From 7b63bade947d67de855f928e094daeaa7b6536f6 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 3 Jun 2020 06:07:49 +0900 Subject: [PATCH] Auto Update 2020/06/03 06:07:49 --- 2014/CVE-2014-4210.json | 8 ++++---- 2014/CVE-2014-9295.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2016/CVE-2016-4622.json | 4 ++-- 2017/CVE-2017-0785.json | 4 ++-- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-0296.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2019/CVE-2019-0232.json | 4 ++-- 2019/CVE-2019-17221.json | 8 ++++---- 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-18935.json | 8 ++++---- 2019/CVE-2019-2198.json | 4 ++-- 2019/CVE-2019-2618.json | 8 ++++---- 2019/CVE-2019-6447.json | 2 +- 2019/CVE-2019-7616.json | 4 ++-- 2020/CVE-2020-0796.json | 12 ++++++------ 2020/CVE-2020-10199.json | 12 ++++++------ 2020/CVE-2020-1066.json | 12 ++++++------ 2020/CVE-2020-11444.json | 8 ++++---- 2020/CVE-2020-12078.json | 23 +++++++++++++++++++++++ 2020/CVE-2020-12753.json | 2 +- 2020/CVE-2020-2551.json | 8 ++++---- 2020/CVE-2020-3956.json | 8 ++++---- README.md | 1 + 25 files changed, 106 insertions(+), 82 deletions(-) diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index e36cdae313..c6efe7ff22 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-01T09:15:47Z", + "updated_at": "2020-06-02T18:16:39Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 444, + "watchers_count": 444, "forks_count": 102, "forks": 102, - "watchers": 443, + "watchers": 444, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-9295.json b/2014/CVE-2014-9295.json index 2373b50003..576af0099c 100644 --- a/2014/CVE-2014-9295.json +++ b/2014/CVE-2014-9295.json @@ -13,13 +13,13 @@ "description": "Updates OS X 10.6.8 NTP to include patch for CVE-2014-9295", "fork": false, "created_at": "2014-12-26T15:30:12Z", - "updated_at": "2017-11-21T23:54:08Z", + "updated_at": "2020-06-02T20:09:19Z", "pushed_at": "2014-12-26T15:41:49Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "forks": 0, - "watchers": 6, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index ee954998ea..6253b89ff6 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-01T09:15:47Z", + "updated_at": "2020-06-02T18:16:39Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 444, + "watchers_count": 444, "forks_count": 102, "forks": 102, - "watchers": 443, + "watchers": 444, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-4622.json b/2016/CVE-2016-4622.json index e17663bee6..64853d5a67 100644 --- a/2016/CVE-2016-4622.json +++ b/2016/CVE-2016-4622.json @@ -17,8 +17,8 @@ "pushed_at": "2016-10-27T20:23:15Z", "stargazers_count": 73, "watchers_count": 73, - "forks_count": 35, - "forks": 35, + "forks_count": 34, + "forks": 34, "watchers": 73, "score": 0 }, diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index f43c59f656..3880961bfe 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -17,8 +17,8 @@ "pushed_at": "2017-09-23T05:11:45Z", "stargazers_count": 415, "watchers_count": 415, - "forks_count": 187, - "forks": 187, + "forks_count": 188, + "forks": 188, "watchers": 415, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 4c1af1eab7..50e678458a 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-01T09:15:47Z", + "updated_at": "2020-06-02T18:16:39Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 444, + "watchers_count": 444, "forks_count": 102, "forks": 102, - "watchers": 443, + "watchers": 444, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-0296.json b/2018/CVE-2018-0296.json index 41a1e4a708..69798aa0f5 100644 --- a/2018/CVE-2018-0296.json +++ b/2018/CVE-2018-0296.json @@ -36,13 +36,13 @@ "description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.", "fork": false, "created_at": "2018-06-21T15:44:29Z", - "updated_at": "2020-05-18T10:42:37Z", + "updated_at": "2020-06-02T19:16:31Z", "pushed_at": "2020-01-30T12:52:42Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "forks_count": 60, "forks": 60, - "watchers": 170, + "watchers": 171, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index fb81794336..577735e013 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-01T09:15:47Z", + "updated_at": "2020-06-02T18:16:39Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 444, + "watchers_count": 444, "forks_count": 102, "forks": 102, - "watchers": 443, + "watchers": 444, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index f4f85669e7..fb586a0794 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -17,8 +17,8 @@ "pushed_at": "2019-11-27T07:39:40Z", "stargazers_count": 170, "watchers_count": 170, - "forks_count": 45, - "forks": 45, + "forks_count": 46, + "forks": 46, "watchers": 170, "score": 0 }, diff --git a/2019/CVE-2019-17221.json b/2019/CVE-2019-17221.json index 0918519b3e..03cac7a3cd 100644 --- a/2019/CVE-2019-17221.json +++ b/2019/CVE-2019-17221.json @@ -13,13 +13,13 @@ "description": "PhantomJS uses internal module: webpage, to open, close, render, and perform multiple actions on webpages, which suffers from an arbitrary file read vulnerability. The vulnerability exists in the page.open() function of the webpage module, which loads the specified URL and calls a given callback. When opening a HTML file, an attacker can supply specially crafted file content, which allows reading arbitrary files on the filesystem. The vulnerability is demonstrated by using page.render() as the function callback, resulting in the generation of a PDF or an image of the targeted file.", "fork": false, "created_at": "2020-01-16T18:07:07Z", - "updated_at": "2020-01-23T15:23:36Z", + "updated_at": "2020-06-02T16:05:24Z", "pushed_at": "2020-01-16T18:08:13Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index b108656d4e..7492e8036f 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-06-02T15:04:51Z", + "updated_at": "2020-06-02T15:46:35Z", "pushed_at": "2020-06-01T02:34:27Z", - "stargazers_count": 851, - "watchers_count": 851, + "stargazers_count": 852, + "watchers_count": 852, "forks_count": 198, "forks": 198, - "watchers": 851, + "watchers": 852, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 4f099c30f0..0c3bdd0e47 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -36,13 +36,13 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2020-06-02T13:08:01Z", + "updated_at": "2020-06-02T17:48:48Z", "pushed_at": "2020-05-01T20:00:12Z", - "stargazers_count": 139, - "watchers_count": 139, + "stargazers_count": 140, + "watchers_count": 140, "forks_count": 32, "forks": 32, - "watchers": 139, + "watchers": 140, "score": 0 }, { diff --git a/2019/CVE-2019-2198.json b/2019/CVE-2019-2198.json index 49ccfc6a41..e721d529f7 100644 --- a/2019/CVE-2019-2198.json +++ b/2019/CVE-2019-2198.json @@ -17,8 +17,8 @@ "pushed_at": "2020-01-17T10:10:31Z", "stargazers_count": 28, "watchers_count": 28, - "forks_count": 17, - "forks": 17, + "forks_count": 18, + "forks": 18, "watchers": 28, "score": 0 } diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index afa0f709d3..15aaab2067 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-01T09:15:47Z", + "updated_at": "2020-06-02T18:16:39Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 444, + "watchers_count": 444, "forks_count": 102, "forks": 102, - "watchers": 443, + "watchers": 444, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-6447.json b/2019/CVE-2019-6447.json index ec2b5b3046..24a3c5c3ef 100644 --- a/2019/CVE-2019-6447.json +++ b/2019/CVE-2019-6447.json @@ -13,7 +13,7 @@ "description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447", "fork": false, "created_at": "2019-01-09T22:30:42Z", - "updated_at": "2020-06-01T11:14:48Z", + "updated_at": "2020-06-02T15:35:39Z", "pushed_at": "2019-01-22T21:00:36Z", "stargazers_count": 578, "watchers_count": 578, diff --git a/2019/CVE-2019-7616.json b/2019/CVE-2019-7616.json index 80a7b9d129..01a7a3895a 100644 --- a/2019/CVE-2019-7616.json +++ b/2019/CVE-2019-7616.json @@ -17,8 +17,8 @@ "pushed_at": "2020-06-02T07:29:20Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 3, "score": 0 } diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index bea5916fb1..ec12477019 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -933,13 +933,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2020-06-02T15:00:39Z", + "updated_at": "2020-06-02T16:54:20Z", "pushed_at": "2020-04-08T19:27:07Z", - "stargazers_count": 905, - "watchers_count": 905, + "stargazers_count": 906, + "watchers_count": 906, "forks_count": 280, "forks": 280, - "watchers": 905, + "watchers": 906, "score": 0 }, { @@ -1347,8 +1347,8 @@ "description": "CVE-2020-0796-exp", "fork": false, "created_at": "2020-06-02T12:04:53Z", - "updated_at": "2020-06-02T12:08:18Z", - "pushed_at": "2020-06-02T12:08:13Z", + "updated_at": "2020-06-02T15:18:59Z", + "pushed_at": "2020-06-02T15:18:57Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json index 02f73d3411..5d247419c1 100644 --- a/2020/CVE-2020-10199.json +++ b/2020/CVE-2020-10199.json @@ -82,13 +82,13 @@ "description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)", "fork": false, "created_at": "2020-04-16T09:40:15Z", - "updated_at": "2020-06-02T12:42:17Z", + "updated_at": "2020-06-02T17:04:17Z", "pushed_at": "2020-05-26T10:23:34Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 2, - "forks": 2, - "watchers": 9, + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 3, + "forks": 3, + "watchers": 11, "score": 0 }, { diff --git a/2020/CVE-2020-1066.json b/2020/CVE-2020-1066.json index e8b2371910..b75d193855 100644 --- a/2020/CVE-2020-1066.json +++ b/2020/CVE-2020-1066.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统", "fork": false, "created_at": "2020-06-01T04:44:05Z", - "updated_at": "2020-06-02T15:02:57Z", + "updated_at": "2020-06-02T16:13:14Z", "pushed_at": "2020-06-01T09:04:18Z", - "stargazers_count": 73, - "watchers_count": 73, - "forks_count": 19, - "forks": 19, - "watchers": 73, + "stargazers_count": 82, + "watchers_count": 82, + "forks_count": 22, + "forks": 22, + "watchers": 82, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-11444.json b/2020/CVE-2020-11444.json index 85ea968dad..93679d780f 100644 --- a/2020/CVE-2020-11444.json +++ b/2020/CVE-2020-11444.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-06-02T15:04:51Z", + "updated_at": "2020-06-02T15:46:35Z", "pushed_at": "2020-06-01T02:34:27Z", - "stargazers_count": 851, - "watchers_count": 851, + "stargazers_count": 852, + "watchers_count": 852, "forks_count": 198, "forks": 198, - "watchers": 851, + "watchers": 852, "score": 0 }, { diff --git a/2020/CVE-2020-12078.json b/2020/CVE-2020-12078.json index 418939778e..6d2c6c53a9 100644 --- a/2020/CVE-2020-12078.json +++ b/2020/CVE-2020-12078.json @@ -21,5 +21,28 @@ "forks": 7, "watchers": 17, "score": 0 + }, + { + "id": 268869147, + "name": "CVE-2020-12078", + "full_name": "84KaliPleXon3\/CVE-2020-12078", + "owner": { + "login": "84KaliPleXon3", + "id": 59977956, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59977956?v=4", + "html_url": "https:\/\/github.com\/84KaliPleXon3" + }, + "html_url": "https:\/\/github.com\/84KaliPleXon3\/CVE-2020-12078", + "description": null, + "fork": false, + "created_at": "2020-06-02T17:44:07Z", + "updated_at": "2020-06-02T17:44:22Z", + "pushed_at": "2020-06-02T17:44:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-12753.json b/2020/CVE-2020-12753.json index e0f3656d20..618bfe91f7 100644 --- a/2020/CVE-2020-12753.json +++ b/2020/CVE-2020-12753.json @@ -13,7 +13,7 @@ "description": "A proof-of-concept for CVE-2020-12753", "fork": false, "created_at": "2020-06-01T21:58:42Z", - "updated_at": "2020-06-02T14:38:31Z", + "updated_at": "2020-06-02T16:54:46Z", "pushed_at": "2020-06-01T22:55:46Z", "stargazers_count": 6, "watchers_count": 6, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index e14a3a63cf..f25580a7af 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-06-01T09:15:47Z", + "updated_at": "2020-06-02T18:16:39Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 444, + "watchers_count": 444, "forks_count": 102, "forks": 102, - "watchers": 443, + "watchers": 444, "score": 0 }, { diff --git a/2020/CVE-2020-3956.json b/2020/CVE-2020-3956.json index 6456a0edd2..d344a11c5c 100644 --- a/2020/CVE-2020-3956.json +++ b/2020/CVE-2020-3956.json @@ -13,13 +13,13 @@ "description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)", "fork": false, "created_at": "2020-06-01T18:26:32Z", - "updated_at": "2020-06-02T15:05:50Z", + "updated_at": "2020-06-02T17:54:36Z", "pushed_at": "2020-06-02T08:30:22Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 13, "forks": 13, - "watchers": 24, + "watchers": 28, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 010ea7ade3..601bdd8e19 100644 --- a/README.md +++ b/README.md @@ -527,6 +527,7 @@ An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter inject - [mhaskar/CVE-2020-12078](https://github.com/mhaskar/CVE-2020-12078) +- [84KaliPleXon3/CVE-2020-12078](https://github.com/84KaliPleXon3/CVE-2020-12078) ### CVE-2020-12112