Auto Update 2019/12/28 18:30:02

This commit is contained in:
motikan2010-bot 2019-12-28 18:30:02 +09:00
parent 0f863489bf
commit e3ad1bd86b
12 changed files with 48 additions and 48 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-4210+Redis未授权访问",
"fork": false,
"created_at": "2017-03-10T02:09:48Z",
"updated_at": "2019-12-06T05:48:39Z",
"updated_at": "2019-12-28T08:56:28Z",
"pushed_at": "2017-03-10T08:35:42Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 27,
"forks": 27,
"watchers": 57,
"watchers": 58,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Spectre exploit",
"fork": false,
"created_at": "2018-01-09T05:06:12Z",
"updated_at": "2019-10-03T07:40:01Z",
"updated_at": "2019-12-28T05:08:07Z",
"pushed_at": "2018-01-09T22:27:25Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 13,
"forks": 13,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2019-12-27T06:36:08Z",
"updated_at": "2019-12-28T08:10:09Z",
"pushed_at": "2019-12-26T22:21:12Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 25,
"forks": 25,
"watchers": 123,
"watchers": 124,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2019-12-15T23:35:39Z",
"updated_at": "2019-12-28T05:48:40Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"forks_count": 189,
"forks": 189,
"watchers": 420,
"watchers": 421,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
"fork": false,
"created_at": "2019-04-16T14:32:03Z",
"updated_at": "2019-12-25T00:20:01Z",
"updated_at": "2019-12-28T06:15:24Z",
"pushed_at": "2019-04-17T02:42:03Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 19,
"forks": 19,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -1416,13 +1416,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2019-12-26T04:02:23Z",
"updated_at": "2019-12-28T03:44:05Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 676,
"watchers_count": 676,
"stargazers_count": 677,
"watchers_count": 677,
"forks_count": 156,
"forks": 156,
"watchers": 676,
"watchers": 677,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "sploit",
"fork": false,
"created_at": "2019-12-21T00:44:25Z",
"updated_at": "2019-12-27T20:54:47Z",
"updated_at": "2019-12-28T06:18:20Z",
"pushed_at": "2019-12-21T00:56:27Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 12,
"forks": 12,
"watchers": 52,
"watchers": 53,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2019-12-27T22:40:58Z",
"updated_at": "2019-12-28T03:25:52Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 49,
"forks": 49,
"watchers": 215,
"watchers": 216,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
"fork": false,
"created_at": "2019-12-25T16:46:11Z",
"updated_at": "2019-12-28T03:12:26Z",
"updated_at": "2019-12-28T08:05:53Z",
"pushed_at": "2019-12-25T16:48:41Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 3,
"forks": 3,
"watchers": 34,
"watchers": 39,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "FreeFTPd 1.0.8 Post-Authentication Buffer Overflow via SIZE",
"fork": false,
"created_at": "2019-11-28T18:24:02Z",
"updated_at": "2019-12-27T13:48:50Z",
"updated_at": "2019-12-28T03:26:19Z",
"pushed_at": "2019-12-20T09:44:06Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 6,
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
"fork": false,
"created_at": "2019-12-08T10:44:51Z",
"updated_at": "2019-12-27T08:44:48Z",
"updated_at": "2019-12-28T07:15:14Z",
"pushed_at": "2019-12-08T17:55:01Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 4,
"forks": 4,
"watchers": 25,
"watchers": 26,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic_cve-2019-2888",
"fork": false,
"created_at": "2019-10-28T06:10:44Z",
"updated_at": "2019-12-16T09:56:38Z",
"updated_at": "2019-12-28T07:17:07Z",
"pushed_at": "2019-10-28T06:13:23Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"forks": 7,
"watchers": 26,
"watchers": 27,
"score": 0
},
{