Auto Update 2021/01/09 12:09:46

This commit is contained in:
motikan2010-bot 2021-01-09 12:09:46 +09:00
parent 50fa3e37cd
commit 75690166fa
14 changed files with 61 additions and 61 deletions

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2021-01-05T20:01:24Z",
"updated_at": "2021-01-08T23:24:12Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2247,
"watchers_count": 2247,
"forks_count": 485,
"forks": 485,
"watchers": 2247,
"stargazers_count": 2246,
"watchers_count": 2246,
"forks_count": 486,
"forks": 486,
"watchers": 2246,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2021-01-07T09:24:02Z",
"updated_at": "2021-01-08T23:47:37Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 30,
"forks": 30,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -473,8 +473,8 @@
"description": null,
"fork": false,
"created_at": "2020-10-18T14:01:59Z",
"updated_at": "2021-01-07T21:53:41Z",
"pushed_at": "2021-01-07T21:53:39Z",
"updated_at": "2021-01-08T23:10:47Z",
"pushed_at": "2021-01-08T23:10:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2021-01-02T07:03:14Z",
"updated_at": "2021-01-09T00:44:25Z",
"pushed_at": "2020-06-04T13:17:10Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 27,
"forks": 27,
"watchers": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 28,
"forks": 28,
"watchers": 83,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-08T16:22:58Z",
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 35,
"forks": 35,
"forks_count": 36,
"forks": 36,
"watchers": 54,
"score": 0
}

View file

@ -910,13 +910,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-01-08T07:27:55Z",
"updated_at": "2021-01-09T02:41:33Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1058,
"watchers_count": 1058,
"stargazers_count": 1059,
"watchers_count": 1059,
"forks_count": 355,
"forks": 355,
"watchers": 1058,
"watchers": 1059,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-14179 Scanner",
"fork": false,
"created_at": "2021-01-08T14:15:24Z",
"updated_at": "2021-01-08T20:57:40Z",
"updated_at": "2021-01-08T21:20:59Z",
"pushed_at": "2021-01-08T20:57:38Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-08T18:03:54Z",
"updated_at": "2021-01-09T01:36:24Z",
"pushed_at": "2021-01-08T11:00:13Z",
"stargazers_count": 699,
"watchers_count": 699,
"stargazers_count": 702,
"watchers_count": 702,
"forks_count": 124,
"forks": 124,
"watchers": 699,
"watchers": 702,
"score": 0
},
{

View file

@ -298,29 +298,6 @@
"watchers": 3,
"score": 0
},
{
"id": 306899847,
"name": "CVE-2020-16898",
"full_name": "Passive\/CVE-2020-16898",
"owner": {
"login": "Passive",
"id": 40716556,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40716556?v=4",
"html_url": "https:\/\/github.com\/Passive"
},
"html_url": "https:\/\/github.com\/Passive\/CVE-2020-16898",
"description": null,
"fork": false,
"created_at": "2020-10-24T14:21:14Z",
"updated_at": "2020-10-24T14:23:22Z",
"pushed_at": "2020-10-24T14:23:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 307994197,
"name": "CVE-2020-16898--EXP-POC",

View file

@ -13,13 +13,13 @@
"description": "Exchange2010 authorized RCE",
"fork": false,
"created_at": "2020-12-09T10:30:16Z",
"updated_at": "2021-01-08T16:57:00Z",
"updated_at": "2021-01-08T23:59:23Z",
"pushed_at": "2020-12-24T08:11:51Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 33,
"forks": 33,
"watchers": 120,
"watchers": 121,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "TikiWiki 21.2 allows to edit templates without the use of a CSRF protection. ",
"fork": false,
"created_at": "2020-12-10T18:13:47Z",
"updated_at": "2020-12-23T08:49:48Z",
"pushed_at": "2020-12-10T21:32:32Z",
"updated_at": "2021-01-08T23:15:08Z",
"pushed_at": "2021-01-08T23:15:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,

View file

@ -21,5 +21,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 328026495,
"name": "CVE-2020-3161-REMAKE",
"full_name": "uromulou\/CVE-2020-3161-REMAKE",
"owner": {
"login": "uromulou",
"id": 54293496,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/54293496?v=4",
"html_url": "https:\/\/github.com\/uromulou"
},
"html_url": "https:\/\/github.com\/uromulou\/CVE-2020-3161-REMAKE",
"description": "Um simples 'remake' da falha 'CVE-2020-3161'.",
"fork": false,
"created_at": "2021-01-08T22:30:49Z",
"updated_at": "2021-01-08T23:47:55Z",
"pushed_at": "2021-01-08T23:47:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -316,8 +316,8 @@
"pushed_at": "2021-01-08T20:07:35Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 47,
"score": 0
}

View file

@ -790,6 +790,7 @@ A vulnerability in the web server for Cisco IP Phones could allow an unauthentic
</code>
- [uromulou/CVE-2020-3161](https://github.com/uromulou/CVE-2020-3161)
- [uromulou/CVE-2020-3161-REMAKE](https://github.com/uromulou/CVE-2020-3161-REMAKE)
### CVE-2020-3187 (2020-05-06)
@ -2789,7 +2790,6 @@ A remote code execution vulnerability exists when the Windows TCP/IP stack impro
- [CPO-EH/CVE-2020-16898_Checker](https://github.com/CPO-EH/CVE-2020-16898_Checker)
- [momika233/CVE-2020-16898-exp](https://github.com/momika233/CVE-2020-16898-exp)
- [komomon/CVE-2020-16898-EXP-POC](https://github.com/komomon/CVE-2020-16898-EXP-POC)
- [Passive/CVE-2020-16898](https://github.com/Passive/CVE-2020-16898)
- [komomon/CVE-2020-16898--EXP-POC](https://github.com/komomon/CVE-2020-16898--EXP-POC)
### CVE-2020-16899 (2020-10-16)