diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 58ad877b4f..d2262aab19 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-08T03:06:41Z", + "updated_at": "2020-09-09T04:32:14Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 674, - "watchers_count": 674, + "stargazers_count": 675, + "watchers_count": 675, "forks_count": 165, "forks": 165, - "watchers": 674, + "watchers": 675, "score": 0 }, { diff --git a/2015/CVE-2015-0006.json b/2015/CVE-2015-0006.json deleted file mode 100644 index 2975793041..0000000000 --- a/2015/CVE-2015-0006.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 19259219, - "name": "imposter", - "full_name": "bugch3ck\/imposter", - "owner": { - "login": "bugch3ck", - "id": 4165895, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4165895?v=4", - "html_url": "https:\/\/github.com\/bugch3ck" - }, - "html_url": "https:\/\/github.com\/bugch3ck\/imposter", - "description": "Proof of concept for CVE-2015-0006. Fixed in MS15-005 https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2015\/ms15-005 .", - "fork": false, - "created_at": "2014-04-29T01:05:57Z", - "updated_at": "2018-06-26T21:10:14Z", - "pushed_at": "2014-06-07T23:45:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2015/CVE-2015-0235.json b/2015/CVE-2015-0235.json index a04703be06..5404e89acc 100644 --- a/2015/CVE-2015-0235.json +++ b/2015/CVE-2015-0235.json @@ -1,188 +1,4 @@ [ - { - "id": 29925728, - "name": "ghost-checker", - "full_name": "fser\/ghost-checker", - "owner": { - "login": "fser", - "id": 774138, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/774138?v=4", - "html_url": "https:\/\/github.com\/fser" - }, - "html_url": "https:\/\/github.com\/fser\/ghost-checker", - "description": "Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security", - "fork": false, - "created_at": "2015-01-27T17:31:33Z", - "updated_at": "2018-05-15T04:55:01Z", - "pushed_at": "2015-01-27T17:35:16Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 1, - "forks": 1, - "watchers": 5, - "score": 0 - }, - { - "id": 29933656, - "name": "CVE-2015-0235-cookbook", - "full_name": "mikesplain\/CVE-2015-0235-cookbook", - "owner": { - "login": "mikesplain", - "id": 881965, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/881965?v=4", - "html_url": "https:\/\/github.com\/mikesplain" - }, - "html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook", - "description": "A chef cookbook to test the GHOST vulnerability", - "fork": false, - "created_at": "2015-01-27T20:34:42Z", - "updated_at": "2017-09-29T11:32:54Z", - "pushed_at": "2015-01-27T21:41:24Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, - { - "id": 29941036, - "name": "CVE-2015-0235-test", - "full_name": "aaronfay\/CVE-2015-0235-test", - "owner": { - "login": "aaronfay", - "id": 1033941, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1033941?v=4", - "html_url": "https:\/\/github.com\/aaronfay" - }, - "html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test", - "description": "Ansible playbook to check vulnerability for CVE-2015-0235", - "fork": false, - "created_at": "2015-01-27T23:45:22Z", - "updated_at": "2016-08-31T16:50:49Z", - "pushed_at": "2015-01-29T03:33:29Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 3, - "forks": 3, - "watchers": 14, - "score": 0 - }, - { - "id": 29942046, - "name": "ghost", - "full_name": "piyokango\/ghost", - "owner": { - "login": "piyokango", - "id": 10733273, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10733273?v=4", - "html_url": "https:\/\/github.com\/piyokango" - }, - "html_url": "https:\/\/github.com\/piyokango\/ghost", - "description": "glibc vulnerability GHOST(CVE-2015-0235) Affected software list", - "fork": false, - "created_at": "2015-01-28T00:14:35Z", - "updated_at": "2015-08-13T21:27:35Z", - "pushed_at": "2015-01-28T14:29:13Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 29948700, - "name": "GHOSTCHECK-cve-2015-0235", - "full_name": "LyricalSecurity\/GHOSTCHECK-cve-2015-0235", - "owner": { - "login": "LyricalSecurity", - "id": 10375093, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10375093?v=4", - "html_url": "https:\/\/github.com\/LyricalSecurity" - }, - "html_url": "https:\/\/github.com\/LyricalSecurity\/GHOSTCHECK-cve-2015-0235", - "description": null, - "fork": false, - "created_at": "2015-01-28T03:30:21Z", - "updated_at": "2020-04-23T22:26:31Z", - "pushed_at": "2015-01-28T15:10:00Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 29950345, - "name": "CVE-2015-0235_GHOST", - "full_name": "mholzinger\/CVE-2015-0235_GHOST", - "owner": { - "login": "mholzinger", - "id": 235958, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/235958?v=4", - "html_url": "https:\/\/github.com\/mholzinger" - }, - "html_url": "https:\/\/github.com\/mholzinger\/CVE-2015-0235_GHOST", - "description": null, - "fork": false, - "created_at": "2015-01-28T04:22:05Z", - "updated_at": "2016-02-26T05:46:40Z", - "pushed_at": "2015-01-28T05:26:34Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, - { - "id": 29988916, - "name": "ansible-CVE-2015-0235-GHOST", - "full_name": "adherzog\/ansible-CVE-2015-0235-GHOST", - "owner": { - "login": "adherzog", - "id": 1744181, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1744181?v=4", - "html_url": "https:\/\/github.com\/adherzog" - }, - "html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST", - "description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability", - "fork": false, - "created_at": "2015-01-28T21:22:33Z", - "updated_at": "2015-01-28T21:23:35Z", - "pushed_at": "2015-01-28T21:23:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 29993101, - "name": "lenny-libc6", - "full_name": "favoretti\/lenny-libc6", - "owner": { - "login": "favoretti", - "id": 805046, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/805046?v=4", - "html_url": "https:\/\/github.com\/favoretti" - }, - "html_url": "https:\/\/github.com\/favoretti\/lenny-libc6", - "description": "CVE-2015-0235 patches lenny libc6 packages for amd64", - "fork": false, - "created_at": "2015-01-28T23:09:13Z", - "updated_at": "2015-01-28T23:09:13Z", - "pushed_at": "2015-01-28T23:11:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 30004399, "name": "cfengine-CVE_2015_0235", diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index bc657121dc..fc61159d03 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-08T03:06:41Z", + "updated_at": "2020-09-09T04:32:14Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 674, - "watchers_count": 674, + "stargazers_count": 675, + "watchers_count": 675, "forks_count": 165, "forks": 165, - "watchers": 674, + "watchers": 675, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 99dc4eea7f..8fac7a34fc 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-08T03:06:41Z", + "updated_at": "2020-09-09T04:32:14Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 674, - "watchers_count": 674, + "stargazers_count": 675, + "watchers_count": 675, "forks_count": 165, "forks": 165, - "watchers": 674, + "watchers": 675, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-10388.json b/2018/CVE-2018-10388.json index 1419b88a4b..7b008f66ea 100644 --- a/2018/CVE-2018-10388.json +++ b/2018/CVE-2018-10388.json @@ -17,8 +17,8 @@ "pushed_at": "2020-05-15T16:36:46Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 0, "score": 0 } diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json index b9de7b4afa..3a94765bd9 100644 --- a/2018/CVE-2018-13379.json +++ b/2018/CVE-2018-13379.json @@ -82,8 +82,8 @@ "description": "CVE-2018-13379 Script for Nmap NSE.", "fork": false, "created_at": "2019-10-14T04:09:44Z", - "updated_at": "2019-12-19T09:29:05Z", - "pushed_at": "2019-11-21T22:10:33Z", + "updated_at": "2020-09-09T05:06:07Z", + "pushed_at": "2020-09-09T05:06:05Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 4300ca32f1..d53464a498 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-08T03:06:41Z", + "updated_at": "2020-09-09T04:32:14Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 674, - "watchers_count": 674, + "stargazers_count": 675, + "watchers_count": 675, "forks_count": 165, "forks": 165, - "watchers": 674, + "watchers": 675, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index e960ea8baa..3a9c22d05f 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2210,14 +2210,14 @@ { "id": 206976374, "name": "CVE-2019-0708-EXP-MSF-", - "full_name": "qinggegeya\/CVE-2019-0708-EXP-MSF-", + "full_name": "qing-root\/CVE-2019-0708-EXP-MSF-", "owner": { - "login": "qinggegeya", + "login": "qing-root", "id": 30001685, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30001685?v=4", - "html_url": "https:\/\/github.com\/qinggegeya" + "html_url": "https:\/\/github.com\/qing-root" }, - "html_url": "https:\/\/github.com\/qinggegeya\/CVE-2019-0708-EXP-MSF-", + "html_url": "https:\/\/github.com\/qing-root\/CVE-2019-0708-EXP-MSF-", "description": "CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708", "fork": false, "created_at": "2019-09-07T14:02:50Z", diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index 9886aadda7..ef6cafc7a3 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -13,13 +13,13 @@ "description": "POC for cve-2019-1458", "fork": false, "created_at": "2020-03-03T17:55:07Z", - "updated_at": "2020-09-09T02:30:45Z", + "updated_at": "2020-09-09T06:54:41Z", "pushed_at": "2020-03-04T07:05:24Z", - "stargazers_count": 121, - "watchers_count": 121, + "stargazers_count": 123, + "watchers_count": 123, "forks_count": 50, "forks": 50, - "watchers": 121, + "watchers": 123, "score": 0 }, { diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 94efaed2c2..efde0b5cf9 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -36,13 +36,13 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2020-08-31T16:45:38Z", + "updated_at": "2020-09-09T06:43:55Z", "pushed_at": "2020-08-31T16:45:35Z", - "stargazers_count": 150, - "watchers_count": 150, + "stargazers_count": 151, + "watchers_count": 151, "forks_count": 39, "forks": 39, - "watchers": 150, + "watchers": 151, "score": 0 }, { diff --git a/2019/CVE-2019-2107.json b/2019/CVE-2019-2107.json index 5bc38fa472..0e18b99759 100644 --- a/2019/CVE-2019-2107.json +++ b/2019/CVE-2019-2107.json @@ -17,8 +17,8 @@ "pushed_at": "2019-07-25T08:01:07Z", "stargazers_count": 309, "watchers_count": 309, - "forks_count": 95, - "forks": 95, + "forks_count": 96, + "forks": 96, "watchers": 309, "score": 0 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 645395bd7c..ba5544d50d 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-08T03:06:41Z", + "updated_at": "2020-09-09T04:32:14Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 674, - "watchers_count": 674, + "stargazers_count": 675, + "watchers_count": 675, "forks_count": 165, "forks": 165, - "watchers": 674, + "watchers": 675, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 50ee4cdf62..8b04c00ab5 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -312,13 +312,13 @@ "description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ", "fork": false, "created_at": "2019-06-24T08:33:07Z", - "updated_at": "2020-09-05T21:03:52Z", + "updated_at": "2020-09-09T03:34:34Z", "pushed_at": "2019-07-15T06:03:15Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 59, + "watchers_count": 59, "forks_count": 20, "forks": 20, - "watchers": 60, + "watchers": 59, "score": 0 }, { diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json index 120809be24..8f7f5bc24d 100644 --- a/2020/CVE-2020-0041.json +++ b/2020/CVE-2020-0041.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2020-08-10T21:34:16Z", - "updated_at": "2020-08-30T14:18:31Z", + "updated_at": "2020-09-09T08:57:34Z", "pushed_at": "2020-08-11T21:48:12Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 4, "forks": 4, - "watchers": 10, + "watchers": 12, "score": 0 }, { diff --git a/2020/CVE-2020-0114.json b/2020/CVE-2020-0114.json index 201c1526fd..67def2f6c5 100644 --- a/2020/CVE-2020-0114.json +++ b/2020/CVE-2020-0114.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-09-08T06:06:36Z", - "updated_at": "2020-09-08T06:09:57Z", + "updated_at": "2020-09-09T06:43:33Z", "pushed_at": "2020-09-08T06:09:54Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index b645d83eaa..23c3db0858 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -59,13 +59,13 @@ "description": "cve-2020-0688", "fork": false, "created_at": "2020-02-27T02:54:27Z", - "updated_at": "2020-09-06T12:43:34Z", + "updated_at": "2020-09-09T03:34:15Z", "pushed_at": "2020-06-19T09:28:15Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 215, + "watchers_count": 215, "forks_count": 78, "forks": 78, - "watchers": 216, + "watchers": 215, "score": 0 }, { diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 50f4d7f6e8..860c488871 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,13 +13,13 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2020-09-08T15:01:33Z", + "updated_at": "2020-09-09T06:15:02Z", "pushed_at": "2020-06-18T00:42:57Z", - "stargazers_count": 411, - "watchers_count": 411, + "stargazers_count": 412, + "watchers_count": 412, "forks_count": 98, "forks": 98, - "watchers": 411, + "watchers": 412, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 7181cdafc1..1f2abed9b4 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -86,8 +86,8 @@ "pushed_at": "2020-03-13T09:54:16Z", "stargazers_count": 529, "watchers_count": 529, - "forks_count": 181, - "forks": 181, + "forks_count": 180, + "forks": 180, "watchers": 529, "score": 0 }, @@ -358,13 +358,13 @@ "description": "PoC for triggering buffer overflow via CVE-2020-0796", "fork": false, "created_at": "2020-03-12T18:34:40Z", - "updated_at": "2020-09-09T02:55:28Z", + "updated_at": "2020-09-09T06:54:44Z", "pushed_at": "2020-03-14T10:04:59Z", - "stargazers_count": 249, - "watchers_count": 249, - "forks_count": 100, - "forks": 100, - "watchers": 249, + "stargazers_count": 251, + "watchers_count": 251, + "forks_count": 101, + "forks": 101, + "watchers": 251, "score": 0 }, { diff --git a/2020/CVE-2020-0890.json b/2020/CVE-2020-0890.json index a04356c35d..e0d8748eb8 100644 --- a/2020/CVE-2020-0890.json +++ b/2020/CVE-2020-0890.json @@ -13,13 +13,13 @@ "description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code", "fork": false, "created_at": "2020-09-03T14:45:51Z", - "updated_at": "2020-09-09T02:36:11Z", + "updated_at": "2020-09-09T07:20:59Z", "pushed_at": "2020-09-08T20:01:05Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 6, "forks": 6, - "watchers": 22, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json index 51e95a97f7..595157fb04 100644 --- a/2020/CVE-2020-11651.json +++ b/2020/CVE-2020-11651.json @@ -105,13 +105,13 @@ "description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652", "fork": false, "created_at": "2020-05-04T11:52:28Z", - "updated_at": "2020-09-08T08:33:48Z", + "updated_at": "2020-09-09T06:46:02Z", "pushed_at": "2020-07-10T09:30:47Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 59, + "watchers_count": 59, "forks_count": 26, "forks": 26, - "watchers": 58, + "watchers": 59, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 10336c8225..c2243d36fe 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-08T03:06:41Z", + "updated_at": "2020-09-09T04:32:14Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 674, - "watchers_count": 674, + "stargazers_count": 675, + "watchers_count": 675, "forks_count": 165, "forks": 165, - "watchers": 674, + "watchers": 675, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Weblogic IIOP CVE-2020-2551", "fork": false, "created_at": "2020-02-28T08:46:21Z", - "updated_at": "2020-09-03T07:07:18Z", + "updated_at": "2020-09-09T06:42:52Z", "pushed_at": "2020-04-07T03:32:24Z", - "stargazers_count": 222, - "watchers_count": 222, + "stargazers_count": 223, + "watchers_count": 223, "forks_count": 55, "forks": 55, - "watchers": 222, + "watchers": 223, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "Use shell to build weblogic debug environment for CVE-2020-2551", "fork": false, "created_at": "2020-04-06T10:47:35Z", - "updated_at": "2020-08-26T02:34:02Z", + "updated_at": "2020-09-09T03:15:12Z", "pushed_at": "2020-04-06T10:59:36Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 1, "forks": 1, - "watchers": 13, + "watchers": 14, "score": 0 }, { diff --git a/README.md b/README.md index eced62094e..997a7a1306 100644 --- a/README.md +++ b/README.md @@ -2312,7 +2312,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly - [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF) - [adkinguzi/CVE-2019-0708-BlueKeep](https://github.com/adkinguzi/CVE-2019-0708-BlueKeep) - [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708) -- [qinggegeya/CVE-2019-0708-EXP-MSF-](https://github.com/qinggegeya/CVE-2019-0708-EXP-MSF-) +- [qing-root/CVE-2019-0708-EXP-MSF-](https://github.com/qing-root/CVE-2019-0708-EXP-MSF-) - [distance-vector/CVE-2019-0708](https://github.com/distance-vector/CVE-2019-0708) - [0xFlag/CVE-2019-0708-test](https://github.com/0xFlag/CVE-2019-0708-test) - [1aa87148377/CVE-2019-0708](https://github.com/1aa87148377/CVE-2019-0708) @@ -11967,14 +11967,6 @@ Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing ## 2015 -### CVE-2015-0006 - - -The Network Location Awareness (NLA) service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not perform mutual authentication to determine a domain connection, which allows remote attackers to trigger an unintended permissive configuration by spoofing DNS and LDAP responses on a local network, aka "NLA Security Feature Bypass Vulnerability." - - -- [bugch3ck/imposter](https://github.com/bugch3ck/imposter) - ### CVE-2015-0057 @@ -12016,14 +12008,6 @@ Use-after-free vulnerability in the process_nested_data function in ext/standard Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST." -- [fser/ghost-checker](https://github.com/fser/ghost-checker) -- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook) -- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test) -- [piyokango/ghost](https://github.com/piyokango/ghost) -- [LyricalSecurity/GHOSTCHECK-cve-2015-0235](https://github.com/LyricalSecurity/GHOSTCHECK-cve-2015-0235) -- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST) -- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST) -- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6) - [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235) - [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc) - [F88/ghostbusters15](https://github.com/F88/ghostbusters15)