Auto Update 2020/07/18 12:08:36

This commit is contained in:
motikan2010-bot 2020-07-18 12:08:36 +09:00
parent 359e6f8da5
commit a8ea188655
22 changed files with 161 additions and 113 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-17T09:07:28Z",
"updated_at": "2020-07-18T02:31:28Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 123,
"forks": 123,
"watchers": 507,
"watchers": 508,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-17T09:07:28Z",
"updated_at": "2020-07-18T02:31:28Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 123,
"forks": 123,
"watchers": 507,
"watchers": 508,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 36,
"forks": 36,
"forks_count": 35,
"forks": 35,
"watchers": 75,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-17T09:07:28Z",
"updated_at": "2020-07-18T02:31:28Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 123,
"forks": 123,
"watchers": 507,
"watchers": 508,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM",
"fork": false,
"created_at": "2018-03-14T09:20:21Z",
"updated_at": "2020-05-15T10:26:19Z",
"updated_at": "2020-07-17T21:36:44Z",
"pushed_at": "2018-03-14T12:13:43Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 15,
"forks": 15,
"watchers": 46,
"watchers": 47,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-17T09:07:28Z",
"updated_at": "2020-07-18T02:31:28Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 123,
"forks": 123,
"watchers": 507,
"watchers": 508,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 31,
"forks": 31,
"forks_count": 30,
"forks": 30,
"watchers": 152,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 56,
"forks": 56,
"forks_count": 55,
"forks": 55,
"watchers": 197,
"score": 0
}

View file

@ -615,8 +615,8 @@
"pushed_at": "2019-05-16T00:52:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
@ -638,8 +638,8 @@
"pushed_at": "2019-05-16T01:00:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
@ -1600,13 +1600,13 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2020-06-30T04:34:11Z",
"updated_at": "2020-07-17T21:12:13Z",
"pushed_at": "2020-05-09T09:49:14Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 116,
"forks": 116,
"watchers": 330,
"watchers": 331,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-07-17T19:37:12Z",
"updated_at": "2020-07-17T22:57:34Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1594,
"watchers_count": 1594,
"stargazers_count": 1595,
"watchers_count": 1595,
"forks_count": 229,
"forks": 229,
"watchers": 1594,
"watchers": 1595,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-17T09:06:12Z",
"updated_at": "2020-07-18T03:06:03Z",
"pushed_at": "2020-07-14T10:20:14Z",
"stargazers_count": 1291,
"watchers_count": 1291,
"stargazers_count": 1294,
"watchers_count": 1294,
"forks_count": 325,
"forks": 325,
"watchers": 1291,
"watchers": 1294,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-17T09:07:28Z",
"updated_at": "2020-07-18T02:31:28Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 123,
"forks": 123,
"watchers": 507,
"watchers": 508,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2020-07-15T19:27:41Z",
"updated_at": "2020-07-18T01:40:41Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 35,
"forks": 35,
"watchers": 118,
"watchers": 119,
"score": 0
}
]

View file

@ -114,29 +114,6 @@
"watchers": 10,
"score": 0
},
{
"id": 246641886,
"name": "NSE-scripts",
"full_name": "pr4jwal\/NSE-scripts",
"owner": {
"login": "pr4jwal",
"id": 4672886,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4672886?v=4",
"html_url": "https:\/\/github.com\/pr4jwal"
},
"html_url": "https:\/\/github.com\/pr4jwal\/NSE-scripts",
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-07-17T20:58:18Z",
"pushed_at": "2020-07-17T20:58:16Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 7,
"forks": 7,
"watchers": 21,
"score": 0
},
{
"id": 246652992,
"name": "cve-2020-0796",

View file

@ -1,4 +1,27 @@
[
{
"id": 246641886,
"name": "NSE-scripts",
"full_name": "pr4jwal\/NSE-scripts",
"owner": {
"login": "pr4jwal",
"id": 4672886,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4672886?v=4",
"html_url": "https:\/\/github.com\/pr4jwal"
},
"html_url": "https:\/\/github.com\/pr4jwal\/NSE-scripts",
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2020-07-17T21:12:11Z",
"pushed_at": "2020-07-17T20:58:16Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 7,
"forks": 7,
"watchers": 21,
"score": 0
},
{
"id": 279670211,
"name": "CVE-2020-1350",
@ -13,13 +36,13 @@
"description": "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
"fork": false,
"created_at": "2020-07-14T19:02:25Z",
"updated_at": "2020-07-17T20:56:51Z",
"pushed_at": "2020-07-16T23:42:18Z",
"stargazers_count": 181,
"watchers_count": 181,
"updated_at": "2020-07-18T02:36:43Z",
"pushed_at": "2020-07-17T23:43:01Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 56,
"forks": 56,
"watchers": 181,
"watchers": 182,
"score": 0
},
{
@ -45,6 +68,29 @@
"watchers": 5,
"score": 0
},
{
"id": 279701266,
"name": "Fake_CVE-2020-1350",
"full_name": "zoomerxsec\/Fake_CVE-2020-1350",
"owner": {
"login": "zoomerxsec",
"id": 56858864,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/56858864?v=4",
"html_url": "https:\/\/github.com\/zoomerxsec"
},
"html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350",
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
"fork": false,
"created_at": "2020-07-14T21:55:57Z",
"updated_at": "2020-07-17T21:57:11Z",
"pushed_at": "2020-07-17T21:57:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 279708493,
"name": "cve-2020-1350",
@ -151,13 +197,13 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2020-07-17T20:58:01Z",
"updated_at": "2020-07-17T23:51:09Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"forks_count": 28,
"forks": 28,
"watchers": 140,
"watchers": 141,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "writeup of CVE-2020-1362",
"fork": false,
"created_at": "2020-07-17T07:35:05Z",
"updated_at": "2020-07-17T18:25:33Z",
"updated_at": "2020-07-18T02:07:42Z",
"pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 8,
"forks": 8,
"watchers": 38,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 11,
"forks": 11,
"watchers": 46,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-07-14T09:25:31Z",
"updated_at": "2020-07-18T00:25:59Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 91,
"forks": 91,
"watchers": 179,
"watchers": 180,
"score": 0
},
{
@ -481,5 +481,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 280544880,
"name": "ghostcatch",
"full_name": "MateoSec\/ghostcatch",
"owner": {
"login": "MateoSec",
"id": 68019458,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/68019458?v=4",
"html_url": "https:\/\/github.com\/MateoSec"
},
"html_url": "https:\/\/github.com\/MateoSec\/ghostcatch",
"description": "Disables AJP connectors to remediate CVE-2020-1938!",
"fork": false,
"created_at": "2020-07-17T23:34:47Z",
"updated_at": "2020-07-18T00:06:32Z",
"pushed_at": "2020-07-18T00:06:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-07-17T09:07:28Z",
"updated_at": "2020-07-18T02:31:28Z",
"pushed_at": "2020-07-05T12:59:42Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 123,
"forks": 123,
"watchers": 507,
"watchers": 508,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-17T09:06:12Z",
"updated_at": "2020-07-18T03:06:03Z",
"pushed_at": "2020-07-14T10:20:14Z",
"stargazers_count": 1291,
"watchers_count": 1291,
"stargazers_count": 1294,
"watchers_count": 1294,
"forks_count": 325,
"forks": 325,
"watchers": 1291,
"watchers": 1294,
"score": 0
},
{
@ -1071,13 +1071,13 @@
"description": "GUI",
"fork": false,
"created_at": "2020-07-17T03:13:30Z",
"updated_at": "2020-07-17T13:16:04Z",
"updated_at": "2020-07-18T02:05:18Z",
"pushed_at": "2020-07-17T08:09:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2020-07-17T20:28:44Z",
"updated_at": "2020-07-18T03:07:00Z",
"pushed_at": "2020-07-17T14:18:44Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 21,
"forks": 21,
"watchers": 74,
"watchers": 78,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2020-07-17T11:31:04Z",
"updated_at": "2020-07-18T01:52:02Z",
"pushed_at": "2020-05-21T10:15:35Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 19,
"forks": 19,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -232,7 +232,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [T13nn3s/CVE-2020-0796](https://github.com/T13nn3s/CVE-2020-0796)
- [ollypwn/SMBGhost](https://github.com/ollypwn/SMBGhost)
- [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker)
- [pr4jwal/NSE-scripts](https://github.com/pr4jwal/NSE-scripts)
- [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796)
- [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner)
- [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796)
@ -391,8 +390,10 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
</code>
- [pr4jwal/NSE-scripts](https://github.com/pr4jwal/NSE-scripts)
- [ZephrFish/CVE-2020-1350](https://github.com/ZephrFish/CVE-2020-1350)
- [mr-r3b00t/CVE-2020-1350](https://github.com/mr-r3b00t/CVE-2020-1350)
- [zoomerxsec/Fake_CVE-2020-1350](https://github.com/zoomerxsec/Fake_CVE-2020-1350)
- [tinkersec/cve-2020-1350](https://github.com/tinkersec/cve-2020-1350)
- [T13nn3s/CVE-2020-1350](https://github.com/T13nn3s/CVE-2020-1350)
- [corelight/SIGRed](https://github.com/corelight/SIGRed)
@ -451,6 +452,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [ZhengHaoCHeng/CNVD-2020-10487](https://github.com/ZhengHaoCHeng/CNVD-2020-10487)
- [I-Runtime-Error/CVE-2020-1938](https://github.com/I-Runtime-Error/CVE-2020-1938)
- [Umesh2807/Ghostcat](https://github.com/Umesh2807/Ghostcat)
- [MateoSec/ghostcatch](https://github.com/MateoSec/ghostcatch)
### CVE-2020-1947