Auto Update 2020/01/08 19:00:01

This commit is contained in:
motikan2010-bot 2020-01-08 19:00:01 +09:00
parent 1fbf5fe13e
commit 040a49dd03
19 changed files with 178 additions and 82 deletions

View file

@ -59,13 +59,13 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2020-01-02T16:57:11Z",
"updated_at": "2020-01-08T08:07:35Z",
"pushed_at": "2017-09-27T02:35:13Z",
"stargazers_count": 815,
"watchers_count": 815,
"stargazers_count": 816,
"watchers_count": 816,
"forks_count": 389,
"forks": 389,
"watchers": 815,
"watchers": 816,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-12-28T10:12:29Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 22,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2019-12-30T13:13:59Z",
"updated_at": "2020-01-08T04:54:03Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 245,
"watchers_count": 245,
"stargazers_count": 246,
"watchers_count": 246,
"forks_count": 94,
"forks": 94,
"watchers": 245,
"watchers": 246,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2020-01-04T09:54:19Z",
"updated_at": "2020-01-08T08:13:46Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 378,
"watchers_count": 378,
"stargazers_count": 379,
"watchers_count": 379,
"forks_count": 168,
"forks": 168,
"watchers": 378,
"watchers": 379,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2020-01-06T14:22:29Z",
"updated_at": "2020-01-08T05:59:02Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 421,
"watchers_count": 421,
"stargazers_count": 422,
"watchers_count": 422,
"forks_count": 191,
"forks": 191,
"watchers": 421,
"watchers": 422,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
"fork": false,
"created_at": "2018-05-22T21:50:32Z",
"updated_at": "2020-01-07T07:12:48Z",
"updated_at": "2020-01-08T05:52:30Z",
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 73,
"forks": 73,
"watchers": 156,
"watchers": 157,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2019-12-28T23:13:17Z",
"updated_at": "2020-01-08T08:21:29Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 37,
"forks": 37,
"watchers": 56,
"watchers": 57,
"score": 0
},
{

View file

@ -1393,13 +1393,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-01-04T16:11:14Z",
"updated_at": "2020-01-08T07:02:41Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 681,
"watchers_count": 681,
"stargazers_count": 682,
"watchers_count": 682,
"forks_count": 156,
"forks": 156,
"watchers": 681,
"watchers": 682,
"score": 0
},
{
@ -2014,13 +2014,13 @@
"description": "Public work for CVE-2019-0708",
"fork": false,
"created_at": "2019-07-23T03:15:53Z",
"updated_at": "2020-01-08T01:45:51Z",
"updated_at": "2020-01-08T04:50:49Z",
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 254,
"watchers_count": 254,
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 79,
"forks": 79,
"watchers": 254,
"watchers": 256,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Win32k Elevation of Privilege Poc",
"fork": false,
"created_at": "2019-05-17T11:05:22Z",
"updated_at": "2020-01-07T21:16:06Z",
"updated_at": "2020-01-08T08:23:27Z",
"pushed_at": "2019-05-17T10:53:29Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 59,
"forks": 59,
"watchers": 66,
"watchers": 67,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-12-26T06:58:56Z",
"updated_at": "2020-01-07T09:15:34Z",
"updated_at": "2020-01-08T06:07:23Z",
"pushed_at": "2019-12-26T08:44:54Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 15,
"forks": 15,
"watchers": 86,
"watchers": 88,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-01-07T08:56:14Z",
"updated_at": "2020-01-08T08:29:07Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1503,
"watchers_count": 1503,
"forks_count": 207,
"forks": 207,
"watchers": 1503,
"stargazers_count": 1504,
"watchers_count": 1504,
"forks_count": 208,
"forks": 208,
"watchers": 1504,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-01-06T22:34:16Z",
"updated_at": "2020-01-08T02:22:33Z",
"updated_at": "2020-01-08T08:52:58Z",
"pushed_at": "2020-01-07T14:29:45Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"forks": 7,
"watchers": 15,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-16097 PoC",
"fork": false,
"created_at": "2019-09-19T15:12:11Z",
"updated_at": "2019-11-05T13:07:04Z",
"updated_at": "2020-01-08T07:00:02Z",
"pushed_at": "2019-09-19T15:27:48Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 4,
"forks": 4,
"watchers": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 18,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "cve-2019-1609",
"fork": false,
"created_at": "2019-09-25T02:05:49Z",
"updated_at": "2019-09-25T02:24:57Z",
"updated_at": "2020-01-08T07:00:47Z",
"pushed_at": "2019-09-25T02:24:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)",
"fork": false,
"created_at": "2019-12-21T04:30:34Z",
"updated_at": "2020-01-07T04:47:57Z",
"updated_at": "2020-01-08T07:37:40Z",
"pushed_at": "2019-12-24T12:31:47Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 10,
"forks": 10,
"watchers": 84,
"watchers": 85,
"score": 0
},
{

48
2019/CVE-2019-20197.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 232512469,
"name": "CVE-2019-20197",
"full_name": "lp008\/CVE-2019-20197",
"owner": {
"login": "lp008",
"id": 11436275,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11436275?v=4",
"html_url": "https:\/\/github.com\/lp008"
},
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-20197",
"description": "CVE-2019-20197",
"fork": false,
"created_at": "2020-01-08T08:11:58Z",
"updated_at": "2020-01-08T08:20:44Z",
"pushed_at": "2020-01-08T08:19:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 232513269,
"name": "CVE-2019-20197",
"full_name": "jas502n\/CVE-2019-20197",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-20197",
"description": "Nagios XI远程命令执行漏洞 <v5.6.9",
"fork": false,
"created_at": "2020-01-08T08:16:30Z",
"updated_at": "2020-01-08T09:13:31Z",
"pushed_at": "2020-01-08T08:30:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-10-04T06:32:08Z",
"updated_at": "2020-01-06T16:22:39Z",
"updated_at": "2020-01-08T05:35:37Z",
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 18,
"forks": 18,
"watchers": 46,
"watchers": 47,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
"fork": false,
"created_at": "2019-10-14T17:27:37Z",
"updated_at": "2019-12-25T03:46:16Z",
"updated_at": "2020-01-08T07:16:46Z",
"pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 22,
"forks": 22,
"watchers": 37,
"watchers": 38,
"score": 0
},
{

View file

@ -389,5 +389,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 232495610,
"name": "weblogic_2019_2725_wls_batch",
"full_name": "GGyao\/weblogic_2019_2725_wls_batch",
"owner": {
"login": "GGyao",
"id": 38530938,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4",
"html_url": "https:\/\/github.com\/GGyao"
},
"html_url": "https:\/\/github.com\/GGyao\/weblogic_2019_2725_wls_batch",
"description": "weblogic CVE-2019-2725利用exp。",
"fork": false,
"created_at": "2020-01-08T06:35:28Z",
"updated_at": "2020-01-08T06:43:35Z",
"pushed_at": "2020-01-08T06:42:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-05-05T17:19:02Z",
"updated_at": "2020-01-05T15:07:03Z",
"updated_at": "2020-01-08T06:25:58Z",
"pushed_at": "2019-12-28T18:25:10Z",
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 46,
"forks": 46,
"watchers": 185,
"stargazers_count": 186,
"watchers_count": 186,
"forks_count": 47,
"forks": 47,
"watchers": 186,
"score": 0
}
]

25
2020/CVE-2020-6172.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 232496720,
"name": "CVE-2020-6172",
"full_name": "Jeff-Rowell\/CVE-2020-6172",
"owner": {
"login": "Jeff-Rowell",
"id": 32188816,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32188816?v=4",
"html_url": "https:\/\/github.com\/Jeff-Rowell"
},
"html_url": "https:\/\/github.com\/Jeff-Rowell\/CVE-2020-6172",
"description": "Arris NC4000 ROLT Node v1.12 Vulnerability (CVE-2020-6172)",
"fork": false,
"created_at": "2020-01-08T06:42:05Z",
"updated_at": "2020-01-08T07:16:54Z",
"pushed_at": "2020-01-08T07:16:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]