Auto Update 2020/03/13 00:07:17

This commit is contained in:
motikan2010-bot 2020-03-13 00:07:17 +09:00
parent c0749d8796
commit d189d203f0
20 changed files with 219 additions and 123 deletions

View file

@ -59,13 +59,13 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2020-03-10T07:02:59Z",
"updated_at": "2020-03-12T13:28:45Z",
"pushed_at": "2017-09-27T02:35:13Z",
"stargazers_count": 824,
"watchers_count": 824,
"forks_count": 388,
"forks": 388,
"watchers": 824,
"stargazers_count": 825,
"watchers_count": 825,
"forks_count": 389,
"forks": 389,
"watchers": 825,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-03-10T03:30:12Z",
"updated_at": "2020-03-12T09:39:46Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 60,
"forks": 60,
"watchers": 179,
"watchers": 180,
"score": 0
},
{

View file

@ -2543,8 +2543,8 @@
"description": "这篇文章将分享Windows远程桌面服务漏洞CVE-2019-0708并详细讲解该漏洞及防御措施。作者作为网络安全的小白分享一些自学基础教程给大家主要是关于安全工具和实践操作的在线笔记希望您们喜欢。同时更希望您能与我一起操作和进步后续将深入学习网络安全和系统安全知识并分享相关实验。总之希望该系列文章对博友有所帮助写文不易大神们不喜勿喷谢谢",
"fork": false,
"created_at": "2020-02-19T05:40:22Z",
"updated_at": "2020-03-12T06:59:23Z",
"pushed_at": "2020-03-12T06:59:21Z",
"updated_at": "2020-03-12T13:57:00Z",
"pushed_at": "2020-03-12T13:56:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2020-03-12T08:06:42Z",
"updated_at": "2020-03-12T09:27:09Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 17,
"forks": 17,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2020-03-12T09:05:59Z",
"updated_at": "2020-03-12T10:16:57Z",
"pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 22,
"forks": 22,
"watchers": 72,
"watchers": 73,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2020-03-12T08:58:38Z",
"updated_at": "2020-03-12T10:27:17Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 4,
"forks": 4,
"watchers": 34,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 5,
"forks": 5,
"watchers": 37,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
"fork": false,
"created_at": "2020-02-07T02:41:44Z",
"updated_at": "2020-02-28T19:40:00Z",
"updated_at": "2020-03-12T09:20:15Z",
"pushed_at": "2020-02-19T03:47:33Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 7,
"forks": 7,
"watchers": 35,
"watchers": 37,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-03-06T14:01:26Z",
"updated_at": "2020-03-12T13:22:33Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 469,
"watchers_count": 469,
"stargazers_count": 470,
"watchers_count": 470,
"forks_count": 101,
"forks": 101,
"watchers": 469,
"watchers": 470,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-03-12T08:18:48Z",
"updated_at": "2020-03-12T13:22:40Z",
"pushed_at": "2020-02-17T13:28:02Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 17,
"forks": 17,
"watchers": 73,
"watchers": 74,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-2107",
"fork": false,
"created_at": "2019-07-08T14:18:33Z",
"updated_at": "2020-02-23T11:45:03Z",
"updated_at": "2020-03-12T14:22:59Z",
"pushed_at": "2019-07-25T08:01:07Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 93,
"forks": 93,
"watchers": 305,
"watchers": 304,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-03-10T03:30:12Z",
"updated_at": "2020-03-12T09:39:46Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 60,
"forks": 60,
"watchers": 179,
"watchers": 180,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Automated Root Script for MTK ARM64 based chipsets based on diplomatic's CVE-2020-0069 (mtk-su) exploit.",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2020-03-12T04:04:31Z",
"updated_at": "2020-03-12T09:56:56Z",
"pushed_at": "2020-03-09T20:40:50Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0
},
{

View file

@ -734,5 +734,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246794448,
"name": "twoplustwo",
"full_name": "ShayNehmad\/twoplustwo",
"owner": {
"login": "ShayNehmad",
"id": 48879847,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/48879847?v=4",
"html_url": "https:\/\/github.com\/ShayNehmad"
},
"html_url": "https:\/\/github.com\/ShayNehmad\/twoplustwo",
"description": "Implementing CVE-2020-0601",
"fork": false,
"created_at": "2020-03-12T09:30:19Z",
"updated_at": "2020-03-12T09:58:51Z",
"pushed_at": "2020-03-12T09:58:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-03-11T11:03:48Z",
"updated_at": "2020-03-12T09:11:05Z",
"pushed_at": "2020-03-01T12:58:01Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 35,
"forks": 35,
"watchers": 116,
"watchers": 117,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
"fork": false,
"created_at": "2020-03-11T06:51:58Z",
"updated_at": "2020-03-12T08:50:26Z",
"updated_at": "2020-03-12T14:03:57Z",
"pushed_at": "2020-03-12T08:50:23Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 7,
"forks": 7,
"watchers": 23,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-03-12T08:59:47Z",
"pushed_at": "2020-03-12T07:08:08Z",
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 34,
"forks": 34,
"watchers": 140,
"updated_at": "2020-03-12T14:56:27Z",
"pushed_at": "2020-03-12T11:34:17Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 42,
"forks": 42,
"watchers": 181,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
"fork": false,
"created_at": "2020-03-11T16:23:03Z",
"updated_at": "2020-03-11T22:50:42Z",
"updated_at": "2020-03-12T10:10:28Z",
"pushed_at": "2020-03-11T22:50:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
@ -151,8 +151,8 @@
"description": "Identifying and Mitigating the CVE-20200796 flaw in the fly",
"fork": false,
"created_at": "2020-03-11T18:42:32Z",
"updated_at": "2020-03-11T19:31:00Z",
"pushed_at": "2020-03-11T19:30:57Z",
"updated_at": "2020-03-12T10:19:37Z",
"pushed_at": "2020-03-12T10:19:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -174,13 +174,13 @@
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
"fork": false,
"created_at": "2020-03-12T02:20:07Z",
"updated_at": "2020-03-12T02:49:12Z",
"updated_at": "2020-03-12T13:37:24Z",
"pushed_at": "2020-03-12T02:49:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
@ -205,5 +205,74 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246795620,
"name": "eternalghosttest",
"full_name": "awareseven\/eternalghosttest",
"owner": {
"login": "awareseven",
"id": 53170037,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53170037?v=4",
"html_url": "https:\/\/github.com\/awareseven"
},
"html_url": "https:\/\/github.com\/awareseven\/eternalghosttest",
"description": "This repository contains a test case for CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T09:35:57Z",
"updated_at": "2020-03-12T14:03:31Z",
"pushed_at": "2020-03-12T14:03:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246837546,
"name": "CVE-2020-0796-PoC",
"full_name": "weidutech\/CVE-2020-0796-PoC",
"owner": {
"login": "weidutech",
"id": 30208579,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30208579?v=4",
"html_url": "https:\/\/github.com\/weidutech"
},
"html_url": "https:\/\/github.com\/weidutech\/CVE-2020-0796-PoC",
"description": " CVE-2020-0796 - a wormable SMBv3 vulnerability. ",
"fork": false,
"created_at": "2020-03-12T13:11:02Z",
"updated_at": "2020-03-12T13:12:16Z",
"pushed_at": "2020-03-12T13:12:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246857266,
"name": "CVE-2020-0796",
"full_name": "OfJAAH\/CVE-2020-0796",
"owner": {
"login": "OfJAAH",
"id": 28729614,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28729614?v=4",
"html_url": "https:\/\/github.com\/OfJAAH"
},
"html_url": "https:\/\/github.com\/OfJAAH\/CVE-2020-0796",
"description": null,
"fork": false,
"created_at": "2020-03-12T14:37:56Z",
"updated_at": "2020-03-12T14:45:51Z",
"pushed_at": "2020-03-12T14:45:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Powershell SMBv3 Compression checker",
"fork": false,
"created_at": "2020-03-11T09:13:48Z",
"updated_at": "2020-03-12T08:38:15Z",
"updated_at": "2020-03-12T11:43:26Z",
"pushed_at": "2020-03-11T17:10:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "CVE-2020-1947 poc",
"fork": false,
"created_at": "2020-03-10T12:44:01Z",
"updated_at": "2020-03-12T09:04:07Z",
"updated_at": "2020-03-12T11:22:43Z",
"pushed_at": "2020-03-10T12:48:10Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 39,
"score": 0
},
@ -36,13 +36,13 @@
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
"fork": false,
"created_at": "2020-03-11T03:15:25Z",
"updated_at": "2020-03-12T02:19:32Z",
"updated_at": "2020-03-12T13:53:16Z",
"pushed_at": "2020-03-11T03:54:34Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 4,
"forks": 4,
"watchers": 19,
"watchers": 20,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2020-1947 Python POC",
"fork": false,
"created_at": "2020-03-11T12:35:56Z",
"updated_at": "2020-03-11T15:06:31Z",
"updated_at": "2020-03-12T09:44:14Z",
"pushed_at": "2020-03-11T15:06:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -59,7 +59,7 @@
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-03-11T02:05:08Z",
"updated_at": "2020-03-12T11:39:42Z",
"pushed_at": "2020-03-10T15:46:18Z",
"stargazers_count": 75,
"watchers_count": 75,
@ -82,8 +82,8 @@
"description": "CVE-2020-2551",
"fork": false,
"created_at": "2020-02-24T02:36:46Z",
"updated_at": "2020-03-10T07:09:00Z",
"pushed_at": "2020-03-10T07:08:58Z",
"updated_at": "2020-03-12T09:18:27Z",
"pushed_at": "2020-03-12T09:18:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-10T12:24:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 8,
"score": 0
},
@ -59,13 +59,13 @@
"description": "CVE-2020-2555",
"fork": false,
"created_at": "2020-03-07T12:02:26Z",
"updated_at": "2020-03-12T02:34:50Z",
"pushed_at": "2020-03-12T02:34:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"updated_at": "2020-03-12T10:20:31Z",
"pushed_at": "2020-03-12T09:20:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-03-12T09:06:17Z",
"updated_at": "2020-03-12T09:58:35Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 17,
"forks": 17,
"watchers": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 18,
"forks": 18,
"watchers": 70,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2020-03-12T08:58:00Z",
"updated_at": "2020-03-12T13:44:57Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-8597 pppd buffer overflow poc",
"fork": false,
"created_at": "2020-03-07T19:00:46Z",
"updated_at": "2020-03-12T08:42:10Z",
"pushed_at": "2020-03-10T14:03:24Z",
"stargazers_count": 13,
"watchers_count": 13,
"updated_at": "2020-03-12T13:03:55Z",
"pushed_at": "2020-03-12T11:10:31Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 1,
"forks": 1,
"watchers": 13,
"watchers": 16,
"score": 0
}
]

View file

@ -61,6 +61,7 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
- [gremwell/cve-2020-0601_poc](https://github.com/gremwell/cve-2020-0601_poc)
- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball)
- [TechHexagon/CVE-2020-0601-spoofkey](https://github.com/TechHexagon/CVE-2020-0601-spoofkey)
- [ShayNehmad/twoplustwo](https://github.com/ShayNehmad/twoplustwo)
### CVE-2020-0609
@ -152,6 +153,9 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
- [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796)
- [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner)
- [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796)
- [awareseven/eternalghosttest](https://github.com/awareseven/eternalghosttest)
- [weidutech/CVE-2020-0796-PoC](https://github.com/weidutech/CVE-2020-0796-PoC)
- [OfJAAH/CVE-2020-0796](https://github.com/OfJAAH/CVE-2020-0796)
### CVE-2020-0976
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)