Auto Update 2020/06/18 18:09:27

This commit is contained in:
motikan2010-bot 2020-06-18 18:09:27 +09:00
parent ae86d80594
commit aeb36ddda8
29 changed files with 173 additions and 125 deletions

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2017-05-25T14:20:34Z",
"updated_at": "2020-01-15T07:29:47Z",
"updated_at": "2020-06-18T09:00:49Z",
"pushed_at": "2017-05-25T14:27:39Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 19,
"forks": 19,
"watchers": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 20,
"forks": 20,
"watchers": 23,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 346,
"watchers_count": 346,
"forks_count": 131,
"forks": 131,
"forks_count": 132,
"forks": 132,
"watchers": 346,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 35,
"forks": 35,
"forks_count": 34,
"forks": 34,
"watchers": 73,
"score": 0
},

View file

@ -128,8 +128,8 @@
"description": "Exploit for NGiX 1.6.2 Remote Integer Overflow Vulnerability CVE-2017-7529",
"fork": false,
"created_at": "2020-06-13T12:11:19Z",
"updated_at": "2020-06-13T12:11:20Z",
"pushed_at": "2020-06-13T12:11:20Z",
"updated_at": "2020-06-18T06:46:05Z",
"pushed_at": "2020-06-18T06:46:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Tool to try multiple paths for PHPunit RCE CVE-2017-9841",
"fork": false,
"created_at": "2020-05-18T20:55:05Z",
"updated_at": "2020-06-16T12:10:01Z",
"updated_at": "2020-06-18T06:52:57Z",
"pushed_at": "2020-05-19T09:24:38Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 352,
"watchers_count": 352,
"forks_count": 321,
"forks": 321,
"forks_count": 322,
"forks": 322,
"watchers": 352,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2018-07-26T19:31:45Z",
"updated_at": "2020-04-01T21:51:18Z",
"updated_at": "2020-06-18T08:34:51Z",
"pushed_at": "2018-07-27T12:09:40Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "exploit for CVE-2018-4193",
"fork": false,
"created_at": "2019-02-13T13:06:11Z",
"updated_at": "2020-05-17T11:38:25Z",
"updated_at": "2020-06-18T03:41:17Z",
"pushed_at": "2019-02-13T13:07:25Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 21,
"forks": 21,
"watchers": 69,
"watchers": 70,
"score": 0
}
]

View file

@ -289,7 +289,7 @@
"description": "Exploit for CVE-2018-7600.. called drupalgeddon2, ",
"fork": false,
"created_at": "2018-04-19T03:31:47Z",
"updated_at": "2020-06-12T07:44:27Z",
"updated_at": "2020-06-18T08:10:33Z",
"pushed_at": "2018-04-19T03:38:24Z",
"stargazers_count": 4,
"watchers_count": 4,
@ -619,5 +619,28 @@
"forks": 3,
"watchers": 7,
"score": 0
},
{
"id": 273180012,
"name": "drupalhunter",
"full_name": "ynsmroztas\/drupalhunter",
"owner": {
"login": "ynsmroztas",
"id": 58443521,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/58443521?v=4",
"html_url": "https:\/\/github.com\/ynsmroztas"
},
"html_url": "https:\/\/github.com\/ynsmroztas\/drupalhunter",
"description": "CVE-2018-7600 0-Day Exploit (cyber-warrior.org)",
"fork": false,
"created_at": "2020-06-18T08:12:44Z",
"updated_at": "2020-06-18T08:24:40Z",
"pushed_at": "2020-06-18T08:24:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1991,13 +1991,13 @@
"description": "Public work for CVE-2019-0708",
"fork": false,
"created_at": "2019-07-23T03:15:53Z",
"updated_at": "2020-06-17T07:09:01Z",
"updated_at": "2020-06-18T06:48:00Z",
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"forks_count": 89,
"forks": 89,
"watchers": 272,
"watchers": 273,
"score": 0
},
{
@ -2520,13 +2520,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-06-18T02:51:41Z",
"updated_at": "2020-06-18T07:37:03Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 16,
"forks": 16,
"watchers": 36,
"watchers": 38,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-06-17T13:29:03Z",
"updated_at": "2020-06-18T08:26:08Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1579,
"watchers_count": 1579,
"stargazers_count": 1581,
"watchers_count": 1581,
"forks_count": 225,
"forks": 225,
"watchers": 1579,
"watchers": 1581,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate",
"fork": false,
"created_at": "2020-06-04T16:06:44Z",
"updated_at": "2020-06-10T14:03:49Z",
"updated_at": "2020-06-18T08:24:31Z",
"pushed_at": "2020-06-05T09:43:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-18T02:57:55Z",
"updated_at": "2020-06-18T04:06:57Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 946,
"watchers_count": 946,
"forks_count": 234,
"forks": 234,
"watchers": 946,
"stargazers_count": 947,
"watchers_count": 947,
"forks_count": 235,
"forks": 235,
"watchers": 947,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2019-02-21T22:49:53Z",
"updated_at": "2020-06-18T03:06:11Z",
"pushed_at": "2020-06-18T03:06:28Z",
"pushed_at": "2020-06-18T03:41:07Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-08-19T17:33:56Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 18,
"forks": 18,
"forks_count": 17,
"forks": 17,
"watchers": 50,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
"updated_at": "2020-06-18T01:30:37Z",
"updated_at": "2020-06-18T08:18:34Z",
"pushed_at": "2019-10-23T07:10:35Z",
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 31,
"forks": 31,
"watchers": 83,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 32,
"forks": 32,
"watchers": 85,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
"fork": false,
"created_at": "2019-02-25T06:38:15Z",
"updated_at": "2020-06-17T10:26:06Z",
"updated_at": "2020-06-18T08:47:33Z",
"pushed_at": "2019-03-18T01:20:52Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 17,
"forks": 17,
"watchers": 53,
"watchers": 54,
"score": 0
},
{

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 273191684,
"name": "StrandHogg2",
"full_name": "wrlu\/StrandHogg2",
"owner": {
"login": "wrlu",
"id": 20199567,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20199567?v=4",
"html_url": "https:\/\/github.com\/wrlu"
},
"html_url": "https:\/\/github.com\/wrlu\/StrandHogg2",
"description": "PoC of StrandHogg2 (CVE-2020-0096)",
"fork": false,
"created_at": "2020-06-18T09:05:49Z",
"updated_at": "2020-06-18T09:06:01Z",
"pushed_at": "2020-06-18T09:05:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-06-18T03:00:40Z",
"updated_at": "2020-06-18T08:58:33Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 55,
"forks": 55,
"watchers": 178,
"watchers": 179,
"score": 0
},
{

View file

@ -10,16 +10,16 @@
"html_url": "https:\/\/github.com\/cbwang505"
},
"html_url": "https:\/\/github.com\/cbwang505\/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION",
"description": null,
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-06-18T03:05:15Z",
"updated_at": "2020-06-18T09:04:44Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 20,
"forks": 20,
"watchers": 95,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 27,
"forks": 27,
"watchers": 119,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
"fork": false,
"created_at": "2020-03-12T19:33:18Z",
"updated_at": "2020-06-18T01:39:46Z",
"updated_at": "2020-06-18T05:39:20Z",
"pushed_at": "2020-03-13T07:38:43Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 20,
"forks": 20,
"watchers": 46,
"watchers": 49,
"score": 0
},
{
@ -841,13 +841,13 @@
"description": "CVE-2020-0796.SMBGhost_Crash_Poc ",
"fork": false,
"created_at": "2020-03-18T08:29:28Z",
"updated_at": "2020-06-15T18:14:09Z",
"updated_at": "2020-06-18T07:50:51Z",
"pushed_at": "2020-03-18T08:57:36Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 7,
"forks": 7,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -1209,13 +1209,13 @@
"description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)",
"fork": false,
"created_at": "2020-04-22T09:09:02Z",
"updated_at": "2020-06-07T22:45:29Z",
"updated_at": "2020-06-18T08:14:00Z",
"pushed_at": "2020-06-05T16:21:55Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 11,
"forks": 11,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -1439,13 +1439,13 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2020-06-17T23:04:01Z",
"updated_at": "2020-06-18T08:15:38Z",
"pushed_at": "2020-06-12T12:46:48Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 7,
"forks": 7,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-1015",
"fork": false,
"created_at": "2020-05-13T16:42:17Z",
"updated_at": "2020-06-18T00:14:13Z",
"updated_at": "2020-06-18T09:09:16Z",
"pushed_at": "2020-05-16T05:15:35Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 7,
"forks": 7,
"watchers": 33,
"watchers": 34,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
"fork": false,
"created_at": "2020-06-16T23:22:15Z",
"updated_at": "2020-06-18T02:14:21Z",
"updated_at": "2020-06-18T09:08:44Z",
"pushed_at": "2020-06-17T18:10:30Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 9,
"forks": 9,
"watchers": 25,
"watchers": 29,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
"fork": false,
"created_at": "2020-06-01T04:44:05Z",
"updated_at": "2020-06-17T18:15:23Z",
"updated_at": "2020-06-18T05:19:15Z",
"pushed_at": "2020-06-17T00:56:08Z",
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 30,
"forks": 30,
"watchers": 121,
"stargazers_count": 122,
"watchers_count": 122,
"forks_count": 31,
"forks": 31,
"watchers": 122,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-18T02:57:55Z",
"updated_at": "2020-06-18T04:06:57Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 946,
"watchers_count": 946,
"forks_count": 234,
"forks": 234,
"watchers": 946,
"stargazers_count": 947,
"watchers_count": 947,
"forks_count": 235,
"forks": 235,
"watchers": 947,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2020-06-18T02:21:44Z",
"updated_at": "2020-06-18T08:54:31Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 285,
"watchers_count": 285,
"forks_count": 44,
"forks": 44,
"watchers": 285,
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 46,
"forks": 46,
"watchers": 289,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit Code for CVE-2020-1283 - Windows-Denial-of-Service-Vulnerability",
"fork": false,
"created_at": "2020-04-17T09:21:36Z",
"updated_at": "2020-06-17T09:57:11Z",
"updated_at": "2020-06-18T03:27:18Z",
"pushed_at": "2020-06-16T08:08:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-06-17T04:17:04Z",
"updated_at": "2020-06-18T05:04:34Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 91,
"forks": 91,
"watchers": 173,
"watchers": 174,
"score": 0
},
{

View file

@ -36,6 +36,7 @@ In startActivities of ActivityStartController.java, there is a possible escalati
</code>
- [wyu0hop/CVE-2020-0096](https://github.com/wyu0hop/CVE-2020-0096)
- [wrlu/StrandHogg2](https://github.com/wrlu/StrandHogg2)
### CVE-2020-0551
@ -7341,6 +7342,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
- [shellord/Drupalgeddon-Mass-Exploiter](https://github.com/shellord/Drupalgeddon-Mass-Exploiter)
- [zhzyker/CVE-2018-7600-Drupal-POC-EXP](https://github.com/zhzyker/CVE-2018-7600-Drupal-POC-EXP)
- [rabbitmask/CVE-2018-7600-Drupal7](https://github.com/rabbitmask/CVE-2018-7600-Drupal7)
- [ynsmroztas/drupalhunter](https://github.com/ynsmroztas/drupalhunter)
### CVE-2018-7602