diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 06b006047d..ea3e1b9267 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -13,13 +13,13 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2020-03-30T05:28:53Z", + "updated_at": "2020-04-08T14:06:22Z", "pushed_at": "2016-05-07T19:35:14Z", - "stargazers_count": 2243, - "watchers_count": 2243, + "stargazers_count": 2244, + "watchers_count": 2244, "forks_count": 485, "forks": 485, - "watchers": 2243, + "watchers": 2244, "score": 0 }, { diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 74e89516c3..28d9b8460e 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-04-08T09:01:20Z", + "updated_at": "2020-04-08T14:50:24Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 347, + "watchers_count": 347, "forks_count": 71, "forks": 71, - "watchers": 346, + "watchers": 347, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index c734adacd6..3167ec1c44 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-04-08T09:01:20Z", + "updated_at": "2020-04-08T14:50:24Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 347, + "watchers_count": 347, "forks_count": 71, "forks": 71, - "watchers": 346, + "watchers": 347, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-12149.json b/2017/CVE-2017-12149.json index bccf0f60a6..28913d6570 100644 --- a/2017/CVE-2017-12149.json +++ b/2017/CVE-2017-12149.json @@ -40,8 +40,8 @@ "pushed_at": "2019-03-13T08:57:50Z", "stargazers_count": 89, "watchers_count": 89, - "forks_count": 31, - "forks": 31, + "forks_count": 32, + "forks": 32, "watchers": 89, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 430373fd18..a463f92620 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-04-08T09:01:20Z", + "updated_at": "2020-04-08T14:50:24Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 347, + "watchers_count": 347, "forks_count": 71, "forks": 71, - "watchers": 346, + "watchers": 347, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 6de0098206..c9120c0611 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-04-08T09:01:20Z", + "updated_at": "2020-04-08T14:50:24Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 347, + "watchers_count": 347, "forks_count": 71, "forks": 71, - "watchers": 346, + "watchers": 347, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index fbfdf4ede5..89f88f43a6 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2020-04-08T05:24:32Z", + "updated_at": "2020-04-08T10:04:52Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 224, - "watchers_count": 224, + "stargazers_count": 225, + "watchers_count": 225, "forks_count": 41, "forks": 41, - "watchers": 224, + "watchers": 225, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6574.json b/2018/CVE-2018-6574.json index d35061491a..a5bd9521dc 100644 --- a/2018/CVE-2018-6574.json +++ b/2018/CVE-2018-6574.json @@ -224,8 +224,8 @@ "pushed_at": "2018-12-25T07:40:49Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 }, @@ -688,5 +688,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 254069736, + "name": "CVE-2018-6574", + "full_name": "Eugene24\/CVE-2018-6574", + "owner": { + "login": "Eugene24", + "id": 5593797, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5593797?v=4", + "html_url": "https:\/\/github.com\/Eugene24" + }, + "html_url": "https:\/\/github.com\/Eugene24\/CVE-2018-6574", + "description": null, + "fork": false, + "created_at": "2020-04-08T11:33:46Z", + "updated_at": "2020-04-08T11:45:31Z", + "pushed_at": "2020-04-08T11:45:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index ef7509620e..2f0c023412 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -36,13 +36,13 @@ "description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002", "fork": false, "created_at": "2018-03-30T14:23:18Z", - "updated_at": "2020-04-07T01:28:40Z", + "updated_at": "2020-04-08T14:12:02Z", "pushed_at": "2019-03-29T11:25:57Z", - "stargazers_count": 326, - "watchers_count": 326, + "stargazers_count": 327, + "watchers_count": 327, "forks_count": 112, "forks": 112, - "watchers": 326, + "watchers": 327, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index e477fc9409..5f44fac805 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1347,13 +1347,13 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2020-04-08T01:40:57Z", + "updated_at": "2020-04-08T10:31:46Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 704, - "watchers_count": 704, + "stargazers_count": 705, + "watchers_count": 705, "forks_count": 165, "forks": 165, - "watchers": 704, + "watchers": 705, "score": 0 }, { diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index d053fe9cfe..c02ca17de0 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -36,13 +36,13 @@ "description": "CVE-2019-1458 Windows LPE Exploit", "fork": false, "created_at": "2020-03-11T08:30:14Z", - "updated_at": "2020-04-08T04:51:02Z", + "updated_at": "2020-04-08T11:05:15Z", "pushed_at": "2020-03-11T09:59:01Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "forks_count": 15, "forks": 15, - "watchers": 60, + "watchers": 61, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 9176f54b22..290236e670 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2020-04-08T05:57:03Z", + "updated_at": "2020-04-08T13:08:10Z", "pushed_at": "2019-06-24T06:06:48Z", - "stargazers_count": 512, - "watchers_count": 512, + "stargazers_count": 513, + "watchers_count": 513, "forks_count": 114, "forks": 114, - "watchers": 512, + "watchers": 513, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-04-08T09:01:20Z", + "updated_at": "2020-04-08T14:50:24Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 347, + "watchers_count": 347, "forks_count": 71, "forks": 71, - "watchers": 346, + "watchers": 347, "score": 0 }, { @@ -174,13 +174,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-04-08T08:48:44Z", + "updated_at": "2020-04-08T13:27:11Z", "pushed_at": "2020-04-08T08:19:12Z", - "stargazers_count": 47, - "watchers_count": 47, - "forks_count": 8, - "forks": 8, - "watchers": 47, + "stargazers_count": 53, + "watchers_count": 53, + "forks_count": 9, + "forks": 9, + "watchers": 53, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 32fda3c54d..64879dcc37 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -312,13 +312,13 @@ "description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ", "fork": false, "created_at": "2019-06-24T08:33:07Z", - "updated_at": "2020-03-06T04:18:50Z", + "updated_at": "2020-04-08T10:00:01Z", "pushed_at": "2019-07-15T06:03:15Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "forks_count": 18, "forks": 18, - "watchers": 40, + "watchers": 41, "score": 0 }, { diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json index 9c0cb0e55a..4437d33ed7 100644 --- a/2019/CVE-2019-7238.json +++ b/2019/CVE-2019-7238.json @@ -36,13 +36,13 @@ "description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0", "fork": false, "created_at": "2019-05-21T13:16:02Z", - "updated_at": "2020-04-03T03:50:12Z", + "updated_at": "2020-04-08T13:18:40Z", "pushed_at": "2019-08-19T17:33:56Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 14, "forks": 14, - "watchers": 46, + "watchers": 47, "score": 0 }, { diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json index 4f95937b7e..363473cd0b 100644 --- a/2020/CVE-2020-0041.json +++ b/2020/CVE-2020-0041.json @@ -13,13 +13,13 @@ "description": "Exploits for Android Binder bug CVE-2020-0041", "fork": false, "created_at": "2020-03-31T17:53:57Z", - "updated_at": "2020-04-08T08:55:32Z", + "updated_at": "2020-04-08T09:30:17Z", "pushed_at": "2020-04-08T08:55:30Z", - "stargazers_count": 62, - "watchers_count": 62, - "forks_count": 6, - "forks": 6, - "watchers": 62, + "stargazers_count": 63, + "watchers_count": 63, + "forks_count": 7, + "forks": 7, + "watchers": 63, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 2beff95aeb..36a3e54d2e 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -151,13 +151,13 @@ "description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.", "fork": false, "created_at": "2020-02-28T16:04:30Z", - "updated_at": "2020-03-31T20:35:42Z", + "updated_at": "2020-04-08T09:10:41Z", "pushed_at": "2020-02-28T16:47:24Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 5, "forks": 5, - "watchers": 10, + "watchers": 11, "score": 0 }, { @@ -197,13 +197,13 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2020-04-07T17:00:12Z", + "updated_at": "2020-04-08T09:26:33Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 145, + "watchers_count": 145, "forks_count": 43, "forks": 43, - "watchers": 144, + "watchers": 145, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 65f10378a5..36e2a80d45 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -109,8 +109,8 @@ "pushed_at": "2020-03-13T09:54:16Z", "stargazers_count": 419, "watchers_count": 419, - "forks_count": 118, - "forks": 118, + "forks_count": 119, + "forks": 119, "watchers": 419, "score": 0 }, @@ -427,13 +427,13 @@ "description": "PoC for triggering buffer overflow via CVE-2020-0796", "fork": false, "created_at": "2020-03-12T18:34:40Z", - "updated_at": "2020-04-07T08:53:44Z", + "updated_at": "2020-04-08T12:37:47Z", "pushed_at": "2020-03-14T10:04:59Z", - "stargazers_count": 191, - "watchers_count": 191, - "forks_count": 71, - "forks": 71, - "watchers": 191, + "stargazers_count": 192, + "watchers_count": 192, + "forks_count": 72, + "forks": 72, + "watchers": 192, "score": 0 }, { @@ -749,13 +749,13 @@ "description": "基于asyncio(协程)的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。", "fork": false, "created_at": "2020-03-14T23:39:25Z", - "updated_at": "2020-04-06T07:37:13Z", + "updated_at": "2020-04-08T13:58:53Z", "pushed_at": "2020-03-18T04:48:23Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 9, "forks": 9, - "watchers": 12, + "watchers": 14, "score": 0 }, { @@ -979,13 +979,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2020-04-08T03:31:15Z", + "updated_at": "2020-04-08T14:32:41Z", "pushed_at": "2020-04-03T13:31:54Z", - "stargazers_count": 782, - "watchers_count": 782, - "forks_count": 211, - "forks": 211, - "watchers": 782, + "stargazers_count": 785, + "watchers_count": 785, + "forks_count": 213, + "forks": 213, + "watchers": 785, "score": 0 }, { @@ -1163,13 +1163,13 @@ "description": "Cobalt Strike AggressorScripts CVE-2020-0796", "fork": false, "created_at": "2020-04-06T15:16:10Z", - "updated_at": "2020-04-08T06:57:57Z", + "updated_at": "2020-04-08T11:28:40Z", "pushed_at": "2020-04-06T15:22:01Z", - "stargazers_count": 27, - "watchers_count": 27, - "forks_count": 3, - "forks": 3, - "watchers": 27, + "stargazers_count": 31, + "watchers_count": 31, + "forks_count": 4, + "forks": 4, + "watchers": 31, "score": 0 }, { diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json index 52c3729e79..413a71fbaf 100644 --- a/2020/CVE-2020-10199.json +++ b/2020/CVE-2020-10199.json @@ -1,27 +1,4 @@ [ - { - "id": 253735011, - "name": "CVE-2020-10199", - "full_name": "fairyming\/CVE-2020-10199", - "owner": { - "login": "fairyming", - "id": 44915879, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/44915879?v=4", - "html_url": "https:\/\/github.com\/fairyming" - }, - "html_url": "https:\/\/github.com\/fairyming\/CVE-2020-10199", - "description": "Nexus Repository Manager远程代码执行漏洞", - "fork": false, - "created_at": "2020-04-07T08:37:51Z", - "updated_at": "2020-04-07T08:37:51Z", - "pushed_at": "2020-04-07T08:37:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 253799743, "name": "CVE-2020-10199-10204", @@ -36,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-04-07T13:23:12Z", - "updated_at": "2020-04-08T05:38:35Z", + "updated_at": "2020-04-08T13:10:21Z", "pushed_at": "2020-04-07T13:56:17Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 0, "forks": 0, - "watchers": 5, + "watchers": 8, "score": 0 }, { @@ -59,13 +36,36 @@ "description": "CVE-2020-10199、CVE-2020-10204、CVE-2020-11444", "fork": false, "created_at": "2020-04-08T07:36:30Z", - "updated_at": "2020-04-08T08:48:22Z", + "updated_at": "2020-04-08T13:07:10Z", "pushed_at": "2020-04-08T07:52:20Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 4, + "forks": 4, + "watchers": 7, + "score": 0 + }, + { + "id": 254064445, + "name": "CVE-2020-10199-Nexus-RCE", + "full_name": "magicming200\/CVE-2020-10199-Nexus-RCE", + "owner": { + "login": "magicming200", + "id": 23466759, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23466759?v=4", + "html_url": "https:\/\/github.com\/magicming200" + }, + "html_url": "https:\/\/github.com\/magicming200\/CVE-2020-10199-Nexus-RCE", + "description": "CVE-2020-10199漏洞一键检测工具,图形化界面。CVE-2020-10199 Nexus RCE Vul POC Tool with GUI.", + "fork": false, + "created_at": "2020-04-08T11:08:35Z", + "updated_at": "2020-04-08T11:43:03Z", + "pushed_at": "2020-04-08T11:38:30Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-10551.json b/2020/CVE-2020-10551.json new file mode 100644 index 0000000000..65f8dfd940 --- /dev/null +++ b/2020/CVE-2020-10551.json @@ -0,0 +1,25 @@ +[ + { + "id": 254115906, + "name": "CVE-2020-10551", + "full_name": "seqred-s-a\/CVE-2020-10551", + "owner": { + "login": "seqred-s-a", + "id": 49437606, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/49437606?v=4", + "html_url": "https:\/\/github.com\/seqred-s-a" + }, + "html_url": "https:\/\/github.com\/seqred-s-a\/CVE-2020-10551", + "description": "Privilege escalation in QQBrowser", + "fork": false, + "created_at": "2020-04-08T14:46:33Z", + "updated_at": "2020-04-08T14:53:00Z", + "pushed_at": "2020-04-08T14:50:15Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index ffcbb399d9..b5c7126cc6 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1938", "fork": false, "created_at": "2020-02-20T16:32:52Z", - "updated_at": "2020-04-07T02:23:32Z", + "updated_at": "2020-04-08T10:27:24Z", "pushed_at": "2020-02-25T02:04:16Z", - "stargazers_count": 147, - "watchers_count": 147, + "stargazers_count": 148, + "watchers_count": 148, "forks_count": 82, "forks": 82, - "watchers": 147, + "watchers": 148, "score": 0 }, { @@ -86,8 +86,8 @@ "pushed_at": "2020-02-24T12:06:08Z", "stargazers_count": 154, "watchers_count": 154, - "forks_count": 71, - "forks": 71, + "forks_count": 72, + "forks": 72, "watchers": 154, "score": 0 }, @@ -450,13 +450,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-04-08T08:48:44Z", + "updated_at": "2020-04-08T13:27:11Z", "pushed_at": "2020-04-08T08:19:12Z", - "stargazers_count": 47, - "watchers_count": 47, - "forks_count": 8, - "forks": 8, - "watchers": 47, + "stargazers_count": 53, + "watchers_count": 53, + "forks_count": 9, + "forks": 9, + "watchers": 53, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index dbbcca984f..48d049ebfa 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-04-08T09:01:20Z", + "updated_at": "2020-04-08T14:50:24Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 347, + "watchers_count": 347, "forks_count": 71, "forks": 71, - "watchers": 346, + "watchers": 347, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Weblogic IIOP CVE-2020-2551", "fork": false, "created_at": "2020-02-28T08:46:21Z", - "updated_at": "2020-04-07T08:08:43Z", + "updated_at": "2020-04-08T10:22:40Z", "pushed_at": "2020-04-07T03:32:24Z", - "stargazers_count": 159, - "watchers_count": 159, + "stargazers_count": 160, + "watchers_count": 160, "forks_count": 39, "forks": 39, - "watchers": 159, + "watchers": 160, "score": 0 }, { diff --git a/2020/CVE-2020-8515.json b/2020/CVE-2020-8515.json index b936caef3d..5b81feda8e 100644 --- a/2020/CVE-2020-8515.json +++ b/2020/CVE-2020-8515.json @@ -36,8 +36,8 @@ "description": "nmap script to detect CVE-2020-8515 on Draytek Devices", "fork": false, "created_at": "2020-03-31T05:40:11Z", - "updated_at": "2020-04-02T18:23:10Z", - "pushed_at": "2020-04-02T18:23:08Z", + "updated_at": "2020-04-08T13:37:20Z", + "pushed_at": "2020-04-08T13:37:18Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/README.md b/README.md index e7dbf58cc1..ca7908adc8 100644 --- a/README.md +++ b/README.md @@ -238,9 +238,9 @@ An elevation of privilege vulnerability exists in Windows Installer because of t Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2). -- [fairyming/CVE-2020-10199](https://github.com/fairyming/CVE-2020-10199) - [wsfengfan/CVE-2020-10199-10204](https://github.com/wsfengfan/CVE-2020-10199-10204) - [jas502n/CVE-2020-10199](https://github.com/jas502n/CVE-2020-10199) +- [magicming200/CVE-2020-10199-Nexus-RCE](https://github.com/magicming200/CVE-2020-10199-Nexus-RCE) ### CVE-2020-10238 @@ -266,6 +266,9 @@ An issue was discovered in Joomla! before 3.9.16. The lack of type casting of a - [HoangKien1020/CVE-2020-10243](https://github.com/HoangKien1020/CVE-2020-10243) +### CVE-2020-10551 +- [seqred-s-a/CVE-2020-10551](https://github.com/seqred-s-a/CVE-2020-10551) + ### CVE-2020-10558 @@ -6200,6 +6203,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r - [AdriVillaB/CVE-2018-6574](https://github.com/AdriVillaB/CVE-2018-6574) - [yitingfan/CVE-2018-6574_demo](https://github.com/yitingfan/CVE-2018-6574_demo) - [mhamed366/CVE-2018-6574](https://github.com/mhamed366/CVE-2018-6574) +- [Eugene24/CVE-2018-6574](https://github.com/Eugene24/CVE-2018-6574) ### CVE-2018-6622