diff --git a/2002/CVE-2002-0200.json b/2002/CVE-2002-0200.json
deleted file mode 100644
index 627ca71568..0000000000
--- a/2002/CVE-2002-0200.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
- {
- "id": 133421791,
- "name": "CVE-2002-0200",
- "full_name": "alt3kx\/CVE-2002-0200",
- "owner": {
- "login": "alt3kx",
- "id": 3140111,
- "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
- "html_url": "https:\/\/github.com\/alt3kx"
- },
- "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0200",
- "description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.",
- "fork": false,
- "created_at": "2018-05-14T21:09:20Z",
- "updated_at": "2018-05-14T21:49:15Z",
- "pushed_at": "2018-05-14T21:49:14Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index f53451785a..41cfa692ff 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-08-15T10:41:28Z",
+ "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z",
- "stargazers_count": 639,
- "watchers_count": 639,
+ "stargazers_count": 640,
+ "watchers_count": 640,
"forks_count": 152,
"forks": 152,
- "watchers": 639,
+ "watchers": 640,
"score": 0
},
{
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index d72af65d5a..142cff735b 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-08-15T10:41:28Z",
+ "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z",
- "stargazers_count": 639,
- "watchers_count": 639,
+ "stargazers_count": 640,
+ "watchers_count": 640,
"forks_count": 152,
"forks": 152,
- "watchers": 639,
+ "watchers": 640,
"score": 0
},
{
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 7928b2bbb1..3d4873f7e2 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-08-15T10:41:28Z",
+ "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z",
- "stargazers_count": 639,
- "watchers_count": 639,
+ "stargazers_count": 640,
+ "watchers_count": 640,
"forks_count": 152,
"forks": 152,
- "watchers": 639,
+ "watchers": 640,
"score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index bdc3342d46..f585cec174 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-08-15T10:41:28Z",
+ "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z",
- "stargazers_count": 639,
- "watchers_count": 639,
+ "stargazers_count": 640,
+ "watchers_count": 640,
"forks_count": 152,
"forks": 152,
- "watchers": 639,
+ "watchers": 640,
"score": 0
},
{
diff --git a/2019/CVE-2019-0230.json b/2019/CVE-2019-0230.json
index a7c489f6e3..d46df186f4 100644
--- a/2019/CVE-2019-0230.json
+++ b/2019/CVE-2019-0230.json
@@ -17,8 +17,8 @@
"pushed_at": "2020-08-13T13:25:54Z",
"stargazers_count": 0,
"watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
+ "forks_count": 8,
+ "forks": 8,
"watchers": 0,
"score": 0
}
diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json
index 3b5eef3b4e..83a28ff3d7 100644
--- a/2019/CVE-2019-11932.json
+++ b/2019/CVE-2019-11932.json
@@ -63,8 +63,8 @@
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 123,
"watchers_count": 123,
- "forks_count": 67,
- "forks": 67,
+ "forks_count": 68,
+ "forks": 68,
"watchers": 123,
"score": 0
},
diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json
index b57f58c7fe..b36b169bb6 100644
--- a/2019/CVE-2019-15126.json
+++ b/2019/CVE-2019-15126.json
@@ -36,13 +36,13 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
- "updated_at": "2020-08-12T19:13:39Z",
+ "updated_at": "2020-08-16T00:29:03Z",
"pushed_at": "2020-03-22T19:46:04Z",
- "stargazers_count": 166,
- "watchers_count": 166,
+ "stargazers_count": 167,
+ "watchers_count": 167,
"forks_count": 52,
"forks": 52,
- "watchers": 166,
+ "watchers": 167,
"score": 0
},
{
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 5f038cb3da..0249d00fea 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-08-15T10:41:28Z",
+ "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z",
- "stargazers_count": 639,
- "watchers_count": 639,
+ "stargazers_count": 640,
+ "watchers_count": 640,
"forks_count": 152,
"forks": 152,
- "watchers": 639,
+ "watchers": 640,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index 75b7181669..ebbf8accda 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -1094,13 +1094,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
- "updated_at": "2020-08-12T11:28:10Z",
+ "updated_at": "2020-08-16T00:00:36Z",
"pushed_at": "2020-06-09T20:46:45Z",
- "stargazers_count": 304,
- "watchers_count": 304,
+ "stargazers_count": 305,
+ "watchers_count": 305,
"forks_count": 98,
"forks": 98,
- "watchers": 304,
+ "watchers": 305,
"score": 0
},
{
@@ -1351,8 +1351,8 @@
"pushed_at": "2020-06-19T20:58:36Z",
"stargazers_count": 18,
"watchers_count": 18,
- "forks_count": 5,
- "forks": 5,
+ "forks_count": 6,
+ "forks": 6,
"watchers": 18,
"score": 0
},
diff --git a/2020/CVE-2020-11108.json b/2020/CVE-2020-11108.json
index 8db164924e..af4d24e93f 100644
--- a/2020/CVE-2020-11108.json
+++ b/2020/CVE-2020-11108.json
@@ -13,13 +13,13 @@
"description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole",
"fork": false,
"created_at": "2020-04-04T00:50:42Z",
- "updated_at": "2020-08-12T16:27:01Z",
+ "updated_at": "2020-08-16T02:11:52Z",
"pushed_at": "2020-05-10T22:35:46Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"forks_count": 6,
"forks": 6,
- "watchers": 19,
+ "watchers": 20,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-1337.json b/2020/CVE-2020-1337.json
index 08fd2769b7..b8aa994ba7 100644
--- a/2020/CVE-2020-1337.json
+++ b/2020/CVE-2020-1337.json
@@ -13,13 +13,13 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false,
"created_at": "2020-07-21T08:01:20Z",
- "updated_at": "2020-08-15T18:45:27Z",
+ "updated_at": "2020-08-15T23:59:58Z",
"pushed_at": "2020-07-21T10:28:42Z",
- "stargazers_count": 111,
- "watchers_count": 111,
- "forks_count": 18,
- "forks": 18,
- "watchers": 111,
+ "stargazers_count": 112,
+ "watchers_count": 112,
+ "forks_count": 19,
+ "forks": 19,
+ "watchers": 112,
"score": 0
},
{
@@ -82,13 +82,13 @@
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false,
"created_at": "2020-08-12T10:05:36Z",
- "updated_at": "2020-08-15T03:55:19Z",
+ "updated_at": "2020-08-16T01:47:02Z",
"pushed_at": "2020-08-13T07:16:12Z",
- "stargazers_count": 96,
- "watchers_count": 96,
+ "stargazers_count": 97,
+ "watchers_count": 97,
"forks_count": 24,
"forks": 24,
- "watchers": 96,
+ "watchers": 97,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-13886.json b/2020/CVE-2020-13886.json
index b6802b49bf..bd78b7cfc8 100644
--- a/2020/CVE-2020-13886.json
+++ b/2020/CVE-2020-13886.json
@@ -17,8 +17,8 @@
"pushed_at": "2020-08-04T20:14:54Z",
"stargazers_count": 3,
"watchers_count": 3,
- "forks_count": 0,
- "forks": 0,
+ "forks_count": 1,
+ "forks": 1,
"watchers": 3,
"score": 0
}
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index e51b61b501..2a9015e5c7 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-08-15T10:41:28Z",
+ "updated_at": "2020-08-16T00:36:16Z",
"pushed_at": "2020-07-30T05:31:08Z",
- "stargazers_count": 639,
- "watchers_count": 639,
+ "stargazers_count": 640,
+ "watchers_count": 640,
"forks_count": 152,
"forks": 152,
- "watchers": 639,
+ "watchers": 640,
"score": 0
},
{
diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json
index d8a8686b6a..23b1f5bb7f 100644
--- a/2020/CVE-2020-6287.json
+++ b/2020/CVE-2020-6287.json
@@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
- "updated_at": "2020-08-14T02:54:47Z",
+ "updated_at": "2020-08-16T02:14:08Z",
"pushed_at": "2020-07-23T19:45:25Z",
- "stargazers_count": 114,
- "watchers_count": 114,
+ "stargazers_count": 115,
+ "watchers_count": 115,
"forks_count": 38,
"forks": 38,
- "watchers": 114,
+ "watchers": 115,
"score": 0
},
{
diff --git a/2020/CVE-2020-7661.json b/2020/CVE-2020-7661.json
index b49af9a0be..2c654c0147 100644
--- a/2020/CVE-2020-7661.json
+++ b/2020/CVE-2020-7661.json
@@ -13,13 +13,13 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
- "updated_at": "2020-08-15T17:44:14Z",
+ "updated_at": "2020-08-15T21:49:19Z",
"pushed_at": "2020-08-15T10:17:21Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"forks_count": 0,
"forks": 0,
- "watchers": 3,
+ "watchers": 4,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-8816.json b/2020/CVE-2020-8816.json
index 4628dd816a..7045faf4f6 100644
--- a/2020/CVE-2020-8816.json
+++ b/2020/CVE-2020-8816.json
@@ -59,13 +59,13 @@
"description": "Pi-hole Remote Code Execution authenticated Version >= 4.3.2",
"fork": false,
"created_at": "2020-08-04T10:23:28Z",
- "updated_at": "2020-08-14T19:08:37Z",
+ "updated_at": "2020-08-16T02:14:30Z",
"pushed_at": "2020-08-05T22:38:53Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 1,
"forks": 1,
- "watchers": 7,
+ "watchers": 8,
"score": 0
},
{
diff --git a/2020/CVE-2020-9496.json b/2020/CVE-2020-9496.json
index 7bf354355d..e32b73709b 100644
--- a/2020/CVE-2020-9496.json
+++ b/2020/CVE-2020-9496.json
@@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2020-08-15T14:29:49Z",
- "updated_at": "2020-08-15T14:50:55Z",
- "pushed_at": "2020-08-15T14:50:53Z",
+ "updated_at": "2020-08-16T01:04:03Z",
+ "pushed_at": "2020-08-16T01:04:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/README.md b/README.md
index dd0649d846..ab053bec65 100644
--- a/README.md
+++ b/README.md
@@ -14766,14 +14766,6 @@ Directory traversal vulnerability in UnZip 5.50 allows attackers to overwrite ar
## 2002
-### CVE-2002-0200
-
-
-Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.
-
-
-- [alt3kx/CVE-2002-0200](https://github.com/alt3kx/CVE-2002-0200)
-
### CVE-2002-0201