Auto Update 2020/07/15 00:08:41

This commit is contained in:
motikan2010-bot 2020-07-15 00:08:41 +09:00
parent c69a12f0e5
commit 38402fa78c
25 changed files with 148 additions and 119 deletions

View file

@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-07-14T06:16:24Z",
"updated_at": "2020-07-14T09:19:56Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 281,
"watchers_count": 281,
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 89,
"forks": 89,
"watchers": 281,
"watchers": 282,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-07-14T06:16:24Z",
"updated_at": "2020-07-14T09:19:56Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 281,
"watchers_count": 281,
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 89,
"forks": 89,
"watchers": 281,
"watchers": 282,
"score": 0
}
]

View file

@ -519,13 +519,13 @@
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2020-06-27T15:46:05Z",
"updated_at": "2020-07-14T15:00:14Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 37,
"forks": 37,
"watchers": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 38,
"forks": 38,
"watchers": 102,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "CVE-2017-11882 exploitation",
"fork": false,
"created_at": "2017-11-22T01:11:39Z",
"updated_at": "2020-06-19T07:56:14Z",
"updated_at": "2020-07-14T09:19:15Z",
"pushed_at": "2017-11-28T03:06:32Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 49,
"forks": 49,
"watchers": 35,
"watchers": 36,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Javascript Web-Kit exploit. CVE-2017-7061. By Lokihardt from Google Project Zero",
"fork": false,
"created_at": "2018-01-22T21:14:30Z",
"updated_at": "2019-08-21T04:38:54Z",
"updated_at": "2020-07-14T10:02:28Z",
"pushed_at": "2018-01-22T21:29:22Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -174,13 +174,13 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2020-06-23T06:57:30Z",
"updated_at": "2020-07-14T09:43:21Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 23,
"forks": 23,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC CVE-2018-14714",
"fork": false,
"created_at": "2020-04-25T03:43:44Z",
"updated_at": "2020-05-18T07:50:07Z",
"updated_at": "2020-07-14T09:53:13Z",
"pushed_at": "2020-04-26T09:57:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -117,14 +117,14 @@
{
"id": 188679903,
"name": "mikrotik-beast",
"full_name": "krnull\/mikrotik-beast",
"full_name": "mahmoodsabir\/mikrotik-beast",
"owner": {
"login": "krnull",
"login": "mahmoodsabir",
"id": 47719250,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/47719250?v=4",
"html_url": "https:\/\/github.com\/krnull"
"html_url": "https:\/\/github.com\/mahmoodsabir"
},
"html_url": "https:\/\/github.com\/krnull\/mikrotik-beast",
"html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
"fork": false,
"created_at": "2019-05-26T12:26:55Z",

View file

@ -105,13 +105,13 @@
"description": "可以直接反弹shell",
"fork": false,
"created_at": "2018-07-26T07:16:38Z",
"updated_at": "2020-04-01T13:35:05Z",
"updated_at": "2020-07-14T11:09:54Z",
"pushed_at": "2018-07-26T07:50:15Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 12,
"forks": 12,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 57,
"forks": 57,
"forks_count": 56,
"forks": 56,
"watchers": 197,
"score": 0
}

View file

@ -362,8 +362,8 @@
"pushed_at": "2019-04-08T08:58:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PoC helper scripts and Dockerfile for CVE-2019-1002101",
"fork": false,
"created_at": "2019-04-03T16:36:58Z",
"updated_at": "2020-03-29T07:07:14Z",
"updated_at": "2020-07-14T14:11:03Z",
"pushed_at": "2019-04-03T17:35:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "cve-2019-11931",
"fork": false,
"created_at": "2019-11-16T11:06:52Z",
"updated_at": "2020-07-07T12:15:06Z",
"updated_at": "2020-07-14T09:22:51Z",
"pushed_at": "2019-11-16T11:15:06Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 13,
"forks": 13,
"watchers": 29,
"watchers": 30,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-14T09:08:17Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1247,
"watchers_count": 1247,
"updated_at": "2020-07-14T14:19:43Z",
"pushed_at": "2020-07-14T10:20:14Z",
"stargazers_count": 1248,
"watchers_count": 1248,
"forks_count": 316,
"forks": 316,
"watchers": 1247,
"watchers": 1248,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2020-06-27T15:46:05Z",
"updated_at": "2020-07-14T15:00:14Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 37,
"forks": 37,
"watchers": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 38,
"forks": 38,
"watchers": 102,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418",
"fork": false,
"created_at": "2019-03-19T15:38:01Z",
"updated_at": "2020-04-13T06:13:20Z",
"updated_at": "2020-07-14T14:10:58Z",
"pushed_at": "2019-03-21T17:26:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 15,
"forks": 15,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-07-14T08:41:22Z",
"updated_at": "2020-07-14T10:29:42Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 367,
"watchers_count": 367,
"stargazers_count": 368,
"watchers_count": 368,
"forks_count": 83,
"forks": 83,
"watchers": 367,
"watchers": 368,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-07-03T07:20:03Z",
"updated_at": "2020-07-14T09:25:31Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 91,
"forks": 91,
"watchers": 178,
"watchers": 179,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2020-07-10T00:15:28Z",
"updated_at": "2020-07-14T09:25:48Z",
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 79,
"forks": 79,
"watchers": 177,
"watchers": 178,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "Use shell to build weblogic debug environment for CVE-2020-2551",
"fork": false,
"created_at": "2020-04-06T10:47:35Z",
"updated_at": "2020-06-30T09:48:58Z",
"updated_at": "2020-07-14T11:03:55Z",
"pushed_at": "2020-04-06T10:59:36Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 0,
"forks": 0,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
"fork": false,
"created_at": "2020-05-19T18:59:26Z",
"updated_at": "2020-06-15T10:52:05Z",
"updated_at": "2020-07-14T09:53:12Z",
"pushed_at": "2020-05-25T08:33:24Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 18,
"forks": 18,
"watchers": 80,
"watchers": 81,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-14T09:08:17Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1247,
"watchers_count": 1247,
"updated_at": "2020-07-14T14:19:43Z",
"pushed_at": "2020-07-14T10:20:14Z",
"stargazers_count": 1248,
"watchers_count": 1248,
"forks_count": 316,
"forks": 316,
"watchers": 1247,
"watchers": 1248,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-05T06:19:09Z",
"updated_at": "2020-07-12T00:57:57Z",
"updated_at": "2020-07-14T10:33:25Z",
"pushed_at": "2020-07-07T07:19:16Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 14,
"forks": 14,
"watchers": 34,
"watchers": 35,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-07-14T03:53:28Z",
"pushed_at": "2020-07-07T09:36:24Z",
"stargazers_count": 277,
"watchers_count": 277,
"updated_at": "2020-07-14T14:02:05Z",
"pushed_at": "2020-07-14T14:02:02Z",
"stargazers_count": 278,
"watchers_count": 278,
"forks_count": 81,
"forks": 81,
"watchers": 277,
"watchers": 278,
"score": 0
},
{
@ -979,13 +979,13 @@
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
"fork": false,
"created_at": "2020-07-10T15:33:00Z",
"updated_at": "2020-07-13T09:22:55Z",
"updated_at": "2020-07-14T09:10:41Z",
"pushed_at": "2020-07-12T10:36:20Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"forks": 6,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Citrix ADC Vulns",
"fork": false,
"created_at": "2020-07-10T20:00:17Z",
"updated_at": "2020-07-14T07:58:34Z",
"updated_at": "2020-07-14T10:46:27Z",
"pushed_at": "2020-07-10T21:03:20Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 6,
"forks": 6,
"watchers": 51,
"watchers": 52,
"score": 0
},
{
@ -45,6 +45,29 @@
"watchers": 13,
"score": 0
},
{
"id": 279071796,
"name": "citrix_adc_netscaler_lfi",
"full_name": "Zeop-CyberSec\/citrix_adc_netscaler_lfi",
"owner": {
"login": "Zeop-CyberSec",
"id": 68154603,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/68154603?v=4",
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
},
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/citrix_adc_netscaler_lfi",
"description": "This Metasploit-Framework module can be use to help companies to check the last Citrix vulnerability CVE-2020-8193, CVE-2020-8195 and CVE-2020-8196 (disclosed July 08, 2020).",
"fork": false,
"created_at": "2020-07-12T13:37:53Z",
"updated_at": "2020-07-14T15:00:38Z",
"pushed_at": "2020-07-14T14:56:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 279272932,
"name": "CVE-2020-8193-Citrix-Scanner",

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-8617 (BIND)",
"fork": false,
"created_at": "2020-05-20T12:26:45Z",
"updated_at": "2020-06-29T16:28:03Z",
"updated_at": "2020-07-14T09:53:09Z",
"pushed_at": "2020-05-20T13:03:50Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 8,
"forks": 8,
"watchers": 35,
"watchers": 36,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-8835 Exploit\/PoC",
"fork": false,
"created_at": "2020-06-06T01:53:36Z",
"updated_at": "2020-06-30T20:51:18Z",
"updated_at": "2020-07-14T09:22:03Z",
"pushed_at": "2020-06-30T20:51:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-04T15:51:14Z",
"updated_at": "2020-07-14T02:21:33Z",
"updated_at": "2020-07-14T09:45:02Z",
"pushed_at": "2020-07-04T16:40:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -449,6 +449,11 @@ In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's we
- [HexChristmas/CVE-2020-1947](https://github.com/HexChristmas/CVE-2020-1947)
### CVE-2020-1948
<code>
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
</code>
- [ctlyz123/CVE-2020-1948](https://github.com/ctlyz123/CVE-2020-1948)
- [DSO-Lab/Dubbo-CVE-2020-1948](https://github.com/DSO-Lab/Dubbo-CVE-2020-1948)
- [askDing/cve-2020-1948-poc](https://github.com/askDing/cve-2020-1948-poc)
@ -878,6 +883,7 @@ Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58
- [jas502n/CVE-2020-8193](https://github.com/jas502n/CVE-2020-8193)
- [Airboi/Citrix-ADC-RCE-CVE-2020-8193](https://github.com/Airboi/Citrix-ADC-RCE-CVE-2020-8193)
- [Zeop-CyberSec/citrix_adc_netscaler_lfi](https://github.com/Zeop-CyberSec/citrix_adc_netscaler_lfi)
- [PR3R00T/CVE-2020-8193-Citrix-Scanner](https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner)
### CVE-2020-8417
@ -7022,7 +7028,7 @@ MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read a
- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot)
- [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847)
- [th3f3n1x87/winboxPOC](https://github.com/th3f3n1x87/winboxPOC)
- [krnull/mikrotik-beast](https://github.com/krnull/mikrotik-beast)
- [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast)
- [sinichi449/Python-MikrotikLoginExploit](https://github.com/sinichi449/Python-MikrotikLoginExploit)
- [yukar1z0e/CVE-2018-14847](https://github.com/yukar1z0e/CVE-2018-14847)