Auto Update 2021/01/10 00:09:55

This commit is contained in:
motikan2010-bot 2021-01-10 00:09:55 +09:00
parent f88fe87fde
commit 0ca5f27da1
19 changed files with 111 additions and 78 deletions

View file

@ -174,8 +174,8 @@
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
"fork": false,
"created_at": "2020-10-31T11:39:11Z",
"updated_at": "2021-01-08T11:10:11Z",
"pushed_at": "2021-01-08T11:10:09Z",
"updated_at": "2021-01-09T11:52:12Z",
"pushed_at": "2021-01-09T11:52:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "frp bypass without account overwrite",
"fork": false,
"created_at": "2017-10-08T12:26:23Z",
"updated_at": "2019-03-17T16:31:49Z",
"updated_at": "2021-01-09T10:39:40Z",
"pushed_at": "2017-10-08T12:26:24Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-01-07T16:23:08Z",
"updated_at": "2021-01-09T14:31:00Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"forks_count": 80,
"forks": 80,
"watchers": 349,
"watchers": 350,
"score": 0
}
]

View file

@ -82,7 +82,7 @@
"description": "CVE-2019-0708-exploit",
"fork": false,
"created_at": "2019-05-15T02:24:21Z",
"updated_at": "2021-01-04T02:05:33Z",
"updated_at": "2021-01-09T14:06:25Z",
"pushed_at": "2019-05-15T02:26:46Z",
"stargazers_count": 116,
"watchers_count": 116,
@ -1439,13 +1439,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-01-06T16:13:11Z",
"updated_at": "2021-01-09T12:21:20Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1054,
"watchers_count": 1054,
"stargazers_count": 1055,
"watchers_count": 1055,
"forks_count": 353,
"forks": 353,
"watchers": 1054,
"watchers": 1055,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2021-01-07T07:18:25Z",
"updated_at": "2021-01-09T12:54:41Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 680,
"watchers_count": 680,
"stargazers_count": 681,
"watchers_count": 681,
"forks_count": 61,
"forks": 61,
"watchers": 680,
"watchers": 681,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2021-01-05T05:16:02Z",
"updated_at": "2021-01-09T15:05:07Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 183,
"watchers_count": 183,
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 59,
"forks": 59,
"watchers": 183,
"watchers": 182,
"score": 0
},
{

View file

@ -726,13 +726,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T23:13:00Z",
"updated_at": "2020-12-10T08:53:49Z",
"updated_at": "2021-01-09T10:04:39Z",
"pushed_at": "2020-03-25T16:48:30Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 11,
"forks": 11,
"watchers": 57,
"watchers": 58,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
"fork": false,
"created_at": "2019-05-21T13:16:02Z",
"updated_at": "2020-07-27T02:19:18Z",
"updated_at": "2021-01-09T14:57:47Z",
"pushed_at": "2019-08-19T17:33:56Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 20,
"forks": 20,
"watchers": 57,
"watchers": 58,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false,
"created_at": "2020-01-21T21:33:17Z",
"updated_at": "2020-12-23T19:30:32Z",
"updated_at": "2021-01-09T11:46:42Z",
"pushed_at": "2020-07-05T17:27:24Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 6,
"forks": 6,
"watchers": 35,
"watchers": 36,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
"fork": false,
"created_at": "2020-02-28T16:04:30Z",
"updated_at": "2020-12-28T03:45:49Z",
"updated_at": "2021-01-09T11:01:49Z",
"pushed_at": "2020-10-07T08:10:46Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 10,
"forks": 10,
"watchers": 31,
"watchers": 32,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "Vulnerability scanner for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-19T16:39:56Z",
"updated_at": "2020-10-06T17:27:40Z",
"updated_at": "2021-01-09T11:45:35Z",
"pushed_at": "2020-03-19T16:41:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
"fork": false,
"created_at": "2020-03-12T02:20:07Z",
"updated_at": "2020-12-21T01:37:26Z",
"updated_at": "2021-01-09T11:44:13Z",
"pushed_at": "2020-03-12T02:49:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 9,
"forks": 9,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -910,13 +910,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-01-09T02:41:33Z",
"updated_at": "2021-01-09T13:41:47Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1059,
"watchers_count": 1059,
"stargazers_count": 1060,
"watchers_count": 1060,
"forks_count": 355,
"forks": 355,
"watchers": 1059,
"watchers": 1060,
"score": 0
},
{
@ -1140,13 +1140,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2021-01-08T13:41:03Z",
"updated_at": "2021-01-09T13:11:00Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 346,
"watchers_count": 346,
"forks_count": 117,
"forks": 117,
"watchers": 345,
"watchers": 346,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Remote Code Execution vulnerability on ArcSight Logger",
"fork": false,
"created_at": "2021-01-07T12:30:23Z",
"updated_at": "2021-01-08T20:32:49Z",
"pushed_at": "2021-01-07T14:06:11Z",
"stargazers_count": 5,
"watchers_count": 5,
"updated_at": "2021-01-09T10:35:20Z",
"pushed_at": "2021-01-09T10:15:48Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-09T07:22:14Z",
"updated_at": "2021-01-09T14:41:21Z",
"pushed_at": "2021-01-08T11:00:13Z",
"stargazers_count": 705,
"watchers_count": 705,
"forks_count": 124,
"forks": 124,
"watchers": 705,
"stargazers_count": 709,
"watchers_count": 709,
"forks_count": 126,
"forks": 126,
"watchers": 709,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-06T23:51:32Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 30,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2021-01-08T12:31:15Z",
"updated_at": "2021-01-09T11:48:35Z",
"pushed_at": "2020-07-15T02:52:33Z",
"stargazers_count": 328,
"watchers_count": 328,
"stargazers_count": 329,
"watchers_count": 329,
"forks_count": 103,
"forks": 103,
"watchers": 328,
"watchers": 329,
"score": 0
},
{

25
2020/CVE-2020-7048.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 328165952,
"name": "CVE-2020-7048",
"full_name": "ElmouradiAmine\/CVE-2020-7048",
"owner": {
"login": "ElmouradiAmine",
"id": 48139304,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48139304?v=4",
"html_url": "https:\/\/github.com\/ElmouradiAmine"
},
"html_url": "https:\/\/github.com\/ElmouradiAmine\/CVE-2020-7048",
"description": null,
"fork": false,
"created_at": "2021-01-09T13:52:09Z",
"updated_at": "2021-01-09T13:54:32Z",
"pushed_at": "2021-01-09T13:54:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-02T00:58:32Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 29,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
"fork": false,
"created_at": "2020-06-05T20:40:28Z",
"updated_at": "2020-12-01T15:12:37Z",
"updated_at": "2021-01-09T11:49:46Z",
"pushed_at": "2020-06-05T21:04:43Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 11,
"forks": 11,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -1147,6 +1147,14 @@ A flawed protocol design in the Ledger Monero app before 1.5.1 for Ledger Nano a
### CVE-2020-6888
- [section-c/CVE-2020-6888](https://github.com/section-c/CVE-2020-6888)
### CVE-2020-7048 (2020-01-16)
<code>
The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI.
</code>
- [ElmouradiAmine/CVE-2020-7048](https://github.com/ElmouradiAmine/CVE-2020-7048)
### CVE-2020-7209 (2020-02-12)
<code>