Auto Update 2020/11/04 18:09:17

This commit is contained in:
motikan2010-bot 2020-11-04 18:09:17 +09:00
parent 2d5596c27f
commit 3b0d0f1002
29 changed files with 137 additions and 137 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-03T19:24:03Z",
"updated_at": "2020-11-04T06:39:51Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 741,
"watchers_count": 741,
"stargazers_count": 742,
"watchers_count": 742,
"forks_count": 182,
"forks": 182,
"watchers": 741,
"watchers": 742,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-08-11T08:36:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-03T19:24:03Z",
"updated_at": "2020-11-04T06:39:51Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 741,
"watchers_count": 741,
"stargazers_count": 742,
"watchers_count": 742,
"forks_count": 182,
"forks": 182,
"watchers": 741,
"watchers": 742,
"score": 0
},
{
@ -40,8 +40,8 @@
"pushed_at": "2020-08-11T08:36:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}

View file

@ -362,8 +362,8 @@
"pushed_at": "2018-07-06T08:42:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
@ -477,8 +477,8 @@
"pushed_at": "2019-03-15T01:51:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-03T19:24:03Z",
"updated_at": "2020-11-04T06:39:51Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 741,
"watchers_count": 741,
"stargazers_count": 742,
"watchers_count": 742,
"forks_count": 182,
"forks": 182,
"watchers": 741,
"watchers": 742,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-03T19:24:03Z",
"updated_at": "2020-11-04T06:39:51Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 741,
"watchers_count": 741,
"stargazers_count": 742,
"watchers_count": 742,
"forks_count": 182,
"forks": 182,
"watchers": 741,
"watchers": 742,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-12T10:09:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 11,
"score": 0
}

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-10-22T18:31:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2020-09-21T08:10:26Z",
"updated_at": "2020-11-04T08:15:00Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 267,
"watchers_count": 267,
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 82,
"forks": 82,
"watchers": 267,
"watchers": 268,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-03T09:36:15Z",
"updated_at": "2020-11-04T06:48:49Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 2000,
"watchers_count": 2000,
"forks_count": 524,
"forks": 524,
"watchers": 2000,
"stargazers_count": 2001,
"watchers_count": 2001,
"forks_count": 525,
"forks": 525,
"watchers": 2001,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-10-17T01:33:01Z",
"updated_at": "2020-11-04T05:48:21Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 23,
"forks": 23,
"watchers": 132,
"watchers": 133,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Citrix ADC Remote Code Execution",
"fork": false,
"created_at": "2020-01-11T03:10:12Z",
"updated_at": "2020-10-29T01:38:37Z",
"updated_at": "2020-11-04T07:50:12Z",
"pushed_at": "2020-01-11T14:03:52Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 19,
"forks": 19,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 661,
"watchers_count": 661,
"forks_count": 135,
"forks": 135,
"forks_count": 136,
"forks": 136,
"watchers": 661,
"score": 0
},
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-03T19:24:03Z",
"updated_at": "2020-11-04T06:39:51Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 741,
"watchers_count": 741,
"stargazers_count": 742,
"watchers_count": 742,
"forks_count": 182,
"forks": 182,
"watchers": 741,
"watchers": 742,
"score": 0
}
]

View file

@ -132,8 +132,8 @@
"pushed_at": "2020-08-11T08:36:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-6340-Drupal SA-CORE-2019-003",
"fork": false,
"created_at": "2019-02-22T16:03:40Z",
"updated_at": "2020-09-21T14:45:25Z",
"updated_at": "2020-11-04T08:14:58Z",
"pushed_at": "2019-02-24T18:43:05Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 9,
"forks": 9,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2020-10-26T14:52:20Z",
"updated_at": "2020-11-04T04:52:14Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 585,
"watchers_count": 585,
"stargazers_count": 586,
"watchers_count": 586,
"forks_count": 131,
"forks": 131,
"watchers": 585,
"watchers": 586,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2020-11-02T22:19:08Z",
"updated_at": "2020-11-04T08:16:05Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 530,
"watchers_count": 530,
"stargazers_count": 531,
"watchers_count": 531,
"forks_count": 111,
"forks": 111,
"watchers": 530,
"watchers": 531,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2020-11-03T17:18:47Z",
"updated_at": "2020-11-04T06:34:46Z",
"pushed_at": "2020-02-11T21:34:28Z",
"stargazers_count": 227,
"watchers_count": 227,
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 48,
"forks": 48,
"watchers": 227,
"watchers": 228,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-11-03T06:06:38Z",
"updated_at": "2020-11-04T08:24:53Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 436,
"watchers_count": 436,
"forks_count": 103,
"forks": 103,
"watchers": 436,
"stargazers_count": 439,
"watchers_count": 439,
"forks_count": 104,
"forks": 104,
"watchers": 439,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2020-11-03T16:30:13Z",
"updated_at": "2020-11-04T06:35:40Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 341,
"watchers_count": 341,
"stargazers_count": 342,
"watchers_count": 342,
"forks_count": 59,
"forks": 59,
"watchers": 341,
"watchers": 342,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
"fork": false,
"created_at": "2020-11-02T14:48:55Z",
"updated_at": "2020-11-04T02:43:27Z",
"updated_at": "2020-11-04T07:32:19Z",
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 2,
"forks": 2,
"watchers": 38,
"watchers": 41,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-10-31T05:23:49Z",
"updated_at": "2020-11-04T05:30:47Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 685,
"watchers_count": 685,
"stargazers_count": 686,
"watchers_count": 686,
"forks_count": 199,
"forks": 199,
"watchers": 685,
"watchers": 686,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-11-04T02:58:04Z",
"updated_at": "2020-11-04T08:30:20Z",
"pushed_at": "2020-11-04T02:26:59Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 20,
"forks": 20,
"watchers": 113,
"watchers": 117,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "CVE-2020-14882_ALL综合利用工具支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
"updated_at": "2020-11-04T01:20:39Z",
"updated_at": "2020-11-04T08:43:48Z",
"pushed_at": "2020-11-03T12:12:30Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"watchers": 13,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 19,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": "CVE-2020-14882\/14883\/14750",
"fork": false,
"created_at": "2020-11-04T03:09:13Z",
"updated_at": "2020-11-04T03:09:54Z",
"pushed_at": "2020-11-04T03:09:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2020-11-04T08:42:36Z",
"pushed_at": "2020-11-04T03:15:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-10T02:38:15Z",
"updated_at": "2020-10-29T19:01:40Z",
"updated_at": "2020-11-04T09:08:29Z",
"pushed_at": "2020-10-09T16:39:54Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"forks": 2,
"watchers": 11,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-15999",
"fork": false,
"created_at": "2020-10-28T16:16:25Z",
"updated_at": "2020-11-04T00:00:10Z",
"updated_at": "2020-11-04T08:33:56Z",
"pushed_at": "2020-11-03T17:53:20Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 52,
"forks": 52,
"forks_count": 53,
"forks": 53,
"watchers": 71,
"score": 0
},
@ -86,8 +86,8 @@
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 89,
"forks": 89,
"forks_count": 90,
"forks": 90,
"watchers": 202,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-03T19:24:03Z",
"updated_at": "2020-11-04T06:39:51Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 741,
"watchers_count": 741,
"stargazers_count": 742,
"watchers_count": 742,
"forks_count": 182,
"forks": 182,
"watchers": 741,
"watchers": 742,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-03T09:36:15Z",
"updated_at": "2020-11-04T06:48:49Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 2000,
"watchers_count": 2000,
"forks_count": 524,
"forks": 524,
"watchers": 2000,
"stargazers_count": 2001,
"watchers_count": 2001,
"forks_count": 525,
"forks": 525,
"watchers": 2001,
"score": 0
},
{
@ -1117,13 +1117,13 @@
"description": "Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3",
"fork": false,
"created_at": "2020-08-09T11:46:23Z",
"updated_at": "2020-08-09T12:10:28Z",
"updated_at": "2020-11-04T08:41:38Z",
"pushed_at": "2020-08-09T12:10:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-8163 - Remote code execution of user-provided local names in Rails",
"fork": false,
"created_at": "2020-06-19T21:03:05Z",
"updated_at": "2020-10-21T22:17:40Z",
"updated_at": "2020-11-04T06:45:14Z",
"pushed_at": "2020-07-28T15:29:27Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 13,
"forks": 13,
"watchers": 60,
"watchers": 61,
"score": 0
},
{