diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 60aead74c7..f6c1f3131d 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-01-12T08:23:55Z", + "updated_at": "2021-01-12T10:07:22Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 876, - "watchers_count": 876, + "stargazers_count": 877, + "watchers_count": 877, "forks_count": 208, "forks": 208, - "watchers": 876, + "watchers": 877, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 1afdc41f1c..86a6ee6429 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-01-12T08:23:55Z", + "updated_at": "2021-01-12T10:07:22Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 876, - "watchers_count": 876, + "stargazers_count": 877, + "watchers_count": 877, "forks_count": 208, "forks": 208, - "watchers": 876, + "watchers": 877, "score": 0 }, { diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index c3a12abb24..eb7b71493a 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -243,8 +243,8 @@ "description": "CVE-2017-12615 任意文件写入exp,写入webshell", "fork": false, "created_at": "2021-01-12T09:07:12Z", - "updated_at": "2021-01-12T09:07:16Z", - "pushed_at": "2021-01-12T09:07:14Z", + "updated_at": "2021-01-12T09:20:00Z", + "pushed_at": "2021-01-12T09:19:44Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 221de95e7e..d843f8f46f 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-01-12T08:23:55Z", + "updated_at": "2021-01-12T10:07:22Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 876, - "watchers_count": 876, + "stargazers_count": 877, + "watchers_count": 877, "forks_count": 208, "forks": 208, - "watchers": 876, + "watchers": 877, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-12463.json b/2018/CVE-2018-12463.json index 1daa1c929c..7c31a8e130 100644 --- a/2018/CVE-2018-12463.json +++ b/2018/CVE-2018-12463.json @@ -13,13 +13,13 @@ "description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)", "fork": false, "created_at": "2018-07-10T09:51:40Z", - "updated_at": "2018-07-17T08:13:36Z", + "updated_at": "2021-01-12T12:20:23Z", "pushed_at": "2018-07-17T08:13:34Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index d19cc01b2f..ff89b5d4d0 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-01-12T08:23:55Z", + "updated_at": "2021-01-12T10:07:22Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 876, - "watchers_count": 876, + "stargazers_count": 877, + "watchers_count": 877, "forks_count": 208, "forks": 208, - "watchers": 876, + "watchers": 877, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 15168c9d4a..38a498a105 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-01-09T14:31:00Z", + "updated_at": "2021-01-12T09:30:59Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 350, - "watchers_count": 350, + "stargazers_count": 351, + "watchers_count": 351, "forks_count": 81, "forks": 81, - "watchers": 350, + "watchers": 351, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 6d60511a38..d1c92ea531 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -473,8 +473,8 @@ "description": null, "fork": false, "created_at": "2020-10-18T14:01:59Z", - "updated_at": "2021-01-11T20:29:36Z", - "pushed_at": "2021-01-11T20:29:34Z", + "updated_at": "2021-01-12T12:04:27Z", + "pushed_at": "2021-01-12T12:04:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 9dcf966ebc..bcee700645 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-01-12T07:44:33Z", + "updated_at": "2021-01-12T14:38:52Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2252, - "watchers_count": 2252, + "stargazers_count": 2255, + "watchers_count": 2255, "forks_count": 638, "forks": 638, - "watchers": 2252, + "watchers": 2255, "score": 0 }, { diff --git a/2019/CVE-2019-1821.json b/2019/CVE-2019-1821.json index be140257a0..5c3cabbeed 100644 --- a/2019/CVE-2019-1821.json +++ b/2019/CVE-2019-1821.json @@ -13,13 +13,13 @@ "description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)", "fork": false, "created_at": "2019-05-21T12:42:54Z", - "updated_at": "2021-01-09T22:05:56Z", + "updated_at": "2021-01-12T13:04:44Z", "pushed_at": "2019-05-21T14:52:36Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "forks_count": 41, "forks": 41, - "watchers": 69, + "watchers": 70, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 49c1499262..74ea258da1 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-01-12T08:23:55Z", + "updated_at": "2021-01-12T10:07:22Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 876, - "watchers_count": 876, + "stargazers_count": 877, + "watchers_count": 877, "forks_count": 208, "forks": 208, - "watchers": 876, + "watchers": 877, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 63067b5cf0..1b7f0c80e9 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -910,13 +910,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-01-09T13:41:47Z", + "updated_at": "2021-01-12T14:17:52Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1060, - "watchers_count": 1060, + "stargazers_count": 1059, + "watchers_count": 1059, "forks_count": 355, "forks": 355, - "watchers": 1060, + "watchers": 1059, "score": 0 }, { diff --git a/2020/CVE-2020-1206.json b/2020/CVE-2020-1206.json index 5b8e500456..8a0b252ae4 100644 --- a/2020/CVE-2020-1206.json +++ b/2020/CVE-2020-1206.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC", "fork": false, "created_at": "2020-04-05T15:52:43Z", - "updated_at": "2021-01-02T12:06:35Z", + "updated_at": "2021-01-12T14:17:53Z", "pushed_at": "2020-06-09T20:41:32Z", - "stargazers_count": 128, - "watchers_count": 128, + "stargazers_count": 127, + "watchers_count": 127, "forks_count": 41, "forks": 41, - "watchers": 128, + "watchers": 127, "score": 0 }, { diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index baeb4231ad..6fc02e909f 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -13,13 +13,13 @@ "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST", "fork": false, "created_at": "2020-03-11T17:51:29Z", - "updated_at": "2021-01-11T08:20:34Z", + "updated_at": "2021-01-12T12:54:28Z", "pushed_at": "2020-11-04T17:33:15Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 40, + "watchers_count": 40, "forks_count": 12, "forks": 12, - "watchers": 41, + "watchers": 40, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 1e5d782efc..f40a017c14 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -40,8 +40,8 @@ "pushed_at": "2020-10-21T12:10:28Z", "stargazers_count": 1221, "watchers_count": 1221, - "forks_count": 281, - "forks": 281, + "forks_count": 282, + "forks": 282, "watchers": 1221, "score": 0 }, @@ -82,13 +82,13 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2021-01-07T06:17:59Z", + "updated_at": "2021-01-12T10:24:11Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 730, - "watchers_count": 730, + "stargazers_count": 731, + "watchers_count": 731, "forks_count": 210, "forks": 210, - "watchers": 730, + "watchers": 731, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 3ee4aa7262..592d4d46a4 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-01-12T07:44:33Z", + "updated_at": "2021-01-12T14:38:52Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2252, - "watchers_count": 2252, + "stargazers_count": 2255, + "watchers_count": 2255, "forks_count": 638, "forks": 638, - "watchers": 2252, + "watchers": 2255, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519", "fork": false, "created_at": "2020-10-09T06:34:36Z", - "updated_at": "2021-01-12T08:45:47Z", + "updated_at": "2021-01-12T13:31:16Z", "pushed_at": "2021-01-11T09:03:04Z", - "stargazers_count": 733, - "watchers_count": 733, - "forks_count": 128, - "forks": 128, - "watchers": 733, + "stargazers_count": 736, + "watchers_count": 736, + "forks_count": 129, + "forks": 129, + "watchers": 736, "score": 0 }, { diff --git a/2020/CVE-2020-16012.json b/2020/CVE-2020-16012.json index fdd9c1ddc6..a98757a719 100644 --- a/2020/CVE-2020-16012.json +++ b/2020/CVE-2020-16012.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2020-16012, a timing side channel in drawImage in Firefox & Chrome", "fork": false, "created_at": "2020-11-14T21:32:15Z", - "updated_at": "2021-01-11T20:53:19Z", + "updated_at": "2021-01-12T09:25:11Z", "pushed_at": "2021-01-11T17:57:36Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17519.json b/2020/CVE-2020-17519.json index 8453852f44..4ec893dd5d 100644 --- a/2020/CVE-2020-17519.json +++ b/2020/CVE-2020-17519.json @@ -17,8 +17,8 @@ "pushed_at": "2021-01-06T23:51:32Z", "stargazers_count": 33, "watchers_count": 33, - "forks_count": 11, - "forks": 11, + "forks_count": 12, + "forks": 12, "watchers": 33, "score": 0 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 284b02ff7c..4f27a0ecf5 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-01-12T08:23:55Z", + "updated_at": "2021-01-12T10:07:22Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 876, - "watchers_count": 876, + "stargazers_count": 877, + "watchers_count": 877, "forks_count": 208, "forks": 208, - "watchers": 876, + "watchers": 877, "score": 0 }, { diff --git a/2020/CVE-2020-27955.json b/2020/CVE-2020-27955.json index eef6d5a8be..89058f7b2b 100644 --- a/2020/CVE-2020-27955.json +++ b/2020/CVE-2020-27955.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2020-11-03T17:14:22Z", "updated_at": "2020-12-26T02:17:37Z", - "pushed_at": "2020-11-25T16:03:18Z", + "pushed_at": "2021-01-12T10:11:42Z", "stargazers_count": 23, "watchers_count": 23, "forks_count": 14, diff --git a/2020/CVE-2020-36179.json b/2020/CVE-2020-36179.json index cf2f3ae26b..a7f2e53b64 100644 --- a/2020/CVE-2020-36179.json +++ b/2020/CVE-2020-36179.json @@ -13,13 +13,13 @@ "description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE", "fork": false, "created_at": "2021-01-10T06:47:49Z", - "updated_at": "2021-01-12T07:34:24Z", + "updated_at": "2021-01-12T10:55:55Z", "pushed_at": "2021-01-10T06:48:53Z", - "stargazers_count": 40, - "watchers_count": 40, - "forks_count": 5, - "forks": 5, - "watchers": 40, + "stargazers_count": 42, + "watchers_count": 42, + "forks_count": 6, + "forks": 6, + "watchers": 42, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-36188.json b/2020/CVE-2020-36188.json index 9355b8592c..bac80a0b22 100644 --- a/2020/CVE-2020-36188.json +++ b/2020/CVE-2020-36188.json @@ -13,13 +13,13 @@ "description": "CVE-2020-36188 &&Jackson-databind RCE", "fork": false, "created_at": "2021-01-11T06:29:38Z", - "updated_at": "2021-01-12T07:43:16Z", + "updated_at": "2021-01-12T11:01:10Z", "pushed_at": "2021-01-11T06:29:59Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 2, "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json index 3eaa1d6d8b..4ce56b239d 100644 --- a/2020/CVE-2020-8165.json +++ b/2020/CVE-2020-8165.json @@ -90,5 +90,28 @@ "forks": 1, "watchers": 2, "score": 0 + }, + { + "id": 328976450, + "name": "CVE-2020-8165", + "full_name": "macosta-42\/CVE-2020-8165", + "owner": { + "login": "macosta-42", + "id": 64427620, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/64427620?v=4", + "html_url": "https:\/\/github.com\/macosta-42" + }, + "html_url": "https:\/\/github.com\/macosta-42\/CVE-2020-8165", + "description": null, + "fork": false, + "created_at": "2021-01-12T12:14:17Z", + "updated_at": "2021-01-12T12:37:41Z", + "pushed_at": "2021-01-12T12:37:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index b24e26548f..140d7a61b5 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -132,8 +132,8 @@ "pushed_at": "2020-06-10T07:08:17Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 1, "score": 0 }, diff --git a/2021/CVE-2021-1056.json b/2021/CVE-2021-1056.json index e45b00c7b0..3a0fd49e3f 100644 --- a/2021/CVE-2021-1056.json +++ b/2021/CVE-2021-1056.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2021-1056", "fork": false, "created_at": "2021-01-08T11:29:48Z", - "updated_at": "2021-01-11T02:11:51Z", - "pushed_at": "2021-01-10T05:34:21Z", - "stargazers_count": 1, - "watchers_count": 1, + "updated_at": "2021-01-12T14:02:07Z", + "pushed_at": "2021-01-12T09:21:02Z", + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 89bc4fadc1..e546f4d0ad 100644 --- a/README.md +++ b/README.md @@ -1334,6 +1334,7 @@ A deserialization of untrusted data vulnernerability exists in rails < 5.2.4. - [umiterkol/CVE-2020-8165--Auto-Shell](https://github.com/umiterkol/CVE-2020-8165--Auto-Shell) - [taipansec/CVE-2020-8165](https://github.com/taipansec/CVE-2020-8165) - [hybryx/CVE-2020-8165](https://github.com/hybryx/CVE-2020-8165) +- [macosta-42/CVE-2020-8165](https://github.com/macosta-42/CVE-2020-8165) ### CVE-2020-8175 (2020-07-24)