Auto Update 2020/06/29 00:08:08

This commit is contained in:
motikan2010-bot 2020-06-29 00:08:08 +09:00
parent 80d584c87a
commit f2437800fc
17 changed files with 69 additions and 69 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-4210+Redis未授权访问",
"fork": false,
"created_at": "2017-03-10T02:09:48Z",
"updated_at": "2020-06-15T06:19:11Z",
"updated_at": "2020-06-28T10:56:22Z",
"pushed_at": "2017-03-10T08:35:42Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 30,
"forks": 30,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -1,25 +1,25 @@
[
{
"id": 61914641,
"id": 62455295,
"name": "CVE-2016-4971",
"full_name": "BlueCocoa\/CVE-2016-4971",
"full_name": "gitcollect\/CVE-2016-4971",
"owner": {
"login": "BlueCocoa",
"id": 5152503,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5152503?v=4",
"html_url": "https:\/\/github.com\/BlueCocoa"
"login": "gitcollect",
"id": 17906239,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17906239?v=4",
"html_url": "https:\/\/github.com\/gitcollect"
},
"html_url": "https:\/\/github.com\/BlueCocoa\/CVE-2016-4971",
"html_url": "https:\/\/github.com\/gitcollect\/CVE-2016-4971",
"description": "CVE-2016-4971 written in nodejs",
"fork": false,
"created_at": "2016-06-24T21:59:33Z",
"updated_at": "2018-10-22T13:04:41Z",
"created_at": "2016-07-02T14:44:48Z",
"updated_at": "2020-06-28T13:56:59Z",
"pushed_at": "2016-06-24T22:00:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{

View file

@ -197,13 +197,13 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2020-06-20T12:17:20Z",
"updated_at": "2020-06-28T12:43:42Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 93,
"forks": 93,
"watchers": 180,
"watchers": 181,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 416,
"watchers_count": 416,
"forks_count": 189,
"forks": 189,
"forks_count": 190,
"forks": 190,
"watchers": 416,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "PoC CVE-2017-5123 - LPE - Bypassing SMEP\/SMAP. No KASLR",
"fork": false,
"created_at": "2020-05-08T15:10:38Z",
"updated_at": "2020-06-28T01:29:48Z",
"updated_at": "2020-06-28T11:17:17Z",
"pushed_at": "2020-06-26T13:39:16Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 4,
"forks": 4,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -1236,8 +1236,8 @@
"pushed_at": "2020-01-15T16:12:07Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 130,
"forks": 130,
"forks_count": 131,
"forks": 131,
"watchers": 8,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2020-05-17T16:53:40Z",
"updated_at": "2020-06-28T11:36:55Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 329,
"watchers_count": 329,
"forks_count": 110,
"forks": 110,
"watchers": 330,
"watchers": 329,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2020-06-23T15:27:39Z",
"updated_at": "2020-06-28T10:51:25Z",
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 426,
"watchers_count": 426,
"stargazers_count": 427,
"watchers_count": 427,
"forks_count": 139,
"forks": 139,
"watchers": 426,
"watchers": 427,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-28T08:09:06Z",
"updated_at": "2020-06-28T12:34:55Z",
"pushed_at": "2020-06-28T03:28:23Z",
"stargazers_count": 1014,
"watchers_count": 1014,
"stargazers_count": 1020,
"watchers_count": 1020,
"forks_count": 250,
"forks": 250,
"watchers": 1014,
"watchers": 1020,
"score": 0
}
]

View file

@ -201,8 +201,8 @@
"pushed_at": "2019-02-23T13:20:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-04-14T06:57:49Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 4,
"forks": 4,
"forks_count": 3,
"forks": 3,
"watchers": 24,
"score": 0
}

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 187,
"watchers_count": 187,
"forks_count": 75,
"forks": 75,
"forks_count": 74,
"forks": 74,
"watchers": 187,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
"fork": false,
"created_at": "2020-06-16T23:22:15Z",
"updated_at": "2020-06-26T14:17:11Z",
"updated_at": "2020-06-28T14:24:56Z",
"pushed_at": "2020-06-17T18:10:30Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 20,
"forks": 20,
"watchers": 49,
"watchers": 50,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-25T07:49:34Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 35,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-28T08:09:06Z",
"updated_at": "2020-06-28T12:34:55Z",
"pushed_at": "2020-06-28T03:28:23Z",
"stargazers_count": 1014,
"watchers_count": 1014,
"stargazers_count": 1020,
"watchers_count": 1020,
"forks_count": 250,
"forks": 250,
"watchers": 1014,
"watchers": 1020,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A bluetooth-related vulnerability in some contact tracing apps",
"fork": false,
"created_at": "2020-05-15T00:18:03Z",
"updated_at": "2020-06-26T03:41:21Z",
"updated_at": "2020-06-28T13:45:30Z",
"pushed_at": "2020-06-26T03:41:19Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"forks": 3,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-06-27T10:47:22Z",
"updated_at": "2020-06-27T23:42:39Z",
"updated_at": "2020-06-28T13:35:45Z",
"pushed_at": "2020-06-27T10:48:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -10649,7 +10649,7 @@ The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework befo
GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
</code>
- [BlueCocoa/CVE-2016-4971](https://github.com/BlueCocoa/CVE-2016-4971)
- [gitcollect/CVE-2016-4971](https://github.com/gitcollect/CVE-2016-4971)
- [mbadanoiu/CVE-2016-4971](https://github.com/mbadanoiu/CVE-2016-4971)
- [dinidhu96/IT19013756_-CVE-2016-4971-](https://github.com/dinidhu96/IT19013756_-CVE-2016-4971-)