Auto Update 2020/07/01 00:09:07

This commit is contained in:
motikan2010-bot 2020-07-01 00:09:07 +09:00
parent 1153b26d5a
commit ca5d66f64f
19 changed files with 106 additions and 68 deletions

25
2006/CVE-2006-3392.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 276101400,
"name": "CVE-2006-3392",
"full_name": "Ziani52\/CVE-2006-3392",
"owner": {
"login": "Ziani52",
"id": 53442065,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53442065?v=4",
"html_url": "https:\/\/github.com\/Ziani52"
},
"html_url": "https:\/\/github.com\/Ziani52\/CVE-2006-3392",
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
"fork": false,
"created_at": "2020-06-30T13:07:31Z",
"updated_at": "2020-06-30T13:07:35Z",
"pushed_at": "2020-06-30T13:07:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Win32k LPE vulnerability used in APT attack",
"fork": false,
"created_at": "2015-05-12T18:04:48Z",
"updated_at": "2020-06-23T14:22:29Z",
"updated_at": "2020-06-30T11:53:43Z",
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"forks_count": 176,
"forks": 176,
"watchers": 265,
"watchers": 266,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 104,
"forks": 104,
"forks_count": 105,
"forks": 105,
"watchers": 267,
"score": 0
},

View file

@ -178,8 +178,8 @@
"pushed_at": "2017-11-28T03:06:32Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 48,
"forks": 48,
"forks_count": 49,
"forks": 49,
"watchers": 35,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Webkit uxss exploit (CVE-2017-7089)",
"fork": false,
"created_at": "2017-10-03T12:13:43Z",
"updated_at": "2019-10-15T16:02:02Z",
"updated_at": "2020-06-30T14:01:26Z",
"pushed_at": "2017-10-03T12:23:43Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 16,
"forks": 16,
"watchers": 57,
"watchers": 58,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A code demonstrating CVE-2018-0886",
"fork": false,
"created_at": "2018-04-02T12:52:07Z",
"updated_at": "2020-06-06T02:32:29Z",
"updated_at": "2020-06-30T10:01:51Z",
"pushed_at": "2018-06-02T10:33:41Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 242,
"watchers_count": 242,
"forks_count": 59,
"forks": 59,
"watchers": 241,
"watchers": 242,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-06-27T15:50:29Z",
"updated_at": "2020-06-30T11:18:54Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1585,
"watchers_count": 1585,
"stargazers_count": 1586,
"watchers_count": 1586,
"forks_count": 228,
"forks": 228,
"watchers": 1585,
"watchers": 1586,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-06-28T18:16:05Z",
"updated_at": "2020-06-30T10:14:47Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 663,
"watchers_count": 663,
"stargazers_count": 664,
"watchers_count": 664,
"forks_count": 57,
"forks": 57,
"watchers": 663,
"watchers": 664,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-30T09:08:34Z",
"updated_at": "2020-06-30T14:22:06Z",
"pushed_at": "2020-06-30T05:28:32Z",
"stargazers_count": 1057,
"watchers_count": 1057,
"forks_count": 261,
"forks": 261,
"watchers": 1057,
"stargazers_count": 1064,
"watchers_count": 1064,
"forks_count": 264,
"forks": 264,
"watchers": 1064,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-3799 - Spring Cloud Config Server: Directory Traversal < 2.1.2, 2.0.4, 1.4.6",
"fork": false,
"created_at": "2019-04-17T21:19:32Z",
"updated_at": "2020-06-07T17:38:08Z",
"updated_at": "2020-06-30T14:09:03Z",
"pushed_at": "2019-04-18T10:08:12Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 4,
"forks": 4,
"watchers": 28,
"watchers": 29,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2020-03-24T13:10:39Z",
"updated_at": "2020-06-30T07:44:05Z",
"updated_at": "2020-06-30T09:40:47Z",
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 17,
"forks": 17,
"watchers": 66,
"watchers": 67,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-27T03:50:07Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 17,
"forks": 17,
"forks_count": 18,
"forks": 18,
"watchers": 41,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-06-30T07:14:56Z",
"updated_at": "2020-06-30T14:52:30Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 71,
"forks": 71,
"watchers": 333,
"watchers": 336,
"score": 0
}
]

View file

@ -1186,13 +1186,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-06-30T07:08:48Z",
"updated_at": "2020-06-30T13:25:27Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 280,
"watchers_count": 280,
"forks_count": 84,
"forks": 84,
"watchers": 278,
"watchers": 280,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-30T09:09:06Z",
"updated_at": "2020-06-30T14:22:06Z",
"pushed_at": "2020-06-30T05:28:32Z",
"stargazers_count": 1058,
"watchers_count": 1058,
"forks_count": 261,
"forks": 261,
"watchers": 1058,
"stargazers_count": 1064,
"watchers_count": 1064,
"forks_count": 264,
"forks": 264,
"watchers": 1064,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-06-27T10:47:22Z",
"updated_at": "2020-06-29T03:42:34Z",
"updated_at": "2020-06-30T10:10:55Z",
"pushed_at": "2020-06-27T10:48:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2021",
"fork": false,
"created_at": "2020-06-29T16:56:10Z",
"updated_at": "2020-06-29T19:44:47Z",
"updated_at": "2020-06-30T11:04:21Z",
"pushed_at": "2020-06-29T17:21:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -82,8 +82,8 @@
"description": "CVE-2020-2551",
"fork": false,
"created_at": "2020-02-24T02:36:46Z",
"updated_at": "2020-06-24T05:26:31Z",
"pushed_at": "2020-03-22T14:38:19Z",
"updated_at": "2020-06-30T12:54:49Z",
"pushed_at": "2020-06-30T12:54:47Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 2,
@ -128,13 +128,13 @@
"description": "Use shell to build weblogic debug environment for CVE-2020-2551",
"fork": false,
"created_at": "2020-04-06T10:47:35Z",
"updated_at": "2020-06-27T02:14:30Z",
"updated_at": "2020-06-30T09:48:58Z",
"pushed_at": "2020-04-06T10:59:36Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 0,
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -802,6 +802,11 @@ In Jiangmin Antivirus 16.0.13.129, the driver file (KVFG.sys) allows local users
- [y5s5k5/CVE-2020-14955](https://github.com/y5s5k5/CVE-2020-14955)
### CVE-2020-14957
<code>
In Windows cleaning assistant 3.2, the driver file (AtpKrnl.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x223CCD.
</code>
- [y5s5k5/CVE-2020-14957-CVE-2020-14956](https://github.com/y5s5k5/CVE-2020-14957-CVE-2020-14956)
### CVE-2020-14965
@ -13916,6 +13921,14 @@ Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 all
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
### CVE-2006-3392
<code>
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using &quot;..%01&quot; sequences, which bypass the removal of &quot;../&quot; sequences before bytes such as &quot;%01&quot; are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
</code>
- [Ziani52/CVE-2006-3392](https://github.com/Ziani52/CVE-2006-3392)
### CVE-2006-3592
<code>