Auto Update 2020/12/25 18:09:40

This commit is contained in:
motikan2010-bot 2020-12-25 18:09:40 +09:00
parent 6cf37a2c71
commit f565df06fb
18 changed files with 162 additions and 63 deletions

25
2010/CVE-2010-3332.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 106621452,
"name": "MS10-070",
"full_name": "bongbongco\/MS10-070",
"owner": {
"login": "bongbongco",
"id": 3170006,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3170006?v=4",
"html_url": "https:\/\/github.com\/bongbongco"
},
"html_url": "https:\/\/github.com\/bongbongco\/MS10-070",
"description": "CVE-2010-3332 Oracle Padding Vulnerability in Microsoft ASP.NET",
"fork": false,
"created_at": "2017-10-11T23:50:33Z",
"updated_at": "2020-07-17T05:12:24Z",
"pushed_at": "2017-10-11T23:50:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2010/CVE-2010-4221.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 108682441,
"name": "cve-2010-4221",
"full_name": "M31MOTH\/cve-2010-4221",
"owner": {
"login": "M31MOTH",
"id": 10201432,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10201432?v=4",
"html_url": "https:\/\/github.com\/M31MOTH"
},
"html_url": "https:\/\/github.com\/M31MOTH\/cve-2010-4221",
"description": "This exploit was written to study some concepts, enjoy!",
"fork": false,
"created_at": "2017-10-28T20:37:26Z",
"updated_at": "2020-03-26T15:45:57Z",
"pushed_at": "2017-10-22T19:46:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 11,
"forks": 11,
"watchers": 1,
"score": 0
}
]

25
2010/CVE-2010-4804.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 16589706,
"name": "android-cve-2010-4804",
"full_name": "thomascannon\/android-cve-2010-4804",
"owner": {
"login": "thomascannon",
"id": 1297160,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1297160?v=4",
"html_url": "https:\/\/github.com\/thomascannon"
},
"html_url": "https:\/\/github.com\/thomascannon\/android-cve-2010-4804",
"description": "Android Data Stealing Vulnerability",
"fork": false,
"created_at": "2014-02-06T18:53:31Z",
"updated_at": "2020-09-26T10:56:29Z",
"pushed_at": "2014-02-06T19:06:01Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -174,13 +174,13 @@
"description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]",
"fork": false,
"created_at": "2018-11-04T01:47:05Z",
"updated_at": "2020-09-22T13:46:40Z",
"updated_at": "2020-12-25T08:10:12Z",
"pushed_at": "2018-11-04T02:25:08Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 10,
"forks": 10,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -1462,13 +1462,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2020-12-24T09:16:09Z",
"updated_at": "2020-12-25T08:52:33Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1051,
"watchers_count": 1051,
"stargazers_count": 1052,
"watchers_count": 1052,
"forks_count": 352,
"forks": 352,
"watchers": 1051,
"watchers": 1052,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-12-24T11:35:11Z",
"updated_at": "2020-12-25T08:41:45Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2194,
"watchers_count": 2194,
"forks_count": 619,
"forks": 619,
"watchers": 2194,
"stargazers_count": 2197,
"watchers_count": 2197,
"forks_count": 620,
"forks": 620,
"watchers": 2197,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-12-16T23:49:48Z",
"updated_at": "2020-12-25T05:04:06Z",
"pushed_at": "2020-08-28T14:09:20Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 34,
"forks": 34,
"watchers": 100,
"watchers": 101,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-12-22T01:28:48Z",
"updated_at": "2020-12-25T04:44:13Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 685,
"watchers_count": 685,
"stargazers_count": 686,
"watchers_count": 686,
"forks_count": 143,
"forks": 143,
"watchers": 685,
"watchers": 686,
"score": 0
},
{

View file

@ -224,8 +224,8 @@
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 141,
"watchers_count": 141,
"forks_count": 60,
"forks": 60,
"forks_count": 61,
"forks": 61,
"watchers": 141,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-12-19T16:37:32Z",
"updated_at": "2020-12-25T03:34:29Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 568,
"watchers_count": 568,
"stargazers_count": 569,
"watchers_count": 569,
"forks_count": 190,
"forks": 190,
"watchers": 568,
"watchers": 569,
"score": 0
},
{
@ -910,13 +910,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-12-24T17:17:19Z",
"updated_at": "2020-12-25T07:17:54Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1046,
"watchers_count": 1046,
"stargazers_count": 1047,
"watchers_count": 1047,
"forks_count": 352,
"forks": 352,
"watchers": 1046,
"watchers": 1047,
"score": 0
},
{
@ -1554,8 +1554,8 @@
"description": null,
"fork": false,
"created_at": "2020-11-10T02:35:34Z",
"updated_at": "2020-11-16T04:45:20Z",
"pushed_at": "2020-11-16T04:22:28Z",
"updated_at": "2020-12-25T09:08:30Z",
"pushed_at": "2020-12-25T09:08:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-11652 & CVE-2020-11651",
"fork": false,
"created_at": "2020-12-25T02:58:35Z",
"updated_at": "2020-12-25T02:58:53Z",
"updated_at": "2020-12-25T05:50:44Z",
"pushed_at": "2020-12-25T02:58:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 21,
"forks": 21,
"forks_count": 22,
"forks": 22,
"watchers": 107,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-12-24T11:35:11Z",
"updated_at": "2020-12-25T08:41:45Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2194,
"watchers_count": 2194,
"forks_count": 619,
"forks": 619,
"watchers": 2194,
"stargazers_count": 2197,
"watchers_count": 2197,
"forks_count": 620,
"forks": 620,
"watchers": 2197,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web漏洞扫描和验证工具可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2020-12-24T14:10:00Z",
"updated_at": "2020-12-25T05:29:24Z",
"pushed_at": "2020-12-15T02:33:45Z",
"stargazers_count": 477,
"watchers_count": 477,
"stargazers_count": 480,
"watchers_count": 480,
"forks_count": 93,
"forks": 93,
"watchers": 477,
"watchers": 480,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-17008 splWOW64 Elevation of Privilege",
"fork": false,
"created_at": "2020-12-24T04:00:29Z",
"updated_at": "2020-12-25T02:23:32Z",
"updated_at": "2020-12-25T08:03:34Z",
"pushed_at": "2020-12-24T06:02:53Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 2,
"forks": 2,
"watchers": 23,
"watchers": 28,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "cve-2020-17057 poc",
"fork": false,
"created_at": "2020-12-23T10:02:47Z",
"updated_at": "2020-12-24T07:46:20Z",
"updated_at": "2020-12-25T08:56:24Z",
"pushed_at": "2020-12-23T10:08:16Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"forks": 3,
"watchers": 17,
"watchers": 20,
"score": 0
}
]

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/dn9uy3n"
},
"html_url": "https:\/\/github.com\/dn9uy3n\/Check-WP-CVE-2020-35489",
"description": null,
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
"fork": false,
"created_at": "2020-12-24T09:10:17Z",
"updated_at": "2020-12-24T09:10:21Z",
"pushed_at": "2020-12-24T09:10:19Z",
"updated_at": "2020-12-25T08:09:25Z",
"pushed_at": "2020-12-25T07:47:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 39,
"score": 0
}

View file

@ -16112,6 +16112,14 @@ UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 th
- [M4LV0/UnrealIRCd-3.2.8.1-RCE](https://github.com/M4LV0/UnrealIRCd-3.2.8.1-RCE)
### CVE-2010-3332 (2010-09-22)
<code>
Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka &quot;ASP.NET Padding Oracle Vulnerability.&quot;
</code>
- [bongbongco/MS10-070](https://github.com/bongbongco/MS10-070)
### CVE-2010-3333 (2010-11-09)
<code>
@ -16168,6 +16176,14 @@ Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Ca
- [nektra/CVE-2010-3971-hotpatch](https://github.com/nektra/CVE-2010-3971-hotpatch)
### CVE-2010-4221 (2010-11-09)
<code>
Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
</code>
- [M31MOTH/cve-2010-4221](https://github.com/M31MOTH/cve-2010-4221)
### CVE-2010-4258 (2010-12-30)
<code>
@ -16192,6 +16208,14 @@ The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Microso
- [quinn-samuel-perry/CVE-2010-4669](https://github.com/quinn-samuel-perry/CVE-2010-4669)
### CVE-2010-4804 (2011-06-09)
<code>
The Android browser in Android before 2.3.4 allows remote attackers to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.
</code>
- [thomascannon/android-cve-2010-4804](https://github.com/thomascannon/android-cve-2010-4804)
### CVE-2010-5327 (2017-01-13)
<code>