diff --git a/2002/CVE-2002-0200.json b/2002/CVE-2002-0200.json deleted file mode 100644 index 627ca71568..0000000000 --- a/2002/CVE-2002-0200.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 133421791, - "name": "CVE-2002-0200", - "full_name": "alt3kx\/CVE-2002-0200", - "owner": { - "login": "alt3kx", - "id": 3140111, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" - }, - "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0200", - "description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.", - "fork": false, - "created_at": "2018-05-14T21:09:20Z", - "updated_at": "2018-05-14T21:49:15Z", - "pushed_at": "2018-05-14T21:49:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index f53451785a..41cfa692ff 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-08-15T10:41:28Z", + "updated_at": "2020-08-16T00:36:16Z", "pushed_at": "2020-07-30T05:31:08Z", - "stargazers_count": 639, - "watchers_count": 639, + "stargazers_count": 640, + "watchers_count": 640, "forks_count": 152, "forks": 152, - "watchers": 639, + "watchers": 640, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index d72af65d5a..142cff735b 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-08-15T10:41:28Z", + "updated_at": "2020-08-16T00:36:16Z", "pushed_at": "2020-07-30T05:31:08Z", - "stargazers_count": 639, - "watchers_count": 639, + "stargazers_count": 640, + "watchers_count": 640, "forks_count": 152, "forks": 152, - "watchers": 639, + "watchers": 640, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 7928b2bbb1..3d4873f7e2 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-08-15T10:41:28Z", + "updated_at": "2020-08-16T00:36:16Z", "pushed_at": "2020-07-30T05:31:08Z", - "stargazers_count": 639, - "watchers_count": 639, + "stargazers_count": 640, + "watchers_count": 640, "forks_count": 152, "forks": 152, - "watchers": 639, + "watchers": 640, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index bdc3342d46..f585cec174 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-08-15T10:41:28Z", + "updated_at": "2020-08-16T00:36:16Z", "pushed_at": "2020-07-30T05:31:08Z", - "stargazers_count": 639, - "watchers_count": 639, + "stargazers_count": 640, + "watchers_count": 640, "forks_count": 152, "forks": 152, - "watchers": 639, + "watchers": 640, "score": 0 }, { diff --git a/2019/CVE-2019-0230.json b/2019/CVE-2019-0230.json index a7c489f6e3..d46df186f4 100644 --- a/2019/CVE-2019-0230.json +++ b/2019/CVE-2019-0230.json @@ -17,8 +17,8 @@ "pushed_at": "2020-08-13T13:25:54Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 8, + "forks": 8, "watchers": 0, "score": 0 } diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 3b5eef3b4e..83a28ff3d7 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -63,8 +63,8 @@ "pushed_at": "2019-11-30T10:28:01Z", "stargazers_count": 123, "watchers_count": 123, - "forks_count": 67, - "forks": 67, + "forks_count": 68, + "forks": 68, "watchers": 123, "score": 0 }, diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json index b57f58c7fe..b36b169bb6 100644 --- a/2019/CVE-2019-15126.json +++ b/2019/CVE-2019-15126.json @@ -36,13 +36,13 @@ "description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability", "fork": false, "created_at": "2020-03-13T14:53:54Z", - "updated_at": "2020-08-12T19:13:39Z", + "updated_at": "2020-08-16T00:29:03Z", "pushed_at": "2020-03-22T19:46:04Z", - "stargazers_count": 166, - "watchers_count": 166, + "stargazers_count": 167, + "watchers_count": 167, "forks_count": 52, "forks": 52, - "watchers": 166, + "watchers": 167, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 5f038cb3da..0249d00fea 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-08-15T10:41:28Z", + "updated_at": "2020-08-16T00:36:16Z", "pushed_at": "2020-07-30T05:31:08Z", - "stargazers_count": 639, - "watchers_count": 639, + "stargazers_count": 640, + "watchers_count": 640, "forks_count": 152, "forks": 152, - "watchers": 639, + "watchers": 640, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 75b7181669..ebbf8accda 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1094,13 +1094,13 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2020-08-12T11:28:10Z", + "updated_at": "2020-08-16T00:00:36Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 304, - "watchers_count": 304, + "stargazers_count": 305, + "watchers_count": 305, "forks_count": 98, "forks": 98, - "watchers": 304, + "watchers": 305, "score": 0 }, { @@ -1351,8 +1351,8 @@ "pushed_at": "2020-06-19T20:58:36Z", "stargazers_count": 18, "watchers_count": 18, - "forks_count": 5, - "forks": 5, + "forks_count": 6, + "forks": 6, "watchers": 18, "score": 0 }, diff --git a/2020/CVE-2020-11108.json b/2020/CVE-2020-11108.json index 8db164924e..af4d24e93f 100644 --- a/2020/CVE-2020-11108.json +++ b/2020/CVE-2020-11108.json @@ -13,13 +13,13 @@ "description": "PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole", "fork": false, "created_at": "2020-04-04T00:50:42Z", - "updated_at": "2020-08-12T16:27:01Z", + "updated_at": "2020-08-16T02:11:52Z", "pushed_at": "2020-05-10T22:35:46Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 6, "forks": 6, - "watchers": 19, + "watchers": 20, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1337.json b/2020/CVE-2020-1337.json index 08fd2769b7..b8aa994ba7 100644 --- a/2020/CVE-2020-1337.json +++ b/2020/CVE-2020-1337.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation", "fork": false, "created_at": "2020-07-21T08:01:20Z", - "updated_at": "2020-08-15T18:45:27Z", + "updated_at": "2020-08-15T23:59:58Z", "pushed_at": "2020-07-21T10:28:42Z", - "stargazers_count": 111, - "watchers_count": 111, - "forks_count": 18, - "forks": 18, - "watchers": 111, + "stargazers_count": 112, + "watchers_count": 112, + "forks_count": 19, + "forks": 19, + "watchers": 112, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)", "fork": false, "created_at": "2020-08-12T10:05:36Z", - "updated_at": "2020-08-15T03:55:19Z", + "updated_at": "2020-08-16T01:47:02Z", "pushed_at": "2020-08-13T07:16:12Z", - "stargazers_count": 96, - "watchers_count": 96, + "stargazers_count": 97, + "watchers_count": 97, "forks_count": 24, "forks": 24, - "watchers": 96, + "watchers": 97, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-13886.json b/2020/CVE-2020-13886.json index b6802b49bf..bd78b7cfc8 100644 --- a/2020/CVE-2020-13886.json +++ b/2020/CVE-2020-13886.json @@ -17,8 +17,8 @@ "pushed_at": "2020-08-04T20:14:54Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 3, "score": 0 } diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index e51b61b501..2a9015e5c7 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-08-15T10:41:28Z", + "updated_at": "2020-08-16T00:36:16Z", "pushed_at": "2020-07-30T05:31:08Z", - "stargazers_count": 639, - "watchers_count": 639, + "stargazers_count": 640, + "watchers_count": 640, "forks_count": 152, "forks": 152, - "watchers": 639, + "watchers": 640, "score": 0 }, { diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json index d8a8686b6a..23b1f5bb7f 100644 --- a/2020/CVE-2020-6287.json +++ b/2020/CVE-2020-6287.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)", "fork": false, "created_at": "2020-07-15T15:20:09Z", - "updated_at": "2020-08-14T02:54:47Z", + "updated_at": "2020-08-16T02:14:08Z", "pushed_at": "2020-07-23T19:45:25Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "forks_count": 38, "forks": 38, - "watchers": 114, + "watchers": 115, "score": 0 }, { diff --git a/2020/CVE-2020-7661.json b/2020/CVE-2020-7661.json index b49af9a0be..2c654c0147 100644 --- a/2020/CVE-2020-7661.json +++ b/2020/CVE-2020-7661.json @@ -13,13 +13,13 @@ "description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.", "fork": false, "created_at": "2020-08-15T07:42:50Z", - "updated_at": "2020-08-15T17:44:14Z", + "updated_at": "2020-08-15T21:49:19Z", "pushed_at": "2020-08-15T10:17:21Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8816.json b/2020/CVE-2020-8816.json index 4628dd816a..7045faf4f6 100644 --- a/2020/CVE-2020-8816.json +++ b/2020/CVE-2020-8816.json @@ -59,13 +59,13 @@ "description": "Pi-hole Remote Code Execution authenticated Version >= 4.3.2", "fork": false, "created_at": "2020-08-04T10:23:28Z", - "updated_at": "2020-08-14T19:08:37Z", + "updated_at": "2020-08-16T02:14:30Z", "pushed_at": "2020-08-05T22:38:53Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 1, "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2020/CVE-2020-9496.json b/2020/CVE-2020-9496.json index 7bf354355d..e32b73709b 100644 --- a/2020/CVE-2020-9496.json +++ b/2020/CVE-2020-9496.json @@ -13,8 +13,8 @@ "description": null, "fork": false, "created_at": "2020-08-15T14:29:49Z", - "updated_at": "2020-08-15T14:50:55Z", - "pushed_at": "2020-08-15T14:50:53Z", + "updated_at": "2020-08-16T01:04:03Z", + "pushed_at": "2020-08-16T01:04:01Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/README.md b/README.md index dd0649d846..ab053bec65 100644 --- a/README.md +++ b/README.md @@ -14766,14 +14766,6 @@ Directory traversal vulnerability in UnZip 5.50 allows attackers to overwrite ar ## 2002 -### CVE-2002-0200 - - -Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name. - - -- [alt3kx/CVE-2002-0200](https://github.com/alt3kx/CVE-2002-0200) - ### CVE-2002-0201