From f30b55a3743461aac3cd12f467470d29b3243d13 Mon Sep 17 00:00:00 2001 From: motikan2010-bot <k.agena1993@gmail.com> Date: Fri, 16 Oct 2020 18:09:26 +0900 Subject: [PATCH] Auto Update 2020/10/16 18:09:26 --- 2014/CVE-2014-4210.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2016/CVE-2016-4437.json | 8 ++++---- 2016/CVE-2016-5195.json | 4 ++-- 2017/CVE-2017-11882.json | 16 +++++++-------- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-10561.json | 8 ++++---- 2018/CVE-2018-10562.json | 8 ++++---- 2018/CVE-2018-10933.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2019/CVE-2019-0193.json | 4 ++-- 2019/CVE-2019-0211.json | 8 ++++---- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-11043.json | 8 ++++---- 2019/CVE-2019-11510.json | 8 ++++---- 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-19781.json | 8 ++++---- 2019/CVE-2019-2618.json | 8 ++++---- 2019/CVE-2019-2725.json | 8 ++++---- 2019/CVE-2019-6203.json | 8 ++++---- 2019/CVE-2019-9621.json | 8 ++++---- 2020/CVE-2020-0688.json | 16 +++++++-------- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-1337.json | 8 ++++---- 2020/CVE-2020-13933.json | 8 ++++---- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-15227.json | 8 ++++---- 2020/CVE-2020-16898.json | 43 ++++++++++++++++++++++++++++++---------- 2020/CVE-2020-16947.json | 12 +++++------ 2020/CVE-2020-1938.json | 16 +++++++-------- 2020/CVE-2020-25200.json | 2 +- 2020/CVE-2020-25213.json | 12 +++++------ 2020/CVE-2020-2551.json | 8 ++++---- 2020/CVE-2020-2555.json | 8 ++++---- 2020/CVE-2020-2883.json | 8 ++++---- 2020/CVE-2020-3952.json | 12 +++++------ 2020/CVE-2020-5902.json | 8 ++++---- 2020/CVE-2020-8165.json | 4 ++-- README.md | 1 + 39 files changed, 191 insertions(+), 167 deletions(-) diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 7b2d12cac1..84c2eb6583 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-10-16T01:37:12Z", + "updated_at": "2020-10-16T03:28:43Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 722, - "watchers_count": 722, + "stargazers_count": 721, + "watchers_count": 721, "forks_count": 175, "forks": 175, - "watchers": 722, + "watchers": 721, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 0525fdc840..199477adec 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-10-16T01:37:12Z", + "updated_at": "2020-10-16T03:28:43Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 722, - "watchers_count": 722, + "stargazers_count": 721, + "watchers_count": 721, "forks_count": 175, "forks": 175, - "watchers": 722, + "watchers": 721, "score": 0 }, { diff --git a/2016/CVE-2016-4437.json b/2016/CVE-2016-4437.json index 5da452f4a3..fad9e2ea89 100644 --- a/2016/CVE-2016-4437.json +++ b/2016/CVE-2016-4437.json @@ -13,13 +13,13 @@ "description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行,反弹shell的脚本", "fork": false, "created_at": "2020-05-27T05:02:04Z", - "updated_at": "2020-10-03T07:48:09Z", + "updated_at": "2020-10-16T07:50:45Z", "pushed_at": "2020-06-27T10:17:43Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "forks_count": 9, "forks": 9, - "watchers": 23, + "watchers": 24, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index dab2c142fa..cd8c721a0c 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -201,8 +201,8 @@ "pushed_at": "2017-03-21T16:46:38Z", "stargazers_count": 189, "watchers_count": 189, - "forks_count": 95, - "forks": 95, + "forks_count": 96, + "forks": 96, "watchers": 189, "score": 0 }, diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 7fcace6749..dfde58bffb 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -59,13 +59,13 @@ "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "fork": false, "created_at": "2017-11-21T05:55:53Z", - "updated_at": "2020-10-10T01:14:59Z", + "updated_at": "2020-10-16T08:41:17Z", "pushed_at": "2017-11-29T03:33:53Z", - "stargazers_count": 470, - "watchers_count": 470, + "stargazers_count": 471, + "watchers_count": 471, "forks_count": 242, "forks": 242, - "watchers": 470, + "watchers": 471, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.", "fork": false, "created_at": "2017-11-21T15:22:41Z", - "updated_at": "2020-10-15T09:51:00Z", + "updated_at": "2020-10-16T08:19:53Z", "pushed_at": "2017-12-06T12:47:31Z", - "stargazers_count": 275, - "watchers_count": 275, + "stargazers_count": 276, + "watchers_count": 276, "forks_count": 76, "forks": 76, - "watchers": 275, + "watchers": 276, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index e95b88d57d..6167a9feb0 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-10-16T01:37:12Z", + "updated_at": "2020-10-16T03:28:43Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 722, - "watchers_count": 722, + "stargazers_count": 721, + "watchers_count": 721, "forks_count": 175, "forks": 175, - "watchers": 722, + "watchers": 721, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-10561.json b/2018/CVE-2018-10561.json index 7d77728d19..02e1ac0c41 100644 --- a/2018/CVE-2018-10561.json +++ b/2018/CVE-2018-10561.json @@ -13,13 +13,13 @@ "description": "RCE on GPON home routers (CVE-2018-10561)", "fork": false, "created_at": "2018-07-25T20:37:13Z", - "updated_at": "2019-10-02T06:57:51Z", + "updated_at": "2020-10-16T07:25:48Z", "pushed_at": "2018-07-25T23:44:39Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 4, "forks": 4, - "watchers": 6, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-10562.json b/2018/CVE-2018-10562.json index b38e36bd1d..f8c3d560f2 100644 --- a/2018/CVE-2018-10562.json +++ b/2018/CVE-2018-10562.json @@ -13,13 +13,13 @@ "description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.", "fork": false, "created_at": "2018-05-07T10:34:10Z", - "updated_at": "2020-09-30T09:10:54Z", + "updated_at": "2020-10-16T07:25:46Z", "pushed_at": "2018-05-10T15:08:43Z", - "stargazers_count": 206, - "watchers_count": 206, + "stargazers_count": 205, + "watchers_count": 205, "forks_count": 69, "forks": 69, - "watchers": 206, + "watchers": 205, "score": 0 }, { diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 720542b4e0..204aec9c7f 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -13,13 +13,13 @@ "description": "CVE-2018-10933 very simple POC", "fork": false, "created_at": "2018-10-17T09:01:44Z", - "updated_at": "2020-04-08T19:40:08Z", + "updated_at": "2020-10-16T07:26:31Z", "pushed_at": "2018-10-23T13:51:06Z", - "stargazers_count": 133, - "watchers_count": 133, + "stargazers_count": 132, + "watchers_count": 132, "forks_count": 40, "forks": 40, - "watchers": 133, + "watchers": 132, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 961d2da256..6d7bf0307a 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-10-16T01:37:12Z", + "updated_at": "2020-10-16T03:28:43Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 722, - "watchers_count": 722, + "stargazers_count": 721, + "watchers_count": 721, "forks_count": 175, "forks": 175, - "watchers": 722, + "watchers": 721, "score": 0 }, { diff --git a/2019/CVE-2019-0193.json b/2019/CVE-2019-0193.json index ad1ae91006..9eee460c74 100644 --- a/2019/CVE-2019-0193.json +++ b/2019/CVE-2019-0193.json @@ -40,8 +40,8 @@ "pushed_at": "2019-08-12T02:23:38Z", "stargazers_count": 73, "watchers_count": 73, - "forks_count": 35, - "forks": 35, + "forks_count": 36, + "forks": 36, "watchers": 73, "score": 0 }, diff --git a/2019/CVE-2019-0211.json b/2019/CVE-2019-0211.json index 904dbad8b4..b90284e2f8 100644 --- a/2019/CVE-2019-0211.json +++ b/2019/CVE-2019-0211.json @@ -13,13 +13,13 @@ "description": "CVE-2019-0211-apache & CVE-2019-6977-imagecolormatch", "fork": false, "created_at": "2019-05-12T10:08:57Z", - "updated_at": "2020-09-12T11:49:21Z", + "updated_at": "2020-10-16T03:16:11Z", "pushed_at": "2019-05-12T10:09:35Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 5, "forks": 5, - "watchers": 8, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index f7507b30f8..9e62cccc92 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1485,13 +1485,13 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2020-10-11T14:03:37Z", + "updated_at": "2020-10-16T08:38:12Z", "pushed_at": "2019-09-03T20:50:28Z", - "stargazers_count": 1045, - "watchers_count": 1045, + "stargazers_count": 1044, + "watchers_count": 1044, "forks_count": 349, "forks": 349, - "watchers": 1045, + "watchers": 1044, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 1424666b2a..cd6622cb64 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -82,13 +82,13 @@ "description": "php-fpm+Nginx RCE", "fork": false, "created_at": "2019-10-23T23:26:57Z", - "updated_at": "2020-09-07T06:25:54Z", + "updated_at": "2020-10-16T08:14:49Z", "pushed_at": "2020-08-20T04:43:25Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 78, + "watchers_count": 78, "forks_count": 34, "forks": 34, - "watchers": 77, + "watchers": 78, "score": 0 }, { diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index adc6d9abf2..5c8a45575b 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -13,13 +13,13 @@ "description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)", "fork": false, "created_at": "2019-08-21T08:40:26Z", - "updated_at": "2020-10-13T11:57:47Z", + "updated_at": "2020-10-16T07:11:49Z", "pushed_at": "2020-01-11T13:55:33Z", - "stargazers_count": 333, - "watchers_count": 333, + "stargazers_count": 334, + "watchers_count": 334, "forks_count": 132, "forks": 132, - "watchers": 333, + "watchers": 334, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 975a54ef0d..e42a867e6d 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-10-15T08:53:29Z", + "updated_at": "2020-10-16T08:21:15Z", "pushed_at": "2020-10-10T04:01:51Z", - "stargazers_count": 1941, - "watchers_count": 1941, + "stargazers_count": 1944, + "watchers_count": 1944, "forks_count": 511, "forks": 511, - "watchers": 1941, + "watchers": 1944, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 95d10ca23d..8076f9cb72 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -36,13 +36,13 @@ "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]", "fork": false, "created_at": "2020-01-10T22:56:35Z", - "updated_at": "2020-10-14T19:39:35Z", + "updated_at": "2020-10-16T07:14:47Z", "pushed_at": "2020-01-18T07:01:29Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 347, + "watchers_count": 347, "forks_count": 113, "forks": 113, - "watchers": 346, + "watchers": 347, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 0ff22cf58b..bdf1511cb5 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-10-16T01:37:12Z", + "updated_at": "2020-10-16T03:28:43Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 722, - "watchers_count": 722, + "stargazers_count": 721, + "watchers_count": 721, "forks_count": 175, "forks": 175, - "watchers": 722, + "watchers": 721, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index a5099309e2..ef08c754a5 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -220,13 +220,13 @@ "description": "CVE-2019-2725命令回显+webshell上传+最新绕过", "fork": false, "created_at": "2019-06-10T05:12:44Z", - "updated_at": "2020-10-14T07:19:13Z", + "updated_at": "2020-10-16T06:49:08Z", "pushed_at": "2019-06-21T03:33:05Z", - "stargazers_count": 139, - "watchers_count": 139, + "stargazers_count": 138, + "watchers_count": 138, "forks_count": 57, "forks": 57, - "watchers": 139, + "watchers": 138, "score": 0 }, { diff --git a/2019/CVE-2019-6203.json b/2019/CVE-2019-6203.json index 08d7d795ba..4ca55459f4 100644 --- a/2019/CVE-2019-6203.json +++ b/2019/CVE-2019-6203.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4", "fork": false, "created_at": "2019-05-10T10:36:54Z", - "updated_at": "2020-06-09T02:08:22Z", + "updated_at": "2020-10-16T07:25:22Z", "pushed_at": "2019-05-17T03:10:30Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 27, + "watchers_count": 27, "forks_count": 11, "forks": 11, - "watchers": 28, + "watchers": 27, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-9621.json b/2019/CVE-2019-9621.json index ba10e10e97..6b78f54adb 100644 --- a/2019/CVE-2019-9621.json +++ b/2019/CVE-2019-9621.json @@ -13,13 +13,13 @@ "description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)", "fork": false, "created_at": "2019-05-06T15:47:20Z", - "updated_at": "2020-10-07T22:54:21Z", + "updated_at": "2020-10-16T03:25:08Z", "pushed_at": "2019-05-08T16:22:58Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 33, "forks": 33, - "watchers": 52, + "watchers": 53, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 7fb869e743..c95a8f350c 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -59,13 +59,13 @@ "description": "cve-2020-0688", "fork": false, "created_at": "2020-02-27T02:54:27Z", - "updated_at": "2020-10-11T18:04:09Z", + "updated_at": "2020-10-16T06:12:46Z", "pushed_at": "2020-06-19T09:28:15Z", - "stargazers_count": 231, - "watchers_count": 231, + "stargazers_count": 230, + "watchers_count": 230, "forks_count": 83, "forks": 83, - "watchers": 231, + "watchers": 230, "score": 0 }, { @@ -197,13 +197,13 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2020-10-12T00:51:17Z", + "updated_at": "2020-10-16T06:29:41Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 227, - "watchers_count": 227, + "stargazers_count": 226, + "watchers_count": 226, "forks_count": 64, "forks": 64, - "watchers": 227, + "watchers": 226, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index caf8246c45..f512f7f67e 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -864,13 +864,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2020-10-15T14:58:29Z", + "updated_at": "2020-10-16T06:14:21Z", "pushed_at": "2020-04-08T19:27:07Z", - "stargazers_count": 1017, - "watchers_count": 1017, + "stargazers_count": 1018, + "watchers_count": 1018, "forks_count": 333, "forks": 333, - "watchers": 1017, + "watchers": 1018, "score": 0 }, { diff --git a/2020/CVE-2020-1337.json b/2020/CVE-2020-1337.json index eb10e3c15f..f55cd055d2 100644 --- a/2020/CVE-2020-1337.json +++ b/2020/CVE-2020-1337.json @@ -59,13 +59,13 @@ "description": "CVE-2020-1048 bypass: binary planting PoC", "fork": false, "created_at": "2020-08-11T14:34:07Z", - "updated_at": "2020-09-27T07:50:34Z", + "updated_at": "2020-10-16T07:44:49Z", "pushed_at": "2020-08-20T15:15:50Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 5, "forks": 5, - "watchers": 27, + "watchers": 28, "score": 0 }, { diff --git a/2020/CVE-2020-13933.json b/2020/CVE-2020-13933.json index 0e428554af..4e8506ca57 100644 --- a/2020/CVE-2020-13933.json +++ b/2020/CVE-2020-13933.json @@ -13,13 +13,13 @@ "description": "CVE-2020-13933 靶场: shiro < 1.6.0 认证绕过漏洞", "fork": false, "created_at": "2020-09-09T10:20:25Z", - "updated_at": "2020-10-06T06:07:33Z", + "updated_at": "2020-10-16T07:21:56Z", "pushed_at": "2020-09-11T17:14:19Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 0, "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index ed94db9f78..29cb9ad612 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -82,13 +82,13 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2020-10-15T22:28:21Z", + "updated_at": "2020-10-16T05:01:56Z", "pushed_at": "2020-09-25T15:32:01Z", - "stargazers_count": 665, - "watchers_count": 665, + "stargazers_count": 666, + "watchers_count": 666, "forks_count": 191, "forks": 191, - "watchers": 665, + "watchers": 666, "score": 0 }, { diff --git a/2020/CVE-2020-15227.json b/2020/CVE-2020-15227.json index d1a987072a..6bd9d02f2a 100644 --- a/2020/CVE-2020-15227.json +++ b/2020/CVE-2020-15227.json @@ -13,13 +13,13 @@ "description": "CVE-2020-15227 exploit", "fork": false, "created_at": "2020-10-10T02:38:15Z", - "updated_at": "2020-10-15T10:46:10Z", + "updated_at": "2020-10-16T03:33:03Z", "pushed_at": "2020-10-09T16:39:54Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index 5c57fc3d93..96e7557e5c 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -13,13 +13,13 @@ "description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule", "fork": false, "created_at": "2020-10-07T19:56:09Z", - "updated_at": "2020-10-16T02:36:45Z", + "updated_at": "2020-10-16T08:48:53Z", "pushed_at": "2020-10-15T02:57:22Z", - "stargazers_count": 162, - "watchers_count": 162, - "forks_count": 18, - "forks": 18, - "watchers": 162, + "stargazers_count": 173, + "watchers_count": 173, + "forks_count": 19, + "forks": 19, + "watchers": 173, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).", "fork": false, "created_at": "2020-10-14T14:42:52Z", - "updated_at": "2020-10-16T02:45:25Z", + "updated_at": "2020-10-16T04:31:37Z", "pushed_at": "2020-10-14T16:56:04Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 5, "forks": 5, - "watchers": 13, + "watchers": 14, "score": 0 }, { @@ -182,5 +182,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 304538917, + "name": "CVE-2020-16898", + "full_name": "Q1984\/CVE-2020-16898", + "owner": { + "login": "Q1984", + "id": 50952023, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/50952023?v=4", + "html_url": "https:\/\/github.com\/Q1984" + }, + "html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898", + "description": "PoC Bad Neighbor BSOD exploit", + "fork": false, + "created_at": "2020-10-16T06:27:24Z", + "updated_at": "2020-10-16T07:34:56Z", + "pushed_at": "2020-10-16T07:34:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-16947.json b/2020/CVE-2020-16947.json index 10ce66c5f5..14b9c9d70f 100644 --- a/2020/CVE-2020-16947.json +++ b/2020/CVE-2020-16947.json @@ -13,13 +13,13 @@ "description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)", "fork": false, "created_at": "2020-10-15T14:32:25Z", - "updated_at": "2020-10-16T02:42:59Z", + "updated_at": "2020-10-16T09:09:52Z", "pushed_at": "2020-10-15T14:57:31Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 3, - "forks": 3, - "watchers": 7, + "stargazers_count": 42, + "watchers_count": 42, + "forks_count": 11, + "forks": 11, + "watchers": 42, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index c6a93a4148..a10e080d67 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1938", "fork": false, "created_at": "2020-02-20T16:32:52Z", - "updated_at": "2020-10-13T07:16:45Z", + "updated_at": "2020-10-16T03:26:16Z", "pushed_at": "2020-02-25T02:04:16Z", - "stargazers_count": 203, - "watchers_count": 203, + "stargazers_count": 204, + "watchers_count": 204, "forks_count": 93, "forks": 93, - "watchers": 203, + "watchers": 204, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "Tomcat的文件包含及文件读取漏洞利用POC", "fork": false, "created_at": "2020-02-21T07:48:50Z", - "updated_at": "2020-10-10T06:04:59Z", + "updated_at": "2020-10-16T08:11:45Z", "pushed_at": "2020-02-21T10:19:52Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "forks_count": 12, "forks": 12, - "watchers": 18, + "watchers": 19, "score": 0 }, { diff --git a/2020/CVE-2020-25200.json b/2020/CVE-2020-25200.json index 70c688e332..5eba0e817e 100644 --- a/2020/CVE-2020-25200.json +++ b/2020/CVE-2020-25200.json @@ -13,7 +13,7 @@ "description": "pritunl-CVE-2020-25200", "fork": false, "created_at": "2020-09-06T22:11:24Z", - "updated_at": "2020-10-02T07:06:03Z", + "updated_at": "2020-10-16T07:12:15Z", "pushed_at": "2020-09-08T05:48:48Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2020/CVE-2020-25213.json b/2020/CVE-2020-25213.json index 8e8c370d87..039a1e77b8 100644 --- a/2020/CVE-2020-25213.json +++ b/2020/CVE-2020-25213.json @@ -13,13 +13,13 @@ "description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8", "fork": false, "created_at": "2020-10-10T17:50:01Z", - "updated_at": "2020-10-14T23:34:28Z", + "updated_at": "2020-10-16T08:33:30Z", "pushed_at": "2020-10-12T09:57:28Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 1, - "forks": 1, - "watchers": 10, + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 2, + "forks": 2, + "watchers": 11, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index eebf6a2bf3..d3d8328c9f 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-10-16T01:37:12Z", + "updated_at": "2020-10-16T03:28:43Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 722, - "watchers_count": 722, + "stargazers_count": 721, + "watchers_count": 721, "forks_count": 175, "forks": 175, - "watchers": 722, + "watchers": 721, "score": 0 }, { diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index 11deefe5ce..425f099fdf 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -82,13 +82,13 @@ "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "fork": false, "created_at": "2020-03-07T18:58:09Z", - "updated_at": "2020-09-14T09:48:04Z", + "updated_at": "2020-10-16T09:02:31Z", "pushed_at": "2020-03-09T05:25:05Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 133, + "watchers_count": 133, "forks_count": 43, "forks": 43, - "watchers": 132, + "watchers": 133, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 59f0d169d9..d22a839e1e 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -82,13 +82,13 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2020-10-14T08:10:46Z", + "updated_at": "2020-10-16T08:00:24Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 147, - "watchers_count": 147, + "stargazers_count": 148, + "watchers_count": 148, "forks_count": 21, "forks": 21, - "watchers": 147, + "watchers": 148, "score": 0 }, { diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 4231ee5dc5..3537c2d8c6 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -59,13 +59,13 @@ "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", - "updated_at": "2020-10-11T14:15:54Z", + "updated_at": "2020-10-16T08:06:30Z", "pushed_at": "2020-04-16T08:38:42Z", - "stargazers_count": 206, - "watchers_count": 206, - "forks_count": 48, - "forks": 48, - "watchers": 206, + "stargazers_count": 207, + "watchers_count": 207, + "forks_count": 49, + "forks": 49, + "watchers": 207, "score": 0 }, { diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index d85139b448..5a9aa96d70 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-10-15T08:53:29Z", + "updated_at": "2020-10-16T08:21:15Z", "pushed_at": "2020-10-10T04:01:51Z", - "stargazers_count": 1941, - "watchers_count": 1941, + "stargazers_count": 1944, + "watchers_count": 1944, "forks_count": 511, "forks": 511, - "watchers": 1941, + "watchers": 1944, "score": 0 }, { diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json index 4356bbfb8b..71cebd4782 100644 --- a/2020/CVE-2020-8165.json +++ b/2020/CVE-2020-8165.json @@ -17,8 +17,8 @@ "pushed_at": "2020-06-24T20:57:03Z", "stargazers_count": 19, "watchers_count": 19, - "forks_count": 5, - "forks": 5, + "forks_count": 6, + "forks": 6, "watchers": 19, "score": 0 } diff --git a/README.md b/README.md index 039cbce641..cfacba99e0 100644 --- a/README.md +++ b/README.md @@ -2242,6 +2242,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut - [sn0x736e/CVE-2020-16898](https://github.com/sn0x736e/CVE-2020-16898) - [Gangana3/bad_neighbor](https://github.com/Gangana3/bad_neighbor) - [initconf/CVE-2020-16898-Bad-Neighbor](https://github.com/initconf/CVE-2020-16898-Bad-Neighbor) +- [Q1984/CVE-2020-16898](https://github.com/Q1984/CVE-2020-16898) ### CVE-2020-16899 - [advanced-threat-research/CVE-2020-16899](https://github.com/advanced-threat-research/CVE-2020-16899)