From a8ea188655f4241161e90eba2c86417b563677b6 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 18 Jul 2020 12:08:36 +0900 Subject: [PATCH] Auto Update 2020/07/18 12:08:36 --- 2014/CVE-2014-4210.json | 8 ++--- 2016/CVE-2016-0638.json | 8 ++--- 2016/CVE-2016-4622.json | 4 +-- 2017/CVE-2017-3248.json | 8 ++--- 2018/CVE-2018-2380.json | 8 ++--- 2018/CVE-2018-2628.json | 8 ++--- 2018/CVE-2018-4233.json | 4 +-- 2018/CVE-2018-4441.json | 4 +-- 2019/CVE-2019-0708.json | 16 +++++----- 2019/CVE-2019-11043.json | 8 ++--- 2019/CVE-2019-17558.json | 8 ++--- 2019/CVE-2019-2618.json | 8 ++--- 2020/CVE-2020-0041.json | 8 ++--- 2020/CVE-2020-0796.json | 23 --------------- 2020/CVE-2020-1350.json | 64 ++++++++++++++++++++++++++++++++++------ 2020/CVE-2020-1362.json | 12 ++++---- 2020/CVE-2020-1938.json | 31 ++++++++++++++++--- 2020/CVE-2020-2551.json | 8 ++--- 2020/CVE-2020-5902.json | 16 +++++----- 2020/CVE-2020-6287.json | 8 ++--- 2020/CVE-2020-9484.json | 8 ++--- README.md | 4 ++- 22 files changed, 161 insertions(+), 113 deletions(-) diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 42cd10868c..9f9e43fa7f 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-17T09:07:28Z", + "updated_at": "2020-07-18T02:31:28Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 507, - "watchers_count": 507, + "stargazers_count": 508, + "watchers_count": 508, "forks_count": 123, "forks": 123, - "watchers": 507, + "watchers": 508, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 93df8c9807..397a54f8ab 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-17T09:07:28Z", + "updated_at": "2020-07-18T02:31:28Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 507, - "watchers_count": 507, + "stargazers_count": 508, + "watchers_count": 508, "forks_count": 123, "forks": 123, - "watchers": 507, + "watchers": 508, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-4622.json b/2016/CVE-2016-4622.json index b1f07520b9..93c7e00180 100644 --- a/2016/CVE-2016-4622.json +++ b/2016/CVE-2016-4622.json @@ -17,8 +17,8 @@ "pushed_at": "2016-10-27T20:23:15Z", "stargazers_count": 75, "watchers_count": 75, - "forks_count": 36, - "forks": 36, + "forks_count": 35, + "forks": 35, "watchers": 75, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 65fc6b6b09..417552c791 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-17T09:07:28Z", + "updated_at": "2020-07-18T02:31:28Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 507, - "watchers_count": 507, + "stargazers_count": 508, + "watchers_count": 508, "forks_count": 123, "forks": 123, - "watchers": 507, + "watchers": 508, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2380.json b/2018/CVE-2018-2380.json index e0a22787d4..891e9e6665 100644 --- a/2018/CVE-2018-2380.json +++ b/2018/CVE-2018-2380.json @@ -13,13 +13,13 @@ "description": "PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM", "fork": false, "created_at": "2018-03-14T09:20:21Z", - "updated_at": "2020-05-15T10:26:19Z", + "updated_at": "2020-07-17T21:36:44Z", "pushed_at": "2018-03-14T12:13:43Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 15, "forks": 15, - "watchers": 46, + "watchers": 47, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index f91c3147c7..b316b125f6 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-17T09:07:28Z", + "updated_at": "2020-07-18T02:31:28Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 507, - "watchers_count": 507, + "stargazers_count": 508, + "watchers_count": 508, "forks_count": 123, "forks": 123, - "watchers": 507, + "watchers": 508, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index 4d7476eef5..af2941d2ca 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -17,8 +17,8 @@ "pushed_at": "2018-08-17T23:31:46Z", "stargazers_count": 152, "watchers_count": 152, - "forks_count": 31, - "forks": 31, + "forks_count": 30, + "forks": 30, "watchers": 152, "score": 0 } diff --git a/2018/CVE-2018-4441.json b/2018/CVE-2018-4441.json index b64b48de50..3e62241181 100644 --- a/2018/CVE-2018-4441.json +++ b/2018/CVE-2018-4441.json @@ -17,8 +17,8 @@ "pushed_at": "2019-03-08T18:42:56Z", "stargazers_count": 197, "watchers_count": 197, - "forks_count": 56, - "forks": 56, + "forks_count": 55, + "forks": 55, "watchers": 197, "score": 0 } diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 621ba1f3f4..24c74c209a 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -615,8 +615,8 @@ "pushed_at": "2019-05-16T00:52:51Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 3, - "forks": 3, + "forks_count": 2, + "forks": 2, "watchers": 0, "score": 0 }, @@ -638,8 +638,8 @@ "pushed_at": "2019-05-16T01:00:46Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 1, - "forks": 1, + "forks_count": 0, + "forks": 0, "watchers": 1, "score": 0 }, @@ -1600,13 +1600,13 @@ "description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits", "fork": false, "created_at": "2019-05-31T00:04:12Z", - "updated_at": "2020-06-30T04:34:11Z", + "updated_at": "2020-07-17T21:12:13Z", "pushed_at": "2020-05-09T09:49:14Z", - "stargazers_count": 330, - "watchers_count": 330, + "stargazers_count": 331, + "watchers_count": 331, "forks_count": 116, "forks": 116, - "watchers": 330, + "watchers": 331, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 7f45fd26b3..03fe560236 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2020-07-17T19:37:12Z", + "updated_at": "2020-07-17T22:57:34Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1594, - "watchers_count": 1594, + "stargazers_count": 1595, + "watchers_count": 1595, "forks_count": 229, "forks": 229, - "watchers": 1594, + "watchers": 1595, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index ddefd6a06d..1d94a6ef56 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-07-17T09:06:12Z", + "updated_at": "2020-07-18T03:06:03Z", "pushed_at": "2020-07-14T10:20:14Z", - "stargazers_count": 1291, - "watchers_count": 1291, + "stargazers_count": 1294, + "watchers_count": 1294, "forks_count": 325, "forks": 325, - "watchers": 1291, + "watchers": 1294, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index ffad605d72..109b8fc6b6 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-17T09:07:28Z", + "updated_at": "2020-07-18T02:31:28Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 507, - "watchers_count": 507, + "stargazers_count": 508, + "watchers_count": 508, "forks_count": 123, "forks": 123, - "watchers": 507, + "watchers": 508, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json index 8dd37b271d..21a6351778 100644 --- a/2020/CVE-2020-0041.json +++ b/2020/CVE-2020-0041.json @@ -13,13 +13,13 @@ "description": "Exploits for Android Binder bug CVE-2020-0041", "fork": false, "created_at": "2020-03-31T17:53:57Z", - "updated_at": "2020-07-15T19:27:41Z", + "updated_at": "2020-07-18T01:40:41Z", "pushed_at": "2020-04-08T08:55:30Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 119, + "watchers_count": 119, "forks_count": 35, "forks": 35, - "watchers": 118, + "watchers": 119, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 5793c80afd..8b8e5c0ed7 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -114,29 +114,6 @@ "watchers": 10, "score": 0 }, - { - "id": 246641886, - "name": "NSE-scripts", - "full_name": "pr4jwal\/NSE-scripts", - "owner": { - "login": "pr4jwal", - "id": 4672886, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4672886?v=4", - "html_url": "https:\/\/github.com\/pr4jwal" - }, - "html_url": "https:\/\/github.com\/pr4jwal\/NSE-scripts", - "description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"", - "fork": false, - "created_at": "2020-03-11T17:51:29Z", - "updated_at": "2020-07-17T20:58:18Z", - "pushed_at": "2020-07-17T20:58:16Z", - "stargazers_count": 21, - "watchers_count": 21, - "forks_count": 7, - "forks": 7, - "watchers": 21, - "score": 0 - }, { "id": 246652992, "name": "cve-2020-0796", diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index f67d1f8820..e3b14138d4 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -1,4 +1,27 @@ [ + { + "id": 246641886, + "name": "NSE-scripts", + "full_name": "pr4jwal\/NSE-scripts", + "owner": { + "login": "pr4jwal", + "id": 4672886, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4672886?v=4", + "html_url": "https:\/\/github.com\/pr4jwal" + }, + "html_url": "https:\/\/github.com\/pr4jwal\/NSE-scripts", + "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST", + "fork": false, + "created_at": "2020-03-11T17:51:29Z", + "updated_at": "2020-07-17T21:12:11Z", + "pushed_at": "2020-07-17T20:58:16Z", + "stargazers_count": 21, + "watchers_count": 21, + "forks_count": 7, + "forks": 7, + "watchers": 21, + "score": 0 + }, { "id": 279670211, "name": "CVE-2020-1350", @@ -13,13 +36,13 @@ "description": "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.", "fork": false, "created_at": "2020-07-14T19:02:25Z", - "updated_at": "2020-07-17T20:56:51Z", - "pushed_at": "2020-07-16T23:42:18Z", - "stargazers_count": 181, - "watchers_count": 181, + "updated_at": "2020-07-18T02:36:43Z", + "pushed_at": "2020-07-17T23:43:01Z", + "stargazers_count": 182, + "watchers_count": 182, "forks_count": 56, "forks": 56, - "watchers": 181, + "watchers": 182, "score": 0 }, { @@ -45,6 +68,29 @@ "watchers": 5, "score": 0 }, + { + "id": 279701266, + "name": "Fake_CVE-2020-1350", + "full_name": "zoomerxsec\/Fake_CVE-2020-1350", + "owner": { + "login": "zoomerxsec", + "id": 56858864, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/56858864?v=4", + "html_url": "https:\/\/github.com\/zoomerxsec" + }, + "html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350", + "description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.", + "fork": false, + "created_at": "2020-07-14T21:55:57Z", + "updated_at": "2020-07-17T21:57:11Z", + "pushed_at": "2020-07-17T21:57:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 279708493, "name": "cve-2020-1350", @@ -151,13 +197,13 @@ "description": "A denial-of-service proof-of-concept for CVE-2020-1350", "fork": false, "created_at": "2020-07-15T23:00:00Z", - "updated_at": "2020-07-17T20:58:01Z", + "updated_at": "2020-07-17T23:51:09Z", "pushed_at": "2020-07-17T13:07:29Z", - "stargazers_count": 140, - "watchers_count": 140, + "stargazers_count": 141, + "watchers_count": 141, "forks_count": 28, "forks": 28, - "watchers": 140, + "watchers": 141, "score": 0 }, { diff --git a/2020/CVE-2020-1362.json b/2020/CVE-2020-1362.json index 5e5a3d1cdc..72e6d052da 100644 --- a/2020/CVE-2020-1362.json +++ b/2020/CVE-2020-1362.json @@ -13,13 +13,13 @@ "description": "writeup of CVE-2020-1362", "fork": false, "created_at": "2020-07-17T07:35:05Z", - "updated_at": "2020-07-17T18:25:33Z", + "updated_at": "2020-07-18T02:07:42Z", "pushed_at": "2020-07-17T07:54:26Z", - "stargazers_count": 38, - "watchers_count": 38, - "forks_count": 8, - "forks": 8, - "watchers": 38, + "stargazers_count": 46, + "watchers_count": 46, + "forks_count": 11, + "forks": 11, + "watchers": 46, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 86d317b063..2585202a11 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1938", "fork": false, "created_at": "2020-02-20T16:32:52Z", - "updated_at": "2020-07-14T09:25:31Z", + "updated_at": "2020-07-18T00:25:59Z", "pushed_at": "2020-02-25T02:04:16Z", - "stargazers_count": 179, - "watchers_count": 179, + "stargazers_count": 180, + "watchers_count": 180, "forks_count": 91, "forks": 91, - "watchers": 179, + "watchers": 180, "score": 0 }, { @@ -481,5 +481,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 280544880, + "name": "ghostcatch", + "full_name": "MateoSec\/ghostcatch", + "owner": { + "login": "MateoSec", + "id": 68019458, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/68019458?v=4", + "html_url": "https:\/\/github.com\/MateoSec" + }, + "html_url": "https:\/\/github.com\/MateoSec\/ghostcatch", + "description": "Disables AJP connectors to remediate CVE-2020-1938!", + "fork": false, + "created_at": "2020-07-17T23:34:47Z", + "updated_at": "2020-07-18T00:06:32Z", + "pushed_at": "2020-07-18T00:06:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 80190b3d68..df1c59b5c1 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-07-17T09:07:28Z", + "updated_at": "2020-07-18T02:31:28Z", "pushed_at": "2020-07-05T12:59:42Z", - "stargazers_count": 507, - "watchers_count": 507, + "stargazers_count": 508, + "watchers_count": 508, "forks_count": 123, "forks": 123, - "watchers": 507, + "watchers": 508, "score": 0 }, { diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index 02cdb85a66..b58d8bcf4f 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-07-17T09:06:12Z", + "updated_at": "2020-07-18T03:06:03Z", "pushed_at": "2020-07-14T10:20:14Z", - "stargazers_count": 1291, - "watchers_count": 1291, + "stargazers_count": 1294, + "watchers_count": 1294, "forks_count": 325, "forks": 325, - "watchers": 1291, + "watchers": 1294, "score": 0 }, { @@ -1071,13 +1071,13 @@ "description": "GUI", "fork": false, "created_at": "2020-07-17T03:13:30Z", - "updated_at": "2020-07-17T13:16:04Z", + "updated_at": "2020-07-18T02:05:18Z", "pushed_at": "2020-07-17T08:09:30Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json index 630ee501ad..874c64f92f 100644 --- a/2020/CVE-2020-6287.json +++ b/2020/CVE-2020-6287.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)", "fork": false, "created_at": "2020-07-15T15:20:09Z", - "updated_at": "2020-07-17T20:28:44Z", + "updated_at": "2020-07-18T03:07:00Z", "pushed_at": "2020-07-17T14:18:44Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 78, + "watchers_count": 78, "forks_count": 21, "forks": 21, - "watchers": 74, + "watchers": 78, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index 309227caf3..e66b5256a3 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2020-05-21T00:41:06Z", - "updated_at": "2020-07-17T11:31:04Z", + "updated_at": "2020-07-18T01:52:02Z", "pushed_at": "2020-05-21T10:15:35Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 19, "forks": 19, - "watchers": 66, + "watchers": 67, "score": 0 }, { diff --git a/README.md b/README.md index a2a40a58b1..9d9a5876ca 100644 --- a/README.md +++ b/README.md @@ -232,7 +232,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve - [T13nn3s/CVE-2020-0796](https://github.com/T13nn3s/CVE-2020-0796) - [ollypwn/SMBGhost](https://github.com/ollypwn/SMBGhost) - [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker) -- [pr4jwal/NSE-scripts](https://github.com/pr4jwal/NSE-scripts) - [ButrintKomoni/cve-2020-0796](https://github.com/ButrintKomoni/cve-2020-0796) - [dickens88/cve-2020-0796-scanner](https://github.com/dickens88/cve-2020-0796-scanner) - [kn6869610/CVE-2020-0796](https://github.com/kn6869610/CVE-2020-0796) @@ -391,8 +390,10 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'. +- [pr4jwal/NSE-scripts](https://github.com/pr4jwal/NSE-scripts) - [ZephrFish/CVE-2020-1350](https://github.com/ZephrFish/CVE-2020-1350) - [mr-r3b00t/CVE-2020-1350](https://github.com/mr-r3b00t/CVE-2020-1350) +- [zoomerxsec/Fake_CVE-2020-1350](https://github.com/zoomerxsec/Fake_CVE-2020-1350) - [tinkersec/cve-2020-1350](https://github.com/tinkersec/cve-2020-1350) - [T13nn3s/CVE-2020-1350](https://github.com/T13nn3s/CVE-2020-1350) - [corelight/SIGRed](https://github.com/corelight/SIGRed) @@ -451,6 +452,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc - [ZhengHaoCHeng/CNVD-2020-10487](https://github.com/ZhengHaoCHeng/CNVD-2020-10487) - [I-Runtime-Error/CVE-2020-1938](https://github.com/I-Runtime-Error/CVE-2020-1938) - [Umesh2807/Ghostcat](https://github.com/Umesh2807/Ghostcat) +- [MateoSec/ghostcatch](https://github.com/MateoSec/ghostcatch) ### CVE-2020-1947