020-11492",
"description": null,
"fork": false,
"created_at": "2020-05-27T18:11:18Z",
"updated_at": "2020-05-28T13:48:55Z",
"pushed_at": "2020-05-28T13:11:33Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"forks": 4,
"watchers": 13,
"created_at": "2020-05-28T04:32:01Z",
"updated_at": "2020-05-28T16:20:20Z",
"pushed_at": "2020-05-27T21:22:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2020-05-27T18:48:10Z",
"updated_at": "2020-05-27T18:49:08Z",
"pushed_at": "2020-05-27T18:49:05Z",
"updated_at": "2020-05-28T15:17:18Z",
"pushed_at": "2020-05-28T15:17:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -59,13 +59,13 @@
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
"fork": false,
"created_at": "2020-05-19T18:59:26Z",
"updated_at": "2020-05-26T12:31:44Z",
"updated_at": "2020-05-28T16:24:44Z",
"pushed_at": "2020-05-25T08:33:24Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 13,
"forks": 13,
"watchers": 70,
"watchers": 71,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2020-05-26T13:44:01Z",
"updated_at": "2020-05-28T18:59:01Z",
"pushed_at": "2020-05-21T10:15:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 0,
"forks": 0,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -438,7 +438,7 @@ Sonatype Nexus Repository Manager 3.x up to and including 3.21.2 has Incorrect A
- [zhzyker/CVE-2020-11444](https://github.com/zhzyker/CVE-2020-11444)
### CVE-2020-11492
- [joshfinley/CVE-2020-11492](https://github.com/joshfinley/CVE-2020-11492)
- [CrackerCat/CVE-2020-11492](https://github.com/CrackerCat/CVE-2020-11492)
### CVE-2020-11539
@ -12610,14 +12610,6 @@ Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in
- [sdneon/CveTest](https://github.com/sdneon/CveTest)
### CVE-2013-6987
<code>
Multiple directory traversal vulnerabilities in the FileBrowser components in Synology DiskStation Manager (DSM) before 4.3-3810 Update 3 allow remote attackers to read, write, and delete arbitrary files via a .. (dot dot) in the (1) path parameter to file_delete.cgi or (2) folder_path parameter to file_share.cgi in webapi/FileStation/; (3) dlink parameter to fbdownload/; or unspecified parameters to (4) html5_upload.cgi, (5) file_download.cgi, (6) file_sharing.cgi, (7) file_MVCP.cgi, or (8) file_rename.cgi in webapi/FileStation/.
</code>
- [stoicboomer/CVE-2013-6987](https://github.com/stoicboomer/CVE-2013-6987)
## 2012
### CVE-2012-0003