Auto Update 2021/01/13 00:10:08

This commit is contained in:
motikan2010-bot 2021-01-13 00:10:08 +09:00
parent 747acdf32e
commit 0fd06c4329
26 changed files with 120 additions and 96 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-12T08:23:55Z",
"updated_at": "2021-01-12T10:07:22Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 876,
"watchers_count": 876,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 208,
"forks": 208,
"watchers": 876,
"watchers": 877,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-12T08:23:55Z",
"updated_at": "2021-01-12T10:07:22Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 876,
"watchers_count": 876,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 208,
"forks": 208,
"watchers": 876,
"watchers": 877,
"score": 0
},
{

View file

@ -243,8 +243,8 @@
"description": "CVE-2017-12615 任意文件写入exp写入webshell",
"fork": false,
"created_at": "2021-01-12T09:07:12Z",
"updated_at": "2021-01-12T09:07:16Z",
"pushed_at": "2021-01-12T09:07:14Z",
"updated_at": "2021-01-12T09:20:00Z",
"pushed_at": "2021-01-12T09:19:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-12T08:23:55Z",
"updated_at": "2021-01-12T10:07:22Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 876,
"watchers_count": 876,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 208,
"forks": 208,
"watchers": 876,
"watchers": 877,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
"fork": false,
"created_at": "2018-07-10T09:51:40Z",
"updated_at": "2018-07-17T08:13:36Z",
"updated_at": "2021-01-12T12:20:23Z",
"pushed_at": "2018-07-17T08:13:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-12T08:23:55Z",
"updated_at": "2021-01-12T10:07:22Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 876,
"watchers_count": 876,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 208,
"forks": 208,
"watchers": 876,
"watchers": 877,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-01-09T14:31:00Z",
"updated_at": "2021-01-12T09:30:59Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 350,
"watchers_count": 350,
"stargazers_count": 351,
"watchers_count": 351,
"forks_count": 81,
"forks": 81,
"watchers": 350,
"watchers": 351,
"score": 0
}
]

View file

@ -473,8 +473,8 @@
"description": null,
"fork": false,
"created_at": "2020-10-18T14:01:59Z",
"updated_at": "2021-01-11T20:29:36Z",
"pushed_at": "2021-01-11T20:29:34Z",
"updated_at": "2021-01-12T12:04:27Z",
"pushed_at": "2021-01-12T12:04:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-12T07:44:33Z",
"updated_at": "2021-01-12T14:38:52Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2252,
"watchers_count": 2252,
"stargazers_count": 2255,
"watchers_count": 2255,
"forks_count": 638,
"forks": 638,
"watchers": 2252,
"watchers": 2255,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2021-01-09T22:05:56Z",
"updated_at": "2021-01-12T13:04:44Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 41,
"forks": 41,
"watchers": 69,
"watchers": 70,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-12T08:23:55Z",
"updated_at": "2021-01-12T10:07:22Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 876,
"watchers_count": 876,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 208,
"forks": 208,
"watchers": 876,
"watchers": 877,
"score": 0
}
]

View file

@ -910,13 +910,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-01-09T13:41:47Z",
"updated_at": "2021-01-12T14:17:52Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1060,
"watchers_count": 1060,
"stargazers_count": 1059,
"watchers_count": 1059,
"forks_count": 355,
"forks": 355,
"watchers": 1060,
"watchers": 1059,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
"fork": false,
"created_at": "2020-04-05T15:52:43Z",
"updated_at": "2021-01-02T12:06:35Z",
"updated_at": "2021-01-12T14:17:53Z",
"pushed_at": "2020-06-09T20:41:32Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 41,
"forks": 41,
"watchers": 128,
"watchers": 127,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-01-11T08:20:34Z",
"updated_at": "2021-01-12T12:54:28Z",
"pushed_at": "2020-11-04T17:33:15Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 12,
"forks": 12,
"watchers": 41,
"watchers": 40,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1221,
"watchers_count": 1221,
"forks_count": 281,
"forks": 281,
"forks_count": 282,
"forks": 282,
"watchers": 1221,
"score": 0
},
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-01-07T06:17:59Z",
"updated_at": "2021-01-12T10:24:11Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 730,
"watchers_count": 730,
"stargazers_count": 731,
"watchers_count": 731,
"forks_count": 210,
"forks": 210,
"watchers": 730,
"watchers": 731,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-12T07:44:33Z",
"updated_at": "2021-01-12T14:38:52Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2252,
"watchers_count": 2252,
"stargazers_count": 2255,
"watchers_count": 2255,
"forks_count": 638,
"forks": 638,
"watchers": 2252,
"watchers": 2255,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-12T08:45:47Z",
"updated_at": "2021-01-12T13:31:16Z",
"pushed_at": "2021-01-11T09:03:04Z",
"stargazers_count": 733,
"watchers_count": 733,
"forks_count": 128,
"forks": 128,
"watchers": 733,
"stargazers_count": 736,
"watchers_count": 736,
"forks_count": 129,
"forks": 129,
"watchers": 736,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-16012, a timing side channel in drawImage in Firefox & Chrome",
"fork": false,
"created_at": "2020-11-14T21:32:15Z",
"updated_at": "2021-01-11T20:53:19Z",
"updated_at": "2021-01-12T09:25:11Z",
"pushed_at": "2021-01-11T17:57:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-06T23:51:32Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 11,
"forks": 11,
"forks_count": 12,
"forks": 12,
"watchers": 33,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-12T08:23:55Z",
"updated_at": "2021-01-12T10:07:22Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 876,
"watchers_count": 876,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 208,
"forks": 208,
"watchers": 876,
"watchers": 877,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-11-03T17:14:22Z",
"updated_at": "2020-12-26T02:17:37Z",
"pushed_at": "2020-11-25T16:03:18Z",
"pushed_at": "2021-01-12T10:11:42Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 14,

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
"fork": false,
"created_at": "2021-01-10T06:47:49Z",
"updated_at": "2021-01-12T07:34:24Z",
"updated_at": "2021-01-12T10:55:55Z",
"pushed_at": "2021-01-10T06:48:53Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 5,
"forks": 5,
"watchers": 40,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 6,
"forks": 6,
"watchers": 42,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-36188 &&Jackson-databind RCE",
"fork": false,
"created_at": "2021-01-11T06:29:38Z",
"updated_at": "2021-01-12T07:43:16Z",
"updated_at": "2021-01-12T11:01:10Z",
"pushed_at": "2021-01-11T06:29:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -90,5 +90,28 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 328976450,
"name": "CVE-2020-8165",
"full_name": "macosta-42\/CVE-2020-8165",
"owner": {
"login": "macosta-42",
"id": 64427620,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/64427620?v=4",
"html_url": "https:\/\/github.com\/macosta-42"
},
"html_url": "https:\/\/github.com\/macosta-42\/CVE-2020-8165",
"description": null,
"fork": false,
"created_at": "2021-01-12T12:14:17Z",
"updated_at": "2021-01-12T12:37:41Z",
"pushed_at": "2021-01-12T12:37:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -132,8 +132,8 @@
"pushed_at": "2020-06-10T07:08:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-1056",
"fork": false,
"created_at": "2021-01-08T11:29:48Z",
"updated_at": "2021-01-11T02:11:51Z",
"pushed_at": "2021-01-10T05:34:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2021-01-12T14:02:07Z",
"pushed_at": "2021-01-12T09:21:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1334,6 +1334,7 @@ A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.
- [umiterkol/CVE-2020-8165--Auto-Shell](https://github.com/umiterkol/CVE-2020-8165--Auto-Shell)
- [taipansec/CVE-2020-8165](https://github.com/taipansec/CVE-2020-8165)
- [hybryx/CVE-2020-8165](https://github.com/hybryx/CVE-2020-8165)
- [macosta-42/CVE-2020-8165](https://github.com/macosta-42/CVE-2020-8165)
### CVE-2020-8175 (2020-07-24)