diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index 58ad877b4f..d2262aab19 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-09-08T03:06:41Z",
+ "updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
- "stargazers_count": 674,
- "watchers_count": 674,
+ "stargazers_count": 675,
+ "watchers_count": 675,
"forks_count": 165,
"forks": 165,
- "watchers": 674,
+ "watchers": 675,
"score": 0
},
{
diff --git a/2015/CVE-2015-0006.json b/2015/CVE-2015-0006.json
deleted file mode 100644
index 2975793041..0000000000
--- a/2015/CVE-2015-0006.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
- {
- "id": 19259219,
- "name": "imposter",
- "full_name": "bugch3ck\/imposter",
- "owner": {
- "login": "bugch3ck",
- "id": 4165895,
- "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4165895?v=4",
- "html_url": "https:\/\/github.com\/bugch3ck"
- },
- "html_url": "https:\/\/github.com\/bugch3ck\/imposter",
- "description": "Proof of concept for CVE-2015-0006. Fixed in MS15-005 https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2015\/ms15-005 .",
- "fork": false,
- "created_at": "2014-04-29T01:05:57Z",
- "updated_at": "2018-06-26T21:10:14Z",
- "pushed_at": "2014-06-07T23:45:44Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2015/CVE-2015-0235.json b/2015/CVE-2015-0235.json
index a04703be06..5404e89acc 100644
--- a/2015/CVE-2015-0235.json
+++ b/2015/CVE-2015-0235.json
@@ -1,188 +1,4 @@
[
- {
- "id": 29925728,
- "name": "ghost-checker",
- "full_name": "fser\/ghost-checker",
- "owner": {
- "login": "fser",
- "id": 774138,
- "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/774138?v=4",
- "html_url": "https:\/\/github.com\/fser"
- },
- "html_url": "https:\/\/github.com\/fser\/ghost-checker",
- "description": "Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security",
- "fork": false,
- "created_at": "2015-01-27T17:31:33Z",
- "updated_at": "2018-05-15T04:55:01Z",
- "pushed_at": "2015-01-27T17:35:16Z",
- "stargazers_count": 5,
- "watchers_count": 5,
- "forks_count": 1,
- "forks": 1,
- "watchers": 5,
- "score": 0
- },
- {
- "id": 29933656,
- "name": "CVE-2015-0235-cookbook",
- "full_name": "mikesplain\/CVE-2015-0235-cookbook",
- "owner": {
- "login": "mikesplain",
- "id": 881965,
- "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/881965?v=4",
- "html_url": "https:\/\/github.com\/mikesplain"
- },
- "html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
- "description": "A chef cookbook to test the GHOST vulnerability",
- "fork": false,
- "created_at": "2015-01-27T20:34:42Z",
- "updated_at": "2017-09-29T11:32:54Z",
- "pushed_at": "2015-01-27T21:41:24Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "forks_count": 1,
- "forks": 1,
- "watchers": 3,
- "score": 0
- },
- {
- "id": 29941036,
- "name": "CVE-2015-0235-test",
- "full_name": "aaronfay\/CVE-2015-0235-test",
- "owner": {
- "login": "aaronfay",
- "id": 1033941,
- "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1033941?v=4",
- "html_url": "https:\/\/github.com\/aaronfay"
- },
- "html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
- "description": "Ansible playbook to check vulnerability for CVE-2015-0235",
- "fork": false,
- "created_at": "2015-01-27T23:45:22Z",
- "updated_at": "2016-08-31T16:50:49Z",
- "pushed_at": "2015-01-29T03:33:29Z",
- "stargazers_count": 14,
- "watchers_count": 14,
- "forks_count": 3,
- "forks": 3,
- "watchers": 14,
- "score": 0
- },
- {
- "id": 29942046,
- "name": "ghost",
- "full_name": "piyokango\/ghost",
- "owner": {
- "login": "piyokango",
- "id": 10733273,
- "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10733273?v=4",
- "html_url": "https:\/\/github.com\/piyokango"
- },
- "html_url": "https:\/\/github.com\/piyokango\/ghost",
- "description": "glibc vulnerability GHOST(CVE-2015-0235) Affected software list",
- "fork": false,
- "created_at": "2015-01-28T00:14:35Z",
- "updated_at": "2015-08-13T21:27:35Z",
- "pushed_at": "2015-01-28T14:29:13Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "forks_count": 0,
- "forks": 0,
- "watchers": 2,
- "score": 0
- },
- {
- "id": 29948700,
- "name": "GHOSTCHECK-cve-2015-0235",
- "full_name": "LyricalSecurity\/GHOSTCHECK-cve-2015-0235",
- "owner": {
- "login": "LyricalSecurity",
- "id": 10375093,
- "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10375093?v=4",
- "html_url": "https:\/\/github.com\/LyricalSecurity"
- },
- "html_url": "https:\/\/github.com\/LyricalSecurity\/GHOSTCHECK-cve-2015-0235",
- "description": null,
- "fork": false,
- "created_at": "2015-01-28T03:30:21Z",
- "updated_at": "2020-04-23T22:26:31Z",
- "pushed_at": "2015-01-28T15:10:00Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "forks_count": 1,
- "forks": 1,
- "watchers": 1,
- "score": 0
- },
- {
- "id": 29950345,
- "name": "CVE-2015-0235_GHOST",
- "full_name": "mholzinger\/CVE-2015-0235_GHOST",
- "owner": {
- "login": "mholzinger",
- "id": 235958,
- "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/235958?v=4",
- "html_url": "https:\/\/github.com\/mholzinger"
- },
- "html_url": "https:\/\/github.com\/mholzinger\/CVE-2015-0235_GHOST",
- "description": null,
- "fork": false,
- "created_at": "2015-01-28T04:22:05Z",
- "updated_at": "2016-02-26T05:46:40Z",
- "pushed_at": "2015-01-28T05:26:34Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "forks_count": 1,
- "forks": 1,
- "watchers": 3,
- "score": 0
- },
- {
- "id": 29988916,
- "name": "ansible-CVE-2015-0235-GHOST",
- "full_name": "adherzog\/ansible-CVE-2015-0235-GHOST",
- "owner": {
- "login": "adherzog",
- "id": 1744181,
- "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1744181?v=4",
- "html_url": "https:\/\/github.com\/adherzog"
- },
- "html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST",
- "description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability",
- "fork": false,
- "created_at": "2015-01-28T21:22:33Z",
- "updated_at": "2015-01-28T21:23:35Z",
- "pushed_at": "2015-01-28T21:23:34Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
- {
- "id": 29993101,
- "name": "lenny-libc6",
- "full_name": "favoretti\/lenny-libc6",
- "owner": {
- "login": "favoretti",
- "id": 805046,
- "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/805046?v=4",
- "html_url": "https:\/\/github.com\/favoretti"
- },
- "html_url": "https:\/\/github.com\/favoretti\/lenny-libc6",
- "description": "CVE-2015-0235 patches lenny libc6 packages for amd64",
- "fork": false,
- "created_at": "2015-01-28T23:09:13Z",
- "updated_at": "2015-01-28T23:09:13Z",
- "pushed_at": "2015-01-28T23:11:57Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 30004399,
"name": "cfengine-CVE_2015_0235",
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index bc657121dc..fc61159d03 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-09-08T03:06:41Z",
+ "updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
- "stargazers_count": 674,
- "watchers_count": 674,
+ "stargazers_count": 675,
+ "watchers_count": 675,
"forks_count": 165,
"forks": 165,
- "watchers": 674,
+ "watchers": 675,
"score": 0
},
{
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 99dc4eea7f..8fac7a34fc 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-09-08T03:06:41Z",
+ "updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
- "stargazers_count": 674,
- "watchers_count": 674,
+ "stargazers_count": 675,
+ "watchers_count": 675,
"forks_count": 165,
"forks": 165,
- "watchers": 674,
+ "watchers": 675,
"score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-10388.json b/2018/CVE-2018-10388.json
index 1419b88a4b..7b008f66ea 100644
--- a/2018/CVE-2018-10388.json
+++ b/2018/CVE-2018-10388.json
@@ -17,8 +17,8 @@
"pushed_at": "2020-05-15T16:36:46Z",
"stargazers_count": 0,
"watchers_count": 0,
- "forks_count": 1,
- "forks": 1,
+ "forks_count": 2,
+ "forks": 2,
"watchers": 0,
"score": 0
}
diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json
index b9de7b4afa..3a94765bd9 100644
--- a/2018/CVE-2018-13379.json
+++ b/2018/CVE-2018-13379.json
@@ -82,8 +82,8 @@
"description": "CVE-2018-13379 Script for Nmap NSE.",
"fork": false,
"created_at": "2019-10-14T04:09:44Z",
- "updated_at": "2019-12-19T09:29:05Z",
- "pushed_at": "2019-11-21T22:10:33Z",
+ "updated_at": "2020-09-09T05:06:07Z",
+ "pushed_at": "2020-09-09T05:06:05Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 4300ca32f1..d53464a498 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-09-08T03:06:41Z",
+ "updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
- "stargazers_count": 674,
- "watchers_count": 674,
+ "stargazers_count": 675,
+ "watchers_count": 675,
"forks_count": 165,
"forks": 165,
- "watchers": 674,
+ "watchers": 675,
"score": 0
},
{
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index e960ea8baa..3a9c22d05f 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -2210,14 +2210,14 @@
{
"id": 206976374,
"name": "CVE-2019-0708-EXP-MSF-",
- "full_name": "qinggegeya\/CVE-2019-0708-EXP-MSF-",
+ "full_name": "qing-root\/CVE-2019-0708-EXP-MSF-",
"owner": {
- "login": "qinggegeya",
+ "login": "qing-root",
"id": 30001685,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30001685?v=4",
- "html_url": "https:\/\/github.com\/qinggegeya"
+ "html_url": "https:\/\/github.com\/qing-root"
},
- "html_url": "https:\/\/github.com\/qinggegeya\/CVE-2019-0708-EXP-MSF-",
+ "html_url": "https:\/\/github.com\/qing-root\/CVE-2019-0708-EXP-MSF-",
"description": "CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708",
"fork": false,
"created_at": "2019-09-07T14:02:50Z",
diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json
index 9886aadda7..ef6cafc7a3 100644
--- a/2019/CVE-2019-1458.json
+++ b/2019/CVE-2019-1458.json
@@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
- "updated_at": "2020-09-09T02:30:45Z",
+ "updated_at": "2020-09-09T06:54:41Z",
"pushed_at": "2020-03-04T07:05:24Z",
- "stargazers_count": 121,
- "watchers_count": 121,
+ "stargazers_count": 123,
+ "watchers_count": 123,
"forks_count": 50,
"forks": 50,
- "watchers": 121,
+ "watchers": 123,
"score": 0
},
{
diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json
index 94efaed2c2..efde0b5cf9 100644
--- a/2019/CVE-2019-18935.json
+++ b/2019/CVE-2019-18935.json
@@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
- "updated_at": "2020-08-31T16:45:38Z",
+ "updated_at": "2020-09-09T06:43:55Z",
"pushed_at": "2020-08-31T16:45:35Z",
- "stargazers_count": 150,
- "watchers_count": 150,
+ "stargazers_count": 151,
+ "watchers_count": 151,
"forks_count": 39,
"forks": 39,
- "watchers": 150,
+ "watchers": 151,
"score": 0
},
{
diff --git a/2019/CVE-2019-2107.json b/2019/CVE-2019-2107.json
index 5bc38fa472..0e18b99759 100644
--- a/2019/CVE-2019-2107.json
+++ b/2019/CVE-2019-2107.json
@@ -17,8 +17,8 @@
"pushed_at": "2019-07-25T08:01:07Z",
"stargazers_count": 309,
"watchers_count": 309,
- "forks_count": 95,
- "forks": 95,
+ "forks_count": 96,
+ "forks": 96,
"watchers": 309,
"score": 0
},
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 645395bd7c..ba5544d50d 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-09-08T03:06:41Z",
+ "updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
- "stargazers_count": 674,
- "watchers_count": 674,
+ "stargazers_count": 675,
+ "watchers_count": 675,
"forks_count": 165,
"forks": 165,
- "watchers": 674,
+ "watchers": 675,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json
index 50ee4cdf62..8b04c00ab5 100644
--- a/2019/CVE-2019-2725.json
+++ b/2019/CVE-2019-2725.json
@@ -312,13 +312,13 @@
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
"fork": false,
"created_at": "2019-06-24T08:33:07Z",
- "updated_at": "2020-09-05T21:03:52Z",
+ "updated_at": "2020-09-09T03:34:34Z",
"pushed_at": "2019-07-15T06:03:15Z",
- "stargazers_count": 60,
- "watchers_count": 60,
+ "stargazers_count": 59,
+ "watchers_count": 59,
"forks_count": 20,
"forks": 20,
- "watchers": 60,
+ "watchers": 59,
"score": 0
},
{
diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json
index 120809be24..8f7f5bc24d 100644
--- a/2020/CVE-2020-0041.json
+++ b/2020/CVE-2020-0041.json
@@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-10T21:34:16Z",
- "updated_at": "2020-08-30T14:18:31Z",
+ "updated_at": "2020-09-09T08:57:34Z",
"pushed_at": "2020-08-11T21:48:12Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"forks_count": 4,
"forks": 4,
- "watchers": 10,
+ "watchers": 12,
"score": 0
},
{
diff --git a/2020/CVE-2020-0114.json b/2020/CVE-2020-0114.json
index 201c1526fd..67def2f6c5 100644
--- a/2020/CVE-2020-0114.json
+++ b/2020/CVE-2020-0114.json
@@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-09-08T06:06:36Z",
- "updated_at": "2020-09-08T06:09:57Z",
+ "updated_at": "2020-09-09T06:43:33Z",
"pushed_at": "2020-09-08T06:09:54Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json
index b645d83eaa..23c3db0858 100644
--- a/2020/CVE-2020-0688.json
+++ b/2020/CVE-2020-0688.json
@@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
- "updated_at": "2020-09-06T12:43:34Z",
+ "updated_at": "2020-09-09T03:34:15Z",
"pushed_at": "2020-06-19T09:28:15Z",
- "stargazers_count": 216,
- "watchers_count": 216,
+ "stargazers_count": 215,
+ "watchers_count": 215,
"forks_count": 78,
"forks": 78,
- "watchers": 216,
+ "watchers": 215,
"score": 0
},
{
diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json
index 50f4d7f6e8..860c488871 100644
--- a/2020/CVE-2020-0787.json
+++ b/2020/CVE-2020-0787.json
@@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
- "updated_at": "2020-09-08T15:01:33Z",
+ "updated_at": "2020-09-09T06:15:02Z",
"pushed_at": "2020-06-18T00:42:57Z",
- "stargazers_count": 411,
- "watchers_count": 411,
+ "stargazers_count": 412,
+ "watchers_count": 412,
"forks_count": 98,
"forks": 98,
- "watchers": 411,
+ "watchers": 412,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index 7181cdafc1..1f2abed9b4 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -86,8 +86,8 @@
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 529,
"watchers_count": 529,
- "forks_count": 181,
- "forks": 181,
+ "forks_count": 180,
+ "forks": 180,
"watchers": 529,
"score": 0
},
@@ -358,13 +358,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
- "updated_at": "2020-09-09T02:55:28Z",
+ "updated_at": "2020-09-09T06:54:44Z",
"pushed_at": "2020-03-14T10:04:59Z",
- "stargazers_count": 249,
- "watchers_count": 249,
- "forks_count": 100,
- "forks": 100,
- "watchers": 249,
+ "stargazers_count": 251,
+ "watchers_count": 251,
+ "forks_count": 101,
+ "forks": 101,
+ "watchers": 251,
"score": 0
},
{
diff --git a/2020/CVE-2020-0890.json b/2020/CVE-2020-0890.json
index a04356c35d..e0d8748eb8 100644
--- a/2020/CVE-2020-0890.json
+++ b/2020/CVE-2020-0890.json
@@ -13,13 +13,13 @@
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
"fork": false,
"created_at": "2020-09-03T14:45:51Z",
- "updated_at": "2020-09-09T02:36:11Z",
+ "updated_at": "2020-09-09T07:20:59Z",
"pushed_at": "2020-09-08T20:01:05Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"forks_count": 6,
"forks": 6,
- "watchers": 22,
+ "watchers": 23,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json
index 51e95a97f7..595157fb04 100644
--- a/2020/CVE-2020-11651.json
+++ b/2020/CVE-2020-11651.json
@@ -105,13 +105,13 @@
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
"fork": false,
"created_at": "2020-05-04T11:52:28Z",
- "updated_at": "2020-09-08T08:33:48Z",
+ "updated_at": "2020-09-09T06:46:02Z",
"pushed_at": "2020-07-10T09:30:47Z",
- "stargazers_count": 58,
- "watchers_count": 58,
+ "stargazers_count": 59,
+ "watchers_count": 59,
"forks_count": 26,
"forks": 26,
- "watchers": 58,
+ "watchers": 59,
"score": 0
},
{
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 10336c8225..c2243d36fe 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2020-09-08T03:06:41Z",
+ "updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
- "stargazers_count": 674,
- "watchers_count": 674,
+ "stargazers_count": 675,
+ "watchers_count": 675,
"forks_count": 165,
"forks": 165,
- "watchers": 674,
+ "watchers": 675,
"score": 0
},
{
@@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
- "updated_at": "2020-09-03T07:07:18Z",
+ "updated_at": "2020-09-09T06:42:52Z",
"pushed_at": "2020-04-07T03:32:24Z",
- "stargazers_count": 222,
- "watchers_count": 222,
+ "stargazers_count": 223,
+ "watchers_count": 223,
"forks_count": 55,
"forks": 55,
- "watchers": 222,
+ "watchers": 223,
"score": 0
},
{
@@ -128,13 +128,13 @@
"description": "Use shell to build weblogic debug environment for CVE-2020-2551",
"fork": false,
"created_at": "2020-04-06T10:47:35Z",
- "updated_at": "2020-08-26T02:34:02Z",
+ "updated_at": "2020-09-09T03:15:12Z",
"pushed_at": "2020-04-06T10:59:36Z",
- "stargazers_count": 13,
- "watchers_count": 13,
+ "stargazers_count": 14,
+ "watchers_count": 14,
"forks_count": 1,
"forks": 1,
- "watchers": 13,
+ "watchers": 14,
"score": 0
},
{
diff --git a/README.md b/README.md
index eced62094e..997a7a1306 100644
--- a/README.md
+++ b/README.md
@@ -2312,7 +2312,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF)
- [adkinguzi/CVE-2019-0708-BlueKeep](https://github.com/adkinguzi/CVE-2019-0708-BlueKeep)
- [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708)
-- [qinggegeya/CVE-2019-0708-EXP-MSF-](https://github.com/qinggegeya/CVE-2019-0708-EXP-MSF-)
+- [qing-root/CVE-2019-0708-EXP-MSF-](https://github.com/qing-root/CVE-2019-0708-EXP-MSF-)
- [distance-vector/CVE-2019-0708](https://github.com/distance-vector/CVE-2019-0708)
- [0xFlag/CVE-2019-0708-test](https://github.com/0xFlag/CVE-2019-0708-test)
- [1aa87148377/CVE-2019-0708](https://github.com/1aa87148377/CVE-2019-0708)
@@ -11967,14 +11967,6 @@ Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing
## 2015
-### CVE-2015-0006
-
-
-The Network Location Awareness (NLA) service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not perform mutual authentication to determine a domain connection, which allows remote attackers to trigger an unintended permissive configuration by spoofing DNS and LDAP responses on a local network, aka "NLA Security Feature Bypass Vulnerability."
-
-
-- [bugch3ck/imposter](https://github.com/bugch3ck/imposter)
-
### CVE-2015-0057
@@ -12016,14 +12008,6 @@ Use-after-free vulnerability in the process_nested_data function in ext/standard
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
-- [fser/ghost-checker](https://github.com/fser/ghost-checker)
-- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
-- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
-- [piyokango/ghost](https://github.com/piyokango/ghost)
-- [LyricalSecurity/GHOSTCHECK-cve-2015-0235](https://github.com/LyricalSecurity/GHOSTCHECK-cve-2015-0235)
-- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
-- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
-- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)