Auto Update 2021/01/06 06:09:56

This commit is contained in:
motikan2010-bot 2021-01-06 06:09:56 +09:00
parent 4be6229dab
commit a61cce4784
23 changed files with 189 additions and 67 deletions

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2021-01-03T02:35:22Z",
"updated_at": "2021-01-05T20:01:24Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2248,
"watchers_count": 2248,
"stargazers_count": 2247,
"watchers_count": 2247,
"forks_count": 485,
"forks": 485,
"watchers": 2248,
"watchers": 2247,
"score": 0
},
{

View file

@ -174,8 +174,8 @@
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
"fork": false,
"created_at": "2020-10-31T11:39:11Z",
"updated_at": "2021-01-04T20:17:51Z",
"pushed_at": "2021-01-04T20:17:49Z",
"updated_at": "2021-01-05T20:33:27Z",
"pushed_at": "2021-01-05T20:33:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2015-3073 PoC",
"fork": false,
"created_at": "2015-09-27T00:19:23Z",
"updated_at": "2019-12-22T22:35:35Z",
"updated_at": "2021-01-05T20:22:29Z",
"pushed_at": "2015-10-23T23:31:57Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for PlaySMS 1.4 authenticated RCE",
"fork": false,
"created_at": "2018-11-06T19:16:29Z",
"updated_at": "2020-06-27T01:25:41Z",
"updated_at": "2021-01-05T19:50:09Z",
"pushed_at": "2018-11-06T19:45:40Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

25
2018/CVE-2018-13797.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 327091489,
"name": "CVE-2018-13797",
"full_name": "dsp-testing\/CVE-2018-13797",
"owner": {
"login": "dsp-testing",
"id": 30846345,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/30846345?v=4",
"html_url": "https:\/\/github.com\/dsp-testing"
},
"html_url": "https:\/\/github.com\/dsp-testing\/CVE-2018-13797",
"description": null,
"fork": false,
"created_at": "2021-01-05T18:56:56Z",
"updated_at": "2021-01-05T19:33:04Z",
"pushed_at": "2021-01-05T19:33:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 401,
"watchers_count": 401,
"forks_count": 376,
"forks": 376,
"forks_count": 377,
"forks": 377,
"watchers": 401,
"score": 0
},

25
2018/CVE-2018-16460.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 327100385,
"name": "CVE-2018-16460",
"full_name": "dsp-testing\/CVE-2018-16460",
"owner": {
"login": "dsp-testing",
"id": 30846345,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/30846345?v=4",
"html_url": "https:\/\/github.com\/dsp-testing"
},
"html_url": "https:\/\/github.com\/dsp-testing\/CVE-2018-16460",
"description": null,
"fork": false,
"created_at": "2021-01-05T19:36:44Z",
"updated_at": "2021-01-05T19:37:05Z",
"pushed_at": "2021-01-05T19:37:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -60,11 +60,11 @@
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2021-01-02T18:17:10Z",
"pushed_at": "2019-03-13T07:11:23Z",
"pushed_at": "2021-01-05T19:31:09Z",
"stargazers_count": 453,
"watchers_count": 453,
"forks_count": 146,
"forks": 146,
"forks_count": 147,
"forks": 147,
"watchers": 453,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "an impacket-dependent script exploiting CVE-2019-1040",
"fork": false,
"created_at": "2021-01-01T05:59:06Z",
"updated_at": "2021-01-05T03:05:48Z",
"updated_at": "2021-01-05T17:42:54Z",
"pushed_at": "2021-01-01T06:10:58Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 3,
"forks": 3,
"watchers": 44,
"watchers": 46,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-05T13:09:06Z",
"updated_at": "2021-01-05T16:57:56Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2227,
"watchers_count": 2227,
"stargazers_count": 2228,
"watchers_count": 2228,
"forks_count": 632,
"forks": 632,
"watchers": 2227,
"watchers": 2228,
"score": 0
},
{

View file

@ -36,7 +36,7 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2020-12-28T16:50:47Z",
"updated_at": "2021-01-05T15:34:47Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 185,
"watchers_count": 185,

View file

@ -59,13 +59,13 @@
"description": "SolarWinds Orion API 远程代码执行漏洞批量检测脚本",
"fork": false,
"created_at": "2021-01-05T13:42:36Z",
"updated_at": "2021-01-05T14:29:56Z",
"updated_at": "2021-01-05T15:25:38Z",
"pushed_at": "2021-01-05T13:56:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/the-girl-who-lived"
},
"html_url": "https:\/\/github.com\/the-girl-who-lived\/CVE-2020-11539",
"description": null,
"description": "Improper Access Control in Tata Sonata Smartband",
"fork": false,
"created_at": "2020-02-05T12:19:19Z",
"updated_at": "2020-04-22T11:12:56Z",
"updated_at": "2021-01-05T19:29:38Z",
"pushed_at": "2020-04-22T11:00:13Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
"fork": false,
"created_at": "2020-11-02T14:48:55Z",
"updated_at": "2021-01-04T19:53:03Z",
"updated_at": "2021-01-05T16:40:53Z",
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 22,
"forks": 22,
"watchers": 108,
"watchers": 109,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-05T13:09:06Z",
"updated_at": "2021-01-05T16:57:56Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2227,
"watchers_count": 2227,
"stargazers_count": 2228,
"watchers_count": 2228,
"forks_count": 632,
"forks": 632,
"watchers": 2227,
"watchers": 2228,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-18T05:15:05Z",
"updated_at": "2020-12-18T06:12:12Z",
"updated_at": "2021-01-05T16:33:50Z",
"pushed_at": "2020-07-18T11:52:31Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 14,
"forks": 14,
"watchers": 84,
"watchers": 85,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
"fork": false,
"created_at": "2020-10-15T14:32:25Z",
"updated_at": "2021-01-04T02:32:41Z",
"updated_at": "2021-01-05T16:41:07Z",
"pushed_at": "2020-10-20T20:09:58Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 32,
"forks": 32,
"watchers": 115,
"watchers": 116,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-17008 splWOW64 Elevation of Privilege",
"fork": false,
"created_at": "2020-12-24T04:00:29Z",
"updated_at": "2021-01-04T03:20:39Z",
"updated_at": "2021-01-05T15:35:02Z",
"pushed_at": "2020-12-24T06:02:53Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 4,
"forks": 4,
"watchers": 44,
"watchers": 45,
"score": 0
}
]

25
2020/CVE-2020-25498.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 327073339,
"name": "CVE-2020-25498",
"full_name": "the-girl-who-lived\/CVE-2020-25498",
"owner": {
"login": "the-girl-who-lived",
"id": 42164898,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/42164898?v=4",
"html_url": "https:\/\/github.com\/the-girl-who-lived"
},
"html_url": "https:\/\/github.com\/the-girl-who-lived\/CVE-2020-25498",
"description": "Stored XSS via CSRF in Beetel 777VR1 Router ",
"fork": false,
"created_at": "2021-01-05T17:38:52Z",
"updated_at": "2021-01-05T19:48:32Z",
"pushed_at": "2021-01-05T19:48:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -312,13 +312,13 @@
"description": "CISCO CVE-2020-3452 Scanner & Exploiter",
"fork": false,
"created_at": "2021-01-05T14:41:13Z",
"updated_at": "2021-01-05T14:47:56Z",
"pushed_at": "2021-01-05T14:47:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"updated_at": "2021-01-05T21:00:57Z",
"pushed_at": "2021-01-05T15:23:42Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
}
]

25
2020/CVE-2020-35262.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 327099437,
"name": "CVE-2020-35262",
"full_name": "the-girl-who-lived\/CVE-2020-35262",
"owner": {
"login": "the-girl-who-lived",
"id": 42164898,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/42164898?v=4",
"html_url": "https:\/\/github.com\/the-girl-who-lived"
},
"html_url": "https:\/\/github.com\/the-girl-who-lived\/CVE-2020-35262",
"description": "Cross Site Scripting (XSS) in Digisol DG-HR3400 Router",
"fork": false,
"created_at": "2021-01-05T19:32:31Z",
"updated_at": "2021-01-05T19:48:54Z",
"pushed_at": "2021-01-05T19:46:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Citrix ADC Vulns",
"fork": false,
"created_at": "2020-07-10T20:00:17Z",
"updated_at": "2020-12-10T07:56:54Z",
"updated_at": "2021-01-05T20:51:26Z",
"pushed_at": "2020-07-10T21:03:20Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 14,
"forks": 14,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -3077,6 +3077,9 @@ PHPGURUKUL Zoo Management System Using PHP and MySQL version 1.0 is affected by:
### CVE-2020-25488
- [Ko-kn3t/CVE-2020-25488](https://github.com/Ko-kn3t/CVE-2020-25488)
### CVE-2020-25498
- [the-girl-who-lived/CVE-2020-25498](https://github.com/the-girl-who-lived/CVE-2020-25498)
### CVE-2020-25514 (2020-09-22)
<code>
@ -3489,7 +3492,10 @@ In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is
- [code-byter/CVE-2020-29669](https://github.com/code-byter/CVE-2020-29669)
### CVE-2020-35488 (-)
### CVE-2020-35262
- [the-girl-who-lived/CVE-2020-35262](https://github.com/the-girl-who-lived/CVE-2020-35262)
### CVE-2020-35488 (2021-01-05)
<code>
The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)
@ -9231,6 +9237,14 @@ PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption
- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits)
### CVE-2018-13797 (2018-07-10)
<code>
The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.
</code>
- [dsp-testing/CVE-2018-13797](https://github.com/dsp-testing/CVE-2018-13797)
### CVE-2018-13864 (2018-07-17)
<code>
@ -9535,6 +9549,14 @@ Frog CMS 0.9.5 has admin/?/user/edit/1 CSRF.
- [security-breachlock/CVE-2018-16447](https://github.com/security-breachlock/CVE-2018-16447)
### CVE-2018-16460 (2018-09-07)
<code>
A command Injection in ps package versions &lt;1.0.0 for Node.js allowed arbitrary commands to be executed when attacker controls the PID.
</code>
- [dsp-testing/CVE-2018-16460](https://github.com/dsp-testing/CVE-2018-16460)
### CVE-2018-16492 (2019-02-01)
<code>
@ -12414,7 +12436,7 @@ The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 a
### CVE-2017-16995 (2017-12-22)
<code>
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
</code>
- [C0dak/CVE-2017-16995](https://github.com/C0dak/CVE-2017-16995)