diff --git a/2014/CVE-2014-3153.json b/2014/CVE-2014-3153.json
index 32c3308aef..d38e327baa 100644
--- a/2014/CVE-2014-3153.json
+++ b/2014/CVE-2014-3153.json
@@ -174,8 +174,8 @@
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
"fork": false,
"created_at": "2020-10-31T11:39:11Z",
- "updated_at": "2021-01-08T11:10:11Z",
- "pushed_at": "2021-01-08T11:10:09Z",
+ "updated_at": "2021-01-09T11:52:12Z",
+ "pushed_at": "2021-01-09T11:52:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2016/CVE-2016-8776.json b/2016/CVE-2016-8776.json
index 6f0fd95960..88789f2ea9 100644
--- a/2016/CVE-2016-8776.json
+++ b/2016/CVE-2016-8776.json
@@ -13,13 +13,13 @@
"description": "frp bypass without account overwrite",
"fork": false,
"created_at": "2017-10-08T12:26:23Z",
- "updated_at": "2019-03-17T16:31:49Z",
+ "updated_at": "2021-01-09T10:39:40Z",
"pushed_at": "2017-10-08T12:26:24Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 7,
+ "watchers_count": 7,
"forks_count": 3,
"forks": 3,
- "watchers": 6,
+ "watchers": 7,
"score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json
index 0c612a4f31..8b25ccb9bb 100644
--- a/2018/CVE-2018-5955.json
+++ b/2018/CVE-2018-5955.json
@@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
- "updated_at": "2021-01-07T16:23:08Z",
+ "updated_at": "2021-01-09T14:31:00Z",
"pushed_at": "2020-01-05T21:46:25Z",
- "stargazers_count": 349,
- "watchers_count": 349,
+ "stargazers_count": 350,
+ "watchers_count": 350,
"forks_count": 80,
"forks": 80,
- "watchers": 349,
+ "watchers": 350,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index 78ce00b218..6089ff6c76 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -82,7 +82,7 @@
"description": "CVE-2019-0708-exploit",
"fork": false,
"created_at": "2019-05-15T02:24:21Z",
- "updated_at": "2021-01-04T02:05:33Z",
+ "updated_at": "2021-01-09T14:06:25Z",
"pushed_at": "2019-05-15T02:26:46Z",
"stargazers_count": 116,
"watchers_count": 116,
@@ -1439,13 +1439,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
- "updated_at": "2021-01-06T16:13:11Z",
+ "updated_at": "2021-01-09T12:21:20Z",
"pushed_at": "2019-09-03T20:50:28Z",
- "stargazers_count": 1054,
- "watchers_count": 1054,
+ "stargazers_count": 1055,
+ "watchers_count": 1055,
"forks_count": 353,
"forks": 353,
- "watchers": 1054,
+ "watchers": 1055,
"score": 0
},
{
diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json
index 2fb9352edc..8a78f21671 100644
--- a/2019/CVE-2019-12586.json
+++ b/2019/CVE-2019-12586.json
@@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
- "updated_at": "2021-01-07T07:18:25Z",
+ "updated_at": "2021-01-09T12:54:41Z",
"pushed_at": "2019-09-08T06:09:11Z",
- "stargazers_count": 680,
- "watchers_count": 680,
+ "stargazers_count": 681,
+ "watchers_count": 681,
"forks_count": 61,
"forks": 61,
- "watchers": 680,
+ "watchers": 681,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json
index e4bd836376..4bd169df70 100644
--- a/2019/CVE-2019-15126.json
+++ b/2019/CVE-2019-15126.json
@@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
- "updated_at": "2021-01-05T05:16:02Z",
+ "updated_at": "2021-01-09T15:05:07Z",
"pushed_at": "2020-03-22T19:46:04Z",
- "stargazers_count": 183,
- "watchers_count": 183,
+ "stargazers_count": 182,
+ "watchers_count": 182,
"forks_count": 59,
"forks": 59,
- "watchers": 183,
+ "watchers": 182,
"score": 0
},
{
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index cc53414cf4..243fcbea64 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -726,13 +726,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T23:13:00Z",
- "updated_at": "2020-12-10T08:53:49Z",
+ "updated_at": "2021-01-09T10:04:39Z",
"pushed_at": "2020-03-25T16:48:30Z",
- "stargazers_count": 57,
- "watchers_count": 57,
+ "stargazers_count": 58,
+ "watchers_count": 58,
"forks_count": 11,
"forks": 11,
- "watchers": 57,
+ "watchers": 58,
"score": 0
},
{
diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json
index 60fb58bc64..7dad8f9dbb 100644
--- a/2019/CVE-2019-7238.json
+++ b/2019/CVE-2019-7238.json
@@ -36,13 +36,13 @@
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
"fork": false,
"created_at": "2019-05-21T13:16:02Z",
- "updated_at": "2020-07-27T02:19:18Z",
+ "updated_at": "2021-01-09T14:57:47Z",
"pushed_at": "2019-08-19T17:33:56Z",
- "stargazers_count": 57,
- "watchers_count": 57,
+ "stargazers_count": 58,
+ "watchers_count": 58,
"forks_count": 20,
"forks": 20,
- "watchers": 57,
+ "watchers": 58,
"score": 0
},
{
diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json
index 86fdcd4071..6aad70467b 100644
--- a/2020/CVE-2020-0609.json
+++ b/2020/CVE-2020-0609.json
@@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false,
"created_at": "2020-01-21T21:33:17Z",
- "updated_at": "2020-12-23T19:30:32Z",
+ "updated_at": "2021-01-09T11:46:42Z",
"pushed_at": "2020-07-05T17:27:24Z",
- "stargazers_count": 35,
- "watchers_count": 35,
+ "stargazers_count": 36,
+ "watchers_count": 36,
"forks_count": 6,
"forks": 6,
- "watchers": 35,
+ "watchers": 36,
"score": 0
},
{
diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json
index 935b089841..419a78d097 100644
--- a/2020/CVE-2020-0688.json
+++ b/2020/CVE-2020-0688.json
@@ -151,13 +151,13 @@
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
"fork": false,
"created_at": "2020-02-28T16:04:30Z",
- "updated_at": "2020-12-28T03:45:49Z",
+ "updated_at": "2021-01-09T11:01:49Z",
"pushed_at": "2020-10-07T08:10:46Z",
- "stargazers_count": 31,
- "watchers_count": 31,
+ "stargazers_count": 32,
+ "watchers_count": 32,
"forks_count": 10,
"forks": 10,
- "watchers": 31,
+ "watchers": 32,
"score": 0
},
{
@@ -243,13 +243,13 @@
"description": "Vulnerability scanner for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-19T16:39:56Z",
- "updated_at": "2020-10-06T17:27:40Z",
+ "updated_at": "2021-01-09T11:45:35Z",
"pushed_at": "2020-03-19T16:41:39Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"forks_count": 0,
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0
},
{
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index 1411f922bd..47615cc596 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -174,13 +174,13 @@
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
"fork": false,
"created_at": "2020-03-12T02:20:07Z",
- "updated_at": "2020-12-21T01:37:26Z",
+ "updated_at": "2021-01-09T11:44:13Z",
"pushed_at": "2020-03-12T02:49:10Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"forks_count": 9,
"forks": 9,
- "watchers": 8,
+ "watchers": 9,
"score": 0
},
{
@@ -910,13 +910,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
- "updated_at": "2021-01-09T02:41:33Z",
+ "updated_at": "2021-01-09T13:41:47Z",
"pushed_at": "2020-12-07T20:04:27Z",
- "stargazers_count": 1059,
- "watchers_count": 1059,
+ "stargazers_count": 1060,
+ "watchers_count": 1060,
"forks_count": 355,
"forks": 355,
- "watchers": 1059,
+ "watchers": 1060,
"score": 0
},
{
@@ -1140,13 +1140,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
- "updated_at": "2021-01-08T13:41:03Z",
+ "updated_at": "2021-01-09T13:11:00Z",
"pushed_at": "2020-06-09T20:46:45Z",
- "stargazers_count": 345,
- "watchers_count": 345,
+ "stargazers_count": 346,
+ "watchers_count": 346,
"forks_count": 117,
"forks": 117,
- "watchers": 345,
+ "watchers": 346,
"score": 0
},
{
diff --git a/2020/CVE-2020-11851.json b/2020/CVE-2020-11851.json
index b360c28832..d3dc110d92 100644
--- a/2020/CVE-2020-11851.json
+++ b/2020/CVE-2020-11851.json
@@ -13,13 +13,13 @@
"description": "Remote Code Execution vulnerability on ArcSight Logger",
"fork": false,
"created_at": "2021-01-07T12:30:23Z",
- "updated_at": "2021-01-08T20:32:49Z",
- "pushed_at": "2021-01-07T14:06:11Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "updated_at": "2021-01-09T10:35:20Z",
+ "pushed_at": "2021-01-09T10:15:48Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
"forks_count": 0,
"forks": 0,
- "watchers": 5,
+ "watchers": 6,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index e574dbb435..5d355ca692 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
- "updated_at": "2021-01-09T07:22:14Z",
+ "updated_at": "2021-01-09T14:41:21Z",
"pushed_at": "2021-01-08T11:00:13Z",
- "stargazers_count": 705,
- "watchers_count": 705,
- "forks_count": 124,
- "forks": 124,
- "watchers": 705,
+ "stargazers_count": 709,
+ "watchers_count": 709,
+ "forks_count": 126,
+ "forks": 126,
+ "watchers": 709,
"score": 0
},
{
diff --git a/2020/CVE-2020-17519.json b/2020/CVE-2020-17519.json
index 9c0046349a..3ce9ec3851 100644
--- a/2020/CVE-2020-17519.json
+++ b/2020/CVE-2020-17519.json
@@ -17,8 +17,8 @@
"pushed_at": "2021-01-06T23:51:32Z",
"stargazers_count": 30,
"watchers_count": 30,
- "forks_count": 8,
- "forks": 8,
+ "forks_count": 9,
+ "forks": 9,
"watchers": 30,
"score": 0
},
diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json
index a9c04f34c1..cba406fc01 100644
--- a/2020/CVE-2020-5902.json
+++ b/2020/CVE-2020-5902.json
@@ -59,13 +59,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
- "updated_at": "2021-01-08T12:31:15Z",
+ "updated_at": "2021-01-09T11:48:35Z",
"pushed_at": "2020-07-15T02:52:33Z",
- "stargazers_count": 328,
- "watchers_count": 328,
+ "stargazers_count": 329,
+ "watchers_count": 329,
"forks_count": 103,
"forks": 103,
- "watchers": 328,
+ "watchers": 329,
"score": 0
},
{
diff --git a/2020/CVE-2020-7048.json b/2020/CVE-2020-7048.json
new file mode 100644
index 0000000000..3dbd5703cc
--- /dev/null
+++ b/2020/CVE-2020-7048.json
@@ -0,0 +1,25 @@
+[
+ {
+ "id": 328165952,
+ "name": "CVE-2020-7048",
+ "full_name": "ElmouradiAmine\/CVE-2020-7048",
+ "owner": {
+ "login": "ElmouradiAmine",
+ "id": 48139304,
+ "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48139304?v=4",
+ "html_url": "https:\/\/github.com\/ElmouradiAmine"
+ },
+ "html_url": "https:\/\/github.com\/ElmouradiAmine\/CVE-2020-7048",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-09T13:52:09Z",
+ "updated_at": "2021-01-09T13:54:32Z",
+ "pushed_at": "2021-01-09T13:54:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json
index 1c07faf492..4682b88b55 100644
--- a/2020/CVE-2020-8165.json
+++ b/2020/CVE-2020-8165.json
@@ -17,8 +17,8 @@
"pushed_at": "2020-11-02T00:58:32Z",
"stargazers_count": 29,
"watchers_count": 29,
- "forks_count": 15,
- "forks": 15,
+ "forks_count": 16,
+ "forks": 16,
"watchers": 29,
"score": 0
},
diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json
index ce4c3bca61..b24e26548f 100644
--- a/2020/CVE-2020-9484.json
+++ b/2020/CVE-2020-9484.json
@@ -105,13 +105,13 @@
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
"fork": false,
"created_at": "2020-06-05T20:40:28Z",
- "updated_at": "2020-12-01T15:12:37Z",
+ "updated_at": "2021-01-09T11:49:46Z",
"pushed_at": "2020-06-05T21:04:43Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"forks_count": 11,
"forks": 11,
- "watchers": 19,
+ "watchers": 20,
"score": 0
},
{
diff --git a/README.md b/README.md
index fb64cdcb89..df60de9b6b 100644
--- a/README.md
+++ b/README.md
@@ -1147,6 +1147,14 @@ A flawed protocol design in the Ledger Monero app before 1.5.1 for Ledger Nano a
### CVE-2020-6888
- [section-c/CVE-2020-6888](https://github.com/section-c/CVE-2020-6888)
+### CVE-2020-7048 (2020-01-16)
+
+
+The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI.
+
+
+- [ElmouradiAmine/CVE-2020-7048](https://github.com/ElmouradiAmine/CVE-2020-7048)
+
### CVE-2020-7209 (2020-02-12)