Auto Update 2020/04/17 06:08:48

This commit is contained in:
motikan2010-bot 2020-04-17 06:08:48 +09:00
parent 732d72d8fc
commit 0dc25716a9
23 changed files with 170 additions and 122 deletions

View file

@ -13,13 +13,13 @@
"description": "PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules",
"fork": false,
"created_at": "2018-05-30T22:56:29Z",
"updated_at": "2020-03-27T10:32:44Z",
"updated_at": "2020-04-16T15:11:16Z",
"pushed_at": "2018-06-03T18:55:07Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 23,
"forks": 23,
"watchers": 43,
"watchers": 42,
"score": 0
},
{

View file

@ -289,13 +289,13 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
"updated_at": "2020-03-12T04:44:23Z",
"updated_at": "2020-04-16T16:14:48Z",
"pushed_at": "2019-05-05T15:49:44Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 44,
"forks": 44,
"watchers": 71,
"watchers": 72,
"score": 0
},
{

View file

@ -270,8 +270,8 @@
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 27,
"forks": 27,
"forks_count": 28,
"forks": 28,
"watchers": 73,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2020-04-16T09:23:19Z",
"updated_at": "2020-04-16T15:58:03Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 436,
"watchers_count": 436,
"stargazers_count": 437,
"watchers_count": 437,
"forks_count": 197,
"forks": 197,
"watchers": 436,
"watchers": 437,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2020-04-14T23:48:51Z",
"updated_at": "2020-04-16T16:42:55Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 306,
"watchers_count": 306,
"stargazers_count": 307,
"watchers_count": 307,
"forks_count": 113,
"forks": 113,
"watchers": 306,
"watchers": 307,
"score": 0
},
{
@ -205,5 +205,28 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 256271162,
"name": "check-your-pulse",
"full_name": "cisagov\/check-your-pulse",
"owner": {
"login": "cisagov",
"id": 18539691,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/18539691?v=4",
"html_url": "https:\/\/github.com\/cisagov"
},
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2020-04-16T17:01:01Z",
"pushed_at": "2020-04-16T17:00:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Poc for CVE-2019-1253",
"fork": false,
"created_at": "2019-09-11T20:40:15Z",
"updated_at": "2020-04-16T09:41:10Z",
"updated_at": "2020-04-16T17:11:17Z",
"pushed_at": "2019-09-12T14:43:47Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"forks_count": 37,
"forks": 37,
"watchers": 121,
"watchers": 122,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-14040",
"fork": false,
"created_at": "2020-02-03T23:04:49Z",
"updated_at": "2020-04-16T04:00:46Z",
"updated_at": "2020-04-16T17:18:36Z",
"pushed_at": "2020-04-15T14:27:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-14041",
"fork": false,
"created_at": "2020-02-03T23:05:10Z",
"updated_at": "2020-04-15T18:31:06Z",
"updated_at": "2020-04-16T17:19:31Z",
"pushed_at": "2020-04-15T14:28:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -91,6 +91,29 @@
"watchers": 18,
"score": 0
},
{
"id": 214698783,
"name": "CVE-2019-16759",
"full_name": "FarjaalAhmad\/CVE-2019-16759",
"owner": {
"login": "FarjaalAhmad",
"id": 45895453,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45895453?v=4",
"html_url": "https:\/\/github.com\/FarjaalAhmad"
},
"html_url": "https:\/\/github.com\/FarjaalAhmad\/CVE-2019-16759",
"description": "Interactive-Like Command-Line Console for CVE-2019-16759",
"fork": false,
"created_at": "2019-10-12T18:51:16Z",
"updated_at": "2020-04-16T18:56:32Z",
"pushed_at": "2019-10-12T18:56:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 230790251,
"name": "pwn-vbulletin",

View file

@ -887,13 +887,13 @@
"description": "Gather a list of Citrix appliances in a country \/ state pair, and check if they're vulnerable to CVE-2019-19781",
"fork": false,
"created_at": "2020-03-08T10:42:20Z",
"updated_at": "2020-03-16T04:29:53Z",
"updated_at": "2020-04-16T15:33:28Z",
"pushed_at": "2020-03-08T11:06:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -174,13 +174,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-16T14:24:04Z",
"updated_at": "2020-04-16T15:43:48Z",
"pushed_at": "2020-04-16T09:51:34Z",
"stargazers_count": 528,
"watchers_count": 528,
"stargazers_count": 529,
"watchers_count": 529,
"forks_count": 103,
"forks": 103,
"watchers": 528,
"watchers": 529,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "File Content Disclosure on Rails Test Case - CVE-2019-5418",
"fork": false,
"created_at": "2019-03-18T16:09:13Z",
"updated_at": "2019-08-26T16:40:57Z",
"updated_at": "2020-04-16T19:56:26Z",
"pushed_at": "2019-03-18T16:15:25Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"watchers": 6,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-04-15T14:39:19Z",
"updated_at": "2020-04-16T20:32:50Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 36,
"forks": 36,
"watchers": 158,
"watchers": 159,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-11T21:34:28Z",
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 40,
"forks": 40,
"forks_count": 41,
"forks": 41,
"watchers": 197,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-15T17:41:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-04-16T06:34:09Z",
"updated_at": "2020-04-16T19:50:33Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 427,
"watchers_count": 427,
"stargazers_count": 428,
"watchers_count": 428,
"forks_count": 121,
"forks": 121,
"watchers": 427,
"watchers": 428,
"score": 0
},
{
@ -979,13 +979,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-16T06:35:22Z",
"updated_at": "2020-04-16T15:54:07Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 825,
"watchers_count": 825,
"stargazers_count": 826,
"watchers_count": 826,
"forks_count": 232,
"forks": 232,
"watchers": 825,
"watchers": 826,
"score": 0
},
{
@ -1172,29 +1172,6 @@
"watchers": 46,
"score": 0
},
{
"id": 253536195,
"name": "CVE-2020-0796-scanner",
"full_name": "sivak1rl\/CVE-2020-0796-scanner",
"owner": {
"login": "sivak1rl",
"id": 8893063,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8893063?v=4",
"html_url": "https:\/\/github.com\/sivak1rl"
},
"html_url": "https:\/\/github.com\/sivak1rl\/CVE-2020-0796-scanner",
"description": null,
"fork": false,
"created_at": "2020-04-06T15:18:11Z",
"updated_at": "2020-04-06T15:18:11Z",
"pushed_at": "2020-04-06T15:18:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 253927600,
"name": "cve-2020-0796",

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-16T14:24:04Z",
"updated_at": "2020-04-16T15:43:48Z",
"pushed_at": "2020-04-16T09:51:34Z",
"stargazers_count": 528,
"watchers_count": 528,
"forks_count": 103,
"forks": 103,
"watchers": 528,
"stargazers_count": 529,
"watchers_count": 529,
"forks_count": 102,
"forks": 102,
"watchers": 529,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Nexus <= 3.21.1 远程代码执行脚本(无回显)",
"fork": false,
"created_at": "2020-04-16T09:40:15Z",
"updated_at": "2020-04-16T09:44:28Z",
"updated_at": "2020-04-16T15:30:03Z",
"pushed_at": "2020-04-16T09:44:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-04-16T13:12:27Z",
"updated_at": "2020-04-16T18:26:26Z",
"pushed_at": "2020-04-16T11:34:13Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 6,
"forks": 6,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-04-16T01:20:30Z",
"updated_at": "2020-04-16T19:26:45Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 41,
"forks": 41,
"watchers": 168,
"watchers": 169,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-2555 Python POC",
"fork": false,
"created_at": "2020-03-06T16:02:59Z",
"updated_at": "2020-04-16T13:38:34Z",
"updated_at": "2020-04-16T15:30:09Z",
"pushed_at": "2020-04-16T12:04:18Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 14,
"forks": 14,
"watchers": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 15,
"forks": 15,
"watchers": 28,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-15T00:13:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"score": 0
},
@ -40,8 +40,8 @@
"pushed_at": "2020-04-15T22:23:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-04-16T15:06:50Z",
"updated_at": "2020-04-16T20:46:04Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 8,
"forks": 8,
"watchers": 22,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku",
"fork": false,
"created_at": "2020-04-15T10:16:56Z",
"updated_at": "2020-04-16T13:16:07Z",
"updated_at": "2020-04-16T16:39:11Z",
"pushed_at": "2020-04-16T09:47:38Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,
"forks": 6,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -44,5 +44,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 256267905,
"name": "CVE-2020-5260",
"full_name": "sv3nbeast\/CVE-2020-5260",
"owner": {
"login": "sv3nbeast",
"id": 55974091,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/55974091?v=4",
"html_url": "https:\/\/github.com\/sv3nbeast"
},
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-5260",
"description": "CVE-2020-5260演示记录",
"fork": false,
"created_at": "2020-04-16T16:19:23Z",
"updated_at": "2020-04-16T17:01:04Z",
"pushed_at": "2020-04-16T17:01:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -235,7 +235,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [eastmountyxz/CVE-2020-0796-SMB](https://github.com/eastmountyxz/CVE-2020-0796-SMB)
- [LabDookhtegan/CVE-2020-0796-EXP](https://github.com/LabDookhtegan/CVE-2020-0796-EXP)
- [Rvn0xsy/CVE_2020_0796_CNA](https://github.com/Rvn0xsy/CVE_2020_0796_CNA)
- [sivak1rl/CVE-2020-0796-scanner](https://github.com/sivak1rl/CVE-2020-0796-scanner)
- [0xeb-bp/cve-2020-0796](https://github.com/0xeb-bp/cve-2020-0796)
- [intelliroot-tech/cve-2020-0796-Scanner](https://github.com/intelliroot-tech/cve-2020-0796-Scanner)
- [curtbraz/CVE-2020-0796](https://github.com/curtbraz/CVE-2020-0796)
@ -522,6 +521,7 @@ Affected versions of Git have a vulnerability whereby Git can be tricked into se
- [brompwnie/cve-2020-5260](https://github.com/brompwnie/cve-2020-5260)
- [Asgavar/CVE-2020-5260](https://github.com/Asgavar/CVE-2020-5260)
- [sv3nbeast/CVE-2020-5260](https://github.com/sv3nbeast/CVE-2020-5260)
### CVE-2020-5267
@ -1400,6 +1400,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7
- [jason3e7/CVE-2019-11510](https://github.com/jason3e7/CVE-2019-11510)
- [BishopFox/pwn-pulse](https://github.com/BishopFox/pwn-pulse)
- [aqhmal/pulsexploit](https://github.com/aqhmal/pulsexploit)
- [cisagov/check-your-pulse](https://github.com/cisagov/check-your-pulse)
### CVE-2019-11523
@ -2487,6 +2488,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
- [M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit](https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit)
- [r00tpgp/http-vuln-CVE-2019-16759](https://github.com/r00tpgp/http-vuln-CVE-2019-16759)
- [jas502n/CVE-2019-16759](https://github.com/jas502n/CVE-2019-16759)
- [FarjaalAhmad/CVE-2019-16759](https://github.com/FarjaalAhmad/CVE-2019-16759)
- [andripwn/pwn-vbulletin](https://github.com/andripwn/pwn-vbulletin)
- [psychoxploit/vbull](https://github.com/psychoxploit/vbull)