Auto Update 2020/10/17 00:10:27

This commit is contained in:
motikan2010-bot 2020-10-17 00:10:27 +09:00
parent f30b55a374
commit eb8064848d
21 changed files with 84 additions and 79 deletions

View file

@ -13,13 +13,13 @@
"description": "Exploit PoC for Spring RCE issue (CVE-2011-2894)",
"fork": false,
"created_at": "2013-07-31T08:48:19Z",
"updated_at": "2019-10-11T19:03:03Z",
"updated_at": "2020-10-16T14:08:14Z",
"pushed_at": "2020-02-11T15:09:32Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 18,
"forks": 18,
"watchers": 28,
"watchers": 29,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-10-16T08:41:17Z",
"updated_at": "2020-10-16T09:22:41Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 471,
"watchers_count": 471,
"stargazers_count": 472,
"watchers_count": 472,
"forks_count": 242,
"forks": 242,
"watchers": 471,
"watchers": 472,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "RF-14310 \/ CVE-2018-12533 - Payload generator ",
"fork": false,
"created_at": "2018-12-15T09:08:53Z",
"updated_at": "2020-10-14T12:23:55Z",
"updated_at": "2020-10-16T09:10:43Z",
"pushed_at": "2020-10-14T12:23:52Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2020-10-06T01:44:45Z",
"pushed_at": "2020-09-24T06:09:14Z",
"updated_at": "2020-10-16T12:09:47Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 385,
"watchers_count": 385,
"forks_count": 357,

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
"fork": false,
"created_at": "2018-07-20T03:59:18Z",
"updated_at": "2020-10-08T21:02:47Z",
"updated_at": "2020-10-16T14:37:14Z",
"pushed_at": "2018-07-20T12:46:50Z",
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 48,
"forks": 48,
"watchers": 127,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 49,
"forks": 49,
"watchers": 128,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-10-13T06:57:56Z",
"updated_at": "2020-10-16T13:40:14Z",
"pushed_at": "2020-03-23T11:22:54Z",
"stargazers_count": 229,
"watchers_count": 229,
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 49,
"forks": 49,
"watchers": 229,
"watchers": 230,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
"fork": false,
"created_at": "2019-12-25T16:46:11Z",
"updated_at": "2020-09-03T02:59:12Z",
"updated_at": "2020-10-16T10:25:50Z",
"pushed_at": "2019-12-25T16:48:41Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 3,
"forks": 3,
"watchers": 67,
"watchers": 68,
"score": 0
}
]

View file

@ -59,7 +59,7 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-10-14T06:43:25Z",
"updated_at": "2020-10-16T13:51:37Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 502,
"watchers_count": 502,

View file

@ -13,13 +13,13 @@
"description": "Zimbra RCE PoC - CVE-2019-9670 XXE\/SSRF",
"fork": false,
"created_at": "2019-08-16T04:37:11Z",
"updated_at": "2020-09-03T17:21:03Z",
"updated_at": "2020-10-16T09:46:01Z",
"pushed_at": "2019-08-16T05:54:16Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,
"forks": 6,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-04T22:32:03Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"forks_count": 5,
"forks": 5,
"watchers": 10,
"score": 0
},

View file

@ -109,8 +109,8 @@
"pushed_at": "2020-01-31T13:49:06Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 17,
"forks": 17,
"forks_count": 16,
"forks": 16,
"watchers": 72,
"score": 0
}

View file

@ -1416,13 +1416,13 @@
"description": null,
"fork": false,
"created_at": "2020-09-17T01:48:37Z",
"updated_at": "2020-10-06T05:33:45Z",
"updated_at": "2020-10-16T09:42:04Z",
"pushed_at": "2020-09-17T01:55:48Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 7,
"forks": 7,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-07-19T08:24:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-05-18T17:36:18Z",
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 17,
"forks": 17,
"forks_count": 16,
"forks": 16,
"watchers": 107,
"score": 0
},

View file

@ -864,8 +864,8 @@
"description": "Check for events that indicate non compatible devices -> CVE-2020-1472",
"fork": false,
"created_at": "2020-10-15T15:02:53Z",
"updated_at": "2020-10-15T15:50:41Z",
"pushed_at": "2020-10-15T15:50:38Z",
"updated_at": "2020-10-16T14:57:47Z",
"pushed_at": "2020-10-16T14:57:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-10T02:38:15Z",
"updated_at": "2020-10-16T03:33:03Z",
"updated_at": "2020-10-16T12:20:11Z",
"pushed_at": "2020-10-09T16:39:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2020-10-16T08:48:53Z",
"updated_at": "2020-10-16T15:00:26Z",
"pushed_at": "2020-10-15T02:57:22Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 19,
"forks": 19,
"watchers": 173,
"watchers": 174,
"score": 0
},
{
@ -59,8 +59,8 @@
"description": "Minor powershell script that checks for vulnerable interfaces.",
"fork": false,
"created_at": "2020-10-14T13:30:38Z",
"updated_at": "2020-10-14T22:33:21Z",
"pushed_at": "2020-10-14T14:00:26Z",
"updated_at": "2020-10-16T09:20:02Z",
"pushed_at": "2020-10-16T09:20:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
@ -86,8 +86,8 @@
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"forks_count": 7,
"forks": 7,
"watchers": 14,
"score": 0
},
@ -132,8 +132,8 @@
"pushed_at": "2020-10-16T00:15:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
@ -197,8 +197,8 @@
"description": "PoC Bad Neighbor BSOD exploit",
"fork": false,
"created_at": "2020-10-16T06:27:24Z",
"updated_at": "2020-10-16T07:34:56Z",
"pushed_at": "2020-10-16T07:34:55Z",
"updated_at": "2020-10-16T11:17:23Z",
"pushed_at": "2020-10-16T11:17:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
"fork": false,
"created_at": "2020-10-15T14:32:25Z",
"updated_at": "2020-10-16T09:09:52Z",
"updated_at": "2020-10-16T15:04:27Z",
"pushed_at": "2020-10-15T14:57:31Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 11,
"forks": 11,
"watchers": 42,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 17,
"forks": 17,
"watchers": 60,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-10-16T08:06:30Z",
"updated_at": "2020-10-16T09:30:06Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 49,
"forks": 49,
"watchers": 207,
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 50,
"forks": 50,
"watchers": 208,
"score": 0
},
{

View file

@ -979,13 +979,13 @@
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
"fork": false,
"created_at": "2020-07-10T15:33:00Z",
"updated_at": "2020-10-13T11:11:38Z",
"updated_at": "2020-10-16T12:16:05Z",
"pushed_at": "2020-07-12T10:36:20Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 10,
"forks": 10,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

View file

@ -2231,6 +2231,11 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
- [eriknl/CVE-2020-16152](https://github.com/eriknl/CVE-2020-16152)
### CVE-2020-16270
<code>
OLIMPOKS before 5.1.0 allows Auth/Admin ErrorMessage XSS.
</code>
- [Security-AVS/CVE-2020-16270](https://github.com/Security-AVS/CVE-2020-16270)
### CVE-2020-16898