mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/01/24 06:07:28
This commit is contained in:
parent
68799f89c5
commit
3af8f89759
15 changed files with 127 additions and 103 deletions
|
@ -59,13 +59,13 @@
|
|||
"description": "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in ",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T09:43:04Z",
|
||||
"updated_at": "2019-10-03T11:36:51Z",
|
||||
"updated_at": "2020-01-23T18:43:10Z",
|
||||
"pushed_at": "2018-02-19T03:04:07Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2017-8809 Docker - RFD(Reflected File Download) for MediaWiki",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-22T10:21:51Z",
|
||||
"updated_at": "2020-01-22T12:48:17Z",
|
||||
"updated_at": "2020-01-23T17:09:46Z",
|
||||
"pushed_at": "2020-01-22T10:27:26Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T14:14:12Z",
|
||||
"updated_at": "2020-01-16T21:32:45Z",
|
||||
"updated_at": "2020-01-23T16:16:30Z",
|
||||
"pushed_at": "2020-01-15T01:27:31Z",
|
||||
"stargazers_count": 461,
|
||||
"watchers_count": 461,
|
||||
"stargazers_count": 462,
|
||||
"watchers_count": 462,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 461,
|
||||
"watchers": 462,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2064,8 +2064,8 @@
|
|||
"pushed_at": "2019-08-19T02:52:11Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-07T14:29:45Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2020-01-21T15:53:01Z",
|
||||
"updated_at": "2020-01-23T15:37:30Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PhantomJS uses internal module: webpage, to open, close, render, and perform multiple actions on webpages, which suffers from an arbitrary file read vulnerability. The vulnerability exists in the page.open() function of the webpage module, which loads the specified URL and calls a given callback. When opening a HTML file, an attacker can supply specially crafted file content, which allows reading arbitrary files on the filesystem. The vulnerability is demonstrated by using page.render() as the function callback, resulting in the generation of a PDF or an image of the targeted file.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T18:07:07Z",
|
||||
"updated_at": "2020-01-23T09:40:21Z",
|
||||
"updated_at": "2020-01-23T15:23:36Z",
|
||||
"pushed_at": "2020-01-16T18:08:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-12-04T15:01:00Z",
|
||||
"updated_at": "2020-01-11T20:06:52Z",
|
||||
"pushed_at": "2020-01-16T22:18:25Z",
|
||||
"pushed_at": "2020-01-23T15:48:37Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2020-01-23T14:20:15Z",
|
||||
"updated_at": "2020-01-23T18:12:16Z",
|
||||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 292,
|
||||
"watchers": 294,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2020-01-22T20:25:47Z",
|
||||
"updated_at": "2020-01-23T21:06:05Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Test a host for susceptibility to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2020-01-22T20:33:30Z",
|
||||
"updated_at": "2020-01-23T17:07:16Z",
|
||||
"pushed_at": "2020-01-15T19:46:09Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,7 +266,7 @@
|
|||
"description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-12T15:16:54Z",
|
||||
"updated_at": "2020-01-21T03:22:24Z",
|
||||
"updated_at": "2020-01-23T19:30:34Z",
|
||||
"pushed_at": "2020-01-17T22:01:20Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-13T10:09:31Z",
|
||||
"updated_at": "2020-01-22T02:00:24Z",
|
||||
"updated_at": "2020-01-23T17:10:02Z",
|
||||
"pushed_at": "2020-01-15T13:58:22Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -749,13 +749,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2020-01-23T14:57:38Z",
|
||||
"updated_at": "2020-01-23T18:49:34Z",
|
||||
"pushed_at": "2020-01-22T18:25:12Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 22,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -772,13 +772,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T23:13:00Z",
|
||||
"updated_at": "2020-01-23T13:17:54Z",
|
||||
"pushed_at": "2020-01-22T13:53:36Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"updated_at": "2020-01-23T18:49:36Z",
|
||||
"pushed_at": "2020-01-23T17:38:45Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -795,13 +795,13 @@
|
|||
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-22T13:00:18Z",
|
||||
"updated_at": "2020-01-23T14:57:23Z",
|
||||
"updated_at": "2020-01-23T20:57:19Z",
|
||||
"pushed_at": "2020-01-23T09:10:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -818,8 +818,8 @@
|
|||
"description": "[WIP] Jupyter notebook to help automate some of the forensic analysis related to Citrix Netscalers compromised via CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T04:59:51Z",
|
||||
"updated_at": "2020-01-23T05:38:54Z",
|
||||
"pushed_at": "2020-01-23T05:38:52Z",
|
||||
"updated_at": "2020-01-23T17:48:13Z",
|
||||
"pushed_at": "2020-01-23T17:48:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -849,5 +849,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235820941,
|
||||
"name": "citrixvulncheck",
|
||||
"full_name": "0xams\/citrixvulncheck",
|
||||
"owner": {
|
||||
"login": "0xams",
|
||||
"id": 50754216,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50754216?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xams"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xams\/citrixvulncheck",
|
||||
"description": "a script to look for CVE-2019-19781 Vulnerability within a domain and it's subdomains",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T15:13:04Z",
|
||||
"updated_at": "2020-01-23T15:13:23Z",
|
||||
"pushed_at": "2020-01-23T15:13:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Audit Guide for the Citrix ADC Vulnerability CVE-2019-19871. Collected from multiple sources and threat assessments. Will be updated as new methods come up.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T18:34:51Z",
|
||||
"updated_at": "2020-01-22T16:39:17Z",
|
||||
"pushed_at": "2020-01-20T21:23:36Z",
|
||||
"updated_at": "2020-01-23T20:30:34Z",
|
||||
"pushed_at": "2020-01-23T20:30:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-10-15T17:05:38Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 258,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-17T17:13:52Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-01-23T11:47:09Z",
|
||||
"updated_at": "2020-01-23T20:58:50Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"forks_count": 177,
|
||||
"forks": 177,
|
||||
"watchers": 704,
|
||||
"stargazers_count": 707,
|
||||
"watchers_count": 707,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 707,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "A PoC for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:15:32Z",
|
||||
"updated_at": "2020-01-22T21:09:09Z",
|
||||
"updated_at": "2020-01-23T20:26:53Z",
|
||||
"pushed_at": "2020-01-17T13:29:44Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 282,
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 285,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2020-01-17T16:32:39Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -289,12 +289,12 @@
|
|||
"description": "Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T15:13:37Z",
|
||||
"updated_at": "2020-01-23T03:34:32Z",
|
||||
"pushed_at": "2020-01-23T03:34:30Z",
|
||||
"updated_at": "2020-01-23T19:48:12Z",
|
||||
"pushed_at": "2020-01-23T19:48:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T16:24:20Z",
|
||||
"updated_at": "2020-01-23T12:18:57Z",
|
||||
"updated_at": "2020-01-23T15:37:23Z",
|
||||
"pushed_at": "2020-01-20T23:00:14Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 53,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-14T15:59:48Z",
|
||||
"updated_at": "2020-01-21T12:58:49Z",
|
||||
"updated_at": "2020-01-23T17:06:49Z",
|
||||
"pushed_at": "2020-01-20T10:45:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept exploit for CVE-2020-5509 | RCE in the Car Rental Project v.1.0 webapplication",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-05T22:13:24Z",
|
||||
"updated_at": "2020-01-19T04:45:14Z",
|
||||
"updated_at": "2020-01-23T15:25:48Z",
|
||||
"pushed_at": "2020-01-05T22:23:20Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -5071,6 +5071,7 @@
|
|||
- [x1sec/citrix-honeypot](https://github.com/x1sec/citrix-honeypot)
|
||||
- [L4r1k/CitrixNetscalerAnalysis](https://github.com/L4r1k/CitrixNetscalerAnalysis)
|
||||
- [Azeemering/CVE-2019-19781-DFIR-Notes](https://github.com/Azeemering/CVE-2019-19781-DFIR-Notes)
|
||||
- [0xams/citrixvulncheck](https://github.com/0xams/citrixvulncheck)
|
||||
|
||||
### CVE-2019-19844
|
||||
- [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc)
|
||||
|
|
Loading…
Reference in a new issue