diff --git a/2015/CVE-2015-7547.json b/2015/CVE-2015-7547.json index 5567cb89d0..219fe846c4 100644 --- a/2015/CVE-2015-7547.json +++ b/2015/CVE-2015-7547.json @@ -17,8 +17,8 @@ "pushed_at": "2016-02-20T07:57:58Z", "stargazers_count": 548, "watchers_count": 548, - "forks_count": 179, - "forks": 179, + "forks_count": 180, + "forks": 180, "watchers": 548, "score": 0 }, diff --git a/2017/CVE-2017-0143.json b/2017/CVE-2017-0143.json index 575b607d4c..b3df5ddbc6 100644 --- a/2017/CVE-2017-0143.json +++ b/2017/CVE-2017-0143.json @@ -36,8 +36,8 @@ "description": "This would basically send smb1 (not smb2) packets to determine if a machine is vulnerable to CVE-2017-0143 (Etern-Blue for windows). (Work in progress)", "fork": false, "created_at": "2020-10-07T06:19:45Z", - "updated_at": "2020-10-17T20:12:44Z", - "pushed_at": "2020-10-17T20:12:42Z", + "updated_at": "2020-10-19T04:50:31Z", + "pushed_at": "2020-10-19T04:50:29Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2018/CVE-2018-4878.json b/2018/CVE-2018-4878.json index 22e43e29a8..01d4b7301a 100644 --- a/2018/CVE-2018-4878.json +++ b/2018/CVE-2018-4878.json @@ -82,13 +82,13 @@ "description": "Aggressor Script to launch IE driveby for CVE-2018-4878", "fork": false, "created_at": "2018-02-10T09:30:18Z", - "updated_at": "2020-08-08T11:02:28Z", + "updated_at": "2020-10-19T06:42:48Z", "pushed_at": "2018-02-10T19:39:10Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 76, + "watchers_count": 76, "forks_count": 31, "forks": 31, - "watchers": 77, + "watchers": 76, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 820eb36557..8ef06a7b76 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2020-10-18T12:47:22Z", + "updated_at": "2020-10-19T06:41:08Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 319, - "watchers_count": 319, + "stargazers_count": 320, + "watchers_count": 320, "forks_count": 71, "forks": 71, - "watchers": 319, + "watchers": 320, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 9e62cccc92..e0eb605c51 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1071,13 +1071,13 @@ "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", - "updated_at": "2020-10-14T03:55:14Z", + "updated_at": "2020-10-19T07:30:59Z", "pushed_at": "2019-10-01T12:23:59Z", - "stargazers_count": 1117, - "watchers_count": 1117, + "stargazers_count": 1118, + "watchers_count": 1118, "forks_count": 378, "forks": 378, - "watchers": 1117, + "watchers": 1118, "score": 0 }, { diff --git a/2019/CVE-2019-12409.json b/2019/CVE-2019-12409.json index 52581e98c9..65bd04f3c2 100644 --- a/2019/CVE-2019-12409.json +++ b/2019/CVE-2019-12409.json @@ -13,13 +13,13 @@ "description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")", "fork": false, "created_at": "2019-11-19T08:53:56Z", - "updated_at": "2020-10-14T18:26:01Z", + "updated_at": "2020-10-19T03:11:50Z", "pushed_at": "2019-11-19T09:18:00Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "forks_count": 31, "forks": 31, - "watchers": 92, + "watchers": 93, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index d6c2c24326..31c1c975c0 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-10-18T10:31:02Z", + "updated_at": "2020-10-19T04:33:59Z", "pushed_at": "2020-10-10T04:01:51Z", - "stargazers_count": 1945, - "watchers_count": 1945, + "stargazers_count": 1946, + "watchers_count": 1946, "forks_count": 511, "forks": 511, - "watchers": 1945, + "watchers": 1946, "score": 0 }, { diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 45e6520ae6..d0dc33b4c9 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -36,13 +36,13 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2020-10-12T06:04:08Z", + "updated_at": "2020-10-19T03:34:23Z", "pushed_at": "2019-02-19T11:45:13Z", - "stargazers_count": 400, - "watchers_count": 400, + "stargazers_count": 401, + "watchers_count": 401, "forks_count": 104, "forks": 104, - "watchers": 400, + "watchers": 401, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index bf9181f1b5..c122eadf83 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -864,13 +864,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2020-10-17T04:34:17Z", + "updated_at": "2020-10-19T06:26:04Z", "pushed_at": "2020-04-08T19:27:07Z", - "stargazers_count": 1019, - "watchers_count": 1019, + "stargazers_count": 1020, + "watchers_count": 1020, "forks_count": 333, "forks": 333, - "watchers": 1019, + "watchers": 1020, "score": 0 }, { @@ -1094,13 +1094,13 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2020-10-15T20:34:31Z", + "updated_at": "2020-10-19T06:32:20Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 324, - "watchers_count": 324, + "stargazers_count": 325, + "watchers_count": 325, "forks_count": 108, "forks": 108, - "watchers": 324, + "watchers": 325, "score": 0 }, { diff --git a/2020/CVE-2020-11989.json b/2020/CVE-2020-11989.json index 017812f35e..185bda6f2f 100644 --- a/2020/CVE-2020-11989.json +++ b/2020/CVE-2020-11989.json @@ -13,8 +13,8 @@ "description": null, "fork": false, "created_at": "2020-10-18T08:34:47Z", - "updated_at": "2020-10-18T08:35:16Z", - "pushed_at": "2020-10-18T08:35:14Z", + "updated_at": "2020-10-19T08:52:49Z", + "pushed_at": "2020-10-19T08:52:44Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-12828.json b/2020/CVE-2020-12828.json index b67f4d95d2..a551ec2b69 100644 --- a/2020/CVE-2020-12828.json +++ b/2020/CVE-2020-12828.json @@ -17,8 +17,8 @@ "pushed_at": "2020-06-30T16:03:35Z", "stargazers_count": 27, "watchers_count": 27, - "forks_count": 9, - "forks": 9, + "forks_count": 10, + "forks": 10, "watchers": 27, "score": 0 } diff --git a/2020/CVE-2020-12856.json b/2020/CVE-2020-12856.json index f43aa3b86b..b2bf4827df 100644 --- a/2020/CVE-2020-12856.json +++ b/2020/CVE-2020-12856.json @@ -13,13 +13,13 @@ "description": "A bluetooth-related vulnerability in some contact tracing apps", "fork": false, "created_at": "2020-05-15T00:18:03Z", - "updated_at": "2020-10-18T07:36:27Z", + "updated_at": "2020-10-19T05:11:20Z", "pushed_at": "2020-06-26T03:41:19Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "forks_count": 5, "forks": 5, - "watchers": 24, + "watchers": 25, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1301.json b/2020/CVE-2020-1301.json index 2ed76c7c3d..6d2703bc19 100644 --- a/2020/CVE-2020-1301.json +++ b/2020/CVE-2020-1301.json @@ -40,8 +40,8 @@ "pushed_at": "2020-06-13T18:55:03Z", "stargazers_count": 14, "watchers_count": 14, - "forks_count": 7, - "forks": 7, + "forks_count": 8, + "forks": 8, "watchers": 14, "score": 0 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 426fdf6a8b..da83a032d9 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -86,8 +86,8 @@ "pushed_at": "2020-09-25T15:32:01Z", "stargazers_count": 669, "watchers_count": 669, - "forks_count": 191, - "forks": 191, + "forks_count": 190, + "forks": 190, "watchers": 669, "score": 0 }, @@ -611,8 +611,8 @@ "description": null, "fork": false, "created_at": "2020-09-20T13:44:16Z", - "updated_at": "2020-09-20T13:53:23Z", - "pushed_at": "2020-09-20T13:53:21Z", + "updated_at": "2020-10-19T06:55:24Z", + "pushed_at": "2020-10-19T06:55:22Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index 85504959cf..a9c45d3f36 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -13,13 +13,13 @@ "description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule", "fork": false, "created_at": "2020-10-07T19:56:09Z", - "updated_at": "2020-10-19T01:27:00Z", + "updated_at": "2020-10-19T05:24:19Z", "pushed_at": "2020-10-15T02:57:22Z", - "stargazers_count": 186, - "watchers_count": 186, - "forks_count": 22, - "forks": 22, - "watchers": 186, + "stargazers_count": 188, + "watchers_count": 188, + "forks_count": 23, + "forks": 23, + "watchers": 188, "score": 0 }, { @@ -220,13 +220,13 @@ "description": "PoC BSOD for CVE-2020-16898", "fork": false, "created_at": "2020-10-17T04:32:11Z", - "updated_at": "2020-10-17T10:46:42Z", + "updated_at": "2020-10-19T09:05:12Z", "pushed_at": "2020-10-17T04:32:19Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 2, "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2020/CVE-2020-16947.json b/2020/CVE-2020-16947.json index a6002b0545..b794f9ac9e 100644 --- a/2020/CVE-2020-16947.json +++ b/2020/CVE-2020-16947.json @@ -13,13 +13,13 @@ "description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)", "fork": false, "created_at": "2020-10-15T14:32:25Z", - "updated_at": "2020-10-19T02:02:33Z", + "updated_at": "2020-10-19T07:50:40Z", "pushed_at": "2020-10-15T14:57:31Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "forks_count": 26, "forks": 26, - "watchers": 87, + "watchers": 88, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index b11b115250..8357d7b96a 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -312,13 +312,13 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2020-10-13T09:14:30Z", + "updated_at": "2020-10-19T06:38:38Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 145, - "watchers_count": 145, + "stargazers_count": 146, + "watchers_count": 146, "forks_count": 50, "forks": 50, - "watchers": 145, + "watchers": 146, "score": 0 }, { diff --git a/2020/CVE-2020-24771.json b/2020/CVE-2020-24771.json new file mode 100644 index 0000000000..72bf52f2d7 --- /dev/null +++ b/2020/CVE-2020-24771.json @@ -0,0 +1,25 @@ +[ + { + "id": 305250470, + "name": "CVE-2020-24771", + "full_name": "qlh831\/CVE-2020-24771", + "owner": { + "login": "qlh831", + "id": 73090087, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/73090087?v=4", + "html_url": "https:\/\/github.com\/qlh831" + }, + "html_url": "https:\/\/github.com\/qlh831\/CVE-2020-24771", + "description": null, + "fork": false, + "created_at": "2020-10-19T03:16:34Z", + "updated_at": "2020-10-19T03:25:00Z", + "pushed_at": "2020-10-19T03:24:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 24a26f1da6..a359efef7f 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -59,13 +59,13 @@ "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", - "updated_at": "2020-10-19T02:39:44Z", + "updated_at": "2020-10-19T03:58:51Z", "pushed_at": "2020-04-16T08:38:42Z", - "stargazers_count": 210, - "watchers_count": 210, + "stargazers_count": 211, + "watchers_count": 211, "forks_count": 50, "forks": 50, - "watchers": 210, + "watchers": 211, "score": 0 }, { diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index 5bbfc17b79..77ed4ba0ae 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-10-18T10:31:02Z", + "updated_at": "2020-10-19T04:33:59Z", "pushed_at": "2020-10-10T04:01:51Z", - "stargazers_count": 1945, - "watchers_count": 1945, + "stargazers_count": 1946, + "watchers_count": 1946, "forks_count": 511, "forks": 511, - "watchers": 1945, + "watchers": 1946, "score": 0 }, { @@ -703,13 +703,13 @@ "description": "F5 BIG-IP 任意文件读取+远程命令执行RCE", "fork": false, "created_at": "2020-07-08T04:02:07Z", - "updated_at": "2020-08-01T15:52:07Z", + "updated_at": "2020-10-19T05:58:40Z", "pushed_at": "2020-07-08T04:10:12Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 4, - "forks": 4, - "watchers": 4, + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 5, + "forks": 5, + "watchers": 5, "score": 0 }, { diff --git a/2020/CVE-2020-8515.json b/2020/CVE-2020-8515.json index 708821ba0c..fadc23dc38 100644 --- a/2020/CVE-2020-8515.json +++ b/2020/CVE-2020-8515.json @@ -17,8 +17,8 @@ "pushed_at": "2020-03-30T03:33:37Z", "stargazers_count": 12, "watchers_count": 12, - "forks_count": 8, - "forks": 8, + "forks_count": 9, + "forks": 9, "watchers": 12, "score": 0 } diff --git a/2020/CVE-2020-8840.json b/2020/CVE-2020-8840.json index 622704d305..9da3012a6c 100644 --- a/2020/CVE-2020-8840.json +++ b/2020/CVE-2020-8840.json @@ -36,13 +36,13 @@ "description": "来源于jackson-CVE-2020-8840,需要开autotype", "fork": false, "created_at": "2020-02-23T03:51:40Z", - "updated_at": "2020-08-21T06:46:26Z", + "updated_at": "2020-10-19T05:03:13Z", "pushed_at": "2020-06-15T22:01:49Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 5, "forks": 5, - "watchers": 12, + "watchers": 11, "score": 0 }, { diff --git a/README.md b/README.md index 7107a98427..e1ab08ed04 100644 --- a/README.md +++ b/README.md @@ -2365,6 +2365,9 @@ FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction betwee ### CVE-2020-24765 - [trump88/CVE-2020-24765](https://github.com/trump88/CVE-2020-24765) +### CVE-2020-24771 +- [qlh831/CVE-2020-24771](https://github.com/qlh831/CVE-2020-24771) + ### CVE-2020-24955