Auto Update 2020/04/18 00:08:06

This commit is contained in:
motikan2010-bot 2020-04-18 00:08:06 +09:00
parent 94057efd4b
commit 2c6d4ed0cf
29 changed files with 147 additions and 131 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 255,
"watchers_count": 255,
"forks_count": 78,
"forks": 78,
"forks_count": 79,
"forks": 79,
"watchers": 255,
"score": 0
},

View file

@ -293,8 +293,8 @@
"pushed_at": "2014-07-10T21:17:22Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 70,
"forks": 70,
"forks_count": 71,
"forks": 71,
"watchers": 119,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-09T20:08:56Z",
"updated_at": "2020-04-12T20:09:02Z",
"updated_at": "2020-04-17T14:00:06Z",
"pushed_at": "2018-04-07T00:30:52Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 10,
"forks": 10,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-29T21:27:15Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 51,
"score": 0
}

View file

@ -37,11 +37,11 @@
"fork": false,
"created_at": "2018-01-24T16:03:22Z",
"updated_at": "2019-10-31T22:14:11Z",
"pushed_at": "2018-01-31T01:24:08Z",
"pushed_at": "2020-04-17T14:38:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 12,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-23T09:50:15Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 76,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-29T21:27:15Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 51,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-06-16T09:53:10Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 22,
"forks": 22,
"forks_count": 23,
"forks": 23,
"watchers": 77,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-29T21:27:15Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 51,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-04-16T07:29:27Z",
"updated_at": "2020-04-17T14:18:41Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 43,
"forks": 43,
"watchers": 233,
"watchers": 235,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 415,
"watchers_count": 415,
"forks_count": 135,
"forks": 135,
"forks_count": 136,
"forks": 136,
"watchers": 415,
"score": 0
},

View file

@ -2037,13 +2037,13 @@
"description": "rce exploit , made to work with pocsuite3",
"fork": false,
"created_at": "2019-08-17T17:23:53Z",
"updated_at": "2020-04-08T07:10:24Z",
"updated_at": "2020-04-17T13:27:25Z",
"pushed_at": "2019-08-19T02:52:11Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 52,
"forks": 52,
"watchers": 105,
"watchers": 106,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-29T21:27:15Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 51,
"score": 0
},

View file

@ -132,8 +132,8 @@
"pushed_at": "2019-08-27T09:29:05Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 48,
"score": 0
},
@ -178,8 +178,8 @@
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 27,
"forks": 27,
"forks_count": 28,
"forks": 28,
"watchers": 72,
"score": 0
},
@ -220,13 +220,13 @@
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2020-04-16T23:08:08Z",
"pushed_at": "2020-04-16T17:00:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2020-04-17T14:11:51Z",
"pushed_at": "2020-04-17T14:57:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Poc for CVE-2019-1253",
"fork": false,
"created_at": "2019-09-11T20:40:15Z",
"updated_at": "2020-04-17T04:14:34Z",
"updated_at": "2020-04-17T09:47:52Z",
"pushed_at": "2019-09-12T14:43:47Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 37,
"forks": 37,
"watchers": 124,
"watchers": 125,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-14040",
"fork": false,
"created_at": "2020-02-03T23:04:49Z",
"updated_at": "2020-04-17T04:38:07Z",
"updated_at": "2020-04-17T13:38:25Z",
"pushed_at": "2020-04-15T14:27:49Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-14041",
"fork": false,
"created_at": "2020-02-03T23:05:10Z",
"updated_at": "2020-04-16T17:19:31Z",
"updated_at": "2020-04-17T13:19:43Z",
"pushed_at": "2020-04-15T14:28:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-23T09:50:15Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 76,
"score": 0
},

View file

@ -174,13 +174,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-17T08:56:42Z",
"pushed_at": "2020-04-16T09:51:34Z",
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 106,
"forks": 106,
"watchers": 547,
"updated_at": "2020-04-17T13:16:12Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 555,
"watchers_count": 555,
"forks_count": 107,
"forks": 107,
"watchers": 555,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-04-16T14:40:28Z",
"updated_at": "2020-04-17T13:05:15Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 45,
"forks": 45,
"watchers": 150,
"watchers": 152,
"score": 0
},
{

View file

@ -795,13 +795,13 @@
"description": "An unauthenticated PoC for CVE-2020-0796",
"fork": false,
"created_at": "2020-03-15T22:17:50Z",
"updated_at": "2020-04-01T13:40:54Z",
"updated_at": "2020-04-17T10:11:13Z",
"pushed_at": "2020-03-15T22:20:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-17T08:56:42Z",
"pushed_at": "2020-04-16T09:51:34Z",
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 106,
"forks": 106,
"watchers": 547,
"updated_at": "2020-04-17T13:16:12Z",
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 555,
"watchers_count": 555,
"forks_count": 107,
"forks": 107,
"watchers": 555,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1958 PoC",
"fork": false,
"created_at": "2020-04-11T13:31:02Z",
"updated_at": "2020-04-14T02:49:07Z",
"updated_at": "2020-04-17T09:32:15Z",
"pushed_at": "2020-04-11T14:52:36Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-04-17T07:51:14Z",
"pushed_at": "2020-04-17T07:51:11Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 11,
"forks": 11,
"watchers": 17,
"updated_at": "2020-04-17T14:24:33Z",
"pushed_at": "2020-04-17T14:24:31Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 13,
"forks": 13,
"watchers": 19,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-2555 Python POC",
"fork": false,
"created_at": "2020-03-06T16:02:59Z",
"updated_at": "2020-04-17T05:50:55Z",
"updated_at": "2020-04-17T10:37:10Z",
"pushed_at": "2020-04-16T12:04:18Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 16,
"forks": 16,
"watchers": 33,
"watchers": 34,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2020-2555",
"fork": false,
"created_at": "2020-03-07T12:02:26Z",
"updated_at": "2020-04-16T13:02:07Z",
"updated_at": "2020-04-17T10:37:16Z",
"pushed_at": "2020-03-12T09:20:08Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-04-16T14:32:52Z",
"updated_at": "2020-04-17T10:42:56Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 30,
"forks": 30,
"watchers": 92,
"watchers": 94,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2020-2555",
"fork": false,
"created_at": "2020-03-10T08:06:08Z",
"updated_at": "2020-04-10T09:18:27Z",
"updated_at": "2020-04-17T11:12:38Z",
"pushed_at": "2020-03-10T08:15:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -59,13 +59,36 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-04-17T08:25:42Z",
"updated_at": "2020-04-17T14:39:00Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 20,
"forks": 20,
"watchers": 61,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 22,
"forks": 22,
"watchers": 79,
"score": 0
},
{
"id": 256499271,
"name": "CVE-2020-3952",
"full_name": "gelim\/CVE-2020-3952",
"owner": {
"login": "gelim",
"id": 179122,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/179122?v=4",
"html_url": "https:\/\/github.com\/gelim"
},
"html_url": "https:\/\/github.com\/gelim\/CVE-2020-3952",
"description": "VMWare vmdir missing access control exploit checker",
"fork": false,
"created_at": "2020-04-17T12:39:31Z",
"updated_at": "2020-04-17T12:57:59Z",
"pushed_at": "2020-04-17T12:57:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku",
"fork": false,
"created_at": "2020-04-15T10:16:56Z",
"updated_at": "2020-04-17T07:30:50Z",
"updated_at": "2020-04-17T10:38:14Z",
"pushed_at": "2020-04-16T09:47:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"forks": 6,
"watchers": 16,
"watchers": 17,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2020-5260演示记录",
"fork": false,
"created_at": "2020-04-16T16:19:23Z",
"updated_at": "2020-04-17T03:43:05Z",
"updated_at": "2020-04-17T14:17:44Z",
"pushed_at": "2020-04-16T17:01:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 4,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-29T21:27:15Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 51,
"score": 0
}

View file

@ -488,6 +488,7 @@ Under certain conditions, vmdir that ships with VMware vCenter Server, as part o
- [curtbraz/CVE-2020-3952](https://github.com/curtbraz/CVE-2020-3952)
- [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952)
- [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952)
- [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952)
### CVE-2020-4276
@ -12611,14 +12612,6 @@ Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.1
- [minervais/pocs](https://github.com/minervais/pocs)
### CVE-2009-1185
<code>
udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
</code>
- [joker2a/CVE-2009-1185-UDEV](https://github.com/joker2a/CVE-2009-1185-UDEV)
### CVE-2009-1244
<code>