Auto Update 2021/01/22 12:09:59

This commit is contained in:
motikan2010-bot 2021-01-22 12:09:59 +09:00
parent cf22a439d1
commit bfab2b1064
19 changed files with 87 additions and 87 deletions

View file

@ -13,13 +13,13 @@
"description": "Environment for CVE-2018-1273 (Spring Data Commons)",
"fork": false,
"created_at": "2018-04-13T13:41:02Z",
"updated_at": "2019-04-24T05:33:19Z",
"updated_at": "2021-01-22T02:49:50Z",
"pushed_at": "2018-08-15T05:26:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2021-01-12T07:21:25Z",
"updated_at": "2021-01-22T02:12:21Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 27,
"forks": 27,
"watchers": 94,
"watchers": 95,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
"fork": false,
"created_at": "2019-08-15T11:54:21Z",
"updated_at": "2021-01-11T20:36:20Z",
"updated_at": "2021-01-21T21:29:48Z",
"pushed_at": "2020-06-09T13:13:44Z",
"stargazers_count": 129,
"watchers_count": 129,

View file

@ -183,29 +183,6 @@
"watchers": 0,
"score": 0
},
{
"id": 234598729,
"name": "CVE-2020-0601",
"full_name": "YoannDqr\/CVE-2020-0601",
"owner": {
"login": "YoannDqr",
"id": 26006989,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26006989?v=4",
"html_url": "https:\/\/github.com\/YoannDqr"
},
"html_url": "https:\/\/github.com\/YoannDqr\/CVE-2020-0601",
"description": "CurveBall CVE exploitation",
"fork": false,
"created_at": "2020-01-17T17:17:55Z",
"updated_at": "2020-02-09T12:37:38Z",
"pushed_at": "2020-01-20T10:52:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 235145190,
"name": "curveball",

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-11T20:13:05Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 12,
"score": 0
}

View file

@ -1071,13 +1071,13 @@
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example",
"fork": false,
"created_at": "2021-01-20T21:38:47Z",
"updated_at": "2021-01-20T22:25:08Z",
"updated_at": "2021-01-21T22:43:02Z",
"pushed_at": "2021-01-20T22:25:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-21T16:44:00Z",
"updated_at": "2021-01-22T02:52:28Z",
"pushed_at": "2021-01-13T10:38:48Z",
"stargazers_count": 783,
"watchers_count": 783,
"forks_count": 143,
"forks": 143,
"watchers": 783,
"stargazers_count": 788,
"watchers_count": 788,
"forks_count": 144,
"forks": 144,
"watchers": 788,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
"fork": false,
"created_at": "2020-10-21T15:38:22Z",
"updated_at": "2021-01-21T01:33:41Z",
"updated_at": "2021-01-22T02:29:43Z",
"pushed_at": "2020-10-21T15:39:00Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 37,
"forks": 37,
"watchers": 165,
"watchers": 166,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exchange2010 authorized RCE",
"fork": false,
"created_at": "2020-12-09T10:30:16Z",
"updated_at": "2021-01-19T02:32:34Z",
"updated_at": "2021-01-22T02:14:33Z",
"pushed_at": "2020-12-24T08:11:51Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 33,
"forks": 33,
"watchers": 124,
"watchers": 125,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-21T15:58:16Z",
"updated_at": "2021-01-22T03:12:11Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 887,
"watchers_count": 887,
"stargazers_count": 888,
"watchers_count": 888,
"forks_count": 208,
"forks": 208,
"watchers": 887,
"watchers": 888,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2021-01-20T01:45:48Z",
"updated_at": "2021-01-22T02:25:46Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 210,
"watchers_count": 210,
"stargazers_count": 211,
"watchers_count": 211,
"forks_count": 32,
"forks": 32,
"watchers": 210,
"watchers": 211,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": " CVE-2020-35728 & Jackson-databind RCE",
"fork": false,
"created_at": "2020-12-31T01:55:39Z",
"updated_at": "2021-01-20T05:13:32Z",
"updated_at": "2021-01-22T01:02:02Z",
"pushed_at": "2020-12-31T01:56:18Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 5,
"forks": 5,
"watchers": 41,
"watchers": 42,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
"fork": false,
"created_at": "2021-01-14T10:49:40Z",
"updated_at": "2021-01-21T20:40:04Z",
"updated_at": "2021-01-21T23:32:08Z",
"pushed_at": "2021-01-15T16:25:19Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 9,
"forks": 9,
"watchers": 24,
"watchers": 26,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2020-12-11T10:21:56Z",
"updated_at": "2021-01-22T02:06:59Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 11,
"forks": 11,
"watchers": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 12,
"forks": 12,
"watchers": 40,
"score": 0
}
]

View file

@ -67,5 +67,28 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 331774345,
"name": "CVE-2020-8554",
"full_name": "Dviejopomata\/CVE-2020-8554",
"owner": {
"login": "Dviejopomata",
"id": 6862893,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6862893?v=4",
"html_url": "https:\/\/github.com\/Dviejopomata"
},
"html_url": "https:\/\/github.com\/Dviejopomata\/CVE-2020-8554",
"description": null,
"fork": false,
"created_at": "2021-01-21T22:41:50Z",
"updated_at": "2021-01-21T22:42:08Z",
"pushed_at": "2021-01-21T22:42:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Information about Kubernetes CVE-2020-8558, including proof of concept exploit.",
"fork": false,
"created_at": "2020-07-09T06:56:07Z",
"updated_at": "2021-01-21T16:01:44Z",
"updated_at": "2021-01-22T01:20:20Z",
"pushed_at": "2020-07-22T12:34:47Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 2,
"forks": 2,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2021-3019 lanproxy目录遍历任意文件读取漏洞探测POC",
"fork": false,
"created_at": "2021-01-11T04:18:44Z",
"updated_at": "2021-01-20T01:39:20Z",
"updated_at": "2021-01-22T02:56:21Z",
"pushed_at": "2021-01-13T07:29:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-01-19T07:42:13Z",
"updated_at": "2021-01-22T00:14:39Z",
"pushed_at": "2021-01-13T13:25:10Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -185,7 +185,6 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
- [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
@ -1478,6 +1477,7 @@ Kubernetes API server in all versions allow an attacker who is able to create a
- [rancher/externalip-webhook](https://github.com/rancher/externalip-webhook)
- [jrmurray000/CVE-2020-8554](https://github.com/jrmurray000/CVE-2020-8554)
- [twistlock/k8s-cve-2020-8554-mitigations](https://github.com/twistlock/k8s-cve-2020-8554-mitigations)
- [Dviejopomata/CVE-2020-8554](https://github.com/Dviejopomata/CVE-2020-8554)
### CVE-2020-8558 (2020-07-27)