Auto Update 2020/05/28 00:08:16

This commit is contained in:
motikan2010-bot 2020-05-28 00:08:16 +09:00
parent ab1c8cf302
commit 2e5ffb60a9
35 changed files with 161 additions and 161 deletions

View file

@ -82,13 +82,13 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2020-05-07T18:09:29Z",
"updated_at": "2020-05-27T09:42:10Z",
"pushed_at": "2019-01-31T22:56:17Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 55,
"forks": 55,
"watchers": 182,
"watchers": 183,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-05-27T07:40:50Z",
"updated_at": "2020-05-27T11:44:03Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 101,
"forks": 101,
"watchers": 433,
"watchers": 435,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference",
"fork": false,
"created_at": "2016-03-29T09:01:52Z",
"updated_at": "2020-04-11T06:11:09Z",
"updated_at": "2020-05-27T12:37:46Z",
"pushed_at": "2016-04-07T10:37:02Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 17,
"forks": 17,
"watchers": 45,
"watchers": 46,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-05-27T07:40:50Z",
"updated_at": "2020-05-27T11:44:03Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 101,
"forks": 101,
"watchers": 433,
"watchers": 435,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 415,
"watchers_count": 415,
"forks_count": 187,
"forks": 187,
"forks_count": 188,
"forks": 188,
"watchers": 415,
"score": 0
},

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-05-25T08:28:43Z",
"updated_at": "2020-05-27T09:59:10Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 65,
"forks": 65,
"watchers": 190,
"watchers": 191,
"score": 0
},
{
@ -569,8 +569,8 @@
"pushed_at": "2019-04-25T12:44:02Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 51,
"forks": 51,
"forks_count": 52,
"forks": 52,
"watchers": 112,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-05-27T07:40:50Z",
"updated_at": "2020-05-27T11:44:03Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 101,
"forks": 101,
"watchers": 433,
"watchers": 435,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-05-20T03:31:41Z",
"updated_at": "2020-05-27T11:33:28Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 539,
"watchers_count": 539,
"stargazers_count": 538,
"watchers_count": 538,
"forks_count": 92,
"forks": 92,
"watchers": 539,
"watchers": 538,
"score": 0
},
{

View file

@ -209,14 +209,14 @@
{
"id": 253274048,
"name": "CVE-2017-9805-Exploit",
"full_name": "thevivekkryadav\/CVE-2017-9805-Exploit",
"full_name": "0xd3vil\/CVE-2017-9805-Exploit",
"owner": {
"login": "thevivekkryadav",
"login": "0xd3vil",
"id": 32324065,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/32324065?v=4",
"html_url": "https:\/\/github.com\/thevivekkryadav"
"html_url": "https:\/\/github.com\/0xd3vil"
},
"html_url": "https:\/\/github.com\/thevivekkryadav\/CVE-2017-9805-Exploit",
"html_url": "https:\/\/github.com\/0xd3vil\/CVE-2017-9805-Exploit",
"description": "Struts 2.5 - 2.5.12 REST Plugin XStream RCE",
"fork": false,
"created_at": "2020-04-05T16:00:48Z",

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-06-02T10:33:41Z",
"stargazers_count": 241,
"watchers_count": 241,
"forks_count": 58,
"forks": 58,
"forks_count": 59,
"forks": 59,
"watchers": 241,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-11686 - FlexPaper PHP Publish Service RCE <= 2.3.6",
"fork": false,
"created_at": "2019-03-20T19:36:10Z",
"updated_at": "2020-04-05T17:18:48Z",
"updated_at": "2020-05-27T12:15:17Z",
"pushed_at": "2019-03-20T20:56:02Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-03-06T10:52:19Z",
"stargazers_count": 400,
"watchers_count": 400,
"forks_count": 123,
"forks": 123,
"forks_count": 124,
"forks": 124,
"watchers": 400,
"score": 0
},

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-05-27T07:40:50Z",
"updated_at": "2020-05-27T11:44:03Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 101,
"forks": 101,
"watchers": 433,
"watchers": 435,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-05-20T03:31:41Z",
"updated_at": "2020-05-27T11:33:28Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 539,
"watchers_count": 539,
"stargazers_count": 538,
"watchers_count": 538,
"forks_count": 92,
"forks": 92,
"watchers": 539,
"watchers": 538,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-05-26T07:04:44Z",
"updated_at": "2020-05-27T10:00:08Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 254,
"watchers_count": 254,
"stargazers_count": 255,
"watchers_count": 255,
"forks_count": 51,
"forks": 51,
"watchers": 254,
"watchers": 255,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 434,
"watchers_count": 434,
"forks_count": 198,
"forks": 198,
"forks_count": 199,
"forks": 199,
"watchers": 434,
"score": 0
},
@ -86,8 +86,8 @@
"pushed_at": "2018-08-08T05:48:24Z",
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 117,
"forks": 117,
"forks_count": 118,
"forks": 118,
"watchers": 271,
"score": 0
},

View file

@ -1144,8 +1144,8 @@
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1103,
"watchers_count": 1103,
"forks_count": 373,
"forks": 373,
"forks_count": 374,
"forks": 374,
"watchers": 1103,
"score": 0
},
@ -1351,8 +1351,8 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 733,
"watchers_count": 733,
"forks_count": 172,
"forks": 172,
"forks_count": 173,
"forks": 173,
"watchers": 733,
"score": 0
},
@ -1554,13 +1554,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2020-05-22T16:46:45Z",
"updated_at": "2020-05-27T10:30:15Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1023,
"watchers_count": 1023,
"stargazers_count": 1024,
"watchers_count": 1024,
"forks_count": 350,
"forks": 350,
"watchers": 1023,
"watchers": 1024,
"score": 0
},
{
@ -2524,8 +2524,8 @@
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"forks_count": 7,
"forks": 7,
"watchers": 7,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "Poc for CVE-2019-1253",
"fork": false,
"created_at": "2019-09-11T20:40:15Z",
"updated_at": "2020-05-18T10:43:18Z",
"updated_at": "2020-05-27T13:09:37Z",
"pushed_at": "2019-09-12T14:43:47Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 37,
"forks": 37,
"watchers": 131,
"watchers": 132,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-27T08:25:13Z",
"pushed_at": "2020-05-27T07:41:34Z",
"stargazers_count": 777,
"watchers_count": 777,
"forks_count": 176,
"forks": 176,
"watchers": 777,
"updated_at": "2020-05-27T13:46:44Z",
"pushed_at": "2020-05-27T10:27:11Z",
"stargazers_count": 782,
"watchers_count": 782,
"forks_count": 177,
"forks": 177,
"watchers": 782,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-10-04T06:32:08Z",
"updated_at": "2020-05-17T11:40:31Z",
"updated_at": "2020-05-27T11:18:56Z",
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 22,
"forks": 22,
"watchers": 57,
"watchers": 58,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
"fork": false,
"created_at": "2019-10-14T17:27:37Z",
"updated_at": "2020-05-27T08:04:26Z",
"updated_at": "2020-05-27T11:29:29Z",
"pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 35,
"forks": 35,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-05-27T07:40:50Z",
"updated_at": "2020-05-27T11:44:03Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 101,
"forks": 101,
"watchers": 433,
"watchers": 435,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-05-25T08:28:43Z",
"updated_at": "2020-05-27T09:59:10Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 65,
"forks": 65,
"watchers": 190,
"watchers": 191,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
"fork": false,
"created_at": "2020-05-24T15:44:29Z",
"updated_at": "2020-05-26T09:31:45Z",
"updated_at": "2020-05-27T11:16:55Z",
"pushed_at": "2020-05-24T16:28:46Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 9,
"forks": 9,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploiting a patched vulnerability in JavaScriptCore",
"fork": false,
"created_at": "2020-01-02T00:12:22Z",
"updated_at": "2020-05-10T10:37:39Z",
"updated_at": "2020-05-27T09:32:18Z",
"pushed_at": "2020-01-02T00:13:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-05T11:43:13Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 24,
"forks": 24,
"forks_count": 25,
"forks": 25,
"watchers": 112,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Zimbra RCE PoC - CVE-2019-9670 XXE\/SSRF",
"fork": false,
"created_at": "2019-08-16T04:37:11Z",
"updated_at": "2020-04-13T11:45:51Z",
"updated_at": "2020-05-27T14:22:51Z",
"pushed_at": "2019-08-16T05:54:16Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"watchers": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"forks": 4,
"watchers": 9,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 138,
"watchers_count": 138,
"forks_count": 39,
"forks": 39,
"forks_count": 40,
"forks": 40,
"watchers": 138,
"score": 0
}

View file

@ -956,13 +956,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-05-27T08:59:59Z",
"updated_at": "2020-05-27T12:54:05Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 898,
"watchers_count": 898,
"forks_count": 267,
"forks": 267,
"watchers": 898,
"stargazers_count": 900,
"watchers_count": 900,
"forks_count": 271,
"forks": 271,
"watchers": 900,
"score": 0
},
{
@ -1140,13 +1140,13 @@
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
"fork": false,
"created_at": "2020-04-06T15:16:10Z",
"updated_at": "2020-05-27T07:13:51Z",
"updated_at": "2020-05-27T11:48:07Z",
"pushed_at": "2020-04-06T15:22:01Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 12,
"forks": 12,
"watchers": 48,
"watchers": 49,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-05-26T10:23:34Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-27T08:25:13Z",
"pushed_at": "2020-05-27T07:41:34Z",
"stargazers_count": 777,
"watchers_count": 777,
"forks_count": 176,
"forks": 176,
"watchers": 777,
"updated_at": "2020-05-27T13:46:44Z",
"pushed_at": "2020-05-27T10:27:11Z",
"stargazers_count": 782,
"watchers_count": 782,
"forks_count": 177,
"forks": 177,
"watchers": 782,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Nexus 3 越权漏洞利用脚本",
"fork": false,
"created_at": "2020-05-27T07:03:59Z",
"updated_at": "2020-05-27T07:54:10Z",
"updated_at": "2020-05-27T15:00:57Z",
"pushed_at": "2020-05-27T07:09:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-05-26T10:06:29Z",
"updated_at": "2020-05-27T14:53:36Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 90,
"forks": 90,
"watchers": 164,
"watchers": 165,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-05-27T07:40:50Z",
"updated_at": "2020-05-27T11:44:03Z",
"pushed_at": "2020-03-27T09:16:40Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 101,
"forks": 101,
"watchers": 433,
"watchers": 435,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 17,
"forks": 17,
"forks_count": 18,
"forks": 18,
"watchers": 113,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2020-05-27T05:17:55Z",
"updated_at": "2020-05-27T13:22:06Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 31,
"forks": 31,
"watchers": 176,
"watchers": 178,
"score": 0
},
{
@ -63,8 +63,8 @@
"pushed_at": "2020-05-21T02:30:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 4,
"score": 0
},
@ -82,13 +82,13 @@
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
"fork": false,
"created_at": "2020-05-21T14:30:46Z",
"updated_at": "2020-05-27T06:16:32Z",
"updated_at": "2020-05-27T11:54:15Z",
"pushed_at": "2020-05-21T15:13:22Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 12,
"forks": 12,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -9612,7 +9612,7 @@ The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x bef
- [chrisjd20/cve-2017-9805.py](https://github.com/chrisjd20/cve-2017-9805.py)
- [UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-](https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-)
- [UbuntuStrike/CVE-2017-9805_Struts_Fuzz_N_Sploit](https://github.com/UbuntuStrike/CVE-2017-9805_Struts_Fuzz_N_Sploit)
- [thevivekkryadav/CVE-2017-9805-Exploit](https://github.com/thevivekkryadav/CVE-2017-9805-Exploit)
- [0xd3vil/CVE-2017-9805-Exploit](https://github.com/0xd3vil/CVE-2017-9805-Exploit)
- [AvishkaSenadheera20/CVE-2017-9805---Documentation---IT19143378](https://github.com/AvishkaSenadheera20/CVE-2017-9805---Documentation---IT19143378)
### CVE-2017-9830