diff --git a/2006/CVE-2006-1236.json b/2006/CVE-2006-1236.json new file mode 100644 index 0000000000..09854e02ae --- /dev/null +++ b/2006/CVE-2006-1236.json @@ -0,0 +1,25 @@ +[ + { + "id": 168247796, + "name": "CVE-2006-1236", + "full_name": "Axua\/CVE-2006-1236", + "owner": { + "login": "Axua", + "id": 28788087, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4", + "html_url": "https:\/\/github.com\/Axua" + }, + "html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236", + "description": "Exploit script for Crossfire 1.9.0", + "fork": false, + "created_at": "2019-01-29T23:46:59Z", + "updated_at": "2019-01-29T23:50:30Z", + "pushed_at": "2019-01-29T23:50:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2006/CVE-2006-3592.json b/2006/CVE-2006-3592.json new file mode 100644 index 0000000000..9d104c897f --- /dev/null +++ b/2006/CVE-2006-3592.json @@ -0,0 +1,25 @@ +[ + { + "id": 186166548, + "name": "CVE-2006-3592", + "full_name": "adenkiewicz\/CVE-2006-3592", + "owner": { + "login": "adenkiewicz", + "id": 1060275, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4", + "html_url": "https:\/\/github.com\/adenkiewicz" + }, + "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2006-3592", + "description": "Exploit for Easy File Sharing FTP Server 3.5 on Win7 32", + "fork": false, + "created_at": "2019-05-11T18:11:34Z", + "updated_at": "2019-05-11T18:12:45Z", + "pushed_at": "2019-05-11T18:12:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2006/CVE-2006-6184.json b/2006/CVE-2006-6184.json index 60893f959f..ea66ccd8c3 100644 --- a/2006/CVE-2006-6184.json +++ b/2006/CVE-2006-6184.json @@ -1,4 +1,27 @@ [ + { + "id": 63907042, + "name": "cve-2006-6184", + "full_name": "shauntdergrigorian\/cve-2006-6184", + "owner": { + "login": "shauntdergrigorian", + "id": 7718028, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7718028?v=4", + "html_url": "https:\/\/github.com\/shauntdergrigorian" + }, + "html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184", + "description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.", + "fork": false, + "created_at": "2016-07-21T22:43:43Z", + "updated_at": "2020-04-07T14:22:36Z", + "pushed_at": "2016-07-22T15:12:43Z", + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 8, + "forks": 8, + "watchers": 9, + "score": 0 + }, { "id": 205628184, "name": "CVE-2006-6184", diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 79122960b4..296820d160 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-19T02:19:36Z", + "updated_at": "2020-06-19T07:28:25Z", "pushed_at": "2020-06-17T01:51:30Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 475, + "watchers_count": 475, "forks_count": 111, "forks": 111, - "watchers": 473, + "watchers": 475, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0051.json b/2016/CVE-2016-0051.json index 98a04abee8..bd8c690e01 100644 --- a/2016/CVE-2016-0051.json +++ b/2016/CVE-2016-0051.json @@ -13,13 +13,13 @@ "description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)", "fork": false, "created_at": "2016-02-09T21:30:34Z", - "updated_at": "2020-05-24T14:58:40Z", + "updated_at": "2020-06-19T06:49:20Z", "pushed_at": "2016-05-09T17:53:48Z", - "stargazers_count": 326, - "watchers_count": 326, + "stargazers_count": 327, + "watchers_count": 327, "forks_count": 151, "forks": 151, - "watchers": 326, + "watchers": 327, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index a0f0d506c1..27d562ee9a 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-19T02:19:36Z", + "updated_at": "2020-06-19T07:28:25Z", "pushed_at": "2020-06-17T01:51:30Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 475, + "watchers_count": 475, "forks_count": 111, "forks": 111, - "watchers": 473, + "watchers": 475, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-4622.json b/2016/CVE-2016-4622.json index 64853d5a67..d2f788f137 100644 --- a/2016/CVE-2016-4622.json +++ b/2016/CVE-2016-4622.json @@ -13,13 +13,13 @@ "description": "PoC exploit for CVE-2016-4622", "fork": false, "created_at": "2016-10-09T15:22:06Z", - "updated_at": "2020-04-28T11:07:19Z", + "updated_at": "2020-06-19T07:48:26Z", "pushed_at": "2016-10-27T20:23:15Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "forks_count": 34, "forks": 34, - "watchers": 73, + "watchers": 74, "score": 0 }, { diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index c9487674ce..9fd7a7ac65 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -519,13 +519,13 @@ "description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC", "fork": false, "created_at": "2019-04-25T03:07:53Z", - "updated_at": "2020-04-24T18:17:55Z", + "updated_at": "2020-06-19T03:42:53Z", "pushed_at": "2019-04-29T02:06:00Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "forks_count": 37, "forks": 37, - "watchers": 99, + "watchers": 100, "score": 0 }, { diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index d96958b1cf..e5f5404c53 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -174,13 +174,13 @@ "description": "CVE-2017-11882 exploitation", "fork": false, "created_at": "2017-11-22T01:11:39Z", - "updated_at": "2020-02-25T03:32:02Z", + "updated_at": "2020-06-19T07:56:14Z", "pushed_at": "2017-11-28T03:06:32Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "forks_count": 45, "forks": 45, - "watchers": 34, + "watchers": 35, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 669bfe14b1..5f3ae88f5b 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-19T02:19:36Z", + "updated_at": "2020-06-19T07:28:25Z", "pushed_at": "2020-06-17T01:51:30Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 475, + "watchers_count": 475, "forks_count": 111, "forks": 111, - "watchers": 473, + "watchers": 475, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-7529.json b/2017/CVE-2017-7529.json index 87b042c48f..6c5a153757 100644 --- a/2017/CVE-2017-7529.json +++ b/2017/CVE-2017-7529.json @@ -17,8 +17,8 @@ "pushed_at": "2017-07-21T06:29:35Z", "stargazers_count": 10, "watchers_count": 10, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 10, "score": 0 }, diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index 9ffd101965..634b5a4129 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -36,13 +36,13 @@ "description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.", "fork": false, "created_at": "2018-08-03T04:36:23Z", - "updated_at": "2020-06-03T17:48:42Z", + "updated_at": "2020-06-19T07:55:23Z", "pushed_at": "2018-08-14T07:47:02Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 69, + "watchers_count": 69, "forks_count": 20, "forks": 20, - "watchers": 68, + "watchers": 69, "score": 0 }, { diff --git a/2018/CVE-2018-15499.json b/2018/CVE-2018-15499.json index adeba5a0a0..0c36d1c53c 100644 --- a/2018/CVE-2018-15499.json +++ b/2018/CVE-2018-15499.json @@ -13,13 +13,13 @@ "description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)", "fork": false, "created_at": "2018-08-21T15:26:35Z", - "updated_at": "2020-04-06T11:34:14Z", + "updated_at": "2020-06-19T06:54:55Z", "pushed_at": "2018-08-23T12:55:23Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 5, "forks": 5, - "watchers": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-15982.json b/2018/CVE-2018-15982.json index c33d178d49..f6d68e348a 100644 --- a/2018/CVE-2018-15982.json +++ b/2018/CVE-2018-15982.json @@ -59,13 +59,13 @@ "description": "exp of CVE-2018-15982", "fork": false, "created_at": "2018-12-10T04:53:31Z", - "updated_at": "2020-05-29T16:47:23Z", + "updated_at": "2020-06-19T03:39:17Z", "pushed_at": "2019-01-04T09:29:01Z", - "stargazers_count": 174, - "watchers_count": 174, + "stargazers_count": 175, + "watchers_count": 175, "forks_count": 64, "forks": 64, - "watchers": 174, + "watchers": 175, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 998af9da5c..409e82f12e 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-19T02:19:36Z", + "updated_at": "2020-06-19T07:28:25Z", "pushed_at": "2020-06-17T01:51:30Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 475, + "watchers_count": 475, "forks_count": 111, "forks": 111, - "watchers": 473, + "watchers": 475, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2894.json b/2018/CVE-2018-2894.json index a2b91dda88..c64c9b8a63 100644 --- a/2018/CVE-2018-2894.json +++ b/2018/CVE-2018-2894.json @@ -36,13 +36,13 @@ "description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script", "fork": false, "created_at": "2018-07-20T03:59:18Z", - "updated_at": "2020-06-09T16:01:57Z", + "updated_at": "2020-06-19T04:46:51Z", "pushed_at": "2018-07-20T12:46:50Z", - "stargazers_count": 125, - "watchers_count": 125, + "stargazers_count": 126, + "watchers_count": 126, "forks_count": 47, "forks": 47, - "watchers": 125, + "watchers": 126, "score": 0 }, { diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index 05ae3a437d..dcb795a18c 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018", "fork": false, "created_at": "2018-08-08T14:41:20Z", - "updated_at": "2020-05-20T07:50:17Z", + "updated_at": "2020-06-19T08:26:31Z", "pushed_at": "2018-08-17T23:31:46Z", - "stargazers_count": 152, - "watchers_count": 152, + "stargazers_count": 153, + "watchers_count": 153, "forks_count": 29, "forks": 29, - "watchers": 152, + "watchers": 153, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-4407.json b/2018/CVE-2018-4407.json index df71e1f49e..0cc17023ee 100644 --- a/2018/CVE-2018-4407.json +++ b/2018/CVE-2018-4407.json @@ -151,13 +151,13 @@ "description": "Node.js PoC exploit code for CVE-2018-4407", "fork": false, "created_at": "2018-11-02T22:00:17Z", - "updated_at": "2020-05-22T11:42:54Z", + "updated_at": "2020-06-19T07:48:32Z", "pushed_at": "2018-11-02T22:13:40Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 6, "forks": 6, - "watchers": 10, + "watchers": 11, "score": 0 }, { diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 7908bdaaf4..7926432ca2 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2018-05-17T08:51:39Z", - "updated_at": "2020-05-29T16:58:12Z", + "updated_at": "2020-06-19T09:04:57Z", "pushed_at": "2018-05-18T07:49:45Z", - "stargazers_count": 166, - "watchers_count": 166, + "stargazers_count": 167, + "watchers_count": 167, "forks_count": 71, "forks": 71, - "watchers": 166, + "watchers": 167, "score": 0 }, { diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index e3b79b5a01..3d28db369d 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -40,8 +40,8 @@ "pushed_at": "2019-12-13T19:07:53Z", "stargazers_count": 69, "watchers_count": 69, - "forks_count": 26, - "forks": 26, + "forks_count": 27, + "forks": 27, "watchers": 69, "score": 0 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 20229c9ec3..7a42c9f4d0 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-06-19T02:37:59Z", + "updated_at": "2020-06-19T07:13:42Z", "pushed_at": "2020-06-01T02:34:27Z", - "stargazers_count": 951, - "watchers_count": 951, - "forks_count": 235, - "forks": 235, - "watchers": 951, + "stargazers_count": 954, + "watchers_count": 954, + "forks_count": 236, + "forks": 236, + "watchers": 954, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index b7fc96f02a..c6f968b254 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -63,8 +63,8 @@ "pushed_at": "2020-05-25T08:15:28Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 }, diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 89316f2de9..2ff993debf 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -83,7 +83,7 @@ "fork": false, "created_at": "2020-01-11T00:26:16Z", "updated_at": "2020-06-18T21:27:05Z", - "pushed_at": "2020-06-16T16:28:25Z", + "pushed_at": "2020-06-19T03:16:40Z", "stargazers_count": 96, "watchers_count": 96, "forks_count": 26, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 9a262a98e7..f112380434 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-19T02:19:36Z", + "updated_at": "2020-06-19T07:28:25Z", "pushed_at": "2020-06-17T01:51:30Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 475, + "watchers_count": 475, "forks_count": 111, "forks": 111, - "watchers": 473, + "watchers": 475, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 30d2aa0a30..d6752260e8 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -36,13 +36,13 @@ "description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC", "fork": false, "created_at": "2019-04-25T03:07:53Z", - "updated_at": "2020-04-24T18:17:55Z", + "updated_at": "2020-06-19T03:42:53Z", "pushed_at": "2019-04-29T02:06:00Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "forks_count": 37, "forks": 37, - "watchers": 99, + "watchers": 100, "score": 0 }, { diff --git a/2019/CVE-2019-6260.json b/2019/CVE-2019-6260.json index 63823fa8d6..52e1ab976c 100644 --- a/2019/CVE-2019-6260.json +++ b/2019/CVE-2019-6260.json @@ -13,13 +13,13 @@ "description": "A Test and Debug Tool for ASPEED BMC AHB Interfaces", "fork": false, "created_at": "2019-02-21T22:49:53Z", - "updated_at": "2020-06-18T03:06:11Z", + "updated_at": "2020-06-19T04:21:07Z", "pushed_at": "2020-06-18T03:41:07Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 2, "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-7609.json b/2019/CVE-2019-7609.json index 2561785239..42eaa73ee3 100644 --- a/2019/CVE-2019-7609.json +++ b/2019/CVE-2019-7609.json @@ -59,13 +59,13 @@ "description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts", "fork": false, "created_at": "2019-10-21T15:31:13Z", - "updated_at": "2020-06-18T21:01:05Z", + "updated_at": "2020-06-19T04:46:58Z", "pushed_at": "2019-10-23T07:10:35Z", - "stargazers_count": 88, - "watchers_count": 88, + "stargazers_count": 89, + "watchers_count": 89, "forks_count": 32, "forks": 32, - "watchers": 88, + "watchers": 89, "score": 0 }, { diff --git a/2019/CVE-2019-9810.json b/2019/CVE-2019-9810.json index 2606d4ff20..71cd2894de 100644 --- a/2019/CVE-2019-9810.json +++ b/2019/CVE-2019-9810.json @@ -36,13 +36,13 @@ "description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.", "fork": false, "created_at": "2019-05-05T17:19:02Z", - "updated_at": "2020-05-20T04:10:31Z", + "updated_at": "2020-06-19T08:26:27Z", "pushed_at": "2019-12-28T18:25:10Z", - "stargazers_count": 193, - "watchers_count": 193, + "stargazers_count": 194, + "watchers_count": 194, "forks_count": 52, "forks": 52, - "watchers": 193, + "watchers": 194, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json index 6f499c1cc9..e315c02c04 100644 --- a/2020/CVE-2020-0668.json +++ b/2020/CVE-2020-0668.json @@ -40,8 +40,8 @@ "pushed_at": "2020-02-20T11:03:18Z", "stargazers_count": 170, "watchers_count": 170, - "forks_count": 41, - "forks": 41, + "forks_count": 42, + "forks": 42, "watchers": 170, "score": 0 }, diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index e18a1b06a6..a8568f4ce3 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,13 +13,13 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2020-06-19T03:01:58Z", + "updated_at": "2020-06-19T08:28:19Z", "pushed_at": "2020-06-18T00:42:57Z", - "stargazers_count": 141, - "watchers_count": 141, - "forks_count": 38, - "forks": 38, - "watchers": 141, + "stargazers_count": 151, + "watchers_count": 151, + "forks_count": 40, + "forks": 40, + "watchers": 151, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 8a31498167..1887facc0e 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -937,8 +937,8 @@ "pushed_at": "2020-04-08T19:27:07Z", "stargazers_count": 958, "watchers_count": 958, - "forks_count": 311, - "forks": 311, + "forks_count": 312, + "forks": 312, "watchers": 958, "score": 0 }, @@ -1186,13 +1186,13 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2020-06-18T15:05:58Z", + "updated_at": "2020-06-19T04:46:43Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 266, - "watchers_count": 266, + "stargazers_count": 267, + "watchers_count": 267, "forks_count": 74, "forks": 74, - "watchers": 266, + "watchers": 267, "score": 0 }, { @@ -1439,13 +1439,13 @@ "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "fork": false, "created_at": "2020-06-10T16:44:39Z", - "updated_at": "2020-06-19T01:21:02Z", + "updated_at": "2020-06-19T05:07:35Z", "pushed_at": "2020-06-19T01:20:59Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 7, "forks": 7, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json index ef45ed9987..3f95a82ef7 100644 --- a/2020/CVE-2020-10199.json +++ b/2020/CVE-2020-10199.json @@ -105,13 +105,13 @@ "description": "CVE-2020-10199 回显版本", "fork": false, "created_at": "2020-05-15T06:12:51Z", - "updated_at": "2020-06-18T17:20:23Z", + "updated_at": "2020-06-19T08:55:04Z", "pushed_at": "2020-05-15T06:18:18Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 6, "forks": 6, - "watchers": 21, + "watchers": 22, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1054.json b/2020/CVE-2020-1054.json index 4547167df2..8705d36f55 100644 --- a/2020/CVE-2020-1054.json +++ b/2020/CVE-2020-1054.json @@ -13,13 +13,13 @@ "description": "LPE for CVE-2020-1054 targeting Windows 7 x64", "fork": false, "created_at": "2020-06-16T23:22:15Z", - "updated_at": "2020-06-19T03:02:24Z", + "updated_at": "2020-06-19T06:00:40Z", "pushed_at": "2020-06-17T18:10:30Z", - "stargazers_count": 33, - "watchers_count": 33, - "forks_count": 11, - "forks": 11, - "watchers": 33, + "stargazers_count": 36, + "watchers_count": 36, + "forks_count": 12, + "forks": 12, + "watchers": 36, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-11444.json b/2020/CVE-2020-11444.json index 8bcfe71154..64f5924d60 100644 --- a/2020/CVE-2020-11444.json +++ b/2020/CVE-2020-11444.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-06-19T02:37:59Z", + "updated_at": "2020-06-19T07:13:42Z", "pushed_at": "2020-06-01T02:34:27Z", - "stargazers_count": 951, - "watchers_count": 951, - "forks_count": 235, - "forks": 235, - "watchers": 951, + "stargazers_count": 954, + "watchers_count": 954, + "forks_count": 236, + "forks": 236, + "watchers": 954, "score": 0 }, { diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index 0fc878a792..f36a141368 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,13 +13,13 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2020-06-18T20:39:03Z", + "updated_at": "2020-06-19T09:05:27Z", "pushed_at": "2020-06-17T13:41:23Z", - "stargazers_count": 292, - "watchers_count": 292, + "stargazers_count": 295, + "watchers_count": 295, "forks_count": 46, "forks": 46, - "watchers": 292, + "watchers": 295, "score": 0 }, { diff --git a/2020/CVE-2020-12856.json b/2020/CVE-2020-12856.json index 334c94ab84..f45e161dc8 100644 --- a/2020/CVE-2020-12856.json +++ b/2020/CVE-2020-12856.json @@ -13,13 +13,13 @@ "description": "A bluetooth-related vulnerability in some contact tracing apps", "fork": false, "created_at": "2020-05-15T00:18:03Z", - "updated_at": "2020-06-18T14:46:23Z", - "pushed_at": "2020-05-25T07:55:01Z", - "stargazers_count": 9, - "watchers_count": 9, + "updated_at": "2020-06-19T08:18:30Z", + "pushed_at": "2020-06-19T05:40:14Z", + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 1, "forks": 1, - "watchers": 9, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 3a6aed4a62..dac9376e9c 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -82,13 +82,13 @@ "description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool", "fork": false, "created_at": "2020-02-20T21:00:15Z", - "updated_at": "2020-06-10T05:32:19Z", + "updated_at": "2020-06-19T06:55:10Z", "pushed_at": "2020-02-24T12:06:08Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "forks_count": 76, "forks": 76, - "watchers": 169, + "watchers": 170, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index a8276a7a75..7dd2cc1c90 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-19T02:19:36Z", + "updated_at": "2020-06-19T07:28:25Z", "pushed_at": "2020-06-17T01:51:30Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 475, + "watchers_count": 475, "forks_count": 111, "forks": 111, - "watchers": 473, + "watchers": 475, "score": 0 }, { @@ -174,13 +174,13 @@ "description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。", "fork": false, "created_at": "2020-05-16T03:01:32Z", - "updated_at": "2020-06-13T15:59:53Z", + "updated_at": "2020-06-19T09:02:38Z", "pushed_at": "2020-05-17T12:07:01Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 33, + "watchers_count": 33, "forks_count": 9, "forks": 9, - "watchers": 31, + "watchers": 33, "score": 0 }, { @@ -197,13 +197,13 @@ "description": "CVE-2020-2551 POC to use in Internet", "fork": false, "created_at": "2020-05-24T02:56:12Z", - "updated_at": "2020-06-15T10:11:54Z", + "updated_at": "2020-06-19T03:59:37Z", "pushed_at": "2020-05-26T06:58:10Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 2, "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index fe96119759..8e36f4c8fc 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -36,13 +36,13 @@ "description": "CVE-2020-2555 Python POC", "fork": false, "created_at": "2020-03-06T16:02:59Z", - "updated_at": "2020-06-02T09:44:34Z", + "updated_at": "2020-06-19T07:24:08Z", "pushed_at": "2020-04-16T12:04:18Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "forks_count": 20, "forks": 20, - "watchers": 40, + "watchers": 41, "score": 0 }, { diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 6e9e7b672f..3eaf79d8a8 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -63,8 +63,8 @@ "pushed_at": "2020-04-16T08:38:42Z", "stargazers_count": 188, "watchers_count": 188, - "forks_count": 40, - "forks": 40, + "forks_count": 41, + "forks": 41, "watchers": 188, "score": 0 }, diff --git a/2020/CVE-2020-3956.json b/2020/CVE-2020-3956.json index b28f15c868..40fd0e4723 100644 --- a/2020/CVE-2020-3956.json +++ b/2020/CVE-2020-3956.json @@ -13,13 +13,13 @@ "description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)", "fork": false, "created_at": "2020-06-01T18:26:32Z", - "updated_at": "2020-06-10T03:35:29Z", + "updated_at": "2020-06-19T06:47:20Z", "pushed_at": "2020-06-02T08:30:22Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "forks_count": 22, "forks": 22, - "watchers": 59, + "watchers": 60, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-5410.json b/2020/CVE-2020-5410.json index 75ca1b956d..b7a7af045c 100644 --- a/2020/CVE-2020-5410.json +++ b/2020/CVE-2020-5410.json @@ -36,13 +36,13 @@ "description": "CVE-2020-5410 Spring Cloud Config directory traversal vulnerability", "fork": false, "created_at": "2020-06-16T20:15:58Z", - "updated_at": "2020-06-19T02:19:52Z", + "updated_at": "2020-06-19T06:21:02Z", "pushed_at": "2020-06-16T20:38:41Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 2, - "forks": 2, - "watchers": 12, + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 4, + "forks": 4, + "watchers": 14, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 67cf29bdce..f9826fae46 100644 --- a/README.md +++ b/README.md @@ -13783,6 +13783,22 @@ March Networks DVR 3204 stores sensitive information under the web root with ins ## 2006 +### CVE-2006-1236 + +<code> +Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 allows remote attackers to execute arbitrary code via a long setup sound command, a different vulnerability than CVE-2006-1010. +</code> + +- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236) + +### CVE-2006-3592 + +<code> +Unspecified vulnerability in the command line interface (CLI) in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows local users to execute arbitrary commands with elevated privileges via unspecified vectors, involving "certain CLI commands," aka bug CSCse11005. +</code> + +- [adenkiewicz/CVE-2006-3592](https://github.com/adenkiewicz/CVE-2006-3592) + ### CVE-2006-3747 <code> @@ -13813,6 +13829,7 @@ The mincore function in the Linux kernel before 2.4.33.6 does not properly lock Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command. </code> +- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184) - [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184)