Auto Update 2020/08/24 18:08:34

This commit is contained in:
motikan2010-bot 2020-08-24 18:08:34 +09:00
parent 2a73aa3525
commit 5963e9787c
33 changed files with 185 additions and 156 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 120511025,
"name": "Bulk_CVE-1999-0532_Scanner",
"full_name": "websecnl\/Bulk_CVE-1999-0532_Scanner",
"owner": {
"login": "websecnl",
"id": 20278695,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20278695?v=4",
"html_url": "https:\/\/github.com\/websecnl"
},
"html_url": "https:\/\/github.com\/websecnl\/Bulk_CVE-1999-0532_Scanner",
"description": "A tool i made for use in combination with hackerone.com for Bounty Hacking purposes.",
"fork": false,
"created_at": "2018-02-06T19:16:43Z",
"updated_at": "2019-05-03T07:23:19Z",
"pushed_at": "2018-02-10T20:07:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2008/CVE-2008-0128.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158419232,
"name": "4062-1",
"full_name": "ngyanch\/4062-1",
"owner": {
"login": "ngyanch",
"id": 26293983,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26293983?v=4",
"html_url": "https:\/\/github.com\/ngyanch"
},
"html_url": "https:\/\/github.com\/ngyanch\/4062-1",
"description": "CVE-2008-0128",
"fork": false,
"created_at": "2018-11-20T16:26:21Z",
"updated_at": "2018-11-23T07:10:19Z",
"pushed_at": "2018-11-23T07:10:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 173164801,
"name": "debian-ssh",
"full_name": "nu11secur1ty\/debian-ssh",
"owner": {
"login": "nu11secur1ty",
"id": 3677559,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3677559?v=4",
"html_url": "https:\/\/github.com\/nu11secur1ty"
},
"html_url": "https:\/\/github.com\/nu11secur1ty\/debian-ssh",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166) http:\/\/web.archive.org\/web\/20110723091928\/http:\/\/digitaloffense.net\/tools\/debian-openssl\/",
"fork": false,
"created_at": "2019-02-28T18:22:06Z",
"updated_at": "2019-07-09T17:47:06Z",
"pushed_at": "2019-02-28T18:30:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
} }
] ]

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-04-25T07:24:08Z", "pushed_at": "2017-04-25T07:24:08Z",
"stargazers_count": 119, "stargazers_count": 119,
"watchers_count": 119, "watchers_count": 119,
"forks_count": 81, "forks_count": 80,
"forks": 81, "forks": 80,
"watchers": 119, "watchers": 119,
"score": 0 "score": 0
}, },

View file

@ -17,8 +17,8 @@
"pushed_at": "2015-01-27T09:23:52Z", "pushed_at": "2015-01-27T09:23:52Z",
"stargazers_count": 89, "stargazers_count": 89,
"watchers_count": 89, "watchers_count": 89,
"forks_count": 46, "forks_count": 45,
"forks": 46, "forks": 45,
"watchers": 89, "watchers": 89,
"score": 0 "score": 0
}, },

View file

@ -910,13 +910,13 @@
"description": "Shellshock exploit + vulnerable environment", "description": "Shellshock exploit + vulnerable environment",
"fork": false, "fork": false,
"created_at": "2016-12-07T23:38:50Z", "created_at": "2016-12-07T23:38:50Z",
"updated_at": "2020-08-19T13:21:13Z", "updated_at": "2020-08-24T07:38:37Z",
"pushed_at": "2017-10-30T22:46:11Z", "pushed_at": "2017-10-30T22:46:11Z",
"stargazers_count": 85, "stargazers_count": 86,
"watchers_count": 85, "watchers_count": 86,
"forks_count": 37, "forks_count": 37,
"forks": 37, "forks": 37,
"watchers": 85, "watchers": 86,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2015-01-27T09:43:42Z", "pushed_at": "2015-01-27T09:43:42Z",
"stargazers_count": 144, "stargazers_count": 144,
"watchers_count": 144, "watchers_count": 144,
"forks_count": 85, "forks_count": 84,
"forks": 85, "forks": 84,
"watchers": 144, "watchers": 144,
"score": 0 "score": 0
}, },

View file

@ -59,13 +59,13 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container", "description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false, "fork": false,
"created_at": "2017-01-08T14:19:51Z", "created_at": "2017-01-08T14:19:51Z",
"updated_at": "2020-08-18T02:31:33Z", "updated_at": "2020-08-24T07:38:46Z",
"pushed_at": "2018-04-07T01:10:06Z", "pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 58, "stargazers_count": 59,
"watchers_count": 58, "watchers_count": 59,
"forks_count": 28, "forks_count": 28,
"forks": 28, "forks": 28,
"watchers": 58, "watchers": 59,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container", "description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false, "fork": false,
"created_at": "2016-12-26T13:39:03Z", "created_at": "2016-12-26T13:39:03Z",
"updated_at": "2020-08-19T13:18:40Z", "updated_at": "2020-08-24T07:38:36Z",
"pushed_at": "2019-10-13T12:23:02Z", "pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 347, "stargazers_count": 348,
"watchers_count": 347, "watchers_count": 348,
"forks_count": 133, "forks_count": 133,
"forks": 133, "forks": 133,
"watchers": 347, "watchers": 348,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container", "description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container",
"fork": false, "fork": false,
"created_at": "2017-01-06T17:55:44Z", "created_at": "2017-01-06T17:55:44Z",
"updated_at": "2020-07-22T09:06:46Z", "updated_at": "2020-08-24T07:38:57Z",
"pushed_at": "2017-01-06T23:34:03Z", "pushed_at": "2017-01-06T23:34:03Z",
"stargazers_count": 34, "stargazers_count": 35,
"watchers_count": 34, "watchers_count": 35,
"forks_count": 15, "forks_count": 15,
"forks": 15, "forks": 15,
"watchers": 34, "watchers": 35,
"score": 0 "score": 0
} }
] ]

View file

@ -63,8 +63,8 @@
"pushed_at": "2017-11-19T11:01:16Z", "pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 626, "stargazers_count": 626,
"watchers_count": 626, "watchers_count": 626,
"forks_count": 283, "forks_count": 282,
"forks": 283, "forks": 282,
"watchers": 626, "watchers": 626,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)", "description": "A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)",
"fork": false, "fork": false,
"created_at": "2017-11-29T22:19:51Z", "created_at": "2017-11-29T22:19:51Z",
"updated_at": "2020-07-16T07:08:10Z", "updated_at": "2020-08-24T07:01:02Z",
"pushed_at": "2017-11-30T00:24:14Z", "pushed_at": "2017-11-30T00:24:14Z",
"stargazers_count": 194, "stargazers_count": 195,
"watchers_count": 194, "watchers_count": 195,
"forks_count": 61, "forks_count": 61,
"forks": 61, "forks": 61,
"watchers": 194, "watchers": 195,
"score": 0 "score": 0
} }
] ]

View file

@ -385,8 +385,8 @@
"pushed_at": "2019-08-28T12:05:45Z", "pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 218, "stargazers_count": 218,
"watchers_count": 218, "watchers_count": 218,
"forks_count": 72, "forks_count": 73,
"forks": 72, "forks": 73,
"watchers": 218, "watchers": 218,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882", "description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false, "fork": false,
"created_at": "2017-11-20T16:35:30Z", "created_at": "2017-11-20T16:35:30Z",
"updated_at": "2020-07-04T01:51:53Z", "updated_at": "2020-08-24T04:20:21Z",
"pushed_at": "2017-11-29T16:13:23Z", "pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 469, "stargazers_count": 470,
"watchers_count": 469, "watchers_count": 470,
"forks_count": 199, "forks_count": 199,
"forks": 199, "forks": 199,
"watchers": 469, "watchers": 470,
"score": 0 "score": 0
}, },
{ {
@ -63,8 +63,8 @@
"pushed_at": "2017-11-29T03:33:53Z", "pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 468, "stargazers_count": 468,
"watchers_count": 468, "watchers_count": 468,
"forks_count": 242, "forks_count": 241,
"forks": 242, "forks": 241,
"watchers": 468, "watchers": 468,
"score": 0 "score": 0
}, },

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-20T10:12:11Z", "pushed_at": "2020-04-20T10:12:11Z",
"stargazers_count": 108, "stargazers_count": 108,
"watchers_count": 108, "watchers_count": 108,
"forks_count": 29, "forks_count": 28,
"forks": 29, "forks": 28,
"watchers": 108, "watchers": 108,
"score": 0 "score": 0
} }

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-23T06:53:00Z", "pushed_at": "2020-01-23T06:53:00Z",
"stargazers_count": 257, "stargazers_count": 257,
"watchers_count": 257, "watchers_count": 257,
"forks_count": 108, "forks_count": 107,
"forks": 108, "forks": 107,
"watchers": 257, "watchers": 257,
"score": 0 "score": 0
}, },
@ -63,8 +63,8 @@
"pushed_at": "2017-09-14T10:18:40Z", "pushed_at": "2017-09-14T10:18:40Z",
"stargazers_count": 172, "stargazers_count": 172,
"watchers_count": 172, "watchers_count": 172,
"forks_count": 87, "forks_count": 86,
"forks": 87, "forks": 86,
"watchers": 172, "watchers": 172,
"score": 0 "score": 0
}, },
@ -155,8 +155,8 @@
"pushed_at": "2018-09-10T16:25:12Z", "pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 305, "stargazers_count": 305,
"watchers_count": 305, "watchers_count": 305,
"forks_count": 124, "forks_count": 123,
"forks": 124, "forks": 123,
"watchers": 305, "watchers": 305,
"score": 0 "score": 0
}, },
@ -178,8 +178,8 @@
"pushed_at": "2017-12-28T07:16:15Z", "pushed_at": "2017-12-28T07:16:15Z",
"stargazers_count": 82, "stargazers_count": 82,
"watchers_count": 82, "watchers_count": 82,
"forks_count": 50, "forks_count": 49,
"forks": 50, "forks": 49,
"watchers": 82, "watchers": 82,
"score": 0 "score": 0
}, },

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-10-30T01:48:42Z", "pushed_at": "2018-10-30T01:48:42Z",
"stargazers_count": 62, "stargazers_count": 62,
"watchers_count": 62, "watchers_count": 62,
"forks_count": 18, "forks_count": 17,
"forks": 18, "forks": 17,
"watchers": 62, "watchers": 62,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-0230 & s2-059 poc.", "description": "CVE-2019-0230 & s2-059 poc.",
"fork": false, "fork": false,
"created_at": "2020-08-20T08:21:54Z", "created_at": "2020-08-20T08:21:54Z",
"updated_at": "2020-08-23T15:09:40Z", "updated_at": "2020-08-24T06:52:39Z",
"pushed_at": "2020-08-21T12:41:14Z", "pushed_at": "2020-08-21T12:41:14Z",
"stargazers_count": 9, "stargazers_count": 13,
"watchers_count": 9, "watchers_count": 13,
"forks_count": 4, "forks_count": 8,
"forks": 4, "forks": 8,
"watchers": 9, "watchers": 13,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043", "description": "Exploit for CVE-2019-11043",
"fork": false, "fork": false,
"created_at": "2019-09-23T21:37:27Z", "created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-08-15T12:31:03Z", "updated_at": "2020-08-24T03:36:29Z",
"pushed_at": "2019-11-12T18:53:14Z", "pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1602, "stargazers_count": 1601,
"watchers_count": 1602, "watchers_count": 1601,
"forks_count": 232, "forks_count": 232,
"forks": 232, "forks": 232,
"watchers": 1602, "watchers": 1601,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024", "description": "The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024",
"fork": false, "fork": false,
"created_at": "2019-08-24T19:26:19Z", "created_at": "2019-08-24T19:26:19Z",
"updated_at": "2020-05-08T13:25:40Z", "updated_at": "2020-08-24T04:58:20Z",
"pushed_at": "2019-08-24T19:27:24Z", "pushed_at": "2019-08-24T19:27:24Z",
"stargazers_count": 10, "stargazers_count": 9,
"watchers_count": 10, "watchers_count": 9,
"forks_count": 5, "forks_count": 5,
"forks": 5, "forks": 5,
"watchers": 10, "watchers": 9,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-14040", "description": "PoC code for CVE-2019-14040",
"fork": false, "fork": false,
"created_at": "2020-02-03T23:04:49Z", "created_at": "2020-02-03T23:04:49Z",
"updated_at": "2020-08-10T06:54:19Z", "updated_at": "2020-08-24T03:31:07Z",
"pushed_at": "2020-04-15T14:27:49Z", "pushed_at": "2020-04-15T14:27:49Z",
"stargazers_count": 19, "stargazers_count": 20,
"watchers_count": 19, "watchers_count": 20,
"forks_count": 2, "forks_count": 2,
"forks": 2, "forks": 2,
"watchers": 19, "watchers": 20,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458", "description": "POC for cve-2019-1458",
"fork": false, "fork": false,
"created_at": "2020-03-03T17:55:07Z", "created_at": "2020-03-03T17:55:07Z",
"updated_at": "2020-08-11T06:27:54Z", "updated_at": "2020-08-24T03:23:37Z",
"pushed_at": "2020-03-04T07:05:24Z", "pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 110, "stargazers_count": 111,
"watchers_count": 110, "watchers_count": 111,
"forks_count": 48, "forks_count": 48,
"forks": 48, "forks": 48,
"watchers": 110, "watchers": 111,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-24T01:47:20Z", "updated_at": "2020-08-24T06:58:14Z",
"pushed_at": "2020-08-03T04:37:30Z", "pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1527, "stargazers_count": 1528,
"watchers_count": 1527, "watchers_count": 1528,
"forks_count": 398, "forks_count": 398,
"forks": 398, "forks": 398,
"watchers": 1527, "watchers": 1528,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "PoC of Android BadBluetooth (CVE-2019-2225)", "description": "PoC of Android BadBluetooth (CVE-2019-2225)",
"fork": false, "fork": false,
"created_at": "2020-08-05T02:42:53Z", "created_at": "2020-08-05T02:42:53Z",
"updated_at": "2020-08-05T03:46:22Z", "updated_at": "2020-08-24T07:30:24Z",
"pushed_at": "2020-08-05T02:45:20Z", "pushed_at": "2020-08-05T02:45:20Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-28T12:05:45Z", "pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 218, "stargazers_count": 218,
"watchers_count": 218, "watchers_count": 218,
"forks_count": 72, "forks_count": 73,
"forks": 72, "forks": 73,
"watchers": 218, "watchers": 218,
"score": 0 "score": 0
}, },
@ -220,13 +220,13 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过", "description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false, "fork": false,
"created_at": "2019-06-10T05:12:44Z", "created_at": "2019-06-10T05:12:44Z",
"updated_at": "2020-08-19T03:03:57Z", "updated_at": "2020-08-24T08:18:49Z",
"pushed_at": "2019-06-21T03:33:05Z", "pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 129, "stargazers_count": 132,
"watchers_count": 129, "watchers_count": 132,
"forks_count": 57, "forks_count": 57,
"forks": 57, "forks": 57,
"watchers": 129, "watchers": 132,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version", "description": "Support ALL Windows Version",
"fork": false, "fork": false,
"created_at": "2020-06-16T08:57:51Z", "created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-08-20T12:46:09Z", "updated_at": "2020-08-24T06:24:05Z",
"pushed_at": "2020-06-18T00:42:57Z", "pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 392, "stargazers_count": 397,
"watchers_count": 392, "watchers_count": 397,
"forks_count": 94, "forks_count": 95,
"forks": 94, "forks": 95,
"watchers": 392, "watchers": 397,
"score": 0 "score": 0
} }
] ]

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false, "fork": false,
"created_at": "2020-03-11T15:21:27Z", "created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-08-21T08:27:43Z", "updated_at": "2020-08-24T05:56:59Z",
"pushed_at": "2020-03-13T09:54:16Z", "pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 523, "stargazers_count": 524,
"watchers_count": 523, "watchers_count": 524,
"forks_count": 181, "forks_count": 181,
"forks": 181, "forks": 181,
"watchers": 523, "watchers": 524,
"score": 0 "score": 0
}, },
{ {
@ -887,13 +887,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false, "fork": false,
"created_at": "2020-03-30T11:42:56Z", "created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-08-21T06:53:46Z", "updated_at": "2020-08-24T07:43:15Z",
"pushed_at": "2020-04-08T19:27:07Z", "pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 988, "stargazers_count": 990,
"watchers_count": 988, "watchers_count": 990,
"forks_count": 323, "forks_count": 323,
"forks": 323, "forks": 323,
"watchers": 988, "watchers": 990,
"score": 0 "score": 0
}, },
{ {

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-05-05T03:27:11Z", "pushed_at": "2020-05-05T03:27:11Z",
"stargazers_count": 32, "stargazers_count": 32,
"watchers_count": 32, "watchers_count": 32,
"forks_count": 16, "forks_count": 17,
"forks": 16, "forks": 17,
"watchers": 32, "watchers": 32,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation", "description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2020-07-21T08:01:20Z", "created_at": "2020-07-21T08:01:20Z",
"updated_at": "2020-08-22T03:25:19Z", "updated_at": "2020-08-24T08:10:35Z",
"pushed_at": "2020-07-21T10:28:42Z", "pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 124, "stargazers_count": 125,
"watchers_count": 124, "watchers_count": 125,
"forks_count": 21, "forks_count": 22,
"forks": 21, "forks": 22,
"watchers": 124, "watchers": 125,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)", "description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false, "fork": false,
"created_at": "2020-08-12T10:05:36Z", "created_at": "2020-08-12T10:05:36Z",
"updated_at": "2020-08-23T12:19:47Z", "updated_at": "2020-08-24T08:10:18Z",
"pushed_at": "2020-08-13T07:16:12Z", "pushed_at": "2020-08-13T07:16:12Z",
"stargazers_count": 116, "stargazers_count": 117,
"watchers_count": 116, "watchers_count": 117,
"forks_count": 39, "forks_count": 40,
"forks": 39, "forks": 40,
"watchers": 116, "watchers": 117,
"score": 0 "score": 0
} }
] ]

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-2551", "description": "CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-02-24T02:36:46Z", "created_at": "2020-02-24T02:36:46Z",
"updated_at": "2020-08-23T20:23:56Z", "updated_at": "2020-08-24T08:09:01Z",
"pushed_at": "2020-06-30T12:54:47Z", "pushed_at": "2020-06-30T12:54:47Z",
"stargazers_count": 28, "stargazers_count": 29,
"watchers_count": 28, "watchers_count": 29,
"forks_count": 3, "forks_count": 3,
"forks": 3, "forks": 3,
"watchers": 28, "watchers": 29,
"score": 0 "score": 0
}, },
{ {

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-04-16T08:38:42Z", "pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 193, "stargazers_count": 193,
"watchers_count": 193, "watchers_count": 193,
"forks_count": 43, "forks_count": 44,
"forks": 43, "forks": 44,
"watchers": 193, "watchers": 193,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-24T01:47:20Z", "updated_at": "2020-08-24T06:58:14Z",
"pushed_at": "2020-08-03T04:37:30Z", "pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1527, "stargazers_count": 1528,
"watchers_count": 1527, "watchers_count": 1528,
"forks_count": 398, "forks_count": 398,
"forks": 398, "forks": 398,
"watchers": 1527, "watchers": 1528,
"score": 0 "score": 0
}, },
{ {
@ -128,13 +128,13 @@
"description": "Proof of concept for CVE-2020-5902", "description": "Proof of concept for CVE-2020-5902",
"fork": false, "fork": false,
"created_at": "2020-07-05T17:01:27Z", "created_at": "2020-07-05T17:01:27Z",
"updated_at": "2020-08-24T02:01:44Z", "updated_at": "2020-08-24T07:11:08Z",
"pushed_at": "2020-07-06T17:47:17Z", "pushed_at": "2020-07-06T17:47:17Z",
"stargazers_count": 72, "stargazers_count": 73,
"watchers_count": 72, "watchers_count": 73,
"forks_count": 21, "forks_count": 21,
"forks": 21, "forks": 21,
"watchers": 72, "watchers": 73,
"score": 0 "score": 0
}, },
{ {
@ -1117,8 +1117,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-07-20T19:10:09Z", "created_at": "2020-07-20T19:10:09Z",
"updated_at": "2020-08-16T14:41:35Z", "updated_at": "2020-08-24T03:44:31Z",
"pushed_at": "2020-07-22T09:53:30Z", "pushed_at": "2020-08-24T03:44:29Z",
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"forks_count": 8, "forks_count": 8,

View file

@ -14445,6 +14445,14 @@ DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.
## 2008 ## 2008
### CVE-2008-0128
<code>
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
</code>
- [ngyanch/4062-1](https://github.com/ngyanch/4062-1)
### CVE-2008-0166 ### CVE-2008-0166
<code> <code>
@ -14453,6 +14461,7 @@ OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating system
- [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh) - [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh)
- [avarx/vulnkeys](https://github.com/avarx/vulnkeys) - [avarx/vulnkeys](https://github.com/avarx/vulnkeys)
- [nu11secur1ty/debian-ssh](https://github.com/nu11secur1ty/debian-ssh)
### CVE-2008-0228 ### CVE-2008-0228
@ -14960,7 +14969,4 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
## 1999 ## 1999
### CVE-1999-0532
- [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner)