Auto Update 2020/12/18 00:09:54

This commit is contained in:
motikan2010-bot 2020-12-18 00:09:54 +09:00
parent bf754fbafd
commit a88b5084a4
31 changed files with 196 additions and 135 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2013-6282 exploit",
"fork": false,
"created_at": "2013-11-18T03:08:41Z",
"updated_at": "2019-10-20T07:13:13Z",
"updated_at": "2020-12-17T10:07:21Z",
"pushed_at": "2013-11-18T08:56:33Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 12,
"forks": 12,
"watchers": 25,
"watchers": 24,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2013-6282 exploit",
"fork": false,
"created_at": "2013-11-28T08:34:35Z",
"updated_at": "2017-08-06T23:25:14Z",
"updated_at": "2020-12-17T10:07:19Z",
"pushed_at": "2013-11-28T08:38:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"watchers": 6,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-3153 aka towelroot",
"fork": false,
"created_at": "2014-07-24T13:28:00Z",
"updated_at": "2020-11-13T15:45:10Z",
"updated_at": "2020-12-17T10:06:58Z",
"pushed_at": "2017-04-25T07:24:08Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 79,
"forks": 79,
"watchers": 119,
"watchers": 118,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86",
"fork": false,
"created_at": "2014-09-20T08:24:15Z",
"updated_at": "2020-08-19T15:34:32Z",
"updated_at": "2020-12-17T10:07:00Z",
"pushed_at": "2014-10-25T10:45:32Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 23,
"forks": 23,
"watchers": 40,
"watchers": 39,
"score": 0
},
{
@ -174,8 +174,8 @@
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
"fork": false,
"created_at": "2020-10-31T11:39:11Z",
"updated_at": "2020-12-13T19:40:23Z",
"pushed_at": "2020-12-13T19:36:06Z",
"updated_at": "2020-12-17T09:46:29Z",
"pushed_at": "2020-12-17T09:46:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "CVE-2014-4322 Exploit",
"fork": false,
"created_at": "2015-08-16T00:02:45Z",
"updated_at": "2020-10-12T10:02:59Z",
"updated_at": "2020-12-17T10:07:38Z",
"pushed_at": "2016-01-24T16:19:47Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 21,
"forks": 21,
"watchers": 20,
"watchers": 19,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "cve-2014-4323 poc",
"fork": false,
"created_at": "2015-10-15T04:21:08Z",
"updated_at": "2020-08-06T09:12:41Z",
"updated_at": "2020-12-17T10:05:22Z",
"pushed_at": "2015-10-15T04:21:45Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 6,
"forks": 6,
"watchers": 23,
"watchers": 22,
"score": 0
}
]

View file

@ -82,7 +82,7 @@
"description": "exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;",
"fork": false,
"created_at": "2015-12-29T07:28:46Z",
"updated_at": "2020-10-03T01:51:16Z",
"updated_at": "2020-12-17T10:26:55Z",
"pushed_at": "2016-01-01T15:14:47Z",
"stargazers_count": 12,
"watchers_count": 12,

View file

@ -13,13 +13,13 @@
"description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1",
"fork": false,
"created_at": "2016-01-24T13:49:03Z",
"updated_at": "2020-10-03T01:49:30Z",
"updated_at": "2020-12-17T10:07:05Z",
"pushed_at": "2016-01-24T22:20:44Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 46,
"forks": 46,
"watchers": 72,
"watchers": 71,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2016-03-24T02:55:09Z",
"updated_at": "2020-04-02T08:01:42Z",
"updated_at": "2020-12-17T10:05:31Z",
"pushed_at": "2016-04-20T03:52:22Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 29,
"forks": 29,
"watchers": 33,
"watchers": 32,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2015-1805 root tool",
"fork": false,
"created_at": "2016-04-01T12:10:14Z",
"updated_at": "2020-07-17T17:39:28Z",
"updated_at": "2020-12-17T10:05:19Z",
"pushed_at": "2017-11-23T20:55:03Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 148,
"forks": 148,
"watchers": 251,
"watchers": 250,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "PoC code for 32 bit Android OS",
"fork": false,
"created_at": "2015-09-12T01:31:36Z",
"updated_at": "2020-11-12T10:10:34Z",
"updated_at": "2020-12-17T10:07:18Z",
"pushed_at": "2015-12-15T05:42:02Z",
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 95,
"forks": 95,
"watchers": 130,
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 94,
"forks": 94,
"watchers": 129,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "root with CVE-2015-3636",
"fork": false,
"created_at": "2016-07-13T06:23:54Z",
"updated_at": "2017-06-27T13:20:08Z",
"updated_at": "2020-12-17T10:04:18Z",
"pushed_at": "2016-07-13T06:24:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ",
"fork": false,
"created_at": "2017-06-06T12:00:27Z",
"updated_at": "2020-04-22T04:43:37Z",
"updated_at": "2020-12-17T09:59:05Z",
"pushed_at": "2017-08-30T15:17:08Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 17,
"forks": 17,
"watchers": 54,
"watchers": 53,
"score": 0
},
{

View file

@ -59,12 +59,12 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2020-12-11T23:12:20Z",
"updated_at": "2020-12-17T10:07:11Z",
"pushed_at": "2020-08-18T10:37:49Z",
"stargazers_count": 858,
"watchers_count": 858,
"forks_count": 401,
"forks": 401,
"forks_count": 402,
"forks": 402,
"watchers": 858,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "poc for cve-2017-10661",
"fork": false,
"created_at": "2017-08-11T10:45:10Z",
"updated_at": "2019-10-26T03:49:46Z",
"updated_at": "2020-12-17T10:26:55Z",
"pushed_at": "2017-08-11T10:45:56Z",
"stargazers_count": 9,
"watchers_count": 9,

View file

@ -132,8 +132,8 @@
"pushed_at": "2020-07-02T08:48:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "None",
"fork": false,
"created_at": "2017-07-09T06:03:37Z",
"updated_at": "2019-12-16T05:30:33Z",
"updated_at": "2020-12-17T09:33:33Z",
"pushed_at": "2018-08-25T16:09:21Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 15,
"forks": 15,
"watchers": 19,
"watchers": 18,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-10-02T09:03:37Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 49,
"forks": 49,
"forks_count": 48,
"forks": 48,
"watchers": 119,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 33,
"forks": 33,
"forks_count": 32,
"forks": 32,
"watchers": 154,
"score": 0
}

View file

@ -473,8 +473,8 @@
"description": null,
"fork": false,
"created_at": "2020-10-18T14:01:59Z",
"updated_at": "2020-12-17T06:50:16Z",
"pushed_at": "2020-12-17T06:50:13Z",
"updated_at": "2020-12-17T11:42:56Z",
"pushed_at": "2020-12-17T11:42:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2020-12-03T00:51:46Z",
"updated_at": "2020-12-17T09:40:02Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 329,
"watchers_count": 329,
"forks_count": 112,
"forks": 112,
"watchers": 330,
"watchers": 329,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "CVE-2018-7600 - Drupal 7.x RCE",
"fork": false,
"created_at": "2018-04-16T20:16:21Z",
"updated_at": "2020-04-13T06:38:38Z",
"updated_at": "2020-12-17T09:40:30Z",
"pushed_at": "2018-04-18T20:34:19Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 35,
"forks": 35,
"watchers": 69,
"watchers": 68,
"score": 0
},
{

View file

@ -1278,13 +1278,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-12-09T09:45:10Z",
"updated_at": "2020-12-17T11:13:28Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 781,
"watchers_count": 781,
"stargazers_count": 782,
"watchers_count": 782,
"forks_count": 192,
"forks": 192,
"watchers": 781,
"watchers": 782,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-12-17T08:08:25Z",
"updated_at": "2020-12-17T10:36:46Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2172,
"watchers_count": 2172,
"forks_count": 608,
"forks": 608,
"watchers": 2172,
"stargazers_count": 2174,
"watchers_count": 2174,
"forks_count": 609,
"forks": 609,
"watchers": 2174,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-2107",
"fork": false,
"created_at": "2019-07-08T14:18:33Z",
"updated_at": "2020-12-15T22:49:30Z",
"updated_at": "2020-12-17T10:16:56Z",
"pushed_at": "2020-11-02T06:43:15Z",
"stargazers_count": 309,
"watchers_count": 309,
"stargazers_count": 308,
"watchers_count": 308,
"forks_count": 96,
"forks": 96,
"watchers": 309,
"watchers": 308,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-10-04T06:32:08Z",
"updated_at": "2020-09-28T11:10:48Z",
"updated_at": "2020-12-17T10:54:34Z",
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 25,
"forks": 25,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-12-17T02:54:09Z",
"updated_at": "2020-12-17T10:20:26Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 683,
"watchers_count": 683,
"stargazers_count": 684,
"watchers_count": 684,
"forks_count": 143,
"forks": 143,
"watchers": 683,
"watchers": 684,
"score": 0
},
{

View file

@ -59,8 +59,8 @@
"description": "CVE-2019-5475 靶场",
"fork": false,
"created_at": "2020-12-16T14:03:16Z",
"updated_at": "2020-12-16T16:16:48Z",
"pushed_at": "2020-12-16T16:16:46Z",
"updated_at": "2020-12-17T14:56:40Z",
"pushed_at": "2020-12-17T14:56:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -174,13 +174,13 @@
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
"fork": false,
"created_at": "2020-03-12T02:20:07Z",
"updated_at": "2020-06-07T15:07:56Z",
"updated_at": "2020-12-17T12:43:21Z",
"pushed_at": "2020-03-12T02:49:10Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 9,
"forks": 9,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-12-17T00:50:47Z",
"updated_at": "2020-12-17T14:56:06Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1210,
"watchers_count": 1210,
"stargazers_count": 1211,
"watchers_count": 1211,
"forks_count": 277,
"forks": 277,
"watchers": 1210,
"watchers": 1211,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-12-17T09:07:48Z",
"updated_at": "2020-12-17T13:36:06Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 721,
"watchers_count": 721,
"stargazers_count": 722,
"watchers_count": 722,
"forks_count": 208,
"forks": 208,
"watchers": 721,
"watchers": 722,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-12-16T15:35:38Z",
"updated_at": "2020-12-17T11:24:58Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 246,
"watchers_count": 246,
"stargazers_count": 247,
"watchers_count": 247,
"forks_count": 88,
"forks": 88,
"watchers": 246,
"watchers": 247,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-12-17T08:08:25Z",
"updated_at": "2020-12-17T10:36:46Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2172,
"watchers_count": 2172,
"forks_count": 608,
"forks": 608,
"watchers": 2172,
"stargazers_count": 2174,
"watchers_count": 2174,
"forks_count": 609,
"forks": 609,
"watchers": 2174,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web漏洞扫描和验证工具可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2020-12-17T05:52:41Z",
"updated_at": "2020-12-17T13:38:58Z",
"pushed_at": "2020-12-15T02:33:45Z",
"stargazers_count": 454,
"watchers_count": 454,
"stargazers_count": 456,
"watchers_count": 456,
"forks_count": 84,
"forks": 84,
"watchers": 454,
"watchers": 456,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Collect S2-061 payloads",
"fork": false,
"created_at": "2020-12-10T17:42:37Z",
"updated_at": "2020-12-17T05:17:45Z",
"updated_at": "2020-12-17T10:53:06Z",
"pushed_at": "2020-12-15T16:43:15Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 10,
"forks": 10,
"watchers": 26,
"watchers": 28,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-06T03:10:34Z",
"updated_at": "2020-11-11T15:08:37Z",
"updated_at": "2020-12-17T14:18:09Z",
"pushed_at": "2020-10-25T22:54:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

25
2020/CVE-2020-28647.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 322287030,
"name": "Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647",
"full_name": "SECFORCE\/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647",
"owner": {
"login": "SECFORCE",
"id": 8157384,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE"
},
"html_url": "https:\/\/github.com\/SECFORCE\/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647",
"description": "MOVEit Transfer 2020 web application Stored Cross-Site Scripting (XSS)",
"fork": false,
"created_at": "2020-12-17T12:23:18Z",
"updated_at": "2020-12-17T12:33:47Z",
"pushed_at": "2020-12-17T12:31:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-35488.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 321746763,
"name": "CVE-2020-35488",
"full_name": "GuillaumePetit84\/CVE-2020-35488",
"owner": {
"login": "GuillaumePetit84",
"id": 66068507,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/66068507?v=4",
"html_url": "https:\/\/github.com\/GuillaumePetit84"
},
"html_url": "https:\/\/github.com\/GuillaumePetit84\/CVE-2020-35488",
"description": null,
"fork": false,
"created_at": "2020-12-15T17:55:07Z",
"updated_at": "2020-12-17T15:03:01Z",
"pushed_at": "2020-12-17T15:02:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -3252,6 +3252,14 @@ A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Pay
- [jet-pentest/CVE-2020-28415](https://github.com/jet-pentest/CVE-2020-28415)
### CVE-2020-28647 (2020-11-17)
<code>
In Progress MOVEit Transfer before 2020.1, a malicious user could craft and store a payload within the application. If a victim within the MOVEit Transfer instance interacts with the stored payload, it could invoke and execute arbitrary code within the context of the victim's browser (XSS).
</code>
- [SECFORCE/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647](https://github.com/SECFORCE/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647)
### CVE-2020-28948 (2020-11-19)
<code>
@ -3311,6 +3319,9 @@ In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is
- [code-byter/CVE-2020-29669](https://github.com/code-byter/CVE-2020-29669)
### CVE-2020-35488
- [GuillaumePetit84/CVE-2020-35488](https://github.com/GuillaumePetit84/CVE-2020-35488)
### CVE-2020-72381
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)