Auto Update 2020/07/10 12:08:14

This commit is contained in:
motikan2010-bot 2020-07-10 12:08:14 +09:00
parent 83ef3c1510
commit af6fcf6652
29 changed files with 140 additions and 164 deletions

View file

@ -67,28 +67,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247077498,
"name": "CVE-2003-0264-SLmail-5.5",
"full_name": "pwncone\/CVE-2003-0264-SLmail-5.5",
"owner": {
"login": "pwncone",
"id": 57570315,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/57570315?v=4",
"html_url": "https:\/\/github.com\/pwncone"
},
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
"fork": false,
"created_at": "2020-03-13T13:27:56Z",
"updated_at": "2020-03-13T13:31:38Z",
"pushed_at": "2020-03-13T13:31:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 272202199,
"name": "cve-2003-0282",
"full_name": "lushann\/cve-2003-0282",
"owner": {
"login": "lushann",
"id": 24622986,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24622986?v=4",
"html_url": "https:\/\/github.com\/lushann"
},
"html_url": "https:\/\/github.com\/lushann\/cve-2003-0282",
"description": null,
"fork": false,
"created_at": "2020-06-14T12:54:58Z",
"updated_at": "2020-06-14T13:00:59Z",
"pushed_at": "2020-06-14T13:00:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-09T03:04:36Z",
"updated_at": "2020-07-10T00:10:23Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 121,
"forks": 121,
"watchers": 491,
"watchers": 492,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-09T03:04:36Z",
"updated_at": "2020-07-10T00:10:23Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 121,
"forks": 121,
"watchers": 491,
"watchers": 492,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-07-06T01:52:31Z",
"updated_at": "2020-07-10T02:02:44Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 462,
"watchers_count": 462,
"stargazers_count": 463,
"watchers_count": 463,
"forks_count": 239,
"forks": 239,
"watchers": 462,
"watchers": 463,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
"fork": false,
"created_at": "2017-11-21T18:17:28Z",
"updated_at": "2020-07-03T03:45:54Z",
"updated_at": "2020-07-10T02:34:40Z",
"pushed_at": "2017-11-21T20:34:57Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 47,
"forks": 47,
"watchers": 89,
"watchers": 90,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.",
"fork": false,
"created_at": "2017-09-23T06:15:48Z",
"updated_at": "2020-06-16T01:46:07Z",
"updated_at": "2020-07-10T02:38:36Z",
"pushed_at": "2019-12-20T07:22:17Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 21,
"forks": 21,
"watchers": 71,
"watchers": 70,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-09T03:04:36Z",
"updated_at": "2020-07-10T00:10:23Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 121,
"forks": 121,
"watchers": 491,
"watchers": 492,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-04-10T03:44:04Z",
"updated_at": "2020-06-10T17:52:23Z",
"updated_at": "2020-07-10T00:03:11Z",
"pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 80,
"forks": 80,
"watchers": 169,
"watchers": 168,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-09T03:04:36Z",
"updated_at": "2020-07-10T00:10:23Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 121,
"forks": 121,
"watchers": 491,
"watchers": 492,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-10-26T17:54:54Z",
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 39,
"forks": 39,
"forks_count": 40,
"forks": 40,
"watchers": 92,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-10-27T01:41:18Z",
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 61,
"forks": 61,
"forks_count": 62,
"forks": 62,
"watchers": 148,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2018-12-07T04:31:50Z",
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 23,
"forks": 23,
"forks_count": 24,
"forks": 24,
"watchers": 70,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-11-01T08:53:23Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 59,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-27T07:39:40Z",
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 173,
"score": 0
},

View file

@ -1416,13 +1416,13 @@
"description": "Only Hitting PoC [Tested on Windows Server 2008 r2]",
"fork": false,
"created_at": "2019-05-28T02:25:21Z",
"updated_at": "2020-06-14T08:16:10Z",
"updated_at": "2020-07-09T21:59:35Z",
"pushed_at": "2019-05-28T02:46:19Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 38,
"forks": 38,
"watchers": 113,
"watchers": 114,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-09-10T15:57:23Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 22,
"forks": 22,
"forks_count": 23,
"forks": 23,
"watchers": 51,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-09T15:30:27Z",
"updated_at": "2020-07-10T00:14:18Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1204,
"watchers_count": 1204,
"stargazers_count": 1205,
"watchers_count": 1205,
"forks_count": 304,
"forks": 304,
"watchers": 1204,
"watchers": 1205,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-06-29T18:22:48Z",
"updated_at": "2020-07-10T00:03:20Z",
"pushed_at": "2020-02-17T13:28:02Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 32,
"forks": 32,
"watchers": 83,
"watchers": 82,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-04-17T11:13:29Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 46,
"score": 0
},
@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-07-09T08:05:56Z",
"updated_at": "2020-07-10T01:20:43Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 606,
"watchers_count": 606,
"stargazers_count": 607,
"watchers_count": 607,
"forks_count": 132,
"forks": 132,
"watchers": 606,
"watchers": 607,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-09T03:04:36Z",
"updated_at": "2020-07-10T00:10:23Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 121,
"forks": 121,
"watchers": 491,
"watchers": 492,
"score": 0
}
]

View file

@ -132,8 +132,8 @@
"pushed_at": "2019-04-10T02:26:45Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 14,
"forks": 14,
"forks_count": 15,
"forks": 15,
"watchers": 33,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-07-07T12:27:51Z",
"updated_at": "2020-07-10T02:40:00Z",
"pushed_at": "2020-03-22T15:14:31Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"forks_count": 84,
"forks": 84,
"watchers": 321,
"watchers": 322,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-07-06T13:43:17Z",
"updated_at": "2020-07-09T23:28:40Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 509,
"watchers_count": 509,
"stargazers_count": 510,
"watchers_count": 510,
"forks_count": 169,
"forks": 169,
"watchers": 509,
"watchers": 510,
"score": 0
},
{
@ -933,7 +933,7 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-07-09T15:53:35Z",
"updated_at": "2020-07-09T23:30:10Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 970,
"watchers_count": 970,

View file

@ -13,12 +13,12 @@
"description": "Technical Write-Up on and PoC Exploit for CVE-2020-11519 and CVE-2020-11520",
"fork": false,
"created_at": "2020-06-30T23:01:33Z",
"updated_at": "2020-07-01T10:00:07Z",
"pushed_at": "2020-06-30T23:04:26Z",
"updated_at": "2020-07-09T22:43:41Z",
"pushed_at": "2020-07-09T22:43:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -82,13 +82,13 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2020-07-06T09:24:13Z",
"updated_at": "2020-07-10T00:15:28Z",
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 177,
"watchers_count": 177,
"forks_count": 79,
"forks": 79,
"watchers": 176,
"watchers": 177,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-09T03:04:36Z",
"updated_at": "2020-07-10T00:10:23Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 121,
"forks": 121,
"watchers": 491,
"watchers": 492,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2020-07-08T16:38:31Z",
"updated_at": "2020-07-10T01:01:26Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 24,
"forks": 24,
"watchers": 131,
"watchers": 130,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-09T15:30:27Z",
"updated_at": "2020-07-10T00:14:18Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1204,
"watchers_count": 1204,
"stargazers_count": 1205,
"watchers_count": 1205,
"forks_count": 304,
"forks": 304,
"watchers": 1204,
"watchers": 1205,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-05T06:19:09Z",
"updated_at": "2020-07-09T14:06:36Z",
"updated_at": "2020-07-09T21:40:28Z",
"pushed_at": "2020-07-07T07:19:16Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 14,
"forks": 14,
"watchers": 32,
"watchers": 33,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-07-09T17:20:57Z",
"updated_at": "2020-07-10T03:01:59Z",
"pushed_at": "2020-07-07T09:36:24Z",
"stargazers_count": 259,
"watchers_count": 259,
"stargazers_count": 261,
"watchers_count": 261,
"forks_count": 77,
"forks": 77,
"watchers": 259,
"watchers": 261,
"score": 0
},
{
@ -864,8 +864,8 @@
"description": "F5 Big-IP CVE-2020-5902 mass exploiter\/fuzzer.",
"fork": false,
"created_at": "2020-07-09T08:34:37Z",
"updated_at": "2020-07-09T10:12:40Z",
"pushed_at": "2020-07-09T10:12:38Z",
"updated_at": "2020-07-10T01:10:04Z",
"pushed_at": "2020-07-10T01:10:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

25
2020/CVE-2020-9376.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 278486856,
"name": "dlink-dir610-exploits",
"full_name": "renatoalencar\/dlink-dir610-exploits",
"owner": {
"login": "renatoalencar",
"id": 6964593,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6964593?v=4",
"html_url": "https:\/\/github.com\/renatoalencar"
},
"html_url": "https:\/\/github.com\/renatoalencar\/dlink-dir610-exploits",
"description": "Exploits for CVE-2020-9376 and CVE-2020-9377",
"fork": false,
"created_at": "2020-07-09T22:48:51Z",
"updated_at": "2020-07-09T23:08:46Z",
"pushed_at": "2020-07-09T22:49:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -997,6 +997,14 @@ TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attac
- [thewhiteh4t/cve-2020-9375](https://github.com/thewhiteh4t/cve-2020-9375)
### CVE-2020-9376
<code>
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
</code>
- [renatoalencar/dlink-dir610-exploits](https://github.com/renatoalencar/dlink-dir610-exploits)
### CVE-2020-9380
<code>
@ -14180,15 +14188,6 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
- [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264)
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
### CVE-2003-0282
<code>
Directory traversal vulnerability in UnZip 5.50 allows attackers to overwrite arbitrary files via invalid characters between two . (dot) characters, which are filtered and result in a &quot;..&quot; sequence.
</code>
- [lushann/cve-2003-0282](https://github.com/lushann/cve-2003-0282)
## 2002