From d46772b0384587b63964d8e0dc5d9f89ad08f097 Mon Sep 17 00:00:00 2001 From: motikan2010-bot <k.agena1993@gmail.com> Date: Thu, 14 May 2020 18:07:48 +0900 Subject: [PATCH] Auto Update 2020/05/14 18:07:48 --- 2014/CVE-2014-4210.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2017/CVE-2017-1000367.json | 24 ++++++++++++------------ 2017/CVE-2017-3066.json | 8 ++++---- 2017/CVE-2017-3248.json | 8 ++++---- 2017/CVE-2017-8464.json | 4 ++-- 2018/CVE-2018-0886.json | 8 ++++---- 2018/CVE-2018-10388.json | 4 ++-- 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-8174.json | 8 ++++---- 2019/CVE-2019-0708.json | 12 ++++++------ 2019/CVE-2019-1040.json | 8 ++++---- 2019/CVE-2019-1388.json | 8 ++++---- 2019/CVE-2019-1652.json | 8 ++++---- 2019/CVE-2019-17558.json | 12 ++++++------ 2019/CVE-2019-2618.json | 16 ++++++++-------- 2019/CVE-2019-2725.json | 8 ++++---- 2019/CVE-2019-5736.json | 4 ++-- 2020/CVE-2020-0041.json | 12 ++++++------ 2020/CVE-2020-0624.json | 8 ++++---- 2020/CVE-2020-0674.json | 8 ++++---- 2020/CVE-2020-0753.json | 12 ++++++------ 2020/CVE-2020-0796.json | 16 ++++++++-------- 2020/CVE-2020-1015.json | 12 ++++++------ 2020/CVE-2020-10199.json | 20 ++++++++++---------- 2020/CVE-2020-11651.json | 16 ++++++++-------- 2020/CVE-2020-11932.json | 8 ++++---- 2020/CVE-2020-12116.json | 12 ++++++------ 2020/CVE-2020-12717.json | 4 ++-- 2020/CVE-2020-2551.json | 8 ++++---- 2020/CVE-2020-2555.json | 8 ++++---- 2020/CVE-2020-2883.json | 16 ++++++++-------- 2020/CVE-2020-3952.json | 8 ++++---- 2020/CVE-2020-5837.json | 12 ++++++------ 2020/CVE-2020-8004.json | 25 +++++++++++++++++++++++++ 2020/CVE-2020-8417.json | 8 ++++---- README.md | 13 +++++++++++++ 37 files changed, 214 insertions(+), 176 deletions(-) create mode 100644 2020/CVE-2020-8004.json diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index cfc71ecb30..d31fbc928f 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-05-13T09:16:19Z", + "updated_at": "2020-05-14T08:56:44Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 410, - "watchers_count": 410, + "stargazers_count": 412, + "watchers_count": 412, "forks_count": 92, "forks": 92, - "watchers": 410, + "watchers": 412, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 5bcd80f0f2..d127e9d71b 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-05-13T09:16:19Z", + "updated_at": "2020-05-14T08:56:44Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 410, - "watchers_count": 410, + "stargazers_count": 412, + "watchers_count": 412, "forks_count": 92, "forks": 92, - "watchers": 410, + "watchers": 412, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-1000367.json b/2017/CVE-2017-1000367.json index f377f92fa6..1963bd13e8 100644 --- a/2017/CVE-2017-1000367.json +++ b/2017/CVE-2017-1000367.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2017-05-30T18:12:38Z", - "updated_at": "2019-06-21T16:24:42Z", + "updated_at": "2020-05-14T07:02:46Z", "pushed_at": "2017-06-05T19:53:35Z", - "stargazers_count": 115, - "watchers_count": 115, - "forks_count": 38, - "forks": 38, - "watchers": 115, + "stargazers_count": 116, + "watchers_count": 116, + "forks_count": 39, + "forks": 39, + "watchers": 116, "score": 0 }, { @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2017-06-04T12:31:59Z", - "updated_at": "2017-06-29T18:51:47Z", + "updated_at": "2020-05-14T07:02:54Z", "pushed_at": "2017-06-04T12:49:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 3, - "forks": 3, - "watchers": 1, + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 4, + "forks": 4, + "watchers": 2, "score": 0 }, { diff --git a/2017/CVE-2017-3066.json b/2017/CVE-2017-3066.json index 537a5503af..5f288a5d2b 100644 --- a/2017/CVE-2017-3066.json +++ b/2017/CVE-2017-3066.json @@ -13,13 +13,13 @@ "description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12", "fork": false, "created_at": "2018-03-12T16:44:12Z", - "updated_at": "2020-05-12T16:17:42Z", + "updated_at": "2020-05-14T05:58:24Z", "pushed_at": "2018-03-12T16:50:20Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "forks_count": 21, "forks": 21, - "watchers": 43, + "watchers": 44, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 0ed6876c69..6d4ab07a4d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-05-13T09:16:19Z", + "updated_at": "2020-05-14T08:56:44Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 410, - "watchers_count": 410, + "stargazers_count": 412, + "watchers_count": 412, "forks_count": 92, "forks": 92, - "watchers": 410, + "watchers": 412, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-8464.json b/2017/CVE-2017-8464.json index 7a39479dbf..70dfd833f5 100644 --- a/2017/CVE-2017-8464.json +++ b/2017/CVE-2017-8464.json @@ -63,8 +63,8 @@ "pushed_at": "2017-08-07T12:42:33Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 5, - "forks": 5, + "forks_count": 6, + "forks": 6, "watchers": 5, "score": 0 }, diff --git a/2018/CVE-2018-0886.json b/2018/CVE-2018-0886.json index ea03bdb64b..0fa4c95467 100644 --- a/2018/CVE-2018-0886.json +++ b/2018/CVE-2018-0886.json @@ -13,13 +13,13 @@ "description": "A code demonstrating CVE-2018-0886", "fork": false, "created_at": "2018-04-02T12:52:07Z", - "updated_at": "2020-05-05T02:12:53Z", + "updated_at": "2020-05-14T07:30:17Z", "pushed_at": "2018-06-02T10:33:41Z", - "stargazers_count": 240, - "watchers_count": 240, + "stargazers_count": 241, + "watchers_count": 241, "forks_count": 58, "forks": 58, - "watchers": 240, + "watchers": 241, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-10388.json b/2018/CVE-2018-10388.json index be69341bd9..ea05e7308e 100644 --- a/2018/CVE-2018-10388.json +++ b/2018/CVE-2018-10388.json @@ -13,8 +13,8 @@ "description": "practice", "fork": false, "created_at": "2020-05-13T14:52:43Z", - "updated_at": "2020-05-13T18:17:36Z", - "pushed_at": "2020-05-13T18:17:34Z", + "updated_at": "2020-05-14T07:34:09Z", + "pushed_at": "2020-05-14T07:34:06Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index e8471547b7..a8f1ce0582 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-05-13T09:16:19Z", + "updated_at": "2020-05-14T08:56:44Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 410, - "watchers_count": 410, + "stargazers_count": 412, + "watchers_count": 412, "forks_count": 92, "forks": 92, - "watchers": 410, + "watchers": 412, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json index e58ffd189a..1c0afeb979 100644 --- a/2018/CVE-2018-8174.json +++ b/2018/CVE-2018-8174.json @@ -13,13 +13,13 @@ "description": "CVE-2018-8174 - VBScript memory corruption exploit.", "fork": false, "created_at": "2018-05-22T21:50:32Z", - "updated_at": "2020-05-13T03:24:55Z", + "updated_at": "2020-05-14T08:57:25Z", "pushed_at": "2018-05-23T20:43:58Z", - "stargazers_count": 162, - "watchers_count": 162, + "stargazers_count": 163, + "watchers_count": 163, "forks_count": 76, "forks": 76, - "watchers": 162, + "watchers": 163, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 5d23d69e25..3da439936f 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1347,13 +1347,13 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2020-05-13T10:51:31Z", + "updated_at": "2020-05-14T06:34:02Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 731, - "watchers_count": 731, - "forks_count": 170, - "forks": 170, - "watchers": 731, + "stargazers_count": 732, + "watchers_count": 732, + "forks_count": 171, + "forks": 171, + "watchers": 732, "score": 0 }, { diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index c016f37eb8..b6e96f68a5 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -13,13 +13,13 @@ "description": "CVE-2019-1040 with Exchange", "fork": false, "created_at": "2019-06-14T11:16:03Z", - "updated_at": "2020-05-12T06:26:13Z", + "updated_at": "2020-05-14T06:42:11Z", "pushed_at": "2020-03-20T09:11:20Z", - "stargazers_count": 164, - "watchers_count": 164, + "stargazers_count": 165, + "watchers_count": 165, "forks_count": 56, "forks": 56, - "watchers": 164, + "watchers": 165, "score": 0 }, { diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index a130c2a0fc..51b2a89a96 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -13,13 +13,13 @@ "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", "fork": false, "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2020-05-11T03:16:32Z", + "updated_at": "2020-05-14T04:31:57Z", "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 77, + "watchers_count": 77, "forks_count": 31, "forks": 31, - "watchers": 76, + "watchers": 77, "score": 0 }, { diff --git a/2019/CVE-2019-1652.json b/2019/CVE-2019-1652.json index 5df10e758d..d08e093017 100644 --- a/2019/CVE-2019-1652.json +++ b/2019/CVE-2019-1652.json @@ -13,13 +13,13 @@ "description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!", "fork": false, "created_at": "2019-01-24T10:12:44Z", - "updated_at": "2020-04-28T12:06:31Z", + "updated_at": "2020-05-14T06:13:57Z", "pushed_at": "2019-02-08T12:38:05Z", - "stargazers_count": 188, - "watchers_count": 188, + "stargazers_count": 189, + "watchers_count": 189, "forks_count": 61, "forks": 61, - "watchers": 188, + "watchers": 189, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index d667138d13..b4c5ce75c3 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-05-14T02:50:07Z", + "updated_at": "2020-05-14T08:55:51Z", "pushed_at": "2020-05-11T04:14:46Z", - "stargazers_count": 702, - "watchers_count": 702, - "forks_count": 150, - "forks": 150, - "watchers": 702, + "stargazers_count": 708, + "watchers_count": 708, + "forks_count": 152, + "forks": 152, + "watchers": 708, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 5d2bbe9413..46f22e852a 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2020-05-14T02:16:34Z", + "updated_at": "2020-05-14T07:56:53Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 544, - "watchers_count": 544, + "stargazers_count": 547, + "watchers_count": 547, "forks_count": 120, "forks": 120, - "watchers": 544, + "watchers": 547, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-05-13T09:16:19Z", + "updated_at": "2020-05-14T08:56:44Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 410, - "watchers_count": 410, + "stargazers_count": 412, + "watchers_count": 412, "forks_count": 92, "forks": 92, - "watchers": 410, + "watchers": 412, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index b2bc7675db..8f176cde6a 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -174,13 +174,13 @@ "description": "CVE-2019-2725 命令回显", "fork": false, "created_at": "2019-05-29T01:57:05Z", - "updated_at": "2020-05-14T00:26:59Z", + "updated_at": "2020-05-14T08:35:36Z", "pushed_at": "2019-08-08T09:48:20Z", - "stargazers_count": 331, - "watchers_count": 331, + "stargazers_count": 333, + "watchers_count": 333, "forks_count": 146, "forks": 146, - "watchers": 331, + "watchers": 333, "score": 0 }, { diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 3aead0e889..238f62e156 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -473,8 +473,8 @@ "description": null, "fork": false, "created_at": "2020-05-10T04:49:28Z", - "updated_at": "2020-05-13T04:49:27Z", - "pushed_at": "2020-05-13T04:49:26Z", + "updated_at": "2020-05-14T04:06:14Z", + "pushed_at": "2020-05-14T04:06:12Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json index 07f3c95760..b9fd3f32a7 100644 --- a/2020/CVE-2020-0041.json +++ b/2020/CVE-2020-0041.json @@ -13,13 +13,13 @@ "description": "Exploits for Android Binder bug CVE-2020-0041", "fork": false, "created_at": "2020-03-31T17:53:57Z", - "updated_at": "2020-05-14T02:01:28Z", + "updated_at": "2020-05-14T06:04:13Z", "pushed_at": "2020-04-08T08:55:30Z", - "stargazers_count": 95, - "watchers_count": 95, - "forks_count": 21, - "forks": 21, - "watchers": 95, + "stargazers_count": 96, + "watchers_count": 96, + "forks_count": 22, + "forks": 22, + "watchers": 96, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0624.json b/2020/CVE-2020-0624.json index d23dbbeeb5..632ed22198 100644 --- a/2020/CVE-2020-0624.json +++ b/2020/CVE-2020-0624.json @@ -13,13 +13,13 @@ "description": "win32k use-after-free poc", "fork": false, "created_at": "2020-04-22T13:11:16Z", - "updated_at": "2020-05-02T01:59:41Z", + "updated_at": "2020-05-14T06:20:16Z", "pushed_at": "2020-04-22T13:11:27Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 54, + "watchers_count": 54, "forks_count": 28, "forks": 28, - "watchers": 53, + "watchers": 54, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0674.json b/2020/CVE-2020-0674.json index 815c61ad91..4e40510e99 100644 --- a/2020/CVE-2020-0674.json +++ b/2020/CVE-2020-0674.json @@ -36,13 +36,13 @@ "description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.", "fork": false, "created_at": "2020-05-07T22:02:25Z", - "updated_at": "2020-05-13T16:42:06Z", + "updated_at": "2020-05-14T06:53:37Z", "pushed_at": "2020-05-07T22:21:21Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 108, + "watchers_count": 108, "forks_count": 28, "forks": 28, - "watchers": 106, + "watchers": 108, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0753.json b/2020/CVE-2020-0753.json index d70c47ffc7..7f75d93f53 100644 --- a/2020/CVE-2020-0753.json +++ b/2020/CVE-2020-0753.json @@ -13,13 +13,13 @@ "description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.", "fork": false, "created_at": "2020-02-22T13:53:22Z", - "updated_at": "2020-04-27T01:19:04Z", + "updated_at": "2020-05-14T06:57:29Z", "pushed_at": "2020-04-15T17:41:44Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 5, - "forks": 5, - "watchers": 8, + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 6, + "forks": 6, + "watchers": 9, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 452918c087..300863dc7b 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -82,13 +82,13 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2020-05-13T21:12:19Z", + "updated_at": "2020-05-14T08:34:32Z", "pushed_at": "2020-03-13T09:54:16Z", - "stargazers_count": 434, - "watchers_count": 434, + "stargazers_count": 435, + "watchers_count": 435, "forks_count": 128, "forks": 128, - "watchers": 434, + "watchers": 435, "score": 0 }, { @@ -956,13 +956,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2020-05-12T07:00:29Z", + "updated_at": "2020-05-14T06:53:24Z", "pushed_at": "2020-04-08T19:27:07Z", - "stargazers_count": 878, - "watchers_count": 878, + "stargazers_count": 879, + "watchers_count": 879, "forks_count": 255, "forks": 255, - "watchers": 878, + "watchers": 879, "score": 0 }, { diff --git a/2020/CVE-2020-1015.json b/2020/CVE-2020-1015.json index 9a4ce61a56..0b6445ae8b 100644 --- a/2020/CVE-2020-1015.json +++ b/2020/CVE-2020-1015.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2020-1015", "fork": false, "created_at": "2020-05-13T16:42:17Z", - "updated_at": "2020-05-14T02:14:41Z", + "updated_at": "2020-05-14T08:13:44Z", "pushed_at": "2020-05-13T17:37:02Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 1, + "forks": 1, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json index 6fcdfd094d..30d138dbbb 100644 --- a/2020/CVE-2020-10199.json +++ b/2020/CVE-2020-10199.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-05-14T02:50:07Z", + "updated_at": "2020-05-14T08:55:51Z", "pushed_at": "2020-05-11T04:14:46Z", - "stargazers_count": 702, - "watchers_count": 702, - "forks_count": 150, - "forks": 150, - "watchers": 702, + "stargazers_count": 708, + "watchers_count": 708, + "forks_count": 152, + "forks": 152, + "watchers": 708, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "CVE-2020-10199、CVE-2020-10204、CVE-2020-11444", "fork": false, "created_at": "2020-04-08T07:36:30Z", - "updated_at": "2020-05-07T08:25:13Z", + "updated_at": "2020-05-14T07:34:31Z", "pushed_at": "2020-04-09T00:36:18Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "forks_count": 6, "forks": 6, - "watchers": 20, + "watchers": 21, "score": 0 }, { diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json index a311230c58..4025904acb 100644 --- a/2020/CVE-2020-11651.json +++ b/2020/CVE-2020-11651.json @@ -36,13 +36,13 @@ "description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652", "fork": false, "created_at": "2020-05-01T20:53:49Z", - "updated_at": "2020-05-13T02:39:02Z", + "updated_at": "2020-05-14T03:12:51Z", "pushed_at": "2020-05-08T01:28:39Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "forks_count": 16, "forks": 16, - "watchers": 92, + "watchers": 93, "score": 0 }, { @@ -63,8 +63,8 @@ "pushed_at": "2020-05-04T08:11:21Z", "stargazers_count": 82, "watchers_count": 82, - "forks_count": 26, - "forks": 26, + "forks_count": 27, + "forks": 27, "watchers": 82, "score": 0 }, @@ -201,8 +201,8 @@ "pushed_at": "2020-05-09T07:29:21Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 5, "score": 0 }, diff --git a/2020/CVE-2020-11932.json b/2020/CVE-2020-11932.json index 822254995d..394e637362 100644 --- a/2020/CVE-2020-11932.json +++ b/2020/CVE-2020-11932.json @@ -13,13 +13,13 @@ "description": "Double-Free BUG in WhatsApp exploit poc.", "fork": false, "created_at": "2020-05-10T15:25:59Z", - "updated_at": "2020-05-13T08:40:07Z", + "updated_at": "2020-05-14T06:35:25Z", "pushed_at": "2020-05-10T15:32:54Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "forks_count": 25, "forks": 25, - "watchers": 45, + "watchers": 46, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-12116.json b/2020/CVE-2020-12116.json index 4287b3c3e8..8ab240e310 100644 --- a/2020/CVE-2020-12116.json +++ b/2020/CVE-2020-12116.json @@ -13,13 +13,13 @@ "description": "Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.", "fork": false, "created_at": "2020-05-08T15:56:26Z", - "updated_at": "2020-05-14T03:07:13Z", + "updated_at": "2020-05-14T06:25:03Z", "pushed_at": "2020-05-08T17:10:48Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 7, - "forks": 7, - "watchers": 19, + "stargazers_count": 20, + "watchers_count": 20, + "forks_count": 8, + "forks": 8, + "watchers": 20, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-12717.json b/2020/CVE-2020-12717.json index 23f97c7dfb..803e7a6184 100644 --- a/2020/CVE-2020-12717.json +++ b/2020/CVE-2020-12717.json @@ -13,8 +13,8 @@ "description": "Code for exploit for CVE-2020-12717", "fork": false, "created_at": "2020-05-11T13:09:52Z", - "updated_at": "2020-05-14T01:38:10Z", - "pushed_at": "2020-05-14T02:36:44Z", + "updated_at": "2020-05-14T06:46:06Z", + "pushed_at": "2020-05-14T06:46:03Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 1d0a25fe8e..26ab67f432 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-05-13T09:16:19Z", + "updated_at": "2020-05-14T08:56:44Z", "pushed_at": "2020-03-27T09:16:40Z", - "stargazers_count": 410, - "watchers_count": 410, + "stargazers_count": 412, + "watchers_count": 412, "forks_count": 92, "forks": 92, - "watchers": 410, + "watchers": 412, "score": 0 }, { diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index 3907c604b0..0638be561b 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -59,13 +59,13 @@ "description": "CVE-2020-2555", "fork": false, "created_at": "2020-03-07T12:02:26Z", - "updated_at": "2020-05-13T04:29:13Z", + "updated_at": "2020-05-14T06:30:03Z", "pushed_at": "2020-04-19T04:49:05Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "forks_count": 5, "forks": 5, - "watchers": 24, + "watchers": 25, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index cc212b933b..7b331e8ed1 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -13,13 +13,13 @@ "description": "Weblogic coherence.jar RCE", "fork": false, "created_at": "2020-05-10T09:04:43Z", - "updated_at": "2020-05-14T02:48:42Z", + "updated_at": "2020-05-14T06:38:13Z", "pushed_at": "2020-05-10T09:29:36Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 69, + "watchers_count": 69, "forks_count": 12, "forks": 12, - "watchers": 67, + "watchers": 69, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "Proof of concept for Weblogic CVE-2020-2883", "fork": false, "created_at": "2020-05-13T09:56:48Z", - "updated_at": "2020-05-13T10:19:09Z", + "updated_at": "2020-05-14T03:34:49Z", "pushed_at": "2020-05-13T10:19:07Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 36605ef5dc..04f32b3034 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -59,13 +59,13 @@ "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", - "updated_at": "2020-05-08T12:32:37Z", + "updated_at": "2020-05-14T07:49:48Z", "pushed_at": "2020-04-16T08:38:42Z", - "stargazers_count": 181, - "watchers_count": 181, + "stargazers_count": 182, + "watchers_count": 182, "forks_count": 37, "forks": 37, - "watchers": 181, + "watchers": 182, "score": 0 }, { diff --git a/2020/CVE-2020-5837.json b/2020/CVE-2020-5837.json index cd5eb9b47f..56b29f97f7 100644 --- a/2020/CVE-2020-5837.json +++ b/2020/CVE-2020-5837.json @@ -13,13 +13,13 @@ "description": "CVE-2020-5837 exploit", "fork": false, "created_at": "2020-04-16T08:15:18Z", - "updated_at": "2020-05-13T18:47:27Z", + "updated_at": "2020-05-14T06:21:32Z", "pushed_at": "2020-05-13T09:45:12Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 1, - "forks": 1, - "watchers": 4, + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 2, + "forks": 2, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8004.json b/2020/CVE-2020-8004.json new file mode 100644 index 0000000000..3be54f3c79 --- /dev/null +++ b/2020/CVE-2020-8004.json @@ -0,0 +1,25 @@ +[ + { + "id": 263809511, + "name": "CVE-2020-8004", + "full_name": "wuxx\/CVE-2020-8004", + "owner": { + "login": "wuxx", + "id": 1648489, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1648489?v=4", + "html_url": "https:\/\/github.com\/wuxx" + }, + "html_url": "https:\/\/github.com\/wuxx\/CVE-2020-8004", + "description": null, + "fork": false, + "created_at": "2020-05-14T03:52:58Z", + "updated_at": "2020-05-14T07:01:23Z", + "pushed_at": "2020-05-14T07:01:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-8417.json b/2020/CVE-2020-8417.json index a99179a9f4..6ed0325df4 100644 --- a/2020/CVE-2020-8417.json +++ b/2020/CVE-2020-8417.json @@ -13,13 +13,13 @@ "description": "Docker repository with a PoC for WP Code Snippets 2.13.3 (CVE-2020-8417)", "fork": false, "created_at": "2020-02-06T00:03:14Z", - "updated_at": "2020-04-23T03:28:16Z", + "updated_at": "2020-05-14T06:13:42Z", "pushed_at": "2020-04-23T03:28:14Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/README.md b/README.md index 5d58869dbf..2ac2038e15 100644 --- a/README.md +++ b/README.md @@ -515,6 +515,11 @@ The iframe plugin before 4.5 for WordPress does not sanitize a URL. - [g-rubert/CVE-2020-12696](https://github.com/g-rubert/CVE-2020-12696) ### CVE-2020-12717 + +<code> +The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTogether (Singapore) apps were also affected. +</code> + - [wabzqem/covidsafe-CVE-2020-12717-exploit](https://github.com/wabzqem/covidsafe-CVE-2020-12717-exploit) ### CVE-2020-1611 @@ -853,6 +858,14 @@ Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS command - [Xh4H/Satellian-CVE-2020-7980](https://github.com/Xh4H/Satellian-CVE-2020-7980) +### CVE-2020-8004 + +<code> +STMicroelectronics STM32F1 devices have Incorrect Access Control. +</code> + +- [wuxx/CVE-2020-8004](https://github.com/wuxx/CVE-2020-8004) + ### CVE-2020-8012 <code>