Auto Update 2019/12/30 00:30:01

This commit is contained in:
motikan2010-bot 2019-12-30 00:30:01 +09:00
parent 46d5697e6b
commit d8d39f2d92
22 changed files with 103 additions and 80 deletions

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2019-12-28T14:57:04Z",
"updated_at": "2019-12-29T12:11:33Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2230,
"watchers_count": 2230,
"stargazers_count": 2231,
"watchers_count": 2231,
"forks_count": 482,
"forks": 482,
"watchers": 2230,
"watchers": 2231,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Takedown WordPress sites using long passwords (CVE-2014-9016)",
"fork": false,
"created_at": "2019-12-20T18:47:36Z",
"updated_at": "2019-12-20T18:51:42Z",
"updated_at": "2019-12-29T10:26:37Z",
"pushed_at": "2019-12-20T18:51:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-04-07T00:30:52Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 19,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1",
"fork": false,
"created_at": "2018-10-08T18:12:03Z",
"updated_at": "2019-08-21T02:53:43Z",
"updated_at": "2019-12-29T13:20:57Z",
"pushed_at": "2018-10-09T16:44:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 5,
"forks": 5,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-06-11T17:08:51Z",
"stargazers_count": 377,
"watchers_count": 377,
"forks_count": 105,
"forks": 105,
"forks_count": 106,
"forks": 106,
"watchers": 377,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2019-12-29T04:12:41Z",
"updated_at": "2019-12-29T11:31:46Z",
"pushed_at": "2019-12-26T22:21:12Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 25,
"forks": 25,
"watchers": 125,
"watchers": 126,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 319,
"watchers_count": 319,
"forks_count": 113,
"forks": 113,
"forks_count": 114,
"forks": 114,
"watchers": 319,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-12-13T02:24:39Z",
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 50,
"forks": 50,
"forks_count": 49,
"forks": 49,
"watchers": 96,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "exploit camera with vuln cve-2018-9995 ( Novo, CeNova, QSee, Pulnix, XVR 5 in 1 (title: \"XVR Login\"), Securus, - Security. Never Compromise !! - Night OWL, DVR Login, HVR Login, MDVR Login )",
"fork": false,
"created_at": "2018-06-30T10:54:40Z",
"updated_at": "2018-06-30T10:57:12Z",
"updated_at": "2019-12-29T09:58:07Z",
"pushed_at": "2018-06-30T10:55:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
"fork": false,
"created_at": "2018-09-23T20:58:40Z",
"updated_at": "2019-11-15T06:28:44Z",
"updated_at": "2019-12-29T09:54:57Z",
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 28,
"forks": 28,
"watchers": 58,
"watchers": 59,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-12-26T06:58:56Z",
"updated_at": "2019-12-29T04:58:52Z",
"updated_at": "2019-12-29T13:49:28Z",
"pushed_at": "2019-12-26T08:44:54Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 2,
"forks": 2,
"watchers": 14,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks": 3,
"watchers": 18,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2019-12-28T18:24:00Z",
"updated_at": "2019-12-29T10:54:09Z",
"pushed_at": "2019-12-28T18:23:58Z",
"stargazers_count": 534,
"watchers_count": 534,

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2019-12-23T15:18:53Z",
"updated_at": "2019-12-29T10:01:50Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 619,
"watchers_count": 619,
"stargazers_count": 620,
"watchers_count": 620,
"forks_count": 53,
"forks": 53,
"watchers": 619,
"watchers": 620,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "sploit",
"fork": false,
"created_at": "2019-12-21T00:44:25Z",
"updated_at": "2019-12-28T18:40:42Z",
"updated_at": "2019-12-29T14:57:31Z",
"pushed_at": "2019-12-21T00:56:27Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 12,
"forks": 12,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2019-12-28T02:10:54Z",
"updated_at": "2019-12-29T09:29:26Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 203,
"watchers_count": 203,
"forks_count": 70,
"forks": 70,
"watchers": 202,
"watchers": 203,
"score": 0
},
{

View file

@ -178,9 +178,32 @@
"pushed_at": "2019-12-25T13:48:27Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 230738228,
"name": "webmin_CVE-2019-15107",
"full_name": "ChakoMoonFish\/webmin_CVE-2019-15107",
"owner": {
"login": "ChakoMoonFish",
"id": 5085275,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5085275?v=4",
"html_url": "https:\/\/github.com\/ChakoMoonFish"
},
"html_url": "https:\/\/github.com\/ChakoMoonFish\/webmin_CVE-2019-15107",
"description": "webmin_CVE-2019-15107",
"fork": false,
"created_at": "2019-12-29T11:02:35Z",
"updated_at": "2019-12-29T11:03:18Z",
"pushed_at": "2019-12-29T11:03:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-12-21T17:31:56Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 21,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
"fork": false,
"created_at": "2019-12-25T16:46:11Z",
"updated_at": "2019-12-29T08:56:13Z",
"updated_at": "2019-12-29T13:49:01Z",
"pushed_at": "2019-12-25T16:48:41Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 4,
"forks": 4,
"watchers": 41,
"watchers": 42,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2019-12-28T02:18:53Z",
"updated_at": "2019-12-29T10:51:35Z",
"pushed_at": "2019-12-18T15:32:15Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 16,
"forks": 16,
"watchers": 100,
"watchers": 101,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "FreeFTPd 1.0.8 Post-Authentication Buffer Overflow via SIZE",
"fork": false,
"created_at": "2019-11-28T18:24:02Z",
"updated_at": "2019-12-29T01:28:17Z",
"updated_at": "2019-12-29T14:47:34Z",
"pushed_at": "2019-12-20T09:44:06Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"forks": 7,
"watchers": 26,
"watchers": 27,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
"fork": false,
"created_at": "2019-12-08T10:44:51Z",
"updated_at": "2019-12-28T07:15:14Z",
"updated_at": "2019-12-29T14:59:09Z",
"pushed_at": "2019-12-08T17:55:01Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 4,
"forks": 4,
"watchers": 26,
"watchers": 27,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)",
"fork": false,
"created_at": "2019-12-21T04:30:34Z",
"updated_at": "2019-12-28T01:55:01Z",
"updated_at": "2019-12-29T11:18:12Z",
"pushed_at": "2019-12-24T12:31:47Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 7,
"forks": 7,
"watchers": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 9,
"forks": 9,
"watchers": 76,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1987",
"fork": false,
"created_at": "2019-02-17T10:22:01Z",
"updated_at": "2019-11-23T05:18:10Z",
"updated_at": "2019-12-29T12:35:16Z",
"pushed_at": "2019-03-02T19:54:06Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"watchers": 13,
"score": 0
}
]