Auto Update 2020/05/28 12:07:49

This commit is contained in:
motikan2010-bot 2020-05-28 12:07:49 +09:00
parent f587f3ebc3
commit 1bfc59ea86
19 changed files with 80 additions and 80 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-27T05:21:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-08-22T01:20:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Tool to try multiple paths for PHPunit RCE CVE-2017-9841",
"fork": false,
"created_at": "2020-05-18T20:55:05Z",
"updated_at": "2020-05-25T11:09:50Z",
"updated_at": "2020-05-27T22:20:12Z",
"pushed_at": "2020-05-19T09:24:38Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Microsoft Windows 8.1 & 2012 R2 SMBv3 Null Pointer Dereference Denial of Service",
"fork": false,
"created_at": "2018-03-21T03:00:37Z",
"updated_at": "2018-08-15T06:47:53Z",
"updated_at": "2020-05-28T02:29:47Z",
"pushed_at": "2018-03-21T08:42:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
"fork": false,
"created_at": "2019-04-05T12:53:52Z",
"updated_at": "2020-05-20T06:48:35Z",
"updated_at": "2020-05-28T00:02:09Z",
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 219,
"watchers_count": 219,
"stargazers_count": 220,
"watchers_count": 220,
"forks_count": 95,
"forks": 95,
"watchers": 219,
"watchers": 220,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-05T23:33:21Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 18,
"forks": 18,
"forks_count": 17,
"forks": 17,
"watchers": 20,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-27T18:51:46Z",
"updated_at": "2020-05-28T02:08:17Z",
"pushed_at": "2020-05-27T10:27:11Z",
"stargazers_count": 784,
"watchers_count": 784,
"forks_count": 179,
"forks": 179,
"watchers": 784,
"stargazers_count": 787,
"watchers_count": 787,
"forks_count": 180,
"forks": 180,
"watchers": 787,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-05-01T20:00:12Z",
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 31,
"forks": 31,
"forks_count": 32,
"forks": 32,
"watchers": 137,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-05-18T18:36:55Z",
"updated_at": "2020-05-28T02:11:27Z",
"pushed_at": "2020-02-17T13:28:02Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 30,
"forks": 30,
"watchers": 83,
"watchers": 84,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2020-05-18T10:42:55Z",
"updated_at": "2020-05-27T21:42:27Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 510,
"watchers_count": 510,
"forks_count": 105,
"forks": 105,
"watchers": 510,
"stargazers_count": 509,
"watchers_count": 509,
"forks_count": 106,
"forks": 106,
"watchers": 509,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :).",
"fork": false,
"created_at": "2019-09-17T17:59:26Z",
"updated_at": "2020-05-24T13:24:13Z",
"updated_at": "2020-05-28T02:27:14Z",
"pushed_at": "2019-10-15T17:05:38Z",
"stargazers_count": 267,
"watchers_count": 267,
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 47,
"forks": 47,
"watchers": 267,
"watchers": 268,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2020-05-08T04:47:07Z",
"updated_at": "2020-05-27T21:48:36Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 9,
"forks": 9,
"watchers": 63,
"watchers": 64,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
"fork": false,
"created_at": "2020-03-12T19:33:18Z",
"updated_at": "2020-05-18T14:17:46Z",
"updated_at": "2020-05-28T02:53:31Z",
"pushed_at": "2020-03-13T07:38:43Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 16,
"forks": 16,
"watchers": 41,
"watchers": 42,
"score": 0
},
{
@ -1117,13 +1117,13 @@
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
"fork": false,
"created_at": "2020-04-06T15:16:10Z",
"updated_at": "2020-05-27T11:48:07Z",
"updated_at": "2020-05-28T03:08:48Z",
"pushed_at": "2020-04-06T15:22:01Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 12,
"forks": 12,
"watchers": 49,
"watchers": 50,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-10204 远程命令执行脚本",
"fork": false,
"created_at": "2020-05-27T06:55:54Z",
"updated_at": "2020-05-27T07:54:14Z",
"updated_at": "2020-05-28T01:37:19Z",
"pushed_at": "2020-05-27T07:10:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-10T22:35:46Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-27T18:51:46Z",
"updated_at": "2020-05-28T02:08:17Z",
"pushed_at": "2020-05-27T10:27:11Z",
"stargazers_count": 784,
"watchers_count": 784,
"forks_count": 179,
"forks": 179,
"watchers": 784,
"stargazers_count": 787,
"watchers_count": 787,
"forks_count": 180,
"forks": 180,
"watchers": 787,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-27T18:11:18Z",
"updated_at": "2020-05-27T20:44:38Z",
"pushed_at": "2020-05-27T20:44:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2020-05-28T02:33:04Z",
"pushed_at": "2020-05-27T21:22:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -178,8 +178,8 @@
"pushed_at": "2020-05-17T12:07:01Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"score": 0
},
@ -201,8 +201,8 @@
"pushed_at": "2020-05-26T06:58:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}

View file

@ -13,7 +13,7 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2020-05-27T13:22:06Z",
"updated_at": "2020-05-28T02:09:52Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 178,
"watchers_count": 178,
@ -82,13 +82,13 @@
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
"fork": false,
"created_at": "2020-05-21T14:30:46Z",
"updated_at": "2020-05-27T15:28:48Z",
"updated_at": "2020-05-28T01:39:07Z",
"pushed_at": "2020-05-21T15:13:22Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 12,
"forks": 12,
"watchers": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 13,
"forks": 13,
"watchers": 27,
"score": 0
}
]