From 947a0e1db832e64e5f8e5e53e1ba97e51f8342d9 Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Thu, 30 Apr 2020 12:07:52 +0900
Subject: [PATCH] Auto Update 2020/04/30 12:07:52

---
 2016/CVE-2016-4622.json  |  4 ++--
 2018/CVE-2018-14847.json | 12 ++++++------
 2018/CVE-2018-5955.json  |  8 ++++----
 2019/CVE-2019-0708.json  |  8 ++++----
 2019/CVE-2019-11043.json |  8 ++++----
 2019/CVE-2019-2618.json  | 12 ++++++------
 2020/CVE-2020-0601.json  |  8 ++++----
 2020/CVE-2020-0688.json  | 24 ++++++++++++------------
 2020/CVE-2020-0796.json  | 20 ++++++++++----------
 2020/CVE-2020-0883.json  |  8 ++++----
 2020/CVE-2020-10199.json |  4 ++--
 2020/CVE-2020-12078.json |  8 ++++----
 2020/CVE-2020-3952.json  |  8 ++++----
 2020/CVE-2020-6418.json  |  8 ++++----
 14 files changed, 70 insertions(+), 70 deletions(-)

diff --git a/2016/CVE-2016-4622.json b/2016/CVE-2016-4622.json
index e17663bee6..64853d5a67 100644
--- a/2016/CVE-2016-4622.json
+++ b/2016/CVE-2016-4622.json
@@ -17,8 +17,8 @@
         "pushed_at": "2016-10-27T20:23:15Z",
         "stargazers_count": 73,
         "watchers_count": 73,
-        "forks_count": 35,
-        "forks": 35,
+        "forks_count": 34,
+        "forks": 34,
         "watchers": 73,
         "score": 0
     },
diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json
index 3fe32328fe..c5512c50db 100644
--- a/2018/CVE-2018-14847.json
+++ b/2018/CVE-2018-14847.json
@@ -13,13 +13,13 @@
         "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
         "fork": false,
         "created_at": "2018-06-24T05:34:05Z",
-        "updated_at": "2020-04-29T12:46:30Z",
+        "updated_at": "2020-04-29T23:46:49Z",
         "pushed_at": "2020-03-08T00:08:20Z",
-        "stargazers_count": 330,
-        "watchers_count": 330,
+        "stargazers_count": 331,
+        "watchers_count": 331,
         "forks_count": 309,
         "forks": 309,
-        "watchers": 330,
+        "watchers": 331,
         "score": 0
     },
     {
@@ -174,8 +174,8 @@
         "description": null,
         "fork": false,
         "created_at": "2020-04-29T01:40:33Z",
-        "updated_at": "2020-04-29T08:08:17Z",
-        "pushed_at": "2020-04-29T08:08:14Z",
+        "updated_at": "2020-04-30T01:58:57Z",
+        "pushed_at": "2020-04-30T01:58:55Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json
index d6b32cdb38..c40360259b 100644
--- a/2018/CVE-2018-5955.json
+++ b/2018/CVE-2018-5955.json
@@ -36,13 +36,13 @@
         "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
         "fork": false,
         "created_at": "2019-12-21T22:45:55Z",
-        "updated_at": "2020-04-27T14:23:12Z",
+        "updated_at": "2020-04-30T00:46:34Z",
         "pushed_at": "2020-01-05T21:46:25Z",
-        "stargazers_count": 243,
-        "watchers_count": 243,
+        "stargazers_count": 244,
+        "watchers_count": 244,
         "forks_count": 45,
         "forks": 45,
-        "watchers": 243,
+        "watchers": 244,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index bb41a9d2b3..6d4f8628e5 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1140,13 +1140,13 @@
         "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
         "fork": false,
         "created_at": "2019-05-22T00:08:44Z",
-        "updated_at": "2020-04-26T09:15:25Z",
+        "updated_at": "2020-04-30T02:49:20Z",
         "pushed_at": "2019-10-01T12:23:59Z",
-        "stargazers_count": 1099,
-        "watchers_count": 1099,
+        "stargazers_count": 1101,
+        "watchers_count": 1101,
         "forks_count": 371,
         "forks": 371,
-        "watchers": 1099,
+        "watchers": 1101,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index c5f7925aec..3e328a2c4a 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -13,13 +13,13 @@
         "description": "Exploit for CVE-2019-11043",
         "fork": false,
         "created_at": "2019-09-23T21:37:27Z",
-        "updated_at": "2020-04-28T12:25:39Z",
+        "updated_at": "2020-04-30T01:04:10Z",
         "pushed_at": "2019-11-12T18:53:14Z",
-        "stargazers_count": 1567,
-        "watchers_count": 1567,
+        "stargazers_count": 1568,
+        "watchers_count": 1568,
         "forks_count": 222,
         "forks": 222,
-        "watchers": 1567,
+        "watchers": 1568,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 74cb480a3e..ec92323760 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -82,13 +82,13 @@
         "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
         "fork": false,
         "created_at": "2019-06-21T09:22:43Z",
-        "updated_at": "2020-04-29T15:31:16Z",
+        "updated_at": "2020-04-30T02:31:57Z",
         "pushed_at": "2020-04-26T10:49:25Z",
-        "stargazers_count": 532,
-        "watchers_count": 532,
+        "stargazers_count": 533,
+        "watchers_count": 533,
         "forks_count": 117,
         "forks": 117,
-        "watchers": 532,
+        "watchers": 533,
         "score": 0
     },
     {
@@ -178,8 +178,8 @@
         "pushed_at": "2020-04-17T11:11:18Z",
         "stargazers_count": 619,
         "watchers_count": 619,
-        "forks_count": 128,
-        "forks": 128,
+        "forks_count": 129,
+        "forks": 129,
         "watchers": 619,
         "score": 0
     }
diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json
index 685b56f5b2..a3438c6615 100644
--- a/2020/CVE-2020-0601.json
+++ b/2020/CVE-2020-0601.json
@@ -128,13 +128,13 @@
         "description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
         "fork": false,
         "created_at": "2020-01-15T23:07:41Z",
-        "updated_at": "2020-04-29T02:34:57Z",
+        "updated_at": "2020-04-30T02:07:13Z",
         "pushed_at": "2020-01-20T23:33:19Z",
-        "stargazers_count": 799,
-        "watchers_count": 799,
+        "stargazers_count": 798,
+        "watchers_count": 798,
         "forks_count": 200,
         "forks": 200,
-        "watchers": 799,
+        "watchers": 798,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json
index 218e37e78b..1a5aa97f0d 100644
--- a/2020/CVE-2020-0688.json
+++ b/2020/CVE-2020-0688.json
@@ -59,13 +59,13 @@
         "description": "cve-2020-0688",
         "fork": false,
         "created_at": "2020-02-27T02:54:27Z",
-        "updated_at": "2020-04-27T11:22:25Z",
+        "updated_at": "2020-04-30T01:11:01Z",
         "pushed_at": "2020-02-27T02:54:58Z",
-        "stargazers_count": 172,
-        "watchers_count": 172,
+        "stargazers_count": 173,
+        "watchers_count": 173,
         "forks_count": 70,
         "forks": 70,
-        "watchers": 172,
+        "watchers": 173,
         "score": 0
     },
     {
@@ -82,13 +82,13 @@
         "description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
         "fork": false,
         "created_at": "2020-02-27T13:53:46Z",
-        "updated_at": "2020-04-22T19:09:39Z",
+        "updated_at": "2020-04-30T01:11:06Z",
         "pushed_at": "2020-02-27T15:57:53Z",
-        "stargazers_count": 106,
-        "watchers_count": 106,
+        "stargazers_count": 107,
+        "watchers_count": 107,
         "forks_count": 42,
         "forks": 42,
-        "watchers": 106,
+        "watchers": 107,
         "score": 0
     },
     {
@@ -197,13 +197,13 @@
         "description": "Exploit and detect tools for CVE-2020-0688",
         "fork": false,
         "created_at": "2020-03-01T12:57:32Z",
-        "updated_at": "2020-04-24T16:15:55Z",
+        "updated_at": "2020-04-30T01:11:08Z",
         "pushed_at": "2020-03-21T05:44:48Z",
-        "stargazers_count": 155,
-        "watchers_count": 155,
+        "stargazers_count": 156,
+        "watchers_count": 156,
         "forks_count": 48,
         "forks": 48,
-        "watchers": 155,
+        "watchers": 156,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index d0ebec1950..ede3bc0a1c 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -404,13 +404,13 @@
         "description": "PoC for triggering buffer overflow via CVE-2020-0796",
         "fork": false,
         "created_at": "2020-03-12T18:34:40Z",
-        "updated_at": "2020-04-27T18:27:15Z",
+        "updated_at": "2020-04-30T01:12:22Z",
         "pushed_at": "2020-03-14T10:04:59Z",
-        "stargazers_count": 211,
-        "watchers_count": 211,
+        "stargazers_count": 212,
+        "watchers_count": 212,
         "forks_count": 82,
         "forks": 82,
-        "watchers": 211,
+        "watchers": 212,
         "score": 0
     },
     {
@@ -956,13 +956,13 @@
         "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
         "fork": false,
         "created_at": "2020-03-30T11:42:56Z",
-        "updated_at": "2020-04-28T13:35:52Z",
+        "updated_at": "2020-04-30T01:13:00Z",
         "pushed_at": "2020-04-08T19:27:07Z",
-        "stargazers_count": 847,
-        "watchers_count": 847,
+        "stargazers_count": 848,
+        "watchers_count": 848,
         "forks_count": 243,
         "forks": 243,
-        "watchers": 847,
+        "watchers": 848,
         "score": 0
     },
     {
@@ -1098,8 +1098,8 @@
         "pushed_at": "2020-04-07T08:58:57Z",
         "stargazers_count": 6,
         "watchers_count": 6,
-        "forks_count": 7,
-        "forks": 7,
+        "forks_count": 8,
+        "forks": 8,
         "watchers": 6,
         "score": 0
     },
diff --git a/2020/CVE-2020-0883.json b/2020/CVE-2020-0883.json
index a628ced124..f6ebf6d0ce 100644
--- a/2020/CVE-2020-0883.json
+++ b/2020/CVE-2020-0883.json
@@ -59,13 +59,13 @@
         "description": null,
         "fork": false,
         "created_at": "2020-04-22T09:10:27Z",
-        "updated_at": "2020-04-24T08:15:38Z",
+        "updated_at": "2020-04-30T01:14:56Z",
         "pushed_at": "2020-04-22T14:05:58Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
+        "stargazers_count": 2,
+        "watchers_count": 2,
         "forks_count": 1,
         "forks": 1,
-        "watchers": 1,
+        "watchers": 2,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json
index 638c34cf09..2b656d3c1d 100644
--- a/2020/CVE-2020-10199.json
+++ b/2020/CVE-2020-10199.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-04-17T11:11:18Z",
         "stargazers_count": 619,
         "watchers_count": 619,
-        "forks_count": 128,
-        "forks": 128,
+        "forks_count": 129,
+        "forks": 129,
         "watchers": 619,
         "score": 0
     },
diff --git a/2020/CVE-2020-12078.json b/2020/CVE-2020-12078.json
index 4547ef0ba3..5bd2cf61d5 100644
--- a/2020/CVE-2020-12078.json
+++ b/2020/CVE-2020-12078.json
@@ -13,13 +13,13 @@
         "description": "The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078",
         "fork": false,
         "created_at": "2020-04-28T13:48:27Z",
-        "updated_at": "2020-04-29T17:54:56Z",
+        "updated_at": "2020-04-30T02:22:43Z",
         "pushed_at": "2020-04-28T13:51:17Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
+        "stargazers_count": 11,
+        "watchers_count": 11,
         "forks_count": 3,
         "forks": 3,
-        "watchers": 9,
+        "watchers": 11,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json
index b92e69aa5d..7b6e8c0531 100644
--- a/2020/CVE-2020-3952.json
+++ b/2020/CVE-2020-3952.json
@@ -59,13 +59,13 @@
         "description": "Exploit for CVE-2020-3952 in vCenter 6.7",
         "fork": false,
         "created_at": "2020-04-16T07:40:51Z",
-        "updated_at": "2020-04-29T12:37:05Z",
+        "updated_at": "2020-04-30T01:13:07Z",
         "pushed_at": "2020-04-16T08:38:42Z",
-        "stargazers_count": 179,
-        "watchers_count": 179,
+        "stargazers_count": 180,
+        "watchers_count": 180,
         "forks_count": 33,
         "forks": 33,
-        "watchers": 179,
+        "watchers": 180,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-6418.json b/2020/CVE-2020-6418.json
index 9dea5e8f3a..689dcf9e51 100644
--- a/2020/CVE-2020-6418.json
+++ b/2020/CVE-2020-6418.json
@@ -13,13 +13,13 @@
         "description": "PoC of CVE",
         "fork": false,
         "created_at": "2020-02-27T08:18:56Z",
-        "updated_at": "2020-04-26T09:02:09Z",
+        "updated_at": "2020-04-30T01:12:20Z",
         "pushed_at": "2020-03-08T05:53:47Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
+        "stargazers_count": 10,
+        "watchers_count": 10,
         "forks_count": 8,
         "forks": 8,
-        "watchers": 9,
+        "watchers": 10,
         "score": 0
     }
 ]
\ No newline at end of file