Auto Update 2020/04/23 18:08:11

This commit is contained in:
motikan2010-bot 2020-04-23 18:08:11 +09:00
parent 90c78f8c0c
commit 1e544d9295
34 changed files with 177 additions and 201 deletions

View file

@ -45,29 +45,6 @@
"watchers": 0,
"score": 0
},
{
"id": 162499093,
"name": "CVE-2003-0264",
"full_name": "war4uthor\/CVE-2003-0264",
"owner": {
"login": "war4uthor",
"id": 45926018,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor"
},
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2003-0264",
"description": "CVE-2003-0264 - SLMail 5.5 POP3 'PASS' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",
"fork": false,
"created_at": "2018-12-19T22:49:13Z",
"updated_at": "2018-12-19T22:50:49Z",
"pushed_at": "2018-12-19T22:50:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247077498,
"name": "CVE-2003-0264-SLmail-5.5",

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-22T01:58:13Z",
"updated_at": "2020-04-23T06:55:09Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 379,
"watchers_count": 379,
"forks_count": 81,
"forks": 81,
"watchers": 379,
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 82,
"forks": 82,
"watchers": 382,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-22T01:58:13Z",
"updated_at": "2020-04-23T06:55:09Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 379,
"watchers_count": 379,
"forks_count": 81,
"forks": 81,
"watchers": 379,
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 82,
"forks": 82,
"watchers": 382,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-04-18T08:40:04Z",
"updated_at": "2020-04-23T06:25:49Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"forks_count": 63,
"forks": 63,
"watchers": 185,
"watchers": 186,
"score": 0
},
{
@ -519,13 +519,13 @@
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2020-04-14T11:25:15Z",
"updated_at": "2020-04-23T08:22:37Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 37,
"forks": 37,
"watchers": 99,
"watchers": 100,
"score": 0
},
{
@ -565,13 +565,13 @@
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm",
"fork": false,
"created_at": "2019-04-25T12:33:31Z",
"updated_at": "2020-03-26T14:53:53Z",
"updated_at": "2020-04-23T06:14:31Z",
"pushed_at": "2019-04-25T12:44:02Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 51,
"forks": 51,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 462,
"watchers_count": 462,
"forks_count": 197,
"forks": 197,
"forks_count": 196,
"forks": 196,
"watchers": 462,
"score": 0
},
@ -335,13 +335,13 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2020-04-06T19:52:49Z",
"updated_at": "2020-04-23T03:45:50Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 61,
"forks": 61,
"watchers": 147,
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 62,
"forks": 62,
"watchers": 148,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-22T01:58:13Z",
"updated_at": "2020-04-23T06:55:09Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 379,
"watchers_count": 379,
"forks_count": 81,
"forks": 81,
"watchers": 379,
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 82,
"forks": 82,
"watchers": 382,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2020-04-22T22:14:48Z",
"updated_at": "2020-04-23T06:38:58Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 658,
"watchers_count": 658,
"stargazers_count": 659,
"watchers_count": 659,
"forks_count": 175,
"forks": 175,
"watchers": 658,
"watchers": 659,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "CVE 2017-9805",
"fork": false,
"created_at": "2017-09-06T08:32:01Z",
"updated_at": "2020-03-29T03:08:28Z",
"updated_at": "2020-04-23T03:06:13Z",
"pushed_at": "2017-09-08T06:27:31Z",
"stargazers_count": 47,
"watchers_count": 47,

View file

@ -59,13 +59,13 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2020-04-06T19:52:49Z",
"updated_at": "2020-04-23T03:45:50Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 61,
"forks": 61,
"watchers": 147,
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 62,
"forks": 62,
"watchers": 148,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "Fully functional script for brute forcing SSH and trying credentials - CVE-2018-15473",
"fork": false,
"created_at": "2018-10-31T03:23:46Z",
"updated_at": "2018-12-05T12:04:41Z",
"updated_at": "2020-04-23T05:36:20Z",
"pushed_at": "2018-12-05T12:04:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-22T01:58:13Z",
"updated_at": "2020-04-23T06:55:09Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 379,
"watchers_count": 379,
"forks_count": 81,
"forks": 81,
"watchers": 379,
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 82,
"forks": 82,
"watchers": 382,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-04-22T04:16:29Z",
"updated_at": "2020-04-23T06:00:35Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 44,
"forks": 44,
"watchers": 236,
"watchers": 237,
"score": 0
}
]

View file

@ -270,8 +270,8 @@
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 28,
"forks": 28,
"forks_count": 29,
"forks": 29,
"watchers": 73,
"score": 0
},

View file

@ -220,13 +220,13 @@
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2020-04-22T10:51:42Z",
"updated_at": "2020-04-23T05:37:08Z",
"pushed_at": "2020-04-20T12:03:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-10T18:14:34Z",
"updated_at": "2020-04-20T19:50:25Z",
"updated_at": "2020-04-23T04:44:10Z",
"pushed_at": "2020-04-20T19:50:22Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 13,
"forks": 13,
"watchers": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 14,
"forks": 14,
"watchers": 44,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-04-15T16:42:44Z",
"updated_at": "2020-04-23T05:29:03Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 662,
"watchers_count": 662,
"stargazers_count": 663,
"watchers_count": 663,
"forks_count": 54,
"forks": 54,
"watchers": 662,
"watchers": 663,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759)",
"fork": false,
"created_at": "2019-09-25T05:14:40Z",
"updated_at": "2020-04-16T06:42:03Z",
"updated_at": "2020-04-23T05:25:00Z",
"pushed_at": "2019-09-29T22:39:42Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 36,
"forks": 36,
"watchers": 151,
"watchers": 152,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2020-04-20T14:39:10Z",
"updated_at": "2020-04-23T04:23:55Z",
"pushed_at": "2020-01-31T17:06:55Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 25,
"forks": 25,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-22T01:58:13Z",
"updated_at": "2020-04-23T06:55:09Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 379,
"watchers_count": 379,
"forks_count": 81,
"forks": 81,
"watchers": 379,
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 82,
"forks": 82,
"watchers": 382,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-22T11:24:39Z",
"updated_at": "2020-04-23T06:46:04Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 596,
"watchers_count": 596,
"forks_count": 116,
"forks": 116,
"watchers": 596,
"stargazers_count": 598,
"watchers_count": 598,
"forks_count": 119,
"forks": 119,
"watchers": 598,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-04-18T08:40:04Z",
"updated_at": "2020-04-23T06:25:49Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"forks_count": 63,
"forks": 63,
"watchers": 185,
"watchers": 186,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2020-04-14T11:25:15Z",
"updated_at": "2020-04-23T08:22:37Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 37,
"forks": 37,
"watchers": 99,
"watchers": 100,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-04-16T06:37:27Z",
"updated_at": "2020-04-23T04:21:08Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"forks_count": 142,
"forks": 142,
"watchers": 321,
"watchers": 322,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "User Enumeration Proof Of Concept Exploit for CVE-2019-8449",
"fork": false,
"created_at": "2020-02-14T10:33:00Z",
"updated_at": "2020-03-11T17:56:26Z",
"updated_at": "2020-04-23T07:59:48Z",
"pushed_at": "2020-02-24T12:43:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "BlueFrag experiments",
"fork": false,
"created_at": "2020-02-12T22:00:35Z",
"updated_at": "2020-04-22T20:38:17Z",
"updated_at": "2020-04-23T07:16:34Z",
"pushed_at": "2020-02-19T20:25:31Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 4,
"forks": 4,
"watchers": 23,
"watchers": 24,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "poc for cve-2020-0022",
"fork": false,
"created_at": "2020-02-15T16:55:44Z",
"updated_at": "2020-04-18T04:46:31Z",
"updated_at": "2020-04-23T07:15:19Z",
"pushed_at": "2020-02-16T17:18:01Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 10,
"forks": 10,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Automated Root Script for MTK ARM64 based chipsets based on diplomatic's CVE-2020-0069 (mtk-su) exploit.",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2020-04-18T22:45:33Z",
"updated_at": "2020-04-23T06:23:28Z",
"pushed_at": "2020-03-24T22:05:36Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 6,
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "win32k use-after-free poc",
"fork": false,
"created_at": "2020-04-22T13:11:16Z",
"updated_at": "2020-04-23T02:09:59Z",
"updated_at": "2020-04-23T08:58:09Z",
"pushed_at": "2020-04-22T13:11:27Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"forks": 10,
"watchers": 15,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 13,
"forks": 13,
"watchers": 20,
"score": 0
}
]

View file

@ -956,13 +956,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-23T02:52:17Z",
"updated_at": "2020-04-23T07:34:03Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 840,
"watchers_count": 840,
"stargazers_count": 841,
"watchers_count": 841,
"forks_count": 237,
"forks": 237,
"watchers": 840,
"watchers": 841,
"score": 0
},
{
@ -1209,13 +1209,13 @@
"description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)",
"fork": false,
"created_at": "2020-04-18T20:03:29Z",
"updated_at": "2020-04-23T01:13:25Z",
"updated_at": "2020-04-23T08:23:02Z",
"pushed_at": "2020-04-22T01:07:57Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 11,
"forks": 11,
"watchers": 16,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"forks": 10,
"watchers": 15,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-22T11:24:39Z",
"updated_at": "2020-04-23T06:46:04Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 596,
"watchers_count": 596,
"forks_count": 116,
"forks": 116,
"watchers": 596,
"stargazers_count": 598,
"watchers_count": 598,
"forks_count": 119,
"forks": 119,
"watchers": 598,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE",
"fork": false,
"created_at": "2020-04-22T06:42:50Z",
"updated_at": "2020-04-23T01:22:28Z",
"updated_at": "2020-04-23T08:25:03Z",
"pushed_at": "2020-04-22T10:29:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"watchers": 8,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2020-04-21T16:04:21Z",
"updated_at": "2020-04-23T08:19:24Z",
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 74,
"forks": 74,
"watchers": 159,
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 75,
"forks": 75,
"watchers": 160,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-10T12:48:10Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 11,
"forks": 11,
"forks_count": 12,
"forks": 12,
"watchers": 46,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-04-22T01:58:13Z",
"updated_at": "2020-04-23T06:55:09Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 379,
"watchers_count": 379,
"forks_count": 81,
"forks": 81,
"watchers": 379,
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 82,
"forks": 82,
"watchers": 382,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-04-23T03:02:30Z",
"updated_at": "2020-04-23T08:06:31Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 32,
"forks": 32,
"watchers": 166,
"watchers": 168,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Docker repository with a PoC for WP Code Snippets 2.13.3 (CVE-2020-8417)",
"fork": false,
"created_at": "2020-02-06T00:03:14Z",
"updated_at": "2020-04-21T01:36:56Z",
"pushed_at": "2020-04-21T01:36:54Z",
"updated_at": "2020-04-23T03:28:16Z",
"pushed_at": "2020-04-23T03:28:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,8 +13,8 @@
"description": "CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop) ",
"fork": false,
"created_at": "2020-02-07T18:22:51Z",
"updated_at": "2020-02-25T18:51:28Z",
"pushed_at": "2020-02-13T00:52:51Z",
"updated_at": "2020-04-23T07:02:01Z",
"pushed_at": "2020-04-23T07:01:59Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 4,

View file

@ -13123,7 +13123,6 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
- [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264)
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)