diff --git a/2015/CVE-2015-6606.json b/2015/CVE-2015-6606.json index 9731f0c993..63e5856374 100644 --- a/2015/CVE-2015-6606.json +++ b/2015/CVE-2015-6606.json @@ -13,7 +13,7 @@ "description": "Simple Exploit for Verification of CVE-2015-6606", "fork": false, "created_at": "2016-01-19T16:16:22Z", - "updated_at": "2019-03-23T08:47:27Z", + "updated_at": "2020-04-06T09:48:50Z", "pushed_at": "2016-04-12T20:59:33Z", "stargazers_count": 3, "watchers_count": 3, diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index 4dd0e934a8..4fe6daa6e1 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -86,8 +86,8 @@ "pushed_at": "2018-07-13T18:56:53Z", "stargazers_count": 127, "watchers_count": 127, - "forks_count": 47, - "forks": 47, + "forks_count": 46, + "forks": 46, "watchers": 127, "score": 0 }, @@ -132,8 +132,8 @@ "pushed_at": "2018-01-03T00:42:57Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 40, - "forks": 40, + "forks_count": 39, + "forks": 39, "watchers": 2, "score": 0 }, diff --git a/2017/CVE-2017-10366.json b/2017/CVE-2017-10366.json index 3db31e4985..ce8b5403df 100644 --- a/2017/CVE-2017-10366.json +++ b/2017/CVE-2017-10366.json @@ -13,13 +13,13 @@ "description": "CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit", "fork": false, "created_at": "2018-09-03T15:46:39Z", - "updated_at": "2019-11-27T13:39:59Z", + "updated_at": "2020-04-06T11:31:51Z", "pushed_at": "2018-09-04T10:07:06Z", - "stargazers_count": 22, - "watchers_count": 22, - "forks_count": 3, - "forks": 3, - "watchers": 22, + "stargazers_count": 23, + "watchers_count": 23, + "forks_count": 4, + "forks": 4, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-12542.json b/2017/CVE-2017-12542.json index 2c6fdba125..962457734e 100644 --- a/2017/CVE-2017-12542.json +++ b/2017/CVE-2017-12542.json @@ -13,13 +13,13 @@ "description": "Test and exploit for CVE-2017-12542", "fork": false, "created_at": "2018-02-05T18:55:56Z", - "updated_at": "2019-10-23T22:54:14Z", + "updated_at": "2020-04-06T12:17:15Z", "pushed_at": "2018-04-15T12:01:38Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "forks_count": 29, "forks": 29, - "watchers": 72, + "watchers": 73, "score": 0 }, { diff --git a/2017/CVE-2017-12635.json b/2017/CVE-2017-12635.json index 8c6e64cc44..3975eb3d38 100644 --- a/2017/CVE-2017-12635.json +++ b/2017/CVE-2017-12635.json @@ -13,13 +13,13 @@ "description": "Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 \/ 2.x < 2.1.1 - Remote Privilege Escalation", "fork": false, "created_at": "2019-11-07T20:02:31Z", - "updated_at": "2020-03-29T03:53:03Z", + "updated_at": "2020-04-06T14:47:47Z", "pushed_at": "2019-12-15T15:19:00Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-15120.json b/2017/CVE-2017-15120.json index 84f6707bea..b797ce59f8 100644 --- a/2017/CVE-2017-15120.json +++ b/2017/CVE-2017-15120.json @@ -13,13 +13,13 @@ "description": "PowerDNS CVE-2017-15120 \/ DO NOT ABUSE", "fork": false, "created_at": "2018-10-16T15:08:15Z", - "updated_at": "2019-11-21T12:23:52Z", + "updated_at": "2020-04-06T11:04:21Z", "pushed_at": "2018-10-16T15:09:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 3, + "forks": 3, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5487.json b/2017/CVE-2017-5487.json index f97014a177..63b787d603 100644 --- a/2017/CVE-2017-5487.json +++ b/2017/CVE-2017-5487.json @@ -13,13 +13,13 @@ "description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ", "fork": false, "created_at": "2017-10-22T09:22:28Z", - "updated_at": "2018-10-15T20:53:05Z", + "updated_at": "2020-04-06T12:23:41Z", "pushed_at": "2017-06-11T16:47:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 4, + "forks": 4, + "watchers": 1, "score": 0 }, { diff --git a/2017/CVE-2017-5754.json b/2017/CVE-2017-5754.json index 916dde8ea0..99308acff8 100644 --- a/2017/CVE-2017-5754.json +++ b/2017/CVE-2017-5754.json @@ -36,13 +36,13 @@ "description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.", "fork": false, "created_at": "2018-01-04T23:51:12Z", - "updated_at": "2020-03-26T08:33:52Z", + "updated_at": "2020-04-06T12:43:33Z", "pushed_at": "2018-02-27T05:22:38Z", - "stargazers_count": 549, - "watchers_count": 549, + "stargazers_count": 548, + "watchers_count": 548, "forks_count": 72, "forks": 72, - "watchers": 549, + "watchers": 548, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index b6ae7d9d25..5466c0fb74 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -82,13 +82,13 @@ "description": "CVE-2017-7494 - Detection Scripts", "fork": false, "created_at": "2017-05-26T07:28:26Z", - "updated_at": "2018-11-14T10:49:16Z", + "updated_at": "2020-04-06T12:15:02Z", "pushed_at": "2017-05-26T07:43:02Z", - "stargazers_count": 61, - "watchers_count": 61, - "forks_count": 22, - "forks": 22, - "watchers": 61, + "stargazers_count": 62, + "watchers_count": 62, + "forks_count": 23, + "forks": 23, + "watchers": 62, "score": 0 }, { diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index 274557c148..9c5446178b 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -36,13 +36,13 @@ "description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.", "fork": false, "created_at": "2018-08-03T04:36:23Z", - "updated_at": "2020-03-14T22:49:59Z", + "updated_at": "2020-04-06T14:28:56Z", "pushed_at": "2018-08-14T07:47:02Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 19, "forks": 19, - "watchers": 66, + "watchers": 67, "score": 0 }, { diff --git a/2017/CVE-2017-9805.json b/2017/CVE-2017-9805.json index 917b114421..2c779bd570 100644 --- a/2017/CVE-2017-9805.json +++ b/2017/CVE-2017-9805.json @@ -59,13 +59,13 @@ "description": "An exploit for Apache Struts CVE-2017-9805", "fork": false, "created_at": "2017-09-09T01:32:57Z", - "updated_at": "2020-04-01T11:46:21Z", + "updated_at": "2020-04-06T12:06:51Z", "pushed_at": "2017-11-07T19:24:00Z", - "stargazers_count": 231, - "watchers_count": 231, + "stargazers_count": 232, + "watchers_count": 232, "forks_count": 78, "forks": 78, - "watchers": 231, + "watchers": 232, "score": 0 }, { diff --git a/2018/CVE-2018-0101.json b/2018/CVE-2018-0101.json index eb80f20d5e..4e06d9077c 100644 --- a/2018/CVE-2018-0101.json +++ b/2018/CVE-2018-0101.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2018-02-07T16:25:59Z", - "updated_at": "2019-10-11T19:04:25Z", + "updated_at": "2020-04-06T12:17:46Z", "pushed_at": "2018-02-07T16:43:08Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 5, - "forks": 5, - "watchers": 13, + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 6, + "forks": 6, + "watchers": 14, "score": 0 }, { diff --git a/2018/CVE-2018-0114.json b/2018/CVE-2018-0114.json index aa805da0fd..cfb0ab52e8 100644 --- a/2018/CVE-2018-0114.json +++ b/2018/CVE-2018-0114.json @@ -13,13 +13,13 @@ "description": "This repository contains the POC of an exploit for node-jose < 0.11.0", "fork": false, "created_at": "2018-03-20T20:37:29Z", - "updated_at": "2020-01-21T11:37:45Z", + "updated_at": "2020-04-06T11:52:17Z", "pushed_at": "2019-07-30T13:12:41Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 5, - "forks": 5, - "watchers": 19, + "stargazers_count": 20, + "watchers_count": 20, + "forks_count": 6, + "forks": 6, + "watchers": 20, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-1002105.json b/2018/CVE-2018-1002105.json index ad0bb882ce..04bb65b3ff 100644 --- a/2018/CVE-2018-1002105.json +++ b/2018/CVE-2018-1002105.json @@ -13,13 +13,13 @@ "description": "Test utility for cve-2018-1002105", "fork": false, "created_at": "2018-12-05T02:51:43Z", - "updated_at": "2020-02-15T23:43:31Z", + "updated_at": "2020-04-06T10:50:44Z", "pushed_at": "2018-12-13T16:56:28Z", - "stargazers_count": 191, - "watchers_count": 191, - "forks_count": 22, - "forks": 22, - "watchers": 191, + "stargazers_count": 192, + "watchers_count": 192, + "forks_count": 23, + "forks": 23, + "watchers": 192, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "PoC for CVE-2018-1002105.", "fork": false, "created_at": "2018-12-06T11:28:02Z", - "updated_at": "2020-02-15T23:43:36Z", + "updated_at": "2020-04-06T10:51:02Z", "pushed_at": "2018-12-21T14:34:04Z", - "stargazers_count": 216, - "watchers_count": 216, - "forks_count": 38, - "forks": 38, - "watchers": 216, + "stargazers_count": 217, + "watchers_count": 217, + "forks_count": 39, + "forks": 39, + "watchers": 217, "score": 0 }, { diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 54153a4832..4d11b302ae 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -36,13 +36,13 @@ "description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)", "fork": false, "created_at": "2018-10-17T14:14:12Z", - "updated_at": "2020-03-02T10:35:07Z", + "updated_at": "2020-04-06T11:04:04Z", "pushed_at": "2020-01-29T10:28:44Z", - "stargazers_count": 462, - "watchers_count": 462, + "stargazers_count": 463, + "watchers_count": 463, "forks_count": 116, "forks": 116, - "watchers": 462, + "watchers": 463, "score": 0 }, { @@ -197,13 +197,13 @@ "description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)", "fork": false, "created_at": "2018-10-18T15:08:25Z", - "updated_at": "2019-07-15T17:56:19Z", + "updated_at": "2020-04-06T11:03:55Z", "pushed_at": "2018-10-18T15:11:35Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 2, - "forks": 2, - "watchers": 8, + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 3, + "forks": 3, + "watchers": 9, "score": 0 }, { diff --git a/2018/CVE-2018-11759.json b/2018/CVE-2018-11759.json index c9b228633f..e632113507 100644 --- a/2018/CVE-2018-11759.json +++ b/2018/CVE-2018-11759.json @@ -13,13 +13,13 @@ "description": "Proof of concept showing how to exploit the CVE-2018-11759", "fork": false, "created_at": "2018-11-01T09:11:07Z", - "updated_at": "2019-10-04T07:11:18Z", + "updated_at": "2020-04-06T11:00:03Z", "pushed_at": "2018-12-11T12:59:26Z", - "stargazers_count": 33, - "watchers_count": 33, - "forks_count": 14, - "forks": 14, - "watchers": 33, + "stargazers_count": 34, + "watchers_count": 34, + "forks_count": 15, + "forks": 15, + "watchers": 34, "score": 0 }, { diff --git a/2018/CVE-2018-11776.json b/2018/CVE-2018-11776.json index 29c24468e5..3cb5352dd2 100644 --- a/2018/CVE-2018-11776.json +++ b/2018/CVE-2018-11776.json @@ -105,13 +105,13 @@ "description": " An exploit for Apache Struts CVE-2018-11776", "fork": false, "created_at": "2018-08-25T01:53:30Z", - "updated_at": "2020-02-27T12:25:55Z", + "updated_at": "2020-04-06T11:33:37Z", "pushed_at": "2018-08-26T02:31:39Z", - "stargazers_count": 285, - "watchers_count": 285, + "stargazers_count": 286, + "watchers_count": 286, "forks_count": 101, "forks": 101, - "watchers": 285, + "watchers": 286, "score": 0 }, { diff --git a/2018/CVE-2018-1305.json b/2018/CVE-2018-1305.json index 87e1c3aaba..80cdcc7882 100644 --- a/2018/CVE-2018-1305.json +++ b/2018/CVE-2018-1305.json @@ -13,13 +13,13 @@ "description": "Apache Tomcat 安全绕过漏洞 Poc", "fork": false, "created_at": "2018-03-12T16:09:46Z", - "updated_at": "2020-03-11T05:07:13Z", + "updated_at": "2020-04-06T14:20:38Z", "pushed_at": "2018-06-01T10:05:52Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 5, - "forks": 5, - "watchers": 15, + "stargazers_count": 16, + "watchers_count": 16, + "forks_count": 6, + "forks": 6, + "watchers": 16, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json index ce9874575b..e90c605958 100644 --- a/2018/CVE-2018-13379.json +++ b/2018/CVE-2018-13379.json @@ -17,8 +17,8 @@ "pushed_at": "2019-08-14T08:40:25Z", "stargazers_count": 196, "watchers_count": 196, - "forks_count": 63, - "forks": 63, + "forks_count": 62, + "forks": 62, "watchers": 196, "score": 0 }, diff --git a/2018/CVE-2018-13382.json b/2018/CVE-2018-13382.json index ab687fb235..4fdac94501 100644 --- a/2018/CVE-2018-13382.json +++ b/2018/CVE-2018-13382.json @@ -17,8 +17,8 @@ "pushed_at": "2019-08-13T15:06:28Z", "stargazers_count": 104, "watchers_count": 104, - "forks_count": 41, - "forks": 41, + "forks_count": 40, + "forks": 40, "watchers": 104, "score": 0 } diff --git a/2018/CVE-2018-14729.json b/2018/CVE-2018-14729.json index a6bcb308b0..7a3361bf72 100644 --- a/2018/CVE-2018-14729.json +++ b/2018/CVE-2018-14729.json @@ -13,13 +13,13 @@ "description": "Discuz backend getshell", "fork": false, "created_at": "2018-08-27T11:58:49Z", - "updated_at": "2020-03-24T00:43:07Z", + "updated_at": "2020-04-06T10:49:24Z", "pushed_at": "2018-12-15T10:30:34Z", - "stargazers_count": 78, - "watchers_count": 78, - "forks_count": 19, - "forks": 19, - "watchers": 78, + "stargazers_count": 79, + "watchers_count": 79, + "forks_count": 20, + "forks": 20, + "watchers": 79, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index a292265ddc..7542010a42 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)", "fork": false, "created_at": "2018-08-14T18:51:50Z", - "updated_at": "2020-02-19T11:48:20Z", + "updated_at": "2020-04-06T11:07:39Z", "pushed_at": "2018-09-27T07:32:19Z", - "stargazers_count": 176, - "watchers_count": 176, - "forks_count": 21, - "forks": 21, - "watchers": 176, + "stargazers_count": 177, + "watchers_count": 177, + "forks_count": 22, + "forks": 22, + "watchers": 177, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index a4c896e51b..4245a9acca 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -13,13 +13,13 @@ "description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).", "fork": false, "created_at": "2018-08-17T23:48:15Z", - "updated_at": "2020-04-04T04:02:58Z", + "updated_at": "2020-04-06T11:36:21Z", "pushed_at": "2019-11-15T08:12:32Z", - "stargazers_count": 102, - "watchers_count": 102, - "forks_count": 25, - "forks": 25, - "watchers": 102, + "stargazers_count": 103, + "watchers_count": 103, + "forks_count": 26, + "forks": 26, + "watchers": 103, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "Exploit written in Python for CVE-2018-15473 with threading and export formats", "fork": false, "created_at": "2018-08-21T00:09:56Z", - "updated_at": "2020-04-03T03:17:23Z", + "updated_at": "2020-04-06T11:35:26Z", "pushed_at": "2020-03-06T10:52:19Z", - "stargazers_count": 389, - "watchers_count": 389, + "stargazers_count": 390, + "watchers_count": 390, "forks_count": 118, "forks": 118, - "watchers": 389, + "watchers": 390, "score": 0 }, { diff --git a/2018/CVE-2018-15499.json b/2018/CVE-2018-15499.json index f2b3dfb70f..adeba5a0a0 100644 --- a/2018/CVE-2018-15499.json +++ b/2018/CVE-2018-15499.json @@ -13,13 +13,13 @@ "description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)", "fork": false, "created_at": "2018-08-21T15:26:35Z", - "updated_at": "2020-03-19T00:33:58Z", + "updated_at": "2020-04-06T11:34:14Z", "pushed_at": "2018-08-23T12:55:23Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 4, - "forks": 4, - "watchers": 6, + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 5, + "forks": 5, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-15982.json b/2018/CVE-2018-15982.json index 779db0c1c3..6b89f81e86 100644 --- a/2018/CVE-2018-15982.json +++ b/2018/CVE-2018-15982.json @@ -82,13 +82,13 @@ "description": "Script and metasploit module for CVE-2018-15982", "fork": false, "created_at": "2018-12-11T16:31:21Z", - "updated_at": "2020-03-14T20:56:39Z", + "updated_at": "2020-04-06T10:50:28Z", "pushed_at": "2018-12-14T19:34:42Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 4, - "forks": 4, - "watchers": 10, + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 5, + "forks": 5, + "watchers": 11, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "CVE-2018-15982_EXP_IE", "fork": false, "created_at": "2018-12-12T02:41:31Z", - "updated_at": "2019-12-04T14:57:12Z", + "updated_at": "2020-04-06T10:50:19Z", "pushed_at": "2018-12-12T02:54:01Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 9, "forks": 9, - "watchers": 11, + "watchers": 12, "score": 0 }, { diff --git a/2018/CVE-2018-16875.json b/2018/CVE-2018-16875.json index c91ce252ba..8c17b8ce05 100644 --- a/2018/CVE-2018-16875.json +++ b/2018/CVE-2018-16875.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2018-12-14T00:53:46Z", - "updated_at": "2019-05-30T16:10:52Z", + "updated_at": "2020-04-06T10:49:41Z", "pushed_at": "2018-12-14T00:54:01Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 1, - "forks": 1, - "watchers": 7, + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 2, + "forks": 2, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-17144.json b/2018/CVE-2018-17144.json index b70e614d1c..4a9f11a4f4 100644 --- a/2018/CVE-2018-17144.json +++ b/2018/CVE-2018-17144.json @@ -36,13 +36,13 @@ "description": "Put the *.py files to test\/functional folder of bitcoin sourcecode (commit: 4901c00792c1dabae4bb01e6373c9b1ed9ef3008)", "fork": false, "created_at": "2018-10-31T09:07:35Z", - "updated_at": "2019-08-30T14:05:53Z", + "updated_at": "2020-04-06T10:56:04Z", "pushed_at": "2018-11-12T10:11:00Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 5, - "forks": 5, - "watchers": 9, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 6, + "forks": 6, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-19126.json b/2018/CVE-2018-19126.json index 08277110ae..aba1493e35 100644 --- a/2018/CVE-2018-19126.json +++ b/2018/CVE-2018-19126.json @@ -13,13 +13,13 @@ "description": "PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)", "fork": false, "created_at": "2018-12-01T10:53:45Z", - "updated_at": "2020-01-13T11:11:08Z", + "updated_at": "2020-04-06T10:52:16Z", "pushed_at": "2018-12-12T22:11:45Z", - "stargazers_count": 36, - "watchers_count": 36, - "forks_count": 6, - "forks": 6, - "watchers": 36, + "stargazers_count": 37, + "watchers_count": 37, + "forks_count": 7, + "forks": 7, + "watchers": 37, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-1999002.json b/2018/CVE-2018-1999002.json index 1ec797c29a..9b666684e5 100644 --- a/2018/CVE-2018-1999002.json +++ b/2018/CVE-2018-1999002.json @@ -36,13 +36,13 @@ "description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ", "fork": false, "created_at": "2019-02-23T10:00:03Z", - "updated_at": "2020-03-13T16:16:07Z", + "updated_at": "2020-04-06T10:44:19Z", "pushed_at": "2019-02-23T10:01:26Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 3, - "forks": 3, - "watchers": 5, + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 4, + "forks": 4, + "watchers": 6, "score": 0 }, { diff --git a/2018/CVE-2018-2380.json b/2018/CVE-2018-2380.json index b268fd0208..2000064e28 100644 --- a/2018/CVE-2018-2380.json +++ b/2018/CVE-2018-2380.json @@ -13,13 +13,13 @@ "description": "PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM", "fork": false, "created_at": "2018-03-14T09:20:21Z", - "updated_at": "2019-12-05T03:00:51Z", + "updated_at": "2020-04-06T12:16:04Z", "pushed_at": "2018-03-14T12:13:43Z", - "stargazers_count": 44, - "watchers_count": 44, - "forks_count": 14, - "forks": 14, - "watchers": 44, + "stargazers_count": 45, + "watchers_count": 45, + "forks_count": 15, + "forks": 15, + "watchers": 45, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2844.json b/2018/CVE-2018-2844.json index db66204095..98b6312b84 100644 --- a/2018/CVE-2018-2844.json +++ b/2018/CVE-2018-2844.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2018-08-28T08:04:19Z", - "updated_at": "2020-04-04T22:03:14Z", + "updated_at": "2020-04-06T11:32:51Z", "pushed_at": "2018-08-28T08:06:21Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 90, + "watchers_count": 90, "forks_count": 31, "forks": 31, - "watchers": 89, + "watchers": 90, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json index 1caaa0866a..7595371742 100644 --- a/2018/CVE-2018-2893.json +++ b/2018/CVE-2018-2893.json @@ -13,13 +13,13 @@ "description": "CVE-2018-2893", "fork": false, "created_at": "2018-07-19T05:46:55Z", - "updated_at": "2019-12-12T17:04:35Z", + "updated_at": "2020-04-06T11:41:27Z", "pushed_at": "2018-07-19T05:59:00Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 63, + "watchers_count": 63, "forks_count": 40, "forks": 40, - "watchers": 62, + "watchers": 63, "score": 0 }, { diff --git a/2018/CVE-2018-3191.json b/2018/CVE-2018-3191.json index 6042d01f69..d107a8679d 100644 --- a/2018/CVE-2018-3191.json +++ b/2018/CVE-2018-3191.json @@ -13,13 +13,13 @@ "description": "CVE-2018-3191 payload generator", "fork": false, "created_at": "2018-10-22T02:29:12Z", - "updated_at": "2019-06-24T04:18:16Z", + "updated_at": "2020-04-06T11:03:47Z", "pushed_at": "2018-10-21T17:28:13Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 56, "forks": 56, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "CVE-2018-3191 反弹shell", "fork": false, "created_at": "2018-10-23T17:24:43Z", - "updated_at": "2019-11-29T08:42:20Z", + "updated_at": "2020-04-06T11:02:22Z", "pushed_at": "2018-10-23T17:28:05Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 26, "forks": 26, - "watchers": 52, + "watchers": 53, "score": 0 }, { @@ -105,13 +105,13 @@ "description": null, "fork": false, "created_at": "2018-10-24T09:54:00Z", - "updated_at": "2019-11-09T11:57:18Z", + "updated_at": "2020-04-06T11:02:04Z", "pushed_at": "2018-10-25T08:12:46Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 2, - "forks": 2, - "watchers": 17, + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 3, + "forks": 3, + "watchers": 18, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index 5a7ad569f7..e5f28e7fe3 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018", "fork": false, "created_at": "2018-08-08T14:41:20Z", - "updated_at": "2020-03-31T17:30:03Z", + "updated_at": "2020-04-06T11:36:58Z", "pushed_at": "2018-08-17T23:31:46Z", - "stargazers_count": 151, - "watchers_count": 151, - "forks_count": 29, - "forks": 29, - "watchers": 151, + "stargazers_count": 152, + "watchers_count": 152, + "forks_count": 30, + "forks": 30, + "watchers": 152, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-4327.json b/2018/CVE-2018-4327.json index d0fc8a54d7..909739eeb5 100644 --- a/2018/CVE-2018-4327.json +++ b/2018/CVE-2018-4327.json @@ -13,13 +13,13 @@ "description": " POC for CVE-2018-4327", "fork": false, "created_at": "2018-09-11T19:15:09Z", - "updated_at": "2019-12-21T13:38:17Z", + "updated_at": "2020-04-06T11:12:16Z", "pushed_at": "2018-09-13T15:59:05Z", - "stargazers_count": 39, - "watchers_count": 39, - "forks_count": 7, - "forks": 7, - "watchers": 39, + "stargazers_count": 40, + "watchers_count": 40, + "forks_count": 8, + "forks": 8, + "watchers": 40, "score": 0 }, { diff --git a/2018/CVE-2018-4407.json b/2018/CVE-2018-4407.json index 4aa8909e00..564897009b 100644 --- a/2018/CVE-2018-4407.json +++ b/2018/CVE-2018-4407.json @@ -13,13 +13,13 @@ "description": "iOS 12 \/ OS X Remote Kernel Heap Overflow (CVE-2018-4407) POC", "fork": false, "created_at": "2018-11-01T08:21:59Z", - "updated_at": "2020-02-07T08:42:03Z", + "updated_at": "2020-04-06T11:00:33Z", "pushed_at": "2018-11-01T08:53:23Z", - "stargazers_count": 58, - "watchers_count": 58, - "forks_count": 13, - "forks": 13, - "watchers": 58, + "stargazers_count": 59, + "watchers_count": 59, + "forks_count": 14, + "forks": 14, + "watchers": 59, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "Crash macOS and iOS devices with one packet", "fork": false, "created_at": "2018-11-01T17:03:25Z", - "updated_at": "2020-01-16T14:01:08Z", + "updated_at": "2020-04-06T10:58:21Z", "pushed_at": "2018-11-15T21:13:37Z", - "stargazers_count": 48, - "watchers_count": 48, - "forks_count": 19, - "forks": 19, - "watchers": 48, + "stargazers_count": 49, + "watchers_count": 49, + "forks_count": 20, + "forks": 20, + "watchers": 49, "score": 0 }, { @@ -174,13 +174,13 @@ "description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]", "fork": false, "created_at": "2018-11-04T01:47:05Z", - "updated_at": "2020-03-13T20:38:19Z", + "updated_at": "2020-04-06T10:57:39Z", "pushed_at": "2018-11-04T02:25:08Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 9, - "forks": 9, - "watchers": 17, + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 10, + "forks": 10, + "watchers": 18, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 5d283f9767..68a9803b4b 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2020-04-06T06:37:34Z", + "updated_at": "2020-04-06T09:57:51Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 221, - "watchers_count": 221, + "stargazers_count": 222, + "watchers_count": 222, "forks_count": 40, "forks": 40, - "watchers": 221, + "watchers": 222, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6981.json b/2018/CVE-2018-6981.json index 47ca698274..bc0976b3bd 100644 --- a/2018/CVE-2018-6981.json +++ b/2018/CVE-2018-6981.json @@ -13,13 +13,13 @@ "description": "Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.", "fork": false, "created_at": "2018-11-13T18:47:37Z", - "updated_at": "2019-11-22T16:53:09Z", + "updated_at": "2020-04-06T10:55:38Z", "pushed_at": "2019-11-22T16:53:07Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 4, - "forks": 4, - "watchers": 6, + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 5, + "forks": 5, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 52ac6f789d..eeb9fb9b16 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -59,13 +59,13 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2020-04-05T18:10:41Z", + "updated_at": "2020-04-06T11:02:45Z", "pushed_at": "2019-03-13T07:11:23Z", - "stargazers_count": 413, - "watchers_count": 413, + "stargazers_count": 414, + "watchers_count": 414, "forks_count": 135, "forks": 135, - "watchers": 413, + "watchers": 414, "score": 0 }, { @@ -243,13 +243,13 @@ "description": "CVE-2018-7600 - Drupal 7.x RCE", "fork": false, "created_at": "2018-04-16T20:16:21Z", - "updated_at": "2020-03-31T09:02:57Z", + "updated_at": "2020-04-06T11:50:49Z", "pushed_at": "2018-04-18T20:34:19Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "forks_count": 31, "forks": 31, - "watchers": 67, + "watchers": 68, "score": 0 }, { @@ -266,13 +266,13 @@ "description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600", "fork": false, "created_at": "2018-04-17T15:38:15Z", - "updated_at": "2020-03-25T15:10:20Z", + "updated_at": "2020-04-06T11:50:29Z", "pushed_at": "2018-04-26T15:40:28Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "forks_count": 27, "forks": 27, - "watchers": 72, + "watchers": 73, "score": 0 }, { diff --git a/2018/CVE-2018-7750.json b/2018/CVE-2018-7750.json index 5c86d9983a..324fcf4762 100644 --- a/2018/CVE-2018-7750.json +++ b/2018/CVE-2018-7750.json @@ -13,13 +13,13 @@ "description": "an RCE (remote command execution) approach of CVE-2018-7750", "fork": false, "created_at": "2018-11-06T10:01:13Z", - "updated_at": "2020-03-02T12:40:24Z", + "updated_at": "2020-04-06T10:57:16Z", "pushed_at": "2018-11-06T10:10:31Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 7, "forks": 7, - "watchers": 16, + "watchers": 17, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8021.json b/2018/CVE-2018-8021.json index 96c4173210..612df2b9bb 100644 --- a/2018/CVE-2018-8021.json +++ b/2018/CVE-2018-8021.json @@ -13,13 +13,13 @@ "description": "CVE-2018-8021 Proof-Of-Concept and Exploit ", "fork": false, "created_at": "2018-12-02T19:01:17Z", - "updated_at": "2020-03-24T08:07:56Z", + "updated_at": "2020-04-06T10:52:40Z", "pushed_at": "2018-12-03T21:13:00Z", - "stargazers_count": 101, - "watchers_count": 101, - "forks_count": 17, - "forks": 17, - "watchers": 101, + "stargazers_count": 102, + "watchers_count": 102, + "forks_count": 18, + "forks": 18, + "watchers": 102, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8420.json b/2018/CVE-2018-8420.json index 5731368af8..76a685a285 100644 --- a/2018/CVE-2018-8420.json +++ b/2018/CVE-2018-8420.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2018-09-12T08:22:54Z", - "updated_at": "2018-12-04T20:00:09Z", + "updated_at": "2020-04-06T11:11:55Z", "pushed_at": "2018-09-12T03:50:14Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 54, "forks": 54, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8453.json b/2018/CVE-2018-8453.json index 92b5269989..f25c6f2ff9 100644 --- a/2018/CVE-2018-8453.json +++ b/2018/CVE-2018-8453.json @@ -36,13 +36,13 @@ "description": "cve-2018-8453 exp", "fork": false, "created_at": "2019-01-18T10:40:03Z", - "updated_at": "2020-03-27T08:37:32Z", + "updated_at": "2020-04-06T14:46:06Z", "pushed_at": "2019-12-13T02:24:39Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "forks_count": 55, "forks": 55, - "watchers": 108, + "watchers": 109, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 14a8ec4083..5e01b0d8f4 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1715,13 +1715,13 @@ "description": "CVE-2019-0708 - BlueKeep (RDP)", "fork": false, "created_at": "2019-05-31T17:37:26Z", - "updated_at": "2020-03-29T04:40:08Z", + "updated_at": "2020-04-06T13:30:22Z", "pushed_at": "2019-06-01T11:07:50Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "forks_count": 10, "forks": 10, - "watchers": 37, + "watchers": 38, "score": 0 }, { @@ -1784,13 +1784,13 @@ "description": "CVE-2019-0708批量检测", "fork": false, "created_at": "2019-06-11T05:38:26Z", - "updated_at": "2019-11-24T16:23:21Z", + "updated_at": "2020-04-06T14:16:41Z", "pushed_at": "2019-06-11T06:40:41Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 1, - "forks": 1, - "watchers": 9, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 2, + "forks": 2, + "watchers": 10, "score": 0 }, { @@ -2037,13 +2037,13 @@ "description": "rce exploit , made to work with pocsuite3", "fork": false, "created_at": "2019-08-17T17:23:53Z", - "updated_at": "2020-04-05T08:09:27Z", + "updated_at": "2020-04-06T10:18:37Z", "pushed_at": "2019-08-19T02:52:11Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 102, + "watchers_count": 102, "forks_count": 52, "forks": 52, - "watchers": 103, + "watchers": 102, "score": 0 }, { diff --git a/2019/CVE-2019-1003000.json b/2019/CVE-2019-1003000.json index 70ef280024..dde1d5b192 100644 --- a/2019/CVE-2019-1003000.json +++ b/2019/CVE-2019-1003000.json @@ -36,13 +36,13 @@ "description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)", "fork": false, "created_at": "2019-02-15T05:59:24Z", - "updated_at": "2020-04-01T09:30:39Z", + "updated_at": "2020-04-06T10:45:50Z", "pushed_at": "2019-04-01T13:19:49Z", - "stargazers_count": 248, - "watchers_count": 248, + "stargazers_count": 249, + "watchers_count": 249, "forks_count": 72, "forks": 72, - "watchers": 248, + "watchers": 249, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ", "fork": false, "created_at": "2019-02-23T10:00:03Z", - "updated_at": "2020-03-13T16:16:07Z", + "updated_at": "2020-04-06T10:44:19Z", "pushed_at": "2019-02-23T10:01:26Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 3, - "forks": 3, - "watchers": 5, + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 4, + "forks": 4, + "watchers": 6, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 5e6317ab1a..38a4b90e2f 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,7 +13,7 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2020-04-05T17:55:14Z", + "updated_at": "2020-04-06T13:06:25Z", "pushed_at": "2019-11-12T18:53:14Z", "stargazers_count": 1554, "watchers_count": 1554, diff --git a/2019/CVE-2019-1125.json b/2019/CVE-2019-1125.json index 67d700b423..1730bdc2ae 100644 --- a/2019/CVE-2019-1125.json +++ b/2019/CVE-2019-1125.json @@ -13,13 +13,13 @@ "description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)", "fork": false, "created_at": "2020-01-27T12:27:53Z", - "updated_at": "2020-03-10T18:19:51Z", + "updated_at": "2020-04-06T10:09:06Z", "pushed_at": "2020-01-27T12:32:04Z", - "stargazers_count": 31, - "watchers_count": 31, - "forks_count": 6, - "forks": 6, - "watchers": 31, + "stargazers_count": 32, + "watchers_count": 32, + "forks_count": 7, + "forks": 7, + "watchers": 32, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index 63d5ab6d7c..7c203c8ba2 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -59,13 +59,13 @@ "description": "Pulse Secure SSL VPN pre-auth file reading", "fork": false, "created_at": "2019-08-22T08:18:19Z", - "updated_at": "2020-04-05T17:56:54Z", + "updated_at": "2020-04-06T11:33:57Z", "pushed_at": "2019-08-26T19:33:43Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "forks_count": 15, "forks": 15, - "watchers": 40, + "watchers": 41, "score": 0 }, { diff --git a/2019/CVE-2019-12384.json b/2019/CVE-2019-12384.json index b058d7b64c..c9a690034e 100644 --- a/2019/CVE-2019-12384.json +++ b/2019/CVE-2019-12384.json @@ -13,13 +13,13 @@ "description": "Jackson Rce For CVE-2019-12384 ", "fork": false, "created_at": "2019-07-24T07:12:14Z", - "updated_at": "2020-03-20T06:34:40Z", + "updated_at": "2020-04-06T10:20:12Z", "pushed_at": "2019-07-24T07:31:42Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 12, "forks": 12, - "watchers": 52, + "watchers": 53, "score": 0 }, { diff --git a/2019/CVE-2019-17570.json b/2019/CVE-2019-17570.json index 501bd85a69..07f4789e70 100644 --- a/2019/CVE-2019-17570.json +++ b/2019/CVE-2019-17570.json @@ -36,13 +36,13 @@ "description": "CVE-2019-17570 details and proof of concept", "fork": false, "created_at": "2020-01-24T11:32:18Z", - "updated_at": "2020-04-05T19:54:57Z", + "updated_at": "2020-04-06T10:09:43Z", "pushed_at": "2020-01-31T15:33:06Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 59, + "watchers_count": 59, "forks_count": 6, "forks": 6, - "watchers": 58, + "watchers": 59, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-18371.json b/2019/CVE-2019-18371.json index c8f30c67a2..e664d7191f 100644 --- a/2019/CVE-2019-18371.json +++ b/2019/CVE-2019-18371.json @@ -13,13 +13,13 @@ "description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.", "fork": false, "created_at": "2019-08-30T16:32:13Z", - "updated_at": "2020-04-05T16:35:43Z", + "updated_at": "2020-04-06T09:50:29Z", "pushed_at": "2020-01-12T02:34:45Z", - "stargazers_count": 119, - "watchers_count": 119, + "stargazers_count": 120, + "watchers_count": 120, "forks_count": 18, "forks": 18, - "watchers": 119, + "watchers": 120, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-18890.json b/2019/CVE-2019-18890.json index 21ca64b578..8a1a2053b8 100644 --- a/2019/CVE-2019-18890.json +++ b/2019/CVE-2019-18890.json @@ -13,13 +13,13 @@ "description": "CVE-2019-18890 POC (Proof of Concept)", "fork": false, "created_at": "2020-01-02T11:44:47Z", - "updated_at": "2020-03-05T11:44:48Z", + "updated_at": "2020-04-06T10:10:24Z", "pushed_at": "2020-01-06T13:13:58Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 2, + "forks": 2, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5010.json b/2019/CVE-2019-5010.json index ac5b699427..f8970508ae 100644 --- a/2019/CVE-2019-5010.json +++ b/2019/CVE-2019-5010.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2019-11-06T07:26:43Z", "updated_at": "2019-11-06T07:27:36Z", - "pushed_at": "2019-11-06T07:26:58Z", + "pushed_at": "2020-04-06T13:50:28Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2019/CVE-2019-5418.json b/2019/CVE-2019-5418.json index d11a8f6d56..73459f84c4 100644 --- a/2019/CVE-2019-5418.json +++ b/2019/CVE-2019-5418.json @@ -13,13 +13,13 @@ "description": "CVE-2019-5418 - File Content Disclosure on Ruby on Rails", "fork": false, "created_at": "2019-03-16T11:58:18Z", - "updated_at": "2020-04-05T17:18:34Z", + "updated_at": "2020-04-06T14:36:18Z", "pushed_at": "2019-03-25T07:19:58Z", - "stargazers_count": 153, - "watchers_count": 153, + "stargazers_count": 154, + "watchers_count": 154, "forks_count": 14, "forks": 14, - "watchers": 153, + "watchers": 154, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)", "fork": false, "created_at": "2019-03-23T02:52:31Z", - "updated_at": "2020-04-05T17:16:13Z", + "updated_at": "2020-04-06T14:22:31Z", "pushed_at": "2020-03-04T19:05:08Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "forks_count": 18, "forks": 18, - "watchers": 98, + "watchers": 99, "score": 0 }, { diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 926efbcb04..9e4010ce28 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -13,13 +13,13 @@ "description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)", "fork": false, "created_at": "2019-02-12T22:07:47Z", - "updated_at": "2020-03-25T00:44:45Z", + "updated_at": "2020-04-06T10:46:09Z", "pushed_at": "2019-02-20T15:35:34Z", - "stargazers_count": 178, - "watchers_count": 178, + "stargazers_count": 179, + "watchers_count": 179, "forks_count": 61, "forks": 61, - "watchers": 178, + "watchers": 179, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2020-03-30T02:59:30Z", + "updated_at": "2020-04-06T10:44:28Z", "pushed_at": "2019-02-19T11:45:13Z", - "stargazers_count": 381, - "watchers_count": 381, - "forks_count": 92, - "forks": 92, - "watchers": 381, + "stargazers_count": 382, + "watchers_count": 382, + "forks_count": 93, + "forks": 93, + "watchers": 382, "score": 0 }, { diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json index 37838fc829..c3fe006e4e 100644 --- a/2019/CVE-2019-7304.json +++ b/2019/CVE-2019-7304.json @@ -13,13 +13,13 @@ "description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)", "fork": false, "created_at": "2019-02-12T06:02:06Z", - "updated_at": "2020-03-24T13:33:25Z", + "updated_at": "2020-04-06T10:45:56Z", "pushed_at": "2019-05-09T21:34:26Z", - "stargazers_count": 506, - "watchers_count": 506, - "forks_count": 103, - "forks": 103, - "watchers": 506, + "stargazers_count": 507, + "watchers_count": 507, + "forks_count": 104, + "forks": 104, + "watchers": 507, "score": 0 }, { diff --git a/2019/CVE-2019-8449.json b/2019/CVE-2019-8449.json index 73037ce819..584c0c47d0 100644 --- a/2019/CVE-2019-8449.json +++ b/2019/CVE-2019-8449.json @@ -13,13 +13,13 @@ "description": "CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4", "fork": false, "created_at": "2020-02-02T16:42:32Z", - "updated_at": "2020-03-28T08:30:17Z", + "updated_at": "2020-04-06T10:08:38Z", "pushed_at": "2020-02-03T15:11:25Z", - "stargazers_count": 58, - "watchers_count": 58, - "forks_count": 11, - "forks": 11, - "watchers": 58, + "stargazers_count": 59, + "watchers_count": 59, + "forks_count": 12, + "forks": 12, + "watchers": 59, "score": 0 }, { diff --git a/2019/CVE-2019-9729.json b/2019/CVE-2019-9729.json index 08e4cc000c..f8919dd3b3 100644 --- a/2019/CVE-2019-9729.json +++ b/2019/CVE-2019-9729.json @@ -13,13 +13,13 @@ "description": "CVE-2019-9729. Transferred from https:\/\/github.com\/DoubleLabyrinth\/SdoKeyCrypt-sys-local-privilege-elevation", "fork": false, "created_at": "2019-03-12T14:18:20Z", - "updated_at": "2020-03-31T05:49:11Z", + "updated_at": "2020-04-06T10:42:27Z", "pushed_at": "2019-03-13T01:24:21Z", - "stargazers_count": 77, - "watchers_count": 77, - "forks_count": 25, - "forks": 25, - "watchers": 77, + "stargazers_count": 78, + "watchers_count": 78, + "forks_count": 26, + "forks": 26, + "watchers": 78, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-9810.json b/2019/CVE-2019-9810.json index b94e201583..54cc71d891 100644 --- a/2019/CVE-2019-9810.json +++ b/2019/CVE-2019-9810.json @@ -13,13 +13,13 @@ "description": "Array.prototype.slice wrong alias information.", "fork": false, "created_at": "2019-03-25T02:33:18Z", - "updated_at": "2020-02-16T05:56:49Z", + "updated_at": "2020-04-06T10:41:03Z", "pushed_at": "2019-03-25T02:41:43Z", - "stargazers_count": 68, - "watchers_count": 68, - "forks_count": 15, - "forks": 15, - "watchers": 68, + "stargazers_count": 69, + "watchers_count": 69, + "forks_count": 16, + "forks": 16, + "watchers": 69, "score": 0 }, { diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json index e67f51f058..d5bb950cc6 100644 --- a/2020/CVE-2020-0069.json +++ b/2020/CVE-2020-0069.json @@ -86,8 +86,8 @@ "pushed_at": "2020-03-24T13:19:34Z", "stargazers_count": 52, "watchers_count": 52, - "forks_count": 13, - "forks": 13, + "forks_count": 14, + "forks": 14, "watchers": 52, "score": 0 } diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index c4672341c9..f6df3d7880 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -450,13 +450,13 @@ "description": "CVE-2020-0601 #curveball - Alternative Key Calculator", "fork": false, "created_at": "2020-01-20T16:24:20Z", - "updated_at": "2020-03-16T13:01:09Z", + "updated_at": "2020-04-06T12:31:24Z", "pushed_at": "2020-01-20T23:00:14Z", - "stargazers_count": 60, - "watchers_count": 60, - "forks_count": 8, - "forks": 8, - "watchers": 60, + "stargazers_count": 61, + "watchers_count": 61, + "forks_count": 9, + "forks": 9, + "watchers": 61, "score": 0 }, { diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index e4ff29eb86..5111f1085b 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -59,7 +59,7 @@ "description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.", "fork": false, "created_at": "2020-01-24T03:52:49Z", - "updated_at": "2020-04-02T07:06:28Z", + "updated_at": "2020-04-06T10:09:37Z", "pushed_at": "2020-01-26T21:04:27Z", "stargazers_count": 66, "watchers_count": 66, diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index a49fb5a8ce..c20d77b3e0 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -59,13 +59,13 @@ "description": "cve-2020-0688", "fork": false, "created_at": "2020-02-27T02:54:27Z", - "updated_at": "2020-04-02T18:44:05Z", + "updated_at": "2020-04-06T13:07:31Z", "pushed_at": "2020-02-27T02:54:58Z", - "stargazers_count": 168, - "watchers_count": 168, + "stargazers_count": 169, + "watchers_count": 169, "forks_count": 61, "forks": 61, - "watchers": 168, + "watchers": 169, "score": 0 }, { @@ -197,13 +197,13 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2020-04-06T08:48:26Z", + "updated_at": "2020-04-06T10:06:02Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 139, - "watchers_count": 139, + "stargazers_count": 140, + "watchers_count": 140, "forks_count": 42, "forks": 42, - "watchers": 139, + "watchers": 140, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 8cfd7db127..08a22de815 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -151,13 +151,13 @@ "description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"", "fork": false, "created_at": "2020-03-11T17:51:29Z", - "updated_at": "2020-03-26T13:57:24Z", + "updated_at": "2020-04-06T12:28:26Z", "pushed_at": "2020-03-16T17:25:51Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 3, "forks": 3, - "watchers": 14, + "watchers": 15, "score": 0 }, { @@ -979,13 +979,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2020-04-06T08:09:45Z", + "updated_at": "2020-04-06T13:11:28Z", "pushed_at": "2020-04-03T13:31:54Z", - "stargazers_count": 770, - "watchers_count": 770, - "forks_count": 206, - "forks": 206, - "watchers": 770, + "stargazers_count": 773, + "watchers_count": 773, + "forks_count": 209, + "forks": 209, + "watchers": 773, "score": 0 }, { @@ -1002,13 +1002,13 @@ "description": "CVE-2020-0796 Local Privilege Escalation POC", "fork": false, "created_at": "2020-03-30T16:06:50Z", - "updated_at": "2020-04-05T14:38:54Z", + "updated_at": "2020-04-06T10:52:58Z", "pushed_at": "2020-04-02T08:01:38Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "forks_count": 36, "forks": 36, - "watchers": 117, + "watchers": 118, "score": 0 }, { @@ -1094,13 +1094,13 @@ "description": null, "fork": false, "created_at": "2020-04-01T01:46:08Z", - "updated_at": "2020-04-02T13:41:03Z", + "updated_at": "2020-04-06T12:28:41Z", "pushed_at": "2020-04-01T01:46:17Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "forks_count": 6, "forks": 6, - "watchers": 18, + "watchers": 19, "score": 0 }, { @@ -1140,8 +1140,8 @@ "description": "该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~", "fork": false, "created_at": "2020-04-02T12:12:03Z", - "updated_at": "2020-04-03T04:36:47Z", - "pushed_at": "2020-04-03T04:36:45Z", + "updated_at": "2020-04-06T13:41:30Z", + "pushed_at": "2020-04-06T13:41:28Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 81823f36a9..dfe6e58ef2 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1938", "fork": false, "created_at": "2020-02-20T16:32:52Z", - "updated_at": "2020-03-31T09:43:42Z", + "updated_at": "2020-04-06T10:06:40Z", "pushed_at": "2020-02-25T02:04:16Z", - "stargazers_count": 145, - "watchers_count": 145, + "stargazers_count": 146, + "watchers_count": 146, "forks_count": 82, "forks": 82, - "watchers": 145, + "watchers": 146, "score": 0 }, { @@ -450,13 +450,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,尽力补全所有脚本文件的使用说明文档,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-04-05T11:28:09Z", + "updated_at": "2020-04-06T14:55:19Z", "pushed_at": "2020-04-05T10:36:55Z", - "stargazers_count": 35, - "watchers_count": 35, - "forks_count": 5, - "forks": 5, - "watchers": 35, + "stargazers_count": 37, + "watchers_count": 37, + "forks_count": 6, + "forks": 6, + "watchers": 37, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 46dcc02298..38a75786f5 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -136,5 +136,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 253468631, + "name": "CVE-2020-2551", + "full_name": "cnsimo\/CVE-2020-2551", + "owner": { + "login": "cnsimo", + "id": 22788893, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22788893?v=4", + "html_url": "https:\/\/github.com\/cnsimo" + }, + "html_url": "https:\/\/github.com\/cnsimo\/CVE-2020-2551", + "description": "Use shell to build weblogic debug environment for CVE-2020-2551", + "fork": false, + "created_at": "2020-04-06T10:47:35Z", + "updated_at": "2020-04-06T11:01:11Z", + "pushed_at": "2020-04-06T10:59:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9380.json b/2020/CVE-2020-9380.json index 0c6ff0f166..68c9e2650b 100644 --- a/2020/CVE-2020-9380.json +++ b/2020/CVE-2020-9380.json @@ -13,13 +13,13 @@ "description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7", "fork": false, "created_at": "2020-02-19T02:29:14Z", - "updated_at": "2020-03-22T13:20:43Z", + "updated_at": "2020-04-06T12:29:09Z", "pushed_at": "2020-03-12T02:25:31Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 6, - "forks": 6, - "watchers": 7, + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 7, + "forks": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 2ecc3578b3..91eca0b4a5 100644 --- a/README.md +++ b/README.md @@ -348,6 +348,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [0nise/CVE-2020-2551](https://github.com/0nise/CVE-2020-2551) - [Y4er/CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551) - [Gspider7/rmi-iiop](https://github.com/Gspider7/rmi-iiop) +- [cnsimo/CVE-2020-2551](https://github.com/cnsimo/CVE-2020-2551) ### CVE-2020-2555