From 07e50323f4118d50bc08695406bd0f32559eeb82 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 18 Nov 2020 00:09:23 +0900 Subject: [PATCH] Auto Update 2020/11/18 00:09:23 --- 2014/CVE-2014-0160.json | 8 +++---- 2014/CVE-2014-4210.json | 8 +++---- 2016/CVE-2016-0638.json | 8 +++---- 2017/CVE-2017-11882.json | 4 ++-- 2017/CVE-2017-17215.json | 23 ++++++++++++++++++++ 2017/CVE-2017-3248.json | 8 +++---- 2017/CVE-2017-6971.json | 4 ++-- 2018/CVE-2018-0802.json | 4 ++-- 2018/CVE-2018-10933.json | 8 +++---- 2018/CVE-2018-2628.json | 8 +++---- 2018/CVE-2018-8120.json | 8 +++---- 2019/CVE-2019-0708.json | 8 +++---- 2019/CVE-2019-0841.json | 8 +++---- 2019/CVE-2019-12384.json | 8 +++---- 2019/CVE-2019-1458.json | 8 +++---- 2019/CVE-2019-17558.json | 12 +++++----- 2019/CVE-2019-1821.json | 8 +++---- 2019/CVE-2019-19781.json | 8 +++---- 2019/CVE-2019-2618.json | 8 +++---- 2020/CVE-2020-0668.json | 8 +++---- 2020/CVE-2020-0674.json | 12 +++++----- 2020/CVE-2020-0688.json | 32 +++++++++++++-------------- 2020/CVE-2020-0796.json | 20 ++++++++--------- 2020/CVE-2020-12695.json | 12 +++++----- 2020/CVE-2020-1472.json | 8 +++---- 2020/CVE-2020-14882.json | 47 ++++++++++++++++++++++++++++++---------- 2020/CVE-2020-15228.json | 8 +++---- 2020/CVE-2020-15999.json | 8 +++---- 2020/CVE-2020-16898.json | 8 +++---- 2020/CVE-2020-2546.json | 8 +++---- 2020/CVE-2020-2551.json | 8 +++---- 2020/CVE-2020-2883.json | 8 +++---- README.md | 2 ++ 33 files changed, 198 insertions(+), 150 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 980c3d3245..5a7185ad5b 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -13,13 +13,13 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2020-10-30T01:08:31Z", + "updated_at": "2020-11-17T14:37:11Z", "pushed_at": "2016-05-07T19:35:14Z", - "stargazers_count": 2246, - "watchers_count": 2246, + "stargazers_count": 2247, + "watchers_count": 2247, "forks_count": 482, "forks": 482, - "watchers": 2246, + "watchers": 2247, "score": 0 }, { diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index c5601fc78d..db7cc3336d 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-11-17T07:58:03Z", + "updated_at": "2020-11-17T11:25:27Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 766, - "watchers_count": 766, + "stargazers_count": 767, + "watchers_count": 767, "forks_count": 184, "forks": 184, - "watchers": 766, + "watchers": 767, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 2b7224537f..50bee02574 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-11-17T07:58:03Z", + "updated_at": "2020-11-17T11:25:27Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 766, - "watchers_count": 766, + "stargazers_count": 767, + "watchers_count": 767, "forks_count": 184, "forks": 184, - "watchers": 766, + "watchers": 767, "score": 0 }, { diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index b63a5b7faf..6ca48260d6 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -585,10 +585,10 @@ "html_url": "https:\/\/github.com\/dcsync" }, "html_url": "https:\/\/github.com\/dcsync\/rtfkit", - "description": "RTF exploit kits for cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174", + "description": "generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.", "fork": false, "created_at": "2020-11-16T22:21:54Z", - "updated_at": "2020-11-17T08:14:59Z", + "updated_at": "2020-11-17T13:20:19Z", "pushed_at": "2020-11-16T22:32:12Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2017/CVE-2017-17215.json b/2017/CVE-2017-17215.json index a071577b54..f716182a83 100644 --- a/2017/CVE-2017-17215.json +++ b/2017/CVE-2017-17215.json @@ -21,5 +21,28 @@ "forks": 17, "watchers": 24, "score": 0 + }, + { + "id": 313596733, + "name": "HG532d-RCE-Exploit", + "full_name": "wilfred-wulbou\/HG532d-RCE-Exploit", + "owner": { + "login": "wilfred-wulbou", + "id": 25276623, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25276623?v=4", + "html_url": "https:\/\/github.com\/wilfred-wulbou" + }, + "html_url": "https:\/\/github.com\/wilfred-wulbou\/HG532d-RCE-Exploit", + "description": "A Remote Code Execution (RCE) exploit for Huawei HG532d based on CVE-2017-17215 vulnerability. Modded from original PoC code from exploit-db.com", + "fork": false, + "created_at": "2020-11-17T11:22:20Z", + "updated_at": "2020-11-17T11:51:43Z", + "pushed_at": "2020-11-17T11:33:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index e3024a166f..72c461fce1 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-11-17T07:58:03Z", + "updated_at": "2020-11-17T11:25:27Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 766, - "watchers_count": 766, + "stargazers_count": 767, + "watchers_count": 767, "forks_count": 184, "forks": 184, - "watchers": 766, + "watchers": 767, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-6971.json b/2017/CVE-2017-6971.json index 8da1982e53..ff56645865 100644 --- a/2017/CVE-2017-6971.json +++ b/2017/CVE-2017-6971.json @@ -17,8 +17,8 @@ "pushed_at": "2017-04-10T16:06:56Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 7, - "forks": 7, + "forks_count": 8, + "forks": 8, "watchers": 4, "score": 0 }, diff --git a/2018/CVE-2018-0802.json b/2018/CVE-2018-0802.json index 3295ae884e..dbbab19428 100644 --- a/2018/CVE-2018-0802.json +++ b/2018/CVE-2018-0802.json @@ -102,10 +102,10 @@ "html_url": "https:\/\/github.com\/dcsync" }, "html_url": "https:\/\/github.com\/dcsync\/rtfkit", - "description": "RTF exploit kits for cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174", + "description": "generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.", "fork": false, "created_at": "2020-11-16T22:21:54Z", - "updated_at": "2020-11-17T08:14:59Z", + "updated_at": "2020-11-17T13:20:19Z", "pushed_at": "2020-11-16T22:32:12Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index c2c21ce285..296a9b2ddb 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -36,13 +36,13 @@ "description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)", "fork": false, "created_at": "2018-10-17T14:14:12Z", - "updated_at": "2020-11-04T20:19:55Z", + "updated_at": "2020-11-17T11:14:58Z", "pushed_at": "2020-07-24T17:54:54Z", - "stargazers_count": 469, - "watchers_count": 469, + "stargazers_count": 470, + "watchers_count": 470, "forks_count": 115, "forks": 115, - "watchers": 469, + "watchers": 470, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index a144582a7f..7b4ee2b7f1 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-11-17T07:58:03Z", + "updated_at": "2020-11-17T11:25:27Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 766, - "watchers_count": 766, + "stargazers_count": 767, + "watchers_count": 767, "forks_count": 184, "forks": 184, - "watchers": 766, + "watchers": 767, "score": 0 }, { diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 8fb1dd8034..74ac8cf4e4 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -36,13 +36,13 @@ "description": "CVE-2018-8120 Windows LPE exploit", "fork": false, "created_at": "2018-05-19T02:43:15Z", - "updated_at": "2020-11-06T14:04:19Z", + "updated_at": "2020-11-17T09:59:26Z", "pushed_at": "2018-05-30T13:09:54Z", - "stargazers_count": 441, - "watchers_count": 441, + "stargazers_count": 440, + "watchers_count": 440, "forks_count": 204, "forks": 204, - "watchers": 441, + "watchers": 440, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 071a00b98d..960442d044 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2106,13 +2106,13 @@ "description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程", "fork": false, "created_at": "2019-09-07T05:15:23Z", - "updated_at": "2020-04-06T02:00:19Z", + "updated_at": "2020-11-17T15:10:29Z", "pushed_at": "2019-09-20T04:53:41Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "forks_count": 14, "forks": 14, - "watchers": 37, + "watchers": 38, "score": 0 }, { diff --git a/2019/CVE-2019-0841.json b/2019/CVE-2019-0841.json index 3b13777ba0..219602f933 100644 --- a/2019/CVE-2019-0841.json +++ b/2019/CVE-2019-0841.json @@ -13,13 +13,13 @@ "description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability", "fork": false, "created_at": "2019-04-05T12:53:52Z", - "updated_at": "2020-11-17T01:48:15Z", + "updated_at": "2020-11-17T14:42:20Z", "pushed_at": "2019-04-09T16:49:19Z", - "stargazers_count": 220, - "watchers_count": 220, + "stargazers_count": 221, + "watchers_count": 221, "forks_count": 97, "forks": 97, - "watchers": 220, + "watchers": 221, "score": 0 }, { diff --git a/2019/CVE-2019-12384.json b/2019/CVE-2019-12384.json index 40ae4c4467..1104478dcb 100644 --- a/2019/CVE-2019-12384.json +++ b/2019/CVE-2019-12384.json @@ -13,13 +13,13 @@ "description": "Jackson Rce For CVE-2019-12384 ", "fork": false, "created_at": "2019-07-24T07:12:14Z", - "updated_at": "2020-11-16T19:35:45Z", + "updated_at": "2020-11-17T14:38:51Z", "pushed_at": "2019-07-24T07:31:42Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 15, "forks": 15, - "watchers": 68, + "watchers": 67, "score": 0 }, { diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index 492ba9853f..2f61656b87 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -36,13 +36,13 @@ "description": "CVE-2019-1458 Windows LPE Exploit", "fork": false, "created_at": "2020-03-11T08:30:14Z", - "updated_at": "2020-11-10T16:10:15Z", + "updated_at": "2020-11-17T14:42:06Z", "pushed_at": "2020-03-11T09:59:01Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "forks_count": 26, "forks": 26, - "watchers": 85, + "watchers": 86, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index d02c044ba5..1c10386021 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-11-17T06:26:35Z", + "updated_at": "2020-11-17T15:09:04Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2056, - "watchers_count": 2056, - "forks_count": 554, - "forks": 554, - "watchers": 2056, + "stargazers_count": 2058, + "watchers_count": 2058, + "forks_count": 555, + "forks": 555, + "watchers": 2058, "score": 0 }, { diff --git a/2019/CVE-2019-1821.json b/2019/CVE-2019-1821.json index 7fc4988009..51ef063a45 100644 --- a/2019/CVE-2019-1821.json +++ b/2019/CVE-2019-1821.json @@ -13,13 +13,13 @@ "description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)", "fork": false, "created_at": "2019-05-21T12:42:54Z", - "updated_at": "2020-10-28T06:04:16Z", + "updated_at": "2020-11-17T10:13:22Z", "pushed_at": "2019-05-21T14:52:36Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "forks_count": 40, "forks": 40, - "watchers": 61, + "watchers": 62, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 693fbfd7b4..80e9700b40 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -59,13 +59,13 @@ "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "fork": false, "created_at": "2020-01-11T00:08:27Z", - "updated_at": "2020-11-10T07:13:02Z", + "updated_at": "2020-11-17T09:11:55Z", "pushed_at": "2020-01-22T20:23:51Z", - "stargazers_count": 511, - "watchers_count": 511, + "stargazers_count": 512, + "watchers_count": 512, "forks_count": 121, "forks": 121, - "watchers": 511, + "watchers": 512, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 6c9a5d4cbc..6d472696a9 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-11-17T07:58:03Z", + "updated_at": "2020-11-17T11:25:27Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 766, - "watchers_count": 766, + "stargazers_count": 767, + "watchers_count": 767, "forks_count": 184, "forks": 184, - "watchers": 766, + "watchers": 767, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json index b32d7b5e46..93556e4cd4 100644 --- a/2020/CVE-2020-0668.json +++ b/2020/CVE-2020-0668.json @@ -13,13 +13,13 @@ "description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability", "fork": false, "created_at": "2019-10-11T09:08:02Z", - "updated_at": "2020-10-22T09:55:46Z", + "updated_at": "2020-11-17T09:49:41Z", "pushed_at": "2020-02-26T09:24:45Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "forks_count": 20, "forks": 20, - "watchers": 48, + "watchers": 49, "score": 0 }, { diff --git a/2020/CVE-2020-0674.json b/2020/CVE-2020-0674.json index ae08ee4be9..fbee6a9bb0 100644 --- a/2020/CVE-2020-0674.json +++ b/2020/CVE-2020-0674.json @@ -36,13 +36,13 @@ "description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.", "fork": false, "created_at": "2020-05-07T22:02:25Z", - "updated_at": "2020-11-01T10:33:58Z", + "updated_at": "2020-11-17T14:53:06Z", "pushed_at": "2020-05-15T09:03:36Z", - "stargazers_count": 181, - "watchers_count": 181, - "forks_count": 63, - "forks": 63, - "watchers": 181, + "stargazers_count": 182, + "watchers_count": 182, + "forks_count": 62, + "forks": 62, + "watchers": 182, "score": 0 }, { diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index b075b2bf60..b388b14987 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -59,13 +59,13 @@ "description": "cve-2020-0688", "fork": false, "created_at": "2020-02-27T02:54:27Z", - "updated_at": "2020-11-13T05:27:25Z", + "updated_at": "2020-11-17T12:24:25Z", "pushed_at": "2020-06-19T09:28:15Z", - "stargazers_count": 234, - "watchers_count": 234, + "stargazers_count": 235, + "watchers_count": 235, "forks_count": 85, "forks": 85, - "watchers": 234, + "watchers": 235, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.", "fork": false, "created_at": "2020-02-28T16:04:30Z", - "updated_at": "2020-11-11T05:58:02Z", + "updated_at": "2020-11-17T12:39:16Z", "pushed_at": "2020-10-07T08:10:46Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "forks_count": 10, "forks": 10, - "watchers": 20, + "watchers": 21, "score": 0 }, { @@ -197,13 +197,13 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2020-11-13T03:09:36Z", + "updated_at": "2020-11-17T12:11:12Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 240, - "watchers_count": 240, + "stargazers_count": 241, + "watchers_count": 241, "forks_count": 66, "forks": 66, - "watchers": 240, + "watchers": 241, "score": 0 }, { @@ -266,13 +266,13 @@ "description": "Exploitation Script for CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\"", "fork": false, "created_at": "2020-03-31T15:29:52Z", - "updated_at": "2020-10-19T15:20:34Z", + "updated_at": "2020-11-17T12:36:40Z", "pushed_at": "2020-04-01T06:57:50Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 7, "forks": 7, - "watchers": 10, + "watchers": 11, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 98afb7be90..e31f0aa592 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -611,13 +611,13 @@ "description": "Advanced scanner for CVE-2020-0796 - SMBv3 RCE ", "fork": false, "created_at": "2020-03-14T02:07:16Z", - "updated_at": "2020-10-18T05:44:56Z", + "updated_at": "2020-11-17T14:47:44Z", "pushed_at": "2020-08-09T13:15:48Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 3, "forks": 3, - "watchers": 10, + "watchers": 11, "score": 0 }, { @@ -864,13 +864,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2020-11-15T08:33:45Z", + "updated_at": "2020-11-17T09:42:43Z", "pushed_at": "2020-04-08T19:27:07Z", - "stargazers_count": 1031, - "watchers_count": 1031, - "forks_count": 346, - "forks": 346, - "watchers": 1031, + "stargazers_count": 1032, + "watchers_count": 1032, + "forks_count": 347, + "forks": 347, + "watchers": 1032, "score": 0 }, { diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index fcbda650dd..d9f133a6bc 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,13 +13,13 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2020-11-17T07:16:47Z", + "updated_at": "2020-11-17T12:39:14Z", "pushed_at": "2020-06-17T13:41:23Z", - "stargazers_count": 344, - "watchers_count": 344, - "forks_count": 61, - "forks": 61, - "watchers": 344, + "stargazers_count": 345, + "watchers_count": 345, + "forks_count": 60, + "forks": 60, + "watchers": 345, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 9529d40dfe..0f6b21c061 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2020-11-16T13:02:27Z", + "updated_at": "2020-11-17T13:44:20Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 220, - "watchers_count": 220, + "stargazers_count": 221, + "watchers_count": 221, "forks_count": 85, "forks": 85, - "watchers": 220, + "watchers": 221, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 0e1ca88c40..b57d114f3d 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-11-17T06:26:35Z", + "updated_at": "2020-11-17T15:09:04Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2056, - "watchers_count": 2056, - "forks_count": 554, - "forks": 554, - "watchers": 2056, + "stargazers_count": 2058, + "watchers_count": 2058, + "forks_count": 555, + "forks": 555, + "watchers": 2058, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "CVE-2020–14882、CVE-2020–14883", "fork": false, "created_at": "2020-10-28T11:43:37Z", - "updated_at": "2020-11-17T09:04:26Z", + "updated_at": "2020-11-17T12:47:01Z", "pushed_at": "2020-11-16T04:23:09Z", - "stargazers_count": 183, - "watchers_count": 183, - "forks_count": 34, - "forks": 34, - "watchers": 183, + "stargazers_count": 184, + "watchers_count": 184, + "forks_count": 35, + "forks": 35, + "watchers": 184, "score": 0 }, { @@ -481,5 +481,28 @@ "forks": 0, "watchers": 2, "score": 0 + }, + { + "id": 313643357, + "name": "CVE-2020-14882", + "full_name": "BabyTeam1024\/CVE-2020-14882", + "owner": { + "login": "BabyTeam1024", + "id": 74447452, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/74447452?v=4", + "html_url": "https:\/\/github.com\/BabyTeam1024" + }, + "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882", + "description": null, + "fork": false, + "created_at": "2020-11-17T14:23:23Z", + "updated_at": "2020-11-17T14:23:23Z", + "pushed_at": "2020-11-17T14:23:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-15228.json b/2020/CVE-2020-15228.json index 666825f915..22dbeac5bc 100644 --- a/2020/CVE-2020-15228.json +++ b/2020/CVE-2020-15228.json @@ -13,13 +13,13 @@ "description": "Fix CVE-2020-15228 (set-env, add-path in Github-Actions)", "fork": false, "created_at": "2020-11-12T11:59:47Z", - "updated_at": "2020-11-16T10:31:53Z", + "updated_at": "2020-11-17T14:06:12Z", "pushed_at": "2020-11-16T10:31:51Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 0, "forks": 0, - "watchers": 4, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-15999.json b/2020/CVE-2020-15999.json index 277c7741fa..b003acda4e 100644 --- a/2020/CVE-2020-15999.json +++ b/2020/CVE-2020-15999.json @@ -13,13 +13,13 @@ "description": "CVE-2020-15999", "fork": false, "created_at": "2020-10-28T16:16:25Z", - "updated_at": "2020-11-16T10:46:21Z", + "updated_at": "2020-11-17T11:48:50Z", "pushed_at": "2020-11-03T17:53:20Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "forks_count": 6, "forks": 6, - "watchers": 23, + "watchers": 24, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index cf8d5b797a..4128c779a1 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -174,13 +174,13 @@ "description": "PoC BSOD for CVE-2020-16898 (badneighbor)", "fork": false, "created_at": "2020-10-16T23:03:15Z", - "updated_at": "2020-11-02T17:37:16Z", + "updated_at": "2020-11-17T13:20:45Z", "pushed_at": "2020-10-16T23:12:52Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 2, "forks": 2, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2020/CVE-2020-2546.json b/2020/CVE-2020-2546.json index 23454662b1..8c71bc1813 100644 --- a/2020/CVE-2020-2546.json +++ b/2020/CVE-2020-2546.json @@ -13,13 +13,13 @@ "description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,", "fork": false, "created_at": "2020-03-02T15:54:46Z", - "updated_at": "2020-11-15T13:05:44Z", + "updated_at": "2020-11-17T12:37:47Z", "pushed_at": "2020-06-10T10:49:38Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "forks_count": 27, "forks": 27, - "watchers": 117, + "watchers": 118, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 67d5e4b613..c7b9ff0f11 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-11-17T07:58:03Z", + "updated_at": "2020-11-17T11:25:27Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 766, - "watchers_count": 766, + "stargazers_count": 767, + "watchers_count": 767, "forks_count": 184, "forks": 184, - "watchers": 766, + "watchers": 767, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 0361e656e8..9c7b29730d 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -13,13 +13,13 @@ "description": "Weblogic coherence.jar RCE", "fork": false, "created_at": "2020-05-10T09:04:43Z", - "updated_at": "2020-11-14T14:26:59Z", + "updated_at": "2020-11-17T09:44:11Z", "pushed_at": "2020-05-10T09:29:36Z", - "stargazers_count": 164, - "watchers_count": 164, + "stargazers_count": 165, + "watchers_count": 165, "forks_count": 32, "forks": 32, - "watchers": 164, + "watchers": 165, "score": 0 }, { diff --git a/README.md b/README.md index db5b52b389..cd7251d887 100644 --- a/README.md +++ b/README.md @@ -2311,6 +2311,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [AirEvan/CVE-2020-14882-GUI-Test](https://github.com/AirEvan/CVE-2020-14882-GUI-Test) - [corelight/CVE-2020-14882-weblogicRCE](https://github.com/corelight/CVE-2020-14882-weblogicRCE) - [x51/CVE-2020-14882](https://github.com/x51/CVE-2020-14882) +- [BabyTeam1024/CVE-2020-14882](https://github.com/BabyTeam1024/CVE-2020-14882) ### CVE-2020-14883 (2020-10-21) @@ -11718,6 +11719,7 @@ Huawei HG532 with some customized versions has a remote code execution vulnerabi - [1337g/CVE-2017-17215](https://github.com/1337g/CVE-2017-17215) +- [wilfred-wulbou/HG532d-RCE-Exploit](https://github.com/wilfred-wulbou/HG532d-RCE-Exploit) ### CVE-2017-17309 (2018-06-14)