Auto Update 2020/03/17 00:07:30

This commit is contained in:
motikan2010-bot 2020-03-17 00:07:30 +09:00
parent 01b444126d
commit 87182ee0f2
15 changed files with 96 additions and 96 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2014-11-19T03:55:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 11,
"forks": 11,
"forks_count": 10,
"forks": 10,
"watchers": 3,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 261,
"watchers_count": 261,
"forks_count": 178,
"forks": 178,
"forks_count": 177,
"forks": 177,
"watchers": 261,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2018-07-02T02:21:28Z",
"updated_at": "2020-01-25T01:32:25Z",
"updated_at": "2020-03-16T15:03:48Z",
"pushed_at": "2019-05-09T07:07:25Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 11,
"forks": 11,
"watchers": 23,
"watchers": 26,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2020-03-14T08:23:19Z",
"updated_at": "2020-03-16T14:26:23Z",
"pushed_at": "2020-03-06T10:52:19Z",
"stargazers_count": 386,
"watchers_count": 386,
"stargazers_count": 387,
"watchers_count": 387,
"forks_count": 116,
"forks": 116,
"watchers": 386,
"watchers": 387,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-03-03T07:57:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}

View file

@ -82,13 +82,13 @@
"description": "php-fpm+Nginx RCE",
"fork": false,
"created_at": "2019-10-23T23:26:57Z",
"updated_at": "2020-03-04T00:16:33Z",
"updated_at": "2020-03-16T11:55:41Z",
"pushed_at": "2019-10-29T02:02:34Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 23,
"forks": 23,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2020-03-15T21:27:38Z",
"updated_at": "2020-03-16T09:45:02Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 17,
"forks": 17,
"watchers": 73,
"watchers": 74,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2020-03-13T16:14:08Z",
"updated_at": "2020-03-16T09:42:43Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 29,
"forks": 29,
"watchers": 44,
"watchers": 45,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-03-12T19:18:09Z",
"updated_at": "2020-03-16T13:01:04Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 787,
"watchers_count": 787,
"stargazers_count": 786,
"watchers_count": 786,
"forks_count": 196,
"forks": 196,
"watchers": 787,
"watchers": 786,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-03-12T18:54:01Z",
"updated_at": "2020-03-16T13:01:02Z",
"pushed_at": "2020-03-09T20:44:04Z",
"stargazers_count": 310,
"watchers_count": 310,
"stargazers_count": 309,
"watchers_count": 309,
"forks_count": 77,
"forks": 77,
"watchers": 310,
"watchers": 309,
"score": 0
},
{
@ -450,13 +450,13 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2020-02-01T23:50:25Z",
"updated_at": "2020-03-16T13:01:09Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 8,
"forks": 8,
"watchers": 61,
"watchers": 60,
"score": 0
},
{

View file

@ -59,13 +59,36 @@
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
"fork": false,
"created_at": "2020-03-11T06:51:58Z",
"updated_at": "2020-03-16T08:00:50Z",
"updated_at": "2020-03-16T14:50:41Z",
"pushed_at": "2020-03-13T00:50:55Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 135,
"watchers_count": 135,
"forks_count": 33,
"forks": 33,
"watchers": 131,
"watchers": 135,
"score": 0
},
{
"id": 246525183,
"name": "CVE-2020-0796",
"full_name": "T13nn3s\/CVE-2020-0796",
"owner": {
"login": "T13nn3s",
"id": 29333776,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4",
"html_url": "https:\/\/github.com\/T13nn3s"
},
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-0796",
"description": "Powershell SMBv3 Compression checker",
"fork": false,
"created_at": "2020-03-11T09:13:48Z",
"updated_at": "2020-03-16T10:45:43Z",
"pushed_at": "2020-03-13T14:22:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},
{
@ -82,13 +105,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-03-16T07:59:10Z",
"updated_at": "2020-03-16T15:00:51Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 357,
"watchers_count": 357,
"forks_count": 97,
"forks": 97,
"watchers": 355,
"watchers": 357,
"score": 0
},
{
@ -404,13 +427,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-03-16T07:26:02Z",
"updated_at": "2020-03-16T14:24:16Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 43,
"forks": 43,
"watchers": 113,
"watchers": 117,
"score": 0
},
{
@ -450,13 +473,13 @@
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
"fork": false,
"created_at": "2020-03-12T19:33:18Z",
"updated_at": "2020-03-16T08:49:13Z",
"updated_at": "2020-03-16T12:52:47Z",
"pushed_at": "2020-03-13T07:38:43Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 9,
"forks": 9,
"watchers": 18,
"watchers": 21,
"score": 0
},
{

View file

@ -1,27 +1,4 @@
[
{
"id": 246525183,
"name": "CVE-2020-0976",
"full_name": "T13nn3s\/CVE-2020-0976",
"owner": {
"login": "T13nn3s",
"id": 29333776,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4",
"html_url": "https:\/\/github.com\/T13nn3s"
},
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-0976",
"description": "Powershell SMBv3 Compression checker",
"fork": false,
"created_at": "2020-03-11T09:13:48Z",
"updated_at": "2020-03-15T06:44:18Z",
"pushed_at": "2020-03-13T14:22:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},
{
"id": 247235721,
"name": "GUI-Check-CVE-2020-0976",

View file

@ -312,13 +312,13 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2020-03-13T01:41:20Z",
"updated_at": "2020-03-16T09:51:41Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 18,
"forks": 18,
"watchers": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 19,
"forks": 19,
"watchers": 53,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-03-15T08:30:35Z",
"updated_at": "2020-03-16T11:29:59Z",
"pushed_at": "2020-03-10T15:46:18Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 21,
"forks": 21,
"watchers": 82,
"watchers": 83,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-03-15T03:24:46Z",
"updated_at": "2020-03-16T11:03:12Z",
"pushed_at": "2020-03-04T16:16:58Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 32,
"forks": 32,
"watchers": 130,
"watchers": 131,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-03-16T08:29:47Z",
"updated_at": "2020-03-16T13:58:06Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 21,
"forks": 21,
"watchers": 75,
"watchers": 77,
"score": 0
},
{

View file

@ -157,6 +157,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [Aekras1a/CVE-2020-0796-PoC](https://github.com/Aekras1a/CVE-2020-0796-PoC)
- [technion/DisableSMBCompression](https://github.com/technion/DisableSMBCompression)
- [cve-2020-0796/cve-2020-0796](https://github.com/cve-2020-0796/cve-2020-0796)
- [T13nn3s/CVE-2020-0796](https://github.com/T13nn3s/CVE-2020-0796)
- [ollypwn/SMBGhost](https://github.com/ollypwn/SMBGhost)
- [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker)
- [pr4jwal/CVE-2020-0796](https://github.com/pr4jwal/CVE-2020-0796)
@ -191,7 +192,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [ran-sama/CVE-2020-0796-PoC-and-Scan](https://github.com/ran-sama/CVE-2020-0796-PoC-and-Scan)
### CVE-2020-0976
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
- [ericzhong2010/GUI-Check-CVE-2020-0976](https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976)
### CVE-2020-10238