Auto Update 2020/03/12 00:07:16

This commit is contained in:
motikan2010-bot 2020-03-12 00:07:16 +09:00
parent 79c0489193
commit e10bced79d
36 changed files with 255 additions and 142 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-07-02T23:35:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-4210+Redis未授权访问",
"fork": false,
"created_at": "2017-03-10T02:09:48Z",
"updated_at": "2020-03-09T01:38:49Z",
"updated_at": "2020-03-11T13:18:19Z",
"pushed_at": "2017-03-10T08:35:42Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 28,
"forks": 28,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -106,7 +106,7 @@
"fork": false,
"created_at": "2018-06-19T07:05:51Z",
"updated_at": "2019-11-15T04:42:37Z",
"pushed_at": "2019-10-29T16:31:52Z",
"pushed_at": "2020-03-11T14:30:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,

View file

@ -13,13 +13,13 @@
"description": "OS X 10.11.6 LPE PoC for CVE-2016-4655 \/ CVE-2016-4656",
"fork": false,
"created_at": "2016-10-02T12:42:14Z",
"updated_at": "2020-03-04T23:39:46Z",
"updated_at": "2020-03-11T09:13:19Z",
"pushed_at": "2016-10-04T16:36:18Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 26,
"forks": 26,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2018-09-03T03:11:24Z",
"updated_at": "2020-03-11T07:44:18Z",
"updated_at": "2020-03-11T14:28:14Z",
"pushed_at": "2019-10-21T08:13:40Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 13,
"forks": 13,
"watchers": 35,
"watchers": 36,
"score": 0
},
{

View file

@ -385,8 +385,8 @@
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 59,
"forks": 59,
"forks_count": 60,
"forks": 60,
"watchers": 179,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2020-02-18T13:30:19Z",
"updated_at": "2020-03-11T10:24:56Z",
"pushed_at": "2019-12-13T17:40:34Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 23,
"forks": 23,
"watchers": 71,
"watchers": 72,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2020-02-19T00:36:28Z",
"updated_at": "2020-03-11T10:25:02Z",
"pushed_at": "2019-06-16T09:53:10Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 19,
"forks": 19,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-06-02T10:33:41Z",
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 57,
"forks": 57,
"forks_count": 58,
"forks": 58,
"watchers": 237,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-10-23T13:51:06Z",
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 40,
"forks": 40,
"forks_count": 41,
"forks": 41,
"watchers": 133,
"score": 0
},
@ -109,8 +109,8 @@
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 229,
"watchers_count": 229,
"forks_count": 50,
"forks": 50,
"forks_count": 51,
"forks": 51,
"watchers": 229,
"score": 0
},

View file

@ -2083,13 +2083,13 @@
"description": null,
"fork": false,
"created_at": "2019-08-21T00:48:55Z",
"updated_at": "2019-11-28T01:38:58Z",
"updated_at": "2020-03-11T13:53:42Z",
"pushed_at": "2019-11-28T01:38:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 2,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2020-03-02T15:15:05Z",
"updated_at": "2020-03-11T11:54:26Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 68,
"forks": 68,
"watchers": 243,
"watchers": 244,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2020-03-04T15:33:23Z",
"updated_at": "2020-03-11T11:21:10Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 25,
"forks": 25,
"watchers": 59,
"watchers": 60,
"score": 0
},
{
@ -40,8 +40,8 @@
"pushed_at": "2019-11-21T08:41:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2020-03-11T09:06:18Z",
"pushed_at": "2020-03-11T08:46:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"updated_at": "2020-03-11T14:54:27Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"forks": 3,
"watchers": 20,
"score": 0
}
]

25
2019/CVE-2019-17658.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 246558752,
"name": "CVE-2019-17658",
"full_name": "Ibonok\/CVE-2019-17658",
"owner": {
"login": "Ibonok",
"id": 37837775,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37837775?v=4",
"html_url": "https:\/\/github.com\/Ibonok"
},
"html_url": "https:\/\/github.com\/Ibonok\/CVE-2019-17658",
"description": "Unquoted Service Path exploit in FortiClient (CVE-2019-17658)",
"fork": false,
"created_at": "2020-03-11T11:58:24Z",
"updated_at": "2020-03-11T12:02:07Z",
"pushed_at": "2020-03-11T11:59:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2020-02-18T13:30:19Z",
"updated_at": "2020-03-11T10:24:56Z",
"pushed_at": "2019-12-13T17:40:34Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 23,
"forks": 23,
"watchers": 71,
"watchers": 72,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2020-03-04T15:33:00Z",
"updated_at": "2020-03-11T12:06:14Z",
"pushed_at": "2019-12-18T15:32:15Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 20,
"forks": 20,
"watchers": 112,
"watchers": 113,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 59,
"forks": 59,
"forks_count": 60,
"forks": 60,
"watchers": 179,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-28T07:15:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Automated Root Script for MTK ARM64 based chipsets based on diplomatic's CVE-2020-0069 (mtk-su) exploit.",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2020-03-10T17:54:34Z",
"updated_at": "2020-03-11T15:07:38Z",
"pushed_at": "2020-03-09T20:40:50Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)",
"fork": false,
"created_at": "2020-03-10T17:00:01Z",
"updated_at": "2020-03-11T08:24:12Z",
"updated_at": "2020-03-11T11:25:09Z",
"pushed_at": "2020-03-10T17:10:12Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 29,
"forks": 29,
"forks_count": 30,
"forks": 30,
"watchers": 143,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2020-03-09T14:23:29Z",
"updated_at": "2020-03-11T14:05:15Z",
"pushed_at": "2020-02-11T21:34:28Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 36,
"forks": 36,
"watchers": 172,
"watchers": 173,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 53,
"forks": 53,
"forks_count": 55,
"forks": 55,
"watchers": 157,
"score": 0
},
@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-03-11T07:45:16Z",
"updated_at": "2020-03-11T11:03:48Z",
"pushed_at": "2020-03-01T12:58:01Z",
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 34,
"forks": 34,
"watchers": 114,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 35,
"forks": 35,
"watchers": 116,
"score": 0
},
{
@ -224,8 +224,8 @@
"pushed_at": "2020-03-05T08:02:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six unfixed Window DOS Vulnerabilities.",
"fork": false,
"created_at": "2020-02-23T11:10:49Z",
"updated_at": "2020-02-27T07:31:09Z",
"updated_at": "2020-03-11T13:36:15Z",
"pushed_at": "2020-02-22T13:57:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 11,
"forks": 11,
"watchers": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
"fork": false,
"created_at": "2020-03-10T21:40:57Z",
"updated_at": "2020-03-11T06:00:13Z",
"updated_at": "2020-03-11T13:46:50Z",
"pushed_at": "2020-03-10T21:41:35Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2020-0796 Flaw Mitigation - Active Directory Administrative Templates",
"fork": false,
"created_at": "2020-03-11T03:43:29Z",
"updated_at": "2020-03-11T08:58:06Z",
"updated_at": "2020-03-11T13:45:57Z",
"pushed_at": "2020-03-11T04:57:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
"fork": false,
"created_at": "2020-03-11T06:51:58Z",
"updated_at": "2020-03-11T09:01:10Z",
"pushed_at": "2020-03-11T07:03:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2020-03-11T12:54:06Z",
"pushed_at": "2020-03-11T12:54:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0
}
]

25
2020/CVE-2020-0976.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 246525183,
"name": "CVE-2020-0976",
"full_name": "T13nn3s\/CVE-2020-0976",
"owner": {
"login": "T13nn3s",
"id": 29333776,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4",
"html_url": "https:\/\/github.com\/T13nn3s"
},
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-0976",
"description": "Powershell SMBv3 Compression checker",
"fork": false,
"created_at": "2020-03-11T09:13:48Z",
"updated_at": "2020-03-11T14:54:34Z",
"pushed_at": "2020-03-11T14:19:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
"fork": false,
"created_at": "2020-01-22T13:45:21Z",
"updated_at": "2020-02-28T19:27:47Z",
"updated_at": "2020-03-11T12:02:36Z",
"pushed_at": "2020-01-22T14:01:32Z",
"stargazers_count": 17,
"watchers_count": 17,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 76,
"forks": 76,
"forks_count": 77,
"forks": 77,
"watchers": 137,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1947 poc",
"fork": false,
"created_at": "2020-03-10T12:44:01Z",
"updated_at": "2020-03-11T08:38:41Z",
"updated_at": "2020-03-11T14:26:56Z",
"pushed_at": "2020-03-10T12:48:10Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 6,
"forks": 6,
"watchers": 23,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"forks": 7,
"watchers": 27,
"score": 0
},
{
@ -36,13 +36,36 @@
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
"fork": false,
"created_at": "2020-03-11T03:15:25Z",
"updated_at": "2020-03-11T08:23:33Z",
"updated_at": "2020-03-11T11:58:11Z",
"pushed_at": "2020-03-11T03:54:34Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"watchers": 14,
"score": 0
},
{
"id": 246566519,
"name": "CVE-2020-1947",
"full_name": "wsfengfan\/CVE-2020-1947",
"owner": {
"login": "wsfengfan",
"id": 33821840,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4",
"html_url": "https:\/\/github.com\/wsfengfan"
},
"html_url": "https:\/\/github.com\/wsfengfan\/CVE-2020-1947",
"description": "CVE-2020-1947 Python POC",
"fork": false,
"created_at": "2020-03-11T12:35:56Z",
"updated_at": "2020-03-11T15:06:31Z",
"pushed_at": "2020-03-11T15:06:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-03-10T15:46:18Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 18,
"forks": 18,
"forks_count": 19,
"forks": 19,
"watchers": 75,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-10T12:24:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"score": 0
},
@ -59,8 +59,8 @@
"description": "CVE-2020-2555",
"fork": false,
"created_at": "2020-03-07T12:02:26Z",
"updated_at": "2020-03-09T02:02:06Z",
"pushed_at": "2020-03-07T12:02:28Z",
"updated_at": "2020-03-11T09:58:43Z",
"pushed_at": "2020-03-11T09:58:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
@ -82,13 +82,13 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2020-03-11T07:15:18Z",
"updated_at": "2020-03-11T09:23:16Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 12,
"forks": 12,
"watchers": 56,
"watchers": 57,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE",
"fork": false,
"created_at": "2020-02-27T08:18:56Z",
"updated_at": "2020-03-10T11:32:43Z",
"updated_at": "2020-03-11T12:29:42Z",
"pushed_at": "2020-03-08T05:53:47Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

25
2020/CVE-2020-7931.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 246585568,
"name": "CVE-2020-7931",
"full_name": "gquere\/CVE-2020-7931",
"owner": {
"login": "gquere",
"id": 1585000,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1585000?v=4",
"html_url": "https:\/\/github.com\/gquere"
},
"html_url": "https:\/\/github.com\/gquere\/CVE-2020-7931",
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2020-03-11T14:10:00Z",
"pushed_at": "2020-03-11T14:08:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-8597 poc",
"fork": false,
"created_at": "2020-03-07T19:00:46Z",
"updated_at": "2020-03-11T07:53:07Z",
"updated_at": "2020-03-11T10:28:12Z",
"pushed_at": "2020-03-10T14:03:24Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
"fork": false,
"created_at": "2020-02-19T02:29:14Z",
"updated_at": "2020-03-10T04:00:13Z",
"updated_at": "2020-03-11T14:50:44Z",
"pushed_at": "2020-03-10T04:00:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -147,6 +147,9 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
- [technion/DisableSMBCompression](https://github.com/technion/DisableSMBCompression)
- [cve-2020-0796/cve-2020-0796](https://github.com/cve-2020-0796/cve-2020-0796)
### CVE-2020-0976
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
### CVE-2020-1611
<code>
@ -182,6 +185,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
### CVE-2020-1947
- [Imanfeng/CVE-2020-1947](https://github.com/Imanfeng/CVE-2020-1947)
- [jas502n/CVE-2020-1947](https://github.com/jas502n/CVE-2020-1947)
- [wsfengfan/CVE-2020-1947](https://github.com/wsfengfan/CVE-2020-1947)
### CVE-2020-2546
@ -328,6 +332,14 @@ An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allo
- [Pikaqi/cve-2020-7799](https://github.com/Pikaqi/cve-2020-7799)
- [ianxtianxt/CVE-2020-7799](https://github.com/ianxtianxt/CVE-2020-7799)
### CVE-2020-7931
<code>
In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
</code>
- [gquere/CVE-2020-7931](https://github.com/gquere/CVE-2020-7931)
### CVE-2020-7980
<code>
@ -2233,6 +2245,9 @@ For Eclipse Che versions 6.16 to 7.3.0, with both authentication and TLS disable
- [mgrube/CVE-2019-17633](https://github.com/mgrube/CVE-2019-17633)
### CVE-2019-17658
- [Ibonok/CVE-2019-17658](https://github.com/Ibonok/CVE-2019-17658)
### CVE-2019-1821
<code>