Auto Update 2020/11/18 00:09:23

This commit is contained in:
motikan2010-bot 2020-11-18 00:09:23 +09:00
parent c80c0c5c3d
commit 07e50323f4
33 changed files with 198 additions and 150 deletions

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2020-10-30T01:08:31Z",
"updated_at": "2020-11-17T14:37:11Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2246,
"watchers_count": 2246,
"stargazers_count": 2247,
"watchers_count": 2247,
"forks_count": 482,
"forks": 482,
"watchers": 2246,
"watchers": 2247,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-17T07:58:03Z",
"updated_at": "2020-11-17T11:25:27Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 767,
"watchers_count": 767,
"forks_count": 184,
"forks": 184,
"watchers": 766,
"watchers": 767,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-17T07:58:03Z",
"updated_at": "2020-11-17T11:25:27Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 767,
"watchers_count": 767,
"forks_count": 184,
"forks": 184,
"watchers": 766,
"watchers": 767,
"score": 0
},
{

View file

@ -585,10 +585,10 @@
"html_url": "https:\/\/github.com\/dcsync"
},
"html_url": "https:\/\/github.com\/dcsync\/rtfkit",
"description": "RTF exploit kits for cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174",
"description": "generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.",
"fork": false,
"created_at": "2020-11-16T22:21:54Z",
"updated_at": "2020-11-17T08:14:59Z",
"updated_at": "2020-11-17T13:20:19Z",
"pushed_at": "2020-11-16T22:32:12Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -21,5 +21,28 @@
"forks": 17,
"watchers": 24,
"score": 0
},
{
"id": 313596733,
"name": "HG532d-RCE-Exploit",
"full_name": "wilfred-wulbou\/HG532d-RCE-Exploit",
"owner": {
"login": "wilfred-wulbou",
"id": 25276623,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25276623?v=4",
"html_url": "https:\/\/github.com\/wilfred-wulbou"
},
"html_url": "https:\/\/github.com\/wilfred-wulbou\/HG532d-RCE-Exploit",
"description": "A Remote Code Execution (RCE) exploit for Huawei HG532d based on CVE-2017-17215 vulnerability. Modded from original PoC code from exploit-db.com",
"fork": false,
"created_at": "2020-11-17T11:22:20Z",
"updated_at": "2020-11-17T11:51:43Z",
"pushed_at": "2020-11-17T11:33:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-17T07:58:03Z",
"updated_at": "2020-11-17T11:25:27Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 767,
"watchers_count": 767,
"forks_count": 184,
"forks": 184,
"watchers": 766,
"watchers": 767,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-04-10T16:06:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 4,
"score": 0
},

View file

@ -102,10 +102,10 @@
"html_url": "https:\/\/github.com\/dcsync"
},
"html_url": "https:\/\/github.com\/dcsync\/rtfkit",
"description": "RTF exploit kits for cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174",
"description": "generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.",
"fork": false,
"created_at": "2020-11-16T22:21:54Z",
"updated_at": "2020-11-17T08:14:59Z",
"updated_at": "2020-11-17T13:20:19Z",
"pushed_at": "2020-11-16T22:32:12Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -36,13 +36,13 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2020-11-04T20:19:55Z",
"updated_at": "2020-11-17T11:14:58Z",
"pushed_at": "2020-07-24T17:54:54Z",
"stargazers_count": 469,
"watchers_count": 469,
"stargazers_count": 470,
"watchers_count": 470,
"forks_count": 115,
"forks": 115,
"watchers": 469,
"watchers": 470,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-17T07:58:03Z",
"updated_at": "2020-11-17T11:25:27Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 767,
"watchers_count": 767,
"forks_count": 184,
"forks": 184,
"watchers": 766,
"watchers": 767,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2020-11-06T14:04:19Z",
"updated_at": "2020-11-17T09:59:26Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 441,
"watchers_count": 441,
"stargazers_count": 440,
"watchers_count": 440,
"forks_count": 204,
"forks": 204,
"watchers": 441,
"watchers": 440,
"score": 0
},
{

View file

@ -2106,13 +2106,13 @@
"description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程",
"fork": false,
"created_at": "2019-09-07T05:15:23Z",
"updated_at": "2020-04-06T02:00:19Z",
"updated_at": "2020-11-17T15:10:29Z",
"pushed_at": "2019-09-20T04:53:41Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 14,
"forks": 14,
"watchers": 37,
"watchers": 38,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
"fork": false,
"created_at": "2019-04-05T12:53:52Z",
"updated_at": "2020-11-17T01:48:15Z",
"updated_at": "2020-11-17T14:42:20Z",
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 220,
"watchers_count": 220,
"stargazers_count": 221,
"watchers_count": 221,
"forks_count": 97,
"forks": 97,
"watchers": 220,
"watchers": 221,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Jackson Rce For CVE-2019-12384 ",
"fork": false,
"created_at": "2019-07-24T07:12:14Z",
"updated_at": "2020-11-16T19:35:45Z",
"updated_at": "2020-11-17T14:38:51Z",
"pushed_at": "2019-07-24T07:31:42Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 15,
"forks": 15,
"watchers": 68,
"watchers": 67,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2020-11-10T16:10:15Z",
"updated_at": "2020-11-17T14:42:06Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 26,
"forks": 26,
"watchers": 85,
"watchers": 86,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-17T06:26:35Z",
"updated_at": "2020-11-17T15:09:04Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2056,
"watchers_count": 2056,
"forks_count": 554,
"forks": 554,
"watchers": 2056,
"stargazers_count": 2058,
"watchers_count": 2058,
"forks_count": 555,
"forks": 555,
"watchers": 2058,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2020-10-28T06:04:16Z",
"updated_at": "2020-11-17T10:13:22Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 40,
"forks": 40,
"watchers": 61,
"watchers": 62,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-11-10T07:13:02Z",
"updated_at": "2020-11-17T09:11:55Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 511,
"watchers_count": 511,
"stargazers_count": 512,
"watchers_count": 512,
"forks_count": 121,
"forks": 121,
"watchers": 511,
"watchers": 512,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-17T07:58:03Z",
"updated_at": "2020-11-17T11:25:27Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 767,
"watchers_count": 767,
"forks_count": 184,
"forks": 184,
"watchers": 766,
"watchers": 767,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2020-10-22T09:55:46Z",
"updated_at": "2020-11-17T09:49:41Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 20,
"forks": 20,
"watchers": 48,
"watchers": 49,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2020-11-01T10:33:58Z",
"updated_at": "2020-11-17T14:53:06Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 63,
"forks": 63,
"watchers": 181,
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 62,
"forks": 62,
"watchers": 182,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-11-13T05:27:25Z",
"updated_at": "2020-11-17T12:24:25Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 234,
"watchers_count": 234,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 85,
"forks": 85,
"watchers": 234,
"watchers": 235,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
"fork": false,
"created_at": "2020-02-28T16:04:30Z",
"updated_at": "2020-11-11T05:58:02Z",
"updated_at": "2020-11-17T12:39:16Z",
"pushed_at": "2020-10-07T08:10:46Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 10,
"forks": 10,
"watchers": 20,
"watchers": 21,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-11-13T03:09:36Z",
"updated_at": "2020-11-17T12:11:12Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 241,
"watchers_count": 241,
"forks_count": 66,
"forks": 66,
"watchers": 240,
"watchers": 241,
"score": 0
},
{
@ -266,13 +266,13 @@
"description": "Exploitation Script for CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\"",
"fork": false,
"created_at": "2020-03-31T15:29:52Z",
"updated_at": "2020-10-19T15:20:34Z",
"updated_at": "2020-11-17T12:36:40Z",
"pushed_at": "2020-04-01T06:57:50Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"forks": 7,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -611,13 +611,13 @@
"description": "Advanced scanner for CVE-2020-0796 - SMBv3 RCE ",
"fork": false,
"created_at": "2020-03-14T02:07:16Z",
"updated_at": "2020-10-18T05:44:56Z",
"updated_at": "2020-11-17T14:47:44Z",
"pushed_at": "2020-08-09T13:15:48Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 10,
"watchers": 11,
"score": 0
},
{
@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-11-15T08:33:45Z",
"updated_at": "2020-11-17T09:42:43Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 1031,
"watchers_count": 1031,
"forks_count": 346,
"forks": 346,
"watchers": 1031,
"stargazers_count": 1032,
"watchers_count": 1032,
"forks_count": 347,
"forks": 347,
"watchers": 1032,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2020-11-17T07:16:47Z",
"updated_at": "2020-11-17T12:39:14Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 344,
"watchers_count": 344,
"forks_count": 61,
"forks": 61,
"watchers": 344,
"stargazers_count": 345,
"watchers_count": 345,
"forks_count": 60,
"forks": 60,
"watchers": 345,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-11-16T13:02:27Z",
"updated_at": "2020-11-17T13:44:20Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 220,
"watchers_count": 220,
"stargazers_count": 221,
"watchers_count": 221,
"forks_count": 85,
"forks": 85,
"watchers": 220,
"watchers": 221,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-17T06:26:35Z",
"updated_at": "2020-11-17T15:09:04Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2056,
"watchers_count": 2056,
"forks_count": 554,
"forks": 554,
"watchers": 2056,
"stargazers_count": 2058,
"watchers_count": 2058,
"forks_count": 555,
"forks": 555,
"watchers": 2058,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-11-17T09:04:26Z",
"updated_at": "2020-11-17T12:47:01Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 34,
"forks": 34,
"watchers": 183,
"stargazers_count": 184,
"watchers_count": 184,
"forks_count": 35,
"forks": 35,
"watchers": 184,
"score": 0
},
{
@ -481,5 +481,28 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 313643357,
"name": "CVE-2020-14882",
"full_name": "BabyTeam1024\/CVE-2020-14882",
"owner": {
"login": "BabyTeam1024",
"id": 74447452,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/74447452?v=4",
"html_url": "https:\/\/github.com\/BabyTeam1024"
},
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-11-17T14:23:23Z",
"updated_at": "2020-11-17T14:23:23Z",
"pushed_at": "2020-11-17T14:23:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Fix CVE-2020-15228 (set-env, add-path in Github-Actions)",
"fork": false,
"created_at": "2020-11-12T11:59:47Z",
"updated_at": "2020-11-16T10:31:53Z",
"updated_at": "2020-11-17T14:06:12Z",
"pushed_at": "2020-11-16T10:31:51Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-15999",
"fork": false,
"created_at": "2020-10-28T16:16:25Z",
"updated_at": "2020-11-16T10:46:21Z",
"updated_at": "2020-11-17T11:48:50Z",
"pushed_at": "2020-11-03T17:53:20Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 6,
"forks": 6,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -174,13 +174,13 @@
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
"fork": false,
"created_at": "2020-10-16T23:03:15Z",
"updated_at": "2020-11-02T17:37:16Z",
"updated_at": "2020-11-17T13:20:45Z",
"pushed_at": "2020-10-16T23:12:52Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 2,
"forks": 2,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-11-15T13:05:44Z",
"updated_at": "2020-11-17T12:37:47Z",
"pushed_at": "2020-06-10T10:49:38Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 27,
"forks": 27,
"watchers": 117,
"watchers": 118,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-17T07:58:03Z",
"updated_at": "2020-11-17T11:25:27Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 767,
"watchers_count": 767,
"forks_count": 184,
"forks": 184,
"watchers": 766,
"watchers": 767,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2020-11-14T14:26:59Z",
"updated_at": "2020-11-17T09:44:11Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 32,
"forks": 32,
"watchers": 164,
"watchers": 165,
"score": 0
},
{

View file

@ -2311,6 +2311,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [AirEvan/CVE-2020-14882-GUI-Test](https://github.com/AirEvan/CVE-2020-14882-GUI-Test)
- [corelight/CVE-2020-14882-weblogicRCE](https://github.com/corelight/CVE-2020-14882-weblogicRCE)
- [x51/CVE-2020-14882](https://github.com/x51/CVE-2020-14882)
- [BabyTeam1024/CVE-2020-14882](https://github.com/BabyTeam1024/CVE-2020-14882)
### CVE-2020-14883 (2020-10-21)
@ -11718,6 +11719,7 @@ Huawei HG532 with some customized versions has a remote code execution vulnerabi
</code>
- [1337g/CVE-2017-17215](https://github.com/1337g/CVE-2017-17215)
- [wilfred-wulbou/HG532d-RCE-Exploit](https://github.com/wilfred-wulbou/HG532d-RCE-Exploit)
### CVE-2017-17309 (2018-06-14)