Auto Update 2020/10/16 06:08:58

This commit is contained in:
motikan2010-bot 2020-10-16 06:08:58 +09:00
parent 2ec2bf5fad
commit d345599496
21 changed files with 146 additions and 118 deletions

View file

@ -13,13 +13,13 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2020-10-15T01:55:23Z",
"updated_at": "2020-10-15T15:08:47Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 417,
"watchers_count": 417,
"stargazers_count": 416,
"watchers_count": 416,
"forks_count": 180,
"forks": 180,
"watchers": 417,
"watchers": 416,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-10-14T06:01:03Z",
"updated_at": "2020-10-15T16:52:56Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 319,
"watchers_count": 319,
"stargazers_count": 320,
"watchers_count": 320,
"forks_count": 71,
"forks": 71,
"watchers": 319,
"watchers": 320,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2020-10-13T16:15:37Z",
"updated_at": "2020-10-15T19:45:02Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 437,
"watchers_count": 437,
"stargazers_count": 436,
"watchers_count": 436,
"forks_count": 203,
"forks": 203,
"watchers": 437,
"watchers": 436,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2020-10-08T13:14:42Z",
"updated_at": "2020-10-15T19:47:07Z",
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 57,
"forks": 57,
"watchers": 129,
"watchers": 130,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "MS Word MS WordPad via IE VBS Engine RCE ",
"fork": false,
"created_at": "2018-06-01T22:12:54Z",
"updated_at": "2019-12-06T00:54:27Z",
"updated_at": "2020-10-15T19:47:06Z",
"pushed_at": "2018-06-01T22:18:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 11,
"forks": 11,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-10-13T05:31:37Z",
"updated_at": "2020-10-15T16:01:26Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 41,
"forks": 41,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

25
2019/CVE-2019-13633.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 304367053,
"name": "CVE-2019-13633",
"full_name": "Security-AVS\/CVE-2019-13633",
"owner": {
"login": "Security-AVS",
"id": 72926885,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/72926885?v=4",
"html_url": "https:\/\/github.com\/Security-AVS"
},
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2019-13633",
"description": null,
"fork": false,
"created_at": "2020-10-15T15:19:58Z",
"updated_at": "2020-10-15T16:38:11Z",
"pushed_at": "2020-10-15T16:38:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -312,8 +312,8 @@
"description": "CVE-201915107 - Unauthenticated RCE Webmin <=1.920",
"fork": false,
"created_at": "2020-10-15T14:53:48Z",
"updated_at": "2020-10-15T15:06:54Z",
"pushed_at": "2020-10-15T15:09:21Z",
"updated_at": "2020-10-15T15:10:25Z",
"pushed_at": "2020-10-15T15:10:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2020-10-13T06:34:01Z",
"updated_at": "2020-10-15T16:01:55Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 40,
"forks": 40,
"watchers": 59,
"watchers": 60,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2020-10-12T21:08:18Z",
"updated_at": "2020-10-15T19:47:28Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 61,
"forks": 61,
"watchers": 177,
"watchers": 179,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-10-13T06:40:48Z",
"updated_at": "2020-10-15T19:48:38Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 51,
"forks": 51,
"watchers": 126,
"watchers": 125,
"score": 0
},
{
@ -266,13 +266,13 @@
"description": "Exploitation Script for CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\"",
"fork": false,
"created_at": "2020-03-31T15:29:52Z",
"updated_at": "2020-10-06T12:31:24Z",
"updated_at": "2020-10-15T16:42:40Z",
"pushed_at": "2020-04-01T06:57:50Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-10-14T08:34:01Z",
"updated_at": "2020-10-15T17:15:43Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 431,
"watchers_count": 431,
"forks_count": 101,
"forks": 101,
"watchers": 430,
"watchers": 431,
"score": 0
}
]

View file

@ -1094,13 +1094,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-10-07T04:02:35Z",
"updated_at": "2020-10-15T20:34:31Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 324,
"watchers_count": 324,
"forks_count": 107,
"forks": 107,
"watchers": 323,
"watchers": 324,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-10-15T07:09:21Z",
"updated_at": "2020-10-15T16:33:34Z",
"pushed_at": "2020-09-23T07:04:58Z",
"stargazers_count": 1141,
"watchers_count": 1141,
"stargazers_count": 1142,
"watchers_count": 1142,
"forks_count": 248,
"forks": 248,
"watchers": 1141,
"watchers": 1142,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-10-14T21:43:08Z",
"updated_at": "2020-10-15T18:47:06Z",
"pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 663,
"watchers_count": 663,
"stargazers_count": 664,
"watchers_count": 664,
"forks_count": 191,
"forks": 191,
"watchers": 663,
"watchers": 664,
"score": 0
},
{
@ -129,11 +129,11 @@
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-10-15T12:39:00Z",
"pushed_at": "2020-09-17T18:06:57Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 70,
"forks": 70,
"forks_count": 71,
"forks": 71,
"watchers": 188,
"score": 0
},
@ -151,13 +151,13 @@
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false,
"created_at": "2020-09-14T19:27:14Z",
"updated_at": "2020-10-14T15:19:49Z",
"updated_at": "2020-10-15T16:24:19Z",
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 28,
"forks": 28,
"watchers": 113,
"watchers": 114,
"score": 0
},
{
@ -519,13 +519,13 @@
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
"fork": false,
"created_at": "2020-09-17T16:53:17Z",
"updated_at": "2020-10-15T07:56:12Z",
"updated_at": "2020-10-15T19:41:50Z",
"pushed_at": "2020-09-19T09:46:30Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 1,
"forks": 1,
"watchers": 18,
"watchers": 19,
"score": 0
},
{
@ -772,13 +772,13 @@
"description": "Zerologon AutoExploit Tool | CVE-2020-1472",
"fork": false,
"created_at": "2020-09-29T20:43:06Z",
"updated_at": "2020-10-10T11:45:58Z",
"updated_at": "2020-10-15T17:20:07Z",
"pushed_at": "2020-10-02T13:00:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
},
{
@ -864,8 +864,8 @@
"description": "Check for events that indicate non compatible devices -> CVE-2020-1472",
"fork": false,
"created_at": "2020-10-15T15:02:53Z",
"updated_at": "2020-10-15T15:02:59Z",
"pushed_at": "2020-10-15T15:02:56Z",
"updated_at": "2020-10-15T15:50:41Z",
"pushed_at": "2020-10-15T15:50:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -2,14 +2,14 @@
{
"id": 304345770,
"name": "CVE-2020-16270",
"full_name": "Aleksander-Semenenko\/CVE-2020-16270",
"full_name": "Security-AVS\/CVE-2020-16270",
"owner": {
"login": "Aleksander-Semenenko",
"login": "Security-AVS",
"id": 72926885,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/72926885?v=4",
"html_url": "https:\/\/github.com\/Aleksander-Semenenko"
"html_url": "https:\/\/github.com\/Security-AVS"
},
"html_url": "https:\/\/github.com\/Aleksander-Semenenko\/CVE-2020-16270",
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2020-16270",
"description": null,
"fork": false,
"created_at": "2020-10-15T14:06:28Z",

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2020-10-15T14:36:34Z",
"updated_at": "2020-10-15T20:41:55Z",
"pushed_at": "2020-10-15T02:57:22Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 18,
"forks": 18,
"watchers": 132,
"watchers": 156,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)",
"fork": false,
"created_at": "2020-10-14T03:25:00Z",
"updated_at": "2020-10-15T13:08:05Z",
"updated_at": "2020-10-15T16:14:53Z",
"pushed_at": "2020-10-15T08:26:40Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
"fork": false,
"created_at": "2020-10-14T14:42:52Z",
"updated_at": "2020-10-15T14:38:59Z",
"updated_at": "2020-10-15T16:11:47Z",
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"forks": 5,
"watchers": 12,
"score": 0
},
{
@ -105,8 +105,8 @@
"description": "Detects CVE-2020-16898: \"Bad Neighbor\"",
"fork": false,
"created_at": "2020-10-14T16:38:06Z",
"updated_at": "2020-10-15T15:00:13Z",
"pushed_at": "2020-10-15T15:01:52Z",
"updated_at": "2020-10-15T15:39:52Z",
"pushed_at": "2020-10-15T17:13:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-12T20:59:03Z",
"updated_at": "2020-10-15T07:43:51Z",
"updated_at": "2020-10-15T16:34:40Z",
"pushed_at": "2020-10-15T02:58:42Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
"fork": false,
"created_at": "2020-10-15T14:32:25Z",
"updated_at": "2020-10-15T14:57:33Z",
"updated_at": "2020-10-15T20:53:26Z",
"pushed_at": "2020-10-15T14:57:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Proof of concept for Weblogic CVE-2020-2883",
"fork": false,
"created_at": "2020-05-13T09:56:48Z",
"updated_at": "2020-07-22T07:25:35Z",
"updated_at": "2020-10-15T16:26:07Z",
"pushed_at": "2020-05-13T10:19:07Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-02T08:30:22Z",
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 66,
"score": 0
}

View file

@ -128,13 +128,13 @@
"description": "Proof of concept for CVE-2020-5902",
"fork": false,
"created_at": "2020-07-05T17:01:27Z",
"updated_at": "2020-09-25T07:01:29Z",
"updated_at": "2020-10-15T19:48:57Z",
"pushed_at": "2020-07-06T17:47:17Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 22,
"forks": 22,
"watchers": 74,
"watchers": 73,
"score": 0
},
{

View file

@ -2231,7 +2231,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
- [eriknl/CVE-2020-16152](https://github.com/eriknl/CVE-2020-16152)
### CVE-2020-16270
- [Aleksander-Semenenko/CVE-2020-16270](https://github.com/Aleksander-Semenenko/CVE-2020-16270)
- [Security-AVS/CVE-2020-16270](https://github.com/Security-AVS/CVE-2020-16270)
### CVE-2020-16898
- [advanced-threat-research/CVE-2020-16898](https://github.com/advanced-threat-research/CVE-2020-16898)
@ -4836,6 +4836,9 @@ In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image f
### CVE-2019-13600
- [Crystalware/CVE-2019-13600](https://github.com/Crystalware/CVE-2019-13600)
### CVE-2019-13633
- [Security-AVS/CVE-2019-13633](https://github.com/Security-AVS/CVE-2019-13633)
### CVE-2019-13720
<code>