Auto Update 2020/05/12 06:07:31

This commit is contained in:
motikan2010-bot 2020-05-12 06:07:31 +09:00
parent 1be483b56a
commit f1dcc62c7b
27 changed files with 227 additions and 107 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 257,
"watchers_count": 257,
"forks_count": 81,
"forks": 81,
"forks_count": 82,
"forks": 82,
"watchers": 257,
"score": 0
},

View file

@ -136,5 +136,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263118464,
"name": "TKEY-remote-DoS-vulnerability-exploit",
"full_name": "xycloops123\/TKEY-remote-DoS-vulnerability-exploit",
"owner": {
"login": "xycloops123",
"id": 7406483,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7406483?v=4",
"html_url": "https:\/\/github.com\/xycloops123"
},
"html_url": "https:\/\/github.com\/xycloops123\/TKEY-remote-DoS-vulnerability-exploit",
"description": "Exploit code for CVE-2015-5477 POC",
"fork": false,
"created_at": "2020-05-11T18:01:09Z",
"updated_at": "2020-05-11T18:06:45Z",
"pushed_at": "2020-05-11T18:06:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -665,5 +665,28 @@
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 263137313,
"name": "Dirty-Cow-Explanation-CVE-2016-5195-",
"full_name": "shanuka-ashen\/Dirty-Cow-Explanation-CVE-2016-5195-",
"owner": {
"login": "shanuka-ashen",
"id": 61181660,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/61181660?v=4",
"html_url": "https:\/\/github.com\/shanuka-ashen"
},
"html_url": "https:\/\/github.com\/shanuka-ashen\/Dirty-Cow-Explanation-CVE-2016-5195-",
"description": null,
"fork": false,
"created_at": "2020-05-11T19:25:26Z",
"updated_at": "2020-05-11T19:26:44Z",
"pushed_at": "2020-05-11T19:26:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-05-10T10:10:06Z",
"updated_at": "2020-05-11T16:58:09Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 64,
"forks": 64,
"watchers": 189,
"watchers": 190,
"score": 0
},
{

View file

@ -220,13 +220,13 @@
"description": "cve-2018-10933 libssh authentication bypass",
"fork": false,
"created_at": "2018-10-18T19:13:45Z",
"updated_at": "2020-04-20T11:34:40Z",
"updated_at": "2020-05-11T18:53:35Z",
"pushed_at": "2018-10-21T21:24:29Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 29,
"forks": 29,
"watchers": 87,
"watchers": 88,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Creating a vulnerable environment and the PoC ",
"fork": false,
"created_at": "2018-08-23T20:06:17Z",
"updated_at": "2019-11-25T21:32:38Z",
"updated_at": "2020-05-11T21:00:33Z",
"pushed_at": "2019-11-25T21:21:55Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,
"forks": 7,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2020-04-21T00:37:45Z",
"updated_at": "2020-05-11T17:57:42Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 54,
"forks": 54,
"watchers": 196,
"watchers": 197,
"score": 0
}
]

View file

@ -2386,8 +2386,8 @@
"pushed_at": "2019-10-16T01:04:12Z",
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 152,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 93,
"forks": 93,
"forks_count": 94,
"forks": 94,
"watchers": 216,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-07-08T18:25:12Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 10,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "USB device fuzzing on Android Phone",
"fork": false,
"created_at": "2020-04-05T05:45:29Z",
"updated_at": "2020-05-10T21:36:16Z",
"pushed_at": "2020-04-05T05:48:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2020-05-11T21:06:31Z",
"pushed_at": "2020-05-11T21:06:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -274,5 +274,51 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 263100309,
"name": "Exploit-CVE-2019-14287",
"full_name": "SachinthaDeSilva-cmd\/Exploit-CVE-2019-14287",
"owner": {
"login": "SachinthaDeSilva-cmd",
"id": 65182737,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/65182737?v=4",
"html_url": "https:\/\/github.com\/SachinthaDeSilva-cmd"
},
"html_url": "https:\/\/github.com\/SachinthaDeSilva-cmd\/Exploit-CVE-2019-14287",
"description": "Documentation for Sudo Security Bypass - CVE 2019-14287",
"fork": false,
"created_at": "2020-05-11T16:40:12Z",
"updated_at": "2020-05-11T16:43:41Z",
"pushed_at": "2020-05-11T16:43:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263135881,
"name": "CVE-2019-14287-IT18030372-",
"full_name": "HussyCool\/CVE-2019-14287-IT18030372-",
"owner": {
"login": "HussyCool",
"id": 39041533,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/39041533?v=4",
"html_url": "https:\/\/github.com\/HussyCool"
},
"html_url": "https:\/\/github.com\/HussyCool\/CVE-2019-14287-IT18030372-",
"description": "Sudo Security Policy bypass Vulnerability",
"fork": false,
"created_at": "2020-05-11T19:19:17Z",
"updated_at": "2020-05-11T19:21:07Z",
"pushed_at": "2020-05-11T19:19:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-05-10T10:10:06Z",
"updated_at": "2020-05-11T16:58:09Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 64,
"forks": 64,
"watchers": 189,
"watchers": 190,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-05-11T13:33:58Z",
"updated_at": "2020-05-11T17:23:30Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 328,
"watchers_count": 328,
"stargazers_count": 329,
"watchers_count": 329,
"forks_count": 145,
"forks": 145,
"watchers": 328,
"watchers": 329,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2020-03-24T13:10:39Z",
"updated_at": "2020-05-08T10:15:47Z",
"updated_at": "2020-05-11T19:14:41Z",
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 15,
"forks": 15,
"watchers": 57,
"watchers": 58,
"score": 0
}
]

View file

@ -979,13 +979,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-05-09T22:55:32Z",
"updated_at": "2020-05-11T17:39:44Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 54,
"forks": 54,
"watchers": 156,
"watchers": 157,
"score": 0
},
{
@ -1263,5 +1263,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263146475,
"name": "CVE-2020-0796",
"full_name": "gyannx\/CVE-2020-0796",
"owner": {
"login": "gyannx",
"id": 64989206,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/64989206?v=4",
"html_url": "https:\/\/github.com\/gyannx"
},
"html_url": "https:\/\/github.com\/gyannx\/CVE-2020-0796",
"description": "Remote code execution module for CVE-2020-0796 (SMBGhost).",
"fork": false,
"created_at": "2020-05-11T20:06:18Z",
"updated_at": "2020-05-11T20:06:54Z",
"pushed_at": "2020-05-11T20:06:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
"fork": false,
"created_at": "2020-04-04T00:50:42Z",
"updated_at": "2020-05-11T01:37:06Z",
"updated_at": "2020-05-11T15:16:44Z",
"pushed_at": "2020-05-10T22:35:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-05-08T01:28:39Z",
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 90,
"score": 0
},
@ -82,13 +82,13 @@
"description": "CVE-2020-11651: Proof of Concept",
"fork": false,
"created_at": "2020-05-04T11:47:56Z",
"updated_at": "2020-05-08T12:21:55Z",
"updated_at": "2020-05-11T19:14:20Z",
"pushed_at": "2020-05-05T03:27:11Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 14,
"forks": 14,
"watchers": 25,
"watchers": 26,
"score": 0
},
{
@ -160,29 +160,6 @@
"watchers": 4,
"score": 0
},
{
"id": 261289637,
"name": "CVE-2020-11651",
"full_name": "kevthehermit\/CVE-2020-11651",
"owner": {
"login": "kevthehermit",
"id": 2545096,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2545096?v=4",
"html_url": "https:\/\/github.com\/kevthehermit"
},
"html_url": "https:\/\/github.com\/kevthehermit\/CVE-2020-11651",
"description": "PoC for CVE-2020-11651",
"fork": false,
"created_at": "2020-05-04T20:34:04Z",
"updated_at": "2020-05-09T11:22:20Z",
"pushed_at": "2020-05-04T20:39:49Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 9,
"score": 0
},
{
"id": 261951068,
"name": "cve-2020-11651-exp-plus",
@ -229,6 +206,29 @@
"watchers": 12,
"score": 0
},
{
"id": 262555019,
"name": "CVE-2020-11651",
"full_name": "RakhithJK\/CVE-2020-11651",
"owner": {
"login": "RakhithJK",
"id": 37833354,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37833354?v=4",
"html_url": "https:\/\/github.com\/RakhithJK"
},
"html_url": "https:\/\/github.com\/RakhithJK\/CVE-2020-11651",
"description": "PoC for CVE-2020-11651",
"fork": false,
"created_at": "2020-05-09T11:22:25Z",
"updated_at": "2020-05-11T19:17:30Z",
"pushed_at": "2020-05-04T20:39:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 262782431,
"name": "CVE-2020-11651",

View file

@ -13,13 +13,13 @@
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2020-05-10T15:25:59Z",
"updated_at": "2020-05-11T14:39:47Z",
"updated_at": "2020-05-11T15:48:35Z",
"pushed_at": "2020-05-10T15:32:54Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 9,
"forks": 9,
"watchers": 27,
"watchers": 29,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078",
"fork": false,
"created_at": "2020-04-28T13:48:27Z",
"updated_at": "2020-05-08T01:59:20Z",
"updated_at": "2020-05-11T18:21:39Z",
"pushed_at": "2020-04-28T13:51:17Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"forks": 7,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -316,8 +316,8 @@
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 35,
"forks": 35,
"forks_count": 34,
"forks": 34,
"watchers": 97,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-05-11T10:19:09Z",
"updated_at": "2020-05-11T15:47:12Z",
"pushed_at": "2020-05-11T02:14:55Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 24,
"forks": 24,
"watchers": 99,
"watchers": 100,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-05-11T10:54:52Z",
"updated_at": "2020-05-11T15:48:36Z",
"pushed_at": "2020-04-26T11:54:57Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 30,
"forks": 30,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2020-05-11T14:45:05Z",
"updated_at": "2020-05-11T16:28:52Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 9,
"forks": 9,
"watchers": 51,
"watchers": 53,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 35,
"forks": 35,
"forks_count": 36,
"forks": 36,
"watchers": 181,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-08T05:53:47Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 12,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 31,
"forks": 31,
"forks_count": 32,
"forks": 32,
"watchers": 87,
"score": 0
},

View file

@ -256,6 +256,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [thelostworldFree/CVE-2020-0796](https://github.com/thelostworldFree/CVE-2020-0796)
- [syadg123/CVE-2020-0796](https://github.com/syadg123/CVE-2020-0796)
- [section-c/CVE-2020-0796](https://github.com/section-c/CVE-2020-0796)
- [gyannx/CVE-2020-0796](https://github.com/gyannx/CVE-2020-0796)
### CVE-2020-0798
@ -433,9 +434,9 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
- [jasperla/CVE-2020-11651-poc](https://github.com/jasperla/CVE-2020-11651-poc)
- [Imanfeng/SaltStack-Exp](https://github.com/Imanfeng/SaltStack-Exp)
- [bravery9/SaltStack-Exp](https://github.com/bravery9/SaltStack-Exp)
- [kevthehermit/CVE-2020-11651](https://github.com/kevthehermit/CVE-2020-11651)
- [lovelyjuice/cve-2020-11651-exp-plus](https://github.com/lovelyjuice/cve-2020-11651-exp-plus)
- [heikanet/CVE-2020-11651-CVE-2020-11652-EXP](https://github.com/heikanet/CVE-2020-11651-CVE-2020-11652-EXP)
- [RakhithJK/CVE-2020-11651](https://github.com/RakhithJK/CVE-2020-11651)
- [gyannx/CVE-2020-11651](https://github.com/gyannx/CVE-2020-11651)
### CVE-2020-11794
@ -2313,6 +2314,8 @@ In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can
- [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271)
- [Unam3dd/sudo-vulnerability-CVE-2019-14287](https://github.com/Unam3dd/sudo-vulnerability-CVE-2019-14287)
- [CMNatic/Dockerized-CVE-2019-14287](https://github.com/CMNatic/Dockerized-CVE-2019-14287)
- [SachinthaDeSilva-cmd/Exploit-CVE-2019-14287](https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287)
- [HussyCool/CVE-2019-14287-IT18030372-](https://github.com/HussyCool/CVE-2019-14287-IT18030372-)
### CVE-2019-14314
@ -10022,6 +10025,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- [Brucetg/DirtyCow-EXP](https://github.com/Brucetg/DirtyCow-EXP)
- [jas502n/CVE-2016-5195](https://github.com/jas502n/CVE-2016-5195)
- [imust6226/dirtcow](https://github.com/imust6226/dirtcow)
- [shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-](https://github.com/shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-)
### CVE-2016-5345
@ -10930,6 +10934,7 @@ named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote
- [knqyf263/cve-2015-5477](https://github.com/knqyf263/cve-2015-5477)
- [ilanyu/cve-2015-5477](https://github.com/ilanyu/cve-2015-5477)
- [denmilu/ShareDoc_cve-2015-5477](https://github.com/denmilu/ShareDoc_cve-2015-5477)
- [xycloops123/TKEY-remote-DoS-vulnerability-exploit](https://github.com/xycloops123/TKEY-remote-DoS-vulnerability-exploit)
### CVE-2015-5602