Auto Update 2020/04/03 06:08:57

This commit is contained in:
motikan2010-bot 2020-04-03 06:08:57 +09:00
parent 9807de3e8b
commit decf82d0f4
20 changed files with 108 additions and 92 deletions

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-29T10:28:44Z",
"stargazers_count": 462,
"watchers_count": 462,
"forks_count": 117,
"forks": 117,
"forks_count": 116,
"forks": 116,
"watchers": 462,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-03-06T10:52:19Z",
"stargazers_count": 388,
"watchers_count": 388,
"forks_count": 117,
"forks": 117,
"forks_count": 118,
"forks": 118,
"watchers": 388,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "exp of CVE-2018-15982",
"fork": false,
"created_at": "2018-12-10T04:53:31Z",
"updated_at": "2020-03-12T06:36:08Z",
"updated_at": "2020-04-02T18:50:35Z",
"pushed_at": "2019-01-04T09:29:01Z",
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 61,
"forks": 61,
"watchers": 170,
"stargazers_count": 171,
"watchers_count": 171,
"forks_count": 62,
"forks": 62,
"watchers": 171,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 324,
"watchers_count": 324,
"forks_count": 113,
"forks": 113,
"forks_count": 112,
"forks": 112,
"watchers": 324,
"score": 0
},
@ -63,8 +63,8 @@
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 411,
"watchers_count": 411,
"forks_count": 135,
"forks": 135,
"forks_count": 134,
"forks": 134,
"watchers": 411,
"score": 0
},

View file

@ -109,8 +109,8 @@
"pushed_at": "2018-07-12T08:35:13Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 11,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2018-12-27T06:30:32Z",
"updated_at": "2020-04-02T12:34:40Z",
"updated_at": "2020-04-02T18:51:18Z",
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 291,
"watchers_count": 291,
"forks_count": 110,
"forks": 110,
"watchers": 291,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 111,
"forks": 111,
"watchers": 292,
"score": 0
},
{

View file

@ -1144,8 +1144,8 @@
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1094,
"watchers_count": 1094,
"forks_count": 371,
"forks": 371,
"forks_count": 370,
"forks": 370,
"watchers": 1094,
"score": 0
},
@ -1558,8 +1558,8 @@
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1015,
"watchers_count": 1015,
"forks_count": 349,
"forks": 349,
"forks_count": 348,
"forks": 348,
"watchers": 1015,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2020-04-01T13:37:17Z",
"updated_at": "2020-04-02T18:42:45Z",
"pushed_at": "2020-03-20T09:11:20Z",
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 54,
"forks": 54,
"watchers": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 55,
"forks": 55,
"watchers": 156,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2020-03-31T17:48:27Z",
"updated_at": "2020-04-02T17:08:17Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 227,
"watchers_count": 227,
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 55,
"forks": 55,
"watchers": 227,
"watchers": 228,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2020-04-01T13:40:04Z",
"updated_at": "2020-04-02T19:10:13Z",
"pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 28,
"forks": 28,
"watchers": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 29,
"forks": 29,
"watchers": 83,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2020-04-01T13:40:40Z",
"updated_at": "2020-04-02T15:23:43Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 36,
"forks": 36,
"watchers": 123,
"watchers": 124,
"score": 0
},
{

View file

@ -155,8 +155,8 @@
"pushed_at": "2020-02-17T13:28:02Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 20,
"forks": 20,
"forks_count": 21,
"forks": 21,
"watchers": 77,
"score": 0
},

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-04-02T07:08:55Z",
"updated_at": "2020-04-02T18:01:43Z",
"pushed_at": "2019-06-24T06:06:48Z",
"stargazers_count": 506,
"watchers_count": 506,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 113,
"forks": 113,
"watchers": 506,
"watchers": 508,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2020-04-02T12:16:28Z",
"updated_at": "2020-04-02T18:11:52Z",
"pushed_at": "2020-04-01T05:57:35Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 5,
"forks": 5,
"watchers": 48,
"watchers": 49,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 153,
"watchers_count": 153,
"forks_count": 33,
"forks": 33,
"forks_count": 34,
"forks": 34,
"watchers": 153,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-03-31T20:34:24Z",
"updated_at": "2020-04-02T18:44:05Z",
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 60,
"forks": 60,
"watchers": 167,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 61,
"forks": 61,
"watchers": 168,
"score": 0
},
{
@ -86,8 +86,8 @@
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 38,
"forks": 38,
"forks_count": 39,
"forks": 39,
"watchers": 102,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-04-02T13:19:16Z",
"updated_at": "2020-04-02T15:37:37Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 413,
"watchers_count": 413,
"stargazers_count": 414,
"watchers_count": 414,
"forks_count": 116,
"forks": 116,
"watchers": 413,
"watchers": 414,
"score": 0
},
{
@ -979,13 +979,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-02T14:53:44Z",
"updated_at": "2020-04-02T19:54:30Z",
"pushed_at": "2020-03-31T20:07:46Z",
"stargazers_count": 724,
"watchers_count": 724,
"forks_count": 184,
"forks": 184,
"watchers": 724,
"stargazers_count": 726,
"watchers_count": 726,
"forks_count": 188,
"forks": 188,
"watchers": 726,
"score": 0
},
{
@ -1006,8 +1006,8 @@
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 32,
"forks": 32,
"forks_count": 33,
"forks": 33,
"watchers": 111,
"score": 0
},
@ -1148,5 +1148,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 252494911,
"name": "CVE-2020-0796-EXP",
"full_name": "LabDookhtegan\/CVE-2020-0796-EXP",
"owner": {
"login": "LabDookhtegan",
"id": 63061898,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/63061898?v=4",
"html_url": "https:\/\/github.com\/LabDookhtegan"
},
"html_url": "https:\/\/github.com\/LabDookhtegan\/CVE-2020-0796-EXP",
"description": "CVE-2020-0796-EXP",
"fork": false,
"created_at": "2020-04-02T15:32:10Z",
"updated_at": "2020-04-02T15:46:28Z",
"pushed_at": "2020-04-02T15:45:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-03-26T01:34:38Z",
"updated_at": "2020-04-01T11:52:14Z",
"updated_at": "2020-04-02T15:50:37Z",
"pushed_at": "2020-03-31T10:07:08Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 21,
"forks": 21,
"watchers": 61,
"watchers": 62,
"score": 0
}
]

View file

@ -36,8 +36,8 @@
"description": "nmap script to detect CVE-2020-8515 on Draytek Devices",
"fork": false,
"created_at": "2020-03-31T05:40:11Z",
"updated_at": "2020-03-31T05:41:12Z",
"pushed_at": "2020-03-31T05:41:09Z",
"updated_at": "2020-04-02T18:23:10Z",
"pushed_at": "2020-04-02T18:23:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -215,6 +215,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [jiansiting/CVE-2020-0796](https://github.com/jiansiting/CVE-2020-0796)
- [wurmx64/CVE-2020-0796](https://github.com/wurmx64/CVE-2020-0796)
- [eastmountyxz/CVE-2020-0796-SMB](https://github.com/eastmountyxz/CVE-2020-0796-SMB)
- [LabDookhtegan/CVE-2020-0796-EXP](https://github.com/LabDookhtegan/CVE-2020-0796-EXP)
### CVE-2020-0976
- [ericzhong2010/GUI-Check-CVE-2020-0976](https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976)
@ -12883,14 +12884,6 @@ Directory traversal vulnerability in ftpd in QPC QVT/Net 4.0 and AVT/Term 5.0 al
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
### CVE-2001-0758
<code>
Directory traversal vulnerability in Shambala 4.5 allows remote attackers to escape the FTP root directory via &quot;CWD ...&quot; command.
</code>
- [alt3kx/CVE-2001-0758](https://github.com/alt3kx/CVE-2001-0758)
### CVE-2001-0931
<code>