Auto Update 2020/06/08 12:07:53

This commit is contained in:
motikan2010-bot 2020-06-08 12:07:53 +09:00
parent cd3fdd6ffe
commit de71246947
14 changed files with 132 additions and 66 deletions

25
2005/CVE-2005-2428.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 178449456,
"name": "CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"full_name": "schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"owner": {
"login": "schwankner",
"id": 1496765,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1496765?v=4",
"html_url": "https:\/\/github.com\/schwankner"
},
"html_url": "https:\/\/github.com\/schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit",
"fork": false,
"created_at": "2019-03-29T17:31:14Z",
"updated_at": "2019-08-26T16:40:59Z",
"pushed_at": "2019-03-29T17:31:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2017-0075",
"fork": false,
"created_at": "2019-09-12T02:45:07Z",
"updated_at": "2020-05-16T21:44:06Z",
"updated_at": "2020-06-08T02:24:29Z",
"pushed_at": "2019-09-12T03:02:13Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 12,
"forks": 12,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-07T11:28:26Z",
"updated_at": "2020-06-08T02:55:30Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 884,
"watchers_count": 884,
"stargazers_count": 887,
"watchers_count": 887,
"forks_count": 212,
"forks": 212,
"watchers": 884,
"watchers": 887,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618",
"fork": false,
"created_at": "2019-04-17T12:23:24Z",
"updated_at": "2020-04-28T05:14:48Z",
"updated_at": "2020-06-08T02:15:35Z",
"pushed_at": "2019-04-17T15:05:09Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 51,
"forks": 51,
"watchers": 143,
"watchers": 144,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-5418 - File Content Disclosure on Ruby on Rails",
"fork": false,
"created_at": "2019-03-16T11:58:18Z",
"updated_at": "2020-05-22T22:08:44Z",
"updated_at": "2020-06-08T00:55:34Z",
"pushed_at": "2019-03-25T07:19:58Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 16,
"forks": 16,
"watchers": 155,
"watchers": 156,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)",
"fork": false,
"created_at": "2019-03-23T02:52:31Z",
"updated_at": "2020-05-19T13:35:36Z",
"updated_at": "2020-06-08T00:55:00Z",
"pushed_at": "2020-06-05T20:43:59Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 18,
"forks": 18,
"watchers": 99,
"watchers": 100,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-05-29T01:56:32Z",
"updated_at": "2020-06-07T22:41:58Z",
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 213,
"watchers_count": 213,
"forks_count": 60,
"forks": 60,
"watchers": 212,
"watchers": 213,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 479,
"watchers_count": 479,
"forks_count": 150,
"forks": 150,
"forks_count": 153,
"forks": 153,
"watchers": 479,
"score": 0
},
@ -404,13 +404,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-06-07T16:33:23Z",
"updated_at": "2020-06-08T01:08:32Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 88,
"forks": 88,
"watchers": 230,
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 90,
"forks": 90,
"watchers": 232,
"score": 0
},
{
@ -937,8 +937,8 @@
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 940,
"watchers_count": 940,
"forks_count": 297,
"forks": 297,
"forks_count": 299,
"forks": 299,
"watchers": 940,
"score": 0
},
@ -956,13 +956,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-06-06T02:20:03Z",
"updated_at": "2020-06-08T02:45:20Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 63,
"forks": 63,
"watchers": 169,
"watchers": 170,
"score": 0
},
{
@ -1006,8 +1006,8 @@
"pushed_at": "2020-03-31T11:34:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
@ -1117,13 +1117,13 @@
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
"fork": false,
"created_at": "2020-04-06T15:16:10Z",
"updated_at": "2020-06-05T06:58:26Z",
"updated_at": "2020-06-08T00:50:35Z",
"pushed_at": "2020-04-06T15:22:01Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 12,
"forks": 12,
"watchers": 52,
"watchers": 51,
"score": 0
},
{
@ -1186,13 +1186,13 @@
"description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)",
"fork": false,
"created_at": "2020-04-22T09:09:02Z",
"updated_at": "2020-06-06T15:22:55Z",
"updated_at": "2020-06-07T22:45:29Z",
"pushed_at": "2020-06-05T16:21:55Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 11,
"forks": 11,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-07T11:28:26Z",
"updated_at": "2020-06-08T02:55:30Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 884,
"watchers_count": 884,
"stargazers_count": 887,
"watchers_count": 887,
"forks_count": 212,
"forks": 212,
"watchers": 884,
"watchers": 887,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A proof-of-concept for CVE-2020-12753",
"fork": false,
"created_at": "2020-06-01T21:58:42Z",
"updated_at": "2020-06-06T18:07:29Z",
"updated_at": "2020-06-08T01:11:35Z",
"pushed_at": "2020-06-01T22:55:46Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"watchers": 16,
"score": 0
}
]

25
2020/CVE-2020-12832.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 270467011,
"name": "simplefilelist1.7",
"full_name": "0x05010705\/simplefilelist1.7",
"owner": {
"login": "0x05010705",
"id": 47504230,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/47504230?v=4",
"html_url": "https:\/\/github.com\/0x05010705"
},
"html_url": "https:\/\/github.com\/0x05010705\/simplefilelist1.7",
"description": "Manually Reverted SimpleFileList 1.7 plugin for Wordpress to explore CVE-2020-12832",
"fork": false,
"created_at": "2020-06-07T23:57:08Z",
"updated_at": "2020-06-08T01:26:58Z",
"pushed_at": "2020-06-08T01:26:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,19 +1,19 @@
[
{
"id": 269470325,
"name": "bludit-DOM-xss",
"full_name": "gh0st56\/bludit-DOM-xss",
"name": "bludit-xss-CVE-2020-13889",
"full_name": "gh0st56\/bludit-xss-CVE-2020-13889",
"owner": {
"login": "gh0st56",
"id": 40955428,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40955428?v=4",
"html_url": "https:\/\/github.com\/gh0st56"
},
"html_url": "https:\/\/github.com\/gh0st56\/bludit-DOM-xss",
"html_url": "https:\/\/github.com\/gh0st56\/bludit-xss-CVE-2020-13889",
"description": "CVE-2020-13889. The admin page of bludit have an Self XSS in the showAlert() function that dont sanitize user input leading them to execute an malicious code.",
"fork": false,
"created_at": "2020-06-04T21:35:22Z",
"updated_at": "2020-06-07T02:21:33Z",
"updated_at": "2020-06-08T01:14:56Z",
"pushed_at": "2020-06-07T02:21:31Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -174,13 +174,13 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2020-06-05T05:09:44Z",
"updated_at": "2020-06-08T01:35:08Z",
"pushed_at": "2020-05-17T12:07:01Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 4,
"forks": 4,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -36,7 +36,7 @@
"description": "CVE-2020-8835 Exploit\/PoC",
"fork": false,
"created_at": "2020-06-06T01:53:36Z",
"updated_at": "2020-06-06T13:55:18Z",
"updated_at": "2020-06-08T02:26:47Z",
"pushed_at": "2020-06-06T13:17:37Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -608,6 +608,14 @@ An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, a
### CVE-2020-12800
- [amartinsec/CVE-2020-12800](https://github.com/amartinsec/CVE-2020-12800)
### CVE-2020-12832
<code>
WordPress Plugin Simple File List before 4.2.8 is prone to a vulnerability that lets attackers delete arbitrary files because the application fails to properly verify user-supplied input.
</code>
- [0x05010705/simplefilelist1.7](https://github.com/0x05010705/simplefilelist1.7)
### CVE-2020-12856
<code>
@ -647,7 +655,7 @@ In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed
showAlert() in the administration panel in Bludit 3.12.0 allows XSS.
</code>
- [gh0st56/bludit-DOM-xss](https://github.com/gh0st56/bludit-DOM-xss)
- [gh0st56/bludit-xss-CVE-2020-13889](https://github.com/gh0st56/bludit-xss-CVE-2020-13889)
### CVE-2020-1611
@ -13706,6 +13714,14 @@ Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded app
- [tagatac/libsafe-CVE-2005-1125](https://github.com/tagatac/libsafe-CVE-2005-1125)
### CVE-2005-2428
<code>
Lotus Domino R5 and R6 WebMail, with &quot;Generate HTML for all fields&quot; enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
</code>
- [schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit](https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit)
## 2004
### CVE-2004-0558