Auto Update 2020/09/29 18:08:58

This commit is contained in:
motikan2010-bot 2020-09-29 18:08:58 +09:00
parent 2c81e7b570
commit c8a3f1d8fe
25 changed files with 106 additions and 106 deletions

View file

@ -40,8 +40,8 @@
"pushed_at": "2016-07-22T13:51:17Z", "pushed_at": "2016-07-22T13:51:17Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 4, "forks_count": 5,
"forks": 4, "forks": 5,
"watchers": 1, "watchers": 1,
"score": 0 "score": 0
} }

View file

@ -59,13 +59,13 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android", "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false, "fork": false,
"created_at": "2016-10-21T11:19:21Z", "created_at": "2016-10-21T11:19:21Z",
"updated_at": "2020-09-14T01:51:16Z", "updated_at": "2020-09-29T06:24:13Z",
"pushed_at": "2020-08-18T10:37:49Z", "pushed_at": "2020-08-18T10:37:49Z",
"stargazers_count": 833, "stargazers_count": 834,
"watchers_count": 833, "watchers_count": 834,
"forks_count": 397, "forks_count": 397,
"forks": 397, "forks": 397,
"watchers": 833, "watchers": 834,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false, "fork": false,
"created_at": "2017-11-21T05:55:53Z", "created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-09-22T02:04:29Z", "updated_at": "2020-09-29T06:36:20Z",
"pushed_at": "2017-11-29T03:33:53Z", "pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 468, "stargazers_count": 469,
"watchers_count": 468, "watchers_count": 469,
"forks_count": 241, "forks_count": 241,
"forks": 241, "forks": 241,
"watchers": 468, "watchers": 469,
"score": 0 "score": 0
}, },
{ {
@ -316,8 +316,8 @@
"pushed_at": "2018-01-12T11:42:29Z", "pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 152, "stargazers_count": 152,
"watchers_count": 152, "watchers_count": 152,
"forks_count": 65, "forks_count": 64,
"forks": 65, "forks": 64,
"watchers": 152, "watchers": 152,
"score": 0 "score": 0
}, },

View file

@ -1210,7 +1210,7 @@
"fork": false, "fork": false,
"created_at": "2018-06-26T10:21:50Z", "created_at": "2018-06-26T10:21:50Z",
"updated_at": "2019-11-12T10:42:33Z", "updated_at": "2019-11-12T10:42:33Z",
"pushed_at": "2020-01-15T16:12:07Z", "pushed_at": "2020-09-29T05:21:44Z",
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"forks_count": 135, "forks_count": 135,

View file

@ -63,8 +63,8 @@
"pushed_at": "2018-01-12T11:42:29Z", "pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 152, "stargazers_count": 152,
"watchers_count": 152, "watchers_count": 152,
"forks_count": 65, "forks_count": 64,
"forks": 65, "forks": 64,
"watchers": 152, "watchers": 152,
"score": 0 "score": 0
}, },

View file

@ -247,8 +247,8 @@
"pushed_at": "2018-05-21T09:06:43Z", "pushed_at": "2018-05-21T09:06:43Z",
"stargazers_count": 100, "stargazers_count": 100,
"watchers_count": 100, "watchers_count": 100,
"forks_count": 52, "forks_count": 53,
"forks": 52, "forks": 53,
"watchers": 100, "watchers": 100,
"score": 0 "score": 0
}, },

View file

@ -59,13 +59,13 @@
"description": "incomplete exploit for CVE-2018-4150 (by cmwdotme) for devices without SMAP", "description": "incomplete exploit for CVE-2018-4150 (by cmwdotme) for devices without SMAP",
"fork": false, "fork": false,
"created_at": "2018-05-30T14:29:37Z", "created_at": "2018-05-30T14:29:37Z",
"updated_at": "2020-07-06T16:25:05Z", "updated_at": "2020-09-29T08:51:45Z",
"pushed_at": "2018-05-30T14:39:55Z", "pushed_at": "2018-05-30T14:39:55Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 1, "forks_count": 1,
"forks": 1, "forks": 1,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
} }
] ]

View file

@ -312,13 +312,13 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)", "description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false, "fork": false,
"created_at": "2019-05-15T15:01:38Z", "created_at": "2019-05-15T15:01:38Z",
"updated_at": "2020-09-29T01:27:08Z", "updated_at": "2020-09-29T05:39:29Z",
"pushed_at": "2019-06-13T13:07:03Z", "pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 337, "stargazers_count": 338,
"watchers_count": 337, "watchers_count": 338,
"forks_count": 189, "forks_count": 189,
"forks": 189, "forks": 189,
"watchers": 337, "watchers": 338,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "cve-2019-0808-poc", "description": "cve-2019-0808-poc",
"fork": false, "fork": false,
"created_at": "2019-03-25T11:53:35Z", "created_at": "2019-03-25T11:53:35Z",
"updated_at": "2020-06-07T11:49:31Z", "updated_at": "2020-09-29T07:12:25Z",
"pushed_at": "2019-03-25T12:10:40Z", "pushed_at": "2019-03-25T12:10:40Z",
"stargazers_count": 39, "stargazers_count": 40,
"watchers_count": 39, "watchers_count": 40,
"forks_count": 17, "forks_count": 18,
"forks": 17, "forks": 18,
"watchers": 39, "watchers": 40,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,7 +13,7 @@
"description": "A Proof of Concept for CVE-2019-14751", "description": "A Proof of Concept for CVE-2019-14751",
"fork": false, "fork": false,
"created_at": "2019-08-09T16:56:54Z", "created_at": "2019-08-09T16:56:54Z",
"updated_at": "2020-08-20T12:46:59Z", "updated_at": "2020-09-29T05:51:03Z",
"pushed_at": "2019-08-20T13:02:11Z", "pushed_at": "2019-08-20T13:02:11Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate", "description": "CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate",
"fork": false, "fork": false,
"created_at": "2020-06-04T16:06:44Z", "created_at": "2020-06-04T16:06:44Z",
"updated_at": "2020-09-04T06:48:34Z", "updated_at": "2020-09-29T06:10:24Z",
"pushed_at": "2020-06-05T09:43:08Z", "pushed_at": "2020-06-05T09:43:08Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 8, "watchers": 9,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-09-29T01:36:08Z", "updated_at": "2020-09-29T09:05:07Z",
"pushed_at": "2020-08-03T04:37:30Z", "pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1896, "stargazers_count": 1900,
"watchers_count": 1896, "watchers_count": 1900,
"forks_count": 493, "forks_count": 493,
"forks": 493, "forks": 493,
"watchers": 1896, "watchers": 1900,
"score": 0 "score": 0
}, },
{ {

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持", "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false, "fork": false,
"created_at": "2019-06-21T09:22:43Z", "created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-09-28T08:35:21Z", "updated_at": "2020-09-29T07:25:27Z",
"pushed_at": "2020-04-26T10:49:25Z", "pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 641, "stargazers_count": 642,
"watchers_count": 641, "watchers_count": 642,
"forks_count": 135, "forks_count": 135,
"forks": 135, "forks": 135,
"watchers": 641, "watchers": 642,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]", "description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
"fork": false, "fork": false,
"created_at": "2019-08-15T11:54:21Z", "created_at": "2019-08-15T11:54:21Z",
"updated_at": "2020-09-18T12:40:14Z", "updated_at": "2020-09-29T03:42:33Z",
"pushed_at": "2020-06-09T13:13:44Z", "pushed_at": "2020-06-09T13:13:44Z",
"stargazers_count": 124, "stargazers_count": 125,
"watchers_count": 124, "watchers_count": 125,
"forks_count": 27, "forks_count": 28,
"forks": 27, "forks": 28,
"watchers": 124, "watchers": 125,
"score": 0 "score": 0
} }
] ]

View file

@ -59,13 +59,13 @@
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.", "description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
"fork": false, "fork": false,
"created_at": "2020-01-24T03:52:49Z", "created_at": "2020-01-24T03:52:49Z",
"updated_at": "2020-09-08T23:54:25Z", "updated_at": "2020-09-29T05:19:35Z",
"pushed_at": "2020-01-26T21:04:27Z", "pushed_at": "2020-01-26T21:04:27Z",
"stargazers_count": 66, "stargazers_count": 67,
"watchers_count": 66, "watchers_count": 67,
"forks_count": 31, "forks_count": 31,
"forks": 31, "forks": 31,
"watchers": 66, "watchers": 67,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688", "description": "cve-2020-0688",
"fork": false, "fork": false,
"created_at": "2020-02-27T02:54:27Z", "created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-09-28T06:18:29Z", "updated_at": "2020-09-29T08:31:13Z",
"pushed_at": "2020-06-19T09:28:15Z", "pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 218, "stargazers_count": 219,
"watchers_count": 218, "watchers_count": 219,
"forks_count": 80, "forks_count": 80,
"forks": 80, "forks": 80,
"watchers": 218, "watchers": 219,
"score": 0 "score": 0
}, },
{ {
@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688", "description": "Exploit and detect tools for CVE-2020-0688",
"fork": false, "fork": false,
"created_at": "2020-03-01T12:57:32Z", "created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-09-24T17:49:43Z", "updated_at": "2020-09-29T08:31:10Z",
"pushed_at": "2020-03-21T05:44:48Z", "pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 222, "stargazers_count": 223,
"watchers_count": 222, "watchers_count": 223,
"forks_count": 62, "forks_count": 62,
"forks": 62, "forks": 62,
"watchers": 222, "watchers": 223,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation", "description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2020-06-25T07:35:29Z", "created_at": "2020-06-25T07:35:29Z",
"updated_at": "2020-09-03T19:26:51Z", "updated_at": "2020-09-29T09:04:01Z",
"pushed_at": "2020-06-25T07:49:34Z", "pushed_at": "2020-06-25T07:49:34Z",
"stargazers_count": 51, "stargazers_count": 52,
"watchers_count": 51, "watchers_count": 52,
"forks_count": 15, "forks_count": 15,
"forks": 15, "forks": 15,
"watchers": 51, "watchers": 52,
"score": 0 "score": 0
} }
] ]

View file

@ -13,8 +13,8 @@
"description": "This repository holds the advisory, exploits and vulnerable software of the CVE-2020-14293", "description": "This repository holds the advisory, exploits and vulnerable software of the CVE-2020-14293",
"fork": false, "fork": false,
"created_at": "2020-09-24T09:17:38Z", "created_at": "2020-09-24T09:17:38Z",
"updated_at": "2020-09-24T10:04:30Z", "updated_at": "2020-09-29T05:51:04Z",
"pushed_at": "2020-09-28T06:55:02Z", "pushed_at": "2020-09-29T05:51:02Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -13,8 +13,8 @@
"description": "This repository holds the advisory of the CVE-2020-14294", "description": "This repository holds the advisory of the CVE-2020-14294",
"fork": false, "fork": false,
"created_at": "2020-09-24T08:49:05Z", "created_at": "2020-09-24T08:49:05Z",
"updated_at": "2020-09-28T13:11:18Z", "updated_at": "2020-09-29T05:51:30Z",
"pushed_at": "2020-09-28T13:11:15Z", "pushed_at": "2020-09-29T05:51:27Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472", "description": "Test tool for CVE-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-08T08:58:37Z", "created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-09-28T17:46:39Z", "updated_at": "2020-09-29T08:34:17Z",
"pushed_at": "2020-09-23T07:04:58Z", "pushed_at": "2020-09-23T07:04:58Z",
"stargazers_count": 1073, "stargazers_count": 1074,
"watchers_count": 1073, "watchers_count": 1074,
"forks_count": 224, "forks_count": 226,
"forks": 224, "forks": 226,
"watchers": 1073, "watchers": 1074,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:56:51Z", "created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-09-28T21:00:59Z", "updated_at": "2020-09-29T08:18:17Z",
"pushed_at": "2020-09-25T15:32:01Z", "pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 623, "stargazers_count": 625,
"watchers_count": 623, "watchers_count": 625,
"forks_count": 179, "forks_count": 179,
"forks": 179, "forks": 179,
"watchers": 623, "watchers": 625,
"score": 0 "score": 0
}, },
{ {
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-09-28T13:38:08Z", "updated_at": "2020-09-29T07:04:58Z",
"pushed_at": "2020-09-17T18:06:57Z", "pushed_at": "2020-09-17T18:06:57Z",
"stargazers_count": 146, "stargazers_count": 148,
"watchers_count": 146, "watchers_count": 148,
"forks_count": 51, "forks_count": 51,
"forks": 51, "forks": 51,
"watchers": 146, "watchers": 148,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "PoC exploits for CVE-2020-17382", "description": "PoC exploits for CVE-2020-17382",
"fork": false, "fork": false,
"created_at": "2020-09-17T18:26:32Z", "created_at": "2020-09-17T18:26:32Z",
"updated_at": "2020-09-28T22:35:39Z", "updated_at": "2020-09-29T08:19:17Z",
"pushed_at": "2020-09-26T15:17:50Z", "pushed_at": "2020-09-26T15:17:50Z",
"stargazers_count": 61, "stargazers_count": 74,
"watchers_count": 61, "watchers_count": 74,
"forks_count": 11, "forks_count": 14,
"forks": 11, "forks": 14,
"watchers": 61, "watchers": 74,
"score": 0 "score": 0
} }
] ]

View file

@ -59,13 +59,13 @@
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal", "description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
"fork": false, "fork": false,
"created_at": "2020-05-19T18:59:26Z", "created_at": "2020-05-19T18:59:26Z",
"updated_at": "2020-08-20T10:54:48Z", "updated_at": "2020-09-29T04:50:16Z",
"pushed_at": "2020-05-25T08:33:24Z", "pushed_at": "2020-05-25T08:33:24Z",
"stargazers_count": 83, "stargazers_count": 84,
"watchers_count": 83, "watchers_count": 84,
"forks_count": 18, "forks_count": 18,
"forks": 18, "forks": 18,
"watchers": 83, "watchers": 84,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-09-29T01:36:08Z", "updated_at": "2020-09-29T09:05:07Z",
"pushed_at": "2020-08-03T04:37:30Z", "pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1896, "stargazers_count": 1900,
"watchers_count": 1896, "watchers_count": 1900,
"forks_count": 493, "forks_count": 493,
"forks": 493, "forks": 493,
"watchers": 1896, "watchers": 1900,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Hacking Artifactory with server side template injection", "description": "Hacking Artifactory with server side template injection",
"fork": false, "fork": false,
"created_at": "2020-03-11T13:56:43Z", "created_at": "2020-03-11T13:56:43Z",
"updated_at": "2020-09-28T18:59:57Z", "updated_at": "2020-09-29T06:25:26Z",
"pushed_at": "2020-03-12T06:55:39Z", "pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 28, "stargazers_count": 30,
"watchers_count": 28, "watchers_count": 30,
"forks_count": 7, "forks_count": 7,
"forks": 7, "forks": 7,
"watchers": 28, "watchers": 30,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device", "description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device",
"fork": false, "fork": false,
"created_at": "2020-09-16T23:35:22Z", "created_at": "2020-09-16T23:35:22Z",
"updated_at": "2020-09-28T21:14:45Z", "updated_at": "2020-09-29T07:21:51Z",
"pushed_at": "2020-09-23T14:52:06Z", "pushed_at": "2020-09-23T14:52:06Z",
"stargazers_count": 36, "stargazers_count": 37,
"watchers_count": 36, "watchers_count": 37,
"forks_count": 7, "forks_count": 7,
"forks": 7, "forks": 7,
"watchers": 36, "watchers": 37,
"score": 0 "score": 0
} }
] ]