Auto Update 2020/11/27 00:10:43

This commit is contained in:
motikan2010-bot 2020-11-27 00:10:43 +09:00
parent 163c54e4c5
commit 1692106e40
27 changed files with 127 additions and 103 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-26T03:19:00Z",
"updated_at": "2020-11-26T13:56:11Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 791,
"watchers_count": 791,
"forks_count": 190,
"forks": 190,
"watchers": 788,
"watchers": 791,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-26T03:19:00Z",
"updated_at": "2020-11-26T13:56:11Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 791,
"watchers_count": 791,
"forks_count": 190,
"forks": 190,
"watchers": 788,
"watchers": 791,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "A collection of tools for the Janus exploit [CVE-2017-13156].",
"fork": false,
"created_at": "2019-08-25T16:31:16Z",
"updated_at": "2020-07-11T12:37:59Z",
"updated_at": "2020-11-26T10:13:27Z",
"pushed_at": "2019-10-22T20:04:08Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-26T03:19:00Z",
"updated_at": "2020-11-26T13:56:11Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 791,
"watchers_count": 791,
"forks_count": 190,
"forks": 190,
"watchers": 788,
"watchers": 791,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-13379",
"fork": false,
"created_at": "2019-08-11T09:44:37Z",
"updated_at": "2020-11-25T07:47:33Z",
"updated_at": "2020-11-26T13:48:04Z",
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 208,
"watchers_count": 208,
"stargazers_count": 209,
"watchers_count": 209,
"forks_count": 78,
"forks": 78,
"watchers": 208,
"watchers": 209,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-26T03:19:00Z",
"updated_at": "2020-11-26T13:56:11Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 791,
"watchers_count": 791,
"forks_count": 190,
"forks": 190,
"watchers": 788,
"watchers": 791,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "cve-2018-2894 不同别人的利用方法。",
"fork": false,
"created_at": "2018-07-19T15:50:35Z",
"updated_at": "2019-08-26T16:40:33Z",
"updated_at": "2020-11-26T11:40:23Z",
"pushed_at": "2018-07-22T08:34:27Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 7,
"forks": 7,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-10-26T17:54:54Z",
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 41,
"forks": 41,
"forks_count": 42,
"forks": 42,
"watchers": 93,
"score": 0
},

View file

@ -289,13 +289,13 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
"updated_at": "2020-09-08T12:30:17Z",
"updated_at": "2020-11-26T12:35:55Z",
"pushed_at": "2020-10-01T11:51:46Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 53,
"forks": 53,
"watchers": 76,
"watchers": 77,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 446,
"watchers_count": 446,
"forks_count": 146,
"forks": 146,
"forks_count": 145,
"forks": 145,
"watchers": 446,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
"fork": false,
"created_at": "2019-08-12T07:17:21Z",
"updated_at": "2020-11-17T07:36:25Z",
"updated_at": "2020-11-26T13:31:12Z",
"pushed_at": "2020-07-08T06:51:47Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 9,
"forks": 9,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-11-24T18:20:03Z",
"updated_at": "2020-11-26T10:55:05Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 242,
"watchers_count": 242,
"forks_count": 49,
"forks": 49,
"watchers": 242,
"stargazers_count": 243,
"watchers_count": 243,
"forks_count": 50,
"forks": 50,
"watchers": 243,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1619,
"watchers_count": 1619,
"forks_count": 236,
"forks": 236,
"forks_count": 237,
"forks": 237,
"watchers": 1619,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-26T06:47:51Z",
"updated_at": "2020-11-26T09:10:56Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2091,
"watchers_count": 2091,
"stargazers_count": 2092,
"watchers_count": 2092,
"forks_count": 578,
"forks": 578,
"watchers": 2091,
"watchers": 2092,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-11-24T16:15:34Z",
"updated_at": "2020-11-26T11:36:17Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 672,
"watchers_count": 672,
"stargazers_count": 673,
"watchers_count": 673,
"forks_count": 140,
"forks": 140,
"watchers": 672,
"watchers": 673,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-26T03:19:00Z",
"updated_at": "2020-11-26T13:56:11Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 791,
"watchers_count": 791,
"forks_count": 190,
"forks": 190,
"watchers": 788,
"watchers": 791,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :).",
"fork": false,
"created_at": "2019-09-17T17:59:26Z",
"updated_at": "2020-10-23T08:58:56Z",
"updated_at": "2020-11-26T09:24:49Z",
"pushed_at": "2019-10-15T17:05:38Z",
"stargazers_count": 279,
"watchers_count": 279,
"stargazers_count": 278,
"watchers_count": 278,
"forks_count": 45,
"forks": 45,
"watchers": 279,
"watchers": 278,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-07T06:34:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-11-24T15:26:07Z",
"updated_at": "2020-11-26T13:09:47Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 458,
"watchers_count": 458,
"stargazers_count": 460,
"watchers_count": 460,
"forks_count": 107,
"forks": 107,
"watchers": 458,
"watchers": 460,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
"fork": false,
"created_at": "2020-11-23T10:24:07Z",
"updated_at": "2020-11-26T08:26:29Z",
"updated_at": "2020-11-26T10:22:53Z",
"pushed_at": "2020-11-23T11:20:28Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 11,
"forks": 11,
"watchers": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 12,
"forks": 12,
"watchers": 53,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2020-11-16T22:35:47Z",
"updated_at": "2020-11-26T10:07:23Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 49,
"forks": 49,
"watchers": 216,
"stargazers_count": 217,
"watchers_count": 217,
"forks_count": 50,
"forks": 50,
"watchers": 217,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2020-11-18T10:29:47Z",
"updated_at": "2020-11-23T15:26:11Z",
"updated_at": "2020-11-26T13:20:13Z",
"pushed_at": "2020-11-19T01:57:11Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -13,13 +13,13 @@
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
"fork": false,
"created_at": "2020-07-20T03:27:24Z",
"updated_at": "2020-11-09T08:40:45Z",
"updated_at": "2020-11-26T14:36:52Z",
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 12,
"forks": 12,
"watchers": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 13,
"forks": 13,
"watchers": 77,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
"fork": false,
"created_at": "2020-10-14T14:42:52Z",
"updated_at": "2020-11-26T02:29:48Z",
"updated_at": "2020-11-26T13:45:57Z",
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-26T03:19:00Z",
"updated_at": "2020-11-26T13:56:11Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 791,
"watchers_count": 791,
"forks_count": 190,
"forks": 190,
"watchers": 788,
"watchers": 791,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 33,
"forks": 33,
"forks_count": 32,
"forks": 32,
"watchers": 165,
"score": 0
},
@ -113,5 +113,28 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 316249865,
"name": "CVE-2020-2883",
"full_name": "Al1ex\/CVE-2020-2883",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-2883",
"description": "CVE-2020-2883",
"fork": false,
"created_at": "2020-11-26T14:10:25Z",
"updated_at": "2020-11-26T14:32:08Z",
"pushed_at": "2020-11-26T14:32:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-8597 pppd buffer overflow poc",
"fork": false,
"created_at": "2020-03-07T19:00:46Z",
"updated_at": "2020-11-25T11:20:45Z",
"updated_at": "2020-11-26T15:03:36Z",
"pushed_at": "2020-03-12T11:10:31Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 5,
"forks": 5,
"watchers": 34,
"watchers": 36,
"score": 0
},
{

View file

@ -724,6 +724,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [ZZZWD/CVE-2020-2883](https://github.com/ZZZWD/CVE-2020-2883)
- [Y4er/WebLogic-Shiro-shell](https://github.com/Y4er/WebLogic-Shiro-shell)
- [FancyDoesSecurity/CVE-2020-2883](https://github.com/FancyDoesSecurity/CVE-2020-2883)
- [Al1ex/CVE-2020-2883](https://github.com/Al1ex/CVE-2020-2883)
### CVE-2020-3153 (2020-02-19)