Auto Update 2020/06/26 00:08:10

This commit is contained in:
motikan2010-bot 2020-06-26 00:08:10 +09:00
parent 0d2d271e5f
commit 9ecc198c25
21 changed files with 60 additions and 201 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 90186634,
"name": "CVE-2008-1613",
"full_name": "SECFORCE\/CVE-2008-1613",
"owner": {
"login": "SECFORCE",
"id": 8157384,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE"
},
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613",
"description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.",
"fork": false,
"created_at": "2017-05-03T19:39:27Z",
"updated_at": "2020-05-18T10:42:05Z",
"pushed_at": "2017-05-03T19:40:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 9,
"forks": 9,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 70811001,
"name": "Offensive",
"full_name": "Naramsim\/Offensive",
"owner": {
"login": "Naramsim",
"id": 8996268,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8996268?v=4",
"html_url": "https:\/\/github.com\/Naramsim"
},
"html_url": "https:\/\/github.com\/Naramsim\/Offensive",
"description": "Reproducible exploits for: CVE-2016-1240 CVE-2008-2938 CVE-2014-2064 CVE-2014-1904",
"fork": false,
"created_at": "2016-10-13T13:46:46Z",
"updated_at": "2018-09-01T03:40:31Z",
"pushed_at": "2017-01-11T15:50:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 58223324,
"name": "sockstress",
"full_name": "marcelki\/sockstress",
"owner": {
"login": "marcelki",
"id": 8465322,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8465322?v=4",
"html_url": "https:\/\/github.com\/marcelki"
},
"html_url": "https:\/\/github.com\/marcelki\/sockstress",
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
"fork": false,
"created_at": "2016-05-06T17:21:32Z",
"updated_at": "2020-06-04T09:57:06Z",
"pushed_at": "2016-07-02T18:52:16Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 12,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 127826773,
"name": "CVE-2008-6827",
"full_name": "alt3kx\/CVE-2008-6827",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2008-6827",
"description": "Symantec Altiris Client Service 6.8.378 - Local Privilege Escalation",
"fork": false,
"created_at": "2018-04-03T00:08:23Z",
"updated_at": "2018-05-04T02:30:55Z",
"pushed_at": "2018-05-04T02:30:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 58135743,
"name": "CVE-2008-6970",
"full_name": "KyomaHooin\/CVE-2008-6970",
"owner": {
"login": "KyomaHooin",
"id": 19186867,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19186867?v=4",
"html_url": "https:\/\/github.com\/KyomaHooin"
},
"html_url": "https:\/\/github.com\/KyomaHooin\/CVE-2008-6970",
"description": "Blind SQL injection brute force.",
"fork": false,
"created_at": "2016-05-05T14:13:33Z",
"updated_at": "2018-05-11T08:02:20Z",
"pushed_at": "2018-05-11T08:02:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-06-17T01:51:30Z",
"stargazers_count": 476,
"watchers_count": 476,
"forks_count": 115,
"forks": 115,
"forks_count": 116,
"forks": 116,
"watchers": 476,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-17T01:51:30Z",
"stargazers_count": 476,
"watchers_count": 476,
"forks_count": 115,
"forks": 115,
"forks_count": 116,
"forks": 116,
"watchers": 476,
"score": 0
}

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-06-17T01:51:30Z",
"stargazers_count": 476,
"watchers_count": 476,
"forks_count": 115,
"forks": 115,
"forks_count": 116,
"forks": 116,
"watchers": 476,
"score": 0
}

View file

@ -105,13 +105,13 @@
"description": "PoC CVE-2017-5123 - LPE - Bypassing SMEP\/SMAP. No KASLR",
"fork": false,
"created_at": "2020-05-08T15:10:38Z",
"updated_at": "2020-06-23T01:15:18Z",
"updated_at": "2020-06-25T09:27:10Z",
"pushed_at": "2020-06-19T15:12:31Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for PlaySMS 1.4 authenticated RCE",
"fork": false,
"created_at": "2018-11-06T19:16:29Z",
"updated_at": "2020-05-12T02:55:07Z",
"updated_at": "2020-06-25T13:25:42Z",
"pushed_at": "2018-11-06T19:45:40Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -454,8 +454,8 @@
"pushed_at": "2020-06-17T01:51:30Z",
"stargazers_count": 476,
"watchers_count": 476,
"forks_count": 115,
"forks": 115,
"forks_count": 116,
"forks": 116,
"watchers": 476,
"score": 0
}

View file

@ -67,5 +67,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 274906170,
"name": "DrupalCVE-2018-7602",
"full_name": "cyberharsh\/DrupalCVE-2018-7602",
"owner": {
"login": "cyberharsh",
"id": 57433814,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57433814?v=4",
"html_url": "https:\/\/github.com\/cyberharsh"
},
"html_url": "https:\/\/github.com\/cyberharsh\/DrupalCVE-2018-7602",
"description": null,
"fork": false,
"created_at": "2020-06-25T12:06:07Z",
"updated_at": "2020-06-25T12:11:52Z",
"pushed_at": "2020-06-25T12:11:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-06-19T18:02:31Z",
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 31,
"forks": 31,
"forks_count": 32,
"forks": 32,
"watchers": 144,
"score": 0
},

View file

@ -155,8 +155,8 @@
"pushed_at": "2020-06-17T01:51:30Z",
"stargazers_count": 476,
"watchers_count": 476,
"forks_count": 115,
"forks": 115,
"forks_count": 116,
"forks": 116,
"watchers": 476,
"score": 0
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2019-02-21T22:49:53Z",
"updated_at": "2020-06-24T11:36:56Z",
"pushed_at": "2020-06-24T11:38:49Z",
"pushed_at": "2020-06-25T11:27:53Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,

View file

@ -1186,13 +1186,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-06-25T07:18:52Z",
"updated_at": "2020-06-25T11:38:08Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 79,
"forks": 79,
"watchers": 276,
"watchers": 277,
"score": 0
},
{

View file

@ -36,8 +36,8 @@
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
"fork": false,
"created_at": "2020-06-23T18:45:24Z",
"updated_at": "2020-06-23T19:07:23Z",
"pushed_at": "2020-06-23T19:07:20Z",
"updated_at": "2020-06-25T12:22:09Z",
"pushed_at": "2020-06-25T12:22:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -10,16 +10,16 @@
"html_url": "https:\/\/github.com\/spaceraccoon"
},
"html_url": "https:\/\/github.com\/spaceraccoon\/CVE-2020-10665",
"description": null,
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
"fork": false,
"created_at": "2020-06-25T07:35:29Z",
"updated_at": "2020-06-25T07:49:37Z",
"updated_at": "2020-06-25T13:56:22Z",
"pushed_at": "2020-06-25T07:49:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-17T01:51:30Z",
"stargazers_count": 476,
"watchers_count": 476,
"forks_count": 115,
"forks": 115,
"forks_count": 116,
"forks": 116,
"watchers": 476,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-19T21:24:19Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 27,
"score": 0
}

View file

@ -7428,6 +7428,7 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa
- [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
- [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602)
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
### CVE-2018-7690
@ -13710,22 +13711,6 @@ Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote atta
- [Axua/CVE-2008-1611](https://github.com/Axua/CVE-2008-1611)
### CVE-2008-1613
<code>
SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter.
</code>
- [SECFORCE/CVE-2008-1613](https://github.com/SECFORCE/CVE-2008-1613)
### CVE-2008-2938
<code>
Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
</code>
- [Naramsim/Offensive](https://github.com/Naramsim/Offensive)
### CVE-2008-4250
<code>
@ -13734,14 +13719,6 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
- [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts)
### CVE-2008-4609
<code>
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
</code>
- [marcelki/sockstress](https://github.com/marcelki/sockstress)
### CVE-2008-4654
<code>
@ -13767,22 +13744,6 @@ Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.203
- [SECFORCE/CVE-2008-5416](https://github.com/SECFORCE/CVE-2008-5416)
### CVE-2008-6827
<code>
The ListView control in the Client GUI (AClient.exe) in Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 allows local users to gain SYSTEM privileges and execute arbitrary commands via a &quot;Shatter&quot; style attack on the &quot;command prompt&quot; hidden GUI button to (1) overwrite the CommandLine parameter to cmd.exe to use SYSTEM privileges and (2) modify the DLL that is loaded using the LoadLibrary API function.
</code>
- [alt3kx/CVE-2008-6827](https://github.com/alt3kx/CVE-2008-6827)
### CVE-2008-6970
<code>
SQL injection vulnerability in dosearch.inc.php in UBB.threads 7.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the Forum[] array parameter.
</code>
- [KyomaHooin/CVE-2008-6970](https://github.com/KyomaHooin/CVE-2008-6970)
### CVE-2008-7220
<code>