diff --git a/2014/CVE-2014-4113.json b/2014/CVE-2014-4113.json index 8e01830b05..e609f57d0b 100644 --- a/2014/CVE-2014-4113.json +++ b/2014/CVE-2014-4113.json @@ -17,8 +17,8 @@ "pushed_at": "2014-11-19T03:55:51Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 11, - "forks": 11, + "forks_count": 10, + "forks": 10, "watchers": 3, "score": 0 }, diff --git a/2015/CVE-2015-1701.json b/2015/CVE-2015-1701.json index cc6e63f4e5..952e47bd18 100644 --- a/2015/CVE-2015-1701.json +++ b/2015/CVE-2015-1701.json @@ -17,8 +17,8 @@ "pushed_at": "2017-12-18T14:11:29Z", "stargazers_count": 261, "watchers_count": 261, - "forks_count": 178, - "forks": 178, + "forks_count": 177, + "forks": 177, "watchers": 261, "score": 0 } diff --git a/2017/CVE-2017-8890.json b/2017/CVE-2017-8890.json index eaa1a3cf01..1bbfaa3215 100644 --- a/2017/CVE-2017-8890.json +++ b/2017/CVE-2017-8890.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2018-07-02T02:21:28Z", - "updated_at": "2020-01-25T01:32:25Z", + "updated_at": "2020-03-16T15:03:48Z", "pushed_at": "2019-05-09T07:07:25Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 26, + "watchers_count": 26, "forks_count": 11, "forks": 11, - "watchers": 23, + "watchers": 26, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index db4fc37540..44c9798310 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -59,13 +59,13 @@ "description": "Exploit written in Python for CVE-2018-15473 with threading and export formats", "fork": false, "created_at": "2018-08-21T00:09:56Z", - "updated_at": "2020-03-14T08:23:19Z", + "updated_at": "2020-03-16T14:26:23Z", "pushed_at": "2020-03-06T10:52:19Z", - "stargazers_count": 386, - "watchers_count": 386, + "stargazers_count": 387, + "watchers_count": 387, "forks_count": 116, "forks": 116, - "watchers": 386, + "watchers": 387, "score": 0 }, { diff --git a/2018/CVE-2018-6789.json b/2018/CVE-2018-6789.json index fa9615fe4a..3da3065232 100644 --- a/2018/CVE-2018-6789.json +++ b/2018/CVE-2018-6789.json @@ -86,8 +86,8 @@ "pushed_at": "2020-03-03T07:57:30Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 1, "score": 0 } diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index a5e37ac9eb..26ea829d19 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -82,13 +82,13 @@ "description": "php-fpm+Nginx RCE", "fork": false, "created_at": "2019-10-23T23:26:57Z", - "updated_at": "2020-03-04T00:16:33Z", + "updated_at": "2020-03-16T11:55:41Z", "pushed_at": "2019-10-29T02:02:34Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 23, "forks": 23, - "watchers": 66, + "watchers": 67, "score": 0 }, { diff --git a/2019/CVE-2019-11580.json b/2019/CVE-2019-11580.json index 555c913060..51d4b1ed5e 100644 --- a/2019/CVE-2019-11580.json +++ b/2019/CVE-2019-11580.json @@ -13,13 +13,13 @@ "description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE", "fork": false, "created_at": "2019-07-17T07:54:38Z", - "updated_at": "2020-03-15T21:27:38Z", + "updated_at": "2020-03-16T09:45:02Z", "pushed_at": "2019-07-18T10:03:28Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "forks_count": 17, "forks": 17, - "watchers": 73, + "watchers": 74, "score": 0 }, { diff --git a/2019/CVE-2019-1821.json b/2019/CVE-2019-1821.json index cebcdad473..6c0369628e 100644 --- a/2019/CVE-2019-1821.json +++ b/2019/CVE-2019-1821.json @@ -13,13 +13,13 @@ "description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)", "fork": false, "created_at": "2019-05-21T12:42:54Z", - "updated_at": "2020-03-13T16:14:08Z", + "updated_at": "2020-03-16T09:42:43Z", "pushed_at": "2019-05-21T14:52:36Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "forks_count": 29, "forks": 29, - "watchers": 44, + "watchers": 45, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index 8484738ce7..5f90f2b78b 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -128,13 +128,13 @@ "description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)", "fork": false, "created_at": "2020-01-15T23:07:41Z", - "updated_at": "2020-03-12T19:18:09Z", + "updated_at": "2020-03-16T13:01:04Z", "pushed_at": "2020-01-20T23:33:19Z", - "stargazers_count": 787, - "watchers_count": 787, + "stargazers_count": 786, + "watchers_count": 786, "forks_count": 196, "forks": 196, - "watchers": 787, + "watchers": 786, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "A PoC for CVE-2020-0601", "fork": false, "created_at": "2020-01-15T23:15:32Z", - "updated_at": "2020-03-12T18:54:01Z", + "updated_at": "2020-03-16T13:01:02Z", "pushed_at": "2020-03-09T20:44:04Z", - "stargazers_count": 310, - "watchers_count": 310, + "stargazers_count": 309, + "watchers_count": 309, "forks_count": 77, "forks": 77, - "watchers": 310, + "watchers": 309, "score": 0 }, { @@ -450,13 +450,13 @@ "description": "CVE-2020-0601 #curveball - Alternative Key Calculator", "fork": false, "created_at": "2020-01-20T16:24:20Z", - "updated_at": "2020-02-01T23:50:25Z", + "updated_at": "2020-03-16T13:01:09Z", "pushed_at": "2020-01-20T23:00:14Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 60, + "watchers_count": 60, "forks_count": 8, "forks": 8, - "watchers": 61, + "watchers": 60, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 35e999df87..70cfc9c2ce 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -59,13 +59,36 @@ "description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.", "fork": false, "created_at": "2020-03-11T06:51:58Z", - "updated_at": "2020-03-16T08:00:50Z", + "updated_at": "2020-03-16T14:50:41Z", "pushed_at": "2020-03-13T00:50:55Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 135, + "watchers_count": 135, "forks_count": 33, "forks": 33, - "watchers": 131, + "watchers": 135, + "score": 0 + }, + { + "id": 246525183, + "name": "CVE-2020-0796", + "full_name": "T13nn3s\/CVE-2020-0796", + "owner": { + "login": "T13nn3s", + "id": 29333776, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4", + "html_url": "https:\/\/github.com\/T13nn3s" + }, + "html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-0796", + "description": "Powershell SMBv3 Compression checker", + "fork": false, + "created_at": "2020-03-11T09:13:48Z", + "updated_at": "2020-03-16T10:45:43Z", + "pushed_at": "2020-03-13T14:22:00Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 5, + "forks": 5, + "watchers": 11, "score": 0 }, { @@ -82,13 +105,13 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2020-03-16T07:59:10Z", + "updated_at": "2020-03-16T15:00:51Z", "pushed_at": "2020-03-13T09:54:16Z", - "stargazers_count": 355, - "watchers_count": 355, + "stargazers_count": 357, + "watchers_count": 357, "forks_count": 97, "forks": 97, - "watchers": 355, + "watchers": 357, "score": 0 }, { @@ -404,13 +427,13 @@ "description": "PoC for triggering buffer overflow via CVE-2020-0796", "fork": false, "created_at": "2020-03-12T18:34:40Z", - "updated_at": "2020-03-16T07:26:02Z", + "updated_at": "2020-03-16T14:24:16Z", "pushed_at": "2020-03-14T10:04:59Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 117, + "watchers_count": 117, "forks_count": 43, "forks": 43, - "watchers": 113, + "watchers": 117, "score": 0 }, { @@ -450,13 +473,13 @@ "description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ", "fork": false, "created_at": "2020-03-12T19:33:18Z", - "updated_at": "2020-03-16T08:49:13Z", + "updated_at": "2020-03-16T12:52:47Z", "pushed_at": "2020-03-13T07:38:43Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 21, + "watchers_count": 21, "forks_count": 9, "forks": 9, - "watchers": 18, + "watchers": 21, "score": 0 }, { diff --git a/2020/CVE-2020-0976.json b/2020/CVE-2020-0976.json index a5bf990f12..892349dc7a 100644 --- a/2020/CVE-2020-0976.json +++ b/2020/CVE-2020-0976.json @@ -1,27 +1,4 @@ [ - { - "id": 246525183, - "name": "CVE-2020-0976", - "full_name": "T13nn3s\/CVE-2020-0976", - "owner": { - "login": "T13nn3s", - "id": 29333776, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4", - "html_url": "https:\/\/github.com\/T13nn3s" - }, - "html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-0976", - "description": "Powershell SMBv3 Compression checker", - "fork": false, - "created_at": "2020-03-11T09:13:48Z", - "updated_at": "2020-03-15T06:44:18Z", - "pushed_at": "2020-03-13T14:22:00Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 5, - "forks": 5, - "watchers": 11, - "score": 0 - }, { "id": 247235721, "name": "GUI-Check-CVE-2020-0976", diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 56c9e5d6bf..e143aa9978 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -312,13 +312,13 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2020-03-13T01:41:20Z", + "updated_at": "2020-03-16T09:51:41Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 52, - "watchers_count": 52, - "forks_count": 18, - "forks": 18, - "watchers": 52, + "stargazers_count": 53, + "watchers_count": 53, + "forks_count": 19, + "forks": 19, + "watchers": 53, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 5fdc72af9e..9c475e2b57 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -59,13 +59,13 @@ "description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:", "fork": false, "created_at": "2020-01-19T13:01:32Z", - "updated_at": "2020-03-15T08:30:35Z", + "updated_at": "2020-03-16T11:29:59Z", "pushed_at": "2020-03-10T15:46:18Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "forks_count": 21, "forks": 21, - "watchers": 82, + "watchers": 83, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Weblogic IIOP CVE-2020-2551", "fork": false, "created_at": "2020-02-28T08:46:21Z", - "updated_at": "2020-03-15T03:24:46Z", + "updated_at": "2020-03-16T11:03:12Z", "pushed_at": "2020-03-04T16:16:58Z", - "stargazers_count": 130, - "watchers_count": 130, + "stargazers_count": 131, + "watchers_count": 131, "forks_count": 32, "forks": 32, - "watchers": 130, + "watchers": 131, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index ca5c3d3b02..362e3d62dc 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -82,13 +82,13 @@ "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "fork": false, "created_at": "2020-03-07T18:58:09Z", - "updated_at": "2020-03-16T08:29:47Z", + "updated_at": "2020-03-16T13:58:06Z", "pushed_at": "2020-03-09T05:25:05Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 77, + "watchers_count": 77, "forks_count": 21, "forks": 21, - "watchers": 75, + "watchers": 77, "score": 0 }, { diff --git a/README.md b/README.md index 33a8699a8d..b4dcf09830 100644 --- a/README.md +++ b/README.md @@ -157,6 +157,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve - [Aekras1a/CVE-2020-0796-PoC](https://github.com/Aekras1a/CVE-2020-0796-PoC) - [technion/DisableSMBCompression](https://github.com/technion/DisableSMBCompression) - [cve-2020-0796/cve-2020-0796](https://github.com/cve-2020-0796/cve-2020-0796) +- [T13nn3s/CVE-2020-0796](https://github.com/T13nn3s/CVE-2020-0796) - [ollypwn/SMBGhost](https://github.com/ollypwn/SMBGhost) - [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker) - [pr4jwal/CVE-2020-0796](https://github.com/pr4jwal/CVE-2020-0796) @@ -191,7 +192,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve - [ran-sama/CVE-2020-0796-PoC-and-Scan](https://github.com/ran-sama/CVE-2020-0796-PoC-and-Scan) ### CVE-2020-0976 -- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976) - [ericzhong2010/GUI-Check-CVE-2020-0976](https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976) ### CVE-2020-10238