Auto Update 2020/03/13 12:07:49

This commit is contained in:
motikan2010-bot 2020-03-13 12:07:49 +09:00
parent 9d3998cd5d
commit 75f37bbd36
21 changed files with 171 additions and 137 deletions

View file

@ -59,13 +59,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false, "fork": false,
"created_at": "2017-04-17T08:10:07Z", "created_at": "2017-04-17T08:10:07Z",
"updated_at": "2020-03-02T04:26:34Z", "updated_at": "2020-03-13T02:41:20Z",
"pushed_at": "2017-11-19T11:01:16Z", "pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 614, "stargazers_count": 613,
"watchers_count": 614, "watchers_count": 613,
"forks_count": 274, "forks_count": 274,
"forks": 274, "forks": 274,
"watchers": 614, "watchers": 613,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.", "description": "Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.",
"fork": false, "fork": false,
"created_at": "2017-05-30T09:55:55Z", "created_at": "2017-05-30T09:55:55Z",
"updated_at": "2020-02-24T03:23:00Z", "updated_at": "2020-03-13T01:54:07Z",
"pushed_at": "2020-01-06T16:29:51Z", "pushed_at": "2020-01-06T16:29:51Z",
"stargazers_count": 104, "stargazers_count": 105,
"watchers_count": 104, "watchers_count": 105,
"forks_count": 28, "forks_count": 28,
"forks": 28, "forks": 28,
"watchers": 104, "watchers": 105,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar", "description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false, "fork": false,
"created_at": "2019-02-22T04:52:08Z", "created_at": "2019-02-22T04:52:08Z",
"updated_at": "2020-03-09T16:34:14Z", "updated_at": "2020-03-13T00:06:27Z",
"pushed_at": "2019-08-05T10:45:34Z", "pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 386, "stargazers_count": 387,
"watchers_count": 386, "watchers_count": 387,
"forks_count": 170, "forks_count": 170,
"forks": 170, "forks": 170,
"watchers": 386, "watchers": 387,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script", "description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
"fork": false, "fork": false,
"created_at": "2018-07-20T03:59:18Z", "created_at": "2018-07-20T03:59:18Z",
"updated_at": "2020-02-12T16:18:33Z", "updated_at": "2020-03-13T02:53:14Z",
"pushed_at": "2018-07-20T12:46:50Z", "pushed_at": "2018-07-20T12:46:50Z",
"stargazers_count": 119, "stargazers_count": 118,
"watchers_count": 119, "watchers_count": 118,
"forks_count": 43, "forks_count": 43,
"forks": 43, "forks": 43,
"watchers": 119, "watchers": 118,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit", "description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false, "fork": false,
"created_at": "2020-03-11T08:30:14Z", "created_at": "2020-03-11T08:30:14Z",
"updated_at": "2020-03-12T19:36:49Z", "updated_at": "2020-03-13T02:25:57Z",
"pushed_at": "2020-03-11T09:59:01Z", "pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 38, "stargazers_count": 40,
"watchers_count": 38, "watchers_count": 40,
"forks_count": 5, "forks_count": 6,
"forks": 5, "forks": 6,
"watchers": 38, "watchers": 40,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618", "description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618",
"fork": false, "fork": false,
"created_at": "2019-04-17T12:23:24Z", "created_at": "2019-04-17T12:23:24Z",
"updated_at": "2020-03-11T07:25:46Z", "updated_at": "2020-03-13T02:47:53Z",
"pushed_at": "2019-04-17T15:05:09Z", "pushed_at": "2019-04-17T15:05:09Z",
"stargazers_count": 139, "stargazers_count": 138,
"watchers_count": 139, "watchers_count": 138,
"forks_count": 48, "forks_count": 48,
"forks": 48, "forks": 48,
"watchers": 139, "watchers": 138,
"score": 0 "score": 0
}, },
{ {

View file

@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显", "description": "CVE-2019-2725 命令回显",
"fork": false, "fork": false,
"created_at": "2019-05-29T01:57:05Z", "created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-03-11T07:12:59Z", "updated_at": "2020-03-13T02:27:44Z",
"pushed_at": "2019-08-08T09:48:20Z", "pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 305, "stargazers_count": 307,
"watchers_count": 305, "watchers_count": 307,
"forks_count": 135, "forks_count": 135,
"forks": 135, "forks": 135,
"watchers": 305, "watchers": 307,
"score": 0 "score": 0
}, },
{ {

View file

@ -82,13 +82,13 @@
"description": "CVE-2019-3396 confluence SSTI RCE", "description": "CVE-2019-3396 confluence SSTI RCE",
"fork": false, "fork": false,
"created_at": "2019-04-10T02:15:47Z", "created_at": "2019-04-10T02:15:47Z",
"updated_at": "2020-03-09T12:02:49Z", "updated_at": "2020-03-13T02:48:28Z",
"pushed_at": "2019-04-12T01:46:33Z", "pushed_at": "2019-04-12T01:46:33Z",
"stargazers_count": 145, "stargazers_count": 144,
"watchers_count": 145, "watchers_count": 144,
"forks_count": 62, "forks_count": 62,
"forks": 62, "forks": 62,
"watchers": 145, "watchers": 144,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-16T17:18:01Z", "pushed_at": "2020-02-16T17:18:01Z",
"stargazers_count": 12, "stargazers_count": 12,
"watchers_count": 12, "watchers_count": 12,
"forks_count": 4, "forks_count": 5,
"forks": 4, "forks": 5,
"watchers": 12, "watchers": 12,
"score": 0 "score": 0
} }

View file

@ -36,13 +36,13 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE", "description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false, "fork": false,
"created_at": "2020-01-23T22:29:46Z", "created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-03-06T05:47:50Z", "updated_at": "2020-03-13T01:23:47Z",
"pushed_at": "2020-01-24T15:21:06Z", "pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 191, "stargazers_count": 192,
"watchers_count": 191, "watchers_count": 192,
"forks_count": 50, "forks_count": 50,
"forks": 50, "forks": 50,
"watchers": 191, "watchers": 192,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-26T09:24:45Z", "pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 16, "stargazers_count": 16,
"watchers_count": 16, "watchers_count": 16,
"forks_count": 2, "forks_count": 3,
"forks": 2, "forks": 3,
"watchers": 16, "watchers": 16,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-0688 - Exchange", "description": "CVE-2020-0688 - Exchange",
"fork": false, "fork": false,
"created_at": "2020-02-26T12:28:11Z", "created_at": "2020-02-26T12:28:11Z",
"updated_at": "2020-03-11T03:43:28Z", "updated_at": "2020-03-13T01:47:23Z",
"pushed_at": "2020-02-27T03:50:07Z", "pushed_at": "2020-02-27T03:50:07Z",
"stargazers_count": 21, "stargazers_count": 22,
"watchers_count": 21, "watchers_count": 22,
"forks_count": 10, "forks_count": 10,
"forks": 10, "forks": 10,
"watchers": 21, "watchers": 22,
"score": 0 "score": 0
}, },
{ {
@ -201,8 +201,8 @@
"pushed_at": "2020-03-01T12:58:01Z", "pushed_at": "2020-03-01T12:58:01Z",
"stargazers_count": 117, "stargazers_count": 117,
"watchers_count": 117, "watchers_count": 117,
"forks_count": 35, "forks_count": 36,
"forks": 35, "forks": 36,
"watchers": 117, "watchers": 117,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability", "description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
"fork": false, "fork": false,
"created_at": "2020-03-10T21:40:57Z", "created_at": "2020-03-10T21:40:57Z",
"updated_at": "2020-03-12T21:09:11Z", "updated_at": "2020-03-13T02:57:00Z",
"pushed_at": "2020-03-12T18:44:07Z", "pushed_at": "2020-03-12T22:58:25Z",
"stargazers_count": 12, "stargazers_count": 15,
"watchers_count": 12, "watchers_count": 15,
"forks_count": 1, "forks_count": 1,
"forks": 1, "forks": 1,
"watchers": 12, "watchers": 15,
"score": 0 "score": 0
}, },
{ {
@ -59,13 +59,13 @@
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.", "description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
"fork": false, "fork": false,
"created_at": "2020-03-11T06:51:58Z", "created_at": "2020-03-11T06:51:58Z",
"updated_at": "2020-03-12T20:24:36Z", "updated_at": "2020-03-13T03:06:21Z",
"pushed_at": "2020-03-12T08:50:23Z", "pushed_at": "2020-03-13T00:50:55Z",
"stargazers_count": 32, "stargazers_count": 45,
"watchers_count": 32, "watchers_count": 45,
"forks_count": 11, "forks_count": 13,
"forks": 11, "forks": 13,
"watchers": 32, "watchers": 45,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false, "fork": false,
"created_at": "2020-03-11T15:21:27Z", "created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-03-12T21:01:53Z", "updated_at": "2020-03-13T02:44:32Z",
"pushed_at": "2020-03-12T16:24:44Z", "pushed_at": "2020-03-13T02:44:17Z",
"stargazers_count": 206, "stargazers_count": 219,
"watchers_count": 206, "watchers_count": 219,
"forks_count": 50, "forks_count": 57,
"forks": 50, "forks": 57,
"watchers": 206, "watchers": 219,
"score": 0 "score": 0
}, },
{ {
@ -105,13 +105,13 @@
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)", "description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
"fork": false, "fork": false,
"created_at": "2020-03-11T16:23:03Z", "created_at": "2020-03-11T16:23:03Z",
"updated_at": "2020-03-12T10:10:28Z", "updated_at": "2020-03-12T21:40:33Z",
"pushed_at": "2020-03-11T22:50:40Z", "pushed_at": "2020-03-11T22:50:40Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"forks_count": 2, "forks_count": 3,
"forks": 2, "forks": 3,
"watchers": 2, "watchers": 3,
"score": 0 "score": 0
}, },
{ {
@ -128,8 +128,8 @@
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"", "description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
"fork": false, "fork": false,
"created_at": "2020-03-11T17:51:29Z", "created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-03-12T19:31:19Z", "updated_at": "2020-03-12T22:06:40Z",
"pushed_at": "2020-03-12T19:31:17Z", "pushed_at": "2020-03-12T22:06:38Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,
@ -335,7 +335,7 @@
"description": "Check system is vulnerable CVE-2020-0796 (SMB v3)", "description": "Check system is vulnerable CVE-2020-0796 (SMB v3)",
"fork": false, "fork": false,
"created_at": "2020-03-12T17:32:56Z", "created_at": "2020-03-12T17:32:56Z",
"updated_at": "2020-03-12T17:43:01Z", "updated_at": "2020-03-13T00:16:03Z",
"pushed_at": "2020-03-12T17:42:59Z", "pushed_at": "2020-03-12T17:42:59Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
@ -381,8 +381,8 @@
"description": "SMBGhost (CVE-2020-0796) threaded scanner", "description": "SMBGhost (CVE-2020-0796) threaded scanner",
"fork": false, "fork": false,
"created_at": "2020-03-12T18:03:45Z", "created_at": "2020-03-12T18:03:45Z",
"updated_at": "2020-03-12T18:42:55Z", "updated_at": "2020-03-12T22:20:13Z",
"pushed_at": "2020-03-12T18:42:53Z", "pushed_at": "2020-03-12T22:20:11Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,
@ -404,13 +404,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-03-12T18:34:40Z", "created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-03-12T19:31:33Z", "updated_at": "2020-03-13T02:26:11Z",
"pushed_at": "2020-03-12T18:46:19Z", "pushed_at": "2020-03-12T18:46:19Z",
"stargazers_count": 1, "stargazers_count": 3,
"watchers_count": 1, "watchers_count": 3,
"forks_count": 2, "forks_count": 3,
"forks": 2, "forks": 3,
"watchers": 1, "watchers": 3,
"score": 0 "score": 0
}, },
{ {
@ -427,8 +427,8 @@
"description": "Scanner script to identify hosts vulnerable to CVE-2020-0796", "description": "Scanner script to identify hosts vulnerable to CVE-2020-0796",
"fork": false, "fork": false,
"created_at": "2020-03-12T19:22:36Z", "created_at": "2020-03-12T19:22:36Z",
"updated_at": "2020-03-12T20:55:27Z", "updated_at": "2020-03-12T21:41:00Z",
"pushed_at": "2020-03-12T20:55:26Z", "pushed_at": "2020-03-12T21:40:58Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,
@ -450,13 +450,13 @@
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ", "description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
"fork": false, "fork": false,
"created_at": "2020-03-12T19:33:18Z", "created_at": "2020-03-12T19:33:18Z",
"updated_at": "2020-03-12T19:59:22Z", "updated_at": "2020-03-12T22:41:50Z",
"pushed_at": "2020-03-12T19:45:53Z", "pushed_at": "2020-03-12T19:45:53Z",
"stargazers_count": 3, "stargazers_count": 5,
"watchers_count": 3, "watchers_count": 5,
"forks_count": 0, "forks_count": 1,
"forks": 0, "forks": 1,
"watchers": 3, "watchers": 5,
"score": 0 "score": 0
}, },
{ {
@ -496,13 +496,13 @@
"description": "SMBv3 RCE vulnerability in SMBv3", "description": "SMBv3 RCE vulnerability in SMBv3",
"fork": false, "fork": false,
"created_at": "2020-03-12T19:46:25Z", "created_at": "2020-03-12T19:46:25Z",
"updated_at": "2020-03-12T19:53:29Z", "updated_at": "2020-03-12T21:47:56Z",
"pushed_at": "2020-03-12T19:53:27Z", "pushed_at": "2020-03-12T19:53:27Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
}, },
{ {
@ -519,13 +519,13 @@
"description": "Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11", "description": "Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11",
"fork": false, "fork": false,
"created_at": "2020-03-12T20:07:44Z", "created_at": "2020-03-12T20:07:44Z",
"updated_at": "2020-03-12T20:45:25Z", "updated_at": "2020-03-13T02:36:38Z",
"pushed_at": "2020-03-12T20:42:54Z", "pushed_at": "2020-03-12T20:42:54Z",
"stargazers_count": 0, "stargazers_count": 4,
"watchers_count": 0, "watchers_count": 4,
"forks_count": 0, "forks_count": 1,
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 4,
"score": 0 "score": 0
}, },
{ {
@ -550,5 +550,28 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 246951836,
"name": "SMBGhosts",
"full_name": "IAreKyleW00t\/SMBGhosts",
"owner": {
"login": "IAreKyleW00t",
"id": 1072572,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1072572?v=4",
"html_url": "https:\/\/github.com\/IAreKyleW00t"
},
"html_url": "https:\/\/github.com\/IAreKyleW00t\/SMBGhosts",
"description": "Multithreaded Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-12T23:55:39Z",
"updated_at": "2020-03-13T02:27:41Z",
"pushed_at": "2020-03-13T02:27:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Powershell SMBv3 Compression checker", "description": "Powershell SMBv3 Compression checker",
"fork": false, "fork": false,
"created_at": "2020-03-11T09:13:48Z", "created_at": "2020-03-11T09:13:48Z",
"updated_at": "2020-03-12T21:00:15Z", "updated_at": "2020-03-13T02:07:53Z",
"pushed_at": "2020-03-12T21:00:13Z", "pushed_at": "2020-03-12T21:47:21Z",
"stargazers_count": 7, "stargazers_count": 9,
"watchers_count": 7, "watchers_count": 9,
"forks_count": 1, "forks_count": 2,
"forks": 1, "forks": 2,
"watchers": 7, "watchers": 9,
"score": 0 "score": 0
} }
] ]

View file

@ -312,13 +312,13 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false, "fork": false,
"created_at": "2020-02-22T16:16:20Z", "created_at": "2020-02-22T16:16:20Z",
"updated_at": "2020-03-12T15:36:26Z", "updated_at": "2020-03-13T01:41:20Z",
"pushed_at": "2020-03-09T14:51:43Z", "pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 51, "stargazers_count": 52,
"watchers_count": 51, "watchers_count": 52,
"forks_count": 18, "forks_count": 18,
"forks": 18, "forks": 18,
"watchers": 51, "watchers": 52,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1947 poc", "description": "CVE-2020-1947 poc",
"fork": false, "fork": false,
"created_at": "2020-03-10T12:44:01Z", "created_at": "2020-03-10T12:44:01Z",
"updated_at": "2020-03-12T11:22:43Z", "updated_at": "2020-03-13T02:19:44Z",
"pushed_at": "2020-03-10T12:48:10Z", "pushed_at": "2020-03-10T12:48:10Z",
"stargazers_count": 39, "stargazers_count": 40,
"watchers_count": 39, "watchers_count": 40,
"forks_count": 12, "forks_count": 12,
"forks": 12, "forks": 12,
"watchers": 39, "watchers": 40,
"score": 0 "score": 0
}, },
{ {
@ -36,13 +36,13 @@
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞", "description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
"fork": false, "fork": false,
"created_at": "2020-03-11T03:15:25Z", "created_at": "2020-03-11T03:15:25Z",
"updated_at": "2020-03-12T13:53:16Z", "updated_at": "2020-03-12T23:01:30Z",
"pushed_at": "2020-03-11T03:54:34Z", "pushed_at": "2020-03-11T03:54:34Z",
"stargazers_count": 20, "stargazers_count": 21,
"watchers_count": 20, "watchers_count": 21,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 20, "watchers": 21,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:", "description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false, "fork": false,
"created_at": "2020-01-19T13:01:32Z", "created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-03-12T18:37:33Z", "updated_at": "2020-03-13T01:58:09Z",
"pushed_at": "2020-03-10T15:46:18Z", "pushed_at": "2020-03-10T15:46:18Z",
"stargazers_count": 77, "stargazers_count": 78,
"watchers_count": 77, "watchers_count": 78,
"forks_count": 19, "forks_count": 19,
"forks": 19, "forks": 19,
"watchers": 77, "watchers": 78,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-2555", "description": "CVE-2020-2555",
"fork": false, "fork": false,
"created_at": "2020-03-07T12:02:26Z", "created_at": "2020-03-07T12:02:26Z",
"updated_at": "2020-03-12T10:20:31Z", "updated_at": "2020-03-12T22:29:40Z",
"pushed_at": "2020-03-12T09:20:08Z", "pushed_at": "2020-03-12T09:20:08Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 1, "forks_count": 1,
"forks": 1, "forks": 1,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-8597 pppd buffer overflow poc", "description": "CVE-2020-8597 pppd buffer overflow poc",
"fork": false, "fork": false,
"created_at": "2020-03-07T19:00:46Z", "created_at": "2020-03-07T19:00:46Z",
"updated_at": "2020-03-12T15:20:06Z", "updated_at": "2020-03-13T01:38:57Z",
"pushed_at": "2020-03-12T11:10:31Z", "pushed_at": "2020-03-12T11:10:31Z",
"stargazers_count": 17, "stargazers_count": 19,
"watchers_count": 17, "watchers_count": 19,
"forks_count": 1, "forks_count": 1,
"forks": 1, "forks": 1,
"watchers": 17, "watchers": 19,
"score": 0 "score": 0
} }
] ]

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞", "description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false, "fork": false,
"created_at": "2020-02-24T07:43:12Z", "created_at": "2020-02-24T07:43:12Z",
"updated_at": "2020-03-09T00:27:07Z", "updated_at": "2020-03-13T01:55:00Z",
"pushed_at": "2020-02-24T07:45:37Z", "pushed_at": "2020-02-24T07:45:37Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
}, },
{ {

View file

@ -21,6 +21,11 @@ In the ioctl handlers of the Mediatek Command Queue driver, there is a possible
- [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069) - [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069)
### CVE-2020-0551 ### CVE-2020-0551
<code>
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
</code>
- [bitdefender/lvi-lfb-attack-poc](https://github.com/bitdefender/lvi-lfb-attack-poc) - [bitdefender/lvi-lfb-attack-poc](https://github.com/bitdefender/lvi-lfb-attack-poc)
### CVE-2020-0601 ### CVE-2020-0601
@ -173,6 +178,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [laolisafe/CVE-2020-0796](https://github.com/laolisafe/CVE-2020-0796) - [laolisafe/CVE-2020-0796](https://github.com/laolisafe/CVE-2020-0796)
- [gabimarti/SMBScanner](https://github.com/gabimarti/SMBScanner) - [gabimarti/SMBScanner](https://github.com/gabimarti/SMBScanner)
- [Almorabea/SMBGhost-WorkaroundApplier](https://github.com/Almorabea/SMBGhost-WorkaroundApplier) - [Almorabea/SMBGhost-WorkaroundApplier](https://github.com/Almorabea/SMBGhost-WorkaroundApplier)
- [IAreKyleW00t/SMBGhosts](https://github.com/IAreKyleW00t/SMBGhosts)
### CVE-2020-0976 ### CVE-2020-0976
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976) - [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
@ -2286,6 +2292,11 @@ For Eclipse Che versions 6.16 to 7.3.0, with both authentication and TLS disable
- [mgrube/CVE-2019-17633](https://github.com/mgrube/CVE-2019-17633) - [mgrube/CVE-2019-17633](https://github.com/mgrube/CVE-2019-17633)
### CVE-2019-17658 ### CVE-2019-17658
<code>
An unquoted service path vulnerability in the FortiClient FortiTray component of FortiClientWindows v6.2.2 and prior allow an attacker to gain elevated privileges via the FortiClientConsole executable service path.
</code>
- [Ibonok/CVE-2019-17658](https://github.com/Ibonok/CVE-2019-17658) - [Ibonok/CVE-2019-17658](https://github.com/Ibonok/CVE-2019-17658)
### CVE-2019-1821 ### CVE-2019-1821