Auto Update 2020/05/29 12:07:51

This commit is contained in:
motikan2010-bot 2020-05-29 12:07:51 +09:00
parent 9b3336c61b
commit b02f6c4cd8
21 changed files with 108 additions and 84 deletions

View file

@ -44,5 +44,28 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 267752481,
"name": "CVE-2017-15944",
"full_name": "yukar1z0e\/CVE-2017-15944",
"owner": {
"login": "yukar1z0e",
"id": 44317939,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/44317939?v=4",
"html_url": "https:\/\/github.com\/yukar1z0e"
},
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2017-15944",
"description": null,
"fork": false,
"created_at": "2020-05-29T03:04:18Z",
"updated_at": "2020-05-29T03:04:46Z",
"pushed_at": "2020-05-29T03:04:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "Demo Application and Exploit",
"fork": false,
"created_at": "2017-03-10T21:33:25Z",
"updated_at": "2019-12-24T22:16:07Z",
"updated_at": "2020-05-29T01:57:57Z",
"pushed_at": "2017-03-13T15:03:32Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 36,
"forks": 36,
"watchers": 36,
"watchers": 37,
"score": 0
},
{
@ -1236,8 +1236,8 @@
"pushed_at": "2020-01-15T16:12:07Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 132,
"forks": 132,
"forks_count": 131,
"forks": 131,
"watchers": 8,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 423,
"watchers_count": 423,
"forks_count": 136,
"forks": 136,
"forks_count": 137,
"forks": 137,
"watchers": 423,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-8440 standalone exploit",
"fork": false,
"created_at": "2018-10-31T17:00:43Z",
"updated_at": "2020-05-28T19:55:44Z",
"updated_at": "2020-05-29T01:15:42Z",
"pushed_at": "2018-10-31T19:05:17Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 21,
"forks": 21,
"watchers": 67,
"watchers": 68,
"score": 0
}
]

View file

@ -1623,13 +1623,13 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2020-05-16T11:02:07Z",
"updated_at": "2020-05-29T02:21:31Z",
"pushed_at": "2020-05-09T09:49:14Z",
"stargazers_count": 325,
"watchers_count": 325,
"stargazers_count": 326,
"watchers_count": 326,
"forks_count": 117,
"forks": 117,
"watchers": 325,
"watchers": 326,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-0859 1day Exploit",
"fork": false,
"created_at": "2019-06-07T04:37:34Z",
"updated_at": "2020-05-18T10:43:06Z",
"updated_at": "2020-05-29T02:57:26Z",
"pushed_at": "2020-02-11T06:46:50Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 40,
"forks": 40,
"watchers": 115,
"watchers": 116,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-05-19T03:26:33Z",
"updated_at": "2020-05-29T02:15:39Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 663,
"watchers_count": 663,
"stargazers_count": 664,
"watchers_count": 664,
"forks_count": 56,
"forks": 56,
"watchers": 663,
"watchers": 664,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-28T19:01:58Z",
"updated_at": "2020-05-29T03:05:14Z",
"pushed_at": "2020-05-27T10:27:11Z",
"stargazers_count": 803,
"watchers_count": 803,
"stargazers_count": 806,
"watchers_count": 806,
"forks_count": 181,
"forks": 181,
"watchers": 803,
"watchers": 806,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
"fork": false,
"created_at": "2020-02-07T02:41:44Z",
"updated_at": "2020-05-18T10:43:36Z",
"updated_at": "2020-05-29T02:52:18Z",
"pushed_at": "2020-02-19T03:47:33Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 14,
"forks": 14,
"watchers": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 15,
"forks": 15,
"watchers": 42,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
"fork": false,
"created_at": "2020-01-13T10:09:31Z",
"updated_at": "2020-05-28T16:47:32Z",
"updated_at": "2020-05-29T02:29:09Z",
"pushed_at": "2020-01-15T13:58:22Z",
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 24,
"forks": 24,
"watchers": 94,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 25,
"forks": 25,
"watchers": 95,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2020-05-27T21:42:27Z",
"updated_at": "2020-05-29T02:26:54Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 509,
"watchers_count": 509,
"stargazers_count": 510,
"watchers_count": 510,
"forks_count": 106,
"forks": 106,
"watchers": 509,
"watchers": 510,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Automated Root Script for MTK ARM64 based chipsets based on diplomatic's CVE-2020-0069 (mtk-su) exploit.",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2020-05-27T04:34:06Z",
"updated_at": "2020-05-29T01:20:59Z",
"pushed_at": "2020-05-21T19:36:33Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 6,
"forks": 6,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-05-17T03:30:02Z",
"updated_at": "2020-05-29T01:56:32Z",
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 59,
"forks": 59,
"watchers": 211,
"watchers": 212,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-05-26T06:27:37Z",
"updated_at": "2020-05-28T23:59:22Z",
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 70,
"forks": 70,
"watchers": 179,
"watchers": 180,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-05-28T19:01:58Z",
"updated_at": "2020-05-29T03:05:14Z",
"pushed_at": "2020-05-27T10:27:11Z",
"stargazers_count": 803,
"watchers_count": 803,
"stargazers_count": 806,
"watchers_count": 806,
"forks_count": 181,
"forks": 181,
"watchers": 803,
"watchers": 806,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
"fork": false,
"created_at": "2020-05-19T18:59:26Z",
"updated_at": "2020-05-28T16:24:44Z",
"updated_at": "2020-05-29T02:58:21Z",
"pushed_at": "2020-05-25T08:33:24Z",
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 13,
"forks": 13,
"watchers": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 14,
"forks": 14,
"watchers": 72,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-05-21T01:53:17Z",
"updated_at": "2020-05-28T22:19:37Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 38,
"forks": 38,
"watchers": 184,
"watchers": 185,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC script that shows RCE vulnerability over Intellian Satellite controller",
"fork": false,
"created_at": "2020-01-28T23:27:20Z",
"updated_at": "2020-04-07T20:47:07Z",
"updated_at": "2020-05-29T02:17:49Z",
"pushed_at": "2020-01-30T11:42:26Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 6,
"forks": 6,
"watchers": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 7,
"forks": 7,
"watchers": 43,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-8617 (BIND)",
"fork": false,
"created_at": "2020-05-20T12:26:45Z",
"updated_at": "2020-05-27T01:57:23Z",
"updated_at": "2020-05-29T02:58:19Z",
"pushed_at": "2020-05-20T13:03:50Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 5,
"forks": 5,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
"fork": false,
"created_at": "2020-05-21T14:30:46Z",
"updated_at": "2020-05-28T13:41:00Z",
"updated_at": "2020-05-29T02:54:25Z",
"pushed_at": "2020-05-21T15:13:22Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 13,
"forks": 13,
"watchers": 30,
"watchers": 32,
"score": 0
}
]

View file

@ -8445,6 +8445,7 @@ Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.1
- [xxnbyy/CVE-2017-15944-POC](https://github.com/xxnbyy/CVE-2017-15944-POC)
- [surajraghuvanshi/PaloAltoRceDetectionAndExploit](https://github.com/surajraghuvanshi/PaloAltoRceDetectionAndExploit)
- [yukar1z0e/CVE-2017-15944](https://github.com/yukar1z0e/CVE-2017-15944)
### CVE-2017-16082