Auto Update 2020/08/09 18:09:39

This commit is contained in:
motikan2010-bot 2020-08-09 18:09:39 +09:00
parent 29495a5228
commit ce5b1e561f
18 changed files with 26 additions and 329 deletions

View file

@ -1,27 +1,4 @@
[
{
"id": 13021222,
"name": "debian-ssh",
"full_name": "g0tmi1k\/debian-ssh",
"owner": {
"login": "g0tmi1k",
"id": 535942,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/535942?v=4",
"html_url": "https:\/\/github.com\/g0tmi1k"
},
"html_url": "https:\/\/github.com\/g0tmi1k\/debian-ssh",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2020-08-04T14:00:34Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 266,
"watchers_count": 266,
"forks_count": 85,
"forks": 85,
"watchers": 266,
"score": 0
},
{
"id": 163681865,
"name": "vulnkeys",
@ -44,28 +21,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173164801,
"name": "debian-ssh",
"full_name": "nu11secur1ty\/debian-ssh",
"owner": {
"login": "nu11secur1ty",
"id": 3677559,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3677559?v=4",
"html_url": "https:\/\/github.com\/nu11secur1ty"
},
"html_url": "https:\/\/github.com\/nu11secur1ty\/debian-ssh",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166) http:\/\/web.archive.org\/web\/20110723091928\/http:\/\/digitaloffense.net\/tools\/debian-openssl\/",
"fork": false,
"created_at": "2019-02-28T18:22:06Z",
"updated_at": "2019-07-09T17:47:06Z",
"pushed_at": "2019-02-28T18:30:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 2121080,
"name": "TWSL2011-007_iOS_code_workaround",
"full_name": "SpiderLabs\/TWSL2011-007_iOS_code_workaround",
"owner": {
"login": "SpiderLabs",
"id": 508521,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/508521?v=4",
"html_url": "https:\/\/github.com\/SpiderLabs"
},
"html_url": "https:\/\/github.com\/SpiderLabs\/TWSL2011-007_iOS_code_workaround",
"description": "Workaround for the vulnerability identified by TWSL2011-007 or CVE-2008-0228 - iOS x509 Certificate Chain Validation Vulnerability",
"fork": false,
"created_at": "2011-07-28T22:20:41Z",
"updated_at": "2020-04-15T06:05:25Z",
"pushed_at": "2011-07-28T22:46:34Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 226703669,
"name": "CVE-2008-1611",
"full_name": "Axua\/CVE-2008-1611",
"owner": {
"login": "Axua",
"id": 28788087,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
"html_url": "https:\/\/github.com\/Axua"
},
"html_url": "https:\/\/github.com\/Axua\/CVE-2008-1611",
"description": "CVE-2008-1611 TFTP 1.41 buffer overflow exploit in the filepath",
"fork": false,
"created_at": "2019-12-08T17:18:31Z",
"updated_at": "2019-12-09T09:54:11Z",
"pushed_at": "2019-12-08T17:18:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 90186634,
"name": "CVE-2008-1613",
"full_name": "SECFORCE\/CVE-2008-1613",
"owner": {
"login": "SECFORCE",
"id": 8157384,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE"
},
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613",
"description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.",
"fork": false,
"created_at": "2017-05-03T19:39:27Z",
"updated_at": "2020-05-18T10:42:05Z",
"pushed_at": "2017-05-03T19:40:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 9,
"forks": 9,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 276735337,
"name": "AudioCaptchaBypass-CVE-2008-2019",
"full_name": "TheRook\/AudioCaptchaBypass-CVE-2008-2019",
"owner": {
"login": "TheRook",
"id": 521783,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/521783?v=4",
"html_url": "https:\/\/github.com\/TheRook"
},
"html_url": "https:\/\/github.com\/TheRook\/AudioCaptchaBypass-CVE-2008-2019",
"description": null,
"fork": false,
"created_at": "2020-07-02T20:04:05Z",
"updated_at": "2020-07-02T21:27:53Z",
"pushed_at": "2020-07-02T21:27:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 58223324,
"name": "sockstress",
"full_name": "marcelki\/sockstress",
"owner": {
"login": "marcelki",
"id": 8465322,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8465322?v=4",
"html_url": "https:\/\/github.com\/marcelki"
},
"html_url": "https:\/\/github.com\/marcelki\/sockstress",
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
"fork": false,
"created_at": "2016-05-06T17:21:32Z",
"updated_at": "2020-06-04T09:57:06Z",
"pushed_at": "2016-07-02T18:52:16Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 12,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100675675,
"name": "VLC-CVE-2008-4654-Exploit",
"full_name": "KernelErr\/VLC-CVE-2008-4654-Exploit",
"owner": {
"login": "KernelErr",
"id": 45716019,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45716019?v=4",
"html_url": "https:\/\/github.com\/KernelErr"
},
"html_url": "https:\/\/github.com\/KernelErr\/VLC-CVE-2008-4654-Exploit",
"description": "An EXP could run on Windows x64 against CVE-2008-4654.",
"fork": false,
"created_at": "2017-08-18T05:22:29Z",
"updated_at": "2019-11-04T11:30:37Z",
"pushed_at": "2017-08-18T05:57:09Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 268011635,
"name": "CVE-2008-4687-exploit",
"full_name": "nmurilo\/CVE-2008-4687-exploit",
"owner": {
"login": "nmurilo",
"id": 22617810,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22617810?v=4",
"html_url": "https:\/\/github.com\/nmurilo"
},
"html_url": "https:\/\/github.com\/nmurilo\/CVE-2008-4687-exploit",
"description": null,
"fork": false,
"created_at": "2020-05-30T04:53:07Z",
"updated_at": "2020-05-30T05:14:42Z",
"pushed_at": "2020-05-30T05:14:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 121771822,
"name": "CVE-2009-2698",
"full_name": "xiaoxiaoleo\/CVE-2009-2698",
"owner": {
"login": "xiaoxiaoleo",
"id": 9813186,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9813186?v=4",
"html_url": "https:\/\/github.com\/xiaoxiaoleo"
},
"html_url": "https:\/\/github.com\/xiaoxiaoleo\/CVE-2009-2698",
"description": "CVE-2009-2698 compiled for CentOS 4.8",
"fork": false,
"created_at": "2018-02-16T16:17:24Z",
"updated_at": "2018-03-12T20:07:49Z",
"pushed_at": "2018-02-16T16:30:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-16T10:43:28Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 422,
"watchers_count": 422,
"forks_count": 175,
"forks": 175,
"forks_count": 176,
"forks": 176,
"watchers": 422,
"score": 0
},

View file

@ -1259,8 +1259,8 @@
"pushed_at": "2019-05-23T17:02:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 23,
"forks": 23,
"forks_count": 22,
"forks": 22,
"watchers": 0,
"score": 0
},
@ -1508,13 +1508,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2020-08-07T03:11:24Z",
"updated_at": "2020-08-09T08:23:14Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1038,
"watchers_count": 1038,
"stargazers_count": 1039,
"watchers_count": 1039,
"forks_count": 349,
"forks": 349,
"watchers": 1038,
"watchers": 1039,
"score": 0
},
{

View file

@ -266,8 +266,8 @@
"description": "Webmin <=1.920 RCE",
"fork": false,
"created_at": "2020-08-08T10:17:03Z",
"updated_at": "2020-08-08T18:04:55Z",
"pushed_at": "2020-08-08T18:04:53Z",
"updated_at": "2020-08-09T08:07:50Z",
"pushed_at": "2020-08-09T08:07:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "The official exploit for rConfig 3.9.2 Pre-auth Remote Code Execution CVE-2019-16662",
"fork": false,
"created_at": "2019-11-10T18:26:25Z",
"updated_at": "2020-05-18T10:43:24Z",
"updated_at": "2020-08-09T05:29:23Z",
"pushed_at": "2019-11-10T18:27:02Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-08T18:49:19Z",
"updated_at": "2020-08-09T05:50:40Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1449,
"watchers_count": 1449,
"stargazers_count": 1450,
"watchers_count": 1450,
"forks_count": 370,
"forks": 370,
"watchers": 1449,
"watchers": 1450,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-04T09:30:49Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-08T18:49:19Z",
"updated_at": "2020-08-09T05:50:40Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1449,
"watchers_count": 1449,
"stargazers_count": 1450,
"watchers_count": 1450,
"forks_count": 370,
"forks": 370,
"watchers": 1449,
"watchers": 1450,
"score": 0
},
{

View file

@ -14193,14 +14193,6 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- [jdvalentini/CVE-2009-2692](https://github.com/jdvalentini/CVE-2009-2692)
### CVE-2009-2698
<code>
The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
</code>
- [xiaoxiaoleo/CVE-2009-2698](https://github.com/xiaoxiaoleo/CVE-2009-2698)
### CVE-2009-3103
<code>
@ -14266,41 +14258,7 @@ The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apach
OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
</code>
- [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh)
- [avarx/vulnkeys](https://github.com/avarx/vulnkeys)
- [nu11secur1ty/debian-ssh](https://github.com/nu11secur1ty/debian-ssh)
### CVE-2008-0228
<code>
Cross-site request forgery (CSRF) vulnerability in apply.cgi in the Linksys WRT54GL Wireless-G Broadband Router with firmware 4.30.9 allows remote attackers to perform actions as administrators.
</code>
- [SpiderLabs/TWSL2011-007_iOS_code_workaround](https://github.com/SpiderLabs/TWSL2011-007_iOS_code_workaround)
### CVE-2008-1611
<code>
Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote attackers to cause a denial of service or execute arbitrary code via a long filename in a read or write request.
</code>
- [Axua/CVE-2008-1611](https://github.com/Axua/CVE-2008-1611)
### CVE-2008-1613
<code>
SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter.
</code>
- [SECFORCE/CVE-2008-1613](https://github.com/SECFORCE/CVE-2008-1613)
### CVE-2008-2019
<code>
Simple Machines Forum (SMF), probably 1.1.4, relies on &quot;randomly generated static&quot; to hinder brute-force attacks on the WAV file (aka audio) CAPTCHA, which allows remote attackers to pass the CAPTCHA test via an automated attack that considers Hamming distances. NOTE: this issue reportedly exists because of an insufficient fix for CVE-2007-3308.
</code>
- [TheRook/AudioCaptchaBypass-CVE-2008-2019](https://github.com/TheRook/AudioCaptchaBypass-CVE-2008-2019)
### CVE-2008-2938
@ -14318,14 +14276,6 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
- [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts)
### CVE-2008-4609
<code>
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
</code>
- [marcelki/sockstress](https://github.com/marcelki/sockstress)
### CVE-2008-4654
<code>
@ -14333,15 +14283,6 @@ Stack-based buffer overflow in the parse_master function in the Ty demux plugin
</code>
- [bongbongco/CVE-2008-4654](https://github.com/bongbongco/CVE-2008-4654)
- [KernelErr/VLC-CVE-2008-4654-Exploit](https://github.com/KernelErr/VLC-CVE-2008-4654-Exploit)
### CVE-2008-4687
<code>
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
</code>
- [nmurilo/CVE-2008-4687-exploit](https://github.com/nmurilo/CVE-2008-4687-exploit)
### CVE-2008-5416