Auto Update 2020/10/30 06:09:02

This commit is contained in:
motikan2010-bot 2020-10-30 06:09:02 +09:00
parent b852f555d9
commit 297890e4c7
16 changed files with 112 additions and 59 deletions

View file

@ -385,8 +385,8 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 234,
"watchers_count": 234,
"forks_count": 83,
"forks": 83,
"forks_count": 84,
"forks": 84,
"watchers": 234,
"score": 0
},

View file

@ -109,8 +109,8 @@
"pushed_at": "2018-07-12T08:35:13Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 16,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-10-26T18:56:28Z",
"updated_at": "2020-10-29T17:14:35Z",
"pushed_at": "2020-03-23T11:22:54Z",
"stargazers_count": 234,
"watchers_count": 234,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 49,
"forks": 49,
"watchers": 234,
"watchers": 235,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-07T19:44:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 51,
"forks": 51,
"forks_count": 52,
"forks": 52,
"watchers": 126,
"score": 0
},

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-10-29T08:56:32Z",
"updated_at": "2020-10-29T19:29:44Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 658,
"watchers_count": 658,
"stargazers_count": 659,
"watchers_count": 659,
"forks_count": 135,
"forks": 135,
"watchers": 658,
"watchers": 659,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 234,
"watchers_count": 234,
"forks_count": 83,
"forks": 83,
"forks_count": 84,
"forks": 84,
"watchers": 234,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-10-26T15:15:35Z",
"updated_at": "2020-10-29T17:26:14Z",
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 223,
"watchers_count": 223,
"forks_count": 71,
"forks": 71,
"watchers": 222,
"watchers": 223,
"score": 0
},
{

View file

@ -366,5 +366,28 @@
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 308367304,
"name": "CVE-2020-0688-Scanner",
"full_name": "SLSteff\/CVE-2020-0688-Scanner",
"owner": {
"login": "SLSteff",
"id": 20557573,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/20557573?v=4",
"html_url": "https:\/\/github.com\/SLSteff"
},
"html_url": "https:\/\/github.com\/SLSteff\/CVE-2020-0688-Scanner",
"description": "Scans for Microsoft Exchange Versions with masscan",
"fork": false,
"created_at": "2020-10-29T15:16:24Z",
"updated_at": "2020-10-29T20:06:27Z",
"pushed_at": "2020-10-29T20:06:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-10-28T07:01:57Z",
"updated_at": "2020-10-29T16:57:48Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 1027,
"watchers_count": 1027,
"stargazers_count": 1028,
"watchers_count": 1028,
"forks_count": 337,
"forks": 337,
"watchers": 1027,
"watchers": 1028,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
"fork": false,
"created_at": "2020-06-23T18:45:24Z",
"updated_at": "2020-09-25T01:50:48Z",
"updated_at": "2020-10-29T20:05:11Z",
"pushed_at": "2020-06-25T12:22:06Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2020-10-29T07:48:17Z",
"updated_at": "2020-10-29T17:48:53Z",
"pushed_at": "2020-10-06T06:58:55Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 33,
"forks": 33,
"watchers": 126,
"watchers": 127,
"score": 0
},
{
@ -772,13 +772,13 @@
"description": "Zerologon AutoExploit Tool | CVE-2020-1472",
"fork": false,
"created_at": "2020-09-29T20:43:06Z",
"updated_at": "2020-10-27T22:33:26Z",
"updated_at": "2020-10-29T18:47:32Z",
"pushed_at": "2020-10-02T13:00:21Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"watchers": 9,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-10-29T14:49:59Z",
"pushed_at": "2020-10-29T14:49:57Z",
"stargazers_count": 20,
"watchers_count": 20,
"updated_at": "2020-10-29T16:40:17Z",
"pushed_at": "2020-10-29T15:31:20Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 1,
"forks": 1,
"watchers": 20,
"watchers": 22,
"score": 0
},
{
@ -40,8 +40,8 @@
"pushed_at": "2020-10-29T03:57:09Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 13,
"score": 0
},
@ -82,13 +82,13 @@
"description": "CVE-2020-14882 Weblogic-Exp",
"fork": false,
"created_at": "2020-10-29T06:30:30Z",
"updated_at": "2020-10-29T13:59:22Z",
"updated_at": "2020-10-29T20:44:13Z",
"pushed_at": "2020-10-29T06:36:01Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
},
{
@ -113,5 +113,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 308374913,
"name": "cve-2020-14882",
"full_name": "wsfengfan\/cve-2020-14882",
"owner": {
"login": "wsfengfan",
"id": 33821840,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4",
"html_url": "https:\/\/github.com\/wsfengfan"
},
"html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882",
"description": "CVE-2020-14882 GET POC",
"fork": false,
"created_at": "2020-10-29T15:44:23Z",
"updated_at": "2020-10-29T16:16:31Z",
"pushed_at": "2020-10-29T16:07:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-10T02:38:15Z",
"updated_at": "2020-10-29T13:40:08Z",
"updated_at": "2020-10-29T19:01:40Z",
"pushed_at": "2020-10-09T16:39:54Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -14,11 +14,11 @@
"fork": false,
"created_at": "2020-05-20T04:27:52Z",
"updated_at": "2020-10-28T17:08:04Z",
"pushed_at": "2020-06-24T20:57:03Z",
"pushed_at": "2020-10-29T16:54:16Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 25,
"score": 0
}

View file

@ -217,6 +217,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
- [w4fz5uck5/cve-2020-0688-webshell-upload-technique](https://github.com/w4fz5uck5/cve-2020-0688-webshell-upload-technique)
- [murataydemir/CVE-2020-0688](https://github.com/murataydemir/CVE-2020-0688)
- [zyn3rgy/ecp_slap](https://github.com/zyn3rgy/ecp_slap)
- [SLSteff/CVE-2020-0688-Scanner](https://github.com/SLSteff/CVE-2020-0688-Scanner)
### CVE-2020-0708 (2020-02-11)
@ -2176,6 +2177,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [Umarovm/McMaster-University-0-day-Blind-Command-Injection](https://github.com/Umarovm/McMaster-University-0-day-Blind-Command-Injection)
- [RedTeamWing/CVE-2020-14882](https://github.com/RedTeamWing/CVE-2020-14882)
- [0thm4n3/cve-2020-14882](https://github.com/0thm4n3/cve-2020-14882)
- [wsfengfan/cve-2020-14882](https://github.com/wsfengfan/cve-2020-14882)
### CVE-2020-14947 (2020-06-30)
@ -2644,7 +2646,12 @@ An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-
### CVE-2020-27199
- [9lyph/CVE-2020-27199](https://github.com/9lyph/CVE-2020-27199)
### CVE-2020-27747
### CVE-2020-27747 (2020-10-29)
<code>
An issue was discovered in Click Studios Passwordstate 8.9 (Build 8973).If the user of the system has assigned himself a PIN code for entering from a mobile device using the built-in generator (4 digits), a remote attacker has the opportunity to conduct a brute force attack on this PIN code. As result, remote attacker retrieves all passwords from another systems, available for affected account.
</code>
- [jet-pentest/CVE-2020-27747](https://github.com/jet-pentest/CVE-2020-27747)
### CVE-2020-72381