Auto Update 2020/02/19 18:07:43

This commit is contained in:
motikan2010-bot 2020-02-19 18:07:43 +09:00
parent 0280ecc707
commit eb5f8c64de
35 changed files with 214 additions and 142 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-19T01:30:17Z",
"updated_at": "2020-02-19T08:11:12Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 13,
"forks": 13,
"watchers": 55,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 14,
"forks": 14,
"watchers": 71,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2015-12-15T05:42:02Z",
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 98,
"forks": 98,
"forks_count": 97,
"forks": 97,
"watchers": 128,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-19T01:30:17Z",
"updated_at": "2020-02-19T08:11:12Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 13,
"forks": 13,
"watchers": 55,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 14,
"forks": 14,
"watchers": 71,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "ImaegMagick Code Execution (CVE-2016-3714)",
"fork": false,
"created_at": "2016-05-07T08:21:27Z",
"updated_at": "2019-10-22T03:04:58Z",
"updated_at": "2020-02-19T08:01:38Z",
"pushed_at": "2016-05-07T17:26:47Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 35,
"forks": 35,
"watchers": 60,
"watchers": 61,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2020-02-16T13:43:29Z",
"updated_at": "2020-02-19T06:24:25Z",
"pushed_at": "2017-09-27T02:35:13Z",
"stargazers_count": 819,
"watchers_count": 819,
"stargazers_count": 820,
"watchers_count": 820,
"forks_count": 389,
"forks": 389,
"watchers": 819,
"watchers": 820,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 611,
"watchers_count": 611,
"forks_count": 274,
"forks": 274,
"forks_count": 273,
"forks": 273,
"watchers": 611,
"score": 0
},

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-02-17T04:23:18Z",
"updated_at": "2020-02-19T07:39:33Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 51,
"forks": 51,
"watchers": 155,
"watchers": 156,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-19T01:30:17Z",
"updated_at": "2020-02-19T08:11:12Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 13,
"forks": 13,
"watchers": 55,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 14,
"forks": 14,
"watchers": 71,
"score": 0
}
]

View file

@ -155,8 +155,8 @@
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 302,
"watchers_count": 302,
"forks_count": 124,
"forks": 124,
"forks_count": 123,
"forks": 123,
"watchers": 302,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-25T16:09:21Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 15,
"forks": 15,
"forks_count": 14,
"forks": 14,
"watchers": 19,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": " An exploit for Apache Struts CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T01:53:30Z",
"updated_at": "2020-01-02T11:11:49Z",
"updated_at": "2020-02-19T03:58:36Z",
"pushed_at": "2018-08-26T02:31:39Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"forks_count": 100,
"forks": 100,
"watchers": 285,
"watchers": 286,
"score": 0
},
{

View file

@ -44,5 +44,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 241542443,
"name": "CVE-2018-12613-phpMyAdmin",
"full_name": "eastmountyxz\/CVE-2018-12613-phpMyAdmin",
"owner": {
"login": "eastmountyxz",
"id": 53172375,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
"html_url": "https:\/\/github.com\/eastmountyxz"
},
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-12613-phpMyAdmin",
"description": "这篇文章将分享一个phpMyAdmin 4.8.1版本的文件包含漏洞,从配置到原理,再到漏洞复现进行讲解,更重要的是让大家了解这些真实漏洞背后的知识。基础性文章,希望对您有所帮助!",
"fork": false,
"created_at": "2020-02-19T05:41:11Z",
"updated_at": "2020-02-19T05:41:15Z",
"pushed_at": "2020-02-19T05:41:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 59,
"forks": 59,
"forks_count": 60,
"forks": 60,
"watchers": 194,
"score": 0
},

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-19T03:05:17Z",
"updated_at": "2020-02-19T08:11:12Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 13,
"forks": 13,
"watchers": 56,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 14,
"forks": 14,
"watchers": 71,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2020-02-16T08:46:36Z",
"updated_at": "2020-02-19T03:58:46Z",
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 404,
"watchers_count": 404,
"stargazers_count": 405,
"watchers_count": 405,
"forks_count": 127,
"forks": 127,
"watchers": 404,
"watchers": 405,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-8021 Proof-Of-Concept and Exploit ",
"fork": false,
"created_at": "2018-12-02T19:01:17Z",
"updated_at": "2020-02-18T23:22:45Z",
"updated_at": "2020-02-19T05:50:18Z",
"pushed_at": "2018-12-03T21:13:00Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 17,
"forks": 17,
"watchers": 95,
"watchers": 96,
"score": 0
}
]

View file

@ -1029,8 +1029,8 @@
"pushed_at": "2019-05-30T02:43:06Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 26,
"forks": 26,
"forks_count": 27,
"forks": 27,
"watchers": 72,
"score": 0
},
@ -1374,8 +1374,8 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 695,
"watchers_count": 695,
"forks_count": 161,
"forks": 161,
"forks_count": 162,
"forks": 162,
"watchers": 695,
"score": 0
},
@ -1581,8 +1581,8 @@
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1005,
"watchers_count": 1005,
"forks_count": 344,
"forks": 344,
"forks_count": 345,
"forks": 345,
"watchers": 1005,
"score": 0
},
@ -2551,5 +2551,28 @@
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 241542314,
"name": "CVE-2019-0708-Windows",
"full_name": "eastmountyxz\/CVE-2019-0708-Windows",
"owner": {
"login": "eastmountyxz",
"id": 53172375,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
"html_url": "https:\/\/github.com\/eastmountyxz"
},
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2019-0708-Windows",
"description": "这篇文章将分享Windows远程桌面服务漏洞CVE-2019-0708并详细讲解该漏洞及防御措施。作者作为网络安全的小白分享一些自学基础教程给大家主要是关于安全工具和实践操作的在线笔记希望您们喜欢。同时更希望您能与我一起操作和进步后续将深入学习网络安全和系统安全知识并分享相关实验。总之希望该系列文章对博友有所帮助写文不易大神们不喜勿喷谢谢",
"fork": false,
"created_at": "2020-02-19T05:40:22Z",
"updated_at": "2020-02-19T05:40:26Z",
"pushed_at": "2020-02-19T05:40:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-02-14T23:14:23Z",
"updated_at": "2020-02-19T03:56:24Z",
"pushed_at": "2019-06-28T03:57:26Z",
"stargazers_count": 188,
"watchers_count": 188,
"stargazers_count": 189,
"watchers_count": 189,
"forks_count": 33,
"forks": 33,
"watchers": 188,
"watchers": 189,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-02-17T17:14:49Z",
"updated_at": "2020-02-19T06:52:45Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1534,
"watchers_count": 1534,
"stargazers_count": 1535,
"watchers_count": 1535,
"forks_count": 213,
"forks": 213,
"watchers": 1534,
"watchers": 1535,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2019-12-31T08:21:44Z",
"updated_at": "2020-02-19T05:46:18Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 14,
"forks": 14,
"watchers": 61,
"watchers": 62,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "sploit",
"fork": false,
"created_at": "2019-12-21T00:44:25Z",
"updated_at": "2020-02-10T07:39:59Z",
"updated_at": "2020-02-19T05:26:55Z",
"pushed_at": "2019-12-21T00:56:27Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 14,
"forks": 14,
"watchers": 62,
"watchers": 64,
"score": 0
}
]

View file

@ -266,13 +266,13 @@
"description": "Containerized and deployable use of the CVE-2019-14287 vuln. View README.md for more.",
"fork": false,
"created_at": "2020-02-09T21:05:20Z",
"updated_at": "2020-02-09T21:28:12Z",
"updated_at": "2020-02-19T07:14:32Z",
"pushed_at": "2020-02-09T21:28:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
"fork": false,
"created_at": "2020-02-07T02:41:44Z",
"updated_at": "2020-02-13T15:13:49Z",
"pushed_at": "2020-02-07T17:58:39Z",
"updated_at": "2020-02-19T03:47:35Z",
"pushed_at": "2020-02-19T03:47:33Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 4,

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-19T03:05:17Z",
"updated_at": "2020-02-19T08:11:12Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 13,
"forks": 13,
"watchers": 56,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 14,
"forks": 14,
"watchers": 71,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-02-17T04:23:18Z",
"updated_at": "2020-02-19T07:39:33Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 51,
"forks": 51,
"watchers": 155,
"watchers": 156,
"score": 0
},
{

View file

@ -21,5 +21,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 241526956,
"name": "CVE-2019-2729-Exploit",
"full_name": "ruthlezs\/CVE-2019-2729-Exploit",
"owner": {
"login": "ruthlezs",
"id": 15887791,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
"html_url": "https:\/\/github.com\/ruthlezs"
},
"html_url": "https:\/\/github.com\/ruthlezs\/CVE-2019-2729-Exploit",
"description": "CVE-2019-2729 Exploit Script",
"fork": false,
"created_at": "2020-02-19T03:49:51Z",
"updated_at": "2020-02-19T08:48:05Z",
"pushed_at": "2020-02-19T08:48:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2020-02-15T02:00:56Z",
"updated_at": "2020-02-19T08:13:33Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 498,
"watchers_count": 498,
"forks_count": 100,
"forks": 100,
"watchers": 498,
"stargazers_count": 499,
"watchers_count": 499,
"forks_count": 101,
"forks": 101,
"watchers": 499,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4",
"fork": false,
"created_at": "2020-02-02T16:42:32Z",
"updated_at": "2020-02-18T06:40:00Z",
"updated_at": "2020-02-19T03:35:54Z",
"pushed_at": "2020-02-03T15:11:25Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 9,
"forks": 9,
"watchers": 54,
"watchers": 55,
"score": 0
},
{

View file

@ -243,13 +243,13 @@
"description": "Proof of Concept for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-16T23:44:37Z",
"updated_at": "2020-02-17T07:56:24Z",
"updated_at": "2020-02-19T07:48:56Z",
"pushed_at": "2020-01-17T16:32:39Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 10,
"forks": 10,
"watchers": 52,
"watchers": 53,
"score": 0
},
{
@ -496,8 +496,8 @@
"description": "PoC for \"CurveBall\" CVE-2020-0601",
"fork": false,
"created_at": "2020-01-25T03:11:36Z",
"updated_at": "2020-02-02T02:13:37Z",
"pushed_at": "2020-02-02T02:06:06Z",
"updated_at": "2020-02-19T04:00:05Z",
"pushed_at": "2020-02-19T04:00:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -680,8 +680,8 @@
"description": "CVE-2020-0601 proof of concept",
"fork": false,
"created_at": "2020-02-18T16:36:49Z",
"updated_at": "2020-02-18T18:03:05Z",
"pushed_at": "2020-02-18T16:37:19Z",
"updated_at": "2020-02-19T08:46:38Z",
"pushed_at": "2020-02-19T08:46:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-02-18T13:17:17Z",
"updated_at": "2020-02-19T03:38:41Z",
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 45,
"forks": 45,
"watchers": 184,
"watchers": 185,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SQL Server Reporting Services(CVE-2020-0618)中的RCE",
"fork": false,
"created_at": "2020-02-15T06:40:23Z",
"updated_at": "2020-02-19T03:00:51Z",
"updated_at": "2020-02-19T08:56:59Z",
"pushed_at": "2020-02-15T06:41:54Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 10,
"forks": 10,
"watchers": 59,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 11,
"forks": 11,
"watchers": 75,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2020-0618 Honeypot",
"fork": false,
"created_at": "2020-02-18T16:17:19Z",
"updated_at": "2020-02-18T22:50:49Z",
"updated_at": "2020-02-19T07:57:36Z",
"pushed_at": "2020-02-18T22:50:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2020-02-19T01:11:13Z",
"updated_at": "2020-02-19T08:04:06Z",
"pushed_at": "2020-02-11T21:34:28Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 24,
"forks": 24,
"watchers": 148,
"watchers": 149,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept code for CVE-2020-0728",
"fork": false,
"created_at": "2020-02-12T22:32:28Z",
"updated_at": "2020-02-18T02:36:26Z",
"updated_at": "2020-02-19T06:12:01Z",
"pushed_at": "2020-02-12T22:50:22Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 7,
"forks": 7,
"watchers": 29,
"watchers": 30,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2020-02-18T11:53:49Z",
"updated_at": "2020-02-19T08:45:17Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 4,
"forks": 4,
"watchers": 39,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 5,
"forks": 5,
"watchers": 41,
"score": 0
},
{

View file

@ -3100,6 +3100,7 @@
### CVE-2018-12613
- [0x00-0x00/CVE-2018-12613](https://github.com/0x00-0x00/CVE-2018-12613)
- [ivanitlearning/CVE-2018-12613](https://github.com/ivanitlearning/CVE-2018-12613)
- [eastmountyxz/CVE-2018-12613-phpMyAdmin](https://github.com/eastmountyxz/CVE-2018-12613-phpMyAdmin)
### CVE-2018-1270
- [CaledoniaProject/CVE-2018-1270](https://github.com/CaledoniaProject/CVE-2018-1270)
@ -4339,6 +4340,7 @@
- [ulisesrc/-2-CVE-2019-0708](https://github.com/ulisesrc/-2-CVE-2019-0708)
- [worawit/CVE-2019-0708](https://github.com/worawit/CVE-2019-0708)
- [cbwang505/CVE-2019-0708-EXP-Windows](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows)
- [eastmountyxz/CVE-2019-0708-Windows](https://github.com/eastmountyxz/CVE-2019-0708-Windows)
### CVE-2019-0709
- [YHZX2013/CVE-2019-0709](https://github.com/YHZX2013/CVE-2019-0709)
@ -5228,6 +5230,7 @@
### CVE-2019-2729
- [waffl3ss/CVE-2019-2729](https://github.com/waffl3ss/CVE-2019-2729)
- [ruthlezs/CVE-2019-2729-Exploit](https://github.com/ruthlezs/CVE-2019-2729-Exploit)
### CVE-2019-2888
- [21superman/weblogic_cve-2019-2888](https://github.com/21superman/weblogic_cve-2019-2888)