Auto Update 2020/10/31 00:09:05

This commit is contained in:
motikan2010-bot 2020-10-31 00:09:05 +09:00
parent beb7d19d59
commit b3d62c81ef
23 changed files with 143 additions and 86 deletions

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-09-20T05:13:51Z",
"updated_at": "2020-10-30T14:13:27Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 540,
"watchers_count": 540,
"stargazers_count": 539,
"watchers_count": 539,
"forks_count": 91,
"forks": 91,
"watchers": 540,
"watchers": 539,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
"fork": false,
"created_at": "2018-10-17T23:05:10Z",
"updated_at": "2020-09-30T09:18:07Z",
"updated_at": "2020-10-30T13:49:34Z",
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 232,
"watchers_count": 232,
"stargazers_count": 231,
"watchers_count": 231,
"forks_count": 54,
"forks": 54,
"watchers": 232,
"watchers": 231,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Fortigate CVE-2018-13379 - Tool to search for vulnerable Fortigate hosts in Rapid7 Project Sonar data anonymously through The Tor network.",
"fork": false,
"created_at": "2019-08-18T19:24:48Z",
"updated_at": "2020-06-11T00:46:08Z",
"updated_at": "2020-10-30T12:56:43Z",
"pushed_at": "2020-06-11T00:46:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-09-20T05:13:51Z",
"updated_at": "2020-10-30T14:13:27Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 540,
"watchers_count": 540,
"stargazers_count": 539,
"watchers_count": 539,
"forks_count": 91,
"forks": 91,
"watchers": 540,
"watchers": 539,
"score": 0
}
]

View file

@ -1075,8 +1075,8 @@
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1123,
"watchers_count": 1123,
"forks_count": 378,
"forks": 378,
"forks_count": 379,
"forks": 379,
"watchers": 1123,
"score": 0
},
@ -1278,13 +1278,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-10-27T07:40:26Z",
"updated_at": "2020-10-30T13:27:00Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 767,
"watchers_count": 767,
"forks_count": 188,
"forks": 188,
"watchers": 767,
"stargazers_count": 768,
"watchers_count": 768,
"forks_count": 189,
"forks": 189,
"watchers": 768,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CuteNews Avatar 2.1.2 Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2020-10-30T08:21:46Z",
"updated_at": "2020-10-30T09:03:31Z",
"updated_at": "2020-10-30T09:11:06Z",
"pushed_at": "2020-10-30T09:03:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-30T09:05:48Z",
"updated_at": "2020-10-30T13:33:20Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1987,
"watchers_count": 1987,
"stargazers_count": 1988,
"watchers_count": 1988,
"forks_count": 525,
"forks": 525,
"watchers": 1987,
"watchers": 1988,
"score": 0
},
{

View file

@ -316,8 +316,8 @@
"pushed_at": "2019-07-15T06:03:15Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 20,
"forks": 20,
"forks_count": 21,
"forks": 21,
"watchers": 61,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2020-10-29T08:56:37Z",
"updated_at": "2020-10-30T13:45:13Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 403,
"watchers_count": 403,
"stargazers_count": 402,
"watchers_count": 402,
"forks_count": 105,
"forks": 105,
"watchers": 403,
"watchers": 402,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-10-29T11:07:51Z",
"updated_at": "2020-10-30T14:40:42Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 843,
"watchers_count": 843,
"stargazers_count": 844,
"watchers_count": 844,
"forks_count": 216,
"forks": 216,
"watchers": 843,
"watchers": 844,
"score": 0
},
{

View file

@ -1347,13 +1347,13 @@
"description": "This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework",
"fork": false,
"created_at": "2020-06-19T20:38:11Z",
"updated_at": "2020-07-12T04:19:41Z",
"updated_at": "2020-10-30T11:16:01Z",
"pushed_at": "2020-06-19T20:58:36Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "POC For CVE-2020-1481 - Jira Username Enumerator\/Validator",
"fork": false,
"created_at": "2020-10-26T17:07:28Z",
"updated_at": "2020-10-28T09:45:43Z",
"pushed_at": "2020-10-28T09:45:41Z",
"updated_at": "2020-10-30T09:36:26Z",
"pushed_at": "2020-10-30T09:36:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 74,
"score": 0
},

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 684,
"watchers_count": 684,
"forks_count": 197,
"forks": 197,
"forks_count": 198,
"forks": 198,
"watchers": 684,
"score": 0
},
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-10-29T01:54:47Z",
"updated_at": "2020-10-30T09:30:18Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 206,
"watchers_count": 206,
"forks_count": 78,
"forks": 78,
"watchers": 205,
"watchers": 206,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-10-30T08:58:43Z",
"updated_at": "2020-10-30T14:18:58Z",
"pushed_at": "2020-10-30T08:58:41Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 8,
"forks": 8,
"watchers": 46,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 9,
"forks": 9,
"watchers": 54,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-202014882 by Jang",
"fork": false,
"created_at": "2020-10-28T21:28:12Z",
"updated_at": "2020-10-30T04:52:09Z",
"updated_at": "2020-10-30T15:11:08Z",
"pushed_at": "2020-10-29T03:57:09Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 9,
"forks": 9,
"watchers": 17,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 10,
"forks": 10,
"watchers": 20,
"score": 0
},
{
@ -136,5 +136,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 308605927,
"name": "CVE-2020-14882",
"full_name": "alexfrancow\/CVE-2020-14882",
"owner": {
"login": "alexfrancow",
"id": 23419929,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4",
"html_url": "https:\/\/github.com\/alexfrancow"
},
"html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-10-30T11:07:11Z",
"updated_at": "2020-10-30T11:27:42Z",
"pushed_at": "2020-10-30T11:27:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "CVE-2020-15999",
"fork": false,
"created_at": "2020-10-28T16:16:25Z",
"updated_at": "2020-10-29T21:55:10Z",
"pushed_at": "2020-10-29T21:55:08Z",
"updated_at": "2020-10-30T11:16:07Z",
"pushed_at": "2020-10-30T11:16:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"forks": 6,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-21T15:39:00Z",
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 31,
"forks": 31,
"forks_count": 32,
"forks": 32,
"watchers": 142,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2020-10-29T21:46:45Z",
"updated_at": "2020-10-30T13:55:56Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 6,
"forks": 6,
"watchers": 20,
"watchers": 21,
"score": 0
}
]

25
2020/CVE-2020-27976.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 308646506,
"name": "CVE-2020-27976",
"full_name": "k0rnh0li0\/CVE-2020-27976",
"owner": {
"login": "k0rnh0li0",
"id": 73505124,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/73505124?v=4",
"html_url": "https:\/\/github.com\/k0rnh0li0"
},
"html_url": "https:\/\/github.com\/k0rnh0li0\/CVE-2020-27976",
"description": "osCommerce Phoenix CE <=1.0.5.4 Authenticated RCE",
"fork": false,
"created_at": "2020-10-30T13:59:23Z",
"updated_at": "2020-10-30T14:18:08Z",
"pushed_at": "2020-10-30T14:18:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2020-10-26T09:23:28Z",
"updated_at": "2020-10-30T13:06:00Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 32,
"forks": 32,
"watchers": 158,
"watchers": 159,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-30T09:05:48Z",
"updated_at": "2020-10-30T13:33:20Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1987,
"watchers_count": 1987,
"stargazers_count": 1988,
"watchers_count": 1988,
"forks_count": 525,
"forks": 525,
"watchers": 1987,
"watchers": 1988,
"score": 0
},
{

View file

@ -2178,6 +2178,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [RedTeamWing/CVE-2020-14882](https://github.com/RedTeamWing/CVE-2020-14882)
- [0thm4n3/cve-2020-14882](https://github.com/0thm4n3/cve-2020-14882)
- [wsfengfan/cve-2020-14882](https://github.com/wsfengfan/cve-2020-14882)
- [alexfrancow/CVE-2020-14882](https://github.com/alexfrancow/CVE-2020-14882)
### CVE-2020-14947 (2020-06-30)
@ -2654,6 +2655,14 @@ An issue was discovered in Click Studios Passwordstate 8.9 (Build 8973).If the u
- [jet-pentest/CVE-2020-27747](https://github.com/jet-pentest/CVE-2020-27747)
### CVE-2020-27976 (2020-10-28)
<code>
osCommerce Phoenix CE before 1.0.5.4 allows OS command injection remotely. Within admin/mail.php, a from POST parameter can be passed to the application. This affects the PHP mail function, and the sendmail -f option.
</code>
- [k0rnh0li0/CVE-2020-27976](https://github.com/k0rnh0li0/CVE-2020-27976)
### CVE-2020-72381
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)