From 75f93bb4adc6cc74fac720c6fb4187b4190776c6 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 2 Mar 2020 00:08:02 +0900 Subject: [PATCH] Auto Update 2020/03/02 00:08:02 --- 2011/CVE-2011-1473.json | 23 ++++++++++++++ 2011/CVE-2011-4862.json | 46 +++++++++++++++++++++++++++ 2014/CVE-2014-4210.json | 8 ++--- 2016/CVE-2016-0638.json | 8 ++--- 2016/CVE-2016-1287.json | 4 +-- 2016/CVE-2016-2569.json | 8 ++--- 2016/CVE-2016-6366.json | 4 +-- 2017/CVE-2017-15303.json | 8 ++--- 2017/CVE-2017-3248.json | 8 ++--- 2017/CVE-2017-5753.json | 8 ++--- 2018/CVE-2018-19131.json | 8 ++--- 2018/CVE-2018-2628.json | 8 ++--- 2018/CVE-2018-8897.json | 8 ++--- 2019/CVE-2019-0708.json | 8 ++--- 2019/CVE-2019-19781.json | 8 ++--- 2019/CVE-2019-2618.json | 16 +++++----- 2019/CVE-2019-6340.json | 8 ++--- 2019/CVE-2019-8446.json | 8 ++--- 2019/CVE-2019-9465.json | 8 ++--- 2020/CVE-2020-0668.json | 20 ++++++------ 2020/CVE-2020-0688.json | 67 +++++++++++++++++++++++++++------------- 2020/CVE-2020-1938.json | 44 +++++++++++++------------- 2020/CVE-2020-2551.json | 18 +++++------ 2020/CVE-2020-7471.json | 8 ++--- README.md | 4 +++ 25 files changed, 231 insertions(+), 135 deletions(-) diff --git a/2011/CVE-2011-1473.json b/2011/CVE-2011-1473.json index 52e2deaf3e..2be5a25030 100644 --- a/2011/CVE-2011-1473.json +++ b/2011/CVE-2011-1473.json @@ -21,5 +21,28 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 185906522, + "name": "cve-2011-1473", + "full_name": "zjt674449039\/cve-2011-1473", + "owner": { + "login": "zjt674449039", + "id": 47102219, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/47102219?v=4", + "html_url": "https:\/\/github.com\/zjt674449039" + }, + "html_url": "https:\/\/github.com\/zjt674449039\/cve-2011-1473", + "description": null, + "fork": false, + "created_at": "2019-05-10T02:42:13Z", + "updated_at": "2019-05-10T05:50:12Z", + "pushed_at": "2019-05-10T05:50:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2011/CVE-2011-4862.json b/2011/CVE-2011-4862.json index ff4d4092b3..06c0cc6f36 100644 --- a/2011/CVE-2011-4862.json +++ b/2011/CVE-2011-4862.json @@ -1,4 +1,27 @@ [ + { + "id": 80754018, + "name": "GO-CVE-2011-4862", + "full_name": "hdbreaker\/GO-CVE-2011-4862", + "owner": { + "login": "hdbreaker", + "id": 5799585, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5799585?v=4", + "html_url": "https:\/\/github.com\/hdbreaker" + }, + "html_url": "https:\/\/github.com\/hdbreaker\/GO-CVE-2011-4862", + "description": "Go Exploit for CVE-2011-4862", + "fork": false, + "created_at": "2017-02-02T18:12:56Z", + "updated_at": "2019-10-22T07:01:17Z", + "pushed_at": "2017-02-02T18:19:38Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, { "id": 159565645, "name": "cve-2011-4862", @@ -21,5 +44,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 238652146, + "name": "CVE-2011-4862", + "full_name": "kpawar2410\/CVE-2011-4862", + "owner": { + "login": "kpawar2410", + "id": 51210677, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51210677?v=4", + "html_url": "https:\/\/github.com\/kpawar2410" + }, + "html_url": "https:\/\/github.com\/kpawar2410\/CVE-2011-4862", + "description": "Final Project for Security and Privacy CS 600.443", + "fork": false, + "created_at": "2020-02-06T09:30:45Z", + "updated_at": "2020-02-12T04:52:15Z", + "pushed_at": "2020-02-12T04:52:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 4f72216711..c545db3f6a 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-29T15:19:36Z", + "updated_at": "2020-03-01T11:20:22Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 239, - "watchers_count": 239, + "stargazers_count": 240, + "watchers_count": 240, "forks_count": 42, "forks": 42, - "watchers": 239, + "watchers": 240, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 2b59ab5d76..5a43f8ce0d 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-29T15:19:36Z", + "updated_at": "2020-03-01T11:20:22Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 239, - "watchers_count": 239, + "stargazers_count": 240, + "watchers_count": 240, "forks_count": 42, "forks": 42, - "watchers": 239, + "watchers": 240, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-1287.json b/2016/CVE-2016-1287.json index 026b151296..a92a4e9977 100644 --- a/2016/CVE-2016-1287.json +++ b/2016/CVE-2016-1287.json @@ -40,8 +40,8 @@ "pushed_at": "2017-03-15T20:25:40Z", "stargazers_count": 27, "watchers_count": 27, - "forks_count": 15, - "forks": 15, + "forks_count": 16, + "forks": 16, "watchers": 27, "score": 0 } diff --git a/2016/CVE-2016-2569.json b/2016/CVE-2016-2569.json index 5e9c5d568b..4a11eea1aa 100644 --- a/2016/CVE-2016-2569.json +++ b/2016/CVE-2016-2569.json @@ -13,13 +13,13 @@ "description": "Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.", "fork": false, "created_at": "2018-02-03T20:47:08Z", - "updated_at": "2018-02-10T10:28:17Z", + "updated_at": "2020-03-01T09:54:21Z", "pushed_at": "2018-02-10T02:17:54Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-6366.json b/2016/CVE-2016-6366.json index f048a488d1..19a33a9d17 100644 --- a/2016/CVE-2016-6366.json +++ b/2016/CVE-2016-6366.json @@ -17,8 +17,8 @@ "pushed_at": "2016-11-02T03:11:27Z", "stargazers_count": 147, "watchers_count": 147, - "forks_count": 70, - "forks": 70, + "forks_count": 71, + "forks": 71, "watchers": 147, "score": 0 } diff --git a/2017/CVE-2017-15303.json b/2017/CVE-2017-15303.json index d1dd9aebe9..3c2b992eea 100644 --- a/2017/CVE-2017-15303.json +++ b/2017/CVE-2017-15303.json @@ -13,13 +13,13 @@ "description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303", "fork": false, "created_at": "2018-02-22T05:31:13Z", - "updated_at": "2020-02-17T21:37:49Z", + "updated_at": "2020-03-01T13:10:08Z", "pushed_at": "2018-02-25T08:49:07Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "forks_count": 34, "forks": 34, - "watchers": 73, + "watchers": 74, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 2f5ab509e3..9241dec073 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-29T15:19:36Z", + "updated_at": "2020-03-01T11:20:22Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 239, - "watchers_count": 239, + "stargazers_count": 240, + "watchers_count": 240, "forks_count": 42, "forks": 42, - "watchers": 239, + "watchers": 240, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index 6ac84b442b..95197a98a6 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -13,13 +13,13 @@ "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", "fork": false, "created_at": "2018-01-04T00:28:50Z", - "updated_at": "2020-02-25T19:21:27Z", + "updated_at": "2020-03-01T13:26:36Z", "pushed_at": "2018-01-10T01:14:44Z", - "stargazers_count": 653, - "watchers_count": 653, + "stargazers_count": 654, + "watchers_count": 654, "forks_count": 172, "forks": 172, - "watchers": 653, + "watchers": 654, "score": 0 }, { diff --git a/2018/CVE-2018-19131.json b/2018/CVE-2018-19131.json index 2f1546e97b..83a4942f9e 100644 --- a/2018/CVE-2018-19131.json +++ b/2018/CVE-2018-19131.json @@ -13,13 +13,13 @@ "description": "Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate", "fork": false, "created_at": "2018-11-13T13:40:10Z", - "updated_at": "2019-04-04T17:14:49Z", + "updated_at": "2020-03-01T10:00:36Z", "pushed_at": "2018-11-14T02:40:24Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 2, "forks": 2, - "watchers": 9, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 4a8e3efb65..f085efdba9 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-29T15:19:36Z", + "updated_at": "2020-03-01T11:20:22Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 239, - "watchers_count": 239, + "stargazers_count": 240, + "watchers_count": 240, "forks_count": 42, "forks": 42, - "watchers": 239, + "watchers": 240, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8897.json b/2018/CVE-2018-8897.json index fa632f80af..4e1053cdd5 100644 --- a/2018/CVE-2018-8897.json +++ b/2018/CVE-2018-8897.json @@ -59,13 +59,13 @@ "description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.", "fork": false, "created_at": "2018-05-13T19:34:17Z", - "updated_at": "2020-02-09T08:14:49Z", + "updated_at": "2020-03-01T09:47:41Z", "pushed_at": "2018-05-18T12:26:53Z", - "stargazers_count": 359, - "watchers_count": 359, + "stargazers_count": 360, + "watchers_count": 360, "forks_count": 96, "forks": 96, - "watchers": 359, + "watchers": 360, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 1949d245fe..e53947c934 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -316,8 +316,8 @@ "pushed_at": "2019-06-13T13:07:03Z", "stargazers_count": 287, "watchers_count": 287, - "forks_count": 173, - "forks": 173, + "forks_count": 174, + "forks": 174, "watchers": 287, "score": 0 }, @@ -1144,8 +1144,8 @@ "pushed_at": "2019-10-01T12:23:59Z", "stargazers_count": 1084, "watchers_count": 1084, - "forks_count": 362, - "forks": 362, + "forks_count": 363, + "forks": 363, "watchers": 1084, "score": 0 }, diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 3fe76315dd..d084563f13 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -726,13 +726,13 @@ "description": "Indicator of Compromise Scanner for CVE-2019-19781", "fork": false, "created_at": "2020-01-21T15:20:25Z", - "updated_at": "2020-02-19T15:07:14Z", + "updated_at": "2020-03-01T13:47:44Z", "pushed_at": "2020-02-13T16:54:50Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "forks_count": 11, "forks": 11, - "watchers": 57, + "watchers": 58, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index e4528fd2de..070fa8da9f 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2020-02-25T08:42:03Z", + "updated_at": "2020-03-01T11:20:34Z", "pushed_at": "2019-06-24T06:06:48Z", - "stargazers_count": 493, - "watchers_count": 493, + "stargazers_count": 492, + "watchers_count": 492, "forks_count": 108, "forks": 108, - "watchers": 493, + "watchers": 492, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-29T15:19:36Z", + "updated_at": "2020-03-01T11:20:22Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 239, - "watchers_count": 239, + "stargazers_count": 240, + "watchers_count": 240, "forks_count": 42, "forks": 42, - "watchers": 239, + "watchers": 240, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-6340.json b/2019/CVE-2019-6340.json index 33f4fc5f59..78be3e8133 100644 --- a/2019/CVE-2019-6340.json +++ b/2019/CVE-2019-6340.json @@ -151,13 +151,13 @@ "description": "Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340", "fork": false, "created_at": "2019-05-27T19:06:14Z", - "updated_at": "2019-11-29T06:51:16Z", + "updated_at": "2020-03-01T14:38:32Z", "pushed_at": "2019-05-28T02:55:03Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "forks_count": 16, "forks": 16, - "watchers": 59, + "watchers": 60, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-8446.json b/2019/CVE-2019-8446.json index 187953c360..e3e502647f 100644 --- a/2019/CVE-2019-8446.json +++ b/2019/CVE-2019-8446.json @@ -13,13 +13,13 @@ "description": "A small python script that checks for CVE-2019-8446", "fork": false, "created_at": "2020-02-29T04:29:02Z", - "updated_at": "2020-02-29T20:50:33Z", + "updated_at": "2020-03-01T13:37:35Z", "pushed_at": "2020-02-29T20:50:32Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-9465.json b/2019/CVE-2019-9465.json index 376b357282..74482fa254 100644 --- a/2019/CVE-2019-9465.json +++ b/2019/CVE-2019-9465.json @@ -13,13 +13,13 @@ "description": "Demo Android application for CVE-2019-9465", "fork": false, "created_at": "2020-02-19T13:57:11Z", - "updated_at": "2020-03-01T08:07:32Z", + "updated_at": "2020-03-01T09:13:03Z", "pushed_at": "2020-02-19T13:57:29Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json index dc745d834f..bbde741876 100644 --- a/2020/CVE-2020-0668.json +++ b/2020/CVE-2020-0668.json @@ -13,13 +13,13 @@ "description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability", "fork": false, "created_at": "2019-10-11T09:08:02Z", - "updated_at": "2020-02-28T10:06:31Z", + "updated_at": "2020-03-01T09:27:09Z", "pushed_at": "2020-02-26T09:24:45Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 1, "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "fork": false, "created_at": "2020-02-20T06:22:40Z", - "updated_at": "2020-03-01T07:01:58Z", + "updated_at": "2020-03-01T12:57:05Z", "pushed_at": "2020-02-20T11:03:18Z", - "stargazers_count": 132, - "watchers_count": 132, - "forks_count": 24, - "forks": 24, - "watchers": 132, + "stargazers_count": 133, + "watchers_count": 133, + "forks_count": 25, + "forks": 25, + "watchers": 133, "score": 0 }, { diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 94127b35a8..5de68227ce 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -13,13 +13,13 @@ "description": "cve-2020-0688", "fork": false, "created_at": "2020-02-25T23:44:16Z", - "updated_at": "2020-02-29T16:33:52Z", + "updated_at": "2020-03-01T13:46:51Z", "pushed_at": "2020-02-26T00:58:39Z", - "stargazers_count": 128, - "watchers_count": 128, - "forks_count": 34, - "forks": 34, - "watchers": 128, + "stargazers_count": 129, + "watchers_count": 129, + "forks_count": 35, + "forks": 35, + "watchers": 129, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "cve-2020-0688", "fork": false, "created_at": "2020-02-27T02:54:27Z", - "updated_at": "2020-03-01T07:46:56Z", + "updated_at": "2020-03-01T14:42:39Z", "pushed_at": "2020-02-27T02:54:58Z", - "stargazers_count": 115, - "watchers_count": 115, - "forks_count": 37, - "forks": 37, - "watchers": 115, + "stargazers_count": 118, + "watchers_count": 118, + "forks_count": 38, + "forks": 38, + "watchers": 118, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method", "fork": false, "created_at": "2020-02-27T13:53:46Z", - "updated_at": "2020-03-01T02:29:31Z", + "updated_at": "2020-03-01T14:56:16Z", "pushed_at": "2020-02-27T15:57:53Z", - "stargazers_count": 39, - "watchers_count": 39, - "forks_count": 12, - "forks": 12, - "watchers": 39, + "stargazers_count": 44, + "watchers_count": 44, + "forks_count": 14, + "forks": 14, + "watchers": 44, "score": 0 }, { @@ -174,13 +174,36 @@ "description": "CVE-2020-0688", "fork": false, "created_at": "2020-02-28T17:03:53Z", - "updated_at": "2020-02-29T15:34:30Z", + "updated_at": "2020-03-01T12:06:45Z", "pushed_at": "2020-02-28T17:07:15Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 0, "forks": 0, - "watchers": 5, + "watchers": 6, + "score": 0 + }, + { + "id": 244149446, + "name": "CVE-2020-0688", + "full_name": "zcgonvh\/CVE-2020-0688", + "owner": { + "login": "zcgonvh", + "id": 25787677, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4", + "html_url": "https:\/\/github.com\/zcgonvh" + }, + "html_url": "https:\/\/github.com\/zcgonvh\/CVE-2020-0688", + "description": "Exploit and detect tools for CVE-2020-0688", + "fork": false, + "created_at": "2020-03-01T12:57:32Z", + "updated_at": "2020-03-01T14:57:50Z", + "pushed_at": "2020-03-01T12:58:01Z", + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 5, + "forks": 5, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index eb4bd7a167..ef58c3862b 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -17,8 +17,8 @@ "pushed_at": "2020-02-25T02:04:16Z", "stargazers_count": 116, "watchers_count": 116, - "forks_count": 64, - "forks": 64, + "forks_count": 65, + "forks": 65, "watchers": 116, "score": 0 }, @@ -82,13 +82,13 @@ "description": "CNVD-2020-10487\/CVE-2020-1938,批量扫描工具", "fork": false, "created_at": "2020-02-20T21:00:15Z", - "updated_at": "2020-03-01T04:06:22Z", + "updated_at": "2020-03-01T13:45:04Z", "pushed_at": "2020-02-24T12:06:08Z", - "stargazers_count": 135, - "watchers_count": 135, - "forks_count": 55, - "forks": 55, - "watchers": 135, + "stargazers_count": 136, + "watchers_count": 136, + "forks_count": 56, + "forks": 56, + "watchers": 136, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "Tomcat的文件包含及文件读取漏洞利用POC", "fork": false, "created_at": "2020-02-21T07:48:50Z", - "updated_at": "2020-02-22T17:43:58Z", + "updated_at": "2020-03-01T11:45:22Z", "pushed_at": "2020-02-21T10:19:52Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 2, "forks": 2, - "watchers": 3, + "watchers": 4, "score": 0 }, { @@ -289,13 +289,13 @@ "description": "CNVD-2020-10487 OR CVE-2020-1938 批量验证脚本,批量验证,并自动截图,方便提交及复核", "fork": false, "created_at": "2020-02-22T13:25:57Z", - "updated_at": "2020-02-24T08:18:04Z", + "updated_at": "2020-03-01T09:55:08Z", "pushed_at": "2020-02-24T08:18:02Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 2, "forks": 2, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -381,13 +381,13 @@ "description": "CVE-2020-1938(GhostCat) clean and readable code version", "fork": false, "created_at": "2020-03-01T01:45:23Z", - "updated_at": "2020-03-01T02:43:05Z", + "updated_at": "2020-03-01T12:28:07Z", "pushed_at": "2020-03-01T02:43:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 265f2a463c..812ae3eb79 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -36,13 +36,13 @@ "description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:", "fork": false, "created_at": "2020-01-19T13:01:32Z", - "updated_at": "2020-02-29T04:56:49Z", - "pushed_at": "2020-02-28T03:15:41Z", - "stargazers_count": 19, - "watchers_count": 19, + "updated_at": "2020-03-01T12:16:08Z", + "pushed_at": "2020-03-01T11:27:40Z", + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 7, "forks": 7, - "watchers": 19, + "watchers": 20, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "Weblogic IIOP CVE-2020-2551", "fork": false, "created_at": "2020-02-28T08:46:21Z", - "updated_at": "2020-03-01T08:26:34Z", + "updated_at": "2020-03-01T15:07:42Z", "pushed_at": "2020-02-28T09:34:19Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 51, + "watchers_count": 51, "forks_count": 12, "forks": 12, - "watchers": 43, + "watchers": 51, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7471.json b/2020/CVE-2020-7471.json index aa05af6360..847af12c01 100644 --- a/2020/CVE-2020-7471.json +++ b/2020/CVE-2020-7471.json @@ -13,13 +13,13 @@ "description": "django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC", "fork": false, "created_at": "2020-02-11T13:57:14Z", - "updated_at": "2020-03-01T08:43:59Z", + "updated_at": "2020-03-01T14:38:48Z", "pushed_at": "2020-02-13T12:56:31Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 65, + "watchers_count": 65, "forks_count": 13, "forks": 13, - "watchers": 63, + "watchers": 65, "score": 0 }, { diff --git a/README.md b/README.md index 5b1bb2b8d8..cb94853d59 100644 --- a/README.md +++ b/README.md @@ -109,6 +109,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when - [truongtn/cve-2020-0688](https://github.com/truongtn/cve-2020-0688) - [onSec-fr/CVE-2020-0688-Scanner](https://github.com/onSec-fr/CVE-2020-0688-Scanner) - [youncyb/CVE-2020-0688](https://github.com/youncyb/CVE-2020-0688) +- [zcgonvh/CVE-2020-0688](https://github.com/zcgonvh/CVE-2020-0688) ### CVE-2020-0728 @@ -11615,6 +11616,7 @@ Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microso - [c826/bash-tls-reneg-attack](https://github.com/c826/bash-tls-reneg-attack) +- [zjt674449039/cve-2011-1473](https://github.com/zjt674449039/cve-2011-1473) ### CVE-2011-1475 @@ -11746,7 +11748,9 @@ The simplexml_load_string function in the XML import plug-in (libraries/import/x Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011. +- [hdbreaker/GO-CVE-2011-4862](https://github.com/hdbreaker/GO-CVE-2011-4862) - [lol-fi/cve-2011-4862](https://github.com/lol-fi/cve-2011-4862) +- [kpawar2410/CVE-2011-4862](https://github.com/kpawar2410/CVE-2011-4862) ### CVE-2011-4872