Auto Update 2020/07/07 18:09:41

This commit is contained in:
motikan2010-bot 2020-07-07 18:09:41 +09:00
parent d414e96338
commit 61daa22dd4
34 changed files with 201 additions and 177 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-06T06:03:48Z",
"updated_at": "2020-07-07T08:04:45Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 490,
"watchers_count": 490,
"forks_count": 119,
"forks": 119,
"watchers": 489,
"watchers": 490,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Apple CoreGraphics framework fails to validate the input when parsing CCITT group 3 encoded data resulting in a heap overflow condition. A small heap memory allocation can be overflowed with controlled data from the input resulting in arbitrary code execution in the context of Mobile Safari.",
"fork": false,
"created_at": "2015-01-28T00:02:06Z",
"updated_at": "2017-02-20T02:06:27Z",
"updated_at": "2020-07-07T06:47:37Z",
"pushed_at": "2015-01-28T00:28:36Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-06T06:03:48Z",
"updated_at": "2020-07-07T08:04:45Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 490,
"watchers_count": 490,
"forks_count": 119,
"forks": 119,
"watchers": 489,
"watchers": 490,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Ruby On Rails unrestricted render() exploit",
"fork": false,
"created_at": "2018-02-09T16:16:08Z",
"updated_at": "2020-02-27T16:01:12Z",
"updated_at": "2020-07-07T04:23:24Z",
"pushed_at": "2018-02-09T16:17:35Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2016-10-03T20:37:11Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 26,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 34,
"forks": 34,
"forks_count": 35,
"forks": 35,
"watchers": 74,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "jenkins CVE-2017-1000353 POC",
"fork": false,
"created_at": "2019-04-12T13:24:26Z",
"updated_at": "2020-06-23T03:33:21Z",
"updated_at": "2020-07-07T07:58:40Z",
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 22,
"forks": 22,
"watchers": 25,
"watchers": 26,
"score": 0
}
]

View file

@ -109,8 +109,8 @@
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 76,
"forks": 76,
"forks_count": 77,
"forks": 77,
"watchers": 272,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-06T06:03:48Z",
"updated_at": "2020-07-07T08:04:45Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 490,
"watchers_count": 490,
"forks_count": 119,
"forks": 119,
"watchers": 489,
"watchers": 490,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-06-20T15:16:39Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 16,
"forks": 16,
"forks_count": 17,
"forks": 17,
"watchers": 9,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)",
"fork": false,
"created_at": "2017-11-24T14:46:35Z",
"updated_at": "2020-03-06T22:29:46Z",
"updated_at": "2020-07-07T06:20:56Z",
"pushed_at": "2018-02-09T00:22:16Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules",
"fork": false,
"created_at": "2018-05-30T22:56:29Z",
"updated_at": "2020-04-16T15:11:16Z",
"updated_at": "2020-07-07T03:30:23Z",
"pushed_at": "2018-06-03T18:55:07Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 24,
"forks": 24,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-06T06:03:48Z",
"updated_at": "2020-07-07T08:04:45Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 490,
"watchers_count": 490,
"forks_count": 119,
"forks": 119,
"watchers": 489,
"watchers": 490,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2018-02-10T19:39:10Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 30,
"forks": 30,
"forks_count": 31,
"forks": 31,
"watchers": 74,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-06-30T07:17:22Z",
"updated_at": "2020-07-07T03:55:14Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"forks_count": 60,
"forks": 60,
"watchers": 274,
"watchers": 275,
"score": 0
}
]

View file

@ -289,7 +289,7 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
"updated_at": "2020-05-21T08:01:11Z",
"updated_at": "2020-07-07T07:52:19Z",
"pushed_at": "2019-05-05T15:49:44Z",
"stargazers_count": 73,
"watchers_count": 73,

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2020-06-29T09:48:12Z",
"updated_at": "2020-07-07T06:03:37Z",
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 55,
"forks": 55,
"watchers": 126,
"watchers": 127,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-17T15:17:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-06T19:38:26Z",
"updated_at": "2020-07-07T08:29:22Z",
"pushed_at": "2020-07-05T03:49:23Z",
"stargazers_count": 1169,
"watchers_count": 1169,
"forks_count": 289,
"forks": 289,
"watchers": 1169,
"stargazers_count": 1175,
"watchers_count": 1175,
"forks_count": 290,
"forks": 290,
"watchers": 1175,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-06T06:03:48Z",
"updated_at": "2020-07-07T08:04:45Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 490,
"watchers_count": 490,
"forks_count": 119,
"forks": 119,
"watchers": 489,
"watchers": 490,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-01-15T08:36:05Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 13,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2020-06-23T14:26:15Z",
"updated_at": "2020-07-07T04:39:07Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 33,
"forks": 33,
"watchers": 115,
"watchers": 116,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2020-03-24T13:10:39Z",
"updated_at": "2020-07-01T02:56:48Z",
"updated_at": "2020-07-07T08:33:34Z",
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 17,
"forks": 17,
"watchers": 68,
"watchers": 69,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC of StrandHogg2 (CVE-2020-0096)",
"fork": false,
"created_at": "2020-06-18T09:05:49Z",
"updated_at": "2020-07-03T13:36:20Z",
"updated_at": "2020-07-07T05:02:06Z",
"pushed_at": "2020-06-18T09:05:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-07-06T03:35:50Z",
"updated_at": "2020-07-07T08:21:49Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 356,
"watchers_count": 356,
"forks_count": 78,
"forks": 78,
"watchers": 355,
"watchers": 356,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Powershell SMBv3 Compression checker",
"fork": false,
"created_at": "2020-03-11T09:13:48Z",
"updated_at": "2020-05-27T09:05:35Z",
"updated_at": "2020-07-07T09:07:56Z",
"pushed_at": "2020-04-14T11:38:39Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 12,
"forks": 12,
"watchers": 28,
"watchers": 29,
"score": 0
},
{
@ -937,8 +937,8 @@
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 971,
"watchers_count": 971,
"forks_count": 318,
"forks": 318,
"forks_count": 319,
"forks": 319,
"watchers": 971,
"score": 0
},
@ -1186,13 +1186,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-07-06T19:43:27Z",
"updated_at": "2020-07-07T04:02:00Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"forks_count": 87,
"forks": 87,
"watchers": 285,
"watchers": 286,
"score": 0
},
{
@ -1462,13 +1462,13 @@
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
"fork": false,
"created_at": "2020-07-06T14:45:07Z",
"updated_at": "2020-07-07T01:48:01Z",
"updated_at": "2020-07-07T08:15:13Z",
"pushed_at": "2020-07-06T19:00:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 7,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
"fork": false,
"created_at": "2020-06-23T18:45:24Z",
"updated_at": "2020-06-27T06:49:15Z",
"updated_at": "2020-07-07T08:51:54Z",
"pushed_at": "2020-06-25T12:22:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-06T19:38:26Z",
"updated_at": "2020-07-07T08:29:22Z",
"pushed_at": "2020-07-05T03:49:23Z",
"stargazers_count": 1169,
"watchers_count": 1169,
"forks_count": 289,
"forks": 289,
"watchers": 1169,
"stargazers_count": 1175,
"watchers_count": 1175,
"forks_count": 290,
"forks": 290,
"watchers": 1175,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-11651: Proof of Concept",
"fork": false,
"created_at": "2020-05-04T11:47:56Z",
"updated_at": "2020-07-02T05:41:58Z",
"updated_at": "2020-07-07T05:55:12Z",
"pushed_at": "2020-05-05T03:27:11Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 15,
"forks": 15,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1958 PoC",
"fork": false,
"created_at": "2020-04-11T13:31:02Z",
"updated_at": "2020-05-18T10:43:49Z",
"updated_at": "2020-07-07T08:32:35Z",
"pushed_at": "2020-04-11T14:52:36Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 8,
"forks": 8,
"watchers": 20,
"watchers": 21,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-06T06:03:48Z",
"updated_at": "2020-07-07T08:04:45Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 490,
"watchers_count": 490,
"forks_count": 119,
"forks": 119,
"watchers": 489,
"watchers": 490,
"score": 0
},
{
@ -109,8 +109,8 @@
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 51,
"forks": 51,
"forks_count": 52,
"forks": 52,
"watchers": 205,
"score": 0
},
@ -174,13 +174,13 @@
"description": "CVE-2020-2551 POC to use in Internet",
"fork": false,
"created_at": "2020-05-24T02:56:12Z",
"updated_at": "2020-06-27T16:27:55Z",
"updated_at": "2020-07-07T06:26:51Z",
"pushed_at": "2020-05-26T06:58:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"watchers": 9,
"watchers": 8,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-05T06:19:09Z",
"updated_at": "2020-07-07T01:51:11Z",
"pushed_at": "2020-07-06T18:30:35Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 11,
"forks": 11,
"watchers": 22,
"updated_at": "2020-07-07T07:23:29Z",
"pushed_at": "2020-07-07T07:19:16Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 13,
"forks": 13,
"watchers": 25,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-07-07T02:49:11Z",
"updated_at": "2020-07-07T09:03:59Z",
"pushed_at": "2020-07-07T02:49:09Z",
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 37,
"forks": 37,
"watchers": 159,
"stargazers_count": 177,
"watchers_count": 177,
"forks_count": 48,
"forks": 48,
"watchers": 177,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Proof of concept for CVE-2020-5902",
"fork": false,
"created_at": "2020-07-05T17:01:27Z",
"updated_at": "2020-07-07T02:49:43Z",
"updated_at": "2020-07-07T09:09:56Z",
"pushed_at": "2020-07-06T17:47:17Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 17,
"forks": 17,
"watchers": 45,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 19,
"forks": 19,
"watchers": 49,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
"fork": false,
"created_at": "2020-07-06T01:12:23Z",
"updated_at": "2020-07-07T01:44:34Z",
"updated_at": "2020-07-07T08:06:18Z",
"pushed_at": "2020-07-06T01:36:32Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"watchers": 8,
"score": 0
},
{
@ -266,13 +266,13 @@
"description": "F5 Big-IP CVE-2020-5902 - LFI and RCE",
"fork": false,
"created_at": "2020-07-06T04:03:58Z",
"updated_at": "2020-07-06T23:37:59Z",
"pushed_at": "2020-07-06T04:43:25Z",
"stargazers_count": 16,
"watchers_count": 16,
"updated_at": "2020-07-07T07:44:31Z",
"pushed_at": "2020-07-07T05:22:19Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"forks": 5,
"watchers": 16,
"watchers": 19,
"score": 0
},
{
@ -404,13 +404,13 @@
"description": "批量扫描CVE-2020-5902远程代码执行已测试",
"fork": false,
"created_at": "2020-07-06T09:16:36Z",
"updated_at": "2020-07-07T02:25:26Z",
"updated_at": "2020-07-07T06:54:17Z",
"pushed_at": "2020-07-06T09:53:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0
},
{
@ -500,8 +500,8 @@
"pushed_at": "2020-07-06T15:53:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
@ -542,13 +542,36 @@
"description": "F5 BIG-IP Scanner (CVE-2020-5902)",
"fork": false,
"created_at": "2020-07-07T02:03:39Z",
"updated_at": "2020-07-07T03:09:06Z",
"updated_at": "2020-07-07T05:53:06Z",
"pushed_at": "2020-07-07T02:03:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 277725875,
"name": "CVE-2020-5902-F5BIG",
"full_name": "Any3ite\/CVE-2020-5902-F5BIG",
"owner": {
"login": "Any3ite",
"id": 20638313,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20638313?v=4",
"html_url": "https:\/\/github.com\/Any3ite"
},
"html_url": "https:\/\/github.com\/Any3ite\/CVE-2020-5902-F5BIG",
"description": null,
"fork": false,
"created_at": "2020-07-07T05:32:46Z",
"updated_at": "2020-07-07T05:54:24Z",
"pushed_at": "2020-07-07T05:54:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2020-07-03T09:11:22Z",
"updated_at": "2020-07-07T03:11:53Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 33,
"forks": 33,
"watchers": 184,
"watchers": 185,
"score": 0
},
{
@ -132,8 +132,8 @@
"pushed_at": "2020-06-05T21:04:43Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},

View file

@ -691,6 +691,7 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
- [jinnywc/CVE-2020-5902](https://github.com/jinnywc/CVE-2020-5902)
- [GoodiesHQ/F5-Patch](https://github.com/GoodiesHQ/F5-Patch)
- [jiansiting/CVE-2020-5902](https://github.com/jiansiting/CVE-2020-5902)
- [Any3ite/CVE-2020-5902-F5BIG](https://github.com/Any3ite/CVE-2020-5902-F5BIG)
### CVE-2020-6418