Auto Update 2020/10/26 12:09:00

This commit is contained in:
motikan2010-bot 2020-10-26 12:09:00 +09:00
parent 82330bfdd2
commit e297255ca4
20 changed files with 152 additions and 71 deletions

25
2003/CVE-2003-0222.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 164414012,
"name": "CVE-2003-0222",
"full_name": "phamthanhsang280477\/CVE-2003-0222",
"owner": {
"login": "phamthanhsang280477",
"id": 45278781,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/45278781?v=4",
"html_url": "https:\/\/github.com\/phamthanhsang280477"
},
"html_url": "https:\/\/github.com\/phamthanhsang280477\/CVE-2003-0222",
"description": "CVE-2003-0222",
"fork": false,
"created_at": "2019-01-07T10:09:07Z",
"updated_at": "2019-01-07T10:09:07Z",
"pushed_at": "2019-01-07T10:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -67,5 +67,28 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 247077498,
"name": "CVE-2003-0264-SLmail-5.5",
"full_name": "pwncone\/CVE-2003-0264-SLmail-5.5",
"owner": {
"login": "pwncone",
"id": 57570315,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/57570315?v=4",
"html_url": "https:\/\/github.com\/pwncone"
},
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
"fork": false,
"created_at": "2020-03-13T13:27:56Z",
"updated_at": "2020-03-13T13:31:38Z",
"pushed_at": "2020-03-13T13:31:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -21,5 +21,28 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 307214937,
"name": "CVE-2012-2982",
"full_name": "OstojaOfficial\/CVE-2012-2982",
"owner": {
"login": "OstojaOfficial",
"id": 21225822,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/21225822?v=4",
"html_url": "https:\/\/github.com\/OstojaOfficial"
},
"html_url": "https:\/\/github.com\/OstojaOfficial\/CVE-2012-2982",
"description": "Python exploit for CVE-2012-2982",
"fork": false,
"created_at": "2020-10-25T23:37:32Z",
"updated_at": "2020-10-25T23:54:04Z",
"pushed_at": "2020-10-25T23:53:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
} }
] ]

View file

@ -140,14 +140,14 @@
{ {
"id": 130153239, "id": 130153239,
"name": "CVE-2018-2628", "name": "CVE-2018-2628",
"full_name": "hawk-tiger\/CVE-2018-2628", "full_name": "hawk-520\/CVE-2018-2628",
"owner": { "owner": {
"login": "hawk-tiger", "login": "hawk-520",
"id": 37926610, "id": 37926610,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37926610?v=4", "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37926610?v=4",
"html_url": "https:\/\/github.com\/hawk-tiger" "html_url": "https:\/\/github.com\/hawk-520"
}, },
"html_url": "https:\/\/github.com\/hawk-tiger\/CVE-2018-2628", "html_url": "https:\/\/github.com\/hawk-520\/CVE-2018-2628",
"description": "CVE-2018-2628", "description": "CVE-2018-2628",
"fork": false, "fork": false,
"created_at": "2018-04-19T03:19:15Z", "created_at": "2018-04-19T03:19:15Z",

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-05T21:46:25Z", "pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 325, "stargazers_count": 325,
"watchers_count": 325, "watchers_count": 325,
"forks_count": 71, "forks_count": 72,
"forks": 71, "forks": 72,
"watchers": 325, "watchers": 325,
"score": 0 "score": 0
} }

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-10-01T08:43:36Z", "pushed_at": "2020-10-01T08:43:36Z",
"stargazers_count": 71, "stargazers_count": 71,
"watchers_count": 71, "watchers_count": 71,
"forks_count": 30, "forks_count": 29,
"forks": 30, "forks": 29,
"watchers": 71, "watchers": 71,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "Jackson Rce For CVE-2019-12384 ", "description": "Jackson Rce For CVE-2019-12384 ",
"fork": false, "fork": false,
"created_at": "2019-07-24T07:12:14Z", "created_at": "2019-07-24T07:12:14Z",
"updated_at": "2020-10-25T18:15:46Z", "updated_at": "2020-10-25T22:11:45Z",
"pushed_at": "2019-07-24T07:31:42Z", "pushed_at": "2019-07-24T07:31:42Z",
"stargazers_count": 59, "stargazers_count": 60,
"watchers_count": 59, "watchers_count": 60,
"forks_count": 13, "forks_count": 13,
"forks": 13, "forks": 13,
"watchers": 59, "watchers": 60,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit", "description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false, "fork": false,
"created_at": "2020-03-11T08:30:14Z", "created_at": "2020-03-11T08:30:14Z",
"updated_at": "2020-10-21T22:17:32Z", "updated_at": "2020-10-26T02:33:41Z",
"pushed_at": "2020-03-11T09:59:01Z", "pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 81, "stargazers_count": 82,
"watchers_count": 81, "watchers_count": 82,
"forks_count": 24, "forks_count": 24,
"forks": 24, "forks": 24,
"watchers": 81, "watchers": 82,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-25T14:38:24Z", "updated_at": "2020-10-26T00:38:27Z",
"pushed_at": "2020-10-10T04:01:51Z", "pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1965, "stargazers_count": 1966,
"watchers_count": 1965, "watchers_count": 1966,
"forks_count": 519, "forks_count": 520,
"forks": 519, "forks": 520,
"watchers": 1965, "watchers": 1966,
"score": 0 "score": 0
}, },
{ {

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)", "description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false, "fork": false,
"created_at": "2020-01-15T23:07:41Z", "created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-10-24T19:15:57Z", "updated_at": "2020-10-26T00:57:51Z",
"pushed_at": "2020-01-20T23:33:19Z", "pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 837, "stargazers_count": 838,
"watchers_count": 837, "watchers_count": 838,
"forks_count": 215, "forks_count": 215,
"forks": 215, "forks": 215,
"watchers": 837, "watchers": 838,
"score": 0 "score": 0
}, },
{ {
@ -155,8 +155,8 @@
"pushed_at": "2020-03-22T15:14:31Z", "pushed_at": "2020-03-22T15:14:31Z",
"stargazers_count": 331, "stargazers_count": 331,
"watchers_count": 331, "watchers_count": 331,
"forks_count": 84, "forks_count": 85,
"forks": 84, "forks": 85,
"watchers": 331, "watchers": 331,
"score": 0 "score": 0
}, },

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-24T15:21:06Z", "pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 221, "stargazers_count": 221,
"watchers_count": 221, "watchers_count": 221,
"forks_count": 69, "forks_count": 70,
"forks": 69, "forks": 70,
"watchers": 221, "watchers": 221,
"score": 0 "score": 0
}, },

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-11T07:38:22Z", "pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 433, "stargazers_count": 433,
"watchers_count": 433, "watchers_count": 433,
"forks_count": 102, "forks_count": 103,
"forks": 102, "forks": 103,
"watchers": 433, "watchers": 433,
"score": 0 "score": 0
} }

View file

@ -82,13 +82,13 @@
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service", "description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
"fork": false, "fork": false,
"created_at": "2020-07-15T05:46:31Z", "created_at": "2020-07-15T05:46:31Z",
"updated_at": "2020-10-10T20:42:58Z", "updated_at": "2020-10-26T00:13:06Z",
"pushed_at": "2020-07-18T06:38:11Z", "pushed_at": "2020-07-18T06:38:11Z",
"stargazers_count": 13, "stargazers_count": 14,
"watchers_count": 13, "watchers_count": 14,
"forks_count": 10, "forks_count": 10,
"forks": 10, "forks": 10,
"watchers": 13, "watchers": 14,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472", "description": "Test tool for CVE-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-08T08:58:37Z", "created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-10-25T03:27:56Z", "updated_at": "2020-10-26T02:19:56Z",
"pushed_at": "2020-10-21T12:10:28Z", "pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1162, "stargazers_count": 1163,
"watchers_count": 1162, "watchers_count": 1163,
"forks_count": 262, "forks_count": 262,
"forks": 262, "forks": 262,
"watchers": 1162, "watchers": 1163,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:56:51Z", "created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-10-24T22:42:14Z", "updated_at": "2020-10-26T02:13:32Z",
"pushed_at": "2020-09-25T15:32:01Z", "pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 679, "stargazers_count": 680,
"watchers_count": 679, "watchers_count": 680,
"forks_count": 196, "forks_count": 196,
"forks": 196, "forks": 196,
"watchers": 679, "watchers": 680,
"score": 0 "score": 0
}, },
{ {
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-10-23T06:21:24Z", "updated_at": "2020-10-26T01:21:12Z",
"pushed_at": "2020-10-15T18:31:15Z", "pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 195, "stargazers_count": 197,
"watchers_count": 195, "watchers_count": 197,
"forks_count": 76, "forks_count": 77,
"forks": 76, "forks": 77,
"watchers": 195, "watchers": 197,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Writeup of CVE-2020-15906", "description": "Writeup of CVE-2020-15906",
"fork": false, "fork": false,
"created_at": "2020-07-23T09:20:53Z", "created_at": "2020-07-23T09:20:53Z",
"updated_at": "2020-10-25T17:42:33Z", "updated_at": "2020-10-26T02:01:30Z",
"pushed_at": "2020-10-23T12:33:17Z", "pushed_at": "2020-10-23T12:33:17Z",
"stargazers_count": 22, "stargazers_count": 24,
"watchers_count": 22, "watchers_count": 24,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 22, "watchers": 24,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability", "description": "Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability",
"fork": false, "fork": false,
"created_at": "2020-07-29T19:02:29Z", "created_at": "2020-07-29T19:02:29Z",
"updated_at": "2020-10-25T19:56:43Z", "updated_at": "2020-10-26T01:31:00Z",
"pushed_at": "2020-10-25T19:56:41Z", "pushed_at": "2020-10-25T19:56:41Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 7, "watchers": 8,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)", "description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
"fork": false, "fork": false,
"created_at": "2020-10-15T14:32:25Z", "created_at": "2020-10-15T14:32:25Z",
"updated_at": "2020-10-24T17:18:15Z", "updated_at": "2020-10-26T00:42:23Z",
"pushed_at": "2020-10-20T20:09:58Z", "pushed_at": "2020-10-20T20:09:58Z",
"stargazers_count": 97, "stargazers_count": 98,
"watchers_count": 97, "watchers_count": 98,
"forks_count": 30, "forks_count": 30,
"forks": 30, "forks": 30,
"watchers": 97, "watchers": 98,
"score": 0 "score": 0
} }
] ]

View file

@ -13,8 +13,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-07-06T03:10:34Z", "created_at": "2020-07-06T03:10:34Z",
"updated_at": "2020-10-23T00:45:26Z", "updated_at": "2020-10-25T22:54:56Z",
"pushed_at": "2020-10-23T00:45:24Z", "pushed_at": "2020-10-25T22:54:54Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-25T14:38:24Z", "updated_at": "2020-10-26T03:11:05Z",
"pushed_at": "2020-10-10T04:01:51Z", "pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1965, "stargazers_count": 1967,
"watchers_count": 1965, "watchers_count": 1967,
"forks_count": 519, "forks_count": 520,
"forks": 519, "forks": 520,
"watchers": 1965, "watchers": 1967,
"score": 0 "score": 0
}, },
{ {

View file

@ -6387,7 +6387,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- [jiansiting/weblogic-cve-2018-2628](https://github.com/jiansiting/weblogic-cve-2018-2628) - [jiansiting/weblogic-cve-2018-2628](https://github.com/jiansiting/weblogic-cve-2018-2628)
- [zjxzjx/CVE-2018-2628-detect](https://github.com/zjxzjx/CVE-2018-2628-detect) - [zjxzjx/CVE-2018-2628-detect](https://github.com/zjxzjx/CVE-2018-2628-detect)
- [aedoo/CVE-2018-2628-MultiThreading](https://github.com/aedoo/CVE-2018-2628-MultiThreading) - [aedoo/CVE-2018-2628-MultiThreading](https://github.com/aedoo/CVE-2018-2628-MultiThreading)
- [hawk-tiger/CVE-2018-2628](https://github.com/hawk-tiger/CVE-2018-2628) - [hawk-520/CVE-2018-2628](https://github.com/hawk-520/CVE-2018-2628)
- [9uest/CVE-2018-2628](https://github.com/9uest/CVE-2018-2628) - [9uest/CVE-2018-2628](https://github.com/9uest/CVE-2018-2628)
- [Shadowshusky/CVE-2018-2628all](https://github.com/Shadowshusky/CVE-2018-2628all) - [Shadowshusky/CVE-2018-2628all](https://github.com/Shadowshusky/CVE-2018-2628all)
- [shaoshore/CVE-2018-2628](https://github.com/shaoshore/CVE-2018-2628) - [shaoshore/CVE-2018-2628](https://github.com/shaoshore/CVE-2018-2628)
@ -14700,6 +14700,7 @@ file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to e
</code> </code>
- [cd6629/CVE-2012-2982-Python-PoC](https://github.com/cd6629/CVE-2012-2982-Python-PoC) - [cd6629/CVE-2012-2982-Python-PoC](https://github.com/cd6629/CVE-2012-2982-Python-PoC)
- [OstojaOfficial/CVE-2012-2982](https://github.com/OstojaOfficial/CVE-2012-2982)
### CVE-2012-3137 (2012-09-21) ### CVE-2012-3137 (2012-09-21)
@ -15683,6 +15684,14 @@ Nortel Wireless LAN (WLAN) Access Point (AP) 2220, 2221, and 2225 allow remote a
## 2003 ## 2003
### CVE-2003-0222 (2003-04-30)
<code>
Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a &quot;CREATE DATABASE LINK&quot; query containing a connect string with a long USING parameter.
</code>
- [phamthanhsang280477/CVE-2003-0222](https://github.com/phamthanhsang280477/CVE-2003-0222)
### CVE-2003-0264 (2003-05-08) ### CVE-2003-0264 (2003-05-08)
<code> <code>
@ -15692,6 +15701,7 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
- [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264) - [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264)
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit) - [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264) - [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
### CVE-2003-0282 (2003-05-14) ### CVE-2003-0282 (2003-05-14)