Auto Update 2020/06/05 00:08:17

This commit is contained in:
motikan2010-bot 2020-06-05 00:08:17 +09:00
parent 66ef0696b3
commit 9ac696bf22
26 changed files with 141 additions and 117 deletions

View file

@ -13,13 +13,13 @@
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
"fork": false,
"created_at": "2016-05-06T17:21:32Z",
"updated_at": "2020-04-28T00:05:42Z",
"updated_at": "2020-06-04T09:57:06Z",
"pushed_at": "2016-07-02T18:52:16Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2020-06-03T21:18:54Z",
"updated_at": "2020-06-04T11:21:53Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2242,
"watchers_count": 2242,
"stargazers_count": 2243,
"watchers_count": 2243,
"forks_count": 483,
"forks": 483,
"watchers": 2242,
"watchers": 2243,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE 2017-9805",
"fork": false,
"created_at": "2017-09-06T08:32:01Z",
"updated_at": "2020-06-03T08:45:31Z",
"updated_at": "2020-06-04T11:42:41Z",
"pushed_at": "2017-09-08T06:27:31Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 27,
"forks": 27,
"watchers": 49,
"watchers": 50,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2020-06-03T09:50:03Z",
"updated_at": "2020-06-04T11:42:37Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"forks_count": 77,
"forks": 77,
"watchers": 235,
"watchers": 236,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
"fork": false,
"created_at": "2018-08-17T23:48:15Z",
"updated_at": "2020-06-01T07:58:31Z",
"updated_at": "2020-06-04T12:11:18Z",
"pushed_at": "2019-11-15T08:12:32Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 26,
"forks": 26,
"watchers": 110,
"watchers": 109,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-05-28T07:26:57Z",
"updated_at": "2020-06-04T11:22:23Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 50,
"forks": 50,
"watchers": 256,
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 51,
"forks": 51,
"watchers": 258,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
"fork": false,
"created_at": "2019-02-07T06:45:27Z",
"updated_at": "2020-05-26T08:04:49Z",
"updated_at": "2020-06-04T14:53:02Z",
"pushed_at": "2019-11-26T05:38:16Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 9,
"forks": 9,
"watchers": 58,
"watchers": 59,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 434,
"watchers_count": 434,
"forks_count": 199,
"forks": 199,
"forks_count": 198,
"forks": 198,
"watchers": 434,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 78,
"forks": 78,
"forks_count": 77,
"forks": 77,
"watchers": 163,
"score": 0
},
@ -40,8 +40,8 @@
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 55,
"forks": 55,
"forks_count": 54,
"forks": 54,
"watchers": 126,
"score": 0
},

View file

@ -59,7 +59,7 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2020-06-01T02:54:08Z",
"updated_at": "2020-06-04T09:33:46Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 364,
"watchers_count": 364,

View file

@ -13,13 +13,13 @@
"description": "A Python PoC for CVE-2018-9206",
"fork": false,
"created_at": "2018-10-22T16:33:22Z",
"updated_at": "2020-03-29T05:48:41Z",
"updated_at": "2020-06-04T11:39:14Z",
"pushed_at": "2018-10-22T16:49:08Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 11,
"forks": 11,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "A weaponized version of CVE-2018-9206",
"fork": false,
"created_at": "2018-10-24T20:24:20Z",
"updated_at": "2020-05-08T12:00:40Z",
"updated_at": "2020-06-04T11:33:32Z",
"pushed_at": "2018-10-30T01:48:42Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 18,
"forks": 18,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-27T07:39:40Z",
"stargazers_count": 171,
"watchers_count": 171,
"forks_count": 46,
"forks": 46,
"forks_count": 47,
"forks": 47,
"watchers": 171,
"score": 0
},

View file

@ -2520,13 +2520,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-06-04T08:40:00Z",
"updated_at": "2020-06-04T09:08:40Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 11,
"forks": 11,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-03-23T11:22:54Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 41,
"forks": 41,
"forks_count": 42,
"forks": 42,
"watchers": 216,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-12-26T08:44:54Z",
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 21,
"forks": 21,
"forks_count": 22,
"forks": 22,
"watchers": 105,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-04T08:08:40Z",
"updated_at": "2020-06-04T13:41:09Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 859,
"watchers_count": 859,
"forks_count": 202,
"forks": 202,
"watchers": 859,
"stargazers_count": 862,
"watchers_count": 862,
"forks_count": 203,
"forks": 203,
"watchers": 862,
"score": 0
}
]

View file

@ -36,8 +36,8 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2020-06-03T15:39:43Z",
"pushed_at": "2020-06-03T08:39:20Z",
"updated_at": "2020-06-04T13:17:12Z",
"pushed_at": "2020-06-04T13:17:10Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 11,

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-06-04T08:09:00Z",
"updated_at": "2020-06-04T10:10:43Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 466,
"watchers_count": 466,
"stargazers_count": 467,
"watchers_count": 467,
"forks_count": 143,
"forks": 143,
"watchers": 466,
"watchers": 467,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-05-01T23:50:50Z",
"updated_at": "2020-06-04T09:45:11Z",
"pushed_at": "2020-03-16T17:25:51Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,
"forks": 7,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -404,13 +404,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-06-04T08:11:28Z",
"updated_at": "2020-06-04T10:26:20Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 85,
"forks": 85,
"watchers": 227,
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 86,
"forks": 86,
"watchers": 228,
"score": 0
},
{
@ -933,13 +933,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-06-04T06:11:38Z",
"updated_at": "2020-06-04T13:18:23Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 926,
"watchers_count": 926,
"forks_count": 289,
"forks": 289,
"watchers": 926,
"stargazers_count": 930,
"watchers_count": 930,
"forks_count": 290,
"forks": 290,
"watchers": 930,
"score": 0
},
{
@ -956,13 +956,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-06-04T00:18:39Z",
"updated_at": "2020-06-04T10:11:06Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 60,
"forks": 60,
"watchers": 168,
"watchers": 169,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2020-03-14T07:59:28Z",
"updated_at": "2020-03-14T08:19:24Z",
"pushed_at": "2020-03-14T08:19:22Z",
"updated_at": "2020-06-04T12:22:26Z",
"pushed_at": "2020-06-04T12:22:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
"fork": false,
"created_at": "2020-06-01T04:44:05Z",
"updated_at": "2020-06-04T08:14:00Z",
"updated_at": "2020-06-04T10:17:11Z",
"pushed_at": "2020-06-01T09:04:18Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 26,
"forks": 26,
"watchers": 104,
"watchers": 106,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-04T08:08:40Z",
"updated_at": "2020-06-04T13:41:09Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 859,
"watchers_count": 859,
"forks_count": 202,
"forks": 202,
"watchers": 859,
"stargazers_count": 862,
"watchers_count": 862,
"forks_count": 203,
"forks": 203,
"watchers": 862,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-06-02T14:30:29Z",
"updated_at": "2020-06-04T10:02:43Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 90,
"forks": 90,
"watchers": 167,
"watchers": 168,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-03-22T14:38:19Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 12,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
"fork": false,
"created_at": "2020-06-01T18:26:32Z",
"updated_at": "2020-06-04T08:16:24Z",
"updated_at": "2020-06-04T09:57:16Z",
"pushed_at": "2020-06-02T08:30:22Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 21,
"forks": 21,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-20T13:50:49Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2020-06-04T08:29:24Z",
"updated_at": "2020-06-04T14:59:11Z",
"pushed_at": "2020-05-21T10:15:35Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 3,
"forks": 3,
"watchers": 21,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 5,
"forks": 5,
"watchers": 23,
"score": 0
},
{
@ -90,5 +90,28 @@
"forks": 17,
"watchers": 35,
"score": 0
},
{
"id": 269379345,
"name": "CVE-2020-9484",
"full_name": "qerogram\/CVE-2020-9484",
"owner": {
"login": "qerogram",
"id": 29586629,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29586629?v=4",
"html_url": "https:\/\/github.com\/qerogram"
},
"html_url": "https:\/\/github.com\/qerogram\/CVE-2020-9484",
"description": "for Ubuntu 18.04",
"fork": false,
"created_at": "2020-06-04T14:19:12Z",
"updated_at": "2020-06-04T14:19:16Z",
"pushed_at": "2020-06-04T14:19:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1167,6 +1167,7 @@ When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.
- [masahiro331/CVE-2020-9484](https://github.com/masahiro331/CVE-2020-9484)
- [FiveAourThe/CVE-2020-9484](https://github.com/FiveAourThe/CVE-2020-9484)
- [IdealDreamLast/CVE-2020-9484](https://github.com/IdealDreamLast/CVE-2020-9484)
- [qerogram/CVE-2020-9484](https://github.com/qerogram/CVE-2020-9484)
### CVE-2020-9547