Auto Update 2020/10/16 18:09:26

This commit is contained in:
motikan2010-bot 2020-10-16 18:09:26 +09:00
parent dd97e717d7
commit f30b55a374
39 changed files with 191 additions and 167 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-10-16T01:37:12Z",
"updated_at": "2020-10-16T03:28:43Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 721,
"watchers_count": 721,
"forks_count": 175,
"forks": 175,
"watchers": 722,
"watchers": 721,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-10-16T01:37:12Z",
"updated_at": "2020-10-16T03:28:43Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 721,
"watchers_count": 721,
"forks_count": 175,
"forks": 175,
"watchers": 722,
"watchers": 721,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行反弹shell的脚本",
"fork": false,
"created_at": "2020-05-27T05:02:04Z",
"updated_at": "2020-10-03T07:48:09Z",
"updated_at": "2020-10-16T07:50:45Z",
"pushed_at": "2020-06-27T10:17:43Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 9,
"forks": 9,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -201,8 +201,8 @@
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 189,
"watchers_count": 189,
"forks_count": 95,
"forks": 95,
"forks_count": 96,
"forks": 96,
"watchers": 189,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2020-10-10T01:14:59Z",
"updated_at": "2020-10-16T08:41:17Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 470,
"watchers_count": 470,
"stargazers_count": 471,
"watchers_count": 471,
"forks_count": 242,
"forks": 242,
"watchers": 470,
"watchers": 471,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2020-10-15T09:51:00Z",
"updated_at": "2020-10-16T08:19:53Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"forks_count": 76,
"forks": 76,
"watchers": 275,
"watchers": 276,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-10-16T01:37:12Z",
"updated_at": "2020-10-16T03:28:43Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 721,
"watchers_count": 721,
"forks_count": 175,
"forks": 175,
"watchers": 722,
"watchers": 721,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "RCE on GPON home routers (CVE-2018-10561)",
"fork": false,
"created_at": "2018-07-25T20:37:13Z",
"updated_at": "2019-10-02T06:57:51Z",
"updated_at": "2020-10-16T07:25:48Z",
"pushed_at": "2018-07-25T23:44:39Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
"fork": false,
"created_at": "2018-05-07T10:34:10Z",
"updated_at": "2020-09-30T09:10:54Z",
"updated_at": "2020-10-16T07:25:46Z",
"pushed_at": "2018-05-10T15:08:43Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 69,
"forks": 69,
"watchers": 206,
"watchers": 205,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-10933 very simple POC",
"fork": false,
"created_at": "2018-10-17T09:01:44Z",
"updated_at": "2020-04-08T19:40:08Z",
"updated_at": "2020-10-16T07:26:31Z",
"pushed_at": "2018-10-23T13:51:06Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 40,
"forks": 40,
"watchers": 133,
"watchers": 132,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-10-16T01:37:12Z",
"updated_at": "2020-10-16T03:28:43Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 721,
"watchers_count": 721,
"forks_count": 175,
"forks": 175,
"watchers": 722,
"watchers": 721,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-08-12T02:23:38Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 35,
"forks": 35,
"forks_count": 36,
"forks": 36,
"watchers": 73,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-0211-apache & CVE-2019-6977-imagecolormatch",
"fork": false,
"created_at": "2019-05-12T10:08:57Z",
"updated_at": "2020-09-12T11:49:21Z",
"updated_at": "2020-10-16T03:16:11Z",
"pushed_at": "2019-05-12T10:09:35Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -1485,13 +1485,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2020-10-11T14:03:37Z",
"updated_at": "2020-10-16T08:38:12Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1045,
"watchers_count": 1045,
"stargazers_count": 1044,
"watchers_count": 1044,
"forks_count": 349,
"forks": 349,
"watchers": 1045,
"watchers": 1044,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "php-fpm+Nginx RCE",
"fork": false,
"created_at": "2019-10-23T23:26:57Z",
"updated_at": "2020-09-07T06:25:54Z",
"updated_at": "2020-10-16T08:14:49Z",
"pushed_at": "2020-08-20T04:43:25Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 34,
"forks": 34,
"watchers": 77,
"watchers": 78,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2020-10-13T11:57:47Z",
"updated_at": "2020-10-16T07:11:49Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 334,
"watchers_count": 334,
"forks_count": 132,
"forks": 132,
"watchers": 333,
"watchers": 334,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-15T08:53:29Z",
"updated_at": "2020-10-16T08:21:15Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1944,
"watchers_count": 1944,
"forks_count": 511,
"forks": 511,
"watchers": 1941,
"watchers": 1944,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-10-14T19:39:35Z",
"updated_at": "2020-10-16T07:14:47Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 346,
"watchers_count": 346,
"stargazers_count": 347,
"watchers_count": 347,
"forks_count": 113,
"forks": 113,
"watchers": 346,
"watchers": 347,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-10-16T01:37:12Z",
"updated_at": "2020-10-16T03:28:43Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 721,
"watchers_count": 721,
"forks_count": 175,
"forks": 175,
"watchers": 722,
"watchers": 721,
"score": 0
}
]

View file

@ -220,13 +220,13 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2020-10-14T07:19:13Z",
"updated_at": "2020-10-16T06:49:08Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 138,
"watchers_count": 138,
"forks_count": 57,
"forks": 57,
"watchers": 139,
"watchers": 138,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4",
"fork": false,
"created_at": "2019-05-10T10:36:54Z",
"updated_at": "2020-06-09T02:08:22Z",
"updated_at": "2020-10-16T07:25:22Z",
"pushed_at": "2019-05-17T03:10:30Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 11,
"forks": 11,
"watchers": 28,
"watchers": 27,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
"fork": false,
"created_at": "2019-05-06T15:47:20Z",
"updated_at": "2020-10-07T22:54:21Z",
"updated_at": "2020-10-16T03:25:08Z",
"pushed_at": "2019-05-08T16:22:58Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 33,
"forks": 33,
"watchers": 52,
"watchers": 53,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-10-11T18:04:09Z",
"updated_at": "2020-10-16T06:12:46Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 83,
"forks": 83,
"watchers": 231,
"watchers": 230,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-10-12T00:51:17Z",
"updated_at": "2020-10-16T06:29:41Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 227,
"watchers_count": 227,
"stargazers_count": 226,
"watchers_count": 226,
"forks_count": 64,
"forks": 64,
"watchers": 227,
"watchers": 226,
"score": 0
},
{

View file

@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-10-15T14:58:29Z",
"updated_at": "2020-10-16T06:14:21Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 1017,
"watchers_count": 1017,
"stargazers_count": 1018,
"watchers_count": 1018,
"forks_count": 333,
"forks": 333,
"watchers": 1017,
"watchers": 1018,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-1048 bypass: binary planting PoC",
"fork": false,
"created_at": "2020-08-11T14:34:07Z",
"updated_at": "2020-09-27T07:50:34Z",
"updated_at": "2020-10-16T07:44:49Z",
"pushed_at": "2020-08-20T15:15:50Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 5,
"forks": 5,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-13933 靶场: shiro < 1.6.0 认证绕过漏洞",
"fork": false,
"created_at": "2020-09-09T10:20:25Z",
"updated_at": "2020-10-06T06:07:33Z",
"updated_at": "2020-10-16T07:21:56Z",
"pushed_at": "2020-09-11T17:14:19Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-10-15T22:28:21Z",
"updated_at": "2020-10-16T05:01:56Z",
"pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 665,
"watchers_count": 665,
"stargazers_count": 666,
"watchers_count": 666,
"forks_count": 191,
"forks": 191,
"watchers": 665,
"watchers": 666,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-10T02:38:15Z",
"updated_at": "2020-10-15T10:46:10Z",
"updated_at": "2020-10-16T03:33:03Z",
"pushed_at": "2020-10-09T16:39:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2020-10-16T02:36:45Z",
"updated_at": "2020-10-16T08:48:53Z",
"pushed_at": "2020-10-15T02:57:22Z",
"stargazers_count": 162,
"watchers_count": 162,
"forks_count": 18,
"forks": 18,
"watchers": 162,
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 19,
"forks": 19,
"watchers": 173,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
"fork": false,
"created_at": "2020-10-14T14:42:52Z",
"updated_at": "2020-10-16T02:45:25Z",
"updated_at": "2020-10-16T04:31:37Z",
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0
},
{
@ -182,5 +182,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 304538917,
"name": "CVE-2020-16898",
"full_name": "Q1984\/CVE-2020-16898",
"owner": {
"login": "Q1984",
"id": 50952023,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/50952023?v=4",
"html_url": "https:\/\/github.com\/Q1984"
},
"html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898",
"description": "PoC Bad Neighbor BSOD exploit",
"fork": false,
"created_at": "2020-10-16T06:27:24Z",
"updated_at": "2020-10-16T07:34:56Z",
"pushed_at": "2020-10-16T07:34:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
"fork": false,
"created_at": "2020-10-15T14:32:25Z",
"updated_at": "2020-10-16T02:42:59Z",
"updated_at": "2020-10-16T09:09:52Z",
"pushed_at": "2020-10-15T14:57:31Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 11,
"forks": 11,
"watchers": 42,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-10-13T07:16:45Z",
"updated_at": "2020-10-16T03:26:16Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 204,
"watchers_count": 204,
"forks_count": 93,
"forks": 93,
"watchers": 203,
"watchers": 204,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
"fork": false,
"created_at": "2020-02-21T07:48:50Z",
"updated_at": "2020-10-10T06:04:59Z",
"updated_at": "2020-10-16T08:11:45Z",
"pushed_at": "2020-02-21T10:19:52Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 12,
"forks": 12,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "pritunl-CVE-2020-25200",
"fork": false,
"created_at": "2020-09-06T22:11:24Z",
"updated_at": "2020-10-02T07:06:03Z",
"updated_at": "2020-10-16T07:12:15Z",
"pushed_at": "2020-09-08T05:48:48Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,13 +13,13 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2020-10-14T23:34:28Z",
"updated_at": "2020-10-16T08:33:30Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"forks": 2,
"watchers": 11,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-10-16T01:37:12Z",
"updated_at": "2020-10-16T03:28:43Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 721,
"watchers_count": 721,
"forks_count": 175,
"forks": 175,
"watchers": 722,
"watchers": 721,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-09-14T09:48:04Z",
"updated_at": "2020-10-16T09:02:31Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 43,
"forks": 43,
"watchers": 132,
"watchers": 133,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2020-10-14T08:10:46Z",
"updated_at": "2020-10-16T08:00:24Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 21,
"forks": 21,
"watchers": 147,
"watchers": 148,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-10-11T14:15:54Z",
"updated_at": "2020-10-16T08:06:30Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 206,
"watchers_count": 206,
"forks_count": 48,
"forks": 48,
"watchers": 206,
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 49,
"forks": 49,
"watchers": 207,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-10-15T08:53:29Z",
"updated_at": "2020-10-16T08:21:15Z",
"pushed_at": "2020-10-10T04:01:51Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1944,
"watchers_count": 1944,
"forks_count": 511,
"forks": 511,
"watchers": 1941,
"watchers": 1944,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-24T20:57:03Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 19,
"score": 0
}

View file

@ -2242,6 +2242,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
- [sn0x736e/CVE-2020-16898](https://github.com/sn0x736e/CVE-2020-16898)
- [Gangana3/bad_neighbor](https://github.com/Gangana3/bad_neighbor)
- [initconf/CVE-2020-16898-Bad-Neighbor](https://github.com/initconf/CVE-2020-16898-Bad-Neighbor)
- [Q1984/CVE-2020-16898](https://github.com/Q1984/CVE-2020-16898)
### CVE-2020-16899
- [advanced-threat-research/CVE-2020-16899](https://github.com/advanced-threat-research/CVE-2020-16899)