Auto Update 2021/07/28 06:11:54

This commit is contained in:
motikan2010-bot 2021-07-28 06:11:54 +09:00
parent 582c7a18b5
commit f3d4c5ca60
34 changed files with 185 additions and 152 deletions

View file

@ -13,13 +13,13 @@
"description": "I'll submit the poc after blackhat",
"fork": false,
"created_at": "2015-07-17T06:09:41Z",
"updated_at": "2021-02-05T08:32:28Z",
"updated_at": "2021-07-27T16:18:50Z",
"pushed_at": "2015-08-30T19:24:32Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 78,
"forks": 78,
"watchers": 112,
"watchers": 113,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2021-07-19T01:55:05Z",
"updated_at": "2021-07-27T18:55:22Z",
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 363,
"watchers_count": 363,
"forks_count": 141,
"forks": 141,
"watchers": 363,
"stargazers_count": 364,
"watchers_count": 364,
"forks_count": 142,
"forks": 142,
"watchers": 364,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2021-07-12T17:21:15Z",
"updated_at": "2021-07-27T20:44:20Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 871,
"watchers_count": 871,
"stargazers_count": 872,
"watchers_count": 872,
"forks_count": 412,
"forks": 412,
"watchers": 871,
"watchers": 872,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2021-07-02T21:31:02Z",
"updated_at": "2021-07-27T16:58:19Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 431,
"watchers_count": 431,
"forks_count": 190,
"forks": 190,
"watchers": 430,
"watchers": 431,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-06T14:47:17Z",
"updated_at": "2021-07-10T05:28:39Z",
"updated_at": "2021-07-27T15:27:12Z",
"pushed_at": "2019-06-06T14:53:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-06T01:11:32Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 27,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555",
"fork": false,
"created_at": "2019-01-16T14:45:44Z",
"updated_at": "2021-06-11T18:11:51Z",
"updated_at": "2021-07-27T16:56:48Z",
"pushed_at": "2020-10-20T14:30:01Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 20,
"forks": 20,
"watchers": 79,
"watchers": 78,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well. ",
"fork": false,
"created_at": "2019-01-23T14:53:19Z",
"updated_at": "2021-07-27T13:13:17Z",
"updated_at": "2021-07-27T20:51:31Z",
"pushed_at": "2020-08-08T16:58:05Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 16,
"watchers": 18,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-07-26T18:17:14Z",
"updated_at": "2021-07-27T20:38:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2714,
"watchers_count": 2714,
"stargazers_count": 2713,
"watchers_count": 2713,
"forks_count": 789,
"forks": 789,
"watchers": 2714,
"watchers": 2713,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2021-07-13T20:16:43Z",
"updated_at": "2021-07-27T19:37:42Z",
"pushed_at": "2020-06-04T13:17:10Z",
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 36,
"forks": 36,
"watchers": 107,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 37,
"forks": 37,
"watchers": 108,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2021-04-29T19:28:51Z",
"updated_at": "2021-07-27T15:19:41Z",
"pushed_at": "2020-10-23T19:35:42Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 29,
"forks": 29,
"watchers": 100,
"watchers": 101,
"score": 0
},
{
@ -224,8 +224,8 @@
"pushed_at": "2020-01-17T22:01:20Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 33,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)",
"fork": false,
"created_at": "2020-01-14T12:20:18Z",
"updated_at": "2021-05-12T16:44:38Z",
"updated_at": "2021-07-27T20:27:52Z",
"pushed_at": "2020-01-17T10:10:31Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 22,
"forks": 22,
"watchers": 29,
"watchers": 30,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "getshell test",
"fork": false,
"created_at": "2019-02-15T09:22:27Z",
"updated_at": "2021-03-26T20:00:24Z",
"updated_at": "2021-07-27T17:25:50Z",
"pushed_at": "2019-02-15T09:49:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 595,
"watchers_count": 595,
"forks_count": 144,
"forks": 144,
"forks_count": 145,
"forks": 145,
"watchers": 595,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer",
"fork": false,
"created_at": "2019-10-21T07:32:31Z",
"updated_at": "2021-07-20T02:42:17Z",
"updated_at": "2021-07-27T20:38:00Z",
"pushed_at": "2019-12-20T14:28:44Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 10,
"forks": 10,
"watchers": 36,
"watchers": 35,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2021-07-13T02:44:28Z",
"updated_at": "2021-07-27T20:29:33Z",
"pushed_at": "2021-05-31T21:22:33Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 11,
"forks": 11,
"watchers": 64,
"watchers": 65,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652",
"fork": false,
"created_at": "2020-05-01T20:53:49Z",
"updated_at": "2020-12-02T08:10:41Z",
"updated_at": "2021-07-27T20:38:01Z",
"pushed_at": "2020-05-18T17:36:18Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 17,
"forks": 17,
"watchers": 109,
"watchers": 108,
"score": 0
},
{

25
2020/CVE-2020-12593.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 354342880,
"name": "CVE-2020-12593",
"full_name": "nasbench\/CVE-2020-12593",
"owner": {
"login": "nasbench",
"id": 8741929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8741929?v=4",
"html_url": "https:\/\/github.com\/nasbench"
},
"html_url": "https:\/\/github.com\/nasbench\/CVE-2020-12593",
"description": "CVE-2020-12593 POC",
"fork": false,
"created_at": "2021-04-03T16:41:24Z",
"updated_at": "2021-07-27T20:42:53Z",
"pushed_at": "2021-04-03T16:42:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2021-07-18T08:15:11Z",
"updated_at": "2021-07-27T20:38:01Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 230,
"watchers_count": 230,
"stargazers_count": 229,
"watchers_count": 229,
"forks_count": 52,
"forks": 52,
"watchers": 230,
"watchers": 229,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-07-27T07:58:39Z",
"updated_at": "2021-07-27T18:05:55Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 346,
"watchers_count": 346,
"forks_count": 106,
"forks": 106,
"watchers": 345,
"watchers": 346,
"score": 0
},
{
@ -266,13 +266,13 @@
"description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器",
"fork": false,
"created_at": "2020-09-15T16:10:21Z",
"updated_at": "2021-07-19T01:26:31Z",
"updated_at": "2021-07-27T15:37:33Z",
"pushed_at": "2020-09-15T16:40:53Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 17,
"forks": 17,
"watchers": 52,
"watchers": 53,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-07-26T18:17:14Z",
"updated_at": "2021-07-27T20:38:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2714,
"watchers_count": 2714,
"stargazers_count": 2713,
"watchers_count": 2713,
"forks_count": 789,
"forks": 789,
"watchers": 2714,
"watchers": 2713,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2021-07-19T08:29:56Z",
"updated_at": "2021-07-27T20:38:02Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 229,
"watchers_count": 229,
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 49,
"forks": 49,
"watchers": 229,
"watchers": 228,
"score": 0
},
{

View file

@ -197,13 +197,13 @@
"description": "[CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal",
"fork": false,
"created_at": "2020-08-13T08:22:27Z",
"updated_at": "2021-07-27T14:58:34Z",
"updated_at": "2021-07-27T16:57:10Z",
"pushed_at": "2020-09-16T20:50:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Python PoC for CVE-2020-35846 targeting Cockpit 0.11.1",
"fork": false,
"created_at": "2021-07-25T05:05:14Z",
"updated_at": "2021-07-26T20:07:04Z",
"updated_at": "2021-07-27T15:52:27Z",
"pushed_at": "2021-07-25T05:28:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 56,
"forks": 56,
"forks_count": 57,
"forks": 57,
"watchers": 244,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-07-27T08:12:11Z",
"updated_at": "2021-07-27T18:23:46Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1254,
"watchers_count": 1254,
"stargazers_count": 1257,
"watchers_count": 1257,
"forks_count": 450,
"forks": 450,
"watchers": 1254,
"watchers": 1257,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2021-1675 Detection Info",
"fork": false,
"created_at": "2021-06-30T18:32:17Z",
"updated_at": "2021-07-27T06:18:05Z",
"updated_at": "2021-07-27T18:27:46Z",
"pushed_at": "2021-07-07T15:43:05Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"forks_count": 33,
"forks": 33,
"watchers": 197,
"watchers": 198,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
"updated_at": "2021-07-27T08:58:11Z",
"updated_at": "2021-07-27T20:28:22Z",
"pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 277,
"watchers_count": 277,
"stargazers_count": 278,
"watchers_count": 278,
"forks_count": 66,
"forks": 66,
"watchers": 277,
"watchers": 278,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-07-27T12:10:28Z",
"updated_at": "2021-07-27T18:04:04Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 521,
"watchers_count": 521,
"stargazers_count": 522,
"watchers_count": 522,
"forks_count": 139,
"forks": 139,
"watchers": 521,
"watchers": 522,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.",
"fork": false,
"created_at": "2021-04-10T09:23:52Z",
"updated_at": "2021-07-02T16:42:52Z",
"updated_at": "2021-07-27T18:39:45Z",
"pushed_at": "2021-04-28T17:56:04Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 8,
"forks": 8,
"watchers": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 9,
"forks": 9,
"watchers": 13,
"score": 0
}
]

View file

@ -243,13 +243,13 @@
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
"fork": false,
"created_at": "2021-03-08T11:54:32Z",
"updated_at": "2021-07-19T15:58:20Z",
"updated_at": "2021-07-27T15:57:16Z",
"pushed_at": "2021-03-17T11:21:52Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 21,
"forks": 21,
"watchers": 124,
"watchers": 125,
"score": 0
},
{
@ -772,13 +772,13 @@
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
"fork": false,
"created_at": "2021-03-24T01:12:48Z",
"updated_at": "2021-07-25T10:27:17Z",
"updated_at": "2021-07-27T15:19:29Z",
"pushed_at": "2021-03-24T01:25:05Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 8,
"forks": 8,
"watchers": 20,
"watchers": 21,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2021-07-26T19:35:44Z",
"updated_at": "2021-07-27T19:07:25Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 17,
"forks": 17,
"watchers": 66,
"watchers": 67,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "XSS-Askey",
"fork": false,
"created_at": "2021-02-18T16:14:48Z",
"updated_at": "2021-03-23T02:07:49Z",
"updated_at": "2021-07-27T20:33:30Z",
"pushed_at": "2021-02-18T17:09:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false,
"created_at": "2021-04-15T06:40:49Z",
"updated_at": "2021-07-26T01:17:44Z",
"updated_at": "2021-07-27T17:17:21Z",
"pushed_at": "2021-06-21T00:51:49Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-07-19T01:22:40Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 15,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "openam-CVE-2021-35464 tomcat 执行命令回显",
"fork": false,
"created_at": "2021-07-01T03:51:32Z",
"updated_at": "2021-07-17T01:55:09Z",
"updated_at": "2021-07-27T18:10:12Z",
"pushed_at": "2021-07-01T03:56:55Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 11,
"forks": 11,
"watchers": 82,
"watchers": 83,
"score": 0
}
]

View file

@ -243,13 +243,13 @@
"description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM",
"fork": false,
"created_at": "2021-07-24T12:55:05Z",
"updated_at": "2021-07-27T11:49:23Z",
"updated_at": "2021-07-27T17:07:04Z",
"pushed_at": "2021-07-25T15:41:33Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 22,
"forks": 22,
"watchers": 147,
"watchers": 149,
"score": 0
},
{

View file

@ -4142,6 +4142,14 @@ The WOPI API integration for Vereign Collabora CODE through 4.2.2 does not prope
- [d7x/CVE-2020-12432](https://github.com/d7x/CVE-2020-12432)
### CVE-2020-12593 (2020-11-18)
<code>
Symantec Endpoint Detection &amp; Response, prior to 4.5, may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.
</code>
- [nasbench/CVE-2020-12593](https://github.com/nasbench/CVE-2020-12593)
### CVE-2020-12629 (2020-05-04)
<code>