Auto Update 2020/03/12 12:07:14

This commit is contained in:
motikan2010-bot 2020-03-12 12:07:14 +09:00
parent ccc65d04c2
commit d2263d4450
28 changed files with 188 additions and 140 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-11T08:03:35Z", "updated_at": "2020-03-12T00:11:51Z",
"pushed_at": "2020-03-07T13:15:39Z", "pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 264, "stargazers_count": 265,
"watchers_count": 264, "watchers_count": 265,
"forks_count": 58, "forks_count": 58,
"forks": 58, "forks": 58,
"watchers": 264, "watchers": 265,
"score": 0 "score": 0
} }
] ]

View file

@ -82,7 +82,7 @@
"description": "PoC code for 32 bit Android OS", "description": "PoC code for 32 bit Android OS",
"fork": false, "fork": false,
"created_at": "2015-09-12T01:31:36Z", "created_at": "2015-09-12T01:31:36Z",
"updated_at": "2020-02-16T14:57:21Z", "updated_at": "2020-03-11T23:05:06Z",
"pushed_at": "2015-12-15T05:42:02Z", "pushed_at": "2015-12-15T05:42:02Z",
"stargazers_count": 128, "stargazers_count": 128,
"watchers_count": 128, "watchers_count": 128,

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-11T08:03:35Z", "updated_at": "2020-03-12T00:11:51Z",
"pushed_at": "2020-03-07T13:15:39Z", "pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 264, "stargazers_count": 265,
"watchers_count": 264, "watchers_count": 265,
"forks_count": 58, "forks_count": 58,
"forks": 58, "forks": 58,
"watchers": 264, "watchers": 265,
"score": 0 "score": 0
} }
] ]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-10-21T08:13:40Z", "pushed_at": "2019-10-21T08:13:40Z",
"stargazers_count": 39, "stargazers_count": 39,
"watchers_count": 39, "watchers_count": 39,
"forks_count": 14, "forks_count": 15,
"forks": 14, "forks": 15,
"watchers": 39, "watchers": 39,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-11T08:03:35Z", "updated_at": "2020-03-12T00:11:51Z",
"pushed_at": "2020-03-07T13:15:39Z", "pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 264, "stargazers_count": 265,
"watchers_count": 264, "watchers_count": 265,
"forks_count": 58, "forks_count": 58,
"forks": 58, "forks": 58,
"watchers": 264, "watchers": 265,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC", "description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false, "fork": false,
"created_at": "2017-04-10T03:44:04Z", "created_at": "2017-04-10T03:44:04Z",
"updated_at": "2020-01-11T12:22:37Z", "updated_at": "2020-03-12T00:59:44Z",
"pushed_at": "2017-04-12T09:17:27Z", "pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 162, "stargazers_count": 163,
"watchers_count": 162, "watchers_count": 163,
"forks_count": 78, "forks_count": 78,
"forks": 78, "forks": 78,
"watchers": 162, "watchers": 163,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-08T00:08:20Z", "pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 317, "stargazers_count": 317,
"watchers_count": 317, "watchers_count": 317,
"forks_count": 286, "forks_count": 287,
"forks": 286, "forks": 287,
"watchers": 317, "watchers": 317,
"score": 0 "score": 0
}, },

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-11T08:03:35Z", "updated_at": "2020-03-12T00:11:51Z",
"pushed_at": "2020-03-07T13:15:39Z", "pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 264, "stargazers_count": 265,
"watchers_count": 264, "watchers_count": 265,
"forks_count": 58, "forks_count": 58,
"forks": 58, "forks": 58,
"watchers": 264, "watchers": 265,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false, "fork": false,
"created_at": "2019-12-21T22:45:55Z", "created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-03-11T08:11:13Z", "updated_at": "2020-03-12T02:09:27Z",
"pushed_at": "2020-01-05T21:46:25Z", "pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 197, "stargazers_count": 196,
"watchers_count": 197, "watchers_count": 196,
"forks_count": 36, "forks_count": 36,
"forks": 36, "forks": 36,
"watchers": 197, "watchers": 196,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN", "description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
"fork": false, "fork": false,
"created_at": "2019-04-16T14:32:03Z", "created_at": "2019-04-16T14:32:03Z",
"updated_at": "2020-03-09T09:19:18Z", "updated_at": "2020-03-12T00:07:25Z",
"pushed_at": "2019-04-17T02:42:03Z", "pushed_at": "2019-04-17T02:42:03Z",
"stargazers_count": 52, "stargazers_count": 53,
"watchers_count": 52, "watchers_count": 53,
"forks_count": 21, "forks_count": 21,
"forks": 21, "forks": 21,
"watchers": 52, "watchers": 53,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit", "description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false, "fork": false,
"created_at": "2020-03-11T08:30:14Z", "created_at": "2020-03-11T08:30:14Z",
"updated_at": "2020-03-11T20:19:03Z", "updated_at": "2020-03-12T01:38:19Z",
"pushed_at": "2020-03-11T09:59:01Z", "pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 24, "stargazers_count": 27,
"watchers_count": 24, "watchers_count": 27,
"forks_count": 3, "forks_count": 3,
"forks": 3, "forks": 3,
"watchers": 24, "watchers": 27,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181", "description": "New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
"fork": false, "fork": false,
"created_at": "2019-08-31T20:28:12Z", "created_at": "2019-08-31T20:28:12Z",
"updated_at": "2020-02-26T12:58:08Z", "updated_at": "2020-03-12T02:47:58Z",
"pushed_at": "2019-10-30T18:18:43Z", "pushed_at": "2019-10-30T18:18:43Z",
"stargazers_count": 20, "stargazers_count": 21,
"watchers_count": 20, "watchers_count": 21,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 20, "watchers": 21,
"score": 0 "score": 0
} }
] ]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-11T08:03:35Z", "updated_at": "2020-03-12T00:11:51Z",
"pushed_at": "2020-03-07T13:15:39Z", "pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 264, "stargazers_count": 265,
"watchers_count": 264, "watchers_count": 265,
"forks_count": 58, "forks_count": 58,
"forks": 58, "forks": 58,
"watchers": 264, "watchers": 265,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)", "description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false, "fork": false,
"created_at": "2019-02-12T22:07:47Z", "created_at": "2019-02-12T22:07:47Z",
"updated_at": "2020-02-26T07:57:38Z", "updated_at": "2020-03-11T22:06:24Z",
"pushed_at": "2019-02-20T15:35:34Z", "pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 175, "stargazers_count": 176,
"watchers_count": 175, "watchers_count": 176,
"forks_count": 61, "forks_count": 61,
"forks": 61, "forks": 61,
"watchers": 175, "watchers": 176,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)", "description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)",
"fork": false, "fork": false,
"created_at": "2020-03-10T17:00:01Z", "created_at": "2020-03-10T17:00:01Z",
"updated_at": "2020-03-11T11:25:09Z", "updated_at": "2020-03-12T00:05:30Z",
"pushed_at": "2020-03-10T17:10:12Z", "pushed_at": "2020-03-10T17:10:12Z",
"stargazers_count": 9, "stargazers_count": 12,
"watchers_count": 9, "watchers_count": 12,
"forks_count": 2, "forks_count": 3,
"forks": 2, "forks": 3,
"watchers": 9, "watchers": 12,
"score": 0 "score": 0
} }
] ]

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)", "description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false, "fork": false,
"created_at": "2020-01-15T23:07:41Z", "created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-03-11T20:03:07Z", "updated_at": "2020-03-11T22:33:45Z",
"pushed_at": "2020-01-20T23:33:19Z", "pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 785, "stargazers_count": 786,
"watchers_count": 785, "watchers_count": 786,
"forks_count": 195, "forks_count": 195,
"forks": 195, "forks": 195,
"watchers": 785, "watchers": 786,
"score": 0 "score": 0
}, },
{ {

View file

@ -105,13 +105,13 @@
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610", "description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
"fork": false, "fork": false,
"created_at": "2020-01-24T19:47:45Z", "created_at": "2020-01-24T19:47:45Z",
"updated_at": "2020-03-06T02:29:37Z", "updated_at": "2020-03-11T22:09:22Z",
"pushed_at": "2020-01-31T13:49:06Z", "pushed_at": "2020-01-31T13:49:06Z",
"stargazers_count": 60, "stargazers_count": 61,
"watchers_count": 60, "watchers_count": 61,
"forks_count": 14, "forks_count": 14,
"forks": 14, "forks": 14,
"watchers": 60, "watchers": 61,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false, "fork": false,
"created_at": "2020-02-20T06:22:40Z", "created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-03-10T17:02:56Z", "updated_at": "2020-03-12T00:20:05Z",
"pushed_at": "2020-02-20T11:03:18Z", "pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 143, "stargazers_count": 144,
"watchers_count": 143, "watchers_count": 144,
"forks_count": 30, "forks_count": 30,
"forks": 30, "forks": 30,
"watchers": 143, "watchers": 144,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-26T00:58:39Z", "pushed_at": "2020-02-26T00:58:39Z",
"stargazers_count": 132, "stargazers_count": 132,
"watchers_count": 132, "watchers_count": 132,
"forks_count": 38, "forks_count": 39,
"forks": 38, "forks": 39,
"watchers": 132, "watchers": 132,
"score": 0 "score": 0
}, },
@ -40,8 +40,8 @@
"pushed_at": "2020-02-27T03:50:07Z", "pushed_at": "2020-02-27T03:50:07Z",
"stargazers_count": 21, "stargazers_count": 21,
"watchers_count": 21, "watchers_count": 21,
"forks_count": 9, "forks_count": 10,
"forks": 9, "forks": 10,
"watchers": 21, "watchers": 21,
"score": 0 "score": 0
}, },
@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method", "description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false, "fork": false,
"created_at": "2020-02-27T13:53:46Z", "created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-03-11T07:39:22Z", "updated_at": "2020-03-12T01:31:39Z",
"pushed_at": "2020-02-27T15:57:53Z", "pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 88, "stargazers_count": 89,
"watchers_count": 88, "watchers_count": 89,
"forks_count": 34, "forks_count": 34,
"forks": 34, "forks": 34,
"watchers": 88, "watchers": 89,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability", "description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
"fork": false, "fork": false,
"created_at": "2020-03-10T21:40:57Z", "created_at": "2020-03-10T21:40:57Z",
"updated_at": "2020-03-11T20:17:26Z", "updated_at": "2020-03-11T21:20:42Z",
"pushed_at": "2020-03-10T21:41:35Z", "pushed_at": "2020-03-10T21:41:35Z",
"stargazers_count": 10, "stargazers_count": 11,
"watchers_count": 10, "watchers_count": 11,
"forks_count": 0, "forks_count": 1,
"forks": 0, "forks": 1,
"watchers": 10, "watchers": 11,
"score": 0 "score": 0
}, },
{ {
@ -59,13 +59,13 @@
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.", "description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
"fork": false, "fork": false,
"created_at": "2020-03-11T06:51:58Z", "created_at": "2020-03-11T06:51:58Z",
"updated_at": "2020-03-11T20:12:34Z", "updated_at": "2020-03-12T02:48:10Z",
"pushed_at": "2020-03-11T12:54:04Z", "pushed_at": "2020-03-12T01:00:27Z",
"stargazers_count": 8, "stargazers_count": 12,
"watchers_count": 8, "watchers_count": 12,
"forks_count": 1, "forks_count": 3,
"forks": 1, "forks": 3,
"watchers": 8, "watchers": 12,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false, "fork": false,
"created_at": "2020-03-11T15:21:27Z", "created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-03-11T20:49:09Z", "updated_at": "2020-03-12T03:06:48Z",
"pushed_at": "2020-03-11T15:33:47Z", "pushed_at": "2020-03-11T15:33:47Z",
"stargazers_count": 45, "stargazers_count": 92,
"watchers_count": 45, "watchers_count": 92,
"forks_count": 7, "forks_count": 24,
"forks": 7, "forks": 24,
"watchers": 45, "watchers": 92,
"score": 0 "score": 0
}, },
{ {
@ -105,8 +105,8 @@
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)", "description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
"fork": false, "fork": false,
"created_at": "2020-03-11T16:23:03Z", "created_at": "2020-03-11T16:23:03Z",
"updated_at": "2020-03-11T18:26:09Z", "updated_at": "2020-03-11T22:50:42Z",
"pushed_at": "2020-03-11T18:26:07Z", "pushed_at": "2020-03-11T22:50:40Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 1, "forks_count": 1,
@ -159,5 +159,51 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 246724151,
"name": "cve-2020-0796-scanner",
"full_name": "dickens88\/cve-2020-0796-scanner",
"owner": {
"login": "dickens88",
"id": 8390209,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8390209?v=4",
"html_url": "https:\/\/github.com\/dickens88"
},
"html_url": "https:\/\/github.com\/dickens88\/cve-2020-0796-scanner",
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
"fork": false,
"created_at": "2020-03-12T02:20:07Z",
"updated_at": "2020-03-12T02:49:12Z",
"pushed_at": "2020-03-12T02:49:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246728549,
"name": "CVE-2020-0796",
"full_name": "kn6869610\/CVE-2020-0796",
"owner": {
"login": "kn6869610",
"id": 6917744,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6917744?v=4",
"html_url": "https:\/\/github.com\/kn6869610"
},
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2020-0796",
"description": null,
"fork": false,
"created_at": "2020-03-12T02:47:49Z",
"updated_at": "2020-03-12T02:59:11Z",
"pushed_at": "2020-03-12T02:59:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Powershell SMBv3 Compression checker", "description": "Powershell SMBv3 Compression checker",
"fork": false, "fork": false,
"created_at": "2020-03-11T09:13:48Z", "created_at": "2020-03-11T09:13:48Z",
"updated_at": "2020-03-11T20:41:29Z", "updated_at": "2020-03-12T01:17:55Z",
"pushed_at": "2020-03-11T17:10:12Z", "pushed_at": "2020-03-11T17:10:12Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0 "score": 0
} }
] ]

View file

@ -151,13 +151,13 @@
"description": "Tomcat的文件包含及文件读取漏洞利用POC", "description": "Tomcat的文件包含及文件读取漏洞利用POC",
"fork": false, "fork": false,
"created_at": "2020-02-21T07:48:50Z", "created_at": "2020-02-21T07:48:50Z",
"updated_at": "2020-03-10T11:17:32Z", "updated_at": "2020-03-12T00:58:13Z",
"pushed_at": "2020-02-21T10:19:52Z", "pushed_at": "2020-02-21T10:19:52Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"forks_count": 3, "forks_count": 4,
"forks": 3, "forks": 4,
"watchers": 6, "watchers": 7,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1947 poc", "description": "CVE-2020-1947 poc",
"fork": false, "fork": false,
"created_at": "2020-03-10T12:44:01Z", "created_at": "2020-03-10T12:44:01Z",
"updated_at": "2020-03-11T21:02:31Z", "updated_at": "2020-03-12T02:12:44Z",
"pushed_at": "2020-03-10T12:48:10Z", "pushed_at": "2020-03-10T12:48:10Z",
"stargazers_count": 32, "stargazers_count": 36,
"watchers_count": 32, "watchers_count": 36,
"forks_count": 8, "forks_count": 10,
"forks": 8, "forks": 10,
"watchers": 32, "watchers": 36,
"score": 0 "score": 0
}, },
{ {
@ -36,13 +36,13 @@
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞", "description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
"fork": false, "fork": false,
"created_at": "2020-03-11T03:15:25Z", "created_at": "2020-03-11T03:15:25Z",
"updated_at": "2020-03-11T16:03:16Z", "updated_at": "2020-03-12T02:19:32Z",
"pushed_at": "2020-03-11T03:54:34Z", "pushed_at": "2020-03-11T03:54:34Z",
"stargazers_count": 16, "stargazers_count": 19,
"watchers_count": 16, "watchers_count": 19,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 16, "watchers": 19,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-11T08:03:35Z", "updated_at": "2020-03-12T00:11:51Z",
"pushed_at": "2020-03-07T13:15:39Z", "pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 264, "stargazers_count": 265,
"watchers_count": 264, "watchers_count": 265,
"forks_count": 58, "forks_count": 58,
"forks": 58, "forks": 58,
"watchers": 264, "watchers": 265,
"score": 0 "score": 0
}, },
{ {
@ -36,13 +36,13 @@
"description": "Weblogic RCE with IIOP", "description": "Weblogic RCE with IIOP",
"fork": false, "fork": false,
"created_at": "2020-01-18T07:08:06Z", "created_at": "2020-01-18T07:08:06Z",
"updated_at": "2020-03-11T02:05:09Z", "updated_at": "2020-03-12T01:29:57Z",
"pushed_at": "2020-01-18T07:14:34Z", "pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 68, "stargazers_count": 69,
"watchers_count": 68, "watchers_count": 69,
"forks_count": 9, "forks_count": 9,
"forks": 9, "forks": 9,
"watchers": 68, "watchers": 69,
"score": 0 "score": 0
}, },
{ {
@ -109,8 +109,8 @@
"pushed_at": "2020-03-04T16:16:58Z", "pushed_at": "2020-03-04T16:16:58Z",
"stargazers_count": 128, "stargazers_count": 128,
"watchers_count": 128, "watchers_count": 128,
"forks_count": 30, "forks_count": 32,
"forks": 30, "forks": 32,
"watchers": 128, "watchers": 128,
"score": 0 "score": 0
} }

View file

@ -59,8 +59,8 @@
"description": "CVE-2020-2555", "description": "CVE-2020-2555",
"fork": false, "fork": false,
"created_at": "2020-03-07T12:02:26Z", "created_at": "2020-03-07T12:02:26Z",
"updated_at": "2020-03-11T09:58:43Z", "updated_at": "2020-03-12T02:34:50Z",
"pushed_at": "2020-03-11T09:58:41Z", "pushed_at": "2020-03-12T02:34:48Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"forks_count": 0, "forks_count": 0,
@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false, "fork": false,
"created_at": "2020-03-07T18:58:09Z", "created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-03-11T16:35:41Z", "updated_at": "2020-03-12T02:25:19Z",
"pushed_at": "2020-03-09T05:25:05Z", "pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 58, "stargazers_count": 60,
"watchers_count": 58, "watchers_count": 60,
"forks_count": 12, "forks_count": 13,
"forks": 12, "forks": 13,
"watchers": 58, "watchers": 60,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-8597", "description": "CVE-2020-8597",
"fork": false, "fork": false,
"created_at": "2020-02-24T08:37:50Z", "created_at": "2020-02-24T08:37:50Z",
"updated_at": "2020-03-11T08:17:30Z", "updated_at": "2020-03-12T02:26:50Z",
"pushed_at": "2020-03-10T19:01:21Z", "pushed_at": "2020-03-10T19:01:21Z",
"stargazers_count": 45, "stargazers_count": 47,
"watchers_count": 45, "watchers_count": 47,
"forks_count": 17, "forks_count": 17,
"forks": 17, "forks": 17,
"watchers": 45, "watchers": 47,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,8 +13,8 @@
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7", "description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
"fork": false, "fork": false,
"created_at": "2020-02-19T02:29:14Z", "created_at": "2020-02-19T02:29:14Z",
"updated_at": "2020-03-11T14:50:44Z", "updated_at": "2020-03-12T02:25:33Z",
"pushed_at": "2020-03-10T04:00:12Z", "pushed_at": "2020-03-12T02:25:31Z",
"stargazers_count": 6, "stargazers_count": 6,
"watchers_count": 6, "watchers_count": 6,
"forks_count": 4, "forks_count": 4,

View file

@ -150,6 +150,8 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
- [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker) - [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker)
- [pr4jwal/CVE-2020-0796](https://github.com/pr4jwal/CVE-2020-0796) - [pr4jwal/CVE-2020-0796](https://github.com/pr4jwal/CVE-2020-0796)
- [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796) - [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796)
- [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner)
- [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796)
### CVE-2020-0976 ### CVE-2020-0976
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976) - [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)