Auto Update 2021/01/30 00:10:08

This commit is contained in:
motikan2010-bot 2021-01-30 00:10:08 +09:00
parent 85c208bc45
commit d75aeb818f
21 changed files with 160 additions and 136 deletions

View file

@ -63,8 +63,8 @@
"pushed_at": "2021-01-10T22:23:07Z",
"stargazers_count": 857,
"watchers_count": 857,
"forks_count": 405,
"forks": 405,
"forks_count": 406,
"forks": 406,
"watchers": 857,
"score": 0
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2018-12-15T09:08:53Z",
"updated_at": "2020-10-16T09:10:43Z",
"pushed_at": "2020-10-14T12:23:52Z",
"pushed_at": "2021-01-29T14:49:44Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,

View file

@ -86,8 +86,8 @@
"pushed_at": "2018-11-30T07:10:44Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 11,
"forks": 11,
"forks_count": 10,
"forks": 10,
"watchers": 40,
"score": 0
},

View file

@ -1029,8 +1029,8 @@
"pushed_at": "2020-12-06T04:48:38Z",
"stargazers_count": 1133,
"watchers_count": 1133,
"forks_count": 386,
"forks": 386,
"forks_count": 385,
"forks": 385,
"watchers": 1133,
"score": 0
},
@ -1264,29 +1264,6 @@
"watchers": 12,
"score": 0
},
{
"id": 188781634,
"name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"full_name": "krivegasa\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"owner": {
"login": "krivegasa",
"id": 26058390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26058390?v=4",
"html_url": "https:\/\/github.com\/krivegasa"
},
"html_url": "https:\/\/github.com\/krivegasa\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"description": "Scan through given ip list",
"fork": false,
"created_at": "2019-05-27T06:11:51Z",
"updated_at": "2020-01-14T11:35:09Z",
"pushed_at": "2019-05-22T22:32:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 188842935,
"name": "bluekeepscan",
@ -2552,6 +2529,29 @@
"watchers": 1,
"score": 0
},
{
"id": 318113571,
"name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"full_name": "DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"owner": {
"login": "DeathStroke-source",
"id": 23089257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23089257?v=4",
"html_url": "https:\/\/github.com\/DeathStroke-source"
},
"html_url": "https:\/\/github.com\/DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"description": "Scan through given ip list",
"fork": false,
"created_at": "2020-12-03T07:40:19Z",
"updated_at": "2021-01-29T14:08:43Z",
"pushed_at": "2019-05-22T22:32:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 324765199,
"name": "CVE-2019-0708",

View file

@ -21,28 +21,5 @@
"forks": 7,
"watchers": 36,
"score": 0
},
{
"id": 236072228,
"name": "BlueGate",
"full_name": "ioncodes\/BlueGate",
"owner": {
"login": "ioncodes",
"id": 18533297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18533297?v=4",
"html_url": "https:\/\/github.com\/ioncodes"
},
"html_url": "https:\/\/github.com\/ioncodes\/BlueGate",
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
"fork": false,
"created_at": "2020-01-24T19:47:45Z",
"updated_at": "2020-12-11T14:22:52Z",
"pushed_at": "2020-01-31T13:49:06Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 17,
"forks": 17,
"watchers": 74,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2021-01-28T18:05:47Z",
"updated_at": "2021-01-29T14:32:01Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 263,
"watchers_count": 263,
"forks_count": 67,
"forks": 67,
"watchers": 262,
"watchers": 263,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-01-28T10:42:50Z",
"updated_at": "2021-01-29T15:04:53Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 492,
"watchers_count": 492,
"stargazers_count": 493,
"watchers_count": 493,
"forks_count": 118,
"forks": 118,
"watchers": 492,
"watchers": 493,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2021-01-26T12:19:27Z",
"updated_at": "2021-01-29T13:55:03Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 351,
"watchers_count": 351,
"stargazers_count": 352,
"watchers_count": 352,
"forks_count": 63,
"forks": 63,
"watchers": 351,
"watchers": 352,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "POC exploit for SMBLost vulnerability (CVE-2020-1301)",
"fork": false,
"created_at": "2020-06-13T18:24:26Z",
"updated_at": "2020-07-22T19:39:16Z",
"updated_at": "2021-01-29T10:35:29Z",
"pushed_at": "2020-06-13T18:55:03Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,
"forks": 8,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Apache Kylin API未授权访问漏洞;CVE-2020-13937;Apache Kylin漏洞",
"fork": false,
"created_at": "2021-01-15T08:57:09Z",
"updated_at": "2021-01-29T05:01:47Z",
"updated_at": "2021-01-29T10:43:36Z",
"pushed_at": "2021-01-15T08:59:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-01-28T13:27:57Z",
"updated_at": "2021-01-29T10:51:06Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 746,
"watchers_count": 746,
"forks_count": 218,
"forks": 218,
"watchers": 745,
"watchers": 746,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882",
"fork": false,
"created_at": "2020-11-06T12:46:03Z",
"updated_at": "2021-01-04T12:31:51Z",
"updated_at": "2021-01-29T11:19:42Z",
"pushed_at": "2020-11-10T10:54:36Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 7,
"forks": 7,
"watchers": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 8,
"forks": 8,
"watchers": 29,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-29T05:52:43Z",
"updated_at": "2021-01-29T12:54:57Z",
"pushed_at": "2021-01-29T05:52:39Z",
"stargazers_count": 842,
"watchers_count": 842,
"stargazers_count": 843,
"watchers_count": 843,
"forks_count": 154,
"forks": 154,
"watchers": 842,
"watchers": 843,
"score": 0
},
{
@ -573,5 +573,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 334149882,
"name": "CVE-2020-14882-WebLogic",
"full_name": "pwn3z\/CVE-2020-14882-WebLogic",
"owner": {
"login": "pwn3z",
"id": 71440287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
"html_url": "https:\/\/github.com\/pwn3z"
},
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2020-14882-WebLogic",
"description": null,
"fork": false,
"created_at": "2021-01-29T13:12:40Z",
"updated_at": "2021-01-29T13:13:37Z",
"pushed_at": "2021-01-29T13:13:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -289,13 +289,13 @@
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-20T05:24:47Z",
"updated_at": "2020-12-23T19:00:26Z",
"updated_at": "2021-01-29T10:23:15Z",
"pushed_at": "2020-10-28T11:21:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 90,
"forks": 90,
"forks_count": 91,
"forks": 91,
"watchers": 208,
"score": 0
},
@ -178,8 +178,8 @@
"pushed_at": "2020-02-21T08:45:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 5,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
"fork": false,
"created_at": "2021-01-23T19:07:18Z",
"updated_at": "2021-01-28T19:22:14Z",
"updated_at": "2021-01-29T13:44:49Z",
"pushed_at": "2021-01-24T09:05:40Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 25,
"forks": 25,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -312,13 +312,13 @@
"description": "CISCO CVE-2020-3452 Scanner & Exploiter",
"fork": false,
"created_at": "2021-01-05T14:41:13Z",
"updated_at": "2021-01-28T06:08:36Z",
"updated_at": "2021-01-29T14:42:45Z",
"pushed_at": "2021-01-10T09:14:08Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 21,
"forks": 21,
"watchers": 72,
"watchers": 73,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
"fork": false,
"created_at": "2021-01-22T05:37:11Z",
"updated_at": "2021-01-28T07:21:09Z",
"updated_at": "2021-01-29T14:08:47Z",
"pushed_at": "2021-01-22T05:52:26Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-01-29T07:11:16Z",
"pushed_at": "2021-01-13T13:25:10Z",
"updated_at": "2021-01-29T13:59:09Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
@ -40,8 +40,8 @@
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 51,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-27T15:11:45Z",
"updated_at": "2021-01-29T07:57:09Z",
"pushed_at": "2021-01-28T11:08:41Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 14,
"forks": 14,
"watchers": 26,
"updated_at": "2021-01-29T14:57:01Z",
"pushed_at": "2021-01-29T11:41:10Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 18,
"forks": 18,
"watchers": 34,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2021-01-27T16:03:34Z",
"updated_at": "2021-01-29T08:14:15Z",
"updated_at": "2021-01-29T13:35:53Z",
"pushed_at": "2021-01-27T16:48:11Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 32,
"forks": 32,
"watchers": 57,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 35,
"forks": 35,
"watchers": 63,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "1day research effort",
"fork": false,
"created_at": "2021-01-28T02:13:49Z",
"updated_at": "2021-01-29T08:28:08Z",
"updated_at": "2021-01-29T10:49:30Z",
"pushed_at": "2021-01-29T03:21:13Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"watchers": 16,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-28T08:55:04Z",
"updated_at": "2021-01-28T15:22:13Z",
"updated_at": "2021-01-29T14:32:24Z",
"pushed_at": "2021-01-28T09:12:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -274,5 +274,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 334126031,
"name": "CVE-2021-3156",
"full_name": "ltfafei\/CVE-2021-3156",
"owner": {
"login": "ltfafei",
"id": 43526141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43526141?v=4",
"html_url": "https:\/\/github.com\/ltfafei"
},
"html_url": "https:\/\/github.com\/ltfafei\/CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2021-01-29T11:32:33Z",
"updated_at": "2021-01-29T14:19:35Z",
"pushed_at": "2021-01-29T14:19:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -74,6 +74,7 @@ Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalat
- [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp)
- [ph4ntonn/CVE-2021-3156](https://github.com/ph4ntonn/CVE-2021-3156)
- [binw2018/CVE-2021-3156-SCRIPT](https://github.com/binw2018/CVE-2021-3156-SCRIPT)
- [ltfafei/CVE-2021-3156](https://github.com/ltfafei/CVE-2021-3156)
### CVE-2021-3164 (2021-01-21)
@ -230,7 +231,6 @@ A remote code execution vulnerability exists in Windows Remote Desktop Gateway (
</code>
- [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609)
- [ioncodes/BlueGate](https://github.com/ioncodes/BlueGate)
### CVE-2020-0618 (2020-02-11)
@ -2616,6 +2616,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [xkx518/CodeTest](https://github.com/xkx518/CodeTest)
- [securitysqs/poc](https://github.com/securitysqs/poc)
- [ShmilySec/CVE-2020-14882](https://github.com/ShmilySec/CVE-2020-14882)
- [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic)
### CVE-2020-14883 (2020-10-21)
@ -4018,7 +4019,6 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [freeide/CVE-2019-0708-PoC-Exploit](https://github.com/freeide/CVE-2019-0708-PoC-Exploit)
- [robertdavidgraham/rdpscan](https://github.com/robertdavidgraham/rdpscan)
- [closethe/CVE-2019-0708-POC](https://github.com/closethe/CVE-2019-0708-POC)
- [krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
- [Rostelecom-CERT/bluekeepscan](https://github.com/Rostelecom-CERT/bluekeepscan)
- [Leoid/CVE-2019-0708](https://github.com/Leoid/CVE-2019-0708)
- [ht0Ruial/CVE-2019-0708Poc-BatchScanning](https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanning)
@ -4074,6 +4074,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI)
- [AaronWilsonGrylls/CVE-2019-0708-POC](https://github.com/AaronWilsonGrylls/CVE-2019-0708-POC)
- [alexa872/CVE-2019-0708](https://github.com/alexa872/CVE-2019-0708)
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
- [sinlee1/CVE-2019-0708](https://github.com/sinlee1/CVE-2019-0708)
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)