Auto Update 2020/01/20 11:07:05

This commit is contained in:
motikan2010-bot 2020-01-20 11:07:05 +09:00
parent 6cb0814fce
commit 119442a129
53 changed files with 413 additions and 294 deletions

View file

@ -40,8 +40,8 @@
"pushed_at": "2016-03-23T12:05:38Z", "pushed_at": "2016-03-23T12:05:38Z",
"stargazers_count": 40, "stargazers_count": 40,
"watchers_count": 40, "watchers_count": 40,
"forks_count": 16, "forks_count": 17,
"forks": 16, "forks": 17,
"watchers": 40, "watchers": 40,
"score": 0 "score": 0
}, },

View file

@ -82,13 +82,13 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:", "description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false, "fork": false,
"created_at": "2015-02-03T20:28:27Z", "created_at": "2015-02-03T20:28:27Z",
"updated_at": "2020-01-15T20:43:37Z", "updated_at": "2020-01-19T21:32:47Z",
"pushed_at": "2019-01-31T22:56:17Z", "pushed_at": "2019-01-31T22:56:17Z",
"stargazers_count": 172, "stargazers_count": 174,
"watchers_count": 172, "watchers_count": 174,
"forks_count": 51, "forks_count": 51,
"forks": 51, "forks": 51,
"watchers": 172, "watchers": 174,
"score": 0 "score": 0
} }
] ]

View file

@ -910,13 +910,13 @@
"description": "Shellshock exploit + vulnerable environment", "description": "Shellshock exploit + vulnerable environment",
"fork": false, "fork": false,
"created_at": "2016-12-07T23:38:50Z", "created_at": "2016-12-07T23:38:50Z",
"updated_at": "2020-01-11T23:15:28Z", "updated_at": "2020-01-19T20:23:34Z",
"pushed_at": "2017-10-30T22:46:11Z", "pushed_at": "2017-10-30T22:46:11Z",
"stargazers_count": 74, "stargazers_count": 75,
"watchers_count": 74, "watchers_count": 75,
"forks_count": 32, "forks_count": 32,
"forks": 32, "forks": 32,
"watchers": 74, "watchers": 75,
"score": 0 "score": 0
}, },
{ {

View file

@ -21,28 +21,5 @@
"forks": 7, "forks": 7,
"watchers": 13, "watchers": 13,
"score": 0 "score": 0
},
{
"id": 229318943,
"name": "WordPress-Long-Password-Denial-of-Service",
"full_name": "Primus27\/WordPress-Long-Password-Denial-of-Service",
"owner": {
"login": "Primus27",
"id": 47760587,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/47760587?v=4",
"html_url": "https:\/\/github.com\/Primus27"
},
"html_url": "https:\/\/github.com\/Primus27\/WordPress-Long-Password-Denial-of-Service",
"description": "Takedown WordPress sites using long passwords (CVE-2014-9016)",
"fork": false,
"created_at": "2019-12-20T18:47:36Z",
"updated_at": "2020-01-08T17:02:16Z",
"pushed_at": "2020-01-08T17:02:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
} }
] ]

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-12-18T14:11:29Z", "pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 256, "stargazers_count": 256,
"watchers_count": 256, "watchers_count": 256,
"forks_count": 176, "forks_count": 177,
"forks": 176, "forks": 177,
"watchers": 256, "watchers": 256,
"score": 0 "score": 0
} }

View file

@ -36,13 +36,13 @@
"description": "CVE-2015-1805 root tool", "description": "CVE-2015-1805 root tool",
"fork": false, "fork": false,
"created_at": "2016-04-01T12:10:14Z", "created_at": "2016-04-01T12:10:14Z",
"updated_at": "2020-01-10T10:44:28Z", "updated_at": "2020-01-19T11:54:29Z",
"pushed_at": "2017-11-23T20:55:03Z", "pushed_at": "2017-11-23T20:55:03Z",
"stargazers_count": 250, "stargazers_count": 251,
"watchers_count": 250, "watchers_count": 251,
"forks_count": 147, "forks_count": 148,
"forks": 147, "forks": 148,
"watchers": 250, "watchers": 251,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container", "description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false, "fork": false,
"created_at": "2017-01-08T14:19:51Z", "created_at": "2017-01-08T14:19:51Z",
"updated_at": "2020-01-11T20:01:04Z", "updated_at": "2020-01-19T02:55:42Z",
"pushed_at": "2018-04-07T01:10:06Z", "pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 43, "stargazers_count": 44,
"watchers_count": 43, "watchers_count": 44,
"forks_count": 23, "forks_count": 23,
"forks": 23, "forks": 23,
"watchers": 43, "watchers": 44,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container", "description": "Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container",
"fork": false, "fork": false,
"created_at": "2017-12-16T00:23:30Z", "created_at": "2017-12-16T00:23:30Z",
"updated_at": "2019-07-22T20:31:15Z", "updated_at": "2020-01-19T14:07:02Z",
"pushed_at": "2017-12-16T00:39:19Z", "pushed_at": "2017-12-16T00:39:19Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 9, "forks_count": 9,
"forks": 9, "forks": 9,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false, "fork": false,
"created_at": "2016-06-30T11:56:44Z", "created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-01-01T15:46:44Z", "updated_at": "2020-01-19T12:40:51Z",
"pushed_at": "2016-06-30T15:32:42Z", "pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 271, "stargazers_count": 272,
"watchers_count": 271, "watchers_count": 272,
"forks_count": 83, "forks_count": 83,
"forks": 83, "forks": 83,
"watchers": 271, "watchers": 272,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false, "fork": false,
"created_at": "2016-06-30T11:56:44Z", "created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-01-01T15:46:44Z", "updated_at": "2020-01-19T12:40:51Z",
"pushed_at": "2016-06-30T15:32:42Z", "pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 271, "stargazers_count": 272,
"watchers_count": 271, "watchers_count": 272,
"forks_count": 83, "forks_count": 83,
"forks": 83, "forks": 83,
"watchers": 271, "watchers": 272,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Android Blueborne RCE CVE-2017-0781", "description": "Android Blueborne RCE CVE-2017-0781",
"fork": false, "fork": false,
"created_at": "2018-03-17T21:07:24Z", "created_at": "2018-03-17T21:07:24Z",
"updated_at": "2020-01-15T18:09:28Z", "updated_at": "2020-01-18T23:03:41Z",
"pushed_at": "2018-04-04T12:59:18Z", "pushed_at": "2018-04-04T12:59:18Z",
"stargazers_count": 62, "stargazers_count": 63,
"watchers_count": 62, "watchers_count": 63,
"forks_count": 19, "forks_count": 19,
"forks": 19, "forks": 19,
"watchers": 62, "watchers": 63,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ", "description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false, "fork": false,
"created_at": "2017-10-05T23:41:52Z", "created_at": "2017-10-05T23:41:52Z",
"updated_at": "2019-12-23T08:30:20Z", "updated_at": "2020-01-19T13:29:05Z",
"pushed_at": "2017-10-11T07:43:50Z", "pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 334, "stargazers_count": 333,
"watchers_count": 334, "watchers_count": 333,
"forks_count": 127, "forks_count": 127,
"forks": 127, "forks": 127,
"watchers": 334, "watchers": 333,
"score": 0 "score": 0
}, },
{ {

25
2017/CVE-2017-2751.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 234817787,
"name": "CVE-2017-2751",
"full_name": "BaderSZ\/CVE-2017-2751",
"owner": {
"login": "BaderSZ",
"id": 2165320,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2165320?v=4",
"html_url": "https:\/\/github.com\/BaderSZ"
},
"html_url": "https:\/\/github.com\/BaderSZ\/CVE-2017-2751",
"description": "Mini-paper on CVE-2017-2751, HP EFI password extraction.",
"fork": false,
"created_at": "2020-01-19T00:41:23Z",
"updated_at": "2020-01-19T00:48:09Z",
"pushed_at": "2020-01-19T00:48:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements", "description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements",
"fork": false, "fork": false,
"created_at": "2017-09-13T15:24:10Z", "created_at": "2017-09-13T15:24:10Z",
"updated_at": "2019-10-30T07:16:41Z", "updated_at": "2020-01-19T10:53:01Z",
"pushed_at": "2017-09-19T18:06:41Z", "pushed_at": "2017-09-19T18:06:41Z",
"stargazers_count": 90, "stargazers_count": 91,
"watchers_count": 90, "watchers_count": 91,
"forks_count": 45, "forks_count": 45,
"forks": 45, "forks": 45,
"watchers": 90, "watchers": 91,
"score": 0 "score": 0
}, },
{ {

View file

@ -335,13 +335,13 @@
"description": "LibSSH Authentication Bypass Exploit using RCE", "description": "LibSSH Authentication Bypass Exploit using RCE",
"fork": false, "fork": false,
"created_at": "2018-10-20T15:34:26Z", "created_at": "2018-10-20T15:34:26Z",
"updated_at": "2019-09-02T17:01:18Z", "updated_at": "2020-01-19T09:02:55Z",
"pushed_at": "2018-10-25T18:23:52Z", "pushed_at": "2018-10-25T18:23:52Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"forks_count": 5, "forks_count": 5,
"forks": 5, "forks": 5,
"watchers": 9, "watchers": 10,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-13379", "description": "CVE-2018-13379",
"fork": false, "fork": false,
"created_at": "2019-08-11T09:44:37Z", "created_at": "2019-08-11T09:44:37Z",
"updated_at": "2020-01-15T06:13:07Z", "updated_at": "2020-01-19T17:22:33Z",
"pushed_at": "2019-08-14T08:40:25Z", "pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 192, "stargazers_count": 193,
"watchers_count": 192, "watchers_count": 193,
"forks_count": 59, "forks_count": 59,
"forks": 59, "forks": 59,
"watchers": 192, "watchers": 193,
"score": 0 "score": 0
}, },
{ {

View file

@ -289,13 +289,13 @@
"description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250", "description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250",
"fork": false, "fork": false,
"created_at": "2019-03-25T04:22:14Z", "created_at": "2019-03-25T04:22:14Z",
"updated_at": "2019-04-09T07:37:30Z", "updated_at": "2020-01-18T19:58:21Z",
"pushed_at": "2019-03-26T04:54:35Z", "pushed_at": "2019-03-26T04:54:35Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 2, "forks_count": 2,
"forks": 2, "forks": 2,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script", "description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
"fork": false, "fork": false,
"created_at": "2018-07-20T03:59:18Z", "created_at": "2018-07-20T03:59:18Z",
"updated_at": "2020-01-16T09:19:02Z", "updated_at": "2020-01-19T02:03:58Z",
"pushed_at": "2018-07-20T12:46:50Z", "pushed_at": "2018-07-20T12:46:50Z",
"stargazers_count": 117, "stargazers_count": 118,
"watchers_count": 117, "watchers_count": 118,
"forks_count": 44, "forks_count": 44,
"forks": 44, "forks": 44,
"watchers": 117, "watchers": 118,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z", "pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 147, "stargazers_count": 147,
"watchers_count": 147, "watchers_count": 147,
"forks_count": 28, "forks_count": 29,
"forks": 28, "forks": 29,
"watchers": 147, "watchers": 147,
"score": 0 "score": 0
} }

View file

@ -13,13 +13,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-03-05T14:18:07Z", "created_at": "2019-03-05T14:18:07Z",
"updated_at": "2019-12-23T08:11:18Z", "updated_at": "2020-01-19T08:54:38Z",
"pushed_at": "2019-04-08T08:26:26Z", "pushed_at": "2019-04-08T08:26:26Z",
"stargazers_count": 119, "stargazers_count": 120,
"watchers_count": 119, "watchers_count": 120,
"forks_count": 44, "forks_count": 44,
"forks": 44, "forks": 44,
"watchers": 119, "watchers": 120,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)", "description": "PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)",
"fork": false, "fork": false,
"created_at": "2019-03-02T18:32:17Z", "created_at": "2019-03-02T18:32:17Z",
"updated_at": "2020-01-15T12:33:48Z", "updated_at": "2020-01-18T18:34:54Z",
"pushed_at": "2020-01-15T12:33:46Z", "pushed_at": "2020-01-15T12:33:46Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 3, "forks_count": 3,
"forks": 3, "forks": 3,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
} }
] ]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-01-23T14:27:21Z", "pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 407, "stargazers_count": 407,
"watchers_count": 407, "watchers_count": 407,
"forks_count": 165, "forks_count": 166,
"forks": 165, "forks": 166,
"watchers": 407, "watchers": 407,
"score": 0 "score": 0
}, },

View file

@ -1163,13 +1163,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false, "fork": false,
"created_at": "2019-05-22T00:08:44Z", "created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-01-17T09:01:50Z", "updated_at": "2020-01-19T22:41:38Z",
"pushed_at": "2019-10-01T12:23:59Z", "pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1075, "stargazers_count": 1077,
"watchers_count": 1075, "watchers_count": 1077,
"forks_count": 361, "forks_count": 361,
"forks": 361, "forks": 361,
"watchers": 1075, "watchers": 1077,
"score": 0 "score": 0
}, },
{ {
@ -1209,7 +1209,7 @@
"description": "cve-2019-0708 vulnerablility scanner", "description": "cve-2019-0708 vulnerablility scanner",
"fork": false, "fork": false,
"created_at": "2019-05-22T05:18:18Z", "created_at": "2019-05-22T05:18:18Z",
"updated_at": "2019-05-22T06:09:10Z", "updated_at": "2020-01-19T23:34:36Z",
"pushed_at": "2019-05-22T06:06:56Z", "pushed_at": "2019-05-22T06:06:56Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
@ -1370,13 +1370,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false, "fork": false,
"created_at": "2019-05-23T22:50:12Z", "created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-01-16T18:23:13Z", "updated_at": "2020-01-19T22:39:08Z",
"pushed_at": "2019-06-22T21:48:45Z", "pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 685, "stargazers_count": 686,
"watchers_count": 685, "watchers_count": 686,
"forks_count": 156, "forks_count": 156,
"forks": 156, "forks": 156,
"watchers": 685, "watchers": 686,
"score": 0 "score": 0
}, },
{ {
@ -1577,13 +1577,13 @@
"description": "Proof of concept for CVE-2019-0708", "description": "Proof of concept for CVE-2019-0708",
"fork": false, "fork": false,
"created_at": "2019-05-29T16:53:54Z", "created_at": "2019-05-29T16:53:54Z",
"updated_at": "2020-01-15T00:01:20Z", "updated_at": "2020-01-19T19:24:42Z",
"pushed_at": "2019-09-03T20:50:28Z", "pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 994, "stargazers_count": 996,
"watchers_count": 994, "watchers_count": 996,
"forks_count": 344, "forks_count": 343,
"forks": 344, "forks": 343,
"watchers": 994, "watchers": 996,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit", "description": "Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit",
"fork": false, "fork": false,
"created_at": "2019-06-19T08:32:31Z", "created_at": "2019-06-19T08:32:31Z",
"updated_at": "2020-01-13T04:16:26Z", "updated_at": "2020-01-20T01:59:12Z",
"pushed_at": "2019-06-19T09:15:16Z", "pushed_at": "2019-06-19T09:15:16Z",
"stargazers_count": 11, "stargazers_count": 12,
"watchers_count": 11, "watchers_count": 12,
"forks_count": 5, "forks_count": 5,
"forks": 5, "forks": 5,
"watchers": 11, "watchers": 12,
"score": 0 "score": 0
}, },
{ {
@ -59,13 +59,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-06-24T15:33:50Z", "created_at": "2019-06-24T15:33:50Z",
"updated_at": "2020-01-16T05:43:30Z", "updated_at": "2020-01-19T04:01:33Z",
"pushed_at": "2019-06-28T03:57:26Z", "pushed_at": "2019-06-28T03:57:26Z",
"stargazers_count": 186, "stargazers_count": 185,
"watchers_count": 186, "watchers_count": 185,
"forks_count": 33, "forks_count": 33,
"forks": 33, "forks": 33,
"watchers": 186, "watchers": 185,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-12-26T06:58:56Z", "created_at": "2019-12-26T06:58:56Z",
"updated_at": "2020-01-18T09:36:30Z", "updated_at": "2020-01-20T01:50:05Z",
"pushed_at": "2019-12-26T08:44:54Z", "pushed_at": "2019-12-26T08:44:54Z",
"stargazers_count": 94, "stargazers_count": 95,
"watchers_count": 94, "watchers_count": 95,
"forks_count": 19, "forks_count": 19,
"forks": 19, "forks": 19,
"watchers": 94, "watchers": 95,
"score": 0 "score": 0
}, },
{ {

View file

@ -197,13 +197,13 @@
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex", "description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false, "fork": false,
"created_at": "2019-10-28T11:09:06Z", "created_at": "2019-10-28T11:09:06Z",
"updated_at": "2020-01-17T18:47:01Z", "updated_at": "2020-01-19T23:32:18Z",
"pushed_at": "2019-10-29T15:47:02Z", "pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 110, "stargazers_count": 112,
"watchers_count": 110, "watchers_count": 112,
"forks_count": 23, "forks_count": 23,
"forks": 23, "forks": 23,
"watchers": 110, "watchers": 112,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)", "description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false, "fork": false,
"created_at": "2019-08-21T08:40:26Z", "created_at": "2019-08-21T08:40:26Z",
"updated_at": "2020-01-16T04:49:27Z", "updated_at": "2020-01-19T16:23:20Z",
"pushed_at": "2020-01-11T13:55:33Z", "pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 277, "stargazers_count": 278,
"watchers_count": 277, "watchers_count": 278,
"forks_count": 98, "forks_count": 99,
"forks": 98, "forks": 99,
"watchers": 277, "watchers": 278,
"score": 0 "score": 0
}, },
{ {
@ -174,13 +174,13 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false, "fork": false,
"created_at": "2019-09-09T15:58:39Z", "created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-01-16T08:27:52Z", "updated_at": "2020-01-18T22:56:45Z",
"pushed_at": "2020-01-15T17:01:50Z", "pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 57, "stargazers_count": 58,
"watchers_count": 57, "watchers_count": 58,
"forks_count": 23, "forks_count": 23,
"forks": 23, "forks": 23,
"watchers": 57, "watchers": 58,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Atlassian JIRA Template injection vulnerability RCE", "description": "Atlassian JIRA Template injection vulnerability RCE",
"fork": false, "fork": false,
"created_at": "2019-07-16T02:27:00Z", "created_at": "2019-07-16T02:27:00Z",
"updated_at": "2019-12-18T09:06:26Z", "updated_at": "2020-01-18T20:07:35Z",
"pushed_at": "2019-07-22T06:47:52Z", "pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 52, "stargazers_count": 53,
"watchers_count": 52, "watchers_count": 53,
"forks_count": 18, "forks_count": 18,
"forks": 18, "forks": 18,
"watchers": 52, "watchers": 53,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.", "description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false, "fork": false,
"created_at": "2019-09-29T07:08:52Z", "created_at": "2019-09-29T07:08:52Z",
"updated_at": "2020-01-15T22:02:07Z", "updated_at": "2020-01-18T20:50:59Z",
"pushed_at": "2019-12-28T18:23:58Z", "pushed_at": "2019-12-28T18:23:58Z",
"stargazers_count": 545, "stargazers_count": 546,
"watchers_count": 545, "watchers_count": 546,
"forks_count": 62, "forks_count": 62,
"forks": 62, "forks": 62,
"watchers": 545, "watchers": 546,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)", "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false, "fork": false,
"created_at": "2019-09-03T15:08:49Z", "created_at": "2019-09-03T15:08:49Z",
"updated_at": "2020-01-15T21:21:20Z", "updated_at": "2020-01-19T13:43:53Z",
"pushed_at": "2019-09-08T06:09:11Z", "pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 627, "stargazers_count": 629,
"watchers_count": 627, "watchers_count": 629,
"forks_count": 53, "forks_count": 53,
"forks": 53, "forks": 53,
"watchers": 627, "watchers": 629,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false, "fork": false,
"created_at": "2019-07-31T04:51:43Z", "created_at": "2019-07-31T04:51:43Z",
"updated_at": "2020-01-11T19:52:16Z", "updated_at": "2020-01-19T12:56:54Z",
"pushed_at": "2019-08-01T16:02:59Z", "pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 206, "stargazers_count": 207,
"watchers_count": 206, "watchers_count": 207,
"forks_count": 72, "forks_count": 72,
"forks": 72, "forks": 72,
"watchers": 206, "watchers": 207,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-21T09:27:59Z", "pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 47, "stargazers_count": 47,
"watchers_count": 47, "watchers_count": 47,
"forks_count": 20, "forks_count": 21,
"forks": 20, "forks": 21,
"watchers": 47, "watchers": 47,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU", "description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU",
"fork": false, "fork": false,
"created_at": "2020-01-18T08:23:46Z", "created_at": "2020-01-18T08:23:46Z",
"updated_at": "2020-01-18T15:39:03Z", "updated_at": "2020-01-19T15:25:48Z",
"pushed_at": "2020-01-18T15:39:01Z", "pushed_at": "2020-01-19T15:25:46Z",
"stargazers_count": 0, "stargazers_count": 4,
"watchers_count": 0, "watchers_count": 4,
"forks_count": 0, "forks_count": 1,
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 4,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-09-10T02:53:03Z", "created_at": "2019-09-10T02:53:03Z",
"updated_at": "2019-12-14T16:45:09Z", "updated_at": "2020-01-19T16:08:41Z",
"pushed_at": "2019-09-10T15:57:23Z", "pushed_at": "2019-09-10T15:57:23Z",
"stargazers_count": 39, "stargazers_count": 40,
"watchers_count": 39, "watchers_count": 40,
"forks_count": 17, "forks_count": 17,
"forks": 17, "forks": 17,
"watchers": 39, "watchers": 40,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181", "description": "New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
"fork": false, "fork": false,
"created_at": "2019-08-31T20:28:12Z", "created_at": "2019-08-31T20:28:12Z",
"updated_at": "2020-01-15T23:23:03Z", "updated_at": "2020-01-19T04:45:29Z",
"pushed_at": "2019-10-30T18:18:43Z", "pushed_at": "2019-10-30T18:18:43Z",
"stargazers_count": 14, "stargazers_count": 15,
"watchers_count": 14, "watchers_count": 15,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 14, "watchers": 15,
"score": 0 "score": 0
} }
] ]

25
2019/CVE-2019-17570.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 234831125,
"name": "CVE-2019-17570",
"full_name": "r00t4dm\/CVE-2019-17570",
"owner": {
"login": "r00t4dm",
"id": 36941976,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/36941976?v=4",
"html_url": "https:\/\/github.com\/r00t4dm"
},
"html_url": "https:\/\/github.com\/r00t4dm\/CVE-2019-17570",
"description": null,
"fork": false,
"created_at": "2020-01-19T02:57:26Z",
"updated_at": "2020-01-19T03:07:41Z",
"pushed_at": "2020-01-19T03:07:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞", "description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
"fork": false, "fork": false,
"created_at": "2019-12-25T16:46:11Z", "created_at": "2019-12-25T16:46:11Z",
"updated_at": "2020-01-15T15:42:29Z", "updated_at": "2020-01-20T01:50:13Z",
"pushed_at": "2019-12-25T16:48:41Z", "pushed_at": "2019-12-25T16:48:41Z",
"stargazers_count": 60, "stargazers_count": 60,
"watchers_count": 60, "watchers_count": 60,

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.", "description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false, "fork": false,
"created_at": "2019-08-30T16:32:13Z", "created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-01-18T12:08:50Z", "updated_at": "2020-01-20T01:59:18Z",
"pushed_at": "2020-01-12T02:34:45Z", "pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 100, "stargazers_count": 104,
"watchers_count": 100, "watchers_count": 104,
"forks_count": 15, "forks_count": 15,
"forks": 15, "forks": 15,
"watchers": 100, "watchers": 104,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]", "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false, "fork": false,
"created_at": "2020-01-10T22:56:35Z", "created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-01-18T13:59:06Z", "updated_at": "2020-01-19T16:23:14Z",
"pushed_at": "2020-01-18T07:01:29Z", "pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 276, "stargazers_count": 281,
"watchers_count": 276, "watchers_count": 281,
"forks_count": 73, "forks_count": 72,
"forks": 73, "forks": 72,
"watchers": 276, "watchers": 281,
"score": 0 "score": 0
}, },
{ {
@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false, "fork": false,
"created_at": "2020-01-11T00:08:27Z", "created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-01-18T11:04:02Z", "updated_at": "2020-01-19T11:04:47Z",
"pushed_at": "2020-01-16T16:23:50Z", "pushed_at": "2020-01-16T16:23:50Z",
"stargazers_count": 428, "stargazers_count": 431,
"watchers_count": 428, "watchers_count": 431,
"forks_count": 90, "forks_count": 91,
"forks": 90, "forks": 91,
"watchers": 428, "watchers": 431,
"score": 0 "score": 0
}, },
{ {
@ -105,7 +105,7 @@
"description": "Citrix ADC Remote Code Execution", "description": "Citrix ADC Remote Code Execution",
"fork": false, "fork": false,
"created_at": "2020-01-11T03:10:12Z", "created_at": "2020-01-11T03:10:12Z",
"updated_at": "2020-01-17T07:51:53Z", "updated_at": "2020-01-18T22:53:59Z",
"pushed_at": "2020-01-11T14:03:52Z", "pushed_at": "2020-01-11T14:03:52Z",
"stargazers_count": 55, "stargazers_count": 55,
"watchers_count": 55, "watchers_count": 55,
@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false, "fork": false,
"created_at": "2020-01-11T09:49:17Z", "created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-01-18T13:37:18Z", "updated_at": "2020-01-19T03:58:30Z",
"pushed_at": "2020-01-13T18:54:57Z", "pushed_at": "2020-01-13T18:54:57Z",
"stargazers_count": 59, "stargazers_count": 60,
"watchers_count": 59, "watchers_count": 60,
"forks_count": 11, "forks_count": 11,
"forks": 11, "forks": 11,
"watchers": 59, "watchers": 60,
"score": 0 "score": 0
}, },
{ {
@ -266,13 +266,13 @@
"description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix", "description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix",
"fork": false, "fork": false,
"created_at": "2020-01-12T15:16:54Z", "created_at": "2020-01-12T15:16:54Z",
"updated_at": "2020-01-18T17:07:48Z", "updated_at": "2020-01-19T17:11:27Z",
"pushed_at": "2020-01-17T22:01:20Z", "pushed_at": "2020-01-17T22:01:20Z",
"stargazers_count": 10, "stargazers_count": 12,
"watchers_count": 10, "watchers_count": 12,
"forks_count": 2, "forks_count": 3,
"forks": 2, "forks": 3,
"watchers": 10, "watchers": 12,
"score": 0 "score": 0
}, },
{ {
@ -298,6 +298,29 @@
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
}, },
{
"id": 233473212,
"name": "CVE-2019-19781",
"full_name": "x1sec\/CVE-2019-19781",
"owner": {
"login": "x1sec",
"id": 11153104,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11153104?v=4",
"html_url": "https:\/\/github.com\/x1sec"
},
"html_url": "https:\/\/github.com\/x1sec\/CVE-2019-19781",
"description": "DFIR notes for Citrix Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-12T23:13:56Z",
"updated_at": "2020-01-19T14:06:14Z",
"pushed_at": "2020-01-19T14:06:12Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"forks": 4,
"watchers": 13,
"score": 0
},
{ {
"id": 233493025, "id": 233493025,
"name": "CVE-2019-19781", "name": "CVE-2019-19781",
@ -358,13 +381,13 @@
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.", "description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
"fork": false, "fork": false,
"created_at": "2020-01-13T10:09:31Z", "created_at": "2020-01-13T10:09:31Z",
"updated_at": "2020-01-18T10:25:47Z", "updated_at": "2020-01-19T01:55:53Z",
"pushed_at": "2020-01-15T13:58:22Z", "pushed_at": "2020-01-15T13:58:22Z",
"stargazers_count": 78, "stargazers_count": 79,
"watchers_count": 78, "watchers_count": 79,
"forks_count": 21, "forks_count": 21,
"forks": 21, "forks": 21,
"watchers": 78, "watchers": 79,
"score": 0 "score": 0
}, },
{ {
@ -542,8 +565,8 @@
"description": "Check ADC for CVE-2019-19781", "description": "Check ADC for CVE-2019-19781",
"fork": false, "fork": false,
"created_at": "2020-01-16T12:33:00Z", "created_at": "2020-01-16T12:33:00Z",
"updated_at": "2020-01-18T17:49:45Z", "updated_at": "2020-01-19T21:56:01Z",
"pushed_at": "2020-01-18T17:49:43Z", "pushed_at": "2020-01-19T21:55:59Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)", "description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)",
"fork": false, "fork": false,
"created_at": "2019-12-21T04:30:34Z", "created_at": "2019-12-21T04:30:34Z",
"updated_at": "2020-01-18T17:12:32Z", "updated_at": "2020-01-19T01:20:11Z",
"pushed_at": "2019-12-24T12:31:47Z", "pushed_at": "2019-12-24T12:31:47Z",
"stargazers_count": 87, "stargazers_count": 88,
"watchers_count": 87, "watchers_count": 88,
"forks_count": 10, "forks_count": 10,
"forks": 10, "forks": 10,
"watchers": 87, "watchers": 88,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Nagios XI远程命令执行漏洞 <v5.6.9", "description": "Nagios XI远程命令执行漏洞 <v5.6.9",
"fork": false, "fork": false,
"created_at": "2020-01-08T08:16:30Z", "created_at": "2020-01-08T08:16:30Z",
"updated_at": "2020-01-17T01:04:33Z", "updated_at": "2020-01-19T03:27:12Z",
"pushed_at": "2020-01-08T08:30:03Z", "pushed_at": "2020-01-08T08:30:03Z",
"stargazers_count": 18, "stargazers_count": 19,
"watchers_count": 18, "watchers_count": 19,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 18, "watchers": 19,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224", "description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
"fork": false, "fork": false,
"created_at": "2020-01-10T13:41:28Z", "created_at": "2020-01-10T13:41:28Z",
"updated_at": "2020-01-15T03:14:03Z", "updated_at": "2020-01-20T01:59:08Z",
"pushed_at": "2020-01-10T13:42:12Z", "pushed_at": "2020-01-10T13:42:12Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 8, "watchers": 9,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)", "description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)",
"fork": false, "fork": false,
"created_at": "2020-01-14T12:20:18Z", "created_at": "2020-01-14T12:20:18Z",
"updated_at": "2020-01-17T23:32:50Z", "updated_at": "2020-01-19T14:39:08Z",
"pushed_at": "2020-01-17T10:10:31Z", "pushed_at": "2020-01-17T10:10:31Z",
"stargazers_count": 1, "stargazers_count": 13,
"watchers_count": 1, "watchers_count": 13,
"forks_count": 0, "forks_count": 6,
"forks": 0, "forks": 6,
"watchers": 1, "watchers": 13,
"score": 0 "score": 0
} }
] ]

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-04-17T15:05:09Z", "pushed_at": "2019-04-17T15:05:09Z",
"stargazers_count": 132, "stargazers_count": 132,
"watchers_count": 132, "watchers_count": 132,
"forks_count": 45, "forks_count": 46,
"forks": 45, "forks": 46,
"watchers": 132, "watchers": 132,
"score": 0 "score": 0
}, },
@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持", "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false, "fork": false,
"created_at": "2019-06-21T09:22:43Z", "created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-01-16T06:01:25Z", "updated_at": "2020-01-19T07:30:06Z",
"pushed_at": "2019-06-24T06:06:48Z", "pushed_at": "2019-06-24T06:06:48Z",
"stargazers_count": 482, "stargazers_count": 483,
"watchers_count": 482, "watchers_count": 483,
"forks_count": 103, "forks_count": 104,
"forks": 103, "forks": 104,
"watchers": 482, "watchers": 483,
"score": 0 "score": 0
}, },
{ {

View file

@ -178,8 +178,8 @@
"pushed_at": "2019-08-08T09:48:20Z", "pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 291, "stargazers_count": 291,
"watchers_count": 291, "watchers_count": 291,
"forks_count": 127, "forks_count": 126,
"forks": 127, "forks": 126,
"watchers": 291, "watchers": 291,
"score": 0 "score": 0
}, },
@ -339,8 +339,8 @@
"pushed_at": "2019-09-26T05:46:14Z", "pushed_at": "2019-09-26T05:46:14Z",
"stargazers_count": 24, "stargazers_count": 24,
"watchers_count": 24, "watchers_count": 24,
"forks_count": 4, "forks_count": 3,
"forks": 4, "forks": 3,
"watchers": 24, "watchers": 24,
"score": 0 "score": 0
}, },

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-13T17:16:42Z", "pushed_at": "2020-01-13T17:16:42Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 1,
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-10-17T01:25:41Z", "pushed_at": "2019-10-17T01:25:41Z",
"stargazers_count": 6, "stargazers_count": 6,
"watchers_count": 6, "watchers_count": 6,
"forks_count": 31, "forks_count": 30,
"forks": 31, "forks": 30,
"watchers": 6, "watchers": 6,
"score": 0 "score": 0
}, },
@ -59,13 +59,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-12-06T08:46:31Z", "created_at": "2019-12-06T08:46:31Z",
"updated_at": "2020-01-08T15:05:44Z", "updated_at": "2020-01-19T02:45:17Z",
"pushed_at": "2019-12-06T09:18:56Z", "pushed_at": "2019-12-06T09:18:56Z",
"stargazers_count": 74, "stargazers_count": 75,
"watchers_count": 74, "watchers_count": 75,
"forks_count": 18, "forks_count": 18,
"forks": 18, "forks": 18,
"watchers": 74, "watchers": 75,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-09-25T16:22:56Z", "created_at": "2019-09-25T16:22:56Z",
"updated_at": "2019-11-14T11:22:45Z", "updated_at": "2020-01-19T08:02:50Z",
"pushed_at": "2019-09-25T16:33:53Z", "pushed_at": "2019-09-25T16:33:53Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"forks_count": 1, "forks_count": 3,
"forks": 1, "forks": 3,
"watchers": 2, "watchers": 3,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.", "description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
"fork": false, "fork": false,
"created_at": "2019-05-05T17:19:02Z", "created_at": "2019-05-05T17:19:02Z",
"updated_at": "2020-01-13T18:52:10Z", "updated_at": "2020-01-18T20:50:49Z",
"pushed_at": "2019-12-28T18:25:10Z", "pushed_at": "2019-12-28T18:25:10Z",
"stargazers_count": 189, "stargazers_count": 190,
"watchers_count": 189, "watchers_count": 190,
"forks_count": 47, "forks_count": 47,
"forks": 47, "forks": 47,
"watchers": 189, "watchers": 190,
"score": 0 "score": 0
} }
] ]

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601", "description": "PoC for CVE-2020-0601",
"fork": false, "fork": false,
"created_at": "2020-01-15T23:07:41Z", "created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-01-18T18:34:35Z", "updated_at": "2020-01-20T02:05:08Z",
"pushed_at": "2020-01-17T10:09:11Z", "pushed_at": "2020-01-17T10:09:11Z",
"stargazers_count": 602, "stargazers_count": 645,
"watchers_count": 602, "watchers_count": 645,
"forks_count": 153, "forks_count": 164,
"forks": 153, "forks": 164,
"watchers": 602, "watchers": 645,
"score": 0 "score": 0
}, },
{ {
@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601", "description": "A PoC for CVE-2020-0601",
"fork": false, "fork": false,
"created_at": "2020-01-15T23:15:32Z", "created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-01-18T18:06:06Z", "updated_at": "2020-01-20T01:03:31Z",
"pushed_at": "2020-01-17T13:29:44Z", "pushed_at": "2020-01-17T13:29:44Z",
"stargazers_count": 239, "stargazers_count": 257,
"watchers_count": 239, "watchers_count": 257,
"forks_count": 59, "forks_count": 64,
"forks": 59, "forks": 64,
"watchers": 239, "watchers": 257,
"score": 0 "score": 0
}, },
{ {
@ -243,13 +243,13 @@
"description": "Proof of Concept for CVE-2020-0601", "description": "Proof of Concept for CVE-2020-0601",
"fork": false, "fork": false,
"created_at": "2020-01-16T23:44:37Z", "created_at": "2020-01-16T23:44:37Z",
"updated_at": "2020-01-18T16:30:38Z", "updated_at": "2020-01-19T23:26:50Z",
"pushed_at": "2020-01-17T16:32:39Z", "pushed_at": "2020-01-17T16:32:39Z",
"stargazers_count": 30, "stargazers_count": 37,
"watchers_count": 30, "watchers_count": 37,
"forks_count": 6, "forks_count": 7,
"forks": 6, "forks": 7,
"watchers": 30, "watchers": 37,
"score": 0 "score": 0
}, },
{ {
@ -289,8 +289,8 @@
"description": "Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909", "description": "Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909",
"fork": false, "fork": false,
"created_at": "2020-01-17T15:13:37Z", "created_at": "2020-01-17T15:13:37Z",
"updated_at": "2020-01-18T19:22:44Z", "updated_at": "2020-01-18T22:08:12Z",
"pushed_at": "2020-01-18T19:22:42Z", "pushed_at": "2020-01-18T22:08:10Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"forks_count": 1, "forks_count": 1,
@ -335,8 +335,8 @@
"description": "CurveBall CVE exploitation", "description": "CurveBall CVE exploitation",
"fork": false, "fork": false,
"created_at": "2020-01-17T17:17:55Z", "created_at": "2020-01-17T17:17:55Z",
"updated_at": "2020-01-17T23:38:54Z", "updated_at": "2020-01-19T00:58:30Z",
"pushed_at": "2020-01-17T23:38:52Z", "pushed_at": "2020-01-19T00:58:28Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,
@ -366,5 +366,74 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 234920281,
"name": "curveball_lua",
"full_name": "dlee35\/curveball_lua",
"owner": {
"login": "dlee35",
"id": 7849311,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7849311?v=4",
"html_url": "https:\/\/github.com\/dlee35"
},
"html_url": "https:\/\/github.com\/dlee35\/curveball_lua",
"description": "Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffic",
"fork": false,
"created_at": "2020-01-19T15:20:19Z",
"updated_at": "2020-01-19T21:25:55Z",
"pushed_at": "2020-01-19T21:25:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234944443,
"name": "-CVE-2020-0601-ECC---EXPLOIT",
"full_name": "IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"owner": {
"login": "IIICTECH",
"id": 5104528,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5104528?v=4",
"html_url": "https:\/\/github.com\/IIICTECH"
},
"html_url": "https:\/\/github.com\/IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"description": "CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. ",
"fork": false,
"created_at": "2020-01-19T18:20:26Z",
"updated_at": "2020-01-19T18:29:55Z",
"pushed_at": "2020-01-19T18:26:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 235000073,
"name": "CVE-2020-0601",
"full_name": "cosmicifint\/CVE-2020-0601",
"owner": {
"login": "cosmicifint",
"id": 50549802,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50549802?v=4",
"html_url": "https:\/\/github.com\/cosmicifint"
},
"html_url": "https:\/\/github.com\/cosmicifint\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-20T02:04:05Z",
"updated_at": "2020-01-20T02:05:22Z",
"pushed_at": "2020-01-20T02:05:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "Weblogic RCE with IIOP", "description": "Weblogic RCE with IIOP",
"fork": false, "fork": false,
"created_at": "2020-01-18T07:08:06Z", "created_at": "2020-01-18T07:08:06Z",
"updated_at": "2020-01-18T17:07:06Z", "updated_at": "2020-01-19T14:00:20Z",
"pushed_at": "2020-01-18T07:14:34Z", "pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 8, "stargazers_count": 20,
"watchers_count": 8, "watchers_count": 20,
"forks_count": 2, "forks_count": 2,
"forks": 2, "forks": 2,
"watchers": 8, "watchers": 20,
"score": 0 "score": 0
}, },
{ {
"id": 234700793, "id": 234901198,
"name": "CVE-2020-2551", "name": "CVE-2020-2551",
"full_name": "hktalent\/CVE-2020-2551", "full_name": "hktalent\/CVE-2020-2551",
"owner": { "owner": {
@ -33,11 +33,11 @@
"html_url": "https:\/\/github.com\/hktalent" "html_url": "https:\/\/github.com\/hktalent"
}, },
"html_url": "https:\/\/github.com\/hktalent\/CVE-2020-2551", "html_url": "https:\/\/github.com\/hktalent\/CVE-2020-2551",
"description": "CVE-2020-2551 ,CVE-2020-2546 poc,exploit,python3", "description": "CVE-2020-2551 poc exploit python example",
"fork": false, "fork": false,
"created_at": "2020-01-18T07:55:16Z", "created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-01-18T13:07:00Z", "updated_at": "2020-01-20T01:57:51Z",
"pushed_at": "2020-01-18T07:56:18Z", "pushed_at": "2020-01-20T01:57:44Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC", "description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false, "fork": false,
"created_at": "2020-01-17T05:35:01Z", "created_at": "2020-01-17T05:35:01Z",
"updated_at": "2020-01-18T14:38:57Z", "updated_at": "2020-01-20T02:06:06Z",
"pushed_at": "2020-01-17T05:42:53Z", "pushed_at": "2020-01-17T05:42:53Z",
"stargazers_count": 12, "stargazers_count": 28,
"watchers_count": 12, "watchers_count": 28,
"forks_count": 5, "forks_count": 7,
"forks": 5, "forks": 7,
"watchers": 12, "watchers": 28,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept exploit for CVE-2020-5509 | RCE in the Car Rental Project v.1.0 webapplication", "description": "Proof of concept exploit for CVE-2020-5509 | RCE in the Car Rental Project v.1.0 webapplication",
"fork": false, "fork": false,
"created_at": "2020-01-05T22:13:24Z", "created_at": "2020-01-05T22:13:24Z",
"updated_at": "2020-01-09T16:47:12Z", "updated_at": "2020-01-19T04:45:14Z",
"pushed_at": "2020-01-05T22:23:20Z", "pushed_at": "2020-01-05T22:23:20Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
} }
] ]