diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 7201962d40..4c97d79de9 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-25T07:44:09Z", + "updated_at": "2020-09-26T04:36:21Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 704, - "watchers_count": 704, + "stargazers_count": 705, + "watchers_count": 705, "forks_count": 174, "forks": 174, - "watchers": 704, + "watchers": 705, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 7342830800..23838f9de2 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-25T07:44:09Z", + "updated_at": "2020-09-26T04:36:21Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 704, - "watchers_count": 704, + "stargazers_count": 705, + "watchers_count": 705, "forks_count": 174, "forks": 174, - "watchers": 704, + "watchers": 705, "score": 0 }, { diff --git a/2016/CVE-2016-6210.json b/2016/CVE-2016-6210.json index 3c03874147..c149463ed9 100644 --- a/2016/CVE-2016-6210.json +++ b/2016/CVE-2016-6210.json @@ -17,8 +17,8 @@ "pushed_at": "2019-08-25T07:28:06Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 1, "score": 0 } diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 6156d03942..e03484a7af 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-25T07:44:09Z", + "updated_at": "2020-09-26T04:36:21Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 704, - "watchers_count": 704, + "stargazers_count": 705, + "watchers_count": 705, "forks_count": 174, "forks": 174, - "watchers": 704, + "watchers": 705, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index c1c6f71946..052daa5fec 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -243,13 +243,13 @@ "description": "Checks a list of SSH servers for password-based auth availability and for the existence of SSH user enumeration vulnerability (CVE-2018-15473) in those identified.", "fork": false, "created_at": "2019-04-27T16:52:23Z", - "updated_at": "2020-08-03T09:33:45Z", + "updated_at": "2020-09-26T06:53:13Z", "pushed_at": "2019-09-24T21:38:00Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 304be98d38..4ae21e6244 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-25T07:44:09Z", + "updated_at": "2020-09-26T04:36:21Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 704, - "watchers_count": 704, + "stargazers_count": 705, + "watchers_count": 705, "forks_count": 174, "forks": 174, - "watchers": 704, + "watchers": 705, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 4fe0f4f3a9..febc22d977 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-25T07:44:09Z", + "updated_at": "2020-09-26T04:36:21Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 704, - "watchers_count": 704, + "stargazers_count": 705, + "watchers_count": 705, "forks_count": 174, "forks": 174, - "watchers": 704, + "watchers": 705, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index b78ae8f794..5fba41762f 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -312,13 +312,13 @@ "description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ", "fork": false, "created_at": "2019-06-24T08:33:07Z", - "updated_at": "2020-09-09T03:34:34Z", + "updated_at": "2020-09-26T06:11:58Z", "pushed_at": "2019-07-15T06:03:15Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "forks_count": 20, "forks": 20, - "watchers": 59, + "watchers": 60, "score": 0 }, { diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 34a9d086a8..067b03e5da 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -63,8 +63,8 @@ "pushed_at": "2020-06-19T09:28:15Z", "stargazers_count": 217, "watchers_count": 217, - "forks_count": 79, - "forks": 79, + "forks_count": 80, + "forks": 80, "watchers": 217, "score": 0 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 2e19bcd23b..f4294550f7 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2020-09-25T18:50:58Z", + "updated_at": "2020-09-26T06:19:22Z", "pushed_at": "2020-09-23T07:04:58Z", - "stargazers_count": 1060, - "watchers_count": 1060, + "stargazers_count": 1061, + "watchers_count": 1061, "forks_count": 219, "forks": 219, - "watchers": 1060, + "watchers": 1061, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2020-09-25T20:13:51Z", + "updated_at": "2020-09-26T04:35:45Z", "pushed_at": "2020-09-25T15:32:01Z", - "stargazers_count": 603, - "watchers_count": 603, + "stargazers_count": 604, + "watchers_count": 604, "forks_count": 170, "forks": 170, - "watchers": 603, + "watchers": 604, "score": 0 }, { @@ -688,5 +688,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 298771178, + "name": "CVE-2020-1472", + "full_name": "striveben\/CVE-2020-1472", + "owner": { + "login": "striveben", + "id": 61238912, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/61238912?v=4", + "html_url": "https:\/\/github.com\/striveben" + }, + "html_url": "https:\/\/github.com\/striveben\/CVE-2020-1472", + "description": null, + "fork": false, + "created_at": "2020-09-26T08:31:47Z", + "updated_at": "2020-09-26T08:44:44Z", + "pushed_at": "2020-09-26T08:44:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17382.json b/2020/CVE-2020-17382.json index 93ea57f3cb..948a95988d 100644 --- a/2020/CVE-2020-17382.json +++ b/2020/CVE-2020-17382.json @@ -13,13 +13,13 @@ "description": "PoC exploits for CVE-2020-17382", "fork": false, "created_at": "2020-09-17T18:26:32Z", - "updated_at": "2020-09-25T23:46:35Z", + "updated_at": "2020-09-26T07:52:43Z", "pushed_at": "2020-09-24T08:47:44Z", - "stargazers_count": 26, - "watchers_count": 26, - "forks_count": 7, - "forks": 7, - "watchers": 26, + "stargazers_count": 32, + "watchers_count": 32, + "forks_count": 8, + "forks": 8, + "watchers": 32, "score": 0 }, { diff --git a/2020/CVE-2020-25273.json b/2020/CVE-2020-25273.json index 9ec123512c..5924182da1 100644 --- a/2020/CVE-2020-25273.json +++ b/2020/CVE-2020-25273.json @@ -13,8 +13,8 @@ "description": "Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.", "fork": false, "created_at": "2020-09-23T04:29:29Z", - "updated_at": "2020-09-23T04:34:25Z", - "pushed_at": "2020-09-23T04:34:22Z", + "updated_at": "2020-09-26T03:43:20Z", + "pushed_at": "2020-09-26T03:43:18Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index f310ea5546..54b0c740dd 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-25T07:44:09Z", + "updated_at": "2020-09-26T04:36:21Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 704, - "watchers_count": 704, + "stargazers_count": 705, + "watchers_count": 705, "forks_count": 174, "forks": 174, - "watchers": 704, + "watchers": 705, "score": 0 }, { diff --git a/2020/CVE-2020-3433.json b/2020/CVE-2020-3433.json index 0c94c0ba6f..bd5bce511d 100644 --- a/2020/CVE-2020-3433.json +++ b/2020/CVE-2020-3433.json @@ -13,13 +13,13 @@ "description": "PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-3435 ", "fork": false, "created_at": "2020-09-25T20:53:48Z", - "updated_at": "2020-09-25T20:55:58Z", + "updated_at": "2020-09-26T07:22:38Z", "pushed_at": "2020-09-25T20:55:17Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "forks": 1, - "watchers": 1, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9992.json b/2020/CVE-2020-9992.json index 48e6696510..c83b05e780 100644 --- a/2020/CVE-2020-9992.json +++ b/2020/CVE-2020-9992.json @@ -13,13 +13,13 @@ "description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device", "fork": false, "created_at": "2020-09-16T23:35:22Z", - "updated_at": "2020-09-25T23:32:59Z", + "updated_at": "2020-09-26T05:41:46Z", "pushed_at": "2020-09-23T14:52:06Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 6, "forks": 6, - "watchers": 31, + "watchers": 32, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index e6532a73ee..3c6dc32838 100644 --- a/README.md +++ b/README.md @@ -525,6 +525,7 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu - [johnpathe/zerologon-cve-2020-1472-notes](https://github.com/johnpathe/zerologon-cve-2020-1472-notes) - [t31m0/CVE-2020-1472](https://github.com/t31m0/CVE-2020-1472) - [grupooruss/CVE-2020-1472](https://github.com/grupooruss/CVE-2020-1472) +- [striveben/CVE-2020-1472](https://github.com/striveben/CVE-2020-1472) ### CVE-2020-1493