From 00645ba0fac827ca4ebb7350a42213d2fb0562f0 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 29 Sep 2020 00:10:05 +0900 Subject: [PATCH] Auto Update 2020/09/29 00:10:05 --- 2015/CVE-2015-7547.json | 8 +-- 2017/CVE-2017-0785.json | 4 +- 2017/CVE-2017-10271.json | 12 ++--- 2017/CVE-2017-11783.json | 4 +- 2017/CVE-2017-7494.json | 8 +-- 2018/CVE-2018-10933.json | 4 +- 2018/CVE-2018-5955.json | 8 +-- 2018/CVE-2018-8639.json | 4 +- 2018/CVE-2018-9206.json | 4 +- 2019/CVE-2019-0708.json | 24 ++++----- 2019/CVE-2019-17026.json | 8 +-- 2019/CVE-2019-2215.json | 16 +++--- 2020/CVE-2020-0796.json | 62 +++++++++++------------ 2020/CVE-2020-1283.json | 12 ++--- 2020/CVE-2020-1350.json | 4 +- 2020/CVE-2020-14294.json | 4 +- 2020/CVE-2020-1472.json | 106 +++++++++++++++++++-------------------- 2020/CVE-2020-17382.json | 12 ++--- 2020/CVE-2020-1938.json | 4 +- 2020/CVE-2020-3452.json | 4 +- 2020/CVE-2020-5837.json | 12 ++--- 2020/CVE-2020-7283.json | 2 +- 2020/CVE-2020-7931.json | 8 +-- 2020/CVE-2020-8103.json | 12 ++--- README.md | 6 +-- 25 files changed, 176 insertions(+), 176 deletions(-) diff --git a/2015/CVE-2015-7547.json b/2015/CVE-2015-7547.json index 269e438290..06ea8d71d3 100644 --- a/2015/CVE-2015-7547.json +++ b/2015/CVE-2015-7547.json @@ -13,13 +13,13 @@ "description": "Proof of concept for CVE-2015-7547", "fork": false, "created_at": "2016-02-10T21:13:54Z", - "updated_at": "2020-09-23T21:11:56Z", + "updated_at": "2020-09-28T12:57:46Z", "pushed_at": "2016-02-20T07:57:58Z", - "stargazers_count": 546, - "watchers_count": 546, + "stargazers_count": 547, + "watchers_count": 547, "forks_count": 179, "forks": 179, - "watchers": 546, + "watchers": 547, "score": 0 }, { diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index c7a4639a03..d90e8b7928 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -17,8 +17,8 @@ "pushed_at": "2017-09-23T05:11:45Z", "stargazers_count": 427, "watchers_count": 427, - "forks_count": 192, - "forks": 192, + "forks_count": 191, + "forks": 191, "watchers": 427, "score": 0 }, diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index 8d72e103aa..90dfc16f77 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -128,13 +128,13 @@ "description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l", "fork": false, "created_at": "2018-01-03T06:14:28Z", - "updated_at": "2020-03-05T08:20:20Z", + "updated_at": "2020-09-28T14:29:52Z", "pushed_at": "2018-01-03T00:42:57Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 38, - "forks": 38, - "watchers": 2, + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 39, + "forks": 39, + "watchers": 3, "score": 0 }, { diff --git a/2017/CVE-2017-11783.json b/2017/CVE-2017-11783.json index 83f00f35ab..c6324b7afe 100644 --- a/2017/CVE-2017-11783.json +++ b/2017/CVE-2017-11783.json @@ -17,8 +17,8 @@ "pushed_at": "2018-08-31T01:54:40Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 5, - "forks": 5, + "forks_count": 4, + "forks": 4, "watchers": 3, "score": 0 } diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index a82b138c1a..c1674cf44e 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -59,13 +59,13 @@ "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)", "fork": false, "created_at": "2017-05-26T00:58:25Z", - "updated_at": "2020-09-25T17:35:33Z", + "updated_at": "2020-09-28T14:01:53Z", "pushed_at": "2017-10-31T16:20:29Z", - "stargazers_count": 246, - "watchers_count": 246, + "stargazers_count": 247, + "watchers_count": 247, "forks_count": 88, "forks": 88, - "watchers": 246, + "watchers": 247, "score": 0 }, { diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 25639df170..75c50e693d 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -40,8 +40,8 @@ "pushed_at": "2020-07-24T17:54:54Z", "stargazers_count": 468, "watchers_count": 468, - "forks_count": 115, - "forks": 115, + "forks_count": 114, + "forks": 114, "watchers": 468, "score": 0 }, diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 951a4b8519..ba3428507b 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2020-09-23T02:27:42Z", + "updated_at": "2020-09-28T11:09:04Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 309, - "watchers_count": 309, + "stargazers_count": 310, + "watchers_count": 310, "forks_count": 71, "forks": 71, - "watchers": 309, + "watchers": 310, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8639.json b/2018/CVE-2018-8639.json index 084ef3d20f..e065075b9d 100644 --- a/2018/CVE-2018-8639.json +++ b/2018/CVE-2018-8639.json @@ -17,8 +17,8 @@ "pushed_at": "2019-04-08T08:26:26Z", "stargazers_count": 125, "watchers_count": 125, - "forks_count": 51, - "forks": 51, + "forks_count": 50, + "forks": 50, "watchers": 125, "score": 0 }, diff --git a/2018/CVE-2018-9206.json b/2018/CVE-2018-9206.json index 50f47b2740..d5773c331c 100644 --- a/2018/CVE-2018-9206.json +++ b/2018/CVE-2018-9206.json @@ -40,8 +40,8 @@ "pushed_at": "2018-10-30T01:48:42Z", "stargazers_count": 62, "watchers_count": 62, - "forks_count": 17, - "forks": 17, + "forks_count": 16, + "forks": 16, "watchers": 62, "score": 0 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index ee3728936f..ff318b6d1f 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -312,13 +312,13 @@ "description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)", "fork": false, "created_at": "2019-05-15T15:01:38Z", - "updated_at": "2020-09-27T21:04:12Z", + "updated_at": "2020-09-28T12:14:33Z", "pushed_at": "2019-06-13T13:07:03Z", - "stargazers_count": 335, - "watchers_count": 335, + "stargazers_count": 336, + "watchers_count": 336, "forks_count": 189, "forks": 189, - "watchers": 335, + "watchers": 336, "score": 0 }, { @@ -2164,14 +2164,14 @@ { "id": 206928449, "name": "CVE-2019-0708-BlueKeep", - "full_name": "adkinguzi\/CVE-2019-0708-BlueKeep", + "full_name": "upknboy\/CVE-2019-0708-BlueKeep", "owner": { - "login": "adkinguzi", + "login": "upknboy", "id": 31617622, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31617622?v=4", - "html_url": "https:\/\/github.com\/adkinguzi" + "html_url": "https:\/\/github.com\/upknboy" }, - "html_url": "https:\/\/github.com\/adkinguzi\/CVE-2019-0708-BlueKeep", + "html_url": "https:\/\/github.com\/upknboy\/CVE-2019-0708-BlueKeep", "description": null, "fork": false, "created_at": "2019-09-07T06:50:47Z", @@ -2497,13 +2497,13 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2020-08-29T05:47:05Z", + "updated_at": "2020-09-28T12:13:48Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 59, + "watchers_count": 59, "forks_count": 20, "forks": 20, - "watchers": 58, + "watchers": 59, "score": 0 }, { diff --git a/2019/CVE-2019-17026.json b/2019/CVE-2019-17026.json index f47fd75be9..299be3fc5b 100644 --- a/2019/CVE-2019-17026.json +++ b/2019/CVE-2019-17026.json @@ -13,13 +13,13 @@ "description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).", "fork": false, "created_at": "2020-08-27T19:32:07Z", - "updated_at": "2020-09-18T10:30:07Z", + "updated_at": "2020-09-28T14:02:50Z", "pushed_at": "2020-08-27T19:33:42Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 16, "forks": 16, - "watchers": 42, + "watchers": 43, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 605618e4fb..e357515734 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2019-10-04T06:32:08Z", - "updated_at": "2020-09-11T14:56:11Z", + "updated_at": "2020-09-28T11:10:48Z", "pushed_at": "2019-11-12T03:58:00Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "forks_count": 24, "forks": 24, - "watchers": 60, + "watchers": 61, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215", "fork": false, "created_at": "2019-10-14T17:27:37Z", - "updated_at": "2020-09-10T14:31:55Z", + "updated_at": "2020-09-28T11:27:15Z", "pushed_at": "2019-10-15T01:04:08Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 39, "forks": 39, - "watchers": 52, + "watchers": 53, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 6b1aeaa197..43c8a9806e 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -772,13 +772,13 @@ "description": "CVE-2020-0796.SMBGhost_Crash_Poc ", "fork": false, "created_at": "2020-03-18T08:29:28Z", - "updated_at": "2020-07-15T08:20:44Z", + "updated_at": "2020-09-28T14:23:34Z", "pushed_at": "2020-03-18T08:57:36Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 7, "forks": 7, - "watchers": 9, + "watchers": 10, "score": 0 }, { @@ -1094,13 +1094,13 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2020-09-28T02:44:36Z", + "updated_at": "2020-09-28T13:32:37Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 320, - "watchers_count": 320, + "stargazers_count": 321, + "watchers_count": 321, "forks_count": 103, "forks": 103, - "watchers": 320, + "watchers": 321, "score": 0 }, { @@ -1264,29 +1264,6 @@ "watchers": 0, "score": 0 }, - { - "id": 268985001, - "name": "SMBGhost", - "full_name": "fdbao\/SMBGhost", - "owner": { - "login": "fdbao", - "id": 38367799, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/38367799?v=4", - "html_url": "https:\/\/github.com\/fdbao" - }, - "html_url": "https:\/\/github.com\/fdbao\/SMBGhost", - "description": "批量测试CVE-2020-0796 - SMBv3 RCE", - "fork": false, - "created_at": "2020-06-03T03:59:49Z", - "updated_at": "2020-07-14T08:05:05Z", - "pushed_at": "2020-06-03T04:01:29Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, - "forks": 2, - "watchers": 2, - "score": 0 - }, { "id": 270919583, "name": "CVE-2020-0796", @@ -1333,6 +1310,29 @@ "watchers": 63, "score": 0 }, + { + "id": 271468541, + "name": "SMBGhost", + "full_name": "1060275195\/SMBGhost", + "owner": { + "login": "1060275195", + "id": 37568190, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/37568190?v=4", + "html_url": "https:\/\/github.com\/1060275195" + }, + "html_url": "https:\/\/github.com\/1060275195\/SMBGhost", + "description": "批量测试CVE-2020-0796 - SMBv3 RCE", + "fork": false, + "created_at": "2020-06-11T06:24:30Z", + "updated_at": "2020-09-28T13:21:59Z", + "pushed_at": "2020-06-03T04:01:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 273582266, "name": "SMBGhost-LPE-Metasploit-Module", diff --git a/2020/CVE-2020-1283.json b/2020/CVE-2020-1283.json index 0f887c1d6d..39263bc548 100644 --- a/2020/CVE-2020-1283.json +++ b/2020/CVE-2020-1283.json @@ -13,13 +13,13 @@ "description": "Exploit Code for CVE-2020-1283 - Windows-Denial-of-Service-Vulnerability", "fork": false, "created_at": "2020-04-17T09:21:36Z", - "updated_at": "2020-09-23T13:46:00Z", + "updated_at": "2020-09-28T13:42:30Z", "pushed_at": "2020-06-16T08:08:46Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, - "forks": 2, - "watchers": 4, + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 4, + "forks": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index a62ba617ac..56337eed3b 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -17,8 +17,8 @@ "pushed_at": "2020-08-17T16:49:35Z", "stargazers_count": 34, "watchers_count": 34, - "forks_count": 10, - "forks": 10, + "forks_count": 11, + "forks": 11, "watchers": 34, "score": 0 }, diff --git a/2020/CVE-2020-14294.json b/2020/CVE-2020-14294.json index 9292b416ee..4c8ee6f6a5 100644 --- a/2020/CVE-2020-14294.json +++ b/2020/CVE-2020-14294.json @@ -13,8 +13,8 @@ "description": "This repository holds the advisory of the CVE-2020-14294", "fork": false, "created_at": "2020-09-24T08:49:05Z", - "updated_at": "2020-09-24T09:55:20Z", - "pushed_at": "2020-09-24T09:54:51Z", + "updated_at": "2020-09-28T13:11:18Z", + "pushed_at": "2020-09-28T13:11:15Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index d9e5911110..db91f32816 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2020-09-28T06:46:05Z", + "updated_at": "2020-09-28T14:37:53Z", "pushed_at": "2020-09-23T07:04:58Z", - "stargazers_count": 1068, - "watchers_count": 1068, - "forks_count": 223, - "forks": 223, - "watchers": 1068, + "stargazers_count": 1072, + "watchers_count": 1072, + "forks_count": 224, + "forks": 224, + "watchers": 1072, "score": 0 }, { @@ -59,13 +59,13 @@ "description": null, "fork": false, "created_at": "2020-09-14T16:52:37Z", - "updated_at": "2020-09-23T15:58:50Z", + "updated_at": "2020-09-28T12:25:26Z", "pushed_at": "2020-09-14T16:53:07Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 5, "forks": 5, - "watchers": 27, + "watchers": 28, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2020-09-28T06:19:59Z", + "updated_at": "2020-09-28T13:08:59Z", "pushed_at": "2020-09-25T15:32:01Z", - "stargazers_count": 619, - "watchers_count": 619, - "forks_count": 178, - "forks": 178, - "watchers": 619, + "stargazers_count": 621, + "watchers_count": 621, + "forks_count": 179, + "forks": 179, + "watchers": 621, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2020-09-28T08:18:20Z", + "updated_at": "2020-09-28T13:38:08Z", "pushed_at": "2020-09-17T18:06:57Z", - "stargazers_count": 145, - "watchers_count": 145, - "forks_count": 50, - "forks": 50, - "watchers": 145, + "stargazers_count": 146, + "watchers_count": 146, + "forks_count": 51, + "forks": 51, + "watchers": 146, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.", "fork": false, "created_at": "2020-09-14T19:27:14Z", - "updated_at": "2020-09-28T01:47:51Z", + "updated_at": "2020-09-28T09:55:52Z", "pushed_at": "2020-09-16T14:05:27Z", - "stargazers_count": 104, - "watchers_count": 104, + "stargazers_count": 105, + "watchers_count": 105, "forks_count": 26, "forks": 26, - "watchers": 104, + "watchers": 105, "score": 0 }, { @@ -335,13 +335,13 @@ "description": "cve-2020-1472 复现利用及其exp", "fork": false, "created_at": "2020-09-16T03:40:47Z", - "updated_at": "2020-09-27T02:03:32Z", + "updated_at": "2020-09-28T14:06:18Z", "pushed_at": "2020-09-16T15:03:32Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 5, "forks": 5, - "watchers": 28, + "watchers": 29, "score": 0 }, { @@ -574,29 +574,6 @@ "watchers": 0, "score": 0 }, - { - "id": 296960827, - "name": "Zerologon", - "full_name": "batmanli61\/Zerologon", - "owner": { - "login": "batmanli61", - "id": 19485801, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19485801?v=4", - "html_url": "https:\/\/github.com\/batmanli61" - }, - "html_url": "https:\/\/github.com\/batmanli61\/Zerologon", - "description": "Zerologon Exploit | CVE-2020-1472", - "fork": false, - "created_at": "2020-09-19T22:21:24Z", - "updated_at": "2020-09-19T22:31:15Z", - "pushed_at": "2020-09-19T22:31:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 296966855, "name": "CVE-2020-1472", @@ -734,5 +711,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 299264416, + "name": "CVE-2020-1472", + "full_name": "Whippet0\/CVE-2020-1472", + "owner": { + "login": "Whippet0", + "id": 46486374, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46486374?v=4", + "html_url": "https:\/\/github.com\/Whippet0" + }, + "html_url": "https:\/\/github.com\/Whippet0\/CVE-2020-1472", + "description": "CVE-2020-1472", + "fork": false, + "created_at": "2020-09-28T09:54:31Z", + "updated_at": "2020-09-28T10:00:34Z", + "pushed_at": "2020-09-28T10:00:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17382.json b/2020/CVE-2020-17382.json index a6c3beca7d..ff16f9da38 100644 --- a/2020/CVE-2020-17382.json +++ b/2020/CVE-2020-17382.json @@ -13,13 +13,13 @@ "description": "PoC exploits for CVE-2020-17382", "fork": false, "created_at": "2020-09-17T18:26:32Z", - "updated_at": "2020-09-28T09:09:55Z", + "updated_at": "2020-09-28T11:54:35Z", "pushed_at": "2020-09-26T15:17:50Z", - "stargazers_count": 59, - "watchers_count": 59, - "forks_count": 9, - "forks": 9, - "watchers": 59, + "stargazers_count": 60, + "watchers_count": 60, + "forks_count": 10, + "forks": 10, + "watchers": 60, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index d146904bb6..c9450078c2 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -316,8 +316,8 @@ "pushed_at": "2020-03-09T14:51:43Z", "stargazers_count": 135, "watchers_count": 135, - "forks_count": 51, - "forks": 51, + "forks_count": 50, + "forks": 50, "watchers": 135, "score": 0 }, diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index 18741d2ec0..56acd3b65c 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -247,8 +247,8 @@ "pushed_at": "2020-09-28T05:08:44Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2020/CVE-2020-5837.json b/2020/CVE-2020-5837.json index 4ea4d020bd..8687b5ea1a 100644 --- a/2020/CVE-2020-5837.json +++ b/2020/CVE-2020-5837.json @@ -13,13 +13,13 @@ "description": "CVE-2020-5837 exploit", "fork": false, "created_at": "2020-04-16T08:15:18Z", - "updated_at": "2020-09-23T13:45:34Z", + "updated_at": "2020-09-28T13:42:11Z", "pushed_at": "2020-05-13T09:45:12Z", - "stargazers_count": 30, - "watchers_count": 30, - "forks_count": 11, - "forks": 11, - "watchers": 30, + "stargazers_count": 31, + "watchers_count": 31, + "forks_count": 12, + "forks": 12, + "watchers": 31, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7283.json b/2020/CVE-2020-7283.json index d6ea5acdb0..2b0afa8fb6 100644 --- a/2020/CVE-2020-7283.json +++ b/2020/CVE-2020-7283.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2020-04-07T11:17:27Z", - "updated_at": "2020-09-23T13:45:46Z", + "updated_at": "2020-09-28T13:42:23Z", "pushed_at": "2020-07-14T06:39:31Z", "stargazers_count": 11, "watchers_count": 11, diff --git a/2020/CVE-2020-7931.json b/2020/CVE-2020-7931.json index 1c8f81e11b..ab5d4da136 100644 --- a/2020/CVE-2020-7931.json +++ b/2020/CVE-2020-7931.json @@ -13,13 +13,13 @@ "description": "Hacking Artifactory with server side template injection", "fork": false, "created_at": "2020-03-11T13:56:43Z", - "updated_at": "2020-09-28T09:00:39Z", + "updated_at": "2020-09-28T12:55:50Z", "pushed_at": "2020-03-12T06:55:39Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 7, "forks": 7, - "watchers": 21, + "watchers": 22, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8103.json b/2020/CVE-2020-8103.json index da46a6c799..efc9e1bcf1 100644 --- a/2020/CVE-2020-8103.json +++ b/2020/CVE-2020-8103.json @@ -13,13 +13,13 @@ "description": "CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free", "fork": false, "created_at": "2020-04-03T07:57:53Z", - "updated_at": "2020-09-23T13:45:37Z", + "updated_at": "2020-09-28T13:42:18Z", "pushed_at": "2020-06-08T20:23:53Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 3, - "forks": 3, - "watchers": 11, + "stargazers_count": 12, + "watchers_count": 12, + "forks_count": 4, + "forks": 4, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index f717da131e..6065ccb062 100644 --- a/README.md +++ b/README.md @@ -310,9 +310,9 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve - [halsten/CVE-2020-0796](https://github.com/halsten/CVE-2020-0796) - [ysyyrps123/CVE-2020-0796](https://github.com/ysyyrps123/CVE-2020-0796) - [ysyyrps123/CVE-2020-0796-exp](https://github.com/ysyyrps123/CVE-2020-0796-exp) -- [fdbao/SMBGhost](https://github.com/fdbao/SMBGhost) - [exp-sky/CVE-2020-0796](https://github.com/exp-sky/CVE-2020-0796) - [Barriuso/SMBGhost_AutomateExploitation](https://github.com/Barriuso/SMBGhost_AutomateExploitation) +- [1060275195/SMBGhost](https://github.com/1060275195/SMBGhost) - [Almorabea/SMBGhost-LPE-Metasploit-Module](https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module) - [ZecOps/SMBGhost-SMBleed-scanner](https://github.com/ZecOps/SMBGhost-SMBleed-scanner) - [getdrive/smbghost](https://github.com/getdrive/smbghost) @@ -521,13 +521,13 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu - [zeronetworks/zerologon](https://github.com/zeronetworks/zerologon) - [sv3nbeast/CVE-2020-1472](https://github.com/sv3nbeast/CVE-2020-1472) - [midpipps/CVE-2020-1472-Easy](https://github.com/midpipps/CVE-2020-1472-Easy) -- [batmanli61/Zerologon](https://github.com/batmanli61/Zerologon) - [hectorgie/CVE-2020-1472](https://github.com/hectorgie/CVE-2020-1472) - [johnpathe/zerologon-cve-2020-1472-notes](https://github.com/johnpathe/zerologon-cve-2020-1472-notes) - [t31m0/CVE-2020-1472](https://github.com/t31m0/CVE-2020-1472) - [grupooruss/CVE-2020-1472](https://github.com/grupooruss/CVE-2020-1472) - [striveben/CVE-2020-1472](https://github.com/striveben/CVE-2020-1472) - [Fa1c0n35/CVE-2020-1472-02-](https://github.com/Fa1c0n35/CVE-2020-1472-02-) +- [Whippet0/CVE-2020-1472](https://github.com/Whippet0/CVE-2020-1472) ### CVE-2020-1493 @@ -2554,7 +2554,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly - [wqsemc/CVE-2019-0708](https://github.com/wqsemc/CVE-2019-0708) - [mai-lang-chai/CVE-2019-0708-RCE](https://github.com/mai-lang-chai/CVE-2019-0708-RCE) - [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF) -- [adkinguzi/CVE-2019-0708-BlueKeep](https://github.com/adkinguzi/CVE-2019-0708-BlueKeep) +- [upknboy/CVE-2019-0708-BlueKeep](https://github.com/upknboy/CVE-2019-0708-BlueKeep) - [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708) - [qing-root/CVE-2019-0708-EXP-MSF-](https://github.com/qing-root/CVE-2019-0708-EXP-MSF-) - [distance-vector/CVE-2019-0708](https://github.com/distance-vector/CVE-2019-0708)