Auto Update 2020/04/07 06:08:29

This commit is contained in:
motikan2010-bot 2020-04-07 06:08:29 +09:00
commit 54ea1615c4
42 changed files with 284 additions and 231 deletions

View file

@ -289,13 +289,13 @@
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-09T15:59:14Z",
"updated_at": "2020-03-05T02:43:34Z",
"updated_at": "2020-04-06T16:12:16Z",
"pushed_at": "2014-07-10T21:17:22Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 70,
"forks": 70,
"watchers": 117,
"watchers": 118,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
"fork": false,
"created_at": "2016-06-22T23:03:30Z",
"updated_at": "2020-04-01T13:30:43Z",
"updated_at": "2020-04-06T15:09:49Z",
"pushed_at": "2016-06-23T00:47:50Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 59,
"forks": 59,
"watchers": 110,
"watchers": 111,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)",
"fork": false,
"created_at": "2016-05-03T16:47:32Z",
"updated_at": "2020-03-24T09:39:30Z",
"updated_at": "2020-04-06T15:12:56Z",
"pushed_at": "2019-03-10T02:18:00Z",
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 49,
"forks": 49,
"watchers": 170,
"stargazers_count": 171,
"watchers_count": 171,
"forks_count": 50,
"forks": 50,
"watchers": 171,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-04-05T06:27:43Z",
"updated_at": "2020-04-06T15:07:48Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 442,
"watchers_count": 442,
"stargazers_count": 443,
"watchers_count": 443,
"forks_count": 234,
"forks": 234,
"watchers": 442,
"watchers": 443,
"score": 0
},
{
@ -335,13 +335,13 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2020-03-22T07:01:24Z",
"updated_at": "2020-04-06T19:52:49Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 61,
"forks": 61,
"watchers": 146,
"watchers": 147,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-04-01T00:05:01Z",
"updated_at": "2020-04-06T19:55:25Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 536,
"watchers_count": 536,
"forks_count": 90,
"forks": 90,
"watchers": 536,
"stargazers_count": 537,
"watchers_count": 537,
"forks_count": 91,
"forks": 91,
"watchers": 537,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
"fork": false,
"created_at": "2018-02-08T15:52:50Z",
"updated_at": "2019-10-11T19:04:26Z",
"updated_at": "2020-04-06T19:50:34Z",
"pushed_at": "2018-11-23T11:47:10Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 14,
"forks": 14,
"watchers": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 15,
"forks": 15,
"watchers": 35,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
"fork": false,
"created_at": "2018-06-21T15:44:29Z",
"updated_at": "2020-03-01T00:18:53Z",
"updated_at": "2020-04-06T17:44:19Z",
"pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 55,
"forks": 55,
"watchers": 164,
"watchers": 165,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit the vulnerability to execute the calculator",
"fork": false,
"created_at": "2018-01-11T09:16:32Z",
"updated_at": "2019-12-15T23:35:38Z",
"updated_at": "2020-04-06T19:53:00Z",
"pushed_at": "2018-01-11T09:23:05Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 32,
"forks": 32,
"watchers": 68,
"watchers": 69,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2020-03-22T07:01:24Z",
"updated_at": "2020-04-06T19:52:49Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 61,
"forks": 61,
"watchers": 146,
"watchers": 147,
"score": 0
},
{

View file

@ -220,13 +220,13 @@
"description": "cve-2018-10933 libssh authentication bypass",
"fork": false,
"created_at": "2018-10-18T19:13:45Z",
"updated_at": "2020-02-26T02:49:11Z",
"updated_at": "2020-04-06T18:37:53Z",
"pushed_at": "2018-10-21T21:24:29Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 28,
"forks": 28,
"watchers": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 29,
"forks": 29,
"watchers": 85,
"score": 0
},
{
@ -427,13 +427,13 @@
"description": "CVE-2018-10933 POC (LIBSSH)",
"fork": false,
"created_at": "2018-10-23T21:17:52Z",
"updated_at": "2019-07-12T14:31:54Z",
"updated_at": "2020-04-06T19:25:11Z",
"pushed_at": "2018-10-24T07:58:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)",
"fork": false,
"created_at": "2018-08-25T12:45:15Z",
"updated_at": "2019-09-12T19:52:48Z",
"updated_at": "2020-04-06T19:13:36Z",
"pushed_at": "2018-08-25T14:20:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-13382",
"fork": false,
"created_at": "2019-08-11T11:13:44Z",
"updated_at": "2020-03-09T03:58:35Z",
"updated_at": "2020-04-06T18:19:53Z",
"pushed_at": "2019-08-13T15:06:28Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 40,
"forks": 40,
"watchers": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 41,
"forks": 41,
"watchers": 105,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "OpenSSH 7.7 - Username Enumeration",
"fork": false,
"created_at": "2018-10-24T21:48:07Z",
"updated_at": "2020-01-27T15:11:00Z",
"updated_at": "2020-04-06T19:24:59Z",
"pushed_at": "2018-10-27T01:07:49Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "ERPScan Public POC for CVE-2018-2636",
"fork": false,
"created_at": "2018-01-29T15:16:02Z",
"updated_at": "2020-04-04T17:38:25Z",
"updated_at": "2020-04-06T19:51:01Z",
"pushed_at": "2018-02-01T15:36:19Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 17,
"forks": 17,
"watchers": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 18,
"forks": 18,
"watchers": 22,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2018-2893-PoC",
"fork": false,
"created_at": "2018-07-22T01:15:58Z",
"updated_at": "2020-02-13T08:55:01Z",
"updated_at": "2020-04-06T19:14:37Z",
"pushed_at": "2018-10-27T01:42:20Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 35,
"forks": 35,
"watchers": 81,
"watchers": 82,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2020-04-01T00:05:01Z",
"updated_at": "2020-04-06T19:55:25Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 536,
"watchers_count": 536,
"forks_count": 90,
"forks": 90,
"watchers": 536,
"stargazers_count": 537,
"watchers_count": 537,
"forks_count": 91,
"forks": 91,
"watchers": 537,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "RTSPServer Code Execution Vulnerability CVE-2018-4013",
"fork": false,
"created_at": "2018-11-24T15:49:53Z",
"updated_at": "2019-07-12T15:07:09Z",
"updated_at": "2020-04-06T19:24:12Z",
"pushed_at": "2018-11-26T23:35:57Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"watchers": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"forks": 4,
"watchers": 9,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit iOS 11.2.x by ZIMPERIUM and semi-completed by me. Sandbox escapes on CVE-2018-4087. ",
"fork": false,
"created_at": "2018-03-08T18:04:31Z",
"updated_at": "2018-09-19T18:32:58Z",
"updated_at": "2020-04-06T19:47:42Z",
"pushed_at": "2018-03-08T15:41:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 28,
"forks": 28,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 29,
"forks": 29,
"watchers": 1,
"score": 0
}
]

View file

@ -155,8 +155,8 @@
"pushed_at": "2018-11-02T22:13:40Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"forks": 6,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"score": 0
},
@ -174,13 +174,13 @@
"description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]",
"fork": false,
"created_at": "2018-11-04T01:47:05Z",
"updated_at": "2020-04-06T10:57:39Z",
"updated_at": "2020-04-06T19:24:44Z",
"pushed_at": "2018-11-04T02:25:08Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 10,
"forks": 10,
"watchers": 18,
"watchers": 17,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "MikroTik RouterOS Denial of Service Vulnerability",
"fork": false,
"created_at": "2018-01-25T01:40:02Z",
"updated_at": "2019-02-23T03:58:33Z",
"updated_at": "2020-04-06T19:46:14Z",
"pushed_at": "2018-02-11T06:51:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 6,
"forks": 6,
"watchers": 5,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 389,
"watchers_count": 389,
"forks_count": 48,
"forks": 48,
"forks_count": 49,
"forks": 49,
"watchers": 389,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "[CVE-2018-6479] Netwave IP Camera server vulnerable to Denial of Service via one single huge POST request.",
"fork": false,
"created_at": "2018-01-31T16:38:48Z",
"updated_at": "2020-04-01T13:33:58Z",
"updated_at": "2020-04-06T19:50:52Z",
"pushed_at": "2018-02-01T20:08:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-04-24T16:32:22Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 20,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "VMware NSX SD-WAN command injection vulnerability ",
"fork": false,
"created_at": "2019-02-08T13:00:35Z",
"updated_at": "2019-07-12T15:01:27Z",
"updated_at": "2020-04-06T19:22:25Z",
"pushed_at": "2019-02-08T13:05:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2020-04-06T11:02:45Z",
"updated_at": "2020-04-06T18:15:42Z",
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 414,
"watchers_count": 414,
"stargazers_count": 415,
"watchers_count": 415,
"forks_count": 135,
"forks": 135,
"watchers": 414,
"watchers": 415,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Drupal 0day Remote PHP Code Execution (Perl)",
"fork": false,
"created_at": "2018-04-14T09:02:54Z",
"updated_at": "2020-02-17T23:18:39Z",
"updated_at": "2020-04-06T19:37:49Z",
"pushed_at": "2018-04-14T09:06:44Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 6,
"forks": 6,
"watchers": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 7,
"forks": 7,
"watchers": 7,
"score": 0
},
{
@ -473,13 +473,13 @@
"description": "CVE-2018-7600 POC (Drupal RCE)",
"fork": false,
"created_at": "2018-10-23T21:47:59Z",
"updated_at": "2019-07-12T14:31:54Z",
"updated_at": "2020-04-06T19:25:17Z",
"pushed_at": "2018-10-23T22:27:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "CVE-2018-8021 Proof-Of-Concept and Exploit ",
"fork": false,
"created_at": "2018-12-02T19:01:17Z",
"updated_at": "2020-04-06T10:52:40Z",
"updated_at": "2020-04-06T19:24:04Z",
"pushed_at": "2018-12-03T21:13:00Z",
"stargazers_count": 102,
"watchers_count": 102,

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
"fork": false,
"created_at": "2018-05-22T21:50:32Z",
"updated_at": "2020-02-21T17:21:50Z",
"updated_at": "2020-04-06T19:18:19Z",
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 74,
"forks": 74,
"watchers": 160,
"watchers": 161,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2020-03-09T12:03:04Z",
"updated_at": "2020-04-06T19:18:10Z",
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 53,
"forks": 53,
"watchers": 124,
"watchers": 125,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2020-03-23T11:08:00Z",
"updated_at": "2020-04-06T18:32:14Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 71,
"forks": 71,
"watchers": 119,
"watchers": 120,
"score": 0
},
{

View file

@ -1627,8 +1627,8 @@
"pushed_at": "2020-03-20T10:50:06Z",
"stargazers_count": 323,
"watchers_count": 323,
"forks_count": 117,
"forks": 117,
"forks_count": 116,
"forks": 116,
"watchers": 323,
"score": 0
},
@ -2386,8 +2386,8 @@
"pushed_at": "2019-10-16T01:04:12Z",
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 46,
"forks": 46,
"forks_count": 45,
"forks": 45,
"watchers": 149,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-04-03T17:53:25Z",
"updated_at": "2020-04-06T19:56:10Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 657,
"watchers_count": 657,
"stargazers_count": 658,
"watchers_count": 658,
"forks_count": 54,
"forks": 54,
"watchers": 657,
"watchers": 658,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2020-04-05T13:35:58Z",
"updated_at": "2020-04-06T19:44:40Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 41,
"forks": 41,
"watchers": 131,
"watchers": 132,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Directory transversal to remote code execution",
"fork": false,
"created_at": "2019-10-15T03:40:13Z",
"updated_at": "2020-03-29T03:53:03Z",
"updated_at": "2020-04-06T18:11:47Z",
"pushed_at": "2019-10-15T03:53:55Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 24,
"forks": 24,
"watchers": 59,
"watchers": 60,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "The official exploit for rConfig 3.9.2 Post-auth Remote Code Execution CVE-2019-16663",
"fork": false,
"created_at": "2019-11-10T18:28:11Z",
"updated_at": "2020-01-23T08:20:55Z",
"updated_at": "2020-04-06T18:10:38Z",
"pushed_at": "2019-11-10T18:28:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit and Mass Pwn3r for CVE-2019-16920",
"fork": false,
"created_at": "2019-10-15T17:54:03Z",
"updated_at": "2020-02-22T18:11:07Z",
"updated_at": "2020-04-06T18:08:39Z",
"pushed_at": "2019-12-21T17:31:56Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 13,
"forks": 13,
"watchers": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 14,
"forks": 14,
"watchers": 24,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2020-03-18T09:48:22Z",
"updated_at": "2020-04-06T17:04:06Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 30,
"forks": 30,
"watchers": 45,
"watchers": 46,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2020-03-04T15:17:18Z",
"updated_at": "2020-04-06T18:00:45Z",
"pushed_at": "2020-01-31T17:06:55Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 24,
"forks": 24,
"watchers": 91,
"watchers": 93,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE) ",
"fork": false,
"created_at": "2019-05-02T14:54:08Z",
"updated_at": "2019-09-28T16:25:15Z",
"updated_at": "2020-04-06T18:19:09Z",
"pushed_at": "2019-05-02T15:15:51Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 6,
"forks": 6,
"watchers": 12,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2020-04-04T11:05:40Z",
"updated_at": "2020-04-06T20:01:50Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 573,
"watchers_count": 573,
"forks_count": 127,
"forks": 127,
"watchers": 573,
"stargazers_count": 574,
"watchers_count": 574,
"forks_count": 128,
"forks": 128,
"watchers": 574,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
"fork": false,
"created_at": "2019-05-06T15:47:20Z",
"updated_at": "2020-03-28T14:53:10Z",
"updated_at": "2020-04-06T18:18:46Z",
"pushed_at": "2019-05-08T16:22:58Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 23,
"forks": 23,
"watchers": 41,
"watchers": 42,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-03-24T00:17:37Z",
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 154,
"score": 0
},
@ -979,13 +979,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-06T13:11:28Z",
"updated_at": "2020-04-06T16:19:12Z",
"pushed_at": "2020-04-03T13:31:54Z",
"stargazers_count": 773,
"watchers_count": 773,
"forks_count": 209,
"forks": 209,
"watchers": 773,
"stargazers_count": 774,
"watchers_count": 774,
"forks_count": 210,
"forks": 210,
"watchers": 774,
"score": 0
},
{
@ -1002,13 +1002,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-04-06T10:52:58Z",
"updated_at": "2020-04-06T17:43:17Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 36,
"forks": 36,
"watchers": 118,
"watchers": 119,
"score": 0
},
{
@ -1171,5 +1171,51 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 253535658,
"name": "CVE_2020_0796_CNA",
"full_name": "Rvn0xsy\/CVE_2020_0796_CNA",
"owner": {
"login": "Rvn0xsy",
"id": 19944759,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/19944759?v=4",
"html_url": "https:\/\/github.com\/Rvn0xsy"
},
"html_url": "https:\/\/github.com\/Rvn0xsy\/CVE_2020_0796_CNA",
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
"fork": false,
"created_at": "2020-04-06T15:16:10Z",
"updated_at": "2020-04-06T19:32:06Z",
"pushed_at": "2020-04-06T15:22:01Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 253536195,
"name": "CVE-2020-0796-scanner",
"full_name": "sivak1rl\/CVE-2020-0796-scanner",
"owner": {
"login": "sivak1rl",
"id": 8893063,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8893063?v=4",
"html_url": "https:\/\/github.com\/sivak1rl"
},
"html_url": "https:\/\/github.com\/sivak1rl\/CVE-2020-0796-scanner",
"description": null,
"fork": false,
"created_at": "2020-04-06T15:18:11Z",
"updated_at": "2020-04-06T15:18:11Z",
"pushed_at": "2020-04-06T15:18:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本均为亲测可用的脚本文件尽力补全所有脚本文件的使用说明文档优先更新高危且易利用的漏洞利用脚本最近添加CVE-2020-1938、CVE-2020-2551",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-04-06T14:55:19Z",
"updated_at": "2020-04-06T17:10:44Z",
"pushed_at": "2020-04-05T10:36:55Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 6,
"forks": 6,
"watchers": 37,
"watchers": 38,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-04-01T13:40:15Z",
"updated_at": "2020-04-06T16:38:46Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 27,
"forks": 27,
"watchers": 82,
"watchers": 83,
"score": 0
},
{

View file

@ -217,6 +217,8 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [wurmx64/CVE-2020-0796](https://github.com/wurmx64/CVE-2020-0796)
- [eastmountyxz/CVE-2020-0796-SMB](https://github.com/eastmountyxz/CVE-2020-0796-SMB)
- [LabDookhtegan/CVE-2020-0796-EXP](https://github.com/LabDookhtegan/CVE-2020-0796-EXP)
- [Rvn0xsy/CVE_2020_0796_CNA](https://github.com/Rvn0xsy/CVE_2020_0796_CNA)
- [sivak1rl/CVE-2020-0796-scanner](https://github.com/sivak1rl/CVE-2020-0796-scanner)
### CVE-2020-0976
- [ericzhong2010/GUI-Check-CVE-2020-0976](https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976)
@ -2698,6 +2700,11 @@ class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4,
- [jra89/CVE-2019-19658](https://github.com/jra89/CVE-2019-19658)
### CVE-2019-19699
<code>
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&amp;type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&amp;o=c&amp;server_id=1 URI. This is triggered via an export of the Poller Configuration.
</code>
- [SpengeSec/CVE-2019-19699](https://github.com/SpengeSec/CVE-2019-19699)
### CVE-2019-19732