Auto Update 2020/12/03 18:09:32

This commit is contained in:
motikan2010-bot 2020-12-03 18:09:32 +09:00
parent 215d386e2c
commit 5e061320d2
31 changed files with 277 additions and 109 deletions

View file

@ -56,11 +56,11 @@
"html_url": "https:\/\/github.com\/MisakaMikato"
},
"html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang",
"description": "Hikvision bypass exploit, using golang",
"description": "Hikvision IP camera access bypass exploit, developed by golang. ",
"fork": false,
"created_at": "2020-11-13T04:15:31Z",
"updated_at": "2020-11-13T04:15:36Z",
"pushed_at": "2020-11-18T06:55:52Z",
"updated_at": "2020-12-03T07:22:56Z",
"pushed_at": "2020-12-03T07:00:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-07-19T05:59:00Z",
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 41,
"forks": 41,
"forks_count": 42,
"forks": 42,
"watchers": 64,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 180,
"forks": 180,
"forks_count": 181,
"forks": 181,
"watchers": 435,
"score": 0
},

View file

@ -316,8 +316,8 @@
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 345,
"watchers_count": 345,
"forks_count": 191,
"forks": 191,
"forks_count": 192,
"forks": 192,
"watchers": 345,
"score": 0
},
@ -1328,8 +1328,8 @@
"pushed_at": "2019-05-22T22:32:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -2474,13 +2474,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-12-02T13:31:06Z",
"updated_at": "2020-12-03T08:14:42Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 37,
"forks": 37,
"watchers": 152,
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 38,
"forks": 38,
"watchers": 154,
"score": 0
},
{
@ -2524,8 +2524,8 @@
"pushed_at": "2020-03-17T06:49:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 50,
"forks": 50,
"forks_count": 51,
"forks": 51,
"watchers": 244,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well. ",
"fork": false,
"created_at": "2019-01-23T14:53:19Z",
"updated_at": "2020-10-04T12:04:07Z",
"updated_at": "2020-12-03T04:24:17Z",
"pushed_at": "2020-08-08T16:58:05Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-11-30T08:18:43Z",
"updated_at": "2020-12-03T06:34:50Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 680,
"watchers_count": 680,
"stargazers_count": 679,
"watchers_count": 679,
"forks_count": 59,
"forks": 59,
"watchers": 680,
"watchers": 679,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2020-11-30T08:27:19Z",
"updated_at": "2020-12-03T03:49:07Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 260,
"watchers_count": 260,
"stargazers_count": 261,
"watchers_count": 261,
"forks_count": 63,
"forks": 63,
"watchers": 260,
"watchers": 261,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-12-03T01:35:58Z",
"updated_at": "2020-12-03T08:37:47Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2113,
"watchers_count": 2113,
"forks_count": 590,
"forks": 590,
"watchers": 2113,
"stargazers_count": 2115,
"watchers_count": 2115,
"forks_count": 591,
"forks": 591,
"watchers": 2115,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-12-02T06:47:31Z",
"updated_at": "2020-12-03T08:25:05Z",
"pushed_at": "2020-08-28T14:09:20Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 33,
"forks": 33,
"watchers": 95,
"watchers": 96,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-12-02T08:29:08Z",
"updated_at": "2020-12-03T05:13:51Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 678,
"watchers_count": 678,
"stargazers_count": 679,
"watchers_count": 679,
"forks_count": 142,
"forks": 142,
"watchers": 678,
"watchers": 679,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2020-11-19T10:47:10Z",
"updated_at": "2020-12-03T08:31:46Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 587,
"watchers_count": 587,
"stargazers_count": 588,
"watchers_count": 588,
"forks_count": 131,
"forks": 131,
"watchers": 587,
"watchers": 588,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-11-27T11:02:10Z",
"updated_at": "2020-12-03T07:20:51Z",
"pushed_at": "2020-03-22T15:14:31Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 333,
"watchers_count": 333,
"forks_count": 86,
"forks": 86,
"watchers": 332,
"watchers": 333,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-12-02T13:53:22Z",
"updated_at": "2020-12-03T06:34:20Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 559,
"watchers_count": 559,
"stargazers_count": 560,
"watchers_count": 560,
"forks_count": 189,
"forks": 189,
"watchers": 559,
"watchers": 560,
"score": 0
},
{
@ -1117,13 +1117,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-12-02T01:49:56Z",
"updated_at": "2020-12-03T09:01:35Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 112,
"forks": 112,
"watchers": 335,
"watchers": 336,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
"fork": false,
"created_at": "2020-11-23T10:24:07Z",
"updated_at": "2020-12-02T06:22:27Z",
"updated_at": "2020-12-03T08:13:54Z",
"pushed_at": "2020-11-23T11:20:28Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 18,
"forks": 18,
"watchers": 67,
"watchers": 68,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
"fork": false,
"created_at": "2020-06-16T23:22:15Z",
"updated_at": "2020-11-04T10:17:33Z",
"updated_at": "2020-12-03T05:43:35Z",
"pushed_at": "2020-06-17T18:10:30Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 25,
"forks": 25,
"watchers": 76,
"watchers": 77,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2020-11-21T08:48:46Z",
"updated_at": "2020-12-02T07:05:01Z",
"updated_at": "2020-12-03T06:10:35Z",
"pushed_at": "2020-11-21T08:54:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-11-30T14:18:23Z",
"updated_at": "2020-12-03T08:46:23Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 88,
"forks": 88,
"watchers": 237,
"watchers": 239,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-12-03T01:35:58Z",
"updated_at": "2020-12-03T08:37:47Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2113,
"watchers_count": 2113,
"forks_count": 590,
"forks": 590,
"watchers": 2113,
"stargazers_count": 2115,
"watchers_count": 2115,
"forks_count": 591,
"forks": 591,
"watchers": 2115,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web漏洞扫描和验证工具可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2020-12-02T14:06:13Z",
"updated_at": "2020-12-03T03:33:28Z",
"pushed_at": "2020-11-10T02:58:25Z",
"stargazers_count": 385,
"watchers_count": 385,
"stargazers_count": 386,
"watchers_count": 386,
"forks_count": 75,
"forks": 75,
"watchers": 385,
"watchers": 386,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Writeup of CVE-2020-15906",
"fork": false,
"created_at": "2020-07-23T09:20:53Z",
"updated_at": "2020-12-02T13:21:52Z",
"updated_at": "2020-12-03T07:18:05Z",
"pushed_at": "2020-10-26T22:01:33Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 2,
"forks": 2,
"watchers": 37,
"watchers": 38,
"score": 0
}
]

25
2020/CVE-2020-23727.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 274891508,
"name": "CVE-2020-23727",
"full_name": "y5s5k5\/CVE-2020-23727",
"owner": {
"login": "y5s5k5",
"id": 53048989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23727",
"description": "antiy",
"fork": false,
"created_at": "2020-06-25T10:47:06Z",
"updated_at": "2020-12-03T03:14:16Z",
"pushed_at": "2020-12-03T03:14:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-23736.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 276198311,
"name": "CVE-2020-23736",
"full_name": "y5s5k5\/CVE-2020-23736",
"owner": {
"login": "y5s5k5",
"id": 53048989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23736",
"description": "dadajiasu",
"fork": false,
"created_at": "2020-06-30T20:10:09Z",
"updated_at": "2020-12-03T05:00:36Z",
"pushed_at": "2020-12-03T05:00:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-23738.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 276468990,
"name": "CVE-2020-23738",
"full_name": "y5s5k5\/CVE-2020-23738",
"owner": {
"login": "y5s5k5",
"id": 53048989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23738",
"description": "Advanced SystemCare 13 PRO",
"fork": false,
"created_at": "2020-07-01T19:52:14Z",
"updated_at": "2020-12-03T04:51:19Z",
"pushed_at": "2020-12-03T04:48:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-23740.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277009833,
"name": "CVE-2020-23740",
"full_name": "y5s5k5\/CVE-2020-23740",
"owner": {
"login": "y5s5k5",
"id": 53048989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23740",
"description": "Drive the elves",
"fork": false,
"created_at": "2020-07-04T00:24:12Z",
"updated_at": "2020-12-03T03:47:09Z",
"pushed_at": "2020-12-03T03:47:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-23741.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277201421,
"name": "CVE-2020-23741",
"full_name": "y5s5k5\/CVE-2020-23741",
"owner": {
"login": "y5s5k5",
"id": 53048989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-23741",
"description": "AnyView",
"fork": false,
"created_at": "2020-07-04T23:41:12Z",
"updated_at": "2020-12-03T04:04:26Z",
"pushed_at": "2020-12-03T04:04:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-27950 exploit",
"fork": false,
"created_at": "2020-12-01T15:49:07Z",
"updated_at": "2020-12-03T03:09:26Z",
"updated_at": "2020-12-03T04:56:42Z",
"pushed_at": "2020-12-01T15:50:45Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

25
2020/CVE-2020-28175.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 308822998,
"name": "CVE-2020-28175",
"full_name": "y5s5k5\/CVE-2020-28175",
"owner": {
"login": "y5s5k5",
"id": 53048989,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53048989?v=4",
"html_url": "https:\/\/github.com\/y5s5k5"
},
"html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-28175",
"description": "speedfan",
"fork": false,
"created_at": "2020-10-31T06:53:41Z",
"updated_at": "2020-12-03T03:57:15Z",
"pushed_at": "2020-12-03T03:57:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2020-12-02T14:22:53Z",
"updated_at": "2020-12-03T07:21:58Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 30,
"forks": 30,
"watchers": 198,
"watchers": 199,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-11-25T12:26:28Z",
"updated_at": "2020-12-03T08:29:47Z",
"pushed_at": "2020-07-15T02:52:33Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"forks_count": 100,
"forks": 100,
"watchers": 322,
"watchers": 323,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 18,
"forks": 18,
"forks_count": 19,
"forks": 19,
"watchers": 92,
"score": 0
},

View file

@ -2687,9 +2687,24 @@ The import.json.php file before 8.9 for Avideo is vulnerable to a File Deletion
### CVE-2020-23726
- [y5s5k5/CVE-2020-23726](https://github.com/y5s5k5/CVE-2020-23726)
### CVE-2020-23727
- [y5s5k5/CVE-2020-23727](https://github.com/y5s5k5/CVE-2020-23727)
### CVE-2020-23735
- [y5s5k5/CVE-2020-23735](https://github.com/y5s5k5/CVE-2020-23735)
### CVE-2020-23736
- [y5s5k5/CVE-2020-23736](https://github.com/y5s5k5/CVE-2020-23736)
### CVE-2020-23738
- [y5s5k5/CVE-2020-23738](https://github.com/y5s5k5/CVE-2020-23738)
### CVE-2020-23740
- [y5s5k5/CVE-2020-23740](https://github.com/y5s5k5/CVE-2020-23740)
### CVE-2020-23741
- [y5s5k5/CVE-2020-23741](https://github.com/y5s5k5/CVE-2020-23741)
### CVE-2020-23968 (2020-11-10)
<code>
@ -3049,6 +3064,9 @@ JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authoriz
- [VoidSec/Tivoli-Madness](https://github.com/VoidSec/Tivoli-Madness)
### CVE-2020-28175
- [y5s5k5/CVE-2020-28175](https://github.com/y5s5k5/CVE-2020-28175)
### CVE-2020-28328 (2020-11-06)
<code>