Auto Update 2020/04/20 12:07:52

This commit is contained in:
motikan2010-bot 2020-04-20 12:07:52 +09:00
parent 0743e51c41
commit 226d1efee7
23 changed files with 113 additions and 113 deletions

View file

@ -13,13 +13,13 @@
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2017-07-30T18:39:24Z",
"updated_at": "2020-03-29T06:00:59Z",
"updated_at": "2020-04-20T02:37:43Z",
"pushed_at": "2017-08-02T23:51:34Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 20,
"forks": 20,
"watchers": 40,
"watchers": 42,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
"fork": false,
"created_at": "2020-04-07T00:46:19Z",
"updated_at": "2020-04-12T19:46:43Z",
"updated_at": "2020-04-19T22:22:17Z",
"pushed_at": "2020-04-12T19:46:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-02-23T10:00:03Z",
"updated_at": "2020-04-06T10:44:19Z",
"updated_at": "2020-04-20T00:16:50Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-02-23T10:00:03Z",
"updated_at": "2020-04-06T10:44:19Z",
"updated_at": "2020-04-20T00:16:50Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-04-03T05:30:50Z",
"updated_at": "2020-04-20T01:37:23Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 28,
"forks": 28,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-14040",
"fork": false,
"created_at": "2020-02-03T23:04:49Z",
"updated_at": "2020-04-19T00:45:37Z",
"updated_at": "2020-04-20T02:57:05Z",
"pushed_at": "2020-04-15T14:27:49Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"watchers": 11,
"watchers": 13,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-14041",
"fork": false,
"created_at": "2020-02-03T23:05:10Z",
"updated_at": "2020-04-19T00:46:27Z",
"updated_at": "2020-04-20T02:53:00Z",
"pushed_at": "2020-04-15T14:28:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -174,13 +174,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-19T15:57:57Z",
"updated_at": "2020-04-20T03:04:39Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 572,
"watchers_count": 572,
"stargazers_count": 576,
"watchers_count": 576,
"forks_count": 110,
"forks": 110,
"watchers": 572,
"watchers": 576,
"score": 0
}
]

View file

@ -335,13 +335,13 @@
"description": "WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit ",
"fork": false,
"created_at": "2019-08-23T01:42:57Z",
"updated_at": "2020-03-10T21:50:49Z",
"updated_at": "2020-04-20T02:59:09Z",
"pushed_at": "2019-09-26T05:46:14Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 6,
"forks": 6,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.",
"fork": false,
"created_at": "2020-01-10T09:19:10Z",
"updated_at": "2020-04-19T03:50:08Z",
"updated_at": "2020-04-20T00:47:43Z",
"pushed_at": "2020-01-15T08:36:05Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2020-04-17T02:15:47Z",
"updated_at": "2020-04-19T23:46:48Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 16,
"forks": 16,
"watchers": 89,
"watchers": 90,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-04-17T17:41:13Z",
"updated_at": "2020-04-20T02:45:10Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 45,
"forks": 45,
"watchers": 153,
"watchers": 154,
"score": 0
},
{
@ -312,8 +312,8 @@
"description": "PoC RCE Reverse Shell for CVE-2020-0688",
"fork": false,
"created_at": "2020-04-18T20:09:06Z",
"updated_at": "2020-04-19T16:50:24Z",
"pushed_at": "2020-04-19T01:59:58Z",
"updated_at": "2020-04-20T02:14:11Z",
"pushed_at": "2020-04-20T02:14:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -151,13 +151,13 @@
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-04-06T12:28:26Z",
"updated_at": "2020-04-20T02:25:56Z",
"pushed_at": "2020-03-16T17:25:51Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"forks": 5,
"watchers": 15,
"watchers": 16,
"score": 0
},
{
@ -979,13 +979,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-18T19:16:02Z",
"updated_at": "2020-04-20T02:15:41Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 829,
"watchers_count": 829,
"stargazers_count": 830,
"watchers_count": 830,
"forks_count": 236,
"forks": 236,
"watchers": 829,
"watchers": 830,
"score": 0
},
{
@ -1006,8 +1006,8 @@
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 45,
"forks": 45,
"forks_count": 46,
"forks": 46,
"watchers": 139,
"score": 0
},
@ -1232,8 +1232,8 @@
"description": "PoC with remote code execution module for CVE-2020-0796 aka SMBGhost.",
"fork": false,
"created_at": "2020-04-18T15:01:28Z",
"updated_at": "2020-04-19T19:22:25Z",
"pushed_at": "2020-04-19T19:22:22Z",
"updated_at": "2020-04-19T21:53:56Z",
"pushed_at": "2020-04-19T21:53:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@ -1255,8 +1255,8 @@
"description": "PoC RCE Reverse Shell for CVE-2020-0796",
"fork": false,
"created_at": "2020-04-18T20:03:29Z",
"updated_at": "2020-04-19T16:51:37Z",
"pushed_at": "2020-04-19T02:00:29Z",
"updated_at": "2020-04-20T02:11:46Z",
"pushed_at": "2020-04-20T02:11:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,8 +36,8 @@
"description": "PoC RCE Reverse Shell for CVE-2020-0883",
"fork": false,
"created_at": "2020-04-18T20:05:21Z",
"updated_at": "2020-04-19T16:51:21Z",
"pushed_at": "2020-04-19T01:59:26Z",
"updated_at": "2020-04-20T02:12:53Z",
"pushed_at": "2020-04-20T02:12:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,8 +36,8 @@
"description": "PoC RCE Reverse Shell for CVE-2020-0905",
"fork": false,
"created_at": "2020-04-18T20:07:49Z",
"updated_at": "2020-04-19T16:51:08Z",
"pushed_at": "2020-04-19T01:59:42Z",
"updated_at": "2020-04-20T02:13:35Z",
"pushed_at": "2020-04-20T02:13:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-19T15:57:57Z",
"updated_at": "2020-04-20T03:07:30Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 572,
"watchers_count": 572,
"stargazers_count": 577,
"watchers_count": 577,
"forks_count": 110,
"forks": 110,
"watchers": 572,
"watchers": 577,
"score": 0
},
{

View file

@ -312,13 +312,13 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2020-04-19T03:25:59Z",
"updated_at": "2020-04-20T02:59:10Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 31,
"forks": 31,
"watchers": 87,
"watchers": 88,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-04-17T07:16:17Z",
"updated_at": "2020-04-20T02:59:04Z",
"pushed_at": "2020-04-17T06:07:59Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 27,
"forks": 27,
"watchers": 93,
"watchers": 94,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-04-18T07:54:01Z",
"updated_at": "2020-04-20T02:14:40Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 41,
"forks": 41,
"watchers": 171,
"watchers": 172,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-2555 Python POC",
"fork": false,
"created_at": "2020-03-06T16:02:59Z",
"updated_at": "2020-04-18T02:55:42Z",
"updated_at": "2020-04-20T01:53:30Z",
"pushed_at": "2020-04-16T12:04:18Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 16,
"forks": 16,
"watchers": 35,
"watchers": 36,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-04-15T00:13:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-04-19T16:50:28Z",
"updated_at": "2020-04-20T03:03:34Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 27,
"forks": 27,
"watchers": 124,
"watchers": 128,
"score": 0
},
{
@ -102,11 +102,11 @@
"html_url": "https:\/\/github.com\/l33terman6000"
},
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-3952",
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
"description": "PoC RCE Reverse Shell for CVE-2020-3952",
"fork": false,
"created_at": "2020-04-18T20:00:20Z",
"updated_at": "2020-04-19T16:51:49Z",
"pushed_at": "2020-04-19T02:00:15Z",
"updated_at": "2020-04-20T02:49:43Z",
"pushed_at": "2020-04-20T02:09:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -1,25 +1,25 @@
[
{
"id": 238573250,
"name": "WP-CodeSnippets-CVE-2020-8417",
"full_name": "VulnCrate\/WP-CodeSnippets-CVE-2020-8417",
"name": "wp-codesnippets-cve-2020-8417",
"full_name": "vulncrate\/wp-codesnippets-cve-2020-8417",
"owner": {
"login": "VulnCrate",
"login": "vulncrate",
"id": 58409728,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/58409728?v=4",
"html_url": "https:\/\/github.com\/VulnCrate"
"html_url": "https:\/\/github.com\/vulncrate"
},
"html_url": "https:\/\/github.com\/VulnCrate\/WP-CodeSnippets-CVE-2020-8417",
"description": "WP: CodeSnippets (CVE-2020-8417)",
"html_url": "https:\/\/github.com\/vulncrate\/wp-codesnippets-cve-2020-8417",
"description": "Docker repository with a PoC for WP Code Snippets 2.13.3 (CVE-2020-8417)",
"fork": false,
"created_at": "2020-02-06T00:03:14Z",
"updated_at": "2020-04-19T01:23:14Z",
"pushed_at": "2020-04-19T01:23:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2020-04-20T03:04:35Z",
"pushed_at": "2020-04-20T03:04:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813",
"fork": false,
"created_at": "2020-02-22T16:27:41Z",
"updated_at": "2020-04-04T03:06:27Z",
"updated_at": "2020-04-20T02:36:49Z",
"pushed_at": "2020-02-22T16:33:31Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 12,
"forks": 12,
"watchers": 57,
"watchers": 58,
"score": 0
}
]

View file

@ -681,7 +681,7 @@ CA Unified Infrastructure Management (Nimsoft/UIM) 9.20 and below contains a buf
The Code Snippets plugin before 2.14.0 for WordPress allows CSRF because of the lack of a Referer check on the import menu.
</code>
- [VulnCrate/WP-CodeSnippets-CVE-2020-8417](https://github.com/VulnCrate/WP-CodeSnippets-CVE-2020-8417)
- [vulncrate/wp-codesnippets-cve-2020-8417](https://github.com/vulncrate/wp-codesnippets-cve-2020-8417)
### CVE-2020-8515