From f30b55a3743461aac3cd12f467470d29b3243d13 Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Fri, 16 Oct 2020 18:09:26 +0900
Subject: [PATCH] Auto Update 2020/10/16 18:09:26

---
 2014/CVE-2014-4210.json  |  8 ++++----
 2016/CVE-2016-0638.json  |  8 ++++----
 2016/CVE-2016-4437.json  |  8 ++++----
 2016/CVE-2016-5195.json  |  4 ++--
 2017/CVE-2017-11882.json | 16 +++++++--------
 2017/CVE-2017-3248.json  |  8 ++++----
 2018/CVE-2018-10561.json |  8 ++++----
 2018/CVE-2018-10562.json |  8 ++++----
 2018/CVE-2018-10933.json |  8 ++++----
 2018/CVE-2018-2628.json  |  8 ++++----
 2019/CVE-2019-0193.json  |  4 ++--
 2019/CVE-2019-0211.json  |  8 ++++----
 2019/CVE-2019-0708.json  |  8 ++++----
 2019/CVE-2019-11043.json |  8 ++++----
 2019/CVE-2019-11510.json |  8 ++++----
 2019/CVE-2019-17558.json |  8 ++++----
 2019/CVE-2019-19781.json |  8 ++++----
 2019/CVE-2019-2618.json  |  8 ++++----
 2019/CVE-2019-2725.json  |  8 ++++----
 2019/CVE-2019-6203.json  |  8 ++++----
 2019/CVE-2019-9621.json  |  8 ++++----
 2020/CVE-2020-0688.json  | 16 +++++++--------
 2020/CVE-2020-0796.json  |  8 ++++----
 2020/CVE-2020-1337.json  |  8 ++++----
 2020/CVE-2020-13933.json |  8 ++++----
 2020/CVE-2020-1472.json  |  8 ++++----
 2020/CVE-2020-15227.json |  8 ++++----
 2020/CVE-2020-16898.json | 43 ++++++++++++++++++++++++++++++----------
 2020/CVE-2020-16947.json | 12 +++++------
 2020/CVE-2020-1938.json  | 16 +++++++--------
 2020/CVE-2020-25200.json |  2 +-
 2020/CVE-2020-25213.json | 12 +++++------
 2020/CVE-2020-2551.json  |  8 ++++----
 2020/CVE-2020-2555.json  |  8 ++++----
 2020/CVE-2020-2883.json  |  8 ++++----
 2020/CVE-2020-3952.json  | 12 +++++------
 2020/CVE-2020-5902.json  |  8 ++++----
 2020/CVE-2020-8165.json  |  4 ++--
 README.md                |  1 +
 39 files changed, 191 insertions(+), 167 deletions(-)

diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index 7b2d12cac1..84c2eb6583 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -36,13 +36,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-10-16T01:37:12Z",
+        "updated_at": "2020-10-16T03:28:43Z",
         "pushed_at": "2020-09-02T16:21:12Z",
-        "stargazers_count": 722,
-        "watchers_count": 722,
+        "stargazers_count": 721,
+        "watchers_count": 721,
         "forks_count": 175,
         "forks": 175,
-        "watchers": 722,
+        "watchers": 721,
         "score": 0
     },
     {
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 0525fdc840..199477adec 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,13 +13,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-10-16T01:37:12Z",
+        "updated_at": "2020-10-16T03:28:43Z",
         "pushed_at": "2020-09-02T16:21:12Z",
-        "stargazers_count": 722,
-        "watchers_count": 722,
+        "stargazers_count": 721,
+        "watchers_count": 721,
         "forks_count": 175,
         "forks": 175,
-        "watchers": 722,
+        "watchers": 721,
         "score": 0
     },
     {
diff --git a/2016/CVE-2016-4437.json b/2016/CVE-2016-4437.json
index 5da452f4a3..fad9e2ea89 100644
--- a/2016/CVE-2016-4437.json
+++ b/2016/CVE-2016-4437.json
@@ -13,13 +13,13 @@
         "description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行,反弹shell的脚本",
         "fork": false,
         "created_at": "2020-05-27T05:02:04Z",
-        "updated_at": "2020-10-03T07:48:09Z",
+        "updated_at": "2020-10-16T07:50:45Z",
         "pushed_at": "2020-06-27T10:17:43Z",
-        "stargazers_count": 23,
-        "watchers_count": 23,
+        "stargazers_count": 24,
+        "watchers_count": 24,
         "forks_count": 9,
         "forks": 9,
-        "watchers": 23,
+        "watchers": 24,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json
index dab2c142fa..cd8c721a0c 100644
--- a/2016/CVE-2016-5195.json
+++ b/2016/CVE-2016-5195.json
@@ -201,8 +201,8 @@
         "pushed_at": "2017-03-21T16:46:38Z",
         "stargazers_count": 189,
         "watchers_count": 189,
-        "forks_count": 95,
-        "forks": 95,
+        "forks_count": 96,
+        "forks": 96,
         "watchers": 189,
         "score": 0
     },
diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json
index 7fcace6749..dfde58bffb 100644
--- a/2017/CVE-2017-11882.json
+++ b/2017/CVE-2017-11882.json
@@ -59,13 +59,13 @@
         "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
         "fork": false,
         "created_at": "2017-11-21T05:55:53Z",
-        "updated_at": "2020-10-10T01:14:59Z",
+        "updated_at": "2020-10-16T08:41:17Z",
         "pushed_at": "2017-11-29T03:33:53Z",
-        "stargazers_count": 470,
-        "watchers_count": 470,
+        "stargazers_count": 471,
+        "watchers_count": 471,
         "forks_count": 242,
         "forks": 242,
-        "watchers": 470,
+        "watchers": 471,
         "score": 0
     },
     {
@@ -105,13 +105,13 @@
         "description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
         "fork": false,
         "created_at": "2017-11-21T15:22:41Z",
-        "updated_at": "2020-10-15T09:51:00Z",
+        "updated_at": "2020-10-16T08:19:53Z",
         "pushed_at": "2017-12-06T12:47:31Z",
-        "stargazers_count": 275,
-        "watchers_count": 275,
+        "stargazers_count": 276,
+        "watchers_count": 276,
         "forks_count": 76,
         "forks": 76,
-        "watchers": 275,
+        "watchers": 276,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index e95b88d57d..6167a9feb0 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -36,13 +36,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-10-16T01:37:12Z",
+        "updated_at": "2020-10-16T03:28:43Z",
         "pushed_at": "2020-09-02T16:21:12Z",
-        "stargazers_count": 722,
-        "watchers_count": 722,
+        "stargazers_count": 721,
+        "watchers_count": 721,
         "forks_count": 175,
         "forks": 175,
-        "watchers": 722,
+        "watchers": 721,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-10561.json b/2018/CVE-2018-10561.json
index 7d77728d19..02e1ac0c41 100644
--- a/2018/CVE-2018-10561.json
+++ b/2018/CVE-2018-10561.json
@@ -13,13 +13,13 @@
         "description": "RCE on GPON home routers (CVE-2018-10561)",
         "fork": false,
         "created_at": "2018-07-25T20:37:13Z",
-        "updated_at": "2019-10-02T06:57:51Z",
+        "updated_at": "2020-10-16T07:25:48Z",
         "pushed_at": "2018-07-25T23:44:39Z",
-        "stargazers_count": 6,
-        "watchers_count": 6,
+        "stargazers_count": 5,
+        "watchers_count": 5,
         "forks_count": 4,
         "forks": 4,
-        "watchers": 6,
+        "watchers": 5,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-10562.json b/2018/CVE-2018-10562.json
index b38e36bd1d..f8c3d560f2 100644
--- a/2018/CVE-2018-10562.json
+++ b/2018/CVE-2018-10562.json
@@ -13,13 +13,13 @@
         "description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
         "fork": false,
         "created_at": "2018-05-07T10:34:10Z",
-        "updated_at": "2020-09-30T09:10:54Z",
+        "updated_at": "2020-10-16T07:25:46Z",
         "pushed_at": "2018-05-10T15:08:43Z",
-        "stargazers_count": 206,
-        "watchers_count": 206,
+        "stargazers_count": 205,
+        "watchers_count": 205,
         "forks_count": 69,
         "forks": 69,
-        "watchers": 206,
+        "watchers": 205,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json
index 720542b4e0..204aec9c7f 100644
--- a/2018/CVE-2018-10933.json
+++ b/2018/CVE-2018-10933.json
@@ -13,13 +13,13 @@
         "description": "CVE-2018-10933 very simple POC",
         "fork": false,
         "created_at": "2018-10-17T09:01:44Z",
-        "updated_at": "2020-04-08T19:40:08Z",
+        "updated_at": "2020-10-16T07:26:31Z",
         "pushed_at": "2018-10-23T13:51:06Z",
-        "stargazers_count": 133,
-        "watchers_count": 133,
+        "stargazers_count": 132,
+        "watchers_count": 132,
         "forks_count": 40,
         "forks": 40,
-        "watchers": 133,
+        "watchers": 132,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 961d2da256..6d7bf0307a 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -450,13 +450,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-10-16T01:37:12Z",
+        "updated_at": "2020-10-16T03:28:43Z",
         "pushed_at": "2020-09-02T16:21:12Z",
-        "stargazers_count": 722,
-        "watchers_count": 722,
+        "stargazers_count": 721,
+        "watchers_count": 721,
         "forks_count": 175,
         "forks": 175,
-        "watchers": 722,
+        "watchers": 721,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-0193.json b/2019/CVE-2019-0193.json
index ad1ae91006..9eee460c74 100644
--- a/2019/CVE-2019-0193.json
+++ b/2019/CVE-2019-0193.json
@@ -40,8 +40,8 @@
         "pushed_at": "2019-08-12T02:23:38Z",
         "stargazers_count": 73,
         "watchers_count": 73,
-        "forks_count": 35,
-        "forks": 35,
+        "forks_count": 36,
+        "forks": 36,
         "watchers": 73,
         "score": 0
     },
diff --git a/2019/CVE-2019-0211.json b/2019/CVE-2019-0211.json
index 904dbad8b4..b90284e2f8 100644
--- a/2019/CVE-2019-0211.json
+++ b/2019/CVE-2019-0211.json
@@ -13,13 +13,13 @@
         "description": "CVE-2019-0211-apache & CVE-2019-6977-imagecolormatch",
         "fork": false,
         "created_at": "2019-05-12T10:08:57Z",
-        "updated_at": "2020-09-12T11:49:21Z",
+        "updated_at": "2020-10-16T03:16:11Z",
         "pushed_at": "2019-05-12T10:09:35Z",
-        "stargazers_count": 8,
-        "watchers_count": 8,
+        "stargazers_count": 9,
+        "watchers_count": 9,
         "forks_count": 5,
         "forks": 5,
-        "watchers": 8,
+        "watchers": 9,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index f7507b30f8..9e62cccc92 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1485,13 +1485,13 @@
         "description": "Proof of concept for CVE-2019-0708",
         "fork": false,
         "created_at": "2019-05-29T16:53:54Z",
-        "updated_at": "2020-10-11T14:03:37Z",
+        "updated_at": "2020-10-16T08:38:12Z",
         "pushed_at": "2019-09-03T20:50:28Z",
-        "stargazers_count": 1045,
-        "watchers_count": 1045,
+        "stargazers_count": 1044,
+        "watchers_count": 1044,
         "forks_count": 349,
         "forks": 349,
-        "watchers": 1045,
+        "watchers": 1044,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index 1424666b2a..cd6622cb64 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -82,13 +82,13 @@
         "description": "php-fpm+Nginx RCE",
         "fork": false,
         "created_at": "2019-10-23T23:26:57Z",
-        "updated_at": "2020-09-07T06:25:54Z",
+        "updated_at": "2020-10-16T08:14:49Z",
         "pushed_at": "2020-08-20T04:43:25Z",
-        "stargazers_count": 77,
-        "watchers_count": 77,
+        "stargazers_count": 78,
+        "watchers_count": 78,
         "forks_count": 34,
         "forks": 34,
-        "watchers": 77,
+        "watchers": 78,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json
index adc6d9abf2..5c8a45575b 100644
--- a/2019/CVE-2019-11510.json
+++ b/2019/CVE-2019-11510.json
@@ -13,13 +13,13 @@
         "description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
         "fork": false,
         "created_at": "2019-08-21T08:40:26Z",
-        "updated_at": "2020-10-13T11:57:47Z",
+        "updated_at": "2020-10-16T07:11:49Z",
         "pushed_at": "2020-01-11T13:55:33Z",
-        "stargazers_count": 333,
-        "watchers_count": 333,
+        "stargazers_count": 334,
+        "watchers_count": 334,
         "forks_count": 132,
         "forks": 132,
-        "watchers": 333,
+        "watchers": 334,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 975a54ef0d..e42a867e6d 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -36,13 +36,13 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2020-10-15T08:53:29Z",
+        "updated_at": "2020-10-16T08:21:15Z",
         "pushed_at": "2020-10-10T04:01:51Z",
-        "stargazers_count": 1941,
-        "watchers_count": 1941,
+        "stargazers_count": 1944,
+        "watchers_count": 1944,
         "forks_count": 511,
         "forks": 511,
-        "watchers": 1941,
+        "watchers": 1944,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index 95d10ca23d..8076f9cb72 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -36,13 +36,13 @@
         "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
         "fork": false,
         "created_at": "2020-01-10T22:56:35Z",
-        "updated_at": "2020-10-14T19:39:35Z",
+        "updated_at": "2020-10-16T07:14:47Z",
         "pushed_at": "2020-01-18T07:01:29Z",
-        "stargazers_count": 346,
-        "watchers_count": 346,
+        "stargazers_count": 347,
+        "watchers_count": 347,
         "forks_count": 113,
         "forks": 113,
-        "watchers": 346,
+        "watchers": 347,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 0ff22cf58b..bdf1511cb5 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -151,13 +151,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-10-16T01:37:12Z",
+        "updated_at": "2020-10-16T03:28:43Z",
         "pushed_at": "2020-09-02T16:21:12Z",
-        "stargazers_count": 722,
-        "watchers_count": 722,
+        "stargazers_count": 721,
+        "watchers_count": 721,
         "forks_count": 175,
         "forks": 175,
-        "watchers": 722,
+        "watchers": 721,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json
index a5099309e2..ef08c754a5 100644
--- a/2019/CVE-2019-2725.json
+++ b/2019/CVE-2019-2725.json
@@ -220,13 +220,13 @@
         "description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
         "fork": false,
         "created_at": "2019-06-10T05:12:44Z",
-        "updated_at": "2020-10-14T07:19:13Z",
+        "updated_at": "2020-10-16T06:49:08Z",
         "pushed_at": "2019-06-21T03:33:05Z",
-        "stargazers_count": 139,
-        "watchers_count": 139,
+        "stargazers_count": 138,
+        "watchers_count": 138,
         "forks_count": 57,
         "forks": 57,
-        "watchers": 139,
+        "watchers": 138,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-6203.json b/2019/CVE-2019-6203.json
index 08d7d795ba..4ca55459f4 100644
--- a/2019/CVE-2019-6203.json
+++ b/2019/CVE-2019-6203.json
@@ -13,13 +13,13 @@
         "description": "PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4",
         "fork": false,
         "created_at": "2019-05-10T10:36:54Z",
-        "updated_at": "2020-06-09T02:08:22Z",
+        "updated_at": "2020-10-16T07:25:22Z",
         "pushed_at": "2019-05-17T03:10:30Z",
-        "stargazers_count": 28,
-        "watchers_count": 28,
+        "stargazers_count": 27,
+        "watchers_count": 27,
         "forks_count": 11,
         "forks": 11,
-        "watchers": 28,
+        "watchers": 27,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-9621.json b/2019/CVE-2019-9621.json
index ba10e10e97..6b78f54adb 100644
--- a/2019/CVE-2019-9621.json
+++ b/2019/CVE-2019-9621.json
@@ -13,13 +13,13 @@
         "description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit  1. (CVE-2019-9621 Zimbra<8.8.11  XXE GetShell Exploit)",
         "fork": false,
         "created_at": "2019-05-06T15:47:20Z",
-        "updated_at": "2020-10-07T22:54:21Z",
+        "updated_at": "2020-10-16T03:25:08Z",
         "pushed_at": "2019-05-08T16:22:58Z",
-        "stargazers_count": 52,
-        "watchers_count": 52,
+        "stargazers_count": 53,
+        "watchers_count": 53,
         "forks_count": 33,
         "forks": 33,
-        "watchers": 52,
+        "watchers": 53,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json
index 7fb869e743..c95a8f350c 100644
--- a/2020/CVE-2020-0688.json
+++ b/2020/CVE-2020-0688.json
@@ -59,13 +59,13 @@
         "description": "cve-2020-0688",
         "fork": false,
         "created_at": "2020-02-27T02:54:27Z",
-        "updated_at": "2020-10-11T18:04:09Z",
+        "updated_at": "2020-10-16T06:12:46Z",
         "pushed_at": "2020-06-19T09:28:15Z",
-        "stargazers_count": 231,
-        "watchers_count": 231,
+        "stargazers_count": 230,
+        "watchers_count": 230,
         "forks_count": 83,
         "forks": 83,
-        "watchers": 231,
+        "watchers": 230,
         "score": 0
     },
     {
@@ -197,13 +197,13 @@
         "description": "Exploit and detect tools for CVE-2020-0688",
         "fork": false,
         "created_at": "2020-03-01T12:57:32Z",
-        "updated_at": "2020-10-12T00:51:17Z",
+        "updated_at": "2020-10-16T06:29:41Z",
         "pushed_at": "2020-03-21T05:44:48Z",
-        "stargazers_count": 227,
-        "watchers_count": 227,
+        "stargazers_count": 226,
+        "watchers_count": 226,
         "forks_count": 64,
         "forks": 64,
-        "watchers": 227,
+        "watchers": 226,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index caf8246c45..f512f7f67e 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -864,13 +864,13 @@
         "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
         "fork": false,
         "created_at": "2020-03-30T11:42:56Z",
-        "updated_at": "2020-10-15T14:58:29Z",
+        "updated_at": "2020-10-16T06:14:21Z",
         "pushed_at": "2020-04-08T19:27:07Z",
-        "stargazers_count": 1017,
-        "watchers_count": 1017,
+        "stargazers_count": 1018,
+        "watchers_count": 1018,
         "forks_count": 333,
         "forks": 333,
-        "watchers": 1017,
+        "watchers": 1018,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-1337.json b/2020/CVE-2020-1337.json
index eb10e3c15f..f55cd055d2 100644
--- a/2020/CVE-2020-1337.json
+++ b/2020/CVE-2020-1337.json
@@ -59,13 +59,13 @@
         "description": "CVE-2020-1048 bypass: binary planting PoC",
         "fork": false,
         "created_at": "2020-08-11T14:34:07Z",
-        "updated_at": "2020-09-27T07:50:34Z",
+        "updated_at": "2020-10-16T07:44:49Z",
         "pushed_at": "2020-08-20T15:15:50Z",
-        "stargazers_count": 27,
-        "watchers_count": 27,
+        "stargazers_count": 28,
+        "watchers_count": 28,
         "forks_count": 5,
         "forks": 5,
-        "watchers": 27,
+        "watchers": 28,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-13933.json b/2020/CVE-2020-13933.json
index 0e428554af..4e8506ca57 100644
--- a/2020/CVE-2020-13933.json
+++ b/2020/CVE-2020-13933.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020-13933 靶场: shiro < 1.6.0 认证绕过漏洞",
         "fork": false,
         "created_at": "2020-09-09T10:20:25Z",
-        "updated_at": "2020-10-06T06:07:33Z",
+        "updated_at": "2020-10-16T07:21:56Z",
         "pushed_at": "2020-09-11T17:14:19Z",
-        "stargazers_count": 5,
-        "watchers_count": 5,
+        "stargazers_count": 6,
+        "watchers_count": 6,
         "forks_count": 0,
         "forks": 0,
-        "watchers": 5,
+        "watchers": 6,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index ed94db9f78..29cb9ad612 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -82,13 +82,13 @@
         "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
         "fork": false,
         "created_at": "2020-09-14T16:56:51Z",
-        "updated_at": "2020-10-15T22:28:21Z",
+        "updated_at": "2020-10-16T05:01:56Z",
         "pushed_at": "2020-09-25T15:32:01Z",
-        "stargazers_count": 665,
-        "watchers_count": 665,
+        "stargazers_count": 666,
+        "watchers_count": 666,
         "forks_count": 191,
         "forks": 191,
-        "watchers": 665,
+        "watchers": 666,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-15227.json b/2020/CVE-2020-15227.json
index d1a987072a..6bd9d02f2a 100644
--- a/2020/CVE-2020-15227.json
+++ b/2020/CVE-2020-15227.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020-15227 exploit",
         "fork": false,
         "created_at": "2020-10-10T02:38:15Z",
-        "updated_at": "2020-10-15T10:46:10Z",
+        "updated_at": "2020-10-16T03:33:03Z",
         "pushed_at": "2020-10-09T16:39:54Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "forks_count": 0,
         "forks": 0,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json
index 5c57fc3d93..96e7557e5c 100644
--- a/2020/CVE-2020-16898.json
+++ b/2020/CVE-2020-16898.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
         "fork": false,
         "created_at": "2020-10-07T19:56:09Z",
-        "updated_at": "2020-10-16T02:36:45Z",
+        "updated_at": "2020-10-16T08:48:53Z",
         "pushed_at": "2020-10-15T02:57:22Z",
-        "stargazers_count": 162,
-        "watchers_count": 162,
-        "forks_count": 18,
-        "forks": 18,
-        "watchers": 162,
+        "stargazers_count": 173,
+        "watchers_count": 173,
+        "forks_count": 19,
+        "forks": 19,
+        "watchers": 173,
         "score": 0
     },
     {
@@ -82,13 +82,13 @@
         "description": "Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
         "fork": false,
         "created_at": "2020-10-14T14:42:52Z",
-        "updated_at": "2020-10-16T02:45:25Z",
+        "updated_at": "2020-10-16T04:31:37Z",
         "pushed_at": "2020-10-14T16:56:04Z",
-        "stargazers_count": 13,
-        "watchers_count": 13,
+        "stargazers_count": 14,
+        "watchers_count": 14,
         "forks_count": 5,
         "forks": 5,
-        "watchers": 13,
+        "watchers": 14,
         "score": 0
     },
     {
@@ -182,5 +182,28 @@
         "forks": 0,
         "watchers": 0,
         "score": 0
+    },
+    {
+        "id": 304538917,
+        "name": "CVE-2020-16898",
+        "full_name": "Q1984\/CVE-2020-16898",
+        "owner": {
+            "login": "Q1984",
+            "id": 50952023,
+            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/50952023?v=4",
+            "html_url": "https:\/\/github.com\/Q1984"
+        },
+        "html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898",
+        "description": "PoC Bad Neighbor BSOD exploit",
+        "fork": false,
+        "created_at": "2020-10-16T06:27:24Z",
+        "updated_at": "2020-10-16T07:34:56Z",
+        "pushed_at": "2020-10-16T07:34:55Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-16947.json b/2020/CVE-2020-16947.json
index 10ce66c5f5..14b9c9d70f 100644
--- a/2020/CVE-2020-16947.json
+++ b/2020/CVE-2020-16947.json
@@ -13,13 +13,13 @@
         "description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
         "fork": false,
         "created_at": "2020-10-15T14:32:25Z",
-        "updated_at": "2020-10-16T02:42:59Z",
+        "updated_at": "2020-10-16T09:09:52Z",
         "pushed_at": "2020-10-15T14:57:31Z",
-        "stargazers_count": 7,
-        "watchers_count": 7,
-        "forks_count": 3,
-        "forks": 3,
-        "watchers": 7,
+        "stargazers_count": 42,
+        "watchers_count": 42,
+        "forks_count": 11,
+        "forks": 11,
+        "watchers": 42,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json
index c6a93a4148..a10e080d67 100644
--- a/2020/CVE-2020-1938.json
+++ b/2020/CVE-2020-1938.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020-1938",
         "fork": false,
         "created_at": "2020-02-20T16:32:52Z",
-        "updated_at": "2020-10-13T07:16:45Z",
+        "updated_at": "2020-10-16T03:26:16Z",
         "pushed_at": "2020-02-25T02:04:16Z",
-        "stargazers_count": 203,
-        "watchers_count": 203,
+        "stargazers_count": 204,
+        "watchers_count": 204,
         "forks_count": 93,
         "forks": 93,
-        "watchers": 203,
+        "watchers": 204,
         "score": 0
     },
     {
@@ -151,13 +151,13 @@
         "description": "Tomcat的文件包含及文件读取漏洞利用POC",
         "fork": false,
         "created_at": "2020-02-21T07:48:50Z",
-        "updated_at": "2020-10-10T06:04:59Z",
+        "updated_at": "2020-10-16T08:11:45Z",
         "pushed_at": "2020-02-21T10:19:52Z",
-        "stargazers_count": 18,
-        "watchers_count": 18,
+        "stargazers_count": 19,
+        "watchers_count": 19,
         "forks_count": 12,
         "forks": 12,
-        "watchers": 18,
+        "watchers": 19,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-25200.json b/2020/CVE-2020-25200.json
index 70c688e332..5eba0e817e 100644
--- a/2020/CVE-2020-25200.json
+++ b/2020/CVE-2020-25200.json
@@ -13,7 +13,7 @@
         "description": "pritunl-CVE-2020-25200",
         "fork": false,
         "created_at": "2020-09-06T22:11:24Z",
-        "updated_at": "2020-10-02T07:06:03Z",
+        "updated_at": "2020-10-16T07:12:15Z",
         "pushed_at": "2020-09-08T05:48:48Z",
         "stargazers_count": 0,
         "watchers_count": 0,
diff --git a/2020/CVE-2020-25213.json b/2020/CVE-2020-25213.json
index 8e8c370d87..039a1e77b8 100644
--- a/2020/CVE-2020-25213.json
+++ b/2020/CVE-2020-25213.json
@@ -13,13 +13,13 @@
         "description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
         "fork": false,
         "created_at": "2020-10-10T17:50:01Z",
-        "updated_at": "2020-10-14T23:34:28Z",
+        "updated_at": "2020-10-16T08:33:30Z",
         "pushed_at": "2020-10-12T09:57:28Z",
-        "stargazers_count": 10,
-        "watchers_count": 10,
-        "forks_count": 1,
-        "forks": 1,
-        "watchers": 10,
+        "stargazers_count": 11,
+        "watchers_count": 11,
+        "forks_count": 2,
+        "forks": 2,
+        "watchers": 11,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index eebf6a2bf3..d3d8328c9f 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,13 +13,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-10-16T01:37:12Z",
+        "updated_at": "2020-10-16T03:28:43Z",
         "pushed_at": "2020-09-02T16:21:12Z",
-        "stargazers_count": 722,
-        "watchers_count": 722,
+        "stargazers_count": 721,
+        "watchers_count": 721,
         "forks_count": 175,
         "forks": 175,
-        "watchers": 722,
+        "watchers": 721,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json
index 11deefe5ce..425f099fdf 100644
--- a/2020/CVE-2020-2555.json
+++ b/2020/CVE-2020-2555.json
@@ -82,13 +82,13 @@
         "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
         "fork": false,
         "created_at": "2020-03-07T18:58:09Z",
-        "updated_at": "2020-09-14T09:48:04Z",
+        "updated_at": "2020-10-16T09:02:31Z",
         "pushed_at": "2020-03-09T05:25:05Z",
-        "stargazers_count": 132,
-        "watchers_count": 132,
+        "stargazers_count": 133,
+        "watchers_count": 133,
         "forks_count": 43,
         "forks": 43,
-        "watchers": 132,
+        "watchers": 133,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json
index 59f0d169d9..d22a839e1e 100644
--- a/2020/CVE-2020-2883.json
+++ b/2020/CVE-2020-2883.json
@@ -82,13 +82,13 @@
         "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
         "fork": false,
         "created_at": "2020-08-19T03:34:06Z",
-        "updated_at": "2020-10-14T08:10:46Z",
+        "updated_at": "2020-10-16T08:00:24Z",
         "pushed_at": "2020-08-25T03:17:32Z",
-        "stargazers_count": 147,
-        "watchers_count": 147,
+        "stargazers_count": 148,
+        "watchers_count": 148,
         "forks_count": 21,
         "forks": 21,
-        "watchers": 147,
+        "watchers": 148,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json
index 4231ee5dc5..3537c2d8c6 100644
--- a/2020/CVE-2020-3952.json
+++ b/2020/CVE-2020-3952.json
@@ -59,13 +59,13 @@
         "description": "Exploit for CVE-2020-3952 in vCenter 6.7",
         "fork": false,
         "created_at": "2020-04-16T07:40:51Z",
-        "updated_at": "2020-10-11T14:15:54Z",
+        "updated_at": "2020-10-16T08:06:30Z",
         "pushed_at": "2020-04-16T08:38:42Z",
-        "stargazers_count": 206,
-        "watchers_count": 206,
-        "forks_count": 48,
-        "forks": 48,
-        "watchers": 206,
+        "stargazers_count": 207,
+        "watchers_count": 207,
+        "forks_count": 49,
+        "forks": 49,
+        "watchers": 207,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json
index d85139b448..5a9aa96d70 100644
--- a/2020/CVE-2020-5902.json
+++ b/2020/CVE-2020-5902.json
@@ -13,13 +13,13 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2020-10-15T08:53:29Z",
+        "updated_at": "2020-10-16T08:21:15Z",
         "pushed_at": "2020-10-10T04:01:51Z",
-        "stargazers_count": 1941,
-        "watchers_count": 1941,
+        "stargazers_count": 1944,
+        "watchers_count": 1944,
         "forks_count": 511,
         "forks": 511,
-        "watchers": 1941,
+        "watchers": 1944,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json
index 4356bbfb8b..71cebd4782 100644
--- a/2020/CVE-2020-8165.json
+++ b/2020/CVE-2020-8165.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-06-24T20:57:03Z",
         "stargazers_count": 19,
         "watchers_count": 19,
-        "forks_count": 5,
-        "forks": 5,
+        "forks_count": 6,
+        "forks": 6,
         "watchers": 19,
         "score": 0
     }
diff --git a/README.md b/README.md
index 039cbce641..cfacba99e0 100644
--- a/README.md
+++ b/README.md
@@ -2242,6 +2242,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
 - [sn0x736e/CVE-2020-16898](https://github.com/sn0x736e/CVE-2020-16898)
 - [Gangana3/bad_neighbor](https://github.com/Gangana3/bad_neighbor)
 - [initconf/CVE-2020-16898-Bad-Neighbor](https://github.com/initconf/CVE-2020-16898-Bad-Neighbor)
+- [Q1984/CVE-2020-16898](https://github.com/Q1984/CVE-2020-16898)
 
 ### CVE-2020-16899
 - [advanced-threat-research/CVE-2020-16899](https://github.com/advanced-threat-research/CVE-2020-16899)