Auto Update 2020/04/07 00:08:41

This commit is contained in:
motikan2010-bot 2020-04-07 00:08:41 +09:00
parent 2d3291c49d
commit 347def6700
68 changed files with 436 additions and 412 deletions

View file

@ -13,7 +13,7 @@
"description": "Simple Exploit for Verification of CVE-2015-6606",
"fork": false,
"created_at": "2016-01-19T16:16:22Z",
"updated_at": "2019-03-23T08:47:27Z",
"updated_at": "2020-04-06T09:48:50Z",
"pushed_at": "2016-04-12T20:59:33Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -86,8 +86,8 @@
"pushed_at": "2018-07-13T18:56:53Z",
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 47,
"forks": 47,
"forks_count": 46,
"forks": 46,
"watchers": 127,
"score": 0
},
@ -132,8 +132,8 @@
"pushed_at": "2018-01-03T00:42:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 40,
"forks": 40,
"forks_count": 39,
"forks": 39,
"watchers": 2,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit",
"fork": false,
"created_at": "2018-09-03T15:46:39Z",
"updated_at": "2019-11-27T13:39:59Z",
"updated_at": "2020-04-06T11:31:51Z",
"pushed_at": "2018-09-04T10:07:06Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 3,
"forks": 3,
"watchers": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 4,
"forks": 4,
"watchers": 23,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Test and exploit for CVE-2017-12542",
"fork": false,
"created_at": "2018-02-05T18:55:56Z",
"updated_at": "2019-10-23T22:54:14Z",
"updated_at": "2020-04-06T12:17:15Z",
"pushed_at": "2018-04-15T12:01:38Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 29,
"forks": 29,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 \/ 2.x < 2.1.1 - Remote Privilege Escalation",
"fork": false,
"created_at": "2019-11-07T20:02:31Z",
"updated_at": "2020-03-29T03:53:03Z",
"updated_at": "2020-04-06T14:47:47Z",
"pushed_at": "2019-12-15T15:19:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PowerDNS CVE-2017-15120 \/ DO NOT ABUSE",
"fork": false,
"created_at": "2018-10-16T15:08:15Z",
"updated_at": "2019-11-21T12:23:52Z",
"updated_at": "2020-04-06T11:04:21Z",
"pushed_at": "2018-10-16T15:09:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
"fork": false,
"created_at": "2017-10-22T09:22:28Z",
"updated_at": "2018-10-15T20:53:05Z",
"updated_at": "2020-04-06T12:23:41Z",
"pushed_at": "2017-06-11T16:47:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2020-03-26T08:33:52Z",
"updated_at": "2020-04-06T12:43:33Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 549,
"watchers_count": 549,
"stargazers_count": 548,
"watchers_count": 548,
"forks_count": 72,
"forks": 72,
"watchers": 549,
"watchers": 548,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2017-7494 - Detection Scripts",
"fork": false,
"created_at": "2017-05-26T07:28:26Z",
"updated_at": "2018-11-14T10:49:16Z",
"updated_at": "2020-04-06T12:15:02Z",
"pushed_at": "2017-05-26T07:43:02Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 22,
"forks": 22,
"watchers": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 23,
"forks": 23,
"watchers": 62,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.",
"fork": false,
"created_at": "2018-08-03T04:36:23Z",
"updated_at": "2020-03-14T22:49:59Z",
"updated_at": "2020-04-06T14:28:56Z",
"pushed_at": "2018-08-14T07:47:02Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 19,
"forks": 19,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2020-04-01T11:46:21Z",
"updated_at": "2020-04-06T12:06:51Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 78,
"forks": 78,
"watchers": 231,
"watchers": 232,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2018-02-07T16:25:59Z",
"updated_at": "2019-10-11T19:04:25Z",
"updated_at": "2020-04-06T12:17:46Z",
"pushed_at": "2018-02-07T16:43:08Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 6,
"forks": 6,
"watchers": 14,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This repository contains the POC of an exploit for node-jose < 0.11.0",
"fork": false,
"created_at": "2018-03-20T20:37:29Z",
"updated_at": "2020-01-21T11:37:45Z",
"updated_at": "2020-04-06T11:52:17Z",
"pushed_at": "2019-07-30T13:12:41Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"forks": 5,
"watchers": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 6,
"forks": 6,
"watchers": 20,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Test utility for cve-2018-1002105",
"fork": false,
"created_at": "2018-12-05T02:51:43Z",
"updated_at": "2020-02-15T23:43:31Z",
"updated_at": "2020-04-06T10:50:44Z",
"pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 22,
"forks": 22,
"watchers": 191,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 23,
"forks": 23,
"watchers": 192,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "PoC for CVE-2018-1002105.",
"fork": false,
"created_at": "2018-12-06T11:28:02Z",
"updated_at": "2020-02-15T23:43:36Z",
"updated_at": "2020-04-06T10:51:02Z",
"pushed_at": "2018-12-21T14:34:04Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 38,
"forks": 38,
"watchers": 216,
"stargazers_count": 217,
"watchers_count": 217,
"forks_count": 39,
"forks": 39,
"watchers": 217,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2020-03-02T10:35:07Z",
"updated_at": "2020-04-06T11:04:04Z",
"pushed_at": "2020-01-29T10:28:44Z",
"stargazers_count": 462,
"watchers_count": 462,
"stargazers_count": 463,
"watchers_count": 463,
"forks_count": 116,
"forks": 116,
"watchers": 462,
"watchers": 463,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
"fork": false,
"created_at": "2018-10-18T15:08:25Z",
"updated_at": "2019-07-15T17:56:19Z",
"updated_at": "2020-04-06T11:03:55Z",
"pushed_at": "2018-10-18T15:11:35Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks": 3,
"watchers": 9,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of concept showing how to exploit the CVE-2018-11759",
"fork": false,
"created_at": "2018-11-01T09:11:07Z",
"updated_at": "2019-10-04T07:11:18Z",
"updated_at": "2020-04-06T11:00:03Z",
"pushed_at": "2018-12-11T12:59:26Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 14,
"forks": 14,
"watchers": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 15,
"forks": 15,
"watchers": 34,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": " An exploit for Apache Struts CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T01:53:30Z",
"updated_at": "2020-02-27T12:25:55Z",
"updated_at": "2020-04-06T11:33:37Z",
"pushed_at": "2018-08-26T02:31:39Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"forks_count": 101,
"forks": 101,
"watchers": 285,
"watchers": 286,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat 安全绕过漏洞 Poc",
"fork": false,
"created_at": "2018-03-12T16:09:46Z",
"updated_at": "2020-03-11T05:07:13Z",
"updated_at": "2020-04-06T14:20:38Z",
"pushed_at": "2018-06-01T10:05:52Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"watchers": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"forks": 6,
"watchers": 16,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 63,
"forks": 63,
"forks_count": 62,
"forks": 62,
"watchers": 196,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-13T15:06:28Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 41,
"forks": 41,
"forks_count": 40,
"forks": 40,
"watchers": 104,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Discuz backend getshell",
"fork": false,
"created_at": "2018-08-27T11:58:49Z",
"updated_at": "2020-03-24T00:43:07Z",
"updated_at": "2020-04-06T10:49:24Z",
"pushed_at": "2018-12-15T10:30:34Z",
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 19,
"forks": 19,
"watchers": 78,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 20,
"forks": 20,
"watchers": 79,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2020-02-19T11:48:20Z",
"updated_at": "2020-04-06T11:07:39Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 176,
"watchers_count": 176,
"forks_count": 21,
"forks": 21,
"watchers": 176,
"stargazers_count": 177,
"watchers_count": 177,
"forks_count": 22,
"forks": 22,
"watchers": 177,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
"fork": false,
"created_at": "2018-08-17T23:48:15Z",
"updated_at": "2020-04-04T04:02:58Z",
"updated_at": "2020-04-06T11:36:21Z",
"pushed_at": "2019-11-15T08:12:32Z",
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 25,
"forks": 25,
"watchers": 102,
"stargazers_count": 103,
"watchers_count": 103,
"forks_count": 26,
"forks": 26,
"watchers": 103,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2020-04-03T03:17:23Z",
"updated_at": "2020-04-06T11:35:26Z",
"pushed_at": "2020-03-06T10:52:19Z",
"stargazers_count": 389,
"watchers_count": 389,
"stargazers_count": 390,
"watchers_count": 390,
"forks_count": 118,
"forks": 118,
"watchers": 389,
"watchers": 390,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)",
"fork": false,
"created_at": "2018-08-21T15:26:35Z",
"updated_at": "2020-03-19T00:33:58Z",
"updated_at": "2020-04-06T11:34:14Z",
"pushed_at": "2018-08-23T12:55:23Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Script and metasploit module for CVE-2018-15982",
"fork": false,
"created_at": "2018-12-11T16:31:21Z",
"updated_at": "2020-03-14T20:56:39Z",
"updated_at": "2020-04-06T10:50:28Z",
"pushed_at": "2018-12-14T19:34:42Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2018-15982_EXP_IE",
"fork": false,
"created_at": "2018-12-12T02:41:31Z",
"updated_at": "2019-12-04T14:57:12Z",
"updated_at": "2020-04-06T10:50:19Z",
"pushed_at": "2018-12-12T02:54:01Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 9,
"forks": 9,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2018-12-14T00:53:46Z",
"updated_at": "2019-05-30T16:10:52Z",
"updated_at": "2020-04-06T10:49:41Z",
"pushed_at": "2018-12-14T00:54:01Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Put the *.py files to test\/functional folder of bitcoin sourcecode (commit: 4901c00792c1dabae4bb01e6373c9b1ed9ef3008)",
"fork": false,
"created_at": "2018-10-31T09:07:35Z",
"updated_at": "2019-08-30T14:05:53Z",
"updated_at": "2020-04-06T10:56:04Z",
"pushed_at": "2018-11-12T10:11:00Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)",
"fork": false,
"created_at": "2018-12-01T10:53:45Z",
"updated_at": "2020-01-13T11:11:08Z",
"updated_at": "2020-04-06T10:52:16Z",
"pushed_at": "2018-12-12T22:11:45Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 6,
"forks": 6,
"watchers": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 7,
"forks": 7,
"watchers": 37,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-02-23T10:00:03Z",
"updated_at": "2020-03-13T16:16:07Z",
"updated_at": "2020-04-06T10:44:19Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM",
"fork": false,
"created_at": "2018-03-14T09:20:21Z",
"updated_at": "2019-12-05T03:00:51Z",
"updated_at": "2020-04-06T12:16:04Z",
"pushed_at": "2018-03-14T12:13:43Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 14,
"forks": 14,
"watchers": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 15,
"forks": 15,
"watchers": 45,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2018-08-28T08:04:19Z",
"updated_at": "2020-04-04T22:03:14Z",
"updated_at": "2020-04-06T11:32:51Z",
"pushed_at": "2018-08-28T08:06:21Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 31,
"forks": 31,
"watchers": 89,
"watchers": 90,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-07-19T05:46:55Z",
"updated_at": "2019-12-12T17:04:35Z",
"updated_at": "2020-04-06T11:41:27Z",
"pushed_at": "2018-07-19T05:59:00Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 40,
"forks": 40,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-3191 payload generator",
"fork": false,
"created_at": "2018-10-22T02:29:12Z",
"updated_at": "2019-06-24T04:18:16Z",
"updated_at": "2020-04-06T11:03:47Z",
"pushed_at": "2018-10-21T17:28:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 56,
"forks": 56,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2018-3191 反弹shell",
"fork": false,
"created_at": "2018-10-23T17:24:43Z",
"updated_at": "2019-11-29T08:42:20Z",
"updated_at": "2020-04-06T11:02:22Z",
"pushed_at": "2018-10-23T17:28:05Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 26,
"forks": 26,
"watchers": 52,
"watchers": 53,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": null,
"fork": false,
"created_at": "2018-10-24T09:54:00Z",
"updated_at": "2019-11-09T11:57:18Z",
"updated_at": "2020-04-06T11:02:04Z",
"pushed_at": "2018-10-25T08:12:46Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 2,
"forks": 2,
"watchers": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks": 3,
"watchers": 18,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
"fork": false,
"created_at": "2018-08-08T14:41:20Z",
"updated_at": "2020-03-31T17:30:03Z",
"updated_at": "2020-04-06T11:36:58Z",
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 151,
"watchers_count": 151,
"forks_count": 29,
"forks": 29,
"watchers": 151,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 30,
"forks": 30,
"watchers": 152,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": " POC for CVE-2018-4327",
"fork": false,
"created_at": "2018-09-11T19:15:09Z",
"updated_at": "2019-12-21T13:38:17Z",
"updated_at": "2020-04-06T11:12:16Z",
"pushed_at": "2018-09-13T15:59:05Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 7,
"forks": 7,
"watchers": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 8,
"forks": 8,
"watchers": 40,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "iOS 12 \/ OS X Remote Kernel Heap Overflow (CVE-2018-4407) POC",
"fork": false,
"created_at": "2018-11-01T08:21:59Z",
"updated_at": "2020-02-07T08:42:03Z",
"updated_at": "2020-04-06T11:00:33Z",
"pushed_at": "2018-11-01T08:53:23Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 13,
"forks": 13,
"watchers": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 14,
"forks": 14,
"watchers": 59,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Crash macOS and iOS devices with one packet",
"fork": false,
"created_at": "2018-11-01T17:03:25Z",
"updated_at": "2020-01-16T14:01:08Z",
"updated_at": "2020-04-06T10:58:21Z",
"pushed_at": "2018-11-15T21:13:37Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 19,
"forks": 19,
"watchers": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 20,
"forks": 20,
"watchers": 49,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]",
"fork": false,
"created_at": "2018-11-04T01:47:05Z",
"updated_at": "2020-03-13T20:38:19Z",
"updated_at": "2020-04-06T10:57:39Z",
"pushed_at": "2018-11-04T02:25:08Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 9,
"forks": 9,
"watchers": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 10,
"forks": 10,
"watchers": 18,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-04-06T06:37:34Z",
"updated_at": "2020-04-06T09:57:51Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"forks_count": 40,
"forks": 40,
"watchers": 221,
"watchers": 222,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.",
"fork": false,
"created_at": "2018-11-13T18:47:37Z",
"updated_at": "2019-11-22T16:53:09Z",
"updated_at": "2020-04-06T10:55:38Z",
"pushed_at": "2019-11-22T16:53:07Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2020-04-05T18:10:41Z",
"updated_at": "2020-04-06T11:02:45Z",
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 413,
"watchers_count": 413,
"stargazers_count": 414,
"watchers_count": 414,
"forks_count": 135,
"forks": 135,
"watchers": 413,
"watchers": 414,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "CVE-2018-7600 - Drupal 7.x RCE",
"fork": false,
"created_at": "2018-04-16T20:16:21Z",
"updated_at": "2020-03-31T09:02:57Z",
"updated_at": "2020-04-06T11:50:49Z",
"pushed_at": "2018-04-18T20:34:19Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 31,
"forks": 31,
"watchers": 67,
"watchers": 68,
"score": 0
},
{
@ -266,13 +266,13 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
"updated_at": "2020-03-25T15:10:20Z",
"updated_at": "2020-04-06T11:50:29Z",
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 27,
"forks": 27,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "an RCE (remote command execution) approach of CVE-2018-7750",
"fork": false,
"created_at": "2018-11-06T10:01:13Z",
"updated_at": "2020-03-02T12:40:24Z",
"updated_at": "2020-04-06T10:57:16Z",
"pushed_at": "2018-11-06T10:10:31Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 7,
"forks": 7,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-8021 Proof-Of-Concept and Exploit ",
"fork": false,
"created_at": "2018-12-02T19:01:17Z",
"updated_at": "2020-03-24T08:07:56Z",
"updated_at": "2020-04-06T10:52:40Z",
"pushed_at": "2018-12-03T21:13:00Z",
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 17,
"forks": 17,
"watchers": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 18,
"forks": 18,
"watchers": 102,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2018-09-12T08:22:54Z",
"updated_at": "2018-12-04T20:00:09Z",
"updated_at": "2020-04-06T11:11:55Z",
"pushed_at": "2018-09-12T03:50:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 54,
"forks": 54,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "cve-2018-8453 exp",
"fork": false,
"created_at": "2019-01-18T10:40:03Z",
"updated_at": "2020-03-27T08:37:32Z",
"updated_at": "2020-04-06T14:46:06Z",
"pushed_at": "2019-12-13T02:24:39Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 55,
"forks": 55,
"watchers": 108,
"watchers": 109,
"score": 0
},
{

View file

@ -1715,13 +1715,13 @@
"description": "CVE-2019-0708 - BlueKeep (RDP)",
"fork": false,
"created_at": "2019-05-31T17:37:26Z",
"updated_at": "2020-03-29T04:40:08Z",
"updated_at": "2020-04-06T13:30:22Z",
"pushed_at": "2019-06-01T11:07:50Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 10,
"forks": 10,
"watchers": 37,
"watchers": 38,
"score": 0
},
{
@ -1784,13 +1784,13 @@
"description": "CVE-2019-0708批量检测",
"fork": false,
"created_at": "2019-06-11T05:38:26Z",
"updated_at": "2019-11-24T16:23:21Z",
"updated_at": "2020-04-06T14:16:41Z",
"pushed_at": "2019-06-11T06:40:41Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"score": 0
},
{
@ -2037,13 +2037,13 @@
"description": "rce exploit , made to work with pocsuite3",
"fork": false,
"created_at": "2019-08-17T17:23:53Z",
"updated_at": "2020-04-05T08:09:27Z",
"updated_at": "2020-04-06T10:18:37Z",
"pushed_at": "2019-08-19T02:52:11Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 52,
"forks": 52,
"watchers": 103,
"watchers": 102,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2020-04-01T09:30:39Z",
"updated_at": "2020-04-06T10:45:50Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 72,
"forks": 72,
"watchers": 248,
"watchers": 249,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-02-23T10:00:03Z",
"updated_at": "2020-03-13T16:16:07Z",
"updated_at": "2020-04-06T10:44:19Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-04-05T17:55:14Z",
"updated_at": "2020-04-06T13:06:25Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1554,
"watchers_count": 1554,

View file

@ -13,13 +13,13 @@
"description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)",
"fork": false,
"created_at": "2020-01-27T12:27:53Z",
"updated_at": "2020-03-10T18:19:51Z",
"updated_at": "2020-04-06T10:09:06Z",
"pushed_at": "2020-01-27T12:32:04Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 6,
"forks": 6,
"watchers": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 7,
"forks": 7,
"watchers": 32,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Pulse Secure SSL VPN pre-auth file reading",
"fork": false,
"created_at": "2019-08-22T08:18:19Z",
"updated_at": "2020-04-05T17:56:54Z",
"updated_at": "2020-04-06T11:33:57Z",
"pushed_at": "2019-08-26T19:33:43Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 15,
"forks": 15,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Jackson Rce For CVE-2019-12384 ",
"fork": false,
"created_at": "2019-07-24T07:12:14Z",
"updated_at": "2020-03-20T06:34:40Z",
"updated_at": "2020-04-06T10:20:12Z",
"pushed_at": "2019-07-24T07:31:42Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 12,
"forks": 12,
"watchers": 52,
"watchers": 53,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-17570 details and proof of concept",
"fork": false,
"created_at": "2020-01-24T11:32:18Z",
"updated_at": "2020-04-05T19:54:57Z",
"updated_at": "2020-04-06T10:09:43Z",
"pushed_at": "2020-01-31T15:33:06Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 6,
"forks": 6,
"watchers": 58,
"watchers": 59,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-04-05T16:35:43Z",
"updated_at": "2020-04-06T09:50:29Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 18,
"forks": 18,
"watchers": 119,
"watchers": 120,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-18890 POC (Proof of Concept)",
"fork": false,
"created_at": "2020-01-02T11:44:47Z",
"updated_at": "2020-03-05T11:44:48Z",
"updated_at": "2020-04-06T10:10:24Z",
"pushed_at": "2020-01-06T13:13:58Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2019-11-06T07:26:43Z",
"updated_at": "2019-11-06T07:27:36Z",
"pushed_at": "2019-11-06T07:26:58Z",
"pushed_at": "2020-04-06T13:50:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-5418 - File Content Disclosure on Ruby on Rails",
"fork": false,
"created_at": "2019-03-16T11:58:18Z",
"updated_at": "2020-04-05T17:18:34Z",
"updated_at": "2020-04-06T14:36:18Z",
"pushed_at": "2019-03-25T07:19:58Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 14,
"forks": 14,
"watchers": 153,
"watchers": 154,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)",
"fork": false,
"created_at": "2019-03-23T02:52:31Z",
"updated_at": "2020-04-05T17:16:13Z",
"updated_at": "2020-04-06T14:22:31Z",
"pushed_at": "2020-03-04T19:05:08Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 18,
"forks": 18,
"watchers": 98,
"watchers": 99,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2020-03-25T00:44:45Z",
"updated_at": "2020-04-06T10:46:09Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 61,
"forks": 61,
"watchers": 178,
"watchers": 179,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2020-03-30T02:59:30Z",
"updated_at": "2020-04-06T10:44:28Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 381,
"watchers_count": 381,
"forks_count": 92,
"forks": 92,
"watchers": 381,
"stargazers_count": 382,
"watchers_count": 382,
"forks_count": 93,
"forks": 93,
"watchers": 382,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2020-03-24T13:33:25Z",
"updated_at": "2020-04-06T10:45:56Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 506,
"watchers_count": 506,
"forks_count": 103,
"forks": 103,
"watchers": 506,
"stargazers_count": 507,
"watchers_count": 507,
"forks_count": 104,
"forks": 104,
"watchers": 507,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4",
"fork": false,
"created_at": "2020-02-02T16:42:32Z",
"updated_at": "2020-03-28T08:30:17Z",
"updated_at": "2020-04-06T10:08:38Z",
"pushed_at": "2020-02-03T15:11:25Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 11,
"forks": 11,
"watchers": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 12,
"forks": 12,
"watchers": 59,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-9729. Transferred from https:\/\/github.com\/DoubleLabyrinth\/SdoKeyCrypt-sys-local-privilege-elevation",
"fork": false,
"created_at": "2019-03-12T14:18:20Z",
"updated_at": "2020-03-31T05:49:11Z",
"updated_at": "2020-04-06T10:42:27Z",
"pushed_at": "2019-03-13T01:24:21Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 25,
"forks": 25,
"watchers": 77,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 26,
"forks": 26,
"watchers": 78,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Array.prototype.slice wrong alias information.",
"fork": false,
"created_at": "2019-03-25T02:33:18Z",
"updated_at": "2020-02-16T05:56:49Z",
"updated_at": "2020-04-06T10:41:03Z",
"pushed_at": "2019-03-25T02:41:43Z",
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 15,
"forks": 15,
"watchers": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 16,
"forks": 16,
"watchers": 69,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 52,
"score": 0
}

View file

@ -450,13 +450,13 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2020-03-16T13:01:09Z",
"updated_at": "2020-04-06T12:31:24Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 8,
"forks": 8,
"watchers": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 9,
"forks": 9,
"watchers": 61,
"score": 0
},
{

View file

@ -59,7 +59,7 @@
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
"fork": false,
"created_at": "2020-01-24T03:52:49Z",
"updated_at": "2020-04-02T07:06:28Z",
"updated_at": "2020-04-06T10:09:37Z",
"pushed_at": "2020-01-26T21:04:27Z",
"stargazers_count": 66,
"watchers_count": 66,

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-04-02T18:44:05Z",
"updated_at": "2020-04-06T13:07:31Z",
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 61,
"forks": 61,
"watchers": 168,
"watchers": 169,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-04-06T08:48:26Z",
"updated_at": "2020-04-06T10:06:02Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 42,
"forks": 42,
"watchers": 139,
"watchers": 140,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-03-26T13:57:24Z",
"updated_at": "2020-04-06T12:28:26Z",
"pushed_at": "2020-03-16T17:25:51Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0
},
{
@ -979,13 +979,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-06T08:09:45Z",
"updated_at": "2020-04-06T13:11:28Z",
"pushed_at": "2020-04-03T13:31:54Z",
"stargazers_count": 770,
"watchers_count": 770,
"forks_count": 206,
"forks": 206,
"watchers": 770,
"stargazers_count": 773,
"watchers_count": 773,
"forks_count": 209,
"forks": 209,
"watchers": 773,
"score": 0
},
{
@ -1002,13 +1002,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-04-05T14:38:54Z",
"updated_at": "2020-04-06T10:52:58Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 36,
"forks": 36,
"watchers": 117,
"watchers": 118,
"score": 0
},
{
@ -1094,13 +1094,13 @@
"description": null,
"fork": false,
"created_at": "2020-04-01T01:46:08Z",
"updated_at": "2020-04-02T13:41:03Z",
"updated_at": "2020-04-06T12:28:41Z",
"pushed_at": "2020-04-01T01:46:17Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0
},
{
@ -1140,8 +1140,8 @@
"description": "该资源为CVE-2020-0796漏洞复现包括Python版本和C++版本。主要是集合了github大神们的资源希望您喜欢~",
"fork": false,
"created_at": "2020-04-02T12:12:03Z",
"updated_at": "2020-04-03T04:36:47Z",
"pushed_at": "2020-04-03T04:36:45Z",
"updated_at": "2020-04-06T13:41:30Z",
"pushed_at": "2020-04-06T13:41:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-03-31T09:43:42Z",
"updated_at": "2020-04-06T10:06:40Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 82,
"forks": 82,
"watchers": 145,
"watchers": 146,
"score": 0
},
{
@ -450,13 +450,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本均为亲测可用的脚本文件尽力补全所有脚本文件的使用说明文档优先更新高危且易利用的漏洞利用脚本最近添加CVE-2020-1938、CVE-2020-2551",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-05T11:28:09Z",
"updated_at": "2020-04-06T14:55:19Z",
"pushed_at": "2020-04-05T10:36:55Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 5,
"forks": 5,
"watchers": 35,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 6,
"forks": 6,
"watchers": 37,
"score": 0
}
]

View file

@ -136,5 +136,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 253468631,
"name": "CVE-2020-2551",
"full_name": "cnsimo\/CVE-2020-2551",
"owner": {
"login": "cnsimo",
"id": 22788893,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22788893?v=4",
"html_url": "https:\/\/github.com\/cnsimo"
},
"html_url": "https:\/\/github.com\/cnsimo\/CVE-2020-2551",
"description": "Use shell to build weblogic debug environment for CVE-2020-2551",
"fork": false,
"created_at": "2020-04-06T10:47:35Z",
"updated_at": "2020-04-06T11:01:11Z",
"pushed_at": "2020-04-06T10:59:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
"fork": false,
"created_at": "2020-02-19T02:29:14Z",
"updated_at": "2020-03-22T13:20:43Z",
"updated_at": "2020-04-06T12:29:09Z",
"pushed_at": "2020-03-12T02:25:31Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"forks": 6,
"watchers": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"forks": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -348,6 +348,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [0nise/CVE-2020-2551](https://github.com/0nise/CVE-2020-2551)
- [Y4er/CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551)
- [Gspider7/rmi-iiop](https://github.com/Gspider7/rmi-iiop)
- [cnsimo/CVE-2020-2551](https://github.com/cnsimo/CVE-2020-2551)
### CVE-2020-2555