Auto Update 2020/09/01 06:08:38

This commit is contained in:
motikan2010-bot 2020-09-01 06:08:38 +09:00
parent 6229cfca16
commit 2176599aae
41 changed files with 256 additions and 172 deletions

View file

@ -128,13 +128,13 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2020-08-28T03:43:56Z",
"updated_at": "2020-08-31T18:38:22Z",
"pushed_at": "2017-11-27T16:28:14Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 69,
"forks": 69,
"watchers": 201,
"watchers": 202,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Test utility for cve-2018-1002105",
"fork": false,
"created_at": "2018-12-05T02:51:43Z",
"updated_at": "2020-08-27T17:37:39Z",
"updated_at": "2020-08-31T20:18:14Z",
"pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 26,
"forks": 26,
"watchers": 190,
"watchers": 191,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-13382",
"fork": false,
"created_at": "2019-08-11T11:13:44Z",
"updated_at": "2020-08-13T04:55:42Z",
"updated_at": "2020-08-31T19:51:35Z",
"pushed_at": "2019-08-13T15:06:28Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"forks_count": 48,
"forks": 48,
"watchers": 121,
"watchers": 122,
"score": 0
}
]

View file

@ -289,12 +289,12 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
"updated_at": "2020-08-31T08:34:35Z",
"updated_at": "2020-08-31T16:35:37Z",
"pushed_at": "2019-05-05T15:49:44Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 75,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
"fork": false,
"created_at": "2018-09-23T20:58:40Z",
"updated_at": "2020-08-04T06:52:31Z",
"updated_at": "2020-08-31T16:37:14Z",
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 36,
"forks": 36,
"watchers": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 37,
"forks": 37,
"watchers": 69,
"score": 0
},
{

View file

@ -1094,13 +1094,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-08-24T19:02:25Z",
"updated_at": "2020-08-31T20:51:23Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1114,
"watchers_count": 1114,
"stargazers_count": 1115,
"watchers_count": 1115,
"forks_count": 380,
"forks": 380,
"watchers": 1114,
"watchers": 1115,
"score": 0
},
{
@ -2336,13 +2336,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2020-08-26T10:16:00Z",
"updated_at": "2020-08-31T16:37:49Z",
"pushed_at": "2019-10-16T01:04:12Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 58,
"forks": 58,
"watchers": 163,
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 59,
"forks": 59,
"watchers": 164,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-08-31T03:14:30Z",
"updated_at": "2020-08-31T20:13:57Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1604,
"watchers_count": 1604,
"stargazers_count": 1605,
"watchers_count": 1605,
"forks_count": 234,
"forks": 234,
"watchers": 1604,
"watchers": 1605,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false,
"created_at": "2019-10-28T11:09:06Z",
"updated_at": "2020-08-10T00:27:58Z",
"updated_at": "2020-08-31T20:13:39Z",
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 29,
"forks": 29,
"watchers": 124,
"watchers": 125,
"score": 0
},
{

View file

@ -220,13 +220,13 @@
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2020-08-24T09:57:04Z",
"updated_at": "2020-08-31T19:58:28Z",
"pushed_at": "2020-08-19T22:44:06Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Atlassian JIRA Template injection vulnerability RCE",
"fork": false,
"created_at": "2019-07-16T02:27:00Z",
"updated_at": "2020-07-16T07:17:49Z",
"updated_at": "2020-08-31T19:53:43Z",
"pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 25,
"forks": 25,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-09-10T02:53:03Z",
"updated_at": "2020-08-03T08:21:49Z",
"updated_at": "2020-08-31T19:55:22Z",
"pushed_at": "2019-09-10T15:57:23Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 27,
"forks": 27,
"watchers": 53,
"watchers": 54,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
"fork": false,
"created_at": "2020-08-27T19:32:07Z",
"updated_at": "2020-08-31T12:28:16Z",
"updated_at": "2020-08-31T17:37:33Z",
"pushed_at": "2020-08-27T19:33:42Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 14,
"forks": 14,
"watchers": 29,
"watchers": 31,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-31T10:31:52Z",
"updated_at": "2020-08-31T19:52:48Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1550,
"watchers_count": 1550,
"stargazers_count": 1551,
"watchers_count": 1551,
"forks_count": 406,
"forks": 406,
"watchers": 1550,
"watchers": 1551,
"score": 0
},
{

View file

@ -36,8 +36,8 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2020-08-16T21:36:02Z",
"pushed_at": "2020-08-06T00:43:56Z",
"updated_at": "2020-08-31T16:45:38Z",
"pushed_at": "2020-08-31T16:45:35Z",
"stargazers_count": 150,
"watchers_count": 150,
"forks_count": 39,

View file

@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-08-30T08:00:48Z",
"updated_at": "2020-08-31T20:40:56Z",
"pushed_at": "2020-08-28T14:09:20Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 33,
"forks": 33,
"watchers": 84,
"watchers": 85,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-10-23T07:10:35Z",
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 36,
"forks": 36,
"forks_count": 37,
"forks": 37,
"watchers": 96,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :).",
"fork": false,
"created_at": "2019-09-17T17:59:26Z",
"updated_at": "2020-08-25T14:52:05Z",
"updated_at": "2020-08-31T20:45:45Z",
"pushed_at": "2019-10-15T17:05:38Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"forks_count": 45,
"forks": 45,
"watchers": 275,
"watchers": 276,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-08-22T14:58:25Z",
"updated_at": "2020-08-31T20:40:55Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 823,
"watchers_count": 823,
"stargazers_count": 824,
"watchers_count": 824,
"forks_count": 213,
"forks": 213,
"watchers": 823,
"watchers": 824,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SQL Server Reporting Services(CVE-2020-0618)中的RCE",
"fork": false,
"created_at": "2020-02-15T06:40:23Z",
"updated_at": "2020-08-26T18:41:11Z",
"updated_at": "2020-08-31T19:55:13Z",
"pushed_at": "2020-02-15T06:41:54Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 38,
"forks": 38,
"watchers": 180,
"watchers": 181,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-08-30T03:27:11Z",
"updated_at": "2020-08-31T19:54:27Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 47,
"forks": 47,
"watchers": 122,
"watchers": 123,
"score": 0
},
{

View file

@ -82,7 +82,7 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-08-31T12:49:57Z",
"updated_at": "2020-08-31T19:49:33Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 526,
"watchers_count": 526,
@ -887,13 +887,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-08-30T18:39:26Z",
"updated_at": "2020-08-31T19:53:02Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 990,
"watchers_count": 990,
"stargazers_count": 991,
"watchers_count": 991,
"forks_count": 325,
"forks": 325,
"watchers": 990,
"watchers": 991,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)",
"fork": false,
"created_at": "2020-06-11T15:42:18Z",
"updated_at": "2020-08-27T17:38:31Z",
"updated_at": "2020-08-31T19:57:08Z",
"pushed_at": "2020-06-11T16:21:01Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 7,
"forks": 7,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652",
"fork": false,
"created_at": "2020-05-01T20:53:49Z",
"updated_at": "2020-07-07T15:03:44Z",
"updated_at": "2020-08-31T20:04:44Z",
"pushed_at": "2020-05-18T17:36:18Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 17,
"forks": 17,
"watchers": 102,
"watchers": 104,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-04T08:01:37Z",
"updated_at": "2020-08-27T17:38:26Z",
"updated_at": "2020-08-31T19:58:26Z",
"pushed_at": "2020-05-04T08:11:21Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 32,
"forks": 32,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
"fork": false,
"created_at": "2020-04-05T15:52:43Z",
"updated_at": "2020-08-18T07:37:20Z",
"updated_at": "2020-08-31T19:50:42Z",
"pushed_at": "2020-06-09T20:41:32Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 35,
"forks": 35,
"watchers": 116,
"watchers": 117,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload ",
"fork": false,
"created_at": "2020-05-15T01:50:36Z",
"updated_at": "2020-06-29T16:37:38Z",
"updated_at": "2020-08-31T19:50:43Z",
"pushed_at": "2020-06-16T19:47:29Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
"fork": false,
"created_at": "2020-07-20T03:27:24Z",
"updated_at": "2020-08-31T02:51:00Z",
"updated_at": "2020-08-31T19:48:37Z",
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 10,
"forks": 10,
"watchers": 70,
"watchers": 71,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-08-22T04:12:52Z",
"updated_at": "2020-08-31T19:54:51Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 91,
"forks": 91,
"watchers": 187,
"watchers": 188,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-02-20T17:00:02Z",
"updated_at": "2020-07-06T09:15:48Z",
"updated_at": "2020-08-31T19:54:50Z",
"pushed_at": "2020-03-02T20:25:35Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 23,
"forks": 23,
"watchers": 31,
"watchers": 32,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
"fork": false,
"created_at": "2020-02-20T17:57:54Z",
"updated_at": "2020-07-20T06:32:13Z",
"updated_at": "2020-08-31T19:55:06Z",
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 51,
"forks": 51,
"watchers": 66,
"watchers": 67,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2020-1938漏洞复现",
"fork": false,
"created_at": "2020-02-21T02:36:37Z",
"updated_at": "2020-07-31T01:15:49Z",
"updated_at": "2020-08-31T19:54:48Z",
"pushed_at": "2020-02-21T02:49:57Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 10,
"forks": 10,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1958 PoC",
"fork": false,
"created_at": "2020-04-11T13:31:02Z",
"updated_at": "2020-08-27T17:38:24Z",
"updated_at": "2020-08-31T19:59:46Z",
"pushed_at": "2020-04-11T14:52:36Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 8,
"forks": 8,
"watchers": 20,
"watchers": 21,
"score": 0
}
]

25
2020/CVE-2020-24028.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291787379,
"name": "CVE-2020-24028",
"full_name": "underprotection\/CVE-2020-24028",
"owner": {
"login": "underprotection",
"id": 60452208,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/60452208?v=4",
"html_url": "https:\/\/github.com\/underprotection"
},
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24028",
"description": null,
"fork": false,
"created_at": "2020-08-31T18:00:21Z",
"updated_at": "2020-08-31T18:24:01Z",
"pushed_at": "2020-08-31T18:23:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-24029.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291793224,
"name": "CVE-2020-24029",
"full_name": "underprotection\/CVE-2020-24029",
"owner": {
"login": "underprotection",
"id": 60452208,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/60452208?v=4",
"html_url": "https:\/\/github.com\/underprotection"
},
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24029",
"description": null,
"fork": false,
"created_at": "2020-08-31T18:26:05Z",
"updated_at": "2020-08-31T18:46:30Z",
"pushed_at": "2020-08-31T18:46:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-24030.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291795866,
"name": "CVE-2020-24030",
"full_name": "underprotection\/CVE-2020-24030",
"owner": {
"login": "underprotection",
"id": 60452208,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/60452208?v=4",
"html_url": "https:\/\/github.com\/underprotection"
},
"html_url": "https:\/\/github.com\/underprotection\/CVE-2020-24030",
"description": null,
"fork": false,
"created_at": "2020-08-31T18:38:58Z",
"updated_at": "2020-08-31T18:46:09Z",
"pushed_at": "2020-08-31T18:46:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-08-27T17:38:19Z",
"updated_at": "2020-08-31T19:58:39Z",
"pushed_at": "2020-06-10T10:49:38Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 26,
"forks": 26,
"watchers": 111,
"watchers": 112,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-08-31T01:40:19Z",
"updated_at": "2020-08-31T20:01:13Z",
"pushed_at": "2020-05-22T08:46:20Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"forks_count": 31,
"forks": 31,
"watchers": 137,
"watchers": 138,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "💣 CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false,
"created_at": "2020-01-17T05:35:01Z",
"updated_at": "2020-08-27T17:38:14Z",
"updated_at": "2020-08-31T19:55:52Z",
"pushed_at": "2020-01-22T04:58:59Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 18,
"forks": 18,
"watchers": 61,
"watchers": 62,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-31T10:31:52Z",
"updated_at": "2020-08-31T19:52:48Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1550,
"watchers_count": 1550,
"stargazers_count": 1551,
"watchers_count": 1551,
"forks_count": 406,
"forks": 406,
"watchers": 1550,
"watchers": 1551,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2020-08-16T02:14:08Z",
"updated_at": "2020-08-31T19:48:47Z",
"pushed_at": "2020-07-23T19:45:25Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 38,
"forks": 38,
"watchers": 115,
"watchers": 116,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2020-08-02T13:05:54Z",
"updated_at": "2020-08-31T19:55:13Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 18,
"forks": 18,
"watchers": 87,
"watchers": 88,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-8163 - Remote code execution of user-provided local names in Rails",
"fork": false,
"created_at": "2020-06-19T21:03:05Z",
"updated_at": "2020-08-12T23:59:05Z",
"updated_at": "2020-08-31T19:56:57Z",
"pushed_at": "2020-07-28T15:29:27Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 12,
"forks": 12,
"watchers": 57,
"watchers": 58,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-20T04:27:52Z",
"updated_at": "2020-08-27T17:38:28Z",
"updated_at": "2020-08-31T19:50:30Z",
"pushed_at": "2020-06-24T20:57:03Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Citrix ADC Vulns",
"fork": false,
"created_at": "2020-07-10T20:00:17Z",
"updated_at": "2020-08-15T08:06:54Z",
"updated_at": "2020-08-31T19:48:40Z",
"pushed_at": "2020-07-10T21:03:20Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 13,
"forks": 13,
"watchers": 59,
"watchers": 60,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2020-08-29T15:01:51Z",
"updated_at": "2020-08-31T19:50:52Z",
"pushed_at": "2020-05-21T10:15:35Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 20,
"forks": 20,
"watchers": 82,
"watchers": 83,
"score": 0
},
{

View file

@ -1984,6 +1984,15 @@ vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWid
- [ctlyz123/CVE-2020-17496](https://github.com/ctlyz123/CVE-2020-17496)
### CVE-2020-24028
- [underprotection/CVE-2020-24028](https://github.com/underprotection/CVE-2020-24028)
### CVE-2020-24029
- [underprotection/CVE-2020-24029](https://github.com/underprotection/CVE-2020-24029)
### CVE-2020-24030
- [underprotection/CVE-2020-24030](https://github.com/underprotection/CVE-2020-24030)
### CVE-2020-24033
- [M0NsTeRRR/CVE-2020-24033](https://github.com/M0NsTeRRR/CVE-2020-24033)