From 10b41eb20440f219507ce46d063afea8391bb23e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 20 May 2020 12:07:47 +0900 Subject: [PATCH] Auto Update 2020/05/20 12:07:47 --- 2012/CVE-2012-4220.json | 4 ++-- 2015/CVE-2015-6639.json | 4 ++-- 2016/CVE-2016-2431.json | 4 ++-- 2017/CVE-2017-0785.json | 4 ++-- 2017/CVE-2017-5638.json | 8 ++++---- 2018/CVE-2018-15982.json | 8 ++++---- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-17558.json | 4 ++-- 2019/CVE-2019-2618.json | 8 ++++---- 2019/CVE-2019-2725.json | 8 ++++---- 2019/CVE-2019-9787.json | 27 +++++++++++++++++++++++++-- 2020/CVE-2020-0674.json | 8 ++++---- 2020/CVE-2020-10199.json | 4 ++-- 2020/CVE-2020-11932.json | 12 ++++++------ 2020/CVE-2020-1938.json | 4 ++-- 2020/CVE-2020-2555.json | 8 ++++---- 2020/CVE-2020-2883.json | 8 ++++---- 2020/CVE-2020-3153.json | 8 ++++---- README.md | 1 + 19 files changed, 82 insertions(+), 58 deletions(-) diff --git a/2012/CVE-2012-4220.json b/2012/CVE-2012-4220.json index b68178aca8..9a789b9a31 100644 --- a/2012/CVE-2012-4220.json +++ b/2012/CVE-2012-4220.json @@ -40,8 +40,8 @@ "pushed_at": "2013-07-05T12:09:00Z", "stargazers_count": 15, "watchers_count": 15, - "forks_count": 5, - "forks": 5, + "forks_count": 7, + "forks": 7, "watchers": 15, "score": 0 } diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index 4378616b1f..3590d420de 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -40,8 +40,8 @@ "pushed_at": "2016-06-30T15:32:42Z", "stargazers_count": 277, "watchers_count": 277, - "forks_count": 87, - "forks": 87, + "forks_count": 88, + "forks": 88, "watchers": 277, "score": 0 } diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index c0c4117cc3..1fa05bcdaf 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -40,8 +40,8 @@ "pushed_at": "2016-06-30T15:32:42Z", "stargazers_count": 277, "watchers_count": 277, - "forks_count": 87, - "forks": 87, + "forks_count": 88, + "forks": 88, "watchers": 277, "score": 0 } diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index 170a46b3ec..de62f56f85 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -63,8 +63,8 @@ "pushed_at": "2017-09-22T22:23:52Z", "stargazers_count": 27, "watchers_count": 27, - "forks_count": 14, - "forks": 14, + "forks_count": 15, + "forks": 15, "watchers": 27, "score": 0 }, diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index b697e9d843..3d527c41c7 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -312,13 +312,13 @@ "description": "An exploit for Apache Struts CVE-2017-5638", "fork": false, "created_at": "2017-03-12T02:02:25Z", - "updated_at": "2020-05-19T07:02:50Z", + "updated_at": "2020-05-20T00:26:31Z", "pushed_at": "2018-05-21T18:33:26Z", - "stargazers_count": 372, - "watchers_count": 372, + "stargazers_count": 371, + "watchers_count": 371, "forks_count": 131, "forks": 131, - "watchers": 372, + "watchers": 371, "score": 0 }, { diff --git a/2018/CVE-2018-15982.json b/2018/CVE-2018-15982.json index dbd21e4073..5cbd495ed8 100644 --- a/2018/CVE-2018-15982.json +++ b/2018/CVE-2018-15982.json @@ -59,13 +59,13 @@ "description": "exp of CVE-2018-15982", "fork": false, "created_at": "2018-12-10T04:53:31Z", - "updated_at": "2020-04-17T08:09:23Z", + "updated_at": "2020-05-20T02:43:32Z", "pushed_at": "2019-01-04T09:29:01Z", - "stargazers_count": 171, - "watchers_count": 171, + "stargazers_count": 172, + "watchers_count": 172, "forks_count": 63, "forks": 63, - "watchers": 171, + "watchers": 172, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 690e888a05..e98e78cf20 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2382,13 +2382,13 @@ "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", - "updated_at": "2020-05-10T15:54:05Z", + "updated_at": "2020-05-20T01:35:58Z", "pushed_at": "2019-10-16T01:04:12Z", - "stargazers_count": 152, - "watchers_count": 152, + "stargazers_count": 153, + "watchers_count": 153, "forks_count": 49, "forks": 49, - "watchers": 152, + "watchers": 153, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 00e59732b6..2ad49440aa 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,8 +36,8 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-05-19T16:19:49Z", - "pushed_at": "2020-05-19T09:58:07Z", + "updated_at": "2020-05-20T02:48:55Z", + "pushed_at": "2020-05-20T02:48:53Z", "stargazers_count": 730, "watchers_count": 730, "forks_count": 158, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index a0a7001cb6..8fecb6c0c8 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2020-05-19T11:17:25Z", + "updated_at": "2020-05-20T02:08:53Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 557, - "watchers_count": 557, + "stargazers_count": 558, + "watchers_count": 558, "forks_count": 125, "forks": 125, - "watchers": 557, + "watchers": 558, "score": 0 }, { diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index f2f4d07b71..c9de9a6898 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -220,13 +220,13 @@ "description": "CVE-2019-2725命令回显+webshell上传+最新绕过", "fork": false, "created_at": "2019-06-10T05:12:44Z", - "updated_at": "2020-05-18T10:43:06Z", + "updated_at": "2020-05-20T02:10:12Z", "pushed_at": "2019-06-21T03:33:05Z", - "stargazers_count": 123, - "watchers_count": 123, + "stargazers_count": 124, + "watchers_count": 124, "forks_count": 55, "forks": 55, - "watchers": 123, + "watchers": 124, "score": 0 }, { diff --git a/2019/CVE-2019-9787.json b/2019/CVE-2019-9787.json index 759d76b765..c1fac4cd2a 100644 --- a/2019/CVE-2019-9787.json +++ b/2019/CVE-2019-9787.json @@ -17,8 +17,8 @@ "pushed_at": "2019-04-15T04:13:30Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 2, - "forks": 2, + "forks_count": 1, + "forks": 1, "watchers": 1, "score": 0 }, @@ -67,5 +67,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 265379352, + "name": "Wordpress_CVE-2019-9787", + "full_name": "matinciel\/Wordpress_CVE-2019-9787", + "owner": { + "login": "matinciel", + "id": 39257302, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/39257302?v=4", + "html_url": "https:\/\/github.com\/matinciel" + }, + "html_url": "https:\/\/github.com\/matinciel\/Wordpress_CVE-2019-9787", + "description": "Try to reproduce this issue with Docker", + "fork": false, + "created_at": "2020-05-19T22:09:43Z", + "updated_at": "2020-05-19T22:30:08Z", + "pushed_at": "2020-05-19T22:30:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0674.json b/2020/CVE-2020-0674.json index 22627744d3..be74dce66d 100644 --- a/2020/CVE-2020-0674.json +++ b/2020/CVE-2020-0674.json @@ -36,13 +36,13 @@ "description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.", "fork": false, "created_at": "2020-05-07T22:02:25Z", - "updated_at": "2020-05-19T00:25:07Z", + "updated_at": "2020-05-20T01:00:46Z", "pushed_at": "2020-05-15T09:03:36Z", - "stargazers_count": 127, - "watchers_count": 127, + "stargazers_count": 128, + "watchers_count": 128, "forks_count": 35, "forks": 35, - "watchers": 127, + "watchers": 128, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json index e2497584a0..d888a3791a 100644 --- a/2020/CVE-2020-10199.json +++ b/2020/CVE-2020-10199.json @@ -13,8 +13,8 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-05-19T16:19:49Z", - "pushed_at": "2020-05-19T09:58:07Z", + "updated_at": "2020-05-20T02:48:55Z", + "pushed_at": "2020-05-20T02:48:53Z", "stargazers_count": 730, "watchers_count": 730, "forks_count": 158, diff --git a/2020/CVE-2020-11932.json b/2020/CVE-2020-11932.json index 2dda7e8ffa..2fa551d4c0 100644 --- a/2020/CVE-2020-11932.json +++ b/2020/CVE-2020-11932.json @@ -36,13 +36,13 @@ "description": "Check CVE-2020-11932 (ubuntu server) and test host relating to this vulnerability ", "fork": false, "created_at": "2020-05-14T11:47:52Z", - "updated_at": "2020-05-16T06:21:31Z", + "updated_at": "2020-05-20T01:43:13Z", "pushed_at": "2020-05-16T06:21:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 4ea562565f..3a6ff3cc7a 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -17,8 +17,8 @@ "pushed_at": "2020-02-25T02:04:16Z", "stargazers_count": 162, "watchers_count": 162, - "forks_count": 91, - "forks": 91, + "forks_count": 90, + "forks": 90, "watchers": 162, "score": 0 }, diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index 18fe417463..fd5ee3b92f 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -82,13 +82,13 @@ "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "fork": false, "created_at": "2020-03-07T18:58:09Z", - "updated_at": "2020-05-18T10:43:42Z", + "updated_at": "2020-05-20T03:02:14Z", "pushed_at": "2020-03-09T05:25:05Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "forks_count": 39, "forks": 39, - "watchers": 108, + "watchers": 109, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 301abf6247..20f32ed18d 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -13,13 +13,13 @@ "description": "Weblogic coherence.jar RCE", "fork": false, "created_at": "2020-05-10T09:04:43Z", - "updated_at": "2020-05-19T09:26:25Z", + "updated_at": "2020-05-20T03:02:23Z", "pushed_at": "2020-05-10T09:29:36Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "forks_count": 16, "forks": 16, - "watchers": 108, + "watchers": 109, "score": 0 }, { diff --git a/2020/CVE-2020-3153.json b/2020/CVE-2020-3153.json index c6c29596b7..21795fffd0 100644 --- a/2020/CVE-2020-3153.json +++ b/2020/CVE-2020-3153.json @@ -59,13 +59,13 @@ "description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal", "fork": false, "created_at": "2020-05-19T18:59:26Z", - "updated_at": "2020-05-19T21:05:06Z", + "updated_at": "2020-05-20T03:00:31Z", "pushed_at": "2020-05-19T20:34:46Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 0, "forks": 0, - "watchers": 1, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index b6d521d954..cdc8fd7e05 100644 --- a/README.md +++ b/README.md @@ -4243,6 +4243,7 @@ WordPress before 5.1.1 does not properly filter comment content, leading to Remo - [rkatogit/cve-2019-9787_csrf_poc](https://github.com/rkatogit/cve-2019-9787_csrf_poc) - [PalmTreeForest/CodePath_Week_7-8](https://github.com/PalmTreeForest/CodePath_Week_7-8) - [sijiahi/Wordpress_cve-2019-9787_defense](https://github.com/sijiahi/Wordpress_cve-2019-9787_defense) +- [matinciel/Wordpress_CVE-2019-9787](https://github.com/matinciel/Wordpress_CVE-2019-9787) ### CVE-2019-9810