From debf50fcdbb6014e0c4a424799120a5c59980498 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 28 Nov 2020 18:09:09 +0900 Subject: [PATCH] Auto Update 2020/11/28 18:09:09 --- 2015/CVE-2015-7755.json | 4 ++-- 2016/CVE-2016-5195.json | 8 ++++---- 2017/CVE-2017-7921.json | 8 ++++---- 2018/CVE-2018-14667.json | 8 ++++---- 2019/CVE-2019-0708.json | 16 ++++++++-------- 2019/CVE-2019-11510.json | 8 ++++---- 2019/CVE-2019-1405.json | 12 ++++++------ 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-2618.json | 12 ++++++------ 2019/CVE-2019-5418.json | 4 ++-- 2020/CVE-2020-1066.json | 8 ++++---- 2020/CVE-2020-11975.json | 8 ++++---- 2020/CVE-2020-13942.json | 8 ++++---- 2020/CVE-2020-1472.json | 16 ++++++++-------- 2020/CVE-2020-14882.json | 20 ++++++++++---------- 2020/CVE-2020-1948.json | 8 ++++---- 16 files changed, 78 insertions(+), 78 deletions(-) diff --git a/2015/CVE-2015-7755.json b/2015/CVE-2015-7755.json index cab97cdacf..0f3cd0f64b 100644 --- a/2015/CVE-2015-7755.json +++ b/2015/CVE-2015-7755.json @@ -17,8 +17,8 @@ "pushed_at": "2017-09-06T18:03:10Z", "stargazers_count": 98, "watchers_count": 98, - "forks_count": 38, - "forks": 38, + "forks_count": 39, + "forks": 39, "watchers": 98, "score": 0 }, diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index b42bc16ee8..c9e1501765 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -611,13 +611,13 @@ "description": "编译好的脏牛漏洞(CVE-2016-5195)EXP", "fork": false, "created_at": "2018-05-27T08:06:50Z", - "updated_at": "2020-10-21T07:13:57Z", + "updated_at": "2020-11-28T07:28:50Z", "pushed_at": "2018-05-27T08:24:17Z", - "stargazers_count": 84, - "watchers_count": 84, + "stargazers_count": 85, + "watchers_count": 85, "forks_count": 32, "forks": 32, - "watchers": 84, + "watchers": 85, "score": 0 }, { diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index 94b23a89d1..34876a363d 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -36,13 +36,13 @@ "description": "海康威视未授权访问检测poc及口令爆破", "fork": false, "created_at": "2020-11-12T09:02:10Z", - "updated_at": "2020-11-27T13:01:12Z", + "updated_at": "2020-11-28T06:38:17Z", "pushed_at": "2020-11-19T08:58:04Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 2, "forks": 2, - "watchers": 16, + "watchers": 17, "score": 0 }, { diff --git a/2018/CVE-2018-14667.json b/2018/CVE-2018-14667.json index 10fd9e2ba1..bd892fca8a 100644 --- a/2018/CVE-2018-14667.json +++ b/2018/CVE-2018-14667.json @@ -128,13 +128,13 @@ "description": "CVE-2018-14667-poc Richfaces漏洞环境及PoC", "fork": false, "created_at": "2019-09-23T07:45:01Z", - "updated_at": "2019-09-24T05:00:42Z", + "updated_at": "2020-11-28T03:33:49Z", "pushed_at": "2019-09-24T05:00:40Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 9bcb837225..9cccc08420 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1282,8 +1282,8 @@ "pushed_at": "2019-06-22T21:48:45Z", "stargazers_count": 777, "watchers_count": 777, - "forks_count": 190, - "forks": 190, + "forks_count": 191, + "forks": 191, "watchers": 777, "score": 0 }, @@ -2474,13 +2474,13 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2020-11-02T03:02:42Z", + "updated_at": "2020-11-28T08:20:13Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 62, - "watchers_count": 62, - "forks_count": 22, - "forks": 22, - "watchers": 62, + "stargazers_count": 67, + "watchers_count": 67, + "forks_count": 24, + "forks": 24, + "watchers": 67, "score": 0 }, { diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index 317e2e613b..6f520284a3 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -17,8 +17,8 @@ "pushed_at": "2020-01-11T13:55:33Z", "stargazers_count": 335, "watchers_count": 335, - "forks_count": 134, - "forks": 134, + "forks_count": 135, + "forks": 135, "watchers": 335, "score": 0 }, @@ -178,8 +178,8 @@ "pushed_at": "2020-01-15T17:01:50Z", "stargazers_count": 101, "watchers_count": 101, - "forks_count": 45, - "forks": 45, + "forks_count": 46, + "forks": 46, "watchers": 101, "score": 0 }, diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json index 35d18c9363..f9c5659d7d 100644 --- a/2019/CVE-2019-1405.json +++ b/2019/CVE-2019-1405.json @@ -13,13 +13,13 @@ "description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322", "fork": false, "created_at": "2019-11-13T16:34:03Z", - "updated_at": "2020-11-23T13:55:22Z", + "updated_at": "2020-11-28T06:34:54Z", "pushed_at": "2019-11-14T14:16:54Z", - "stargazers_count": 258, - "watchers_count": 258, - "forks_count": 62, - "forks": 62, - "watchers": 258, + "stargazers_count": 259, + "watchers_count": 259, + "forks_count": 63, + "forks": 63, + "watchers": 259, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 5ceb64b63d..b2cd3fd14c 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-11-27T14:47:03Z", + "updated_at": "2020-11-28T05:45:05Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2099, - "watchers_count": 2099, + "stargazers_count": 2100, + "watchers_count": 2100, "forks_count": 582, "forks": 582, - "watchers": 2099, + "watchers": 2100, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 086db87879..6afe57d164 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2020-11-27T13:04:44Z", + "updated_at": "2020-11-28T07:45:09Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 676, - "watchers_count": 676, - "forks_count": 140, - "forks": 140, - "watchers": 676, + "stargazers_count": 677, + "watchers_count": 677, + "forks_count": 141, + "forks": 141, + "watchers": 677, "score": 0 }, { diff --git a/2019/CVE-2019-5418.json b/2019/CVE-2019-5418.json index d4e88c3227..6238c067b7 100644 --- a/2019/CVE-2019-5418.json +++ b/2019/CVE-2019-5418.json @@ -17,8 +17,8 @@ "pushed_at": "2019-03-25T07:19:58Z", "stargazers_count": 164, "watchers_count": 164, - "forks_count": 19, - "forks": 19, + "forks_count": 20, + "forks": 20, "watchers": 164, "score": 0 }, diff --git a/2020/CVE-2020-1066.json b/2020/CVE-2020-1066.json index 80dc00cdbe..62ffdf2c40 100644 --- a/2020/CVE-2020-1066.json +++ b/2020/CVE-2020-1066.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统", "fork": false, "created_at": "2020-06-01T04:44:05Z", - "updated_at": "2020-11-28T02:45:28Z", + "updated_at": "2020-11-28T07:20:20Z", "pushed_at": "2020-06-17T00:56:08Z", - "stargazers_count": 138, - "watchers_count": 138, + "stargazers_count": 142, + "watchers_count": 142, "forks_count": 38, "forks": 38, - "watchers": 138, + "watchers": 142, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-11975.json b/2020/CVE-2020-11975.json index f3b4d2059c..2a75f17956 100644 --- a/2020/CVE-2020-11975.json +++ b/2020/CVE-2020-11975.json @@ -13,13 +13,13 @@ "description": "CVE-2020-11975 CVE-2020-13942", "fork": false, "created_at": "2020-11-24T05:23:42Z", - "updated_at": "2020-11-24T05:32:13Z", + "updated_at": "2020-11-28T07:12:23Z", "pushed_at": "2020-11-24T05:32:11Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-13942.json b/2020/CVE-2020-13942.json index 231ab278e9..0529b7064c 100644 --- a/2020/CVE-2020-13942.json +++ b/2020/CVE-2020-13942.json @@ -59,13 +59,13 @@ "description": "CVE-2020-13942 POC + Automation Script", "fork": false, "created_at": "2020-11-20T23:25:44Z", - "updated_at": "2020-11-23T14:31:52Z", + "updated_at": "2020-11-28T09:07:49Z", "pushed_at": "2020-11-23T10:48:34Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 6, "forks": 6, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 7377221d31..eca3ed25bb 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2020-11-26T02:52:59Z", + "updated_at": "2020-11-28T04:17:54Z", "pushed_at": "2020-10-21T12:10:28Z", - "stargazers_count": 1188, - "watchers_count": 1188, + "stargazers_count": 1189, + "watchers_count": 1189, "forks_count": 271, "forks": 271, - "watchers": 1188, + "watchers": 1189, "score": 0 }, { @@ -427,13 +427,13 @@ "description": "cve-2020-1472_Tool collection", "fork": false, "created_at": "2020-09-16T08:32:52Z", - "updated_at": "2020-09-17T04:29:16Z", + "updated_at": "2020-11-28T04:59:11Z", "pushed_at": "2020-09-16T09:13:44Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 2, "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 34a336f8c5..3c71254b96 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-11-27T14:47:03Z", + "updated_at": "2020-11-28T05:45:05Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2099, - "watchers_count": 2099, + "stargazers_count": 2100, + "watchers_count": 2100, "forks_count": 582, "forks": 582, - "watchers": 2099, + "watchers": 2100, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "CVE-2020–14882、CVE-2020–14883", "fork": false, "created_at": "2020-10-28T11:43:37Z", - "updated_at": "2020-11-27T09:28:05Z", + "updated_at": "2020-11-28T08:40:24Z", "pushed_at": "2020-11-16T04:23:09Z", - "stargazers_count": 188, - "watchers_count": 188, + "stargazers_count": 189, + "watchers_count": 189, "forks_count": 36, "forks": 36, - "watchers": 188, + "watchers": 189, "score": 0 }, { @@ -132,8 +132,8 @@ "pushed_at": "2020-10-29T06:36:01Z", "stargazers_count": 13, "watchers_count": 13, - "forks_count": 7, - "forks": 7, + "forks_count": 8, + "forks": 8, "watchers": 13, "score": 0 }, diff --git a/2020/CVE-2020-1948.json b/2020/CVE-2020-1948.json index 78d7745de6..646bbed116 100644 --- a/2020/CVE-2020-1948.json +++ b/2020/CVE-2020-1948.json @@ -82,13 +82,13 @@ "description": "[CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE", "fork": false, "created_at": "2020-07-14T02:42:41Z", - "updated_at": "2020-09-15T11:33:18Z", + "updated_at": "2020-11-28T03:57:24Z", "pushed_at": "2020-11-16T20:43:29Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 2, "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file