Auto Update 2020/04/19 06:07:56

This commit is contained in:
motikan2010-bot 2020-04-19 06:07:56 +09:00
parent 9dbb5fa76b
commit 2bd7a2f051
38 changed files with 351 additions and 237 deletions

View file

@ -67,28 +67,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247077498,
"name": "CVE-2003-0264-SLmail-5.5",
"full_name": "pwncone\/CVE-2003-0264-SLmail-5.5",
"owner": {
"login": "pwncone",
"id": 57570315,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/57570315?v=4",
"html_url": "https:\/\/github.com\/pwncone"
},
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
"fork": false,
"created_at": "2020-03-13T13:27:56Z",
"updated_at": "2020-03-13T13:31:38Z",
"pushed_at": "2020-03-13T13:31:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2020-04-14T12:05:16Z",
"updated_at": "2020-04-18T20:37:49Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 254,
"watchers_count": 254,
"forks_count": 79,
"forks": 79,
"watchers": 255,
"watchers": 254,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2015-01-27T09:43:42Z",
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 84,
"forks": 84,
"forks_count": 85,
"forks": 85,
"watchers": 143,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2015-09-10T23:01:09Z",
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 118,
"forks": 118,
"forks_count": 119,
"forks": 119,
"watchers": 192,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2015-05-11T22:39:06Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 42,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-01-15T19:26:45Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 6,
"forks": 6,
"forks_count": 5,
"forks": 5,
"watchers": 25,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
"fork": false,
"created_at": "2018-06-21T15:44:29Z",
"updated_at": "2020-04-14T05:37:03Z",
"updated_at": "2020-04-18T20:39:02Z",
"pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 58,
"forks": 58,
"watchers": 169,
"watchers": 168,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC for CVE-2018-0824",
"fork": false,
"created_at": "2018-06-15T08:59:37Z",
"updated_at": "2020-03-26T17:16:09Z",
"updated_at": "2020-04-18T15:42:40Z",
"pushed_at": "2018-06-25T07:13:36Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 34,
"forks": 34,
"watchers": 68,
"watchers": 69,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 327,
"watchers_count": 327,
"forks_count": 302,
"forks": 302,
"forks_count": 303,
"forks": 303,
"watchers": 327,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-03-06T10:52:19Z",
"stargazers_count": 394,
"watchers_count": 394,
"forks_count": 120,
"forks": 120,
"forks_count": 119,
"forks": 119,
"watchers": 394,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
"fork": false,
"created_at": "2020-04-12T21:06:26Z",
"updated_at": "2020-04-18T06:18:24Z",
"updated_at": "2020-04-18T20:26:35Z",
"pushed_at": "2020-04-13T22:09:50Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"watchers": 14,
"score": 0
}
]

View file

@ -1144,8 +1144,8 @@
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1098,
"watchers_count": 1098,
"forks_count": 369,
"forks": 369,
"forks_count": 370,
"forks": 370,
"watchers": 1098,
"score": 0
},
@ -1558,8 +1558,8 @@
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1017,
"watchers_count": 1017,
"forks_count": 348,
"forks": 348,
"forks_count": 349,
"forks": 349,
"watchers": 1017,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-04-14T19:07:32Z",
"updated_at": "2020-04-18T15:56:01Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1561,
"watchers_count": 1561,
"stargazers_count": 1562,
"watchers_count": 1562,
"forks_count": 221,
"forks": 221,
"watchers": 1561,
"watchers": 1562,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2020-04-18T01:20:34Z",
"updated_at": "2020-04-18T20:59:17Z",
"pushed_at": "2019-12-28T18:23:58Z",
"stargazers_count": 563,
"watchers_count": 563,
"stargazers_count": 562,
"watchers_count": 562,
"forks_count": 68,
"forks": 68,
"watchers": 563,
"watchers": 562,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2020-04-16T05:40:05Z",
"updated_at": "2020-04-18T20:55:50Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 225,
"watchers_count": 225,
"forks_count": 81,
"forks": 81,
"watchers": 226,
"watchers": 225,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2020-04-15T16:53:59Z",
"updated_at": "2020-04-18T18:16:58Z",
"pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 34,
"forks": 34,
"watchers": 93,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 35,
"forks": 35,
"watchers": 95,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2020-04-18T10:36:50Z",
"updated_at": "2020-04-18T19:33:11Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 42,
"forks": 42,
"watchers": 139,
"watchers": 140,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "RCE Exploit For CVE-2019-17424 (nipper-ng 0.11.10)",
"fork": false,
"created_at": "2019-10-20T21:20:28Z",
"updated_at": "2019-11-16T09:47:14Z",
"updated_at": "2020-04-18T15:08:01Z",
"pushed_at": "2019-11-16T09:47:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-17558 Solr模板注入漏洞图形化一键检测工具。CVE-2019-17558 Solr Velocity Template Vul POC Tool.",
"fork": false,
"created_at": "2019-11-25T10:54:20Z",
"updated_at": "2020-04-03T03:05:54Z",
"updated_at": "2020-04-18T15:23:46Z",
"pushed_at": "2020-01-10T10:58:44Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 29,
"forks": 29,
"forks_count": 30,
"forks": 30,
"watchers": 45,
"score": 0
},

View file

@ -174,13 +174,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-18T14:52:36Z",
"updated_at": "2020-04-18T17:11:17Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 566,
"watchers_count": 566,
"forks_count": 108,
"forks": 108,
"watchers": 566,
"stargazers_count": 570,
"watchers_count": 570,
"forks_count": 110,
"forks": 110,
"watchers": 570,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2020-04-18T03:04:48Z",
"updated_at": "2020-04-18T16:11:28Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 39,
"forks": 39,
"watchers": 122,
"watchers": 123,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.",
"fork": false,
"created_at": "2020-01-10T09:19:10Z",
"updated_at": "2020-04-11T13:12:33Z",
"updated_at": "2020-04-18T15:23:33Z",
"pushed_at": "2020-01-15T08:36:05Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2020-04-06T10:45:56Z",
"updated_at": "2020-04-18T16:11:18Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 104,
"forks": 104,
"watchers": 507,
"watchers": 508,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 89,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-04-18T04:55:07Z",
"updated_at": "2020-04-18T19:55:15Z",
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 206,
"watchers_count": 206,
"forks_count": 56,
"forks": 56,
"watchers": 205,
"watchers": 206,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-04-16T20:32:50Z",
"updated_at": "2020-04-18T15:09:38Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 37,
"forks": 37,
"watchers": 159,
"watchers": 160,
"score": 0
},
{

View file

@ -299,26 +299,26 @@
"score": 0
},
{
"id": 255688881,
"id": 256843461,
"name": "CVE-2020-0688",
"full_name": "curtbraz\/CVE-2020-0688",
"full_name": "l33terman6000\/CVE-2020-0688",
"owner": {
"login": "curtbraz",
"id": 17833760,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
"html_url": "https:\/\/github.com\/curtbraz"
"login": "l33terman6000",
"id": 63928955,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
"html_url": "https:\/\/github.com\/l33terman6000"
},
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-0688",
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-0688",
"description": "PoC RCE Reverse Shell for CVE-2020-0688",
"fork": false,
"created_at": "2020-04-14T18:14:12Z",
"updated_at": "2020-04-16T13:25:20Z",
"pushed_at": "2020-04-14T18:14:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"created_at": "2020-04-18T20:09:06Z",
"updated_at": "2020-04-18T20:25:02Z",
"pushed_at": "2020-04-18T20:25:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-0692.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 256222085,
"name": "CVE-2020-0692",
"full_name": "githubassets\/CVE-2020-0692",
"owner": {
"login": "githubassets",
"id": 59461072,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59461072?v=4",
"html_url": "https:\/\/github.com\/githubassets"
},
"html_url": "https:\/\/github.com\/githubassets\/CVE-2020-0692",
"description": "PoC RCE Reverse Shell for CVE-2020-0688",
"fork": false,
"created_at": "2020-04-16T13:25:29Z",
"updated_at": "2020-04-18T19:40:16Z",
"pushed_at": "2020-04-14T18:14:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -979,13 +979,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-18T12:41:49Z",
"updated_at": "2020-04-18T19:16:02Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 827,
"watchers_count": 827,
"stargazers_count": 829,
"watchers_count": 829,
"forks_count": 235,
"forks": 235,
"watchers": 827,
"watchers": 829,
"score": 0
},
{
@ -1218,29 +1218,6 @@
"watchers": 0,
"score": 0
},
{
"id": 255671853,
"name": "CVE-2020-0796",
"full_name": "curtbraz\/CVE-2020-0796",
"owner": {
"login": "curtbraz",
"id": 17833760,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
"html_url": "https:\/\/github.com\/curtbraz"
},
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-0796",
"description": "PoC RCE Reverse Shell for CVE-2020-0796",
"fork": false,
"created_at": "2020-04-14T17:03:53Z",
"updated_at": "2020-04-16T13:33:35Z",
"pushed_at": "2020-04-14T17:52:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 256781307,
"name": "CVE-2020-0796",
@ -1255,8 +1232,31 @@
"description": "PoC with remote code execution module for CVE-2020-0796 aka SMBGhost.",
"fork": false,
"created_at": "2020-04-18T15:01:28Z",
"updated_at": "2020-04-18T15:01:41Z",
"updated_at": "2020-04-18T18:38:10Z",
"pushed_at": "2020-04-18T15:01:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 256842563,
"name": "CVE-2020-0796",
"full_name": "l33terman6000\/CVE-2020-0796",
"owner": {
"login": "l33terman6000",
"id": 63928955,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
"html_url": "https:\/\/github.com\/l33terman6000"
},
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-0796",
"description": "PoC RCE Reverse Shell for CVE-2020-0796",
"fork": false,
"created_at": "2020-04-18T20:03:29Z",
"updated_at": "2020-04-18T20:25:52Z",
"pushed_at": "2020-04-18T20:25:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

25
2020/CVE-2020-0798.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 256224132,
"name": "CVE-2020-0798",
"full_name": "githubassets\/CVE-2020-0798",
"owner": {
"login": "githubassets",
"id": 59461072,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59461072?v=4",
"html_url": "https:\/\/github.com\/githubassets"
},
"html_url": "https:\/\/github.com\/githubassets\/CVE-2020-0798",
"description": "PoC RCE Reverse Shell for CVE-2020-0796",
"fork": false,
"created_at": "2020-04-16T13:33:35Z",
"updated_at": "2020-04-18T19:40:51Z",
"pushed_at": "2020-04-14T17:52:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +1,48 @@
[
{
"id": 255705748,
"id": 256224033,
"name": "CVE-2020-0883",
"full_name": "curtbraz\/CVE-2020-0883",
"full_name": "githubassets\/CVE-2020-0883",
"owner": {
"login": "curtbraz",
"id": 17833760,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
"html_url": "https:\/\/github.com\/curtbraz"
"login": "githubassets",
"id": 59461072,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59461072?v=4",
"html_url": "https:\/\/github.com\/githubassets"
},
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-0883",
"html_url": "https:\/\/github.com\/githubassets\/CVE-2020-0883",
"description": "PoC RCE Reverse Shell for CVE-2020-0883",
"fork": false,
"created_at": "2020-04-14T19:28:08Z",
"updated_at": "2020-04-16T13:33:11Z",
"created_at": "2020-04-16T13:33:11Z",
"updated_at": "2020-04-18T19:39:17Z",
"pushed_at": "2020-04-14T19:28:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 256842867,
"name": "CVE-2020-0883",
"full_name": "l33terman6000\/CVE-2020-0883",
"owner": {
"login": "l33terman6000",
"id": 63928955,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
"html_url": "https:\/\/github.com\/l33terman6000"
},
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-0883",
"description": "PoC RCE Reverse Shell for CVE-2020-0883",
"fork": false,
"created_at": "2020-04-18T20:05:21Z",
"updated_at": "2020-04-18T20:26:14Z",
"pushed_at": "2020-04-18T20:26:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +1,48 @@
[
{
"id": 255703243,
"id": 256224375,
"name": "CVE-2020-0905",
"full_name": "curtbraz\/CVE-2020-0905",
"full_name": "githubassets\/CVE-2020-0905",
"owner": {
"login": "curtbraz",
"id": 17833760,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
"html_url": "https:\/\/github.com\/curtbraz"
"login": "githubassets",
"id": 59461072,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59461072?v=4",
"html_url": "https:\/\/github.com\/githubassets"
},
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-0905",
"html_url": "https:\/\/github.com\/githubassets\/CVE-2020-0905",
"description": "PoC RCE Reverse Shell for CVE-2020-0905",
"fork": false,
"created_at": "2020-04-14T19:17:02Z",
"updated_at": "2020-04-16T13:34:36Z",
"created_at": "2020-04-16T13:34:37Z",
"updated_at": "2020-04-18T19:39:46Z",
"pushed_at": "2020-04-14T19:17:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 256843272,
"name": "CVE-2020-0905",
"full_name": "l33terman6000\/CVE-2020-0905",
"owner": {
"login": "l33terman6000",
"id": 63928955,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
"html_url": "https:\/\/github.com\/l33terman6000"
},
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-0905",
"description": "PoC RCE Reverse Shell for CVE-2020-0905",
"fork": false,
"created_at": "2020-04-18T20:07:49Z",
"updated_at": "2020-04-18T20:26:36Z",
"pushed_at": "2020-04-18T20:26:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-18T14:52:36Z",
"updated_at": "2020-04-18T17:11:17Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 566,
"watchers_count": 566,
"forks_count": 108,
"forks": 108,
"watchers": 566,
"stargazers_count": 570,
"watchers_count": 570,
"forks_count": 110,
"forks": 110,
"watchers": 570,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
"fork": false,
"created_at": "2020-02-21T07:48:50Z",
"updated_at": "2020-04-18T13:32:50Z",
"updated_at": "2020-04-18T15:50:17Z",
"pushed_at": "2020-02-21T10:19:52Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 8,
"forks": 8,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -1,27 +1,4 @@
[
{
"id": 255758745,
"name": "CVE-2020-3952",
"full_name": "curtbraz\/CVE-2020-3952",
"owner": {
"login": "curtbraz",
"id": 17833760,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
"html_url": "https:\/\/github.com\/curtbraz"
},
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-3952",
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
"fork": false,
"created_at": "2020-04-15T00:13:35Z",
"updated_at": "2020-04-17T07:34:56Z",
"pushed_at": "2020-04-15T00:13:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"score": 0
},
{
"id": 255764753,
"name": "CVE-2020-3952",
@ -45,6 +22,29 @@
"watchers": 1,
"score": 0
},
{
"id": 256080140,
"name": "CVE-2020-3952",
"full_name": "frustreated\/CVE-2020-3952",
"owner": {
"login": "frustreated",
"id": 5463104,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5463104?v=4",
"html_url": "https:\/\/github.com\/frustreated"
},
"html_url": "https:\/\/github.com\/frustreated\/CVE-2020-3952",
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
"fork": false,
"created_at": "2020-04-16T01:39:33Z",
"updated_at": "2020-04-18T19:38:42Z",
"pushed_at": "2020-04-15T00:13:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 256143992,
"name": "vmware_vcenter_cve_2020_3952",
@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-04-18T14:37:34Z",
"updated_at": "2020-04-18T20:42:41Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 25,
"forks": 25,
"watchers": 100,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 26,
"forks": 26,
"watchers": 110,
"score": 0
},
{
@ -90,5 +90,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 256842008,
"name": "CVE-2020-3952",
"full_name": "l33terman6000\/CVE-2020-3952",
"owner": {
"login": "l33terman6000",
"id": 63928955,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
"html_url": "https:\/\/github.com\/l33terman6000"
},
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-3952",
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
"fork": false,
"created_at": "2020-04-18T20:00:20Z",
"updated_at": "2020-04-18T20:25:30Z",
"pushed_at": "2020-04-18T20:25:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-03-26T01:34:38Z",
"updated_at": "2020-04-14T12:31:21Z",
"updated_at": "2020-04-18T15:44:15Z",
"pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 26,
"forks": 26,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "WP: CodeSnippets (CVE-2020-8417)",
"fork": false,
"created_at": "2020-02-06T00:03:14Z",
"updated_at": "2020-04-18T02:57:57Z",
"pushed_at": "2020-04-18T02:57:55Z",
"updated_at": "2020-04-18T19:15:31Z",
"pushed_at": "2020-04-18T19:15:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -159,7 +159,15 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
- [cert-lv/CVE-2020-0688](https://github.com/cert-lv/CVE-2020-0688)
- [ravinacademy/CVE-2020-0688](https://github.com/ravinacademy/CVE-2020-0688)
- [mahyarx/Exploit_CVE-2020-0688](https://github.com/mahyarx/Exploit_CVE-2020-0688)
- [curtbraz/CVE-2020-0688](https://github.com/curtbraz/CVE-2020-0688)
- [l33terman6000/CVE-2020-0688](https://github.com/l33terman6000/CVE-2020-0688)
### CVE-2020-0692
<code>
An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'.
</code>
- [githubassets/CVE-2020-0692](https://github.com/githubassets/CVE-2020-0692)
### CVE-2020-0728
@ -237,8 +245,16 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [Rvn0xsy/CVE_2020_0796_CNA](https://github.com/Rvn0xsy/CVE_2020_0796_CNA)
- [0xeb-bp/cve-2020-0796](https://github.com/0xeb-bp/cve-2020-0796)
- [intelliroot-tech/cve-2020-0796-Scanner](https://github.com/intelliroot-tech/cve-2020-0796-Scanner)
- [curtbraz/CVE-2020-0796](https://github.com/curtbraz/CVE-2020-0796)
- [wurmx56/CVE-2020-0796](https://github.com/wurmx56/CVE-2020-0796)
- [l33terman6000/CVE-2020-0796](https://github.com/l33terman6000/CVE-2020-0796)
### CVE-2020-0798
<code>
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0779, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843.
</code>
- [githubassets/CVE-2020-0798](https://github.com/githubassets/CVE-2020-0798)
### CVE-2020-0814
@ -254,7 +270,8 @@ An elevation of privilege vulnerability exists in Windows Installer because of t
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0881.
</code>
- [curtbraz/CVE-2020-0883](https://github.com/curtbraz/CVE-2020-0883)
- [githubassets/CVE-2020-0883](https://github.com/githubassets/CVE-2020-0883)
- [l33terman6000/CVE-2020-0883](https://github.com/l33terman6000/CVE-2020-0883)
### CVE-2020-0905
@ -262,7 +279,8 @@ A remote code execution vulnerability exists in the way that the Windows Graphic
An remote code execution vulnerability exists in Microsoft Dynamics Business Central, aka 'Dynamics Business Central Remote Code Execution Vulnerability'.
</code>
- [curtbraz/CVE-2020-0905](https://github.com/curtbraz/CVE-2020-0905)
- [githubassets/CVE-2020-0905](https://github.com/githubassets/CVE-2020-0905)
- [l33terman6000/CVE-2020-0905](https://github.com/l33terman6000/CVE-2020-0905)
### CVE-2020-0976
@ -486,10 +504,11 @@ An inconsistent user interface issue was addressed with improved state managemen
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
</code>
- [curtbraz/CVE-2020-3952](https://github.com/curtbraz/CVE-2020-3952)
- [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952)
- [frustreated/CVE-2020-3952](https://github.com/frustreated/CVE-2020-3952)
- [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952)
- [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952)
- [l33terman6000/CVE-2020-3952](https://github.com/l33terman6000/CVE-2020-3952)
### CVE-2020-4276
@ -13048,7 +13067,6 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
- [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264)
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
## 2002