Auto Update 2020/11/02 12:08:57

This commit is contained in:
motikan2010-bot 2020-11-02 12:08:57 +09:00
parent 9baaf48e07
commit 4f0e1000d6
27 changed files with 128 additions and 128 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-01T15:58:29Z",
"updated_at": "2020-11-02T02:04:56Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 739,
"watchers_count": 739,
"forks_count": 181,
"forks": 181,
"watchers": 739,
"stargazers_count": 740,
"watchers_count": 740,
"forks_count": 182,
"forks": 182,
"watchers": 740,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-01T15:58:29Z",
"updated_at": "2020-11-02T02:04:56Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 739,
"watchers_count": 739,
"forks_count": 181,
"forks": 181,
"watchers": 739,
"stargazers_count": 740,
"watchers_count": 740,
"forks_count": 182,
"forks": 182,
"watchers": 740,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-10-23T16:36:27Z",
"updated_at": "2020-11-02T03:05:33Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 234,
"watchers_count": 234,
"forks_count": 84,
"forks": 84,
"watchers": 234,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 85,
"forks": 85,
"watchers": 235,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-01T15:58:29Z",
"updated_at": "2020-11-02T02:04:56Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 739,
"watchers_count": 739,
"forks_count": 181,
"forks": 181,
"watchers": 739,
"stargazers_count": 740,
"watchers_count": 740,
"forks_count": 182,
"forks": 182,
"watchers": 740,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-01T15:58:29Z",
"updated_at": "2020-11-02T02:04:56Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 739,
"watchers_count": 739,
"forks_count": 181,
"forks": 181,
"watchers": 739,
"stargazers_count": 740,
"watchers_count": 740,
"forks_count": 182,
"forks": 182,
"watchers": 740,
"score": 0
},
{

View file

@ -2474,13 +2474,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-10-28T16:27:51Z",
"updated_at": "2020-11-02T03:02:42Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 22,
"forks": 22,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-10-29T17:14:35Z",
"updated_at": "2020-11-02T03:07:17Z",
"pushed_at": "2020-03-23T11:22:54Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"forks_count": 49,
"forks": 49,
"watchers": 235,
"watchers": 236,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-10-21T22:17:13Z",
"updated_at": "2020-11-02T02:43:24Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 679,
"watchers_count": 679,

View file

@ -140,14 +140,14 @@
{
"id": 300985470,
"name": "CVE-2019-16113",
"full_name": "persian64\/CVE-2019-16113",
"full_name": "Noroh4xy\/CVE-2019-16113",
"owner": {
"login": "persian64",
"login": "Noroh4xy",
"id": 51972282,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/persian64"
"html_url": "https:\/\/github.com\/Noroh4xy"
},
"html_url": "https:\/\/github.com\/persian64\/CVE-2019-16113",
"html_url": "https:\/\/github.com\/Noroh4xy\/CVE-2019-16113",
"description": "Bludit 3.9.2 - Remote command execution - CVE-2019-16113",
"fork": false,
"created_at": "2020-10-03T21:38:39Z",

View file

@ -71,14 +71,14 @@
{
"id": 299632203,
"name": "CVE-2019-17240",
"full_name": "persian64\/CVE-2019-17240",
"full_name": "Noroh4xy\/CVE-2019-17240",
"owner": {
"login": "persian64",
"login": "Noroh4xy",
"id": 51972282,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/persian64"
"html_url": "https:\/\/github.com\/Noroh4xy"
},
"html_url": "https:\/\/github.com\/persian64\/CVE-2019-17240",
"html_url": "https:\/\/github.com\/Noroh4xy\/CVE-2019-17240",
"description": "CVE-2019-17240 - Bludit 3.9.2 Authentication Bypass",
"fork": false,
"created_at": "2020-09-29T13:51:39Z",

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-01T15:49:44Z",
"updated_at": "2020-11-02T01:52:12Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1993,
"watchers_count": 1993,
"forks_count": 525,
"forks": 525,
"watchers": 1993,
"stargazers_count": 1995,
"watchers_count": 1995,
"forks_count": 524,
"forks": 524,
"watchers": 1995,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-01T15:58:29Z",
"updated_at": "2020-11-02T02:04:56Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 739,
"watchers_count": 739,
"forks_count": 181,
"forks": 181,
"watchers": 739,
"stargazers_count": 740,
"watchers_count": 740,
"forks_count": 182,
"forks": 182,
"watchers": 740,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-10-23T16:36:27Z",
"updated_at": "2020-11-02T03:05:33Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 234,
"watchers_count": 234,
"forks_count": 84,
"forks": 84,
"watchers": 234,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 85,
"forks": 85,
"watchers": 235,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-12T20:16:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-10-29T14:16:59Z",
"updated_at": "2020-11-02T02:57:51Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 64,
"forks": 64,
"watchers": 236,
"watchers": 237,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "CVE-2020-13277 靶场: Gitlab 越权访问漏洞",
"fork": false,
"created_at": "2020-10-31T11:01:26Z",
"updated_at": "2020-11-01T17:25:49Z",
"pushed_at": "2020-11-01T17:25:47Z",
"updated_at": "2020-11-02T01:17:25Z",
"pushed_at": "2020-11-02T01:17:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -151,13 +151,13 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2020-10-18T11:34:49Z",
"updated_at": "2020-11-02T03:05:09Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 215,
"watchers_count": 215,
"forks_count": 49,
"forks": 49,
"watchers": 214,
"watchers": 215,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 13,
"forks": 13,
"forks_count": 12,
"forks": 12,
"watchers": 74,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-11-01T19:33:01Z",
"updated_at": "2020-11-01T22:48:49Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1172,
"watchers_count": 1172,
"forks_count": 264,
"forks": 264,
"watchers": 1172,
"stargazers_count": 1173,
"watchers_count": 1173,
"forks_count": 265,
"forks": 265,
"watchers": 1173,
"score": 0
},
{
@ -132,8 +132,8 @@
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 78,
"forks": 78,
"forks_count": 79,
"forks": 79,
"watchers": 207,
"score": 0
},
@ -680,13 +680,13 @@
"description": null,
"fork": false,
"created_at": "2020-09-26T08:31:47Z",
"updated_at": "2020-10-21T07:35:40Z",
"updated_at": "2020-11-02T01:46:55Z",
"pushed_at": "2020-09-26T08:44:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2020-11-01T20:13:07Z",
"updated_at": "2020-11-02T01:15:37Z",
"pushed_at": "2020-10-30T16:03:55Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 13,
"forks": 13,
"watchers": 79,
"watchers": 80,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "CVE-2020-14882批量验证工具。",
"fork": false,
"created_at": "2020-10-31T01:43:54Z",
"updated_at": "2020-11-01T14:31:40Z",
"updated_at": "2020-11-02T00:46:53Z",
"pushed_at": "2020-10-31T02:03:41Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"watchers": 9,
"score": 0
},
{

View file

@ -289,13 +289,13 @@
"description": null,
"fork": false,
"created_at": "2020-10-17T13:52:08Z",
"updated_at": "2020-10-27T02:40:59Z",
"updated_at": "2020-11-02T01:04:40Z",
"pushed_at": "2020-10-17T13:52:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 6,
"forks": 6,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2020-10-30T13:55:56Z",
"updated_at": "2020-11-02T01:01:35Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 6,
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-11-01T15:58:29Z",
"updated_at": "2020-11-02T02:04:56Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 739,
"watchers_count": 739,
"forks_count": 181,
"forks": 181,
"watchers": 739,
"stargazers_count": 740,
"watchers_count": 740,
"forks_count": 182,
"forks": 182,
"watchers": 740,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "osCommerce Phoenix CE <=1.0.5.4 Authenticated RCE",
"fork": false,
"created_at": "2020-10-30T13:59:23Z",
"updated_at": "2020-11-01T19:08:19Z",
"updated_at": "2020-11-02T01:58:47Z",
"pushed_at": "2020-10-30T14:18:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-11-01T15:49:44Z",
"updated_at": "2020-11-02T01:52:12Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1993,
"watchers_count": 1993,
"forks_count": 525,
"forks": 525,
"watchers": 1993,
"stargazers_count": 1995,
"watchers_count": 1995,
"forks_count": 524,
"forks": 524,
"watchers": 1995,
"score": 0
},
{

View file

@ -14,11 +14,11 @@
"fork": false,
"created_at": "2020-05-20T04:27:52Z",
"updated_at": "2020-10-28T17:08:04Z",
"pushed_at": "2020-10-29T16:54:16Z",
"pushed_at": "2020-11-02T00:58:32Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 25,
"score": 0
}

View file

@ -5446,7 +5446,7 @@ Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php b
- [Kenun99/CVE-2019-16113-Dockerfile](https://github.com/Kenun99/CVE-2019-16113-Dockerfile)
- [itsjeffersonli/CVE-2019-16113](https://github.com/itsjeffersonli/CVE-2019-16113)
- [west-tek/CVE-2019-16113-PoC](https://github.com/west-tek/CVE-2019-16113-PoC)
- [persian64/CVE-2019-16113](https://github.com/persian64/CVE-2019-16113)
- [Noroh4xy/CVE-2019-16113](https://github.com/Noroh4xy/CVE-2019-16113)
### CVE-2019-16278 (2019-10-14)
@ -5623,7 +5623,7 @@ bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-
- [pingport80/CVE-2019-17240](https://github.com/pingport80/CVE-2019-17240)
- [LucaReggiannini/Bludit-3-9-2-bb](https://github.com/LucaReggiannini/Bludit-3-9-2-bb)
- [tripleoctopus/Bludit-CVE-2019-17240-Fork](https://github.com/tripleoctopus/Bludit-CVE-2019-17240-Fork)
- [persian64/CVE-2019-17240](https://github.com/persian64/CVE-2019-17240)
- [Noroh4xy/CVE-2019-17240](https://github.com/Noroh4xy/CVE-2019-17240)
- [ColdFusionX/CVE-2019-17240-Exploit-Bludit-BF-bypass](https://github.com/ColdFusionX/CVE-2019-17240-Exploit-Bludit-BF-bypass)
### CVE-2019-17424 (2019-10-22)