Auto Update 2020/11/05 00:09:09

This commit is contained in:
motikan2010-bot 2020-11-05 00:09:10 +09:00
parent 3b0d0f1002
commit c5e1467eaa
33 changed files with 171 additions and 138 deletions

View file

@ -13,13 +13,13 @@
"description": "A tool i made for use in combination with hackerone.com for Bounty Hacking purposes.",
"fork": false,
"created_at": "2018-02-06T19:16:43Z",
"updated_at": "2019-05-03T07:23:19Z",
"updated_at": "2020-11-04T13:51:46Z",
"pushed_at": "2018-02-10T20:07:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2000-0170",
"fork": false,
"created_at": "2014-11-08T15:21:30Z",
"updated_at": "2017-07-01T19:23:55Z",
"updated_at": "2020-11-04T13:52:06Z",
"pushed_at": "2014-11-08T15:25:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2007-2447 - Samba usermap script",
"fork": false,
"created_at": "2018-08-03T18:39:56Z",
"updated_at": "2020-10-24T13:55:23Z",
"updated_at": "2020-11-04T10:36:06Z",
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 11,
"forks": 11,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T06:39:51Z",
"updated_at": "2020-11-04T09:27:13Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 742,
"watchers_count": 742,
"stargazers_count": 743,
"watchers_count": 743,
"forks_count": 182,
"forks": 182,
"watchers": 742,
"watchers": 743,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T06:39:51Z",
"updated_at": "2020-11-04T09:27:13Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 742,
"watchers_count": 742,
"stargazers_count": 743,
"watchers_count": 743,
"forks_count": 182,
"forks": 182,
"watchers": 742,
"watchers": 743,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2020-10-28T09:08:42Z",
"updated_at": "2020-11-04T13:57:23Z",
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 350,
"watchers_count": 350,
"stargazers_count": 352,
"watchers_count": 352,
"forks_count": 135,
"forks": 135,
"watchers": 350,
"watchers": 352,
"score": 0
},
{

View file

@ -197,13 +197,13 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2020-10-28T03:06:57Z",
"updated_at": "2020-11-04T13:57:14Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 97,
"forks": 97,
"watchers": 192,
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 98,
"forks": 98,
"watchers": 194,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "NodeJS + Postgres (Remote Code Execution) 🛰",
"fork": false,
"created_at": "2018-11-27T18:09:17Z",
"updated_at": "2020-11-04T01:21:00Z",
"updated_at": "2020-11-04T10:34:55Z",
"pushed_at": "2018-11-27T18:42:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T06:39:51Z",
"updated_at": "2020-11-04T09:27:13Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 742,
"watchers_count": 742,
"stargazers_count": 743,
"watchers_count": 743,
"forks_count": 182,
"forks": 182,
"watchers": 742,
"watchers": 743,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Test utility for cve-2018-1002105",
"fork": false,
"created_at": "2018-12-05T02:51:43Z",
"updated_at": "2020-10-21T22:16:32Z",
"updated_at": "2020-11-04T13:06:55Z",
"pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 26,
"forks": 26,
"watchers": 192,
"watchers": 194,
"score": 0
},
{

View file

@ -339,8 +339,8 @@
"pushed_at": "2018-10-25T18:23:52Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 12,
"score": 0
},

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T06:39:51Z",
"updated_at": "2020-11-04T09:27:13Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 742,
"watchers_count": 742,
"stargazers_count": 743,
"watchers_count": 743,
"forks_count": 182,
"forks": 182,
"watchers": 742,
"watchers": 743,
"score": 0
},
{

View file

@ -312,13 +312,13 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2020-11-03T00:00:52Z",
"updated_at": "2020-11-04T11:35:25Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 341,
"watchers_count": 341,
"stargazers_count": 342,
"watchers_count": 342,
"forks_count": 190,
"forks": 190,
"watchers": 341,
"watchers": 342,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "cve-2019-0808-poc",
"fork": false,
"created_at": "2019-03-25T11:53:35Z",
"updated_at": "2020-10-14T01:48:06Z",
"updated_at": "2020-11-04T13:19:21Z",
"pushed_at": "2019-03-25T12:10:40Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 19,
"forks": 19,
"watchers": 41,
"watchers": 43,
"score": 0
},
{

View file

@ -266,13 +266,13 @@
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
"fork": false,
"created_at": "2020-04-22T21:11:27Z",
"updated_at": "2020-10-01T02:23:28Z",
"updated_at": "2020-11-04T14:42:54Z",
"pushed_at": "2020-04-28T04:25:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-04T06:48:49Z",
"updated_at": "2020-11-04T12:36:46Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 2001,
"watchers_count": 2001,
"stargazers_count": 2003,
"watchers_count": 2003,
"forks_count": 525,
"forks": 525,
"watchers": 2001,
"watchers": 2003,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-11-04T05:48:21Z",
"updated_at": "2020-11-04T10:35:26Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 23,
"forks": 23,
"watchers": 133,
"watchers": 134,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T06:39:51Z",
"updated_at": "2020-11-04T09:27:13Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 742,
"watchers_count": 742,
"stargazers_count": 743,
"watchers_count": 743,
"forks_count": 182,
"forks": 182,
"watchers": 742,
"watchers": 743,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2020-10-20T10:09:08Z",
"updated_at": "2020-11-04T11:35:01Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 44,
"forks": 44,
"watchers": 135,
"watchers": 136,
"score": 0
},
{

View file

@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-10-29T16:57:48Z",
"updated_at": "2020-11-04T10:44:20Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 1028,
"watchers_count": 1028,
"stargazers_count": 1027,
"watchers_count": 1027,
"forks_count": 338,
"forks": 338,
"watchers": 1028,
"watchers": 1027,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
"fork": false,
"created_at": "2020-06-16T23:22:15Z",
"updated_at": "2020-10-27T19:08:30Z",
"updated_at": "2020-11-04T10:17:33Z",
"pushed_at": "2020-06-17T18:10:30Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 25,
"forks": 25,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "CVE-2020-13277 靶场: Gitlab 越权访问漏洞",
"fork": false,
"created_at": "2020-10-31T11:01:26Z",
"updated_at": "2020-11-02T01:17:25Z",
"pushed_at": "2020-11-02T01:17:23Z",
"updated_at": "2020-11-04T10:41:06Z",
"pushed_at": "2020-11-04T10:41:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
"fork": false,
"created_at": "2020-11-02T14:48:55Z",
"updated_at": "2020-11-04T07:32:19Z",
"updated_at": "2020-11-04T14:42:10Z",
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 2,
"forks": 2,
"watchers": 41,
"watchers": 46,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-11-04T05:30:47Z",
"updated_at": "2020-11-04T09:29:58Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 686,
"watchers_count": 686,
"stargazers_count": 687,
"watchers_count": 687,
"forks_count": 199,
"forks": 199,
"watchers": 686,
"watchers": 687,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-11-04T08:30:20Z",
"updated_at": "2020-11-04T11:09:39Z",
"pushed_at": "2020-11-04T02:26:59Z",
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 20,
"forks": 20,
"watchers": 117,
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 22,
"forks": 22,
"watchers": 120,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "CVE-2020-14882_ALL综合利用工具支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
"updated_at": "2020-11-04T08:43:48Z",
"updated_at": "2020-11-04T13:44:58Z",
"pushed_at": "2020-11-03T12:12:30Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 19,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 5,
"forks": 5,
"watchers": 23,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": "CVE-2020-14882\/14883\/14750",
"fork": false,
"created_at": "2020-11-04T03:09:13Z",
"updated_at": "2020-11-04T08:42:36Z",
"updated_at": "2020-11-04T13:57:35Z",
"pushed_at": "2020-11-04T03:15:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-10T02:38:15Z",
"updated_at": "2020-11-04T09:08:29Z",
"updated_at": "2020-11-04T14:30:16Z",
"pushed_at": "2020-10-09T16:39:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 2,
"forks": 2,
"watchers": 11,
"watchers": 15,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-15999",
"fork": false,
"created_at": "2020-10-28T16:16:25Z",
"updated_at": "2020-11-04T08:33:56Z",
"updated_at": "2020-11-04T10:32:36Z",
"pushed_at": "2020-11-03T17:53:20Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"forks": 2,
"watchers": 11,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2020-11-04T02:08:41Z",
"updated_at": "2020-11-04T09:12:46Z",
"pushed_at": "2020-10-26T10:15:32Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 27,
"forks": 27,
"watchers": 196,
"watchers": 197,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-04T06:39:51Z",
"updated_at": "2020-11-04T15:10:03Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 742,
"watchers_count": 742,
"stargazers_count": 744,
"watchers_count": 744,
"forks_count": 182,
"forks": 182,
"watchers": 742,
"watchers": 744,
"score": 0
},
{

25
2020/CVE-2020-27194.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 309990198,
"name": "CVE-2020-27194-exp",
"full_name": "willinin\/CVE-2020-27194-exp",
"owner": {
"login": "willinin",
"id": 13467761,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13467761?v=4",
"html_url": "https:\/\/github.com\/willinin"
},
"html_url": "https:\/\/github.com\/willinin\/CVE-2020-27194-exp",
"description": null,
"fork": false,
"created_at": "2020-11-04T12:02:34Z",
"updated_at": "2020-11-04T13:10:25Z",
"pushed_at": "2020-11-04T13:10:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-04T06:48:49Z",
"updated_at": "2020-11-04T12:36:46Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 2001,
"watchers_count": 2001,
"stargazers_count": 2003,
"watchers_count": 2003,
"forks_count": 525,
"forks": 525,
"watchers": 2001,
"watchers": 2003,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/13852\/commits\/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s):\/\/IP:Port",
"fork": false,
"created_at": "2020-07-20T18:45:53Z",
"updated_at": "2020-10-19T10:56:00Z",
"updated_at": "2020-11-04T10:45:28Z",
"pushed_at": "2020-07-21T18:50:07Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 20,
"forks": 20,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -2679,6 +2679,14 @@ An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-
- [lukaszstu/SmartAsset-CORS-CVE-2020-26527](https://github.com/lukaszstu/SmartAsset-CORS-CVE-2020-26527)
### CVE-2020-27194 (2020-10-16)
<code>
An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.
</code>
- [willinin/CVE-2020-27194-exp](https://github.com/willinin/CVE-2020-27194-exp)
### CVE-2020-27199
- [9lyph/CVE-2020-27199](https://github.com/9lyph/CVE-2020-27199)