Auto Update 2020/12/05 00:09:25

This commit is contained in:
motikan2010-bot 2020-12-05 00:09:25 +09:00
parent 419f1d4480
commit 7905cd4636
25 changed files with 132 additions and 132 deletions

View file

@ -44,5 +44,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 318499385,
"name": "CVE-2006-3392",
"full_name": "IvanGlinkin\/CVE-2006-3392",
"owner": {
"login": "IvanGlinkin",
"id": 64857726,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/64857726?v=4",
"html_url": "https:\/\/github.com\/IvanGlinkin"
},
"html_url": "https:\/\/github.com\/IvanGlinkin\/CVE-2006-3392",
"description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.",
"fork": false,
"created_at": "2020-12-04T11:44:22Z",
"updated_at": "2020-12-04T14:37:15Z",
"pushed_at": "2020-12-04T12:19:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-12-04T08:11:11Z",
"updated_at": "2020-12-04T14:31:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 809,
"watchers_count": 809,
"forks_count": 196,
"forks": 196,
"watchers": 809,
"stargazers_count": 811,
"watchers_count": 811,
"forks_count": 197,
"forks": 197,
"watchers": 811,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "I'll submit the poc after blackhat",
"fork": false,
"created_at": "2015-07-17T06:09:41Z",
"updated_at": "2020-10-21T22:14:10Z",
"updated_at": "2020-12-04T09:29:04Z",
"pushed_at": "2015-08-30T19:24:32Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 76,
"forks": 76,
"watchers": 109,
"watchers": 110,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-12-04T08:11:11Z",
"updated_at": "2020-12-04T14:31:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 809,
"watchers_count": 809,
"forks_count": 196,
"forks": 196,
"watchers": 809,
"stargazers_count": 811,
"watchers_count": 811,
"forks_count": 197,
"forks": 197,
"watchers": 811,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2020-11-25T10:33:35Z",
"updated_at": "2020-12-04T13:57:20Z",
"pushed_at": "2017-02-27T18:56:12Z",
"stargazers_count": 348,
"watchers_count": 348,
"stargazers_count": 349,
"watchers_count": 349,
"forks_count": 126,
"forks": 126,
"watchers": 348,
"watchers": 349,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-01-05T21:57:03Z",
"updated_at": "2020-10-30T08:09:04Z",
"updated_at": "2020-12-04T14:32:52Z",
"pushed_at": "2018-01-26T14:28:58Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 43,
"forks": 43,
"watchers": 118,
"watchers": 119,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-12-04T08:11:11Z",
"updated_at": "2020-12-04T14:31:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 809,
"watchers_count": 809,
"forks_count": 196,
"forks": 196,
"watchers": 809,
"stargazers_count": 811,
"watchers_count": 811,
"forks_count": 197,
"forks": 197,
"watchers": 811,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-12-04T08:11:11Z",
"updated_at": "2020-12-04T14:31:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 809,
"watchers_count": 809,
"forks_count": 196,
"forks": 196,
"watchers": 809,
"stargazers_count": 811,
"watchers_count": 811,
"forks_count": 197,
"forks": 197,
"watchers": 811,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 333,
"watchers_count": 333,
"forks_count": 75,
"forks": 75,
"forks_count": 76,
"forks": 76,
"watchers": 333,
"score": 0
}

View file

@ -473,8 +473,8 @@
"description": null,
"fork": false,
"created_at": "2020-10-18T14:01:59Z",
"updated_at": "2020-12-04T00:18:12Z",
"pushed_at": "2020-12-04T00:18:09Z",
"updated_at": "2020-12-04T14:26:34Z",
"pushed_at": "2020-12-04T14:26:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8639-EXP",
"fork": false,
"created_at": "2019-12-27T07:39:07Z",
"updated_at": "2020-09-17T08:15:34Z",
"updated_at": "2020-12-04T10:25:26Z",
"pushed_at": "2019-12-27T07:44:08Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2020-11-11T07:18:47Z",
"updated_at": "2020-12-04T09:50:33Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 372,
"watchers_count": 372,
"stargazers_count": 371,
"watchers_count": 371,
"forks_count": 104,
"forks": 104,
"watchers": 372,
"watchers": 371,
"score": 0
},
{

View file

@ -1075,8 +1075,8 @@
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1129,
"watchers_count": 1129,
"forks_count": 383,
"forks": 383,
"forks_count": 382,
"forks": 382,
"watchers": 1129,
"score": 0
},
@ -1926,8 +1926,8 @@
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 91,
"forks": 91,
"forks_count": 90,
"forks": 90,
"watchers": 282,
"score": 0
},
@ -2474,13 +2474,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-12-03T08:14:42Z",
"updated_at": "2020-12-04T13:49:52Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 38,
"forks": 38,
"watchers": 154,
"watchers": 155,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2119,
"watchers_count": 2119,
"forks_count": 592,
"forks": 592,
"forks_count": 594,
"forks": 594,
"watchers": 2119,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-12-04T08:11:11Z",
"updated_at": "2020-12-04T14:31:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 809,
"watchers_count": 809,
"forks_count": 196,
"forks": 196,
"watchers": 809,
"stargazers_count": 811,
"watchers_count": 811,
"forks_count": 197,
"forks": 197,
"watchers": 811,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-01-19T10:49:21Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 26,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
"fork": false,
"created_at": "2020-11-23T10:24:07Z",
"updated_at": "2020-12-04T04:55:39Z",
"updated_at": "2020-12-04T13:41:57Z",
"pushed_at": "2020-11-23T11:20:28Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 19,
"forks": 19,
"watchers": 69,
"watchers": 70,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
"fork": false,
"created_at": "2020-06-01T04:44:05Z",
"updated_at": "2020-12-02T09:54:50Z",
"updated_at": "2020-12-04T13:50:05Z",
"pushed_at": "2020-06-17T00:56:08Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 39,
"forks": 39,
"watchers": 151,
"watchers": 152,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "writeup of CVE-2020-1362",
"fork": false,
"created_at": "2020-07-17T07:35:05Z",
"updated_at": "2020-12-04T00:46:12Z",
"updated_at": "2020-12-04T13:49:19Z",
"pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 42,
"forks": 42,
"watchers": 215,
"watchers": 216,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-09-14T16:53:07Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 27,
"score": 0
},
@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2020-12-02T22:48:01Z",
"updated_at": "2020-12-04T10:17:06Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"forks_count": 36,
"forks": 36,
"watchers": 149,
"watchers": 150,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-12-03T16:28:26Z",
"updated_at": "2020-12-04T10:15:49Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 241,
"watchers_count": 241,
"forks_count": 88,
"forks": 88,
"watchers": 240,
"watchers": 241,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2119,
"watchers_count": 2119,
"forks_count": 592,
"forks": 592,
"forks_count": 594,
"forks": 594,
"watchers": 2119,
"score": 0
},
@ -36,13 +36,13 @@
"description": "Vulmap - Web漏洞扫描和验证工具可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2020-12-04T08:50:22Z",
"updated_at": "2020-12-04T10:31:23Z",
"pushed_at": "2020-12-04T06:42:58Z",
"stargazers_count": 392,
"watchers_count": 392,
"stargazers_count": 393,
"watchers_count": 393,
"forks_count": 75,
"forks": 75,
"watchers": 392,
"watchers": 393,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-12-04T08:11:11Z",
"updated_at": "2020-12-04T14:31:47Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 809,
"watchers_count": 809,
"forks_count": 196,
"forks": 196,
"watchers": 809,
"stargazers_count": 811,
"watchers_count": 811,
"forks_count": 197,
"forks": 197,
"watchers": 811,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-11-19T02:17:55Z",
"updated_at": "2020-12-04T13:11:47Z",
"pushed_at": "2020-05-22T08:46:20Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 33,
"forks": 33,
"watchers": 144,
"watchers": 145,
"score": 0
},
{

View file

@ -1171,28 +1171,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 315785653,
"name": "t_pwn",
"full_name": "EtoYoshio\/t_pwn",
"owner": {
"login": "EtoYoshio",
"id": 71338746,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/71338746?v=4",
"html_url": "https:\/\/github.com\/EtoYoshio"
},
"html_url": "https:\/\/github.com\/EtoYoshio\/t_pwn",
"description": "a shitty tool for CVE-2020-5902 (pls use a command various time to work, request things...)",
"fork": false,
"created_at": "2020-11-25T00:23:52Z",
"updated_at": "2020-11-30T14:26:23Z",
"pushed_at": "2020-11-29T00:36:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2020-12-04T01:31:46Z",
"updated_at": "2020-12-04T11:26:55Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 19,
"forks": 19,
"watchers": 94,
"watchers": 95,
"score": 0
},
{

View file

@ -989,7 +989,6 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
- [murataydemir/CVE-2020-5902](https://github.com/murataydemir/CVE-2020-5902)
- [superzerosec/cve-2020-5902](https://github.com/superzerosec/cve-2020-5902)
- [ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability](https://github.com/ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability)
- [EtoYoshio/t_pwn](https://github.com/EtoYoshio/t_pwn)
### CVE-2020-5903 (2020-07-01)
@ -16223,6 +16222,7 @@ Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function be
- [Ziani52/CVE-2006-3392](https://github.com/Ziani52/CVE-2006-3392)
- [notclement/cve-2006-3392](https://github.com/notclement/cve-2006-3392)
- [IvanGlinkin/CVE-2006-3392](https://github.com/IvanGlinkin/CVE-2006-3392)
### CVE-2006-3592 (2006-07-14)