From 2e37e1ad274dedac9958c84918cab372802be874 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 24 Feb 2021 00:09:11 +0900 Subject: [PATCH] Auto Update 2021/02/24 00:09:11 --- 2014/CVE-2014-4210.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-13379.json | 8 ++++---- 2018/CVE-2018-16323.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-6389.json | 4 ++-- 2018/CVE-2018-6574.json | 8 ++++---- 2019/CVE-2019-2618.json | 16 ++++++++-------- 2020/CVE-2020-0082.json | 25 +++++++++++++++++++++++++ 2020/CVE-2020-0787.json | 4 ++-- 2020/CVE-2020-1472.json | 16 ++++++++-------- 2020/CVE-2020-1938.json | 23 ----------------------- 2020/CVE-2020-25213.json | 4 ++-- 2020/CVE-2020-2551.json | 8 ++++---- 2020/CVE-2020-3952.json | 8 ++++---- 2020/CVE-2020-6287.json | 4 ++-- 2020/CVE-2020-8193.json | 8 ++++---- 2021/CVE-2021-1727.json | 8 ++++---- 2021/CVE-2021-3129.json | 8 ++++---- 2021/CVE-2021-3156.json | 22 +++++++++++----------- README.md | 11 +++++++++-- 22 files changed, 117 insertions(+), 108 deletions(-) create mode 100644 2020/CVE-2020-0082.json diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 1451f52a9b..39a33b2238 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-23T07:47:34Z", + "updated_at": "2021-02-23T10:06:38Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 922, - "watchers_count": 922, + "stargazers_count": 923, + "watchers_count": 923, "forks_count": 217, "forks": 217, - "watchers": 922, + "watchers": 923, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index dcbed13cc1..e074725ce9 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-23T07:47:34Z", + "updated_at": "2021-02-23T10:06:38Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 922, - "watchers_count": 922, + "stargazers_count": 923, + "watchers_count": 923, "forks_count": 217, "forks": 217, - "watchers": 922, + "watchers": 923, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index c9bd5e8663..c006425d03 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-23T07:47:34Z", + "updated_at": "2021-02-23T10:06:38Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 922, - "watchers_count": 922, + "stargazers_count": 923, + "watchers_count": 923, "forks_count": 217, "forks": 217, - "watchers": 922, + "watchers": 923, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json index 230ba1922c..1069c74c28 100644 --- a/2018/CVE-2018-13379.json +++ b/2018/CVE-2018-13379.json @@ -13,13 +13,13 @@ "description": "CVE-2018-13379", "fork": false, "created_at": "2019-08-11T09:44:37Z", - "updated_at": "2021-02-15T18:45:54Z", + "updated_at": "2021-02-23T11:19:14Z", "pushed_at": "2019-08-14T08:40:25Z", - "stargazers_count": 219, - "watchers_count": 219, + "stargazers_count": 220, + "watchers_count": 220, "forks_count": 80, "forks": 80, - "watchers": 219, + "watchers": 220, "score": 0 }, { diff --git a/2018/CVE-2018-16323.json b/2018/CVE-2018-16323.json index e6b3831453..a556248d97 100644 --- a/2018/CVE-2018-16323.json +++ b/2018/CVE-2018-16323.json @@ -13,13 +13,13 @@ "description": "Tool for CVE-2018-16323", "fork": false, "created_at": "2018-11-18T15:30:46Z", - "updated_at": "2020-02-12T14:15:20Z", + "updated_at": "2021-02-23T11:06:19Z", "pushed_at": "2019-01-17T21:01:56Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 77, + "watchers_count": 77, "forks_count": 9, "forks": 9, - "watchers": 76, + "watchers": 77, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 2e7b5b3033..54277131dc 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-23T07:47:34Z", + "updated_at": "2021-02-23T10:06:38Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 922, - "watchers_count": 922, + "stargazers_count": 923, + "watchers_count": 923, "forks_count": 217, "forks": 217, - "watchers": 922, + "watchers": 923, "score": 0 }, { diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 2d9de106bc..20dcfe71cc 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -473,8 +473,8 @@ "description": null, "fork": false, "created_at": "2020-10-18T14:01:59Z", - "updated_at": "2021-02-21T22:54:13Z", - "pushed_at": "2021-02-21T22:54:11Z", + "updated_at": "2021-02-23T10:16:09Z", + "pushed_at": "2021-02-23T10:16:07Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2018/CVE-2018-6574.json b/2018/CVE-2018-6574.json index b21e3f5a37..fb80b273aa 100644 --- a/2018/CVE-2018-6574.json +++ b/2018/CVE-2018-6574.json @@ -36,13 +36,13 @@ "description": "CVE-2018-6574 POC : golang 'go get' remote command execution during source code build", "fork": false, "created_at": "2018-04-24T03:44:20Z", - "updated_at": "2020-11-01T09:29:29Z", + "updated_at": "2021-02-23T14:56:16Z", "pushed_at": "2018-04-24T16:32:22Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 21, + "watchers_count": 21, "forks_count": 13, "forks": 13, - "watchers": 22, + "watchers": 21, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 6fcdb68493..2ff22f11df 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2021-02-18T06:16:40Z", + "updated_at": "2021-02-23T09:25:18Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 719, - "watchers_count": 719, + "stargazers_count": 720, + "watchers_count": 720, "forks_count": 150, "forks": 150, - "watchers": 719, + "watchers": 720, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-23T07:47:34Z", + "updated_at": "2021-02-23T10:06:38Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 922, - "watchers_count": 922, + "stargazers_count": 923, + "watchers_count": 923, "forks_count": 217, "forks": 217, - "watchers": 922, + "watchers": 923, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0082.json b/2020/CVE-2020-0082.json new file mode 100644 index 0000000000..381e10346b --- /dev/null +++ b/2020/CVE-2020-0082.json @@ -0,0 +1,25 @@ +[ + { + "id": 341573053, + "name": "CVE-2020-0082-ExternalVibration", + "full_name": "0x742\/CVE-2020-0082-ExternalVibration", + "owner": { + "login": "0x742", + "id": 66528191, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66528191?v=4", + "html_url": "https:\/\/github.com\/0x742" + }, + "html_url": "https:\/\/github.com\/0x742\/CVE-2020-0082-ExternalVibration", + "description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.", + "fork": false, + "created_at": "2021-02-23T14:00:55Z", + "updated_at": "2021-02-23T14:33:49Z", + "pushed_at": "2021-02-23T14:03:00Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 0, + "forks": 0, + "watchers": 3, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 1a21aa1e1b..3f79c84e14 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -17,8 +17,8 @@ "pushed_at": "2020-09-11T07:38:22Z", "stargazers_count": 503, "watchers_count": 503, - "forks_count": 122, - "forks": 122, + "forks_count": 123, + "forks": 123, "watchers": 503, "score": 0 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 861382b8ac..e82c23c0cf 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2021-02-23T06:36:46Z", + "updated_at": "2021-02-23T10:26:17Z", "pushed_at": "2020-10-21T12:10:28Z", - "stargazers_count": 1245, - "watchers_count": 1245, + "stargazers_count": 1246, + "watchers_count": 1246, "forks_count": 289, "forks": 289, - "watchers": 1245, + "watchers": 1246, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2021-02-23T04:25:11Z", + "updated_at": "2021-02-23T13:31:12Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 286, - "watchers_count": 286, + "stargazers_count": 287, + "watchers_count": 287, "forks_count": 94, "forks": 94, - "watchers": 286, + "watchers": 287, "score": 0 }, { diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 513381a016..608e69a5a9 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -91,29 +91,6 @@ "watchers": 208, "score": 0 }, - { - "id": 242038197, - "name": "CVE-2020-1938", - "full_name": "laolisafe\/CVE-2020-1938", - "owner": { - "login": "laolisafe", - "id": 45027935, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45027935?v=4", - "html_url": "https:\/\/github.com\/laolisafe" - }, - "html_url": "https:\/\/github.com\/laolisafe\/CVE-2020-1938", - "description": "CVE-2020-1938漏洞复现", - "fork": false, - "created_at": "2020-02-21T02:36:37Z", - "updated_at": "2020-10-18T13:38:55Z", - "pushed_at": "2020-02-21T02:49:57Z", - "stargazers_count": 35, - "watchers_count": 35, - "forks_count": 10, - "forks": 10, - "watchers": 35, - "score": 0 - }, { "id": 242054816, "name": "CVE-2020-1938", diff --git a/2020/CVE-2020-25213.json b/2020/CVE-2020-25213.json index e81285ea10..399b7bee4c 100644 --- a/2020/CVE-2020-25213.json +++ b/2020/CVE-2020-25213.json @@ -17,8 +17,8 @@ "pushed_at": "2020-10-12T09:57:28Z", "stargazers_count": 30, "watchers_count": 30, - "forks_count": 11, - "forks": 11, + "forks_count": 12, + "forks": 12, "watchers": 30, "score": 0 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 725de8ae46..623ecd6da6 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-23T07:47:34Z", + "updated_at": "2021-02-23T10:06:38Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 922, - "watchers_count": 922, + "stargazers_count": 923, + "watchers_count": 923, "forks_count": 217, "forks": 217, - "watchers": 922, + "watchers": 923, "score": 0 }, { diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index c34c88b484..f403276c14 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -25,14 +25,14 @@ { "id": 256080140, "name": "CVE-2020-3952", - "full_name": "frustreated\/CVE-2020-3952", + "full_name": "avboy1337\/CVE-2020-3952", "owner": { - "login": "frustreated", + "login": "avboy1337", "id": 5463104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4", - "html_url": "https:\/\/github.com\/frustreated" + "html_url": "https:\/\/github.com\/avboy1337" }, - "html_url": "https:\/\/github.com\/frustreated\/CVE-2020-3952", + "html_url": "https:\/\/github.com\/avboy1337\/CVE-2020-3952", "description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell", "fork": false, "created_at": "2020-04-16T01:39:33Z", diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json index db91a1ca31..3e440137ab 100644 --- a/2020/CVE-2020-6287.json +++ b/2020/CVE-2020-6287.json @@ -17,8 +17,8 @@ "pushed_at": "2020-09-29T17:20:12Z", "stargazers_count": 156, "watchers_count": 156, - "forks_count": 51, - "forks": 51, + "forks_count": 52, + "forks": 52, "watchers": 156, "score": 0 }, diff --git a/2020/CVE-2020-8193.json b/2020/CVE-2020-8193.json index 306bc55962..de8ca29687 100644 --- a/2020/CVE-2020-8193.json +++ b/2020/CVE-2020-8193.json @@ -82,13 +82,13 @@ "description": "Scanning for CVE-2020-8193 - Auth Bypass check", "fork": false, "created_at": "2020-07-13T10:36:43Z", - "updated_at": "2020-11-24T17:20:22Z", + "updated_at": "2021-02-23T14:47:52Z", "pushed_at": "2020-07-13T11:01:47Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2021/CVE-2021-1727.json b/2021/CVE-2021-1727.json index e8402e9aa3..c6fcc744f7 100644 --- a/2021/CVE-2021-1727.json +++ b/2021/CVE-2021-1727.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-16T16:55:46Z", - "updated_at": "2021-02-23T04:48:46Z", + "updated_at": "2021-02-23T11:49:39Z", "pushed_at": "2021-02-16T16:59:09Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 9, "forks": 9, - "watchers": 14, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index e8bc7b4515..066d695405 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2021-02-23T09:07:40Z", + "updated_at": "2021-02-23T10:28:45Z", "pushed_at": "2021-01-29T13:59:07Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 62, + "watchers_count": 62, "forks_count": 10, "forks": 10, - "watchers": 59, + "watchers": 62, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 3703ee0663..9ad71312e8 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -335,13 +335,13 @@ "description": "PoC for CVE-2021-3156 (sudo heap overflow)", "fork": false, "created_at": "2021-01-30T03:22:04Z", - "updated_at": "2021-02-22T21:10:21Z", + "updated_at": "2021-02-23T14:15:35Z", "pushed_at": "2021-02-08T03:42:50Z", - "stargazers_count": 350, - "watchers_count": 350, - "forks_count": 92, - "forks": 92, - "watchers": 350, + "stargazers_count": 353, + "watchers_count": 353, + "forks_count": 93, + "forks": 93, + "watchers": 353, "score": 0 }, { @@ -381,13 +381,13 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2021-02-23T07:05:43Z", + "updated_at": "2021-02-23T13:57:43Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 606, - "watchers_count": 606, + "stargazers_count": 608, + "watchers_count": 608, "forks_count": 171, "forks": 171, - "watchers": 606, + "watchers": 608, "score": 0 }, { @@ -634,7 +634,7 @@ "description": null, "fork": false, "created_at": "2021-02-03T11:27:52Z", - "updated_at": "2021-02-04T06:16:27Z", + "updated_at": "2021-02-23T13:57:30Z", "pushed_at": "2021-02-04T06:12:23Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/README.md b/README.md index a1177d3c55..61ab4ed910 100644 --- a/README.md +++ b/README.md @@ -316,6 +316,14 @@ In the ioctl handlers of the Mediatek Command Queue driver, there is a possible - [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069) - [quarkslab/CVE-2020-0069_poc](https://github.com/quarkslab/CVE-2020-0069_poc) +### CVE-2020-0082 (2020-04-17) + + +In ExternalVibration of ExternalVibration.java, there is a possible activation of an arbitrary intent due to unsafe deserialization. This could lead to local escalation of privilege to system_server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140417434 + + +- [0x742/CVE-2020-0082-ExternalVibration](https://github.com/0x742/CVE-2020-0082-ExternalVibration) + ### CVE-2020-0096 (2020-05-14) @@ -847,7 +855,6 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc - [xindongzhuaizhuai/CVE-2020-1938](https://github.com/xindongzhuaizhuai/CVE-2020-1938) - [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC) - [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner) -- [laolisafe/CVE-2020-1938](https://github.com/laolisafe/CVE-2020-1938) - [DaemonShao/CVE-2020-1938](https://github.com/DaemonShao/CVE-2020-1938) - [sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read](https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read) - [fairyming/CVE-2020-1938](https://github.com/fairyming/CVE-2020-1938) @@ -1056,7 +1063,7 @@ Under certain conditions, vmdir that ships with VMware vCenter Server, as part o - [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952) -- [frustreated/CVE-2020-3952](https://github.com/frustreated/CVE-2020-3952) +- [avboy1337/CVE-2020-3952](https://github.com/avboy1337/CVE-2020-3952) - [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952) - [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952) - [Fa1c0n35/vmware_vcenter_cve_2020_3952](https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952)