diff --git a/2014/CVE-2014-3153.json b/2014/CVE-2014-3153.json index 32c3308aef..d38e327baa 100644 --- a/2014/CVE-2014-3153.json +++ b/2014/CVE-2014-3153.json @@ -174,8 +174,8 @@ "description": "Exploiting CVE-2014-3153, AKA Towelroot.", "fork": false, "created_at": "2020-10-31T11:39:11Z", - "updated_at": "2021-01-08T11:10:11Z", - "pushed_at": "2021-01-08T11:10:09Z", + "updated_at": "2021-01-09T11:52:12Z", + "pushed_at": "2021-01-09T11:52:09Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2016/CVE-2016-8776.json b/2016/CVE-2016-8776.json index 6f0fd95960..88789f2ea9 100644 --- a/2016/CVE-2016-8776.json +++ b/2016/CVE-2016-8776.json @@ -13,13 +13,13 @@ "description": "frp bypass without account overwrite", "fork": false, "created_at": "2017-10-08T12:26:23Z", - "updated_at": "2019-03-17T16:31:49Z", + "updated_at": "2021-01-09T10:39:40Z", "pushed_at": "2017-10-08T12:26:24Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 3, "forks": 3, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 0c612a4f31..8b25ccb9bb 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-01-07T16:23:08Z", + "updated_at": "2021-01-09T14:31:00Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 349, - "watchers_count": 349, + "stargazers_count": 350, + "watchers_count": 350, "forks_count": 80, "forks": 80, - "watchers": 349, + "watchers": 350, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 78ce00b218..6089ff6c76 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -82,7 +82,7 @@ "description": "CVE-2019-0708-exploit", "fork": false, "created_at": "2019-05-15T02:24:21Z", - "updated_at": "2021-01-04T02:05:33Z", + "updated_at": "2021-01-09T14:06:25Z", "pushed_at": "2019-05-15T02:26:46Z", "stargazers_count": 116, "watchers_count": 116, @@ -1439,13 +1439,13 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2021-01-06T16:13:11Z", + "updated_at": "2021-01-09T12:21:20Z", "pushed_at": "2019-09-03T20:50:28Z", - "stargazers_count": 1054, - "watchers_count": 1054, + "stargazers_count": 1055, + "watchers_count": 1055, "forks_count": 353, "forks": 353, - "watchers": 1054, + "watchers": 1055, "score": 0 }, { diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json index 2fb9352edc..8a78f21671 100644 --- a/2019/CVE-2019-12586.json +++ b/2019/CVE-2019-12586.json @@ -13,13 +13,13 @@ "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)", "fork": false, "created_at": "2019-09-03T15:08:49Z", - "updated_at": "2021-01-07T07:18:25Z", + "updated_at": "2021-01-09T12:54:41Z", "pushed_at": "2019-09-08T06:09:11Z", - "stargazers_count": 680, - "watchers_count": 680, + "stargazers_count": 681, + "watchers_count": 681, "forks_count": 61, "forks": 61, - "watchers": 680, + "watchers": 681, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json index e4bd836376..4bd169df70 100644 --- a/2019/CVE-2019-15126.json +++ b/2019/CVE-2019-15126.json @@ -36,13 +36,13 @@ "description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability", "fork": false, "created_at": "2020-03-13T14:53:54Z", - "updated_at": "2021-01-05T05:16:02Z", + "updated_at": "2021-01-09T15:05:07Z", "pushed_at": "2020-03-22T19:46:04Z", - "stargazers_count": 183, - "watchers_count": 183, + "stargazers_count": 182, + "watchers_count": 182, "forks_count": 59, "forks": 59, - "watchers": 183, + "watchers": 182, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index cc53414cf4..243fcbea64 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -726,13 +726,13 @@ "description": "Indicator of Compromise Scanner for CVE-2019-19781", "fork": false, "created_at": "2020-01-21T23:13:00Z", - "updated_at": "2020-12-10T08:53:49Z", + "updated_at": "2021-01-09T10:04:39Z", "pushed_at": "2020-03-25T16:48:30Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "forks_count": 11, "forks": 11, - "watchers": 57, + "watchers": 58, "score": 0 }, { diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json index 60fb58bc64..7dad8f9dbb 100644 --- a/2019/CVE-2019-7238.json +++ b/2019/CVE-2019-7238.json @@ -36,13 +36,13 @@ "description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0", "fork": false, "created_at": "2019-05-21T13:16:02Z", - "updated_at": "2020-07-27T02:19:18Z", + "updated_at": "2021-01-09T14:57:47Z", "pushed_at": "2019-08-19T17:33:56Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "forks_count": 20, "forks": 20, - "watchers": 57, + "watchers": 58, "score": 0 }, { diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index 86fdcd4071..6aad70467b 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -13,13 +13,13 @@ "description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)", "fork": false, "created_at": "2020-01-21T21:33:17Z", - "updated_at": "2020-12-23T19:30:32Z", + "updated_at": "2021-01-09T11:46:42Z", "pushed_at": "2020-07-05T17:27:24Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "forks_count": 6, "forks": 6, - "watchers": 35, + "watchers": 36, "score": 0 }, { diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 935b089841..419a78d097 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -151,13 +151,13 @@ "description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.", "fork": false, "created_at": "2020-02-28T16:04:30Z", - "updated_at": "2020-12-28T03:45:49Z", + "updated_at": "2021-01-09T11:01:49Z", "pushed_at": "2020-10-07T08:10:46Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 10, "forks": 10, - "watchers": 31, + "watchers": 32, "score": 0 }, { @@ -243,13 +243,13 @@ "description": "Vulnerability scanner for CVE-2020-0688", "fork": false, "created_at": "2020-03-19T16:39:56Z", - "updated_at": "2020-10-06T17:27:40Z", + "updated_at": "2021-01-09T11:45:35Z", "pushed_at": "2020-03-19T16:41:39Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 1411f922bd..47615cc596 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -174,13 +174,13 @@ "description": "This project is used for scanning cve-2020-0796 SMB vulnerability", "fork": false, "created_at": "2020-03-12T02:20:07Z", - "updated_at": "2020-12-21T01:37:26Z", + "updated_at": "2021-01-09T11:44:13Z", "pushed_at": "2020-03-12T02:49:10Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 9, "forks": 9, - "watchers": 8, + "watchers": 9, "score": 0 }, { @@ -910,13 +910,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-01-09T02:41:33Z", + "updated_at": "2021-01-09T13:41:47Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1059, - "watchers_count": 1059, + "stargazers_count": 1060, + "watchers_count": 1060, "forks_count": 355, "forks": 355, - "watchers": 1059, + "watchers": 1060, "score": 0 }, { @@ -1140,13 +1140,13 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2021-01-08T13:41:03Z", + "updated_at": "2021-01-09T13:11:00Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 345, - "watchers_count": 345, + "stargazers_count": 346, + "watchers_count": 346, "forks_count": 117, "forks": 117, - "watchers": 345, + "watchers": 346, "score": 0 }, { diff --git a/2020/CVE-2020-11851.json b/2020/CVE-2020-11851.json index b360c28832..d3dc110d92 100644 --- a/2020/CVE-2020-11851.json +++ b/2020/CVE-2020-11851.json @@ -13,13 +13,13 @@ "description": "Remote Code Execution vulnerability on ArcSight Logger", "fork": false, "created_at": "2021-01-07T12:30:23Z", - "updated_at": "2021-01-08T20:32:49Z", - "pushed_at": "2021-01-07T14:06:11Z", - "stargazers_count": 5, - "watchers_count": 5, + "updated_at": "2021-01-09T10:35:20Z", + "pushed_at": "2021-01-09T10:15:48Z", + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 0, "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index e574dbb435..5d355ca692 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -36,13 +36,13 @@ "description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519", "fork": false, "created_at": "2020-10-09T06:34:36Z", - "updated_at": "2021-01-09T07:22:14Z", + "updated_at": "2021-01-09T14:41:21Z", "pushed_at": "2021-01-08T11:00:13Z", - "stargazers_count": 705, - "watchers_count": 705, - "forks_count": 124, - "forks": 124, - "watchers": 705, + "stargazers_count": 709, + "watchers_count": 709, + "forks_count": 126, + "forks": 126, + "watchers": 709, "score": 0 }, { diff --git a/2020/CVE-2020-17519.json b/2020/CVE-2020-17519.json index 9c0046349a..3ce9ec3851 100644 --- a/2020/CVE-2020-17519.json +++ b/2020/CVE-2020-17519.json @@ -17,8 +17,8 @@ "pushed_at": "2021-01-06T23:51:32Z", "stargazers_count": 30, "watchers_count": 30, - "forks_count": 8, - "forks": 8, + "forks_count": 9, + "forks": 9, "watchers": 30, "score": 0 }, diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index a9c04f34c1..cba406fc01 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -59,13 +59,13 @@ "description": "CVE-2020-5902 BIG-IP", "fork": false, "created_at": "2020-07-05T16:38:32Z", - "updated_at": "2021-01-08T12:31:15Z", + "updated_at": "2021-01-09T11:48:35Z", "pushed_at": "2020-07-15T02:52:33Z", - "stargazers_count": 328, - "watchers_count": 328, + "stargazers_count": 329, + "watchers_count": 329, "forks_count": 103, "forks": 103, - "watchers": 328, + "watchers": 329, "score": 0 }, { diff --git a/2020/CVE-2020-7048.json b/2020/CVE-2020-7048.json new file mode 100644 index 0000000000..3dbd5703cc --- /dev/null +++ b/2020/CVE-2020-7048.json @@ -0,0 +1,25 @@ +[ + { + "id": 328165952, + "name": "CVE-2020-7048", + "full_name": "ElmouradiAmine\/CVE-2020-7048", + "owner": { + "login": "ElmouradiAmine", + "id": 48139304, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48139304?v=4", + "html_url": "https:\/\/github.com\/ElmouradiAmine" + }, + "html_url": "https:\/\/github.com\/ElmouradiAmine\/CVE-2020-7048", + "description": null, + "fork": false, + "created_at": "2021-01-09T13:52:09Z", + "updated_at": "2021-01-09T13:54:32Z", + "pushed_at": "2021-01-09T13:54:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json index 1c07faf492..4682b88b55 100644 --- a/2020/CVE-2020-8165.json +++ b/2020/CVE-2020-8165.json @@ -17,8 +17,8 @@ "pushed_at": "2020-11-02T00:58:32Z", "stargazers_count": 29, "watchers_count": 29, - "forks_count": 15, - "forks": 15, + "forks_count": 16, + "forks": 16, "watchers": 29, "score": 0 }, diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index ce4c3bca61..b24e26548f 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -105,13 +105,13 @@ "description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ", "fork": false, "created_at": "2020-06-05T20:40:28Z", - "updated_at": "2020-12-01T15:12:37Z", + "updated_at": "2021-01-09T11:49:46Z", "pushed_at": "2020-06-05T21:04:43Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 11, "forks": 11, - "watchers": 19, + "watchers": 20, "score": 0 }, { diff --git a/README.md b/README.md index fb64cdcb89..df60de9b6b 100644 --- a/README.md +++ b/README.md @@ -1147,6 +1147,14 @@ A flawed protocol design in the Ledger Monero app before 1.5.1 for Ledger Nano a ### CVE-2020-6888 - [section-c/CVE-2020-6888](https://github.com/section-c/CVE-2020-6888) +### CVE-2020-7048 (2020-01-16) + + +The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI. + + +- [ElmouradiAmine/CVE-2020-7048](https://github.com/ElmouradiAmine/CVE-2020-7048) + ### CVE-2020-7209 (2020-02-12)