From 119442a1299eec7c1c7dcc827624ec560fc8a1ac Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 20 Jan 2020 11:07:05 +0900 Subject: [PATCH] Auto Update 2020/01/20 11:07:05 --- 2013/CVE-2013-2028.json | 4 +- 2014/CVE-2014-3566.json | 8 +-- 2014/CVE-2014-6271.json | 8 +-- 2014/CVE-2014-9016.json | 23 -------- 2015/CVE-2015-1701.json | 4 +- 2015/CVE-2015-1805.json | 12 ++--- 2015/CVE-2015-3306.json | 8 +-- 2015/CVE-2015-5602.json | 8 +-- 2015/CVE-2015-6639.json | 8 +-- 2016/CVE-2016-2431.json | 8 +-- 2017/CVE-2017-0781.json | 8 +-- 2017/CVE-2017-12617.json | 8 +-- 2017/CVE-2017-2751.json | 25 +++++++++ 2017/CVE-2017-8759.json | 8 +-- 2018/CVE-2018-10933.json | 8 +-- 2018/CVE-2018-13379.json | 8 +-- 2018/CVE-2018-20250.json | 8 +-- 2018/CVE-2018-2894.json | 8 +-- 2018/CVE-2018-4233.json | 4 +- 2018/CVE-2018-8639.json | 8 +-- 2018/CVE-2018-9546.json | 8 +-- 2018/CVE-2018-9995.json | 4 +- 2019/CVE-2019-0708.json | 30 +++++------ 2019/CVE-2019-1040.json | 16 +++--- 2019/CVE-2019-10758.json | 8 +-- 2019/CVE-2019-11043.json | 8 +-- 2019/CVE-2019-11510.json | 20 +++---- 2019/CVE-2019-11581.json | 8 +-- 2019/CVE-2019-11708.json | 8 +-- 2019/CVE-2019-12586.json | 8 +-- 2019/CVE-2019-13272.json | 8 +-- 2019/CVE-2019-1388.json | 4 +- 2019/CVE-2019-14615.json | 14 ++--- 2019/CVE-2019-1579.json | 8 +-- 2019/CVE-2019-16724.json | 8 +-- 2019/CVE-2019-17570.json | 25 +++++++++ 2019/CVE-2019-17571.json | 2 +- 2019/CVE-2019-18371.json | 8 +-- 2019/CVE-2019-19781.json | 81 ++++++++++++++++++---------- 2019/CVE-2019-19844.json | 8 +-- 2019/CVE-2019-20197.json | 8 +-- 2019/CVE-2019-20224.json | 8 +-- 2019/CVE-2019-2198.json | 12 ++--- 2019/CVE-2019-2618.json | 16 +++--- 2019/CVE-2019-2725.json | 8 +-- 2019/CVE-2019-2729.json | 4 +- 2019/CVE-2019-2890.json | 12 ++--- 2019/CVE-2019-5475.json | 12 ++--- 2019/CVE-2019-9810.json | 8 +-- 2020/CVE-2020-0601.json | 113 +++++++++++++++++++++++++++++++-------- 2020/CVE-2020-2551.json | 18 +++---- 2020/CVE-2020-5398.json | 12 ++--- 2020/CVE-2020-5509.json | 8 +-- 53 files changed, 413 insertions(+), 294 deletions(-) create mode 100644 2017/CVE-2017-2751.json create mode 100644 2019/CVE-2019-17570.json diff --git a/2013/CVE-2013-2028.json b/2013/CVE-2013-2028.json index 0d6c921d87..b13eda73be 100644 --- a/2013/CVE-2013-2028.json +++ b/2013/CVE-2013-2028.json @@ -40,8 +40,8 @@ "pushed_at": "2016-03-23T12:05:38Z", "stargazers_count": 40, "watchers_count": 40, - "forks_count": 16, - "forks": 16, + "forks_count": 17, + "forks": 17, "watchers": 40, "score": 0 }, diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index 9ac8ee0ee0..edc50eacf6 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -82,13 +82,13 @@ "description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:", "fork": false, "created_at": "2015-02-03T20:28:27Z", - "updated_at": "2020-01-15T20:43:37Z", + "updated_at": "2020-01-19T21:32:47Z", "pushed_at": "2019-01-31T22:56:17Z", - "stargazers_count": 172, - "watchers_count": 172, + "stargazers_count": 174, + "watchers_count": 174, "forks_count": 51, "forks": 51, - "watchers": 172, + "watchers": 174, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index 9b1a80cde8..3bf02b6b73 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -910,13 +910,13 @@ "description": "Shellshock exploit + vulnerable environment", "fork": false, "created_at": "2016-12-07T23:38:50Z", - "updated_at": "2020-01-11T23:15:28Z", + "updated_at": "2020-01-19T20:23:34Z", "pushed_at": "2017-10-30T22:46:11Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 75, + "watchers_count": 75, "forks_count": 32, "forks": 32, - "watchers": 74, + "watchers": 75, "score": 0 }, { diff --git a/2014/CVE-2014-9016.json b/2014/CVE-2014-9016.json index 83da11ae74..6b3e8c0431 100644 --- a/2014/CVE-2014-9016.json +++ b/2014/CVE-2014-9016.json @@ -21,28 +21,5 @@ "forks": 7, "watchers": 13, "score": 0 - }, - { - "id": 229318943, - "name": "WordPress-Long-Password-Denial-of-Service", - "full_name": "Primus27\/WordPress-Long-Password-Denial-of-Service", - "owner": { - "login": "Primus27", - "id": 47760587, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/47760587?v=4", - "html_url": "https:\/\/github.com\/Primus27" - }, - "html_url": "https:\/\/github.com\/Primus27\/WordPress-Long-Password-Denial-of-Service", - "description": "Takedown WordPress sites using long passwords (CVE-2014-9016)", - "fork": false, - "created_at": "2019-12-20T18:47:36Z", - "updated_at": "2020-01-08T17:02:16Z", - "pushed_at": "2020-01-08T17:02:14Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 } ] \ No newline at end of file diff --git a/2015/CVE-2015-1701.json b/2015/CVE-2015-1701.json index 548ebc9c84..d403fdfdb9 100644 --- a/2015/CVE-2015-1701.json +++ b/2015/CVE-2015-1701.json @@ -17,8 +17,8 @@ "pushed_at": "2017-12-18T14:11:29Z", "stargazers_count": 256, "watchers_count": 256, - "forks_count": 176, - "forks": 176, + "forks_count": 177, + "forks": 177, "watchers": 256, "score": 0 } diff --git a/2015/CVE-2015-1805.json b/2015/CVE-2015-1805.json index f078ccabea..fd7e3413e5 100644 --- a/2015/CVE-2015-1805.json +++ b/2015/CVE-2015-1805.json @@ -36,13 +36,13 @@ "description": "CVE-2015-1805 root tool", "fork": false, "created_at": "2016-04-01T12:10:14Z", - "updated_at": "2020-01-10T10:44:28Z", + "updated_at": "2020-01-19T11:54:29Z", "pushed_at": "2017-11-23T20:55:03Z", - "stargazers_count": 250, - "watchers_count": 250, - "forks_count": 147, - "forks": 147, - "watchers": 250, + "stargazers_count": 251, + "watchers_count": 251, + "forks_count": 148, + "forks": 148, + "watchers": 251, "score": 0 }, { diff --git a/2015/CVE-2015-3306.json b/2015/CVE-2015-3306.json index 53ec49ac02..4f55266a91 100644 --- a/2015/CVE-2015-3306.json +++ b/2015/CVE-2015-3306.json @@ -59,13 +59,13 @@ "description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-08T14:19:51Z", - "updated_at": "2020-01-11T20:01:04Z", + "updated_at": "2020-01-19T02:55:42Z", "pushed_at": "2018-04-07T01:10:06Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "forks_count": 23, "forks": 23, - "watchers": 43, + "watchers": 44, "score": 0 }, { diff --git a/2015/CVE-2015-5602.json b/2015/CVE-2015-5602.json index 2f73bf1f6a..b2b0899333 100644 --- a/2015/CVE-2015-5602.json +++ b/2015/CVE-2015-5602.json @@ -13,13 +13,13 @@ "description": "Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container", "fork": false, "created_at": "2017-12-16T00:23:30Z", - "updated_at": "2019-07-22T20:31:15Z", + "updated_at": "2020-01-19T14:07:02Z", "pushed_at": "2017-12-16T00:39:19Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 9, "forks": 9, - "watchers": 5, + "watchers": 6, "score": 0 }, { diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index 6b044bfdd0..a8fba7f6e3 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -36,13 +36,13 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2020-01-01T15:46:44Z", + "updated_at": "2020-01-19T12:40:51Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 271, - "watchers_count": 271, + "stargazers_count": 272, + "watchers_count": 272, "forks_count": 83, "forks": 83, - "watchers": 271, + "watchers": 272, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index 5b693dc6ec..18f8c220ad 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -36,13 +36,13 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2020-01-01T15:46:44Z", + "updated_at": "2020-01-19T12:40:51Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 271, - "watchers_count": 271, + "stargazers_count": 272, + "watchers_count": 272, "forks_count": 83, "forks": 83, - "watchers": 271, + "watchers": 272, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index a2abc49f32..fc538e3f60 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -36,13 +36,13 @@ "description": "Android Blueborne RCE CVE-2017-0781", "fork": false, "created_at": "2018-03-17T21:07:24Z", - "updated_at": "2020-01-15T18:09:28Z", + "updated_at": "2020-01-18T23:03:41Z", "pushed_at": "2018-04-04T12:59:18Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 63, + "watchers_count": 63, "forks_count": 19, "forks": 19, - "watchers": 62, + "watchers": 63, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index 01cfdea83f..91d61af584 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -13,13 +13,13 @@ "description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ", "fork": false, "created_at": "2017-10-05T23:41:52Z", - "updated_at": "2019-12-23T08:30:20Z", + "updated_at": "2020-01-19T13:29:05Z", "pushed_at": "2017-10-11T07:43:50Z", - "stargazers_count": 334, - "watchers_count": 334, + "stargazers_count": 333, + "watchers_count": 333, "forks_count": 127, "forks": 127, - "watchers": 334, + "watchers": 333, "score": 0 }, { diff --git a/2017/CVE-2017-2751.json b/2017/CVE-2017-2751.json new file mode 100644 index 0000000000..e8294f4432 --- /dev/null +++ b/2017/CVE-2017-2751.json @@ -0,0 +1,25 @@ +[ + { + "id": 234817787, + "name": "CVE-2017-2751", + "full_name": "BaderSZ\/CVE-2017-2751", + "owner": { + "login": "BaderSZ", + "id": 2165320, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2165320?v=4", + "html_url": "https:\/\/github.com\/BaderSZ" + }, + "html_url": "https:\/\/github.com\/BaderSZ\/CVE-2017-2751", + "description": "Mini-paper on CVE-2017-2751, HP EFI password extraction.", + "fork": false, + "created_at": "2020-01-19T00:41:23Z", + "updated_at": "2020-01-19T00:48:09Z", + "pushed_at": "2020-01-19T00:48:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-8759.json b/2017/CVE-2017-8759.json index 2ee916316c..121262d858 100644 --- a/2017/CVE-2017-8759.json +++ b/2017/CVE-2017-8759.json @@ -36,13 +36,13 @@ "description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements", "fork": false, "created_at": "2017-09-13T15:24:10Z", - "updated_at": "2019-10-30T07:16:41Z", + "updated_at": "2020-01-19T10:53:01Z", "pushed_at": "2017-09-19T18:06:41Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 91, + "watchers_count": 91, "forks_count": 45, "forks": 45, - "watchers": 90, + "watchers": 91, "score": 0 }, { diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index acc1ed2d01..377fe72d38 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -335,13 +335,13 @@ "description": "LibSSH Authentication Bypass Exploit using RCE", "fork": false, "created_at": "2018-10-20T15:34:26Z", - "updated_at": "2019-09-02T17:01:18Z", + "updated_at": "2020-01-19T09:02:55Z", "pushed_at": "2018-10-25T18:23:52Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 5, "forks": 5, - "watchers": 9, + "watchers": 10, "score": 0 }, { diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json index 6fb0cc240f..4989d13978 100644 --- a/2018/CVE-2018-13379.json +++ b/2018/CVE-2018-13379.json @@ -13,13 +13,13 @@ "description": "CVE-2018-13379", "fork": false, "created_at": "2019-08-11T09:44:37Z", - "updated_at": "2020-01-15T06:13:07Z", + "updated_at": "2020-01-19T17:22:33Z", "pushed_at": "2019-08-14T08:40:25Z", - "stargazers_count": 192, - "watchers_count": 192, + "stargazers_count": 193, + "watchers_count": 193, "forks_count": 59, "forks": 59, - "watchers": 192, + "watchers": 193, "score": 0 }, { diff --git a/2018/CVE-2018-20250.json b/2018/CVE-2018-20250.json index caee10336d..47e16a5a81 100644 --- a/2018/CVE-2018-20250.json +++ b/2018/CVE-2018-20250.json @@ -289,13 +289,13 @@ "description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250", "fork": false, "created_at": "2019-03-25T04:22:14Z", - "updated_at": "2019-04-09T07:37:30Z", + "updated_at": "2020-01-18T19:58:21Z", "pushed_at": "2019-03-26T04:54:35Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 2, "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2018/CVE-2018-2894.json b/2018/CVE-2018-2894.json index 748625a768..ddc431132b 100644 --- a/2018/CVE-2018-2894.json +++ b/2018/CVE-2018-2894.json @@ -36,13 +36,13 @@ "description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script", "fork": false, "created_at": "2018-07-20T03:59:18Z", - "updated_at": "2020-01-16T09:19:02Z", + "updated_at": "2020-01-19T02:03:58Z", "pushed_at": "2018-07-20T12:46:50Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "forks_count": 44, "forks": 44, - "watchers": 117, + "watchers": 118, "score": 0 }, { diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index 8d33d10c21..a2dfe99ee1 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -17,8 +17,8 @@ "pushed_at": "2018-08-17T23:31:46Z", "stargazers_count": 147, "watchers_count": 147, - "forks_count": 28, - "forks": 28, + "forks_count": 29, + "forks": 29, "watchers": 147, "score": 0 } diff --git a/2018/CVE-2018-8639.json b/2018/CVE-2018-8639.json index a59303ac5a..b1ec9bb385 100644 --- a/2018/CVE-2018-8639.json +++ b/2018/CVE-2018-8639.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2019-03-05T14:18:07Z", - "updated_at": "2019-12-23T08:11:18Z", + "updated_at": "2020-01-19T08:54:38Z", "pushed_at": "2019-04-08T08:26:26Z", - "stargazers_count": 119, - "watchers_count": 119, + "stargazers_count": 120, + "watchers_count": 120, "forks_count": 44, "forks": 44, - "watchers": 119, + "watchers": 120, "score": 0 }, { diff --git a/2018/CVE-2018-9546.json b/2018/CVE-2018-9546.json index 6792262eed..2e15d8ce2c 100644 --- a/2018/CVE-2018-9546.json +++ b/2018/CVE-2018-9546.json @@ -13,13 +13,13 @@ "description": "PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)", "fork": false, "created_at": "2019-03-02T18:32:17Z", - "updated_at": "2020-01-15T12:33:48Z", + "updated_at": "2020-01-18T18:34:54Z", "pushed_at": "2020-01-15T12:33:46Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 3, "forks": 3, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index 6c1ac4f4da..3727aa5466 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -17,8 +17,8 @@ "pushed_at": "2019-01-23T14:27:21Z", "stargazers_count": 407, "watchers_count": 407, - "forks_count": 165, - "forks": 165, + "forks_count": 166, + "forks": 166, "watchers": 407, "score": 0 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 4c22efafc7..38cb4c4c97 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1163,13 +1163,13 @@ "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", - "updated_at": "2020-01-17T09:01:50Z", + "updated_at": "2020-01-19T22:41:38Z", "pushed_at": "2019-10-01T12:23:59Z", - "stargazers_count": 1075, - "watchers_count": 1075, + "stargazers_count": 1077, + "watchers_count": 1077, "forks_count": 361, "forks": 361, - "watchers": 1075, + "watchers": 1077, "score": 0 }, { @@ -1209,7 +1209,7 @@ "description": "cve-2019-0708 vulnerablility scanner", "fork": false, "created_at": "2019-05-22T05:18:18Z", - "updated_at": "2019-05-22T06:09:10Z", + "updated_at": "2020-01-19T23:34:36Z", "pushed_at": "2019-05-22T06:06:56Z", "stargazers_count": 0, "watchers_count": 0, @@ -1370,13 +1370,13 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2020-01-16T18:23:13Z", + "updated_at": "2020-01-19T22:39:08Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 685, - "watchers_count": 685, + "stargazers_count": 686, + "watchers_count": 686, "forks_count": 156, "forks": 156, - "watchers": 685, + "watchers": 686, "score": 0 }, { @@ -1577,13 +1577,13 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2020-01-15T00:01:20Z", + "updated_at": "2020-01-19T19:24:42Z", "pushed_at": "2019-09-03T20:50:28Z", - "stargazers_count": 994, - "watchers_count": 994, - "forks_count": 344, - "forks": 344, - "watchers": 994, + "stargazers_count": 996, + "watchers_count": 996, + "forks_count": 343, + "forks": 343, + "watchers": 996, "score": 0 }, { diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index 72f9151497..f854dec9a6 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -36,13 +36,13 @@ "description": "Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit", "fork": false, "created_at": "2019-06-19T08:32:31Z", - "updated_at": "2020-01-13T04:16:26Z", + "updated_at": "2020-01-20T01:59:12Z", "pushed_at": "2019-06-19T09:15:16Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 5, "forks": 5, - "watchers": 11, + "watchers": 12, "score": 0 }, { @@ -59,13 +59,13 @@ "description": null, "fork": false, "created_at": "2019-06-24T15:33:50Z", - "updated_at": "2020-01-16T05:43:30Z", + "updated_at": "2020-01-19T04:01:33Z", "pushed_at": "2019-06-28T03:57:26Z", - "stargazers_count": 186, - "watchers_count": 186, + "stargazers_count": 185, + "watchers_count": 185, "forks_count": 33, "forks": 33, - "watchers": 186, + "watchers": 185, "score": 0 }, { diff --git a/2019/CVE-2019-10758.json b/2019/CVE-2019-10758.json index 94b59fe111..476fd30734 100644 --- a/2019/CVE-2019-10758.json +++ b/2019/CVE-2019-10758.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2019-12-26T06:58:56Z", - "updated_at": "2020-01-18T09:36:30Z", + "updated_at": "2020-01-20T01:50:05Z", "pushed_at": "2019-12-26T08:44:54Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 95, + "watchers_count": 95, "forks_count": 19, "forks": 19, - "watchers": 94, + "watchers": 95, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 5b045c35c6..b51058a0fb 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -197,13 +197,13 @@ "description": "(PoC) Python version of CVE-2019-11043 exploit by neex", "fork": false, "created_at": "2019-10-28T11:09:06Z", - "updated_at": "2020-01-17T18:47:01Z", + "updated_at": "2020-01-19T23:32:18Z", "pushed_at": "2019-10-29T15:47:02Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 112, + "watchers_count": 112, "forks_count": 23, "forks": 23, - "watchers": 110, + "watchers": 112, "score": 0 }, { diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index b520c176f9..1b81c2d3cd 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -13,13 +13,13 @@ "description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)", "fork": false, "created_at": "2019-08-21T08:40:26Z", - "updated_at": "2020-01-16T04:49:27Z", + "updated_at": "2020-01-19T16:23:20Z", "pushed_at": "2020-01-11T13:55:33Z", - "stargazers_count": 277, - "watchers_count": 277, - "forks_count": 98, - "forks": 98, - "watchers": 277, + "stargazers_count": 278, + "watchers_count": 278, + "forks_count": 99, + "forks": 99, + "watchers": 278, "score": 0 }, { @@ -174,13 +174,13 @@ "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", - "updated_at": "2020-01-16T08:27:52Z", + "updated_at": "2020-01-18T22:56:45Z", "pushed_at": "2020-01-15T17:01:50Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "forks_count": 23, "forks": 23, - "watchers": 57, + "watchers": 58, "score": 0 }, { diff --git a/2019/CVE-2019-11581.json b/2019/CVE-2019-11581.json index df930588a5..5ca01cbe1c 100644 --- a/2019/CVE-2019-11581.json +++ b/2019/CVE-2019-11581.json @@ -13,13 +13,13 @@ "description": "Atlassian JIRA Template injection vulnerability RCE", "fork": false, "created_at": "2019-07-16T02:27:00Z", - "updated_at": "2019-12-18T09:06:26Z", + "updated_at": "2020-01-18T20:07:35Z", "pushed_at": "2019-07-22T06:47:52Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 18, "forks": 18, - "watchers": 52, + "watchers": 53, "score": 0 }, { diff --git a/2019/CVE-2019-11708.json b/2019/CVE-2019-11708.json index b0f05c50c5..02581b6743 100644 --- a/2019/CVE-2019-11708.json +++ b/2019/CVE-2019-11708.json @@ -13,13 +13,13 @@ "description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.", "fork": false, "created_at": "2019-09-29T07:08:52Z", - "updated_at": "2020-01-15T22:02:07Z", + "updated_at": "2020-01-18T20:50:59Z", "pushed_at": "2019-12-28T18:23:58Z", - "stargazers_count": 545, - "watchers_count": 545, + "stargazers_count": 546, + "watchers_count": 546, "forks_count": 62, "forks": 62, - "watchers": 545, + "watchers": 546, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json index f04c2e20e5..b25fcdfd38 100644 --- a/2019/CVE-2019-12586.json +++ b/2019/CVE-2019-12586.json @@ -13,13 +13,13 @@ "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)", "fork": false, "created_at": "2019-09-03T15:08:49Z", - "updated_at": "2020-01-15T21:21:20Z", + "updated_at": "2020-01-19T13:43:53Z", "pushed_at": "2019-09-08T06:09:11Z", - "stargazers_count": 627, - "watchers_count": 627, + "stargazers_count": 629, + "watchers_count": 629, "forks_count": 53, "forks": 53, - "watchers": 627, + "watchers": 629, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index d12d4f23bd..7486b1e8b5 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -13,13 +13,13 @@ "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", - "updated_at": "2020-01-11T19:52:16Z", + "updated_at": "2020-01-19T12:56:54Z", "pushed_at": "2019-08-01T16:02:59Z", - "stargazers_count": 206, - "watchers_count": 206, + "stargazers_count": 207, + "watchers_count": 207, "forks_count": 72, "forks": 72, - "watchers": 206, + "watchers": 207, "score": 0 }, { diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index 5d555876b8..648e62fbc4 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -17,8 +17,8 @@ "pushed_at": "2019-11-21T09:27:59Z", "stargazers_count": 47, "watchers_count": 47, - "forks_count": 20, - "forks": 20, + "forks_count": 21, + "forks": 21, "watchers": 47, "score": 0 }, diff --git a/2019/CVE-2019-14615.json b/2019/CVE-2019-14615.json index 0ace75777b..e6e12c829d 100644 --- a/2019/CVE-2019-14615.json +++ b/2019/CVE-2019-14615.json @@ -13,13 +13,13 @@ "description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU", "fork": false, "created_at": "2020-01-18T08:23:46Z", - "updated_at": "2020-01-18T15:39:03Z", - "pushed_at": "2020-01-18T15:39:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, + "updated_at": "2020-01-19T15:25:48Z", + "pushed_at": "2020-01-19T15:25:46Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, + "forks": 1, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-1579.json b/2019/CVE-2019-1579.json index d36b703358..ec20e37831 100644 --- a/2019/CVE-2019-1579.json +++ b/2019/CVE-2019-1579.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2019-09-10T02:53:03Z", - "updated_at": "2019-12-14T16:45:09Z", + "updated_at": "2020-01-19T16:08:41Z", "pushed_at": "2019-09-10T15:57:23Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "forks_count": 17, "forks": 17, - "watchers": 39, + "watchers": 40, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-16724.json b/2019/CVE-2019-16724.json index 66f8b1e8fc..1bdc0b7327 100644 --- a/2019/CVE-2019-16724.json +++ b/2019/CVE-2019-16724.json @@ -13,13 +13,13 @@ "description": "New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181", "fork": false, "created_at": "2019-08-31T20:28:12Z", - "updated_at": "2020-01-15T23:23:03Z", + "updated_at": "2020-01-19T04:45:29Z", "pushed_at": "2019-10-30T18:18:43Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 4, "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17570.json b/2019/CVE-2019-17570.json new file mode 100644 index 0000000000..071c89787e --- /dev/null +++ b/2019/CVE-2019-17570.json @@ -0,0 +1,25 @@ +[ + { + "id": 234831125, + "name": "CVE-2019-17570", + "full_name": "r00t4dm\/CVE-2019-17570", + "owner": { + "login": "r00t4dm", + "id": 36941976, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/36941976?v=4", + "html_url": "https:\/\/github.com\/r00t4dm" + }, + "html_url": "https:\/\/github.com\/r00t4dm\/CVE-2019-17570", + "description": null, + "fork": false, + "created_at": "2020-01-19T02:57:26Z", + "updated_at": "2020-01-19T03:07:41Z", + "pushed_at": "2020-01-19T03:07:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-17571.json b/2019/CVE-2019-17571.json index 6ceeb3278f..0d77d89fae 100644 --- a/2019/CVE-2019-17571.json +++ b/2019/CVE-2019-17571.json @@ -13,7 +13,7 @@ "description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞", "fork": false, "created_at": "2019-12-25T16:46:11Z", - "updated_at": "2020-01-15T15:42:29Z", + "updated_at": "2020-01-20T01:50:13Z", "pushed_at": "2019-12-25T16:48:41Z", "stargazers_count": 60, "watchers_count": 60, diff --git a/2019/CVE-2019-18371.json b/2019/CVE-2019-18371.json index 39d136a3bd..d077608baa 100644 --- a/2019/CVE-2019-18371.json +++ b/2019/CVE-2019-18371.json @@ -13,13 +13,13 @@ "description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.", "fork": false, "created_at": "2019-08-30T16:32:13Z", - "updated_at": "2020-01-18T12:08:50Z", + "updated_at": "2020-01-20T01:59:18Z", "pushed_at": "2020-01-12T02:34:45Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 104, + "watchers_count": 104, "forks_count": 15, "forks": 15, - "watchers": 100, + "watchers": 104, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 7388605fda..5aeddfefce 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -36,13 +36,13 @@ "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]", "fork": false, "created_at": "2020-01-10T22:56:35Z", - "updated_at": "2020-01-18T13:59:06Z", + "updated_at": "2020-01-19T16:23:14Z", "pushed_at": "2020-01-18T07:01:29Z", - "stargazers_count": 276, - "watchers_count": 276, - "forks_count": 73, - "forks": 73, - "watchers": 276, + "stargazers_count": 281, + "watchers_count": 281, + "forks_count": 72, + "forks": 72, + "watchers": 281, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "fork": false, "created_at": "2020-01-11T00:08:27Z", - "updated_at": "2020-01-18T11:04:02Z", + "updated_at": "2020-01-19T11:04:47Z", "pushed_at": "2020-01-16T16:23:50Z", - "stargazers_count": 428, - "watchers_count": 428, - "forks_count": 90, - "forks": 90, - "watchers": 428, + "stargazers_count": 431, + "watchers_count": 431, + "forks_count": 91, + "forks": 91, + "watchers": 431, "score": 0 }, { @@ -105,7 +105,7 @@ "description": "Citrix ADC Remote Code Execution", "fork": false, "created_at": "2020-01-11T03:10:12Z", - "updated_at": "2020-01-17T07:51:53Z", + "updated_at": "2020-01-18T22:53:59Z", "pushed_at": "2020-01-11T14:03:52Z", "stargazers_count": 55, "watchers_count": 55, @@ -151,13 +151,13 @@ "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "fork": false, "created_at": "2020-01-11T09:49:17Z", - "updated_at": "2020-01-18T13:37:18Z", + "updated_at": "2020-01-19T03:58:30Z", "pushed_at": "2020-01-13T18:54:57Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "forks_count": 11, "forks": 11, - "watchers": 59, + "watchers": 60, "score": 0 }, { @@ -266,13 +266,13 @@ "description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix", "fork": false, "created_at": "2020-01-12T15:16:54Z", - "updated_at": "2020-01-18T17:07:48Z", + "updated_at": "2020-01-19T17:11:27Z", "pushed_at": "2020-01-17T22:01:20Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 2, - "forks": 2, - "watchers": 10, + "stargazers_count": 12, + "watchers_count": 12, + "forks_count": 3, + "forks": 3, + "watchers": 12, "score": 0 }, { @@ -298,6 +298,29 @@ "watchers": 0, "score": 0 }, + { + "id": 233473212, + "name": "CVE-2019-19781", + "full_name": "x1sec\/CVE-2019-19781", + "owner": { + "login": "x1sec", + "id": 11153104, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11153104?v=4", + "html_url": "https:\/\/github.com\/x1sec" + }, + "html_url": "https:\/\/github.com\/x1sec\/CVE-2019-19781", + "description": "DFIR notes for Citrix Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781", + "fork": false, + "created_at": "2020-01-12T23:13:56Z", + "updated_at": "2020-01-19T14:06:14Z", + "pushed_at": "2020-01-19T14:06:12Z", + "stargazers_count": 13, + "watchers_count": 13, + "forks_count": 4, + "forks": 4, + "watchers": 13, + "score": 0 + }, { "id": 233493025, "name": "CVE-2019-19781", @@ -358,13 +381,13 @@ "description": "Detect and log CVE-2019-19781 scan and exploitation attempts.", "fork": false, "created_at": "2020-01-13T10:09:31Z", - "updated_at": "2020-01-18T10:25:47Z", + "updated_at": "2020-01-19T01:55:53Z", "pushed_at": "2020-01-15T13:58:22Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "forks_count": 21, "forks": 21, - "watchers": 78, + "watchers": 79, "score": 0 }, { @@ -542,8 +565,8 @@ "description": "Check ADC for CVE-2019-19781", "fork": false, "created_at": "2020-01-16T12:33:00Z", - "updated_at": "2020-01-18T17:49:45Z", - "pushed_at": "2020-01-18T17:49:43Z", + "updated_at": "2020-01-19T21:56:01Z", + "pushed_at": "2020-01-19T21:55:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2019/CVE-2019-19844.json b/2019/CVE-2019-19844.json index 90753fe798..741bea0376 100644 --- a/2019/CVE-2019-19844.json +++ b/2019/CVE-2019-19844.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)", "fork": false, "created_at": "2019-12-21T04:30:34Z", - "updated_at": "2020-01-18T17:12:32Z", + "updated_at": "2020-01-19T01:20:11Z", "pushed_at": "2019-12-24T12:31:47Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "forks_count": 10, "forks": 10, - "watchers": 87, + "watchers": 88, "score": 0 }, { diff --git a/2019/CVE-2019-20197.json b/2019/CVE-2019-20197.json index 1735f33e1b..ea6155209f 100644 --- a/2019/CVE-2019-20197.json +++ b/2019/CVE-2019-20197.json @@ -36,13 +36,13 @@ "description": "Nagios XI远程命令执行漏洞