Auto Update 2020/11/14 06:09:16

This commit is contained in:
motikan2010-bot 2020-11-14 06:09:16 +09:00
parent 47018cb949
commit c21f163458
22 changed files with 122 additions and 256 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 224839310,
"name": "CVE-2007-0038",
"full_name": "Axua\/CVE-2007-0038",
"owner": {
"login": "Axua",
"id": 28788087,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
"html_url": "https:\/\/github.com\/Axua"
},
"html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038",
"description": "IE7 buffer overflow through an ANI file",
"fork": false,
"created_at": "2019-11-29T11:15:39Z",
"updated_at": "2020-04-30T04:01:07Z",
"pushed_at": "2019-11-29T11:16:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 27229028,
"name": "spydir",
"full_name": "z3APA3A\/spydir",
"owner": {
"login": "z3APA3A",
"id": 7222768,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7222768?v=4",
"html_url": "https:\/\/github.com\/z3APA3A"
},
"html_url": "https:\/\/github.com\/z3APA3A\/spydir",
"description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)",
"fork": false,
"created_at": "2014-11-27T14:36:05Z",
"updated_at": "2020-09-04T11:59:08Z",
"pushed_at": "2017-04-08T16:40:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"score": 0
}
]

View file

@ -1,73 +1,4 @@
[
{
"id": 143461594,
"name": "CVE-2007-2447",
"full_name": "amriunix\/CVE-2007-2447",
"owner": {
"login": "amriunix",
"id": 6618368,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6618368?v=4",
"html_url": "https:\/\/github.com\/amriunix"
},
"html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447",
"description": "CVE-2007-2447 - Samba usermap script",
"fork": false,
"created_at": "2018-08-03T18:39:56Z",
"updated_at": "2020-11-04T10:36:06Z",
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 11,
"forks": 11,
"watchers": 18,
"score": 0
},
{
"id": 195401614,
"name": "metasploitable2",
"full_name": "Unix13\/metasploitable2",
"owner": {
"login": "Unix13",
"id": 52569108,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/52569108?v=4",
"html_url": "https:\/\/github.com\/Unix13"
},
"html_url": "https:\/\/github.com\/Unix13\/metasploitable2",
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
"fork": false,
"created_at": "2019-07-05T11:55:41Z",
"updated_at": "2020-08-26T14:48:27Z",
"pushed_at": "2018-07-11T18:22:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 211957347,
"name": "smb_usermap",
"full_name": "b1fair\/smb_usermap",
"owner": {
"login": "b1fair",
"id": 43326124,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/43326124?v=4",
"html_url": "https:\/\/github.com\/b1fair"
},
"html_url": "https:\/\/github.com\/b1fair\/smb_usermap",
"description": "A simple exploit for CVE-2007-2447",
"fork": false,
"created_at": "2019-09-30T21:06:09Z",
"updated_at": "2019-10-01T18:44:18Z",
"pushed_at": "2019-10-01T18:44:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 225688290,
"name": "exploit_smb_usermap_script",
@ -91,52 +22,6 @@
"watchers": 1,
"score": 0
},
{
"id": 235003634,
"name": "CVE-2007-2447",
"full_name": "JoseBarrios\/CVE-2007-2447",
"owner": {
"login": "JoseBarrios",
"id": 794342,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/794342?v=4",
"html_url": "https:\/\/github.com\/JoseBarrios"
},
"html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447",
"description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.",
"fork": false,
"created_at": "2020-01-20T02:30:35Z",
"updated_at": "2020-01-20T02:30:39Z",
"pushed_at": "2020-01-20T02:30:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 257885318,
"name": "CVE-2007-2447",
"full_name": "3x1t1um\/CVE-2007-2447",
"owner": {
"login": "3x1t1um",
"id": 54857145,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54857145?v=4",
"html_url": "https:\/\/github.com\/3x1t1um"
},
"html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447",
"description": null,
"fork": false,
"created_at": "2020-04-22T11:47:16Z",
"updated_at": "2020-08-04T14:13:55Z",
"pushed_at": "2020-08-04T14:13:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 264335823,
"name": "smb-usermap-destroyer",

View file

@ -13,8 +13,8 @@
"description": "IBM Lotus Notes PNG Integer Overflow",
"fork": false,
"created_at": "2020-01-03T15:55:12Z",
"updated_at": "2020-01-03T17:32:12Z",
"pushed_at": "2020-01-03T16:49:42Z",
"updated_at": "2020-11-13T18:29:22Z",
"pushed_at": "2020-11-13T18:29:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,8 +13,8 @@
"description": "Sketchup MAC Pict Material Palette Stack Corruption",
"fork": false,
"created_at": "2020-01-03T16:53:55Z",
"updated_at": "2020-01-03T17:31:14Z",
"pushed_at": "2020-01-03T17:11:11Z",
"updated_at": "2020-11-13T18:48:51Z",
"pushed_at": "2020-11-13T18:48:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -36,8 +36,8 @@
"description": "Sketchup BMP Material RLE4 Heap Overflow",
"fork": false,
"created_at": "2020-01-03T17:05:48Z",
"updated_at": "2020-01-03T17:31:47Z",
"pushed_at": "2020-01-03T17:10:23Z",
"updated_at": "2020-11-13T18:44:43Z",
"pushed_at": "2020-11-13T18:44:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -82,13 +82,13 @@
"description": "CVE-2013-6282 proof of concept for Android",
"fork": false,
"created_at": "2016-12-19T16:14:18Z",
"updated_at": "2020-10-12T10:04:26Z",
"updated_at": "2020-11-13T16:35:19Z",
"pushed_at": "2016-12-19T16:19:07Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 17,
"forks": 17,
"watchers": 11,
"watchers": 10,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-3153 aka towelroot",
"fork": false,
"created_at": "2014-07-24T13:28:00Z",
"updated_at": "2020-08-29T15:46:18Z",
"updated_at": "2020-11-13T15:45:10Z",
"pushed_at": "2017-04-25T07:24:08Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 79,
"forks": 79,
"watchers": 120,
"watchers": 119,
"score": 0
},
{

View file

@ -1305,8 +1305,8 @@
"pushed_at": "2020-11-12T04:15:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -385,8 +385,8 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 86,
"forks": 86,
"forks_count": 87,
"forks": 87,
"watchers": 238,
"score": 0
},

View file

@ -113,5 +113,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 312628962,
"name": "exploit_laravel_cve-2018-15133",
"full_name": "aljavier\/exploit_laravel_cve-2018-15133",
"owner": {
"login": "aljavier",
"id": 1992392,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1992392?v=4",
"html_url": "https:\/\/github.com\/aljavier"
},
"html_url": "https:\/\/github.com\/aljavier\/exploit_laravel_cve-2018-15133",
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2020-11-13T20:50:17Z",
"pushed_at": "2020-11-13T20:50:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-11-10T11:10:22Z",
"updated_at": "2020-11-13T16:38:54Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 72,
"forks": 72,
"watchers": 331,
"stargazers_count": 332,
"watchers_count": 332,
"forks_count": 73,
"forks": 73,
"watchers": 332,
"score": 0
}
]

View file

@ -109,8 +109,8 @@
"pushed_at": "2019-05-15T02:51:24Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 34,
"forks": 34,
"forks_count": 35,
"forks": 35,
"watchers": 29,
"score": 0
},
@ -1278,13 +1278,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-11-13T03:51:33Z",
"updated_at": "2020-11-13T18:29:00Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 771,
"watchers_count": 771,
"stargazers_count": 772,
"watchers_count": 772,
"forks_count": 189,
"forks": 189,
"watchers": 771,
"watchers": 772,
"score": 0
},
{
@ -2313,13 +2313,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2020-11-11T08:01:49Z",
"updated_at": "2020-11-13T19:48:05Z",
"pushed_at": "2019-10-16T01:04:12Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 62,
"forks": 62,
"watchers": 166,
"watchers": 167,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-13T10:01:52Z",
"updated_at": "2020-11-13T15:15:33Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2049,
"watchers_count": 2049,
"forks_count": 548,
"forks": 548,
"watchers": 2049,
"stargazers_count": 2050,
"watchers_count": 2050,
"forks_count": 549,
"forks": 549,
"watchers": 2050,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 86,
"forks": 86,
"forks_count": 87,
"forks": 87,
"watchers": 238,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-24T13:22:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-10T10:54:36Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 21,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-13T10:01:52Z",
"updated_at": "2020-11-13T15:15:33Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2049,
"watchers_count": 2049,
"forks_count": 548,
"forks": 548,
"watchers": 2049,
"stargazers_count": 2050,
"watchers_count": 2050,
"forks_count": 549,
"forks": 549,
"watchers": 2050,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web漏洞扫描和验证工具可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2020-11-13T10:08:32Z",
"updated_at": "2020-11-13T15:24:31Z",
"pushed_at": "2020-11-10T02:58:25Z",
"stargazers_count": 335,
"watchers_count": 335,
"forks_count": 56,
"forks": 56,
"watchers": 335,
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 57,
"forks": 57,
"watchers": 336,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-11-13T14:07:33Z",
"updated_at": "2020-11-13T18:19:31Z",
"pushed_at": "2020-11-04T02:26:59Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 177,
"watchers_count": 177,
"forks_count": 30,
"forks": 30,
"watchers": 176,
"watchers": 177,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-13T13:41:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-10-22T15:22:55Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
},

25
2020/CVE-2020-25769.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 312644639,
"name": "CVE-2020-25769",
"full_name": "lagartojuancho\/CVE-2020-25769",
"owner": {
"login": "lagartojuancho",
"id": 59481050,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/59481050?v=4",
"html_url": "https:\/\/github.com\/lagartojuancho"
},
"html_url": "https:\/\/github.com\/lagartojuancho\/CVE-2020-25769",
"description": "GOG Galaxy Local Privilege Escalation",
"fork": false,
"created_at": "2020-11-13T17:42:40Z",
"updated_at": "2020-11-13T18:51:41Z",
"pushed_at": "2020-11-13T18:51:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2020-11-12T08:58:55Z",
"updated_at": "2020-11-13T15:25:54Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 26,
"forks": 26,
"watchers": 187,
"watchers": 188,
"score": 0
},
{

View file

@ -2762,6 +2762,9 @@ The Telnet service of Rubetek cameras RV-3406, RV-3409, and RV-3411 cameras (fir
- [jet-pentest/CVE-2020-25749](https://github.com/jet-pentest/CVE-2020-25749)
### CVE-2020-25769
- [lagartojuancho/CVE-2020-25769](https://github.com/lagartojuancho/CVE-2020-25769)
### CVE-2020-25790 (2020-09-19)
<code>
@ -8610,6 +8613,7 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut
- [Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader](https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader)
- [iansangaji/laravel-rce-cve-2018-15133](https://github.com/iansangaji/laravel-rce-cve-2018-15133)
- [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133)
- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133)
### CVE-2018-15365 (2018-09-28)
@ -15805,22 +15809,6 @@ Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before
## 2007
### CVE-2007-0038 (2007-03-30)
<code>
Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.
</code>
- [Axua/CVE-2007-0038](https://github.com/Axua/CVE-2007-0038)
### CVE-2007-0843 (2007-02-22)
<code>
The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
</code>
- [z3APA3A/spydir](https://github.com/z3APA3A/spydir)
### CVE-2007-1567 (2007-03-21)
<code>
@ -15835,12 +15823,7 @@ Stack-based buffer overflow in War FTP Daemon 1.65, and possibly earlier, allows
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the &quot;username map script&quot; smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
</code>
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
- [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script)
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447)
- [nickvourd/smb-usermap-destroyer](https://github.com/nickvourd/smb-usermap-destroyer)
### CVE-2007-3830 (2007-07-17)