Auto Update 2020/10/11 06:08:49

This commit is contained in:
motikan2010-bot 2020-10-11 06:08:49 +09:00
parent 8a4f960bcf
commit 60d6dfabf6
26 changed files with 175 additions and 661 deletions

25
2005/CVE-2005-1125.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 24801967,
"name": "libsafe-CVE-2005-1125",
"full_name": "tagatac\/libsafe-CVE-2005-1125",
"owner": {
"login": "tagatac",
"id": 1304425,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1304425?v=4",
"html_url": "https:\/\/github.com\/tagatac"
},
"html_url": "https:\/\/github.com\/tagatac\/libsafe-CVE-2005-1125",
"description": "Libsafe - Safety Check Bypass Vulnerability (Proof of Concept Exploit & Time Randomization to Thwart It)",
"fork": false,
"created_at": "2014-10-04T21:27:57Z",
"updated_at": "2018-06-09T01:49:18Z",
"pushed_at": "2016-02-06T12:46:49Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -67,5 +67,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 302983632,
"name": "CVE-2018-16763-Exploit-Python3",
"full_name": "n3m1-sys\/CVE-2018-16763-Exploit-Python3",
"owner": {
"login": "n3m1-sys",
"id": 30940342,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30940342?v=4",
"html_url": "https:\/\/github.com\/n3m1-sys"
},
"html_url": "https:\/\/github.com\/n3m1-sys\/CVE-2018-16763-Exploit-Python3",
"description": null,
"fork": false,
"created_at": "2020-10-10T20:23:59Z",
"updated_at": "2020-10-10T20:24:08Z",
"pushed_at": "2020-10-10T20:24:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-07-20T01:24:36Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 48,
"forks": 48,
"forks_count": 49,
"forks": 49,
"watchers": 75,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-10-06T18:03:32Z",
"updated_at": "2020-10-10T18:17:50Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 71,
"forks": 71,
"watchers": 317,
"watchers": 318,
"score": 0
}
]

View file

@ -293,8 +293,8 @@
"pushed_at": "2020-10-01T11:51:46Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 49,
"forks": 49,
"forks_count": 50,
"forks": 50,
"watchers": 76,
"score": 0
},

View file

@ -1,25 +0,0 @@
[
{
"id": 167347037,
"name": "CiscoRV320Dump",
"full_name": "0x27\/CiscoRV320Dump",
"owner": {
"login": "0x27",
"id": 9094330,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9094330?v=4",
"html_url": "https:\/\/github.com\/0x27"
},
"html_url": "https:\/\/github.com\/0x27\/CiscoRV320Dump",
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2020-08-25T05:16:28Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 63,
"forks": 63,
"watchers": 196,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 168361115,
"name": "CVE-2019-1653",
"full_name": "dubfr33\/CVE-2019-1653",
"owner": {
"login": "dubfr33",
"id": 20056018,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20056018?v=4",
"html_url": "https:\/\/github.com\/dubfr33"
},
"html_url": "https:\/\/github.com\/dubfr33\/CVE-2019-1653",
"description": "NSE script to scan for Cisco routers vulnerable to CVE-2019-1653",
"fork": false,
"created_at": "2019-01-30T14:58:48Z",
"updated_at": "2020-04-21T04:04:11Z",
"pushed_at": "2019-01-30T15:01:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 178810790,
"name": "CiscoSpill",

View file

@ -36,13 +36,13 @@
"description": "TeamViewer Store Credentials Decryption",
"fork": false,
"created_at": "2020-07-13T15:30:02Z",
"updated_at": "2020-07-30T08:07:13Z",
"updated_at": "2020-10-10T20:55:20Z",
"pushed_at": "2020-07-13T15:30:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 167275161,
"name": "check_CVE-2019-3462",
"full_name": "tonejito\/check_CVE-2019-3462",
"owner": {
"login": "tonejito",
"id": 618588,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/618588?v=4",
"html_url": "https:\/\/github.com\/tonejito"
},
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
"fork": false,
"created_at": "2019-01-24T00:30:15Z",
"updated_at": "2019-01-26T01:21:38Z",
"pushed_at": "2019-01-26T01:21:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 170573944,
"name": "update-apt-package",
"full_name": "atilacastro\/update-apt-package",
"owner": {
"login": "atilacastro",
"id": 5832809,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5832809?v=4",
"html_url": "https:\/\/github.com\/atilacastro"
},
"html_url": "https:\/\/github.com\/atilacastro\/update-apt-package",
"description": "Playbook update APT package because CVE-2019-3462",
"fork": false,
"created_at": "2019-02-13T20:22:33Z",
"updated_at": "2019-02-14T18:31:31Z",
"pushed_at": "2019-02-14T18:31:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -22,167 +22,6 @@
"watchers": 178,
"score": 0
},
{
"id": 170445833,
"name": "CVE-2019-5736-PoC",
"full_name": "Frichetten\/CVE-2019-5736-PoC",
"owner": {
"login": "Frichetten",
"id": 10386884,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10386884?v=4",
"html_url": "https:\/\/github.com\/Frichetten"
},
"html_url": "https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC",
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2020-09-29T01:29:47Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 399,
"watchers_count": 399,
"forks_count": 104,
"forks": 104,
"watchers": 399,
"score": 0
},
{
"id": 170454928,
"name": "cve-2019-5736",
"full_name": "jakubkrawczyk\/cve-2019-5736",
"owner": {
"login": "jakubkrawczyk",
"id": 22723539,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22723539?v=4",
"html_url": "https:\/\/github.com\/jakubkrawczyk"
},
"html_url": "https:\/\/github.com\/jakubkrawczyk\/cve-2019-5736",
"description": "My attempt to create PoC of CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-13T06:41:01Z",
"updated_at": "2020-08-06T13:05:54Z",
"pushed_at": "2019-02-13T06:46:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 170613828,
"name": "CVE-2019-5736",
"full_name": "jas502n\/CVE-2019-5736",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-5736",
"description": "runc容器逃逸漏洞预警",
"fork": false,
"created_at": "2019-02-14T02:30:12Z",
"updated_at": "2020-02-03T01:45:33Z",
"pushed_at": "2019-02-14T02:40:55Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"score": 0
},
{
"id": 170656576,
"name": "CVE-2019-5736",
"full_name": "likescam\/CVE-2019-5736",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-02-14T08:37:25Z",
"updated_at": "2019-02-14T08:37:36Z",
"pushed_at": "2019-02-14T08:37:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170656601,
"name": "cve-2019-5736-poc",
"full_name": "likescam\/cve-2019-5736-poc",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/cve-2019-5736-poc",
"description": null,
"fork": false,
"created_at": "2019-02-14T08:37:39Z",
"updated_at": "2019-02-14T08:37:49Z",
"pushed_at": "2019-02-14T08:37:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170836971,
"name": "cve-2019-5736-poc",
"full_name": "agppp\/cve-2019-5736-poc",
"owner": {
"login": "agppp",
"id": 10527860,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10527860?v=4",
"html_url": "https:\/\/github.com\/agppp"
},
"html_url": "https:\/\/github.com\/agppp\/cve-2019-5736-poc",
"description": "getshell test",
"fork": false,
"created_at": "2019-02-15T09:22:27Z",
"updated_at": "2019-02-15T09:49:47Z",
"pushed_at": "2019-02-15T09:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 171499608,
"name": "poc-cve-2019-5736",
"full_name": "b3d3c\/poc-cve-2019-5736",
"owner": {
"login": "b3d3c",
"id": 46558799,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46558799?v=4",
"html_url": "https:\/\/github.com\/b3d3c"
},
"html_url": "https:\/\/github.com\/b3d3c\/poc-cve-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-02-19T15:34:18Z",
"updated_at": "2019-06-04T10:53:26Z",
"pushed_at": "2019-02-19T15:37:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 171668415,
"name": "RunC-CVE-2019-5736",

View file

@ -1,25 +0,0 @@
[
{
"id": 165075365,
"name": "OpenSource-ERP-SQL-Injection",
"full_name": "EmreOvunc\/OpenSource-ERP-SQL-Injection",
"owner": {
"login": "EmreOvunc",
"id": 15659223,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
"html_url": "https:\/\/github.com\/EmreOvunc"
},
"html_url": "https:\/\/github.com\/EmreOvunc\/OpenSource-ERP-SQL-Injection",
"description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.",
"fork": false,
"created_at": "2019-01-10T14:36:55Z",
"updated_at": "2020-05-16T12:47:44Z",
"pushed_at": "2019-01-11T07:45:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 168440280,
"name": "OsirisJailbreak12",
"full_name": "fatgrass\/OsirisJailbreak12",
"owner": {
"login": "fatgrass",
"id": 19977419,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19977419?v=4",
"html_url": "https:\/\/github.com\/fatgrass"
},
"html_url": "https:\/\/github.com\/fatgrass\/OsirisJailbreak12",
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
"fork": false,
"created_at": "2019-01-31T01:03:43Z",
"updated_at": "2020-07-28T09:05:58Z",
"pushed_at": "2019-01-31T00:53:03Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 73,
"forks": 73,
"watchers": 10,
"score": 0
},
{
"id": 194542840,
"name": "CVE-2019-6225-macOS",

View file

@ -1,25 +0,0 @@
[
{
"id": 166368513,
"name": "CVE-2019-6263-Joomla-POC",
"full_name": "praveensutar\/CVE-2019-6263-Joomla-POC",
"owner": {
"login": "praveensutar",
"id": 12555214,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12555214?v=4",
"html_url": "https:\/\/github.com\/praveensutar"
},
"html_url": "https:\/\/github.com\/praveensutar\/CVE-2019-6263-Joomla-POC",
"description": null,
"fork": false,
"created_at": "2019-01-18T08:10:11Z",
"updated_at": "2019-09-12T15:02:55Z",
"pushed_at": "2019-01-19T04:29:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 164948400,
"name": "ESFileExplorerOpenPortVuln",
"full_name": "fs0c131y\/ESFileExplorerOpenPortVuln",
"owner": {
"login": "fs0c131y",
"id": 36547191,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36547191?v=4",
"html_url": "https:\/\/github.com\/fs0c131y"
},
"html_url": "https:\/\/github.com\/fs0c131y\/ESFileExplorerOpenPortVuln",
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2020-09-18T12:15:52Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 586,
"watchers_count": 586,
"forks_count": 131,
"forks": 131,
"watchers": 586,
"score": 0
},
{
"id": 263921419,
"name": "ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447",

View file

@ -1,27 +1,4 @@
[
{
"id": 171244957,
"name": "cve-2019-6453-poc",
"full_name": "proofofcalc\/cve-2019-6453-poc",
"owner": {
"login": "proofofcalc",
"id": 47607270,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/47607270?v=4",
"html_url": "https:\/\/github.com\/proofofcalc"
},
"html_url": "https:\/\/github.com\/proofofcalc\/cve-2019-6453-poc",
"description": "Proof of calc for CVE-2019-6453",
"fork": false,
"created_at": "2019-02-18T08:35:03Z",
"updated_at": "2020-08-25T17:43:40Z",
"pushed_at": "2019-02-18T13:10:38Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 14,
"forks": 14,
"watchers": 50,
"score": 0
},
{
"id": 197653851,
"name": "mIRC-CVE-2019-6453",

View file

@ -1,25 +0,0 @@
[
{
"id": 166241615,
"name": "TP-Link-WDR-Router-Command-injection_POC",
"full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"owner": {
"login": "afang5472",
"id": 18503100,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18503100?v=4",
"html_url": "https:\/\/github.com\/afang5472"
},
"html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.",
"fork": false,
"created_at": "2019-01-17T14:44:12Z",
"updated_at": "2020-09-29T13:54:49Z",
"pushed_at": "2019-01-19T10:49:21Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 12,
"forks": 12,
"watchers": 26,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 168365175,
"name": "CVE-2019-7216",
"full_name": "Ekultek\/CVE-2019-7216",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/CVE-2019-7216",
"description": "Filechucker filter bypass Proof Of Concept",
"fork": false,
"created_at": "2019-01-30T15:23:40Z",
"updated_at": "2020-03-30T04:22:37Z",
"pushed_at": "2019-02-01T16:56:53Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 110,
"watchers": 525,
"score": 0
},
{
"id": 170741210,
"name": "CVE-2019-7304_DirtySock",
"full_name": "SecuritySi\/CVE-2019-7304_DirtySock",
"owner": {
"login": "SecuritySi",
"id": 7517443,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7517443?v=4",
"html_url": "https:\/\/github.com\/SecuritySi"
},
"html_url": "https:\/\/github.com\/SecuritySi\/CVE-2019-7304_DirtySock",
"description": "Payload Generator",
"fork": false,
"created_at": "2019-02-14T18:48:56Z",
"updated_at": "2019-03-05T06:03:09Z",
"pushed_at": "2019-02-14T18:49:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 171097356,
"name": "CVE-2019-8389",
"full_name": "shawarkhanethicalhacker\/CVE-2019-8389",
"owner": {
"login": "shawarkhanethicalhacker",
"id": 41706151,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/41706151?v=4",
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker"
},
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker\/CVE-2019-8389",
"description": " [CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application ",
"fork": false,
"created_at": "2019-02-17T08:10:50Z",
"updated_at": "2020-08-13T10:37:29Z",
"pushed_at": "2019-02-17T08:40:06Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false,
"created_at": "2020-08-12T10:05:36Z",
"updated_at": "2020-10-09T04:59:16Z",
"updated_at": "2020-10-10T17:22:14Z",
"pushed_at": "2020-08-13T07:16:12Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 41,
"forks": 41,
"watchers": 127,
"watchers": 128,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-14T19:28:46Z",
"updated_at": "2020-07-20T06:15:59Z",
"updated_at": "2020-10-10T20:44:29Z",
"pushed_at": "2020-07-20T06:15:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"watchers": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 6,
"forks": 6,
"watchers": 6,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
"fork": false,
"created_at": "2020-07-14T21:55:57Z",
"updated_at": "2020-09-06T21:38:03Z",
"updated_at": "2020-10-10T20:44:46Z",
"pushed_at": "2020-07-19T02:29:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},
{
@ -82,12 +82,12 @@
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
"fork": false,
"created_at": "2020-07-15T05:46:31Z",
"updated_at": "2020-09-18T18:19:48Z",
"updated_at": "2020-10-10T20:42:58Z",
"pushed_at": "2020-07-18T06:38:11Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 13,
"score": 0
},
@ -105,13 +105,13 @@
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
"fork": false,
"created_at": "2020-07-15T05:55:20Z",
"updated_at": "2020-09-12T13:07:15Z",
"updated_at": "2020-10-10T20:41:45Z",
"pushed_at": "2020-07-20T02:20:43Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"watchers": 8,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Windows registry mitigation response to CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T19:43:39Z",
"updated_at": "2020-07-15T19:59:04Z",
"updated_at": "2020-10-10T20:38:31Z",
"pushed_at": "2020-07-15T19:59:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)",
"fork": false,
"created_at": "2020-07-16T16:46:48Z",
"updated_at": "2020-09-07T10:10:18Z",
"updated_at": "2020-10-10T20:43:22Z",
"pushed_at": "2020-07-16T18:32:04Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 3,
"forks": 3,
"watchers": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 4,
"forks": 4,
"watchers": 18,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "CVE-2020-1350 Proof-of-Concept",
"fork": false,
"created_at": "2020-07-17T05:41:19Z",
"updated_at": "2020-07-28T10:46:59Z",
"updated_at": "2020-10-10T20:41:28Z",
"pushed_at": "2020-07-27T16:20:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "Scanner and Mitigator for CVE 2020-1350",
"fork": false,
"created_at": "2020-07-18T13:49:54Z",
"updated_at": "2020-07-19T07:30:18Z",
"updated_at": "2020-10-10T20:39:36Z",
"pushed_at": "2020-07-18T14:05:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "DNS Vulnerability - CVE-2020-1350",
"fork": false,
"created_at": "2020-07-19T17:32:47Z",
"updated_at": "2020-07-20T14:26:02Z",
"updated_at": "2020-10-10T20:39:05Z",
"pushed_at": "2020-07-20T14:25:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
@ -266,13 +266,13 @@
"description": "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código.",
"fork": false,
"created_at": "2020-07-20T09:12:07Z",
"updated_at": "2020-07-20T09:12:36Z",
"updated_at": "2020-10-10T20:40:44Z",
"pushed_at": "2020-07-20T09:12:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-22T12:11:33Z",
"updated_at": "2020-07-22T12:15:03Z",
"updated_at": "2020-10-10T20:40:26Z",
"pushed_at": "2020-07-22T12:15:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
@ -312,13 +312,13 @@
"description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.",
"fork": false,
"created_at": "2020-07-26T02:12:36Z",
"updated_at": "2020-07-28T16:25:12Z",
"updated_at": "2020-10-10T20:40:04Z",
"pushed_at": "2020-07-26T02:13:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-23T22:52:05Z",
"updated_at": "2020-09-21T07:33:10Z",
"updated_at": "2020-10-10T20:29:04Z",
"pushed_at": "2020-08-06T22:24:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -36,7 +36,7 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-10-10T13:57:52Z",
"updated_at": "2020-10-10T20:28:43Z",
"pushed_at": "2020-09-23T07:04:58Z",
"stargazers_count": 1123,
"watchers_count": 1123,
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-10-10T03:10:36Z",
"updated_at": "2020-10-10T20:28:37Z",
"pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 653,
"watchers_count": 653,
"stargazers_count": 654,
"watchers_count": 654,
"forks_count": 188,
"forks": 188,
"watchers": 653,
"watchers": 654,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2020-10-09T05:00:30Z",
"updated_at": "2020-10-10T20:28:47Z",
"pushed_at": "2020-10-06T06:58:55Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 29,
"forks": 29,
"watchers": 113,
"watchers": 114,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-24T16:26:52Z",
"updated_at": "2020-07-24T17:11:07Z",
"updated_at": "2020-10-10T20:49:10Z",
"pushed_at": "2020-07-24T17:11:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
@ -231,20 +231,20 @@
},
{
"id": 299192944,
"name": "CVE-2020-3452-Scanner",
"full_name": "3ndG4me\/CVE-2020-3452-Scanner",
"name": "CVE-2020-3452-Exploit",
"full_name": "3ndG4me\/CVE-2020-3452-Exploit",
"owner": {
"login": "3ndG4me",
"id": 14339392,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/14339392?v=4",
"html_url": "https:\/\/github.com\/3ndG4me"
},
"html_url": "https:\/\/github.com\/3ndG4me\/CVE-2020-3452-Scanner",
"html_url": "https:\/\/github.com\/3ndG4me\/CVE-2020-3452-Exploit",
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
"fork": false,
"created_at": "2020-09-28T05:00:37Z",
"updated_at": "2020-10-06T13:58:16Z",
"pushed_at": "2020-09-28T05:08:44Z",
"updated_at": "2020-10-10T17:19:53Z",
"pushed_at": "2020-10-10T17:19:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-10-07T10:45:43Z",
"updated_at": "2020-10-10T16:25:48Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 47,
"forks": 47,
"watchers": 204,
"watchers": 205,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 41,
"forks": 41,
"forks_count": 42,
"forks": 42,
"watchers": 125,
"score": 0
},

View file

@ -735,7 +735,7 @@ A vulnerability in the web services interface of Cisco Adaptive Security Applian
- [paran0id34/CVE-2020-3452](https://github.com/paran0id34/CVE-2020-3452)
- [murataydemir/CVE-2020-3452](https://github.com/murataydemir/CVE-2020-3452)
- [ludy-dev/Cisco-ASA-LFI](https://github.com/ludy-dev/Cisco-ASA-LFI)
- [3ndG4me/CVE-2020-3452-Scanner](https://github.com/3ndG4me/CVE-2020-3452-Scanner)
- [3ndG4me/CVE-2020-3452-Exploit](https://github.com/3ndG4me/CVE-2020-3452-Exploit)
### CVE-2020-3766
@ -2977,21 +2977,12 @@ Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier
- [securifera/CVE-2019-1579](https://github.com/securifera/CVE-2019-1579)
### CVE-2019-1652
<code>
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
</code>
- [0x27/CiscoRV320Dump](https://github.com/0x27/CiscoRV320Dump)
### CVE-2019-1653
<code>
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
</code>
- [dubfr33/CVE-2019-1653](https://github.com/dubfr33/CVE-2019-1653)
- [shaheemirza/CiscoSpill](https://github.com/shaheemirza/CiscoSpill)
### CVE-2019-1759
@ -3191,15 +3182,6 @@ Confluence Server and Data Center had a path traversal vulnerability in the down
- [superevr/cve-2019-3398](https://github.com/superevr/cve-2019-3398)
### CVE-2019-3462
<code>
Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
</code>
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
### CVE-2019-3663
<code>
@ -3344,13 +3326,6 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow
</code>
- [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc)
- [Frichetten/CVE-2019-5736-PoC](https://github.com/Frichetten/CVE-2019-5736-PoC)
- [jakubkrawczyk/cve-2019-5736](https://github.com/jakubkrawczyk/cve-2019-5736)
- [jas502n/CVE-2019-5736](https://github.com/jas502n/CVE-2019-5736)
- [likescam/CVE-2019-5736](https://github.com/likescam/CVE-2019-5736)
- [likescam/cve-2019-5736-poc](https://github.com/likescam/cve-2019-5736-poc)
- [agppp/cve-2019-5736-poc](https://github.com/agppp/cve-2019-5736-poc)
- [b3d3c/poc-cve-2019-5736](https://github.com/b3d3c/poc-cve-2019-5736)
- [twistlock/RunC-CVE-2019-5736](https://github.com/twistlock/RunC-CVE-2019-5736)
- [yyqs2008/CVE-2019-5736-PoC-2](https://github.com/yyqs2008/CVE-2019-5736-PoC-2)
- [zyriuse75/CVE-2019-5736-PoC](https://github.com/zyriuse75/CVE-2019-5736-PoC)
@ -3398,14 +3373,6 @@ Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed
- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825)
### CVE-2019-5893
<code>
Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.
</code>
- [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection)
### CVE-2019-6111
<code>
@ -3438,7 +3405,6 @@ An out-of-bounds read issue existed that led to the disclosure of kernel memory.
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges.
</code>
- [fatgrass/OsirisJailbreak12](https://github.com/fatgrass/OsirisJailbreak12)
- [TrungNguyen1909/CVE-2019-6225-macOS](https://github.com/TrungNguyen1909/CVE-2019-6225-macOS)
- [raystyle/jailbreak-iOS12](https://github.com/raystyle/jailbreak-iOS12)
@ -3458,14 +3424,6 @@ The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and
- [amboar/cve-2019-6260](https://github.com/amboar/cve-2019-6260)
### CVE-2019-6263
<code>
An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS.
</code>
- [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC)
### CVE-2019-6329
<code>
@ -3511,7 +3469,6 @@ Zemana AntiMalware before 3.0.658 Beta mishandles update logic.
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
</code>
- [fs0c131y/ESFileExplorerOpenPortVuln](https://github.com/fs0c131y/ESFileExplorerOpenPortVuln)
- [SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447](https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447)
### CVE-2019-6453
@ -3520,7 +3477,6 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
</code>
- [proofofcalc/cve-2019-6453-poc](https://github.com/proofofcalc/cve-2019-6453-poc)
- [andripwn/mIRC-CVE-2019-6453](https://github.com/andripwn/mIRC-CVE-2019-6453)
### CVE-2019-6467
@ -3531,14 +3487,6 @@ A programming error in the nxdomain-redirect feature can cause an assertion fail
- [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467)
### CVE-2019-6487
<code>
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
</code>
- [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC)
### CVE-2019-6690
<code>
@ -3565,14 +3513,6 @@ This improper access control vulnerability allows remote attackers to gain unaut
- [cycraft-corp/cve-2019-7192-check](https://github.com/cycraft-corp/cve-2019-7192-check)
- [th3gundy/CVE-2019-7192_QNAP_Exploit](https://github.com/th3gundy/CVE-2019-7192_QNAP_Exploit)
### CVE-2019-7216
<code>
An issue was discovered in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php.
</code>
- [Ekultek/CVE-2019-7216](https://github.com/Ekultek/CVE-2019-7216)
### CVE-2019-7219
<code>
@ -3599,7 +3539,6 @@ Canonical snapd before version 2.37.1 incorrectly performed socket owner validat
</code>
- [initstring/dirty_sock](https://github.com/initstring/dirty_sock)
- [SecuritySi/CVE-2019-7304_DirtySock](https://github.com/SecuritySi/CVE-2019-7304_DirtySock)
### CVE-2019-7482
@ -3654,14 +3593,6 @@ ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 a
- [securifera/CVE-2019-7839](https://github.com/securifera/CVE-2019-7839)
### CVE-2019-8389
<code>
A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicloud 1.6. By default, the application runs a transfer service on port 8080, accessible by everyone on the same Wi-Fi network. An attacker can send the POST parameters downfiles and cur-folder (with a crafted ../ payload) to the download.script endpoint. This will create a MusicPlayerArchive.zip archive that is publicly accessible and includes the content of any requested file (such as the /etc/passwd file).
</code>
- [shawarkhanethicalhacker/CVE-2019-8389](https://github.com/shawarkhanethicalhacker/CVE-2019-8389)
### CVE-2019-8446
<code>
@ -8452,6 +8383,7 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
- [dinhbaouit/CVE-2018-16763](https://github.com/dinhbaouit/CVE-2018-16763)
- [SalimAlk/CVE-2018-16763-](https://github.com/SalimAlk/CVE-2018-16763-)
- [ecebotarosh/CVE-2018-16763-exploit](https://github.com/ecebotarosh/CVE-2018-16763-exploit)
- [n3m1-sys/CVE-2018-16763-Exploit-Python3](https://github.com/n3m1-sys/CVE-2018-16763-Exploit-Python3)
### CVE-2018-16854
@ -15405,6 +15337,14 @@ viewtopic.php in phpBB 2.0.12 and earlier allows remote attackers to obtain sens
- [Parcer0/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure](https://github.com/Parcer0/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure)
### CVE-2005-1125
<code>
Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded applications, allows attackers to bypass libsafe protection and exploit other vulnerabilities before the _libsafe_die function call is completed.
</code>
- [tagatac/libsafe-CVE-2005-1125](https://github.com/tagatac/libsafe-CVE-2005-1125)
### CVE-2005-2428
<code>