Auto Update 2020/10/04 00:08:59

This commit is contained in:
motikan2010-bot 2020-10-04 00:08:59 +09:00
parent e4aa304b2a
commit 98c06dc8e7
24 changed files with 155 additions and 83 deletions

View file

@ -13,13 +13,13 @@
"description": ":hocho: CRIME attack PoC : a compression oracle attacks CVE-2012-4929 :hocho:",
"fork": false,
"created_at": "2018-04-21T09:28:31Z",
"updated_at": "2020-06-30T15:54:55Z",
"updated_at": "2020-10-03T12:12:01Z",
"pushed_at": "2019-03-23T10:53:09Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 8,
"forks": 8,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "NTP monlist scanner CVE-2013-5211",
"fork": false,
"created_at": "2014-12-14T18:58:26Z",
"updated_at": "2018-06-07T13:35:38Z",
"updated_at": "2020-10-03T10:23:06Z",
"pushed_at": "2014-12-14T19:04:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -36,7 +36,7 @@
"description": "Python script for automatically protecting your systems against POODLE vulnerability (CVE-2014-3566)",
"fork": false,
"created_at": "2014-10-16T07:49:23Z",
"updated_at": "2018-07-15T08:46:05Z",
"updated_at": "2020-10-03T13:37:36Z",
"pushed_at": "2014-10-20T14:28:52Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-30T06:35:40Z",
"updated_at": "2020-10-03T14:26:02Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 710,
"watchers_count": 710,
"forks_count": 174,
"forks": 174,
"watchers": 709,
"watchers": 710,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
"fork": false,
"created_at": "2016-05-02T12:18:57Z",
"updated_at": "2020-09-27T05:43:57Z",
"updated_at": "2020-10-03T12:27:25Z",
"pushed_at": "2019-08-13T07:14:01Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 49,
"forks": 49,
"watchers": 95,
"watchers": 94,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-30T06:35:40Z",
"updated_at": "2020-10-03T14:26:02Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 710,
"watchers_count": 710,
"forks_count": 174,
"forks": 174,
"watchers": 709,
"watchers": 710,
"score": 0
},
{

View file

@ -381,7 +381,7 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-10-03T06:36:51Z",
"updated_at": "2020-10-03T11:57:35Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 226,
"watchers_count": 226,

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-30T06:35:40Z",
"updated_at": "2020-10-03T14:26:02Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 710,
"watchers_count": 710,
"forks_count": 174,
"forks": 174,
"watchers": 709,
"watchers": 710,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE 2017-9805",
"fork": false,
"created_at": "2017-09-06T08:32:01Z",
"updated_at": "2020-09-23T06:38:31Z",
"updated_at": "2020-10-03T12:54:16Z",
"pushed_at": "2020-08-31T04:34:29Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 28,
"forks": 28,
"watchers": 51,
"watchers": 52,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Tool to try multiple paths for PHPunit RCE CVE-2017-9841",
"fork": false,
"created_at": "2020-05-18T20:55:05Z",
"updated_at": "2020-08-18T23:02:26Z",
"updated_at": "2020-10-03T10:08:47Z",
"pushed_at": "2020-07-27T12:40:39Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"watchers": 15,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-30T06:35:40Z",
"updated_at": "2020-10-03T14:26:02Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 710,
"watchers_count": 710,
"forks_count": 174,
"forks": 174,
"watchers": 709,
"watchers": 710,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 56,
"forks": 56,
"forks_count": 55,
"forks": 55,
"watchers": 199,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2020-09-21T09:37:10Z",
"updated_at": "2020-10-03T09:27:16Z",
"pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 50,
"forks": 50,
"watchers": 124,
"watchers": 125,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-03T04:00:24Z",
"updated_at": "2020-10-03T12:35:59Z",
"pushed_at": "2020-10-03T04:00:20Z",
"stargazers_count": 1904,
"watchers_count": 1904,
"forks_count": 494,
"forks": 494,
"watchers": 1904,
"stargazers_count": 1905,
"watchers_count": 1905,
"forks_count": 495,
"forks": 495,
"watchers": 1905,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-30T06:35:40Z",
"updated_at": "2020-10-03T14:26:02Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 710,
"watchers_count": 710,
"forks_count": 174,
"forks": 174,
"watchers": 709,
"watchers": 710,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-10-03T06:36:51Z",
"updated_at": "2020-10-03T11:57:35Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 226,
"watchers_count": 226,

View file

@ -1301,13 +1301,13 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2020-10-02T08:10:20Z",
"updated_at": "2020-10-03T11:19:27Z",
"pushed_at": "2020-07-08T08:26:24Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 28,
"forks": 28,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 300843760,
"name": "CVE-2020-14064",
"full_name": "masoud-zivari\/CVE-2020-14064",
"owner": {
"login": "masoud-zivari",
"id": 72297087,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4",
"html_url": "https:\/\/github.com\/masoud-zivari"
},
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14064",
"description": null,
"fork": false,
"created_at": "2020-10-03T09:30:34Z",
"updated_at": "2020-10-03T09:30:47Z",
"pushed_at": "2020-10-03T09:30:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 300840687,
"name": "CVE-2020-14065",
"full_name": "masoud-zivari\/CVE-2020-14065",
"owner": {
"login": "masoud-zivari",
"id": 72297087,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4",
"html_url": "https:\/\/github.com\/masoud-zivari"
},
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14065",
"description": null,
"fork": false,
"created_at": "2020-10-03T09:13:19Z",
"updated_at": "2020-10-03T09:13:34Z",
"pushed_at": "2020-10-03T09:13:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,36 @@
"description": null,
"fork": false,
"created_at": "2020-06-13T08:57:45Z",
"updated_at": "2020-07-27T08:27:33Z",
"pushed_at": "2020-07-27T08:27:31Z",
"updated_at": "2020-10-03T09:19:26Z",
"pushed_at": "2020-10-03T09:19:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 300841463,
"name": "CVE-2020-14066",
"full_name": "masoud-zivari\/CVE-2020-14066",
"owner": {
"login": "masoud-zivari",
"id": 72297087,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4",
"html_url": "https:\/\/github.com\/masoud-zivari"
},
"html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14066",
"description": null,
"fork": false,
"created_at": "2020-10-03T09:17:35Z",
"updated_at": "2020-10-03T09:17:50Z",
"pushed_at": "2020-10-03T09:17:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-10-03T04:46:27Z",
"updated_at": "2020-10-03T12:36:43Z",
"pushed_at": "2020-09-23T07:04:58Z",
"stargazers_count": 1096,
"watchers_count": 1096,
"stargazers_count": 1097,
"watchers_count": 1097,
"forks_count": 231,
"forks": 231,
"watchers": 1096,
"watchers": 1097,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-10-03T00:06:48Z",
"updated_at": "2020-10-03T09:33:19Z",
"pushed_at": "2020-09-17T18:06:57Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 53,
"forks": 53,
"watchers": 156,
"watchers": 157,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false,
"created_at": "2020-09-14T19:27:14Z",
"updated_at": "2020-10-02T19:12:46Z",
"updated_at": "2020-10-03T10:01:07Z",
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 26,
"forks": 26,
"watchers": 107,
"watchers": 108,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-30T06:35:40Z",
"updated_at": "2020-10-03T14:26:02Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 710,
"watchers_count": 710,
"forks_count": 174,
"forks": 174,
"watchers": 709,
"watchers": 710,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-03T04:00:24Z",
"updated_at": "2020-10-03T12:35:59Z",
"pushed_at": "2020-10-03T04:00:20Z",
"stargazers_count": 1904,
"watchers_count": 1904,
"forks_count": 494,
"forks": 494,
"watchers": 1904,
"stargazers_count": 1905,
"watchers_count": 1905,
"forks_count": 495,
"forks": 495,
"watchers": 1905,
"score": 0
},
{

View file

@ -2008,6 +2008,7 @@ IceWarp Email Server 12.3.0.1 has Incorrect Access Control for user accounts.
</code>
- [networksecure/CVE-2020-14064](https://github.com/networksecure/CVE-2020-14064)
- [masoud-zivari/CVE-2020-14064](https://github.com/masoud-zivari/CVE-2020-14064)
### CVE-2020-14065
@ -2016,6 +2017,7 @@ IceWarp Email Server 12.3.0.1 allows remote attackers to upload files and consum
</code>
- [networksecure/CVE-2020-14065](https://github.com/networksecure/CVE-2020-14065)
- [masoud-zivari/CVE-2020-14065](https://github.com/masoud-zivari/CVE-2020-14065)
### CVE-2020-14066
@ -2024,6 +2026,7 @@ IceWarp Email Server 12.3.0.1 allows remote attackers to upload JavaScript files
</code>
- [networksecure/CVE-2020-14066](https://github.com/networksecure/CVE-2020-14066)
- [masoud-zivari/CVE-2020-14066](https://github.com/masoud-zivari/CVE-2020-14066)
### CVE-2020-14195