Auto Update 2020/05/14 12:07:47

This commit is contained in:
motikan2010-bot 2020-05-14 12:07:47 +09:00
parent fcc7802e23
commit add062cf6d
28 changed files with 183 additions and 107 deletions

View file

@ -128,13 +128,13 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2020-04-11T10:42:11Z",
"updated_at": "2020-05-14T01:08:52Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 267,
"watchers_count": 267,
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 75,
"forks": 75,
"watchers": 267,
"watchers": 268,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 342,
"watchers_count": 342,
"forks_count": 320,
"forks": 320,
"forks_count": 319,
"forks": 319,
"watchers": 342,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2018-12-27T06:30:32Z",
"updated_at": "2020-05-11T09:46:32Z",
"updated_at": "2020-05-14T02:22:54Z",
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 295,
"watchers_count": 295,
"stargazers_count": 297,
"watchers_count": 297,
"forks_count": 111,
"forks": 111,
"watchers": 295,
"watchers": 297,
"score": 0
},
{

View file

@ -178,8 +178,8 @@
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 32,
"forks": 32,
"forks_count": 33,
"forks": 33,
"watchers": 76,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2020-05-08T14:02:33Z",
"updated_at": "2020-05-13T22:30:50Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 45,
"forks": 45,
"watchers": 148,
"watchers": 149,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-09T16:01:14Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 16,
"forks": 16,
"forks_count": 17,
"forks": 17,
"watchers": 75,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-13T14:51:52Z",
"updated_at": "2020-05-14T02:50:07Z",
"pushed_at": "2020-05-11T04:14:46Z",
"stargazers_count": 694,
"watchers_count": 694,
"stargazers_count": 702,
"watchers_count": 702,
"forks_count": 150,
"forks": 150,
"watchers": 694,
"watchers": 702,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-05-01T20:00:12Z",
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 27,
"forks": 27,
"forks_count": 28,
"forks": 28,
"watchers": 130,
"score": 0
}

View file

@ -82,8 +82,8 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2020-05-13T15:19:39Z",
"pushed_at": "2020-05-13T17:33:19Z",
"updated_at": "2020-05-13T21:41:56Z",
"pushed_at": "2020-05-13T21:41:51Z",
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 25,

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-05-13T12:07:38Z",
"updated_at": "2020-05-14T02:16:34Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 543,
"watchers_count": 543,
"forks_count": 119,
"forks": 119,
"watchers": 543,
"stargazers_count": 544,
"watchers_count": 544,
"forks_count": 120,
"forks": 120,
"watchers": 544,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-05-12T11:14:18Z",
"updated_at": "2020-05-14T00:26:59Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 145,
"forks": 145,
"watchers": 330,
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 146,
"forks": 146,
"watchers": 331,
"score": 0
},
{
@ -224,8 +224,8 @@
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 53,
"forks": 53,
"forks_count": 54,
"forks": 54,
"watchers": 124,
"score": 0
},

View file

@ -320,5 +320,51 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263799335,
"name": "CVE-2019-3396",
"full_name": "123qwerqwer\/CVE-2019-3396",
"owner": {
"login": "123qwerqwer",
"id": 54263715,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/54263715?v=4",
"html_url": "https:\/\/github.com\/123qwerqwer"
},
"html_url": "https:\/\/github.com\/123qwerqwer\/CVE-2019-3396",
"description": "CVE-2019-3396批量检测脚本",
"fork": false,
"created_at": "2020-05-14T02:53:05Z",
"updated_at": "2020-05-14T02:53:05Z",
"pushed_at": "2020-05-14T02:53:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263799687,
"name": "CVE-2019-3396",
"full_name": "Flash1201\/CVE-2019-3396",
"owner": {
"login": "Flash1201",
"id": 41565767,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/41565767?v=4",
"html_url": "https:\/\/github.com\/Flash1201"
},
"html_url": "https:\/\/github.com\/Flash1201\/CVE-2019-3396",
"description": "CVE-2019-3396批量检测脚本",
"fork": false,
"created_at": "2020-05-14T02:55:02Z",
"updated_at": "2020-05-14T02:55:02Z",
"pushed_at": "2020-05-14T02:55:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2020-05-01T11:36:42Z",
"updated_at": "2020-05-14T02:01:28Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 21,
"forks": 21,
"watchers": 94,
"watchers": 95,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-05-05T18:00:51Z",
"updated_at": "2020-05-14T00:26:51Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 39,
"forks": 39,
"watchers": 165,
"watchers": 166,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-05-06T20:29:22Z",
"updated_at": "2020-05-13T21:12:19Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 434,
"watchers_count": 434,
"forks_count": 128,
"forks": 128,
"watchers": 433,
"watchers": 434,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-1015",
"fork": false,
"created_at": "2020-05-13T16:42:17Z",
"updated_at": "2020-05-13T20:29:02Z",
"updated_at": "2020-05-14T02:14:41Z",
"pushed_at": "2020-05-13T17:37:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-13T14:51:52Z",
"updated_at": "2020-05-14T02:50:07Z",
"pushed_at": "2020-05-11T04:14:46Z",
"stargazers_count": 694,
"watchers_count": 694,
"stargazers_count": 702,
"watchers_count": 702,
"forks_count": 150,
"forks": 150,
"watchers": 694,
"watchers": 702,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
"fork": false,
"created_at": "2020-04-04T00:50:42Z",
"updated_at": "2020-05-12T04:03:22Z",
"updated_at": "2020-05-14T01:54:12Z",
"pushed_at": "2020-05-10T22:35:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.",
"fork": false,
"created_at": "2020-05-08T15:56:26Z",
"updated_at": "2020-05-13T14:55:01Z",
"updated_at": "2020-05-14T03:07:13Z",
"pushed_at": "2020-05-08T17:10:48Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 7,
"forks": 7,
"watchers": 18,
"watchers": 19,
"score": 0
}
]

View file

@ -2,14 +2,14 @@
{
"id": 262085427,
"name": "CVE-2020-12696",
"full_name": "Guilherme-Rubert\/CVE-2020-12696",
"full_name": "g-rubert\/CVE-2020-12696",
"owner": {
"login": "Guilherme-Rubert",
"login": "g-rubert",
"id": 40837605,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40837605?v=4",
"html_url": "https:\/\/github.com\/Guilherme-Rubert"
"html_url": "https:\/\/github.com\/g-rubert"
},
"html_url": "https:\/\/github.com\/Guilherme-Rubert\/CVE-2020-12696",
"html_url": "https:\/\/github.com\/g-rubert\/CVE-2020-12696",
"description": "Stored Cross Site Scripting - Iframe Plugin - WordPress - By Guilherme Rubert",
"fork": false,
"created_at": "2020-05-07T15:16:39Z",

25
2020/CVE-2020-12717.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 263045751,
"name": "covidsafe-CVE-2020-12717-exploit",
"full_name": "wabzqem\/covidsafe-CVE-2020-12717-exploit",
"owner": {
"login": "wabzqem",
"id": 1582274,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1582274?v=4",
"html_url": "https:\/\/github.com\/wabzqem"
},
"html_url": "https:\/\/github.com\/wabzqem\/covidsafe-CVE-2020-12717-exploit",
"description": "Code for exploit for CVE-2020-12717",
"fork": false,
"created_at": "2020-05-11T13:09:52Z",
"updated_at": "2020-05-14T01:38:10Z",
"pushed_at": "2020-05-14T02:36:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-05-08T17:33:26Z",
"updated_at": "2020-05-14T01:30:20Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 90,
"forks": 90,
"watchers": 160,
"watchers": 161,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-05-12T04:56:54Z",
"updated_at": "2020-05-14T02:13:29Z",
"pushed_at": "2020-05-11T02:14:55Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 25,
"forks": 25,
"watchers": 101,
"watchers": 102,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-05-11T11:18:58Z",
"updated_at": "2020-05-14T02:14:59Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 36,
"forks": 36,
"watchers": 107,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 37,
"forks": 37,
"watchers": 108,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2020-2555",
"fork": false,
"created_at": "2020-03-10T08:06:08Z",
"updated_at": "2020-04-30T03:16:17Z",
"updated_at": "2020-05-14T02:14:56Z",
"pushed_at": "2020-03-10T08:15:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2020-05-13T16:34:57Z",
"updated_at": "2020-05-14T02:48:42Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 12,
"forks": 12,
"watchers": 64,
"watchers": 67,
"score": 0
},
{

View file

@ -2,14 +2,14 @@
{
"id": 245220968,
"name": "CVE-2020-9460",
"full_name": "Guilherme-Rubert\/CVE-2020-9460",
"full_name": "g-rubert\/CVE-2020-9460",
"owner": {
"login": "Guilherme-Rubert",
"login": "g-rubert",
"id": 40837605,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40837605?v=4",
"html_url": "https:\/\/github.com\/Guilherme-Rubert"
"html_url": "https:\/\/github.com\/g-rubert"
},
"html_url": "https:\/\/github.com\/Guilherme-Rubert\/CVE-2020-9460",
"html_url": "https:\/\/github.com\/g-rubert\/CVE-2020-9460",
"description": "Stored Cross Site Scripting - Oempro - by Guilherme Rubert",
"fork": false,
"created_at": "2020-03-05T17:03:03Z",

View file

@ -2,14 +2,14 @@
{
"id": 245221085,
"name": "CVE-2020-9461",
"full_name": "Guilherme-Rubert\/CVE-2020-9461",
"full_name": "g-rubert\/CVE-2020-9461",
"owner": {
"login": "Guilherme-Rubert",
"login": "g-rubert",
"id": 40837605,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40837605?v=4",
"html_url": "https:\/\/github.com\/Guilherme-Rubert"
"html_url": "https:\/\/github.com\/g-rubert"
},
"html_url": "https:\/\/github.com\/Guilherme-Rubert\/CVE-2020-9461",
"html_url": "https:\/\/github.com\/g-rubert\/CVE-2020-9461",
"description": null,
"fork": false,
"created_at": "2020-03-05T17:03:25Z",

View file

@ -512,7 +512,10 @@ include/class.sla.php in osTicket before 1.14.2 allows XSS via the SLA Name.
The iframe plugin before 4.5 for WordPress does not sanitize a URL.
</code>
- [Guilherme-Rubert/CVE-2020-12696](https://github.com/Guilherme-Rubert/CVE-2020-12696)
- [g-rubert/CVE-2020-12696](https://github.com/g-rubert/CVE-2020-12696)
### CVE-2020-12717
- [wabzqem/covidsafe-CVE-2020-12717-exploit](https://github.com/wabzqem/covidsafe-CVE-2020-12717-exploit)
### CVE-2020-1611
@ -990,7 +993,7 @@ OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\
Octech Oempro 4.7 through 4.11 allow XSS by an authenticated user. The parameter CampaignName in Campaign.Create is vulnerable.
</code>
- [Guilherme-Rubert/CVE-2020-9460](https://github.com/Guilherme-Rubert/CVE-2020-9460)
- [g-rubert/CVE-2020-9460](https://github.com/g-rubert/CVE-2020-9460)
### CVE-2020-9461
@ -998,7 +1001,7 @@ Octech Oempro 4.7 through 4.11 allow XSS by an authenticated user. The parameter
Octech Oempro 4.7 through 4.11 allow stored XSS by an authenticated user. The FolderName parameter of the Media.CreateFolder command is vulnerable.
</code>
- [Guilherme-Rubert/CVE-2020-9461](https://github.com/Guilherme-Rubert/CVE-2020-9461)
- [g-rubert/CVE-2020-9461](https://github.com/g-rubert/CVE-2020-9461)
### CVE-2020-9547
@ -3481,6 +3484,8 @@ The Widget Connector macro in Atlassian Confluence Server before version 6.6.12
- [JonathanZhou348/CVE-2019-3396TEST](https://github.com/JonathanZhou348/CVE-2019-3396TEST)
- [am6539/CVE-2019-3396](https://github.com/am6539/CVE-2019-3396)
- [W2Ning/CVE-2019-3396](https://github.com/W2Ning/CVE-2019-3396)
- [123qwerqwer/CVE-2019-3396](https://github.com/123qwerqwer/CVE-2019-3396)
- [Flash1201/CVE-2019-3396](https://github.com/Flash1201/CVE-2019-3396)
### CVE-2019-3398