Auto Update 2019/12/14 00:54:13

This commit is contained in:
motikan2010-bot 2019-12-14 00:54:14 +09:00
parent 5965dfd56e
commit d053d64b2b
40 changed files with 259 additions and 211 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2019-12-01T06:07:48Z",
"updated_at": "2019-12-12T16:51:18Z",
"pushed_at": "2019-05-16T05:58:52Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 18,
"forks": 18,
"watchers": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 19,
"forks": 19,
"watchers": 47,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2019-12-11T11:46:19Z",
"updated_at": "2019-12-13T02:56:59Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 84,
"forks": 84,
"watchers": 157,
"stargazers_count": 158,
"watchers_count": 158,
"forks_count": 85,
"forks": 85,
"watchers": 158,
"score": 0
},
{
@ -611,13 +611,13 @@
"description": "编译好的脏牛漏洞CVE-2016-5195EXP",
"fork": false,
"created_at": "2018-05-27T08:06:50Z",
"updated_at": "2019-12-04T11:35:37Z",
"updated_at": "2019-12-13T15:04:45Z",
"pushed_at": "2018-05-27T08:24:17Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 29,
"forks": 29,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2019-11-23T20:17:21Z",
"updated_at": "2019-12-13T12:14:06Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 245,
"watchers_count": 245,
"stargazers_count": 246,
"watchers_count": 246,
"forks_count": 94,
"forks": 94,
"watchers": 245,
"watchers": 246,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2019-12-12T15:46:02Z",
"updated_at": "2019-12-13T08:08:53Z",
"pushed_at": "2019-12-09T21:13:30Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 22,
"forks": 22,
"watchers": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 21,
"forks": 21,
"watchers": 61,
"score": 0
}
]

View file

@ -266,13 +266,13 @@
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2019-12-10T04:59:14Z",
"updated_at": "2019-12-12T17:07:38Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 125,
"forks": 125,
"watchers": 248,
"watchers": 249,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Jboss Java Deserialization RCE (CVE-2017-12149)",
"fork": false,
"created_at": "2019-08-22T21:06:09Z",
"updated_at": "2019-12-12T10:38:01Z",
"updated_at": "2019-12-13T05:07:45Z",
"pushed_at": "2019-08-22T21:08:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2019-12-04T15:30:11Z",
"updated_at": "2019-12-12T16:48:53Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 129,
"forks": 129,
"watchers": 330,
"watchers": 331,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2019-12-01T06:07:48Z",
"updated_at": "2019-12-12T16:51:18Z",
"pushed_at": "2019-05-16T05:58:52Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 18,
"forks": 18,
"watchers": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 19,
"forks": 19,
"watchers": 47,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-25T02:38:06Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 30,
"forks": 30,
"forks_count": 29,
"forks": 29,
"watchers": 112,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2019-12-10T04:59:14Z",
"updated_at": "2019-12-12T17:07:38Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 125,
"forks": 125,
"watchers": 248,
"watchers": 249,
"score": 0
},
{

25
2018/CVE-2018-13341.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 227729620,
"name": "crestron_getsudopwd",
"full_name": "axcheron\/crestron_getsudopwd",
"owner": {
"login": "axcheron",
"id": 5811920,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5811920?v=4",
"html_url": "https:\/\/github.com\/axcheron"
},
"html_url": "https:\/\/github.com\/axcheron\/crestron_getsudopwd",
"description": "Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices",
"fork": false,
"created_at": "2019-12-13T01:27:36Z",
"updated_at": "2019-12-13T02:34:41Z",
"pushed_at": "2019-12-13T01:36:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2019-12-05T15:54:44Z",
"updated_at": "2019-12-12T17:08:40Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 20,
"forks": 20,
"watchers": 174,
"watchers": 175,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-04-18T20:32:46Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 16,
"forks": 16,
"forks_count": 15,
"forks": 15,
"watchers": 56,
"score": 0
}

View file

@ -82,13 +82,13 @@
"description": "Exploiting The CVE-2018-19788 PolicyKit Bug",
"fork": false,
"created_at": "2018-12-31T16:54:58Z",
"updated_at": "2019-07-14T13:14:27Z",
"updated_at": "2019-12-13T06:34:20Z",
"pushed_at": "2018-12-31T17:12:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2019-12-01T06:07:48Z",
"updated_at": "2019-12-12T16:51:18Z",
"pushed_at": "2019-05-16T05:58:52Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 18,
"forks": 18,
"watchers": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 19,
"forks": 19,
"watchers": 47,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-07-19T05:46:55Z",
"updated_at": "2019-12-03T03:52:24Z",
"updated_at": "2019-12-12T17:04:35Z",
"pushed_at": "2018-07-19T05:59:00Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 39,
"forks": 39,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 29,
"forks": 29,
"forks_count": 28,
"forks": 28,
"watchers": 146,
"score": 0
}

View file

@ -105,13 +105,13 @@
"description": "CVE-2018-4878 样本",
"fork": false,
"created_at": "2018-02-22T02:38:30Z",
"updated_at": "2019-12-10T07:33:11Z",
"updated_at": "2019-12-13T01:54:00Z",
"pushed_at": "2018-02-22T07:10:21Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 47,
"forks": 47,
"watchers": 106,
"watchers": 107,
"score": 0
},
{

View file

@ -247,8 +247,8 @@
"pushed_at": "2019-05-05T15:49:44Z",
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 37,
"forks": 37,
"forks_count": 38,
"forks": 38,
"watchers": 65,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-04-11T08:44:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-10-12T16:52:34Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 8,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-04-08T08:26:26Z",
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 45,
"forks": 45,
"forks_count": 44,
"forks": 44,
"watchers": 116,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2019-12-10T09:23:02Z",
"updated_at": "2019-12-13T00:41:05Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 66,
"forks": 66,
"watchers": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 67,
"forks": 67,
"watchers": 118,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2019-12-10T13:58:29Z",
"updated_at": "2019-12-13T12:59:30Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 33,
"forks": 33,
"watchers": 46,
"watchers": 50,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码动手制作自己的payload",
"fork": false,
"created_at": "2019-12-10T02:39:57Z",
"updated_at": "2019-12-11T09:36:59Z",
"updated_at": "2019-12-13T09:04:47Z",
"pushed_at": "2019-12-11T09:33:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -1121,8 +1121,8 @@
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1066,
"watchers_count": 1066,
"forks_count": 355,
"forks": 355,
"forks_count": 354,
"forks": 354,
"watchers": 1066,
"score": 0
},
@ -1301,13 +1301,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2019-12-08T12:05:28Z",
"updated_at": "2019-12-13T09:05:31Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 665,
"watchers_count": 665,
"forks_count": 153,
"forks": 153,
"watchers": 665,
"stargazers_count": 666,
"watchers_count": 666,
"forks_count": 154,
"forks": 154,
"watchers": 666,
"score": 0
},
{
@ -1899,13 +1899,13 @@
"description": "Public work for CVE-2019-0708",
"fork": false,
"created_at": "2019-07-23T03:15:53Z",
"updated_at": "2019-12-10T08:03:29Z",
"updated_at": "2019-12-13T15:10:21Z",
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 243,
"watchers_count": 243,
"forks_count": 76,
"forks": 76,
"watchers": 243,
"stargazers_count": 245,
"watchers_count": 245,
"forks_count": 77,
"forks": 77,
"watchers": 245,
"score": 0
},
{
@ -2405,13 +2405,13 @@
"description": "CVE-2019-0708 (BlueKeep)",
"fork": false,
"created_at": "2019-12-07T10:13:11Z",
"updated_at": "2019-12-11T04:55:43Z",
"updated_at": "2019-12-12T21:13:18Z",
"pushed_at": "2019-12-08T10:09:56Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 4,
"forks": 4,
"watchers": 64,
"watchers": 65,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
"fork": false,
"created_at": "2017-04-26T02:03:43Z",
"updated_at": "2019-12-01T06:07:48Z",
"updated_at": "2019-12-12T16:51:18Z",
"pushed_at": "2019-05-16T05:58:52Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 18,
"forks": 18,
"watchers": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 19,
"forks": 19,
"watchers": 47,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2019-12-12T12:33:05Z",
"updated_at": "2019-12-13T11:21:38Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1470,
"watchers_count": 1470,
"stargazers_count": 1471,
"watchers_count": 1471,
"forks_count": 204,
"forks": 204,
"watchers": 1470,
"watchers": 1471,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "SSL VPN Rce",
"fork": false,
"created_at": "2019-08-27T09:21:10Z",
"updated_at": "2019-12-09T22:56:37Z",
"updated_at": "2019-12-13T11:12:15Z",
"pushed_at": "2019-08-27T09:29:05Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 12,
"forks": 12,
"watchers": 46,
"watchers": 47,
"score": 0
},
{
@ -178,8 +178,8 @@
"pushed_at": "2019-10-20T19:17:44Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 19,
"forks": 19,
"forks_count": 20,
"forks": 20,
"watchers": 53,
"score": 0
},
@ -197,13 +197,13 @@
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
"updated_at": "2019-12-07T17:11:11Z",
"updated_at": "2019-12-13T01:57:18Z",
"pushed_at": "2019-12-07T17:09:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -36,8 +36,8 @@
"description": "CVE-201911581 PoC",
"fork": false,
"created_at": "2019-07-25T05:29:23Z",
"updated_at": "2019-10-04T06:20:01Z",
"pushed_at": "2019-07-26T19:22:52Z",
"updated_at": "2019-12-13T13:03:41Z",
"pushed_at": "2019-12-13T13:03:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2019-12-12T16:24:39Z",
"updated_at": "2019-12-13T13:13:08Z",
"pushed_at": "2019-12-10T11:26:28Z",
"stargazers_count": 484,
"watchers_count": 484,
"forks_count": 50,
"forks": 50,
"watchers": 484,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 51,
"forks": 51,
"watchers": 496,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)",
"fork": false,
"created_at": "2019-10-04T13:45:44Z",
"updated_at": "2019-11-30T09:40:40Z",
"updated_at": "2019-12-13T14:33:24Z",
"pushed_at": "2019-10-09T07:38:53Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 19,
"forks": 19,
"watchers": 51,
"watchers": 52,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2019-12-10T10:14:20Z",
"updated_at": "2019-12-13T13:00:32Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 37,
"forks": 37,
"watchers": 86,
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 38,
"forks": 38,
"watchers": 87,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2019-12-09T02:27:24Z",
"updated_at": "2019-12-13T11:25:52Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 10,
"forks": 10,
"watchers": 37,
"watchers": 40,
"score": 0
},
{
@ -63,8 +63,8 @@
"pushed_at": "2019-11-27T03:13:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-09-02T16:06:19Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 11,
"forks": 11,
"forks_count": 13,
"forks": 13,
"watchers": 33,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2019-12-12T15:46:02Z",
"updated_at": "2019-12-13T08:08:53Z",
"pushed_at": "2019-12-09T21:13:30Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 22,
"forks": 22,
"watchers": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 21,
"forks": 21,
"watchers": 61,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2019-12-12T09:47:34Z",
"pushed_at": "2019-12-12T09:39:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"updated_at": "2019-12-12T21:14:52Z",
"pushed_at": "2019-12-12T21:14:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2019-06-24T06:06:48Z",
"stargazers_count": 462,
"watchers_count": 462,
"forks_count": 94,
"forks": 94,
"forks_count": 95,
"forks": 95,
"watchers": 462,
"score": 0
}

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2019-12-06T08:46:31Z",
"updated_at": "2019-12-12T09:13:54Z",
"updated_at": "2019-12-13T06:41:30Z",
"pushed_at": "2019-12-06T09:18:56Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 12,
"forks": 12,
"watchers": 64,
"watchers": 66,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2019-2890 WebLogic 反序列化RCE漏洞",
"fork": false,
"created_at": "2019-12-08T05:03:32Z",
"updated_at": "2019-12-10T09:23:23Z",
"updated_at": "2019-12-13T02:09:50Z",
"pushed_at": "2019-12-08T05:50:42Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 0,
"forks": 0,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Confluence Widget Connector path traversal (CVE-2019-3396)",
"fork": false,
"created_at": "2019-04-09T06:20:51Z",
"updated_at": "2019-08-30T08:10:01Z",
"updated_at": "2019-12-13T12:20:19Z",
"pushed_at": "2019-10-04T22:25:03Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 13,
"forks": 13,
"watchers": 20,
"watchers": 21,
"score": 0
},
{
@ -312,8 +312,8 @@
"description": "For test",
"fork": false,
"created_at": "2019-12-12T07:40:22Z",
"updated_at": "2019-12-12T09:13:56Z",
"pushed_at": "2019-12-12T09:13:54Z",
"updated_at": "2019-12-13T08:59:05Z",
"pushed_at": "2019-12-13T08:59:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2019-11-28T06:17:00Z",
"updated_at": "2019-12-13T03:21:35Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 58,
"forks": 58,
"watchers": 171,
"watchers": 172,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2019-12-07T01:56:54Z",
"updated_at": "2019-12-13T06:40:09Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 364,
"watchers_count": 364,
"stargazers_count": 365,
"watchers_count": 365,
"forks_count": 84,
"forks": 84,
"watchers": 364,
"watchers": 365,
"score": 0
},
{
@ -297,5 +297,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 227655174,
"name": "Docker-Escape-Miner",
"full_name": "epsteina16\/Docker-Escape-Miner",
"owner": {
"login": "epsteina16",
"id": 14108788,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/14108788?v=4",
"html_url": "https:\/\/github.com\/epsteina16"
},
"html_url": "https:\/\/github.com\/epsteina16\/Docker-Escape-Miner",
"description": "Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user.",
"fork": false,
"created_at": "2019-12-12T16:57:13Z",
"updated_at": "2019-12-12T16:58:20Z",
"pushed_at": "2019-12-12T16:58:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2019-12-01T14:29:22Z",
"updated_at": "2019-12-12T13:16:26Z",
"updated_at": "2019-12-13T11:17:59Z",
"pushed_at": "2019-12-01T14:34:37Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 3,
"forks": 3,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Synaptics Audio Driver LPE",
"fork": false,
"created_at": "2019-04-14T06:16:34Z",
"updated_at": "2019-06-28T01:58:05Z",
"updated_at": "2019-12-12T16:54:47Z",
"pushed_at": "2019-04-15T11:17:39Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 8,
"forks": 8,
"watchers": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 9,
"forks": 9,
"watchers": 22,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-12-10T14:59:15Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 47,
"forks": 47,
"forks_count": 46,
"forks": 46,
"watchers": 181,
"score": 0
}