From d46772b0384587b63964d8e0dc5d9f89ad08f097 Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Thu, 14 May 2020 18:07:48 +0900
Subject: [PATCH] Auto Update 2020/05/14 18:07:48

---
 2014/CVE-2014-4210.json    |  8 ++++----
 2016/CVE-2016-0638.json    |  8 ++++----
 2017/CVE-2017-1000367.json | 24 ++++++++++++------------
 2017/CVE-2017-3066.json    |  8 ++++----
 2017/CVE-2017-3248.json    |  8 ++++----
 2017/CVE-2017-8464.json    |  4 ++--
 2018/CVE-2018-0886.json    |  8 ++++----
 2018/CVE-2018-10388.json   |  4 ++--
 2018/CVE-2018-2628.json    |  8 ++++----
 2018/CVE-2018-8174.json    |  8 ++++----
 2019/CVE-2019-0708.json    | 12 ++++++------
 2019/CVE-2019-1040.json    |  8 ++++----
 2019/CVE-2019-1388.json    |  8 ++++----
 2019/CVE-2019-1652.json    |  8 ++++----
 2019/CVE-2019-17558.json   | 12 ++++++------
 2019/CVE-2019-2618.json    | 16 ++++++++--------
 2019/CVE-2019-2725.json    |  8 ++++----
 2019/CVE-2019-5736.json    |  4 ++--
 2020/CVE-2020-0041.json    | 12 ++++++------
 2020/CVE-2020-0624.json    |  8 ++++----
 2020/CVE-2020-0674.json    |  8 ++++----
 2020/CVE-2020-0753.json    | 12 ++++++------
 2020/CVE-2020-0796.json    | 16 ++++++++--------
 2020/CVE-2020-1015.json    | 12 ++++++------
 2020/CVE-2020-10199.json   | 20 ++++++++++----------
 2020/CVE-2020-11651.json   | 16 ++++++++--------
 2020/CVE-2020-11932.json   |  8 ++++----
 2020/CVE-2020-12116.json   | 12 ++++++------
 2020/CVE-2020-12717.json   |  4 ++--
 2020/CVE-2020-2551.json    |  8 ++++----
 2020/CVE-2020-2555.json    |  8 ++++----
 2020/CVE-2020-2883.json    | 16 ++++++++--------
 2020/CVE-2020-3952.json    |  8 ++++----
 2020/CVE-2020-5837.json    | 12 ++++++------
 2020/CVE-2020-8004.json    | 25 +++++++++++++++++++++++++
 2020/CVE-2020-8417.json    |  8 ++++----
 README.md                  | 13 +++++++++++++
 37 files changed, 214 insertions(+), 176 deletions(-)
 create mode 100644 2020/CVE-2020-8004.json

diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index cfc71ecb30..d31fbc928f 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -36,13 +36,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-05-13T09:16:19Z",
+        "updated_at": "2020-05-14T08:56:44Z",
         "pushed_at": "2020-03-27T09:16:40Z",
-        "stargazers_count": 410,
-        "watchers_count": 410,
+        "stargazers_count": 412,
+        "watchers_count": 412,
         "forks_count": 92,
         "forks": 92,
-        "watchers": 410,
+        "watchers": 412,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 5bcd80f0f2..d127e9d71b 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,13 +13,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-05-13T09:16:19Z",
+        "updated_at": "2020-05-14T08:56:44Z",
         "pushed_at": "2020-03-27T09:16:40Z",
-        "stargazers_count": 410,
-        "watchers_count": 410,
+        "stargazers_count": 412,
+        "watchers_count": 412,
         "forks_count": 92,
         "forks": 92,
-        "watchers": 410,
+        "watchers": 412,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2017/CVE-2017-1000367.json b/2017/CVE-2017-1000367.json
index f377f92fa6..1963bd13e8 100644
--- a/2017/CVE-2017-1000367.json
+++ b/2017/CVE-2017-1000367.json
@@ -13,13 +13,13 @@
         "description": null,
         "fork": false,
         "created_at": "2017-05-30T18:12:38Z",
-        "updated_at": "2019-06-21T16:24:42Z",
+        "updated_at": "2020-05-14T07:02:46Z",
         "pushed_at": "2017-06-05T19:53:35Z",
-        "stargazers_count": 115,
-        "watchers_count": 115,
-        "forks_count": 38,
-        "forks": 38,
-        "watchers": 115,
+        "stargazers_count": 116,
+        "watchers_count": 116,
+        "forks_count": 39,
+        "forks": 39,
+        "watchers": 116,
         "score": 0
     },
     {
@@ -36,13 +36,13 @@
         "description": null,
         "fork": false,
         "created_at": "2017-06-04T12:31:59Z",
-        "updated_at": "2017-06-29T18:51:47Z",
+        "updated_at": "2020-05-14T07:02:54Z",
         "pushed_at": "2017-06-04T12:49:02Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "forks_count": 3,
-        "forks": 3,
-        "watchers": 1,
+        "stargazers_count": 2,
+        "watchers_count": 2,
+        "forks_count": 4,
+        "forks": 4,
+        "watchers": 2,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-3066.json b/2017/CVE-2017-3066.json
index 537a5503af..5f288a5d2b 100644
--- a/2017/CVE-2017-3066.json
+++ b/2017/CVE-2017-3066.json
@@ -13,13 +13,13 @@
         "description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
         "fork": false,
         "created_at": "2018-03-12T16:44:12Z",
-        "updated_at": "2020-05-12T16:17:42Z",
+        "updated_at": "2020-05-14T05:58:24Z",
         "pushed_at": "2018-03-12T16:50:20Z",
-        "stargazers_count": 43,
-        "watchers_count": 43,
+        "stargazers_count": 44,
+        "watchers_count": 44,
         "forks_count": 21,
         "forks": 21,
-        "watchers": 43,
+        "watchers": 44,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 0ed6876c69..6d4ab07a4d 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -36,13 +36,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-05-13T09:16:19Z",
+        "updated_at": "2020-05-14T08:56:44Z",
         "pushed_at": "2020-03-27T09:16:40Z",
-        "stargazers_count": 410,
-        "watchers_count": 410,
+        "stargazers_count": 412,
+        "watchers_count": 412,
         "forks_count": 92,
         "forks": 92,
-        "watchers": 410,
+        "watchers": 412,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2017/CVE-2017-8464.json b/2017/CVE-2017-8464.json
index 7a39479dbf..70dfd833f5 100644
--- a/2017/CVE-2017-8464.json
+++ b/2017/CVE-2017-8464.json
@@ -63,8 +63,8 @@
         "pushed_at": "2017-08-07T12:42:33Z",
         "stargazers_count": 5,
         "watchers_count": 5,
-        "forks_count": 5,
-        "forks": 5,
+        "forks_count": 6,
+        "forks": 6,
         "watchers": 5,
         "score": 0
     },
diff --git a/2018/CVE-2018-0886.json b/2018/CVE-2018-0886.json
index ea03bdb64b..0fa4c95467 100644
--- a/2018/CVE-2018-0886.json
+++ b/2018/CVE-2018-0886.json
@@ -13,13 +13,13 @@
         "description": "A code demonstrating CVE-2018-0886",
         "fork": false,
         "created_at": "2018-04-02T12:52:07Z",
-        "updated_at": "2020-05-05T02:12:53Z",
+        "updated_at": "2020-05-14T07:30:17Z",
         "pushed_at": "2018-06-02T10:33:41Z",
-        "stargazers_count": 240,
-        "watchers_count": 240,
+        "stargazers_count": 241,
+        "watchers_count": 241,
         "forks_count": 58,
         "forks": 58,
-        "watchers": 240,
+        "watchers": 241,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-10388.json b/2018/CVE-2018-10388.json
index be69341bd9..ea05e7308e 100644
--- a/2018/CVE-2018-10388.json
+++ b/2018/CVE-2018-10388.json
@@ -13,8 +13,8 @@
         "description": "practice",
         "fork": false,
         "created_at": "2020-05-13T14:52:43Z",
-        "updated_at": "2020-05-13T18:17:36Z",
-        "pushed_at": "2020-05-13T18:17:34Z",
+        "updated_at": "2020-05-14T07:34:09Z",
+        "pushed_at": "2020-05-14T07:34:06Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index e8471547b7..a8f1ce0582 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -450,13 +450,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-05-13T09:16:19Z",
+        "updated_at": "2020-05-14T08:56:44Z",
         "pushed_at": "2020-03-27T09:16:40Z",
-        "stargazers_count": 410,
-        "watchers_count": 410,
+        "stargazers_count": 412,
+        "watchers_count": 412,
         "forks_count": 92,
         "forks": 92,
-        "watchers": 410,
+        "watchers": 412,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json
index e58ffd189a..1c0afeb979 100644
--- a/2018/CVE-2018-8174.json
+++ b/2018/CVE-2018-8174.json
@@ -13,13 +13,13 @@
         "description": "CVE-2018-8174 - VBScript memory corruption exploit.",
         "fork": false,
         "created_at": "2018-05-22T21:50:32Z",
-        "updated_at": "2020-05-13T03:24:55Z",
+        "updated_at": "2020-05-14T08:57:25Z",
         "pushed_at": "2018-05-23T20:43:58Z",
-        "stargazers_count": 162,
-        "watchers_count": 162,
+        "stargazers_count": 163,
+        "watchers_count": 163,
         "forks_count": 76,
         "forks": 76,
-        "watchers": 162,
+        "watchers": 163,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index 5d23d69e25..3da439936f 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1347,13 +1347,13 @@
         "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
         "fork": false,
         "created_at": "2019-05-23T22:50:12Z",
-        "updated_at": "2020-05-13T10:51:31Z",
+        "updated_at": "2020-05-14T06:34:02Z",
         "pushed_at": "2019-06-22T21:48:45Z",
-        "stargazers_count": 731,
-        "watchers_count": 731,
-        "forks_count": 170,
-        "forks": 170,
-        "watchers": 731,
+        "stargazers_count": 732,
+        "watchers_count": 732,
+        "forks_count": 171,
+        "forks": 171,
+        "watchers": 732,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json
index c016f37eb8..b6e96f68a5 100644
--- a/2019/CVE-2019-1040.json
+++ b/2019/CVE-2019-1040.json
@@ -13,13 +13,13 @@
         "description": "CVE-2019-1040 with Exchange",
         "fork": false,
         "created_at": "2019-06-14T11:16:03Z",
-        "updated_at": "2020-05-12T06:26:13Z",
+        "updated_at": "2020-05-14T06:42:11Z",
         "pushed_at": "2020-03-20T09:11:20Z",
-        "stargazers_count": 164,
-        "watchers_count": 164,
+        "stargazers_count": 165,
+        "watchers_count": 165,
         "forks_count": 56,
         "forks": 56,
-        "watchers": 164,
+        "watchers": 165,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json
index a130c2a0fc..51b2a89a96 100644
--- a/2019/CVE-2019-1388.json
+++ b/2019/CVE-2019-1388.json
@@ -13,13 +13,13 @@
         "description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
         "fork": false,
         "created_at": "2019-11-21T06:26:27Z",
-        "updated_at": "2020-05-11T03:16:32Z",
+        "updated_at": "2020-05-14T04:31:57Z",
         "pushed_at": "2019-11-21T09:27:59Z",
-        "stargazers_count": 76,
-        "watchers_count": 76,
+        "stargazers_count": 77,
+        "watchers_count": 77,
         "forks_count": 31,
         "forks": 31,
-        "watchers": 76,
+        "watchers": 77,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-1652.json b/2019/CVE-2019-1652.json
index 5df10e758d..d08e093017 100644
--- a/2019/CVE-2019-1652.json
+++ b/2019/CVE-2019-1652.json
@@ -13,13 +13,13 @@
         "description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
         "fork": false,
         "created_at": "2019-01-24T10:12:44Z",
-        "updated_at": "2020-04-28T12:06:31Z",
+        "updated_at": "2020-05-14T06:13:57Z",
         "pushed_at": "2019-02-08T12:38:05Z",
-        "stargazers_count": 188,
-        "watchers_count": 188,
+        "stargazers_count": 189,
+        "watchers_count": 189,
         "forks_count": 61,
         "forks": 61,
-        "watchers": 188,
+        "watchers": 189,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index d667138d13..b4c5ce75c3 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -36,13 +36,13 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2020-05-14T02:50:07Z",
+        "updated_at": "2020-05-14T08:55:51Z",
         "pushed_at": "2020-05-11T04:14:46Z",
-        "stargazers_count": 702,
-        "watchers_count": 702,
-        "forks_count": 150,
-        "forks": 150,
-        "watchers": 702,
+        "stargazers_count": 708,
+        "watchers_count": 708,
+        "forks_count": 152,
+        "forks": 152,
+        "watchers": 708,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 5d2bbe9413..46f22e852a 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -82,13 +82,13 @@
         "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
         "fork": false,
         "created_at": "2019-06-21T09:22:43Z",
-        "updated_at": "2020-05-14T02:16:34Z",
+        "updated_at": "2020-05-14T07:56:53Z",
         "pushed_at": "2020-04-26T10:49:25Z",
-        "stargazers_count": 544,
-        "watchers_count": 544,
+        "stargazers_count": 547,
+        "watchers_count": 547,
         "forks_count": 120,
         "forks": 120,
-        "watchers": 544,
+        "watchers": 547,
         "score": 0
     },
     {
@@ -151,13 +151,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-05-13T09:16:19Z",
+        "updated_at": "2020-05-14T08:56:44Z",
         "pushed_at": "2020-03-27T09:16:40Z",
-        "stargazers_count": 410,
-        "watchers_count": 410,
+        "stargazers_count": 412,
+        "watchers_count": 412,
         "forks_count": 92,
         "forks": 92,
-        "watchers": 410,
+        "watchers": 412,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json
index b2bc7675db..8f176cde6a 100644
--- a/2019/CVE-2019-2725.json
+++ b/2019/CVE-2019-2725.json
@@ -174,13 +174,13 @@
         "description": "CVE-2019-2725 命令回显",
         "fork": false,
         "created_at": "2019-05-29T01:57:05Z",
-        "updated_at": "2020-05-14T00:26:59Z",
+        "updated_at": "2020-05-14T08:35:36Z",
         "pushed_at": "2019-08-08T09:48:20Z",
-        "stargazers_count": 331,
-        "watchers_count": 331,
+        "stargazers_count": 333,
+        "watchers_count": 333,
         "forks_count": 146,
         "forks": 146,
-        "watchers": 331,
+        "watchers": 333,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json
index 3aead0e889..238f62e156 100644
--- a/2019/CVE-2019-5736.json
+++ b/2019/CVE-2019-5736.json
@@ -473,8 +473,8 @@
         "description": null,
         "fork": false,
         "created_at": "2020-05-10T04:49:28Z",
-        "updated_at": "2020-05-13T04:49:27Z",
-        "pushed_at": "2020-05-13T04:49:26Z",
+        "updated_at": "2020-05-14T04:06:14Z",
+        "pushed_at": "2020-05-14T04:06:12Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json
index 07f3c95760..b9fd3f32a7 100644
--- a/2020/CVE-2020-0041.json
+++ b/2020/CVE-2020-0041.json
@@ -13,13 +13,13 @@
         "description": "Exploits for Android Binder bug CVE-2020-0041",
         "fork": false,
         "created_at": "2020-03-31T17:53:57Z",
-        "updated_at": "2020-05-14T02:01:28Z",
+        "updated_at": "2020-05-14T06:04:13Z",
         "pushed_at": "2020-04-08T08:55:30Z",
-        "stargazers_count": 95,
-        "watchers_count": 95,
-        "forks_count": 21,
-        "forks": 21,
-        "watchers": 95,
+        "stargazers_count": 96,
+        "watchers_count": 96,
+        "forks_count": 22,
+        "forks": 22,
+        "watchers": 96,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-0624.json b/2020/CVE-2020-0624.json
index d23dbbeeb5..632ed22198 100644
--- a/2020/CVE-2020-0624.json
+++ b/2020/CVE-2020-0624.json
@@ -13,13 +13,13 @@
         "description": "win32k use-after-free poc",
         "fork": false,
         "created_at": "2020-04-22T13:11:16Z",
-        "updated_at": "2020-05-02T01:59:41Z",
+        "updated_at": "2020-05-14T06:20:16Z",
         "pushed_at": "2020-04-22T13:11:27Z",
-        "stargazers_count": 53,
-        "watchers_count": 53,
+        "stargazers_count": 54,
+        "watchers_count": 54,
         "forks_count": 28,
         "forks": 28,
-        "watchers": 53,
+        "watchers": 54,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-0674.json b/2020/CVE-2020-0674.json
index 815c61ad91..4e40510e99 100644
--- a/2020/CVE-2020-0674.json
+++ b/2020/CVE-2020-0674.json
@@ -36,13 +36,13 @@
         "description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
         "fork": false,
         "created_at": "2020-05-07T22:02:25Z",
-        "updated_at": "2020-05-13T16:42:06Z",
+        "updated_at": "2020-05-14T06:53:37Z",
         "pushed_at": "2020-05-07T22:21:21Z",
-        "stargazers_count": 106,
-        "watchers_count": 106,
+        "stargazers_count": 108,
+        "watchers_count": 108,
         "forks_count": 28,
         "forks": 28,
-        "watchers": 106,
+        "watchers": 108,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-0753.json b/2020/CVE-2020-0753.json
index d70c47ffc7..7f75d93f53 100644
--- a/2020/CVE-2020-0753.json
+++ b/2020/CVE-2020-0753.json
@@ -13,13 +13,13 @@
         "description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.",
         "fork": false,
         "created_at": "2020-02-22T13:53:22Z",
-        "updated_at": "2020-04-27T01:19:04Z",
+        "updated_at": "2020-05-14T06:57:29Z",
         "pushed_at": "2020-04-15T17:41:44Z",
-        "stargazers_count": 8,
-        "watchers_count": 8,
-        "forks_count": 5,
-        "forks": 5,
-        "watchers": 8,
+        "stargazers_count": 9,
+        "watchers_count": 9,
+        "forks_count": 6,
+        "forks": 6,
+        "watchers": 9,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index 452918c087..300863dc7b 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -82,13 +82,13 @@
         "description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
         "fork": false,
         "created_at": "2020-03-11T15:21:27Z",
-        "updated_at": "2020-05-13T21:12:19Z",
+        "updated_at": "2020-05-14T08:34:32Z",
         "pushed_at": "2020-03-13T09:54:16Z",
-        "stargazers_count": 434,
-        "watchers_count": 434,
+        "stargazers_count": 435,
+        "watchers_count": 435,
         "forks_count": 128,
         "forks": 128,
-        "watchers": 434,
+        "watchers": 435,
         "score": 0
     },
     {
@@ -956,13 +956,13 @@
         "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
         "fork": false,
         "created_at": "2020-03-30T11:42:56Z",
-        "updated_at": "2020-05-12T07:00:29Z",
+        "updated_at": "2020-05-14T06:53:24Z",
         "pushed_at": "2020-04-08T19:27:07Z",
-        "stargazers_count": 878,
-        "watchers_count": 878,
+        "stargazers_count": 879,
+        "watchers_count": 879,
         "forks_count": 255,
         "forks": 255,
-        "watchers": 878,
+        "watchers": 879,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-1015.json b/2020/CVE-2020-1015.json
index 9a4ce61a56..0b6445ae8b 100644
--- a/2020/CVE-2020-1015.json
+++ b/2020/CVE-2020-1015.json
@@ -13,13 +13,13 @@
         "description": "PoC for CVE-2020-1015",
         "fork": false,
         "created_at": "2020-05-13T16:42:17Z",
-        "updated_at": "2020-05-14T02:14:41Z",
+        "updated_at": "2020-05-14T08:13:44Z",
         "pushed_at": "2020-05-13T17:37:02Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 4,
+        "stargazers_count": 8,
+        "watchers_count": 8,
+        "forks_count": 1,
+        "forks": 1,
+        "watchers": 8,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json
index 6fcdfd094d..30d138dbbb 100644
--- a/2020/CVE-2020-10199.json
+++ b/2020/CVE-2020-10199.json
@@ -13,13 +13,13 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2020-05-14T02:50:07Z",
+        "updated_at": "2020-05-14T08:55:51Z",
         "pushed_at": "2020-05-11T04:14:46Z",
-        "stargazers_count": 702,
-        "watchers_count": 702,
-        "forks_count": 150,
-        "forks": 150,
-        "watchers": 702,
+        "stargazers_count": 708,
+        "watchers_count": 708,
+        "forks_count": 152,
+        "forks": 152,
+        "watchers": 708,
         "score": 0
     },
     {
@@ -59,13 +59,13 @@
         "description": "CVE-2020-10199、CVE-2020-10204、CVE-2020-11444",
         "fork": false,
         "created_at": "2020-04-08T07:36:30Z",
-        "updated_at": "2020-05-07T08:25:13Z",
+        "updated_at": "2020-05-14T07:34:31Z",
         "pushed_at": "2020-04-09T00:36:18Z",
-        "stargazers_count": 20,
-        "watchers_count": 20,
+        "stargazers_count": 21,
+        "watchers_count": 21,
         "forks_count": 6,
         "forks": 6,
-        "watchers": 20,
+        "watchers": 21,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json
index a311230c58..4025904acb 100644
--- a/2020/CVE-2020-11651.json
+++ b/2020/CVE-2020-11651.json
@@ -36,13 +36,13 @@
         "description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652",
         "fork": false,
         "created_at": "2020-05-01T20:53:49Z",
-        "updated_at": "2020-05-13T02:39:02Z",
+        "updated_at": "2020-05-14T03:12:51Z",
         "pushed_at": "2020-05-08T01:28:39Z",
-        "stargazers_count": 92,
-        "watchers_count": 92,
+        "stargazers_count": 93,
+        "watchers_count": 93,
         "forks_count": 16,
         "forks": 16,
-        "watchers": 92,
+        "watchers": 93,
         "score": 0
     },
     {
@@ -63,8 +63,8 @@
         "pushed_at": "2020-05-04T08:11:21Z",
         "stargazers_count": 82,
         "watchers_count": 82,
-        "forks_count": 26,
-        "forks": 26,
+        "forks_count": 27,
+        "forks": 27,
         "watchers": 82,
         "score": 0
     },
@@ -201,8 +201,8 @@
         "pushed_at": "2020-05-09T07:29:21Z",
         "stargazers_count": 5,
         "watchers_count": 5,
-        "forks_count": 0,
-        "forks": 0,
+        "forks_count": 1,
+        "forks": 1,
         "watchers": 5,
         "score": 0
     },
diff --git a/2020/CVE-2020-11932.json b/2020/CVE-2020-11932.json
index 822254995d..394e637362 100644
--- a/2020/CVE-2020-11932.json
+++ b/2020/CVE-2020-11932.json
@@ -13,13 +13,13 @@
         "description": "Double-Free BUG in WhatsApp exploit poc.",
         "fork": false,
         "created_at": "2020-05-10T15:25:59Z",
-        "updated_at": "2020-05-13T08:40:07Z",
+        "updated_at": "2020-05-14T06:35:25Z",
         "pushed_at": "2020-05-10T15:32:54Z",
-        "stargazers_count": 45,
-        "watchers_count": 45,
+        "stargazers_count": 46,
+        "watchers_count": 46,
         "forks_count": 25,
         "forks": 25,
-        "watchers": 45,
+        "watchers": 46,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-12116.json b/2020/CVE-2020-12116.json
index 4287b3c3e8..8ab240e310 100644
--- a/2020/CVE-2020-12116.json
+++ b/2020/CVE-2020-12116.json
@@ -13,13 +13,13 @@
         "description": "Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.",
         "fork": false,
         "created_at": "2020-05-08T15:56:26Z",
-        "updated_at": "2020-05-14T03:07:13Z",
+        "updated_at": "2020-05-14T06:25:03Z",
         "pushed_at": "2020-05-08T17:10:48Z",
-        "stargazers_count": 19,
-        "watchers_count": 19,
-        "forks_count": 7,
-        "forks": 7,
-        "watchers": 19,
+        "stargazers_count": 20,
+        "watchers_count": 20,
+        "forks_count": 8,
+        "forks": 8,
+        "watchers": 20,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-12717.json b/2020/CVE-2020-12717.json
index 23f97c7dfb..803e7a6184 100644
--- a/2020/CVE-2020-12717.json
+++ b/2020/CVE-2020-12717.json
@@ -13,8 +13,8 @@
         "description": "Code for exploit for CVE-2020-12717",
         "fork": false,
         "created_at": "2020-05-11T13:09:52Z",
-        "updated_at": "2020-05-14T01:38:10Z",
-        "pushed_at": "2020-05-14T02:36:44Z",
+        "updated_at": "2020-05-14T06:46:06Z",
+        "pushed_at": "2020-05-14T06:46:03Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 2,
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 1d0a25fe8e..26ab67f432 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,13 +13,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-05-13T09:16:19Z",
+        "updated_at": "2020-05-14T08:56:44Z",
         "pushed_at": "2020-03-27T09:16:40Z",
-        "stargazers_count": 410,
-        "watchers_count": 410,
+        "stargazers_count": 412,
+        "watchers_count": 412,
         "forks_count": 92,
         "forks": 92,
-        "watchers": 410,
+        "watchers": 412,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json
index 3907c604b0..0638be561b 100644
--- a/2020/CVE-2020-2555.json
+++ b/2020/CVE-2020-2555.json
@@ -59,13 +59,13 @@
         "description": "CVE-2020-2555",
         "fork": false,
         "created_at": "2020-03-07T12:02:26Z",
-        "updated_at": "2020-05-13T04:29:13Z",
+        "updated_at": "2020-05-14T06:30:03Z",
         "pushed_at": "2020-04-19T04:49:05Z",
-        "stargazers_count": 24,
-        "watchers_count": 24,
+        "stargazers_count": 25,
+        "watchers_count": 25,
         "forks_count": 5,
         "forks": 5,
-        "watchers": 24,
+        "watchers": 25,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json
index cc212b933b..7b331e8ed1 100644
--- a/2020/CVE-2020-2883.json
+++ b/2020/CVE-2020-2883.json
@@ -13,13 +13,13 @@
         "description": "Weblogic coherence.jar RCE",
         "fork": false,
         "created_at": "2020-05-10T09:04:43Z",
-        "updated_at": "2020-05-14T02:48:42Z",
+        "updated_at": "2020-05-14T06:38:13Z",
         "pushed_at": "2020-05-10T09:29:36Z",
-        "stargazers_count": 67,
-        "watchers_count": 67,
+        "stargazers_count": 69,
+        "watchers_count": 69,
         "forks_count": 12,
         "forks": 12,
-        "watchers": 67,
+        "watchers": 69,
         "score": 0
     },
     {
@@ -36,13 +36,13 @@
         "description": "Proof of concept for Weblogic CVE-2020-2883",
         "fork": false,
         "created_at": "2020-05-13T09:56:48Z",
-        "updated_at": "2020-05-13T10:19:09Z",
+        "updated_at": "2020-05-14T03:34:49Z",
         "pushed_at": "2020-05-13T10:19:07Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "forks_count": 0,
         "forks": 0,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json
index 36605ef5dc..04f32b3034 100644
--- a/2020/CVE-2020-3952.json
+++ b/2020/CVE-2020-3952.json
@@ -59,13 +59,13 @@
         "description": "Exploit for CVE-2020-3952 in vCenter 6.7",
         "fork": false,
         "created_at": "2020-04-16T07:40:51Z",
-        "updated_at": "2020-05-08T12:32:37Z",
+        "updated_at": "2020-05-14T07:49:48Z",
         "pushed_at": "2020-04-16T08:38:42Z",
-        "stargazers_count": 181,
-        "watchers_count": 181,
+        "stargazers_count": 182,
+        "watchers_count": 182,
         "forks_count": 37,
         "forks": 37,
-        "watchers": 181,
+        "watchers": 182,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-5837.json b/2020/CVE-2020-5837.json
index cd5eb9b47f..56b29f97f7 100644
--- a/2020/CVE-2020-5837.json
+++ b/2020/CVE-2020-5837.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020-5837 exploit",
         "fork": false,
         "created_at": "2020-04-16T08:15:18Z",
-        "updated_at": "2020-05-13T18:47:27Z",
+        "updated_at": "2020-05-14T06:21:32Z",
         "pushed_at": "2020-05-13T09:45:12Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
-        "forks_count": 1,
-        "forks": 1,
-        "watchers": 4,
+        "stargazers_count": 8,
+        "watchers_count": 8,
+        "forks_count": 2,
+        "forks": 2,
+        "watchers": 8,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-8004.json b/2020/CVE-2020-8004.json
new file mode 100644
index 0000000000..3be54f3c79
--- /dev/null
+++ b/2020/CVE-2020-8004.json
@@ -0,0 +1,25 @@
+[
+    {
+        "id": 263809511,
+        "name": "CVE-2020-8004",
+        "full_name": "wuxx\/CVE-2020-8004",
+        "owner": {
+            "login": "wuxx",
+            "id": 1648489,
+            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1648489?v=4",
+            "html_url": "https:\/\/github.com\/wuxx"
+        },
+        "html_url": "https:\/\/github.com\/wuxx\/CVE-2020-8004",
+        "description": null,
+        "fork": false,
+        "created_at": "2020-05-14T03:52:58Z",
+        "updated_at": "2020-05-14T07:01:23Z",
+        "pushed_at": "2020-05-14T07:01:21Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
+    }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-8417.json b/2020/CVE-2020-8417.json
index a99179a9f4..6ed0325df4 100644
--- a/2020/CVE-2020-8417.json
+++ b/2020/CVE-2020-8417.json
@@ -13,13 +13,13 @@
         "description": "Docker repository with a PoC for WP Code Snippets 2.13.3 (CVE-2020-8417)",
         "fork": false,
         "created_at": "2020-02-06T00:03:14Z",
-        "updated_at": "2020-04-23T03:28:16Z",
+        "updated_at": "2020-05-14T06:13:42Z",
         "pushed_at": "2020-04-23T03:28:14Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
+        "stargazers_count": 2,
+        "watchers_count": 2,
         "forks_count": 0,
         "forks": 0,
-        "watchers": 1,
+        "watchers": 2,
         "score": 0
     },
     {
diff --git a/README.md b/README.md
index 5d58869dbf..2ac2038e15 100644
--- a/README.md
+++ b/README.md
@@ -515,6 +515,11 @@ The iframe plugin before 4.5 for WordPress does not sanitize a URL.
 - [g-rubert/CVE-2020-12696](https://github.com/g-rubert/CVE-2020-12696)
 
 ### CVE-2020-12717
+
+<code>
+The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTogether (Singapore) apps were also affected.
+</code>
+
 - [wabzqem/covidsafe-CVE-2020-12717-exploit](https://github.com/wabzqem/covidsafe-CVE-2020-12717-exploit)
 
 ### CVE-2020-1611
@@ -853,6 +858,14 @@ Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS command
 
 - [Xh4H/Satellian-CVE-2020-7980](https://github.com/Xh4H/Satellian-CVE-2020-7980)
 
+### CVE-2020-8004
+
+<code>
+STMicroelectronics STM32F1 devices have Incorrect Access Control.
+</code>
+
+- [wuxx/CVE-2020-8004](https://github.com/wuxx/CVE-2020-8004)
+
 ### CVE-2020-8012
 
 <code>