Auto Update 2020/02/14 06:07:31

This commit is contained in:
motikan2010-bot 2020-02-14 06:07:31 +09:00
parent a26af957c2
commit 66826ad0e1
21 changed files with 87 additions and 87 deletions

View file

@ -13,13 +13,13 @@
"description": "[discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS",
"fork": false,
"created_at": "2016-02-03T21:44:11Z",
"updated_at": "2020-02-09T06:25:51Z",
"updated_at": "2020-02-13T16:43:00Z",
"pushed_at": "2018-05-21T21:20:54Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 9,
"forks": 9,
"watchers": 18,
"watchers": 17,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "🔥 A checker site for MS15-034 \/ CVE-2015-1635",
"fork": false,
"created_at": "2015-04-15T15:05:01Z",
"updated_at": "2019-08-18T16:42:54Z",
"updated_at": "2020-02-13T15:38:56Z",
"pushed_at": "2015-05-31T10:16:34Z",
"stargazers_count": 38,
"watchers_count": 38,

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2020-02-12T15:53:11Z",
"updated_at": "2020-02-13T18:20:38Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 257,
"watchers_count": 257,
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 96,
"forks": 96,
"watchers": 257,
"watchers": 258,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2020-02-11T22:05:09Z",
"updated_at": "2020-02-13T18:19:11Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 610,
"watchers_count": 610,
"forks_count": 273,
"forks": 273,
"watchers": 610,
"stargazers_count": 611,
"watchers_count": 611,
"forks_count": 274,
"forks": 274,
"watchers": 611,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2020-01-21T23:26:44Z",
"updated_at": "2020-02-13T18:20:35Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 458,
"watchers_count": 458,
"forks_count": 197,
"forks": 197,
"watchers": 458,
"stargazers_count": 459,
"watchers_count": 459,
"forks_count": 196,
"forks": 196,
"watchers": 459,
"score": 0
},
{
@ -86,8 +86,8 @@
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 425,
"watchers_count": 425,
"forks_count": 233,
"forks": 233,
"forks_count": 232,
"forks": 232,
"watchers": 425,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2020-02-01T07:49:02Z",
"updated_at": "2020-02-13T18:20:36Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 334,
"watchers_count": 334,

View file

@ -1236,8 +1236,8 @@
"pushed_at": "2020-01-15T16:12:07Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 129,
"forks": 129,
"forks_count": 128,
"forks": 128,
"watchers": 8,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2020-02-07T08:42:08Z",
"updated_at": "2020-02-13T18:20:36Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 651,
"watchers_count": 651,
"stargazers_count": 652,
"watchers_count": 652,
"forks_count": 171,
"forks": 171,
"watchers": 651,
"watchers": 652,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2020-01-10T20:27:50Z",
"updated_at": "2020-02-13T18:20:40Z",
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 228,
"watchers_count": 228,
"stargazers_count": 229,
"watchers_count": 229,
"forks_count": 82,
"forks": 82,
"watchers": 228,
"watchers": 229,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2020-02-11T12:29:51Z",
"updated_at": "2020-02-13T18:20:39Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 101,
"forks": 101,
"watchers": 168,
"watchers": 169,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2020-02-11T12:30:02Z",
"updated_at": "2020-02-13T18:20:37Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"forks_count": 124,
"forks": 124,
"watchers": 301,
"watchers": 302,
"score": 0
},
{

View file

@ -2014,13 +2014,13 @@
"description": "Public work for CVE-2019-0708",
"fork": false,
"created_at": "2019-07-23T03:15:53Z",
"updated_at": "2020-01-21T00:42:30Z",
"updated_at": "2020-02-13T18:42:35Z",
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 261,
"watchers_count": 261,
"stargazers_count": 262,
"watchers_count": 262,
"forks_count": 83,
"forks": 83,
"watchers": 261,
"watchers": 262,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-17564 Apache Dubbo deserialization RCE",
"fork": false,
"created_at": "2020-02-13T01:40:50Z",
"updated_at": "2020-02-13T05:58:04Z",
"updated_at": "2020-02-13T17:54:24Z",
"pushed_at": "2020-02-13T01:42:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
"fork": false,
"created_at": "2020-02-07T02:41:44Z",
"updated_at": "2020-02-12T19:23:14Z",
"updated_at": "2020-02-13T15:13:49Z",
"pushed_at": "2020-02-07T17:58:39Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 4,
"forks": 4,
"watchers": 32,
"watchers": 33,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2020-02-13T01:43:42Z",
"updated_at": "2020-02-13T20:14:38Z",
"pushed_at": "2020-02-07T21:21:45Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 2,
"forks": 2,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-01-30T00:11:20Z",
"updated_at": "2020-02-10T11:22:13Z",
"updated_at": "2020-02-13T17:14:52Z",
"pushed_at": "2020-02-06T15:02:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -726,13 +726,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2020-02-13T12:03:46Z",
"pushed_at": "2020-02-12T16:53:30Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 8,
"forks": 8,
"watchers": 48,
"updated_at": "2020-02-13T16:54:52Z",
"pushed_at": "2020-02-13T16:54:50Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 9,
"forks": 9,
"watchers": 52,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2020-02-13T14:21:40Z",
"updated_at": "2020-02-13T20:09:08Z",
"pushed_at": "2020-02-11T21:34:28Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 14,
"forks": 14,
"watchers": 98,
"watchers": 101,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept code for CVE-2020-0728",
"fork": false,
"created_at": "2020-02-12T22:32:28Z",
"updated_at": "2020-02-13T15:02:19Z",
"updated_at": "2020-02-13T20:08:54Z",
"pushed_at": "2020-02-12T22:50:22Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"watchers": 15,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 63,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2020-02-13T14:56:38Z",
"updated_at": "2020-02-13T16:01:00Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 3,
"forks": 3,
"watchers": 29,
"watchers": 30,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop) ",
"fork": false,
"created_at": "2020-02-07T18:22:51Z",
"updated_at": "2020-02-13T12:33:11Z",
"updated_at": "2020-02-13T17:27:22Z",
"pushed_at": "2020-02-13T00:52:51Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
}
]