Auto Update 2021/06/20 00:12:09

This commit is contained in:
motikan2010-bot 2021-06-20 00:12:09 +09:00
parent eb7a413622
commit 57d7a2a47e
23 changed files with 84 additions and 60 deletions

View file

@ -13,13 +13,13 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2021-05-10T11:15:03Z",
"updated_at": "2021-06-19T14:11:29Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 27,
"forks": 27,
"watchers": 46,
"watchers": 45,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 238,
"forks": 238,
"forks_count": 239,
"forks": 239,
"watchers": 1072,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 238,
"forks": 238,
"forks_count": 239,
"forks": 239,
"watchers": 1072,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 238,
"forks": 238,
"forks_count": 239,
"forks": 239,
"watchers": 1072,
"score": 0
}

View file

@ -312,13 +312,13 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2021-06-01T08:23:08Z",
"updated_at": "2021-06-19T10:19:18Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 395,
"watchers_count": 395,
"stargazers_count": 396,
"watchers_count": 396,
"forks_count": 142,
"forks": 142,
"watchers": 395,
"watchers": 396,
"score": 0
},
{

View file

@ -454,8 +454,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 238,
"forks": 238,
"forks_count": 239,
"forks": 239,
"watchers": 1072,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-06-18T00:25:13Z",
"updated_at": "2021-06-19T13:29:43Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 429,
"watchers_count": 429,
"stargazers_count": 430,
"watchers_count": 430,
"forks_count": 102,
"forks": 102,
"watchers": 429,
"watchers": 430,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 323,
"watchers_count": 323,
"forks_count": 113,
"forks": 113,
"forks_count": 112,
"forks": 112,
"watchers": 323,
"score": 0
},

View file

@ -1485,13 +1485,13 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2021-06-11T18:01:24Z",
"updated_at": "2021-06-19T12:47:29Z",
"pushed_at": "2021-01-10T04:31:22Z",
"stargazers_count": 346,
"watchers_count": 346,
"stargazers_count": 345,
"watchers_count": 345,
"forks_count": 124,
"forks": 124,
"watchers": 346,
"watchers": 345,
"score": 0
},
{
@ -1669,8 +1669,8 @@
"description": "CVE-2019-0708-PoC It is a semi-functional exploit capable of remotely accessing a Windows computer by exploiting the aforementioned vulnerability, this repository also contains notes on how to complete the attack.",
"fork": false,
"created_at": "2019-06-11T09:38:36Z",
"updated_at": "2021-04-23T21:07:03Z",
"pushed_at": "2020-11-10T13:07:40Z",
"updated_at": "2021-06-19T13:18:23Z",
"pushed_at": "2021-06-19T13:18:20Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 7,

View file

@ -527,5 +527,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 378376347,
"name": "Sudo-Vulnerability-Exploit-CVE-2019-14287",
"full_name": "Hasintha-98\/Sudo-Vulnerability-Exploit-CVE-2019-14287",
"owner": {
"login": "Hasintha-98",
"id": 62957436,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62957436?v=4",
"html_url": "https:\/\/github.com\/Hasintha-98"
},
"html_url": "https:\/\/github.com\/Hasintha-98\/Sudo-Vulnerability-Exploit-CVE-2019-14287",
"description": "The sudo vulnerability CVE-2019-14287 is a security policy bypass issue that provides a user or a program the ability to execute commands as root on a Linux system when the \"sudoers configuration\" explicitly disallows the root access.",
"fork": false,
"created_at": "2021-06-19T09:43:08Z",
"updated_at": "2021-06-19T09:43:08Z",
"pushed_at": "2021-06-19T09:43:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -155,8 +155,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 238,
"forks": 238,
"forks_count": 239,
"forks": 239,
"watchers": 1072,
"score": 0
}

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-05-02T08:42:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},

View file

@ -201,8 +201,8 @@
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 70,
"forks": 70,
"forks_count": 69,
"forks": 69,
"watchers": 289,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2021-06-15T13:50:08Z",
"updated_at": "2021-06-19T13:22:10Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 596,
"watchers_count": 596,
"stargazers_count": 595,
"watchers_count": 595,
"forks_count": 198,
"forks": 198,
"watchers": 596,
"watchers": 595,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 238,
"forks": 238,
"forks_count": 239,
"forks": 239,
"watchers": 1072,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-12T10:11:42Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 16,
"forks": 16,
"forks_count": 17,
"forks": 17,
"watchers": 27,
"score": 0
},

View file

@ -128,8 +128,8 @@
"description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
"fork": false,
"created_at": "2021-06-19T07:34:42Z",
"updated_at": "2021-06-19T08:32:31Z",
"pushed_at": "2021-06-19T08:06:42Z",
"updated_at": "2021-06-19T09:20:07Z",
"pushed_at": "2021-06-19T09:20:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -178,8 +178,8 @@
"pushed_at": "2021-01-15T10:51:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-03-02T07:45:20Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 24,
"score": 0
}

View file

@ -385,8 +385,8 @@
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 729,
"watchers_count": 729,
"forks_count": 205,
"forks": 205,
"forks_count": 206,
"forks": 206,
"watchers": 729,
"score": 0
},
@ -1025,13 +1025,13 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2021-06-15T02:40:26Z",
"updated_at": "2021-06-19T13:32:30Z",
"pushed_at": "2021-06-12T10:24:05Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 1,
"forks": 1,
"watchers": 83,
"watchers": 84,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-06-09T06:55:52Z",
"updated_at": "2021-06-18T07:30:01Z",
"updated_at": "2021-06-19T10:25:19Z",
"pushed_at": "2021-06-10T10:31:30Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 31,
"forks": 31,
"watchers": 79,
"watchers": 80,
"score": 0
}
]

View file

@ -132,8 +132,8 @@
"pushed_at": "2021-06-19T09:07:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -10356,6 +10356,7 @@ In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can
- [edsonjt81/CVE-2019-14287-](https://github.com/edsonjt81/CVE-2019-14287-)
- [DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights](https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights)
- [3hydraking/CVE-2019-14287](https://github.com/3hydraking/CVE-2019-14287)
- [Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287](https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287)
### CVE-2019-14314 (2019-08-27)