From c21f163458319dd050cf520effdc8ec11240fc99 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 14 Nov 2020 06:09:16 +0900 Subject: [PATCH] Auto Update 2020/11/14 06:09:16 --- 2007/CVE-2007-0038.json | 25 --------- 2007/CVE-2007-0843.json | 25 --------- 2007/CVE-2007-2447.json | 115 --------------------------------------- 2013/CVE-2013-2977.json | 4 +- 2013/CVE-2013-3664.json | 8 +-- 2013/CVE-2013-6282.json | 8 +-- 2014/CVE-2014-3153.json | 8 +-- 2014/CVE-2014-6271.json | 4 +- 2017/CVE-2017-10271.json | 4 +- 2018/CVE-2018-15133.json | 23 ++++++++ 2018/CVE-2018-5955.json | 12 ++-- 2019/CVE-2019-0708.json | 20 +++---- 2019/CVE-2019-17558.json | 12 ++-- 2019/CVE-2019-2725.json | 4 +- 2020/CVE-2020-10673.json | 4 +- 2020/CVE-2020-14750.json | 4 +- 2020/CVE-2020-14882.json | 32 +++++------ 2020/CVE-2020-15349.json | 4 +- 2020/CVE-2020-16898.json | 4 +- 2020/CVE-2020-25769.json | 25 +++++++++ 2020/CVE-2020-2883.json | 8 +-- README.md | 25 ++------- 22 files changed, 122 insertions(+), 256 deletions(-) delete mode 100644 2007/CVE-2007-0038.json delete mode 100644 2007/CVE-2007-0843.json create mode 100644 2020/CVE-2020-25769.json diff --git a/2007/CVE-2007-0038.json b/2007/CVE-2007-0038.json deleted file mode 100644 index 866e062cc9..0000000000 --- a/2007/CVE-2007-0038.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 224839310, - "name": "CVE-2007-0038", - "full_name": "Axua\/CVE-2007-0038", - "owner": { - "login": "Axua", - "id": 28788087, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4", - "html_url": "https:\/\/github.com\/Axua" - }, - "html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038", - "description": "IE7 buffer overflow through an ANI file", - "fork": false, - "created_at": "2019-11-29T11:15:39Z", - "updated_at": "2020-04-30T04:01:07Z", - "pushed_at": "2019-11-29T11:16:13Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2007/CVE-2007-0843.json b/2007/CVE-2007-0843.json deleted file mode 100644 index a7eea9a0d6..0000000000 --- a/2007/CVE-2007-0843.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 27229028, - "name": "spydir", - "full_name": "z3APA3A\/spydir", - "owner": { - "login": "z3APA3A", - "id": 7222768, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7222768?v=4", - "html_url": "https:\/\/github.com\/z3APA3A" - }, - "html_url": "https:\/\/github.com\/z3APA3A\/spydir", - "description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)", - "fork": false, - "created_at": "2014-11-27T14:36:05Z", - "updated_at": "2020-09-04T11:59:08Z", - "pushed_at": "2017-04-08T16:40:03Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 3, - "forks": 3, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index c0fa14078f..8464ffa74c 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -1,73 +1,4 @@ [ - { - "id": 143461594, - "name": "CVE-2007-2447", - "full_name": "amriunix\/CVE-2007-2447", - "owner": { - "login": "amriunix", - "id": 6618368, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6618368?v=4", - "html_url": "https:\/\/github.com\/amriunix" - }, - "html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447", - "description": "CVE-2007-2447 - Samba usermap script", - "fork": false, - "created_at": "2018-08-03T18:39:56Z", - "updated_at": "2020-11-04T10:36:06Z", - "pushed_at": "2020-08-16T18:54:38Z", - "stargazers_count": 18, - "watchers_count": 18, - "forks_count": 11, - "forks": 11, - "watchers": 18, - "score": 0 - }, - { - "id": 195401614, - "name": "metasploitable2", - "full_name": "Unix13\/metasploitable2", - "owner": { - "login": "Unix13", - "id": 52569108, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/52569108?v=4", - "html_url": "https:\/\/github.com\/Unix13" - }, - "html_url": "https:\/\/github.com\/Unix13\/metasploitable2", - "description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.", - "fork": false, - "created_at": "2019-07-05T11:55:41Z", - "updated_at": "2020-08-26T14:48:27Z", - "pushed_at": "2018-07-11T18:22:51Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - }, - { - "id": 211957347, - "name": "smb_usermap", - "full_name": "b1fair\/smb_usermap", - "owner": { - "login": "b1fair", - "id": 43326124, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/43326124?v=4", - "html_url": "https:\/\/github.com\/b1fair" - }, - "html_url": "https:\/\/github.com\/b1fair\/smb_usermap", - "description": "A simple exploit for CVE-2007-2447", - "fork": false, - "created_at": "2019-09-30T21:06:09Z", - "updated_at": "2019-10-01T18:44:18Z", - "pushed_at": "2019-10-01T18:44:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 225688290, "name": "exploit_smb_usermap_script", @@ -91,52 +22,6 @@ "watchers": 1, "score": 0 }, - { - "id": 235003634, - "name": "CVE-2007-2447", - "full_name": "JoseBarrios\/CVE-2007-2447", - "owner": { - "login": "JoseBarrios", - "id": 794342, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/794342?v=4", - "html_url": "https:\/\/github.com\/JoseBarrios" - }, - "html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447", - "description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.", - "fork": false, - "created_at": "2020-01-20T02:30:35Z", - "updated_at": "2020-01-20T02:30:39Z", - "pushed_at": "2020-01-20T02:30:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 257885318, - "name": "CVE-2007-2447", - "full_name": "3x1t1um\/CVE-2007-2447", - "owner": { - "login": "3x1t1um", - "id": 54857145, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54857145?v=4", - "html_url": "https:\/\/github.com\/3x1t1um" - }, - "html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447", - "description": null, - "fork": false, - "created_at": "2020-04-22T11:47:16Z", - "updated_at": "2020-08-04T14:13:55Z", - "pushed_at": "2020-08-04T14:13:53Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 264335823, "name": "smb-usermap-destroyer", diff --git a/2013/CVE-2013-2977.json b/2013/CVE-2013-2977.json index db3bde4dcc..5955fa6c08 100644 --- a/2013/CVE-2013-2977.json +++ b/2013/CVE-2013-2977.json @@ -13,8 +13,8 @@ "description": "IBM Lotus Notes PNG Integer Overflow", "fork": false, "created_at": "2020-01-03T15:55:12Z", - "updated_at": "2020-01-03T17:32:12Z", - "pushed_at": "2020-01-03T16:49:42Z", + "updated_at": "2020-11-13T18:29:22Z", + "pushed_at": "2020-11-13T18:29:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2013/CVE-2013-3664.json b/2013/CVE-2013-3664.json index 94656c8773..7cdf9880c8 100644 --- a/2013/CVE-2013-3664.json +++ b/2013/CVE-2013-3664.json @@ -13,8 +13,8 @@ "description": "Sketchup MAC Pict Material Palette Stack Corruption", "fork": false, "created_at": "2020-01-03T16:53:55Z", - "updated_at": "2020-01-03T17:31:14Z", - "pushed_at": "2020-01-03T17:11:11Z", + "updated_at": "2020-11-13T18:48:51Z", + "pushed_at": "2020-11-13T18:48:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -36,8 +36,8 @@ "description": "Sketchup BMP Material RLE4 Heap Overflow", "fork": false, "created_at": "2020-01-03T17:05:48Z", - "updated_at": "2020-01-03T17:31:47Z", - "pushed_at": "2020-01-03T17:10:23Z", + "updated_at": "2020-11-13T18:44:43Z", + "pushed_at": "2020-11-13T18:44:40Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2013/CVE-2013-6282.json b/2013/CVE-2013-6282.json index 6aca1c038e..f6e6b24264 100644 --- a/2013/CVE-2013-6282.json +++ b/2013/CVE-2013-6282.json @@ -82,13 +82,13 @@ "description": "CVE-2013-6282 proof of concept for Android", "fork": false, "created_at": "2016-12-19T16:14:18Z", - "updated_at": "2020-10-12T10:04:26Z", + "updated_at": "2020-11-13T16:35:19Z", "pushed_at": "2016-12-19T16:19:07Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 17, "forks": 17, - "watchers": 11, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-3153.json b/2014/CVE-2014-3153.json index 7ce85db44b..99b1e92d51 100644 --- a/2014/CVE-2014-3153.json +++ b/2014/CVE-2014-3153.json @@ -13,13 +13,13 @@ "description": "CVE-2014-3153 aka towelroot", "fork": false, "created_at": "2014-07-24T13:28:00Z", - "updated_at": "2020-08-29T15:46:18Z", + "updated_at": "2020-11-13T15:45:10Z", "pushed_at": "2017-04-25T07:24:08Z", - "stargazers_count": 120, - "watchers_count": 120, + "stargazers_count": 119, + "watchers_count": 119, "forks_count": 79, "forks": 79, - "watchers": 120, + "watchers": 119, "score": 0 }, { diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index a2dc8b161e..9f648221c0 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1305,8 +1305,8 @@ "pushed_at": "2020-11-12T04:15:07Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index fcaaa9ee31..f3a093f2a0 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -385,8 +385,8 @@ "pushed_at": "2020-10-01T20:20:41Z", "stargazers_count": 238, "watchers_count": 238, - "forks_count": 86, - "forks": 86, + "forks_count": 87, + "forks": 87, "watchers": 238, "score": 0 }, diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index 43194d045e..6e519dca3a 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -113,5 +113,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 312628962, + "name": "exploit_laravel_cve-2018-15133", + "full_name": "aljavier\/exploit_laravel_cve-2018-15133", + "owner": { + "login": "aljavier", + "id": 1992392, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1992392?v=4", + "html_url": "https:\/\/github.com\/aljavier" + }, + "html_url": "https:\/\/github.com\/aljavier\/exploit_laravel_cve-2018-15133", + "description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)", + "fork": false, + "created_at": "2020-11-13T16:33:52Z", + "updated_at": "2020-11-13T20:50:17Z", + "pushed_at": "2020-11-13T20:50:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index f5c01f753b..4a19c4257d 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2020-11-10T11:10:22Z", + "updated_at": "2020-11-13T16:38:54Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 331, - "watchers_count": 331, - "forks_count": 72, - "forks": 72, - "watchers": 331, + "stargazers_count": 332, + "watchers_count": 332, + "forks_count": 73, + "forks": 73, + "watchers": 332, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 1484026a5e..7cbf2cfef4 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -109,8 +109,8 @@ "pushed_at": "2019-05-15T02:51:24Z", "stargazers_count": 29, "watchers_count": 29, - "forks_count": 34, - "forks": 34, + "forks_count": 35, + "forks": 35, "watchers": 29, "score": 0 }, @@ -1278,13 +1278,13 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2020-11-13T03:51:33Z", + "updated_at": "2020-11-13T18:29:00Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 771, - "watchers_count": 771, + "stargazers_count": 772, + "watchers_count": 772, "forks_count": 189, "forks": 189, - "watchers": 771, + "watchers": 772, "score": 0 }, { @@ -2313,13 +2313,13 @@ "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", - "updated_at": "2020-11-11T08:01:49Z", + "updated_at": "2020-11-13T19:48:05Z", "pushed_at": "2019-10-16T01:04:12Z", - "stargazers_count": 166, - "watchers_count": 166, + "stargazers_count": 167, + "watchers_count": 167, "forks_count": 62, "forks": 62, - "watchers": 166, + "watchers": 167, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 4d9ff428b3..0855503ed3 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-11-13T10:01:52Z", + "updated_at": "2020-11-13T15:15:33Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2049, - "watchers_count": 2049, - "forks_count": 548, - "forks": 548, - "watchers": 2049, + "stargazers_count": 2050, + "watchers_count": 2050, + "forks_count": 549, + "forks": 549, + "watchers": 2050, "score": 0 }, { diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index f86d579ee0..81d7a1089b 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -17,8 +17,8 @@ "pushed_at": "2020-10-01T20:20:41Z", "stargazers_count": 238, "watchers_count": 238, - "forks_count": 86, - "forks": 86, + "forks_count": 87, + "forks": 87, "watchers": 238, "score": 0 }, diff --git a/2020/CVE-2020-10673.json b/2020/CVE-2020-10673.json index 12ce215613..b781351d58 100644 --- a/2020/CVE-2020-10673.json +++ b/2020/CVE-2020-10673.json @@ -17,8 +17,8 @@ "pushed_at": "2020-03-24T13:22:30Z", "stargazers_count": 14, "watchers_count": 14, - "forks_count": 3, - "forks": 3, + "forks_count": 4, + "forks": 4, "watchers": 14, "score": 0 }, diff --git a/2020/CVE-2020-14750.json b/2020/CVE-2020-14750.json index eca5e3d2b5..a8af8d64e1 100644 --- a/2020/CVE-2020-14750.json +++ b/2020/CVE-2020-14750.json @@ -17,8 +17,8 @@ "pushed_at": "2020-11-10T10:54:36Z", "stargazers_count": 21, "watchers_count": 21, - "forks_count": 5, - "forks": 5, + "forks_count": 6, + "forks": 6, "watchers": 21, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 70e88a223f..ca2985f249 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-11-13T10:01:52Z", + "updated_at": "2020-11-13T15:15:33Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2049, - "watchers_count": 2049, - "forks_count": 548, - "forks": 548, - "watchers": 2049, + "stargazers_count": 2050, + "watchers_count": 2050, + "forks_count": 549, + "forks": 549, + "watchers": 2050, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883", "fork": false, "created_at": "2020-10-09T06:34:36Z", - "updated_at": "2020-11-13T10:08:32Z", + "updated_at": "2020-11-13T15:24:31Z", "pushed_at": "2020-11-10T02:58:25Z", - "stargazers_count": 335, - "watchers_count": 335, - "forks_count": 56, - "forks": 56, - "watchers": 335, + "stargazers_count": 336, + "watchers_count": 336, + "forks_count": 57, + "forks": 57, + "watchers": 336, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "CVE-2020–14882、CVE-2020–14883", "fork": false, "created_at": "2020-10-28T11:43:37Z", - "updated_at": "2020-11-13T14:07:33Z", + "updated_at": "2020-11-13T18:19:31Z", "pushed_at": "2020-11-04T02:26:59Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 177, + "watchers_count": 177, "forks_count": 30, "forks": 30, - "watchers": 176, + "watchers": 177, "score": 0 }, { diff --git a/2020/CVE-2020-15349.json b/2020/CVE-2020-15349.json index 7a69545ce5..738165d519 100644 --- a/2020/CVE-2020-15349.json +++ b/2020/CVE-2020-15349.json @@ -17,8 +17,8 @@ "pushed_at": "2020-11-13T13:41:42Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index d147aecdb9..f3d4973d85 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -40,8 +40,8 @@ "pushed_at": "2020-10-22T15:22:55Z", "stargazers_count": 7, "watchers_count": 7, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 7, "score": 0 }, diff --git a/2020/CVE-2020-25769.json b/2020/CVE-2020-25769.json new file mode 100644 index 0000000000..e407f181d5 --- /dev/null +++ b/2020/CVE-2020-25769.json @@ -0,0 +1,25 @@ +[ + { + "id": 312644639, + "name": "CVE-2020-25769", + "full_name": "lagartojuancho\/CVE-2020-25769", + "owner": { + "login": "lagartojuancho", + "id": 59481050, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/59481050?v=4", + "html_url": "https:\/\/github.com\/lagartojuancho" + }, + "html_url": "https:\/\/github.com\/lagartojuancho\/CVE-2020-25769", + "description": "GOG Galaxy Local Privilege Escalation", + "fork": false, + "created_at": "2020-11-13T17:42:40Z", + "updated_at": "2020-11-13T18:51:41Z", + "pushed_at": "2020-11-13T18:51:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 4317380611..92bc84f2e9 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -82,13 +82,13 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2020-11-12T08:58:55Z", + "updated_at": "2020-11-13T15:25:54Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 187, - "watchers_count": 187, + "stargazers_count": 188, + "watchers_count": 188, "forks_count": 26, "forks": 26, - "watchers": 187, + "watchers": 188, "score": 0 }, { diff --git a/README.md b/README.md index 51b922df61..b51771970c 100644 --- a/README.md +++ b/README.md @@ -2762,6 +2762,9 @@ The Telnet service of Rubetek cameras RV-3406, RV-3409, and RV-3411 cameras (fir - [jet-pentest/CVE-2020-25749](https://github.com/jet-pentest/CVE-2020-25749) +### CVE-2020-25769 +- [lagartojuancho/CVE-2020-25769](https://github.com/lagartojuancho/CVE-2020-25769) + ### CVE-2020-25790 (2020-09-19) @@ -8610,6 +8613,7 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut - [Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader](https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader) - [iansangaji/laravel-rce-cve-2018-15133](https://github.com/iansangaji/laravel-rce-cve-2018-15133) - [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133) +- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133) ### CVE-2018-15365 (2018-09-28) @@ -15805,22 +15809,6 @@ Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before ## 2007 -### CVE-2007-0038 (2007-03-30) - - -Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred. - - -- [Axua/CVE-2007-0038](https://github.com/Axua/CVE-2007-0038) - -### CVE-2007-0843 (2007-02-22) - - -The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information. - - -- [z3APA3A/spydir](https://github.com/z3APA3A/spydir) - ### CVE-2007-1567 (2007-03-21) @@ -15835,12 +15823,7 @@ Stack-based buffer overflow in War FTP Daemon 1.65, and possibly earlier, allows The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management. -- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447) -- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2) -- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap) - [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script) -- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447) -- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447) - [nickvourd/smb-usermap-destroyer](https://github.com/nickvourd/smb-usermap-destroyer) ### CVE-2007-3830 (2007-07-17)