Auto Update 2020/01/24 06:07:28

This commit is contained in:
motikan2010-bot 2020-01-24 06:07:28 +09:00
parent 68799f89c5
commit 3af8f89759
15 changed files with 127 additions and 103 deletions

View file

@ -59,13 +59,13 @@
"description": "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in ",
"fork": false,
"created_at": "2018-01-05T09:43:04Z",
"updated_at": "2019-10-03T11:36:51Z",
"updated_at": "2020-01-23T18:43:10Z",
"pushed_at": "2018-02-19T03:04:07Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 41,
"forks": 41,
"watchers": 79,
"watchers": 80,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-8809 Docker - RFD(Reflected File Download) for MediaWiki",
"fork": false,
"created_at": "2020-01-22T10:21:51Z",
"updated_at": "2020-01-22T12:48:17Z",
"updated_at": "2020-01-23T17:09:46Z",
"pushed_at": "2020-01-22T10:27:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2020-01-16T21:32:45Z",
"updated_at": "2020-01-23T16:16:30Z",
"pushed_at": "2020-01-15T01:27:31Z",
"stargazers_count": 461,
"watchers_count": 461,
"stargazers_count": 462,
"watchers_count": 462,
"forks_count": 117,
"forks": 117,
"watchers": 461,
"watchers": 462,
"score": 0
},
{

View file

@ -2064,8 +2064,8 @@
"pushed_at": "2019-08-19T02:52:11Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 49,
"forks": 49,
"forks_count": 50,
"forks": 50,
"watchers": 98,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-07T14:29:45Z",
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 30,
"forks": 30,
"forks_count": 31,
"forks": 31,
"watchers": 115,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2020-01-21T15:53:01Z",
"updated_at": "2020-01-23T15:37:30Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 72,
"forks": 72,
"watchers": 213,
"watchers": 214,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PhantomJS uses internal module: webpage, to open, close, render, and perform multiple actions on webpages, which suffers from an arbitrary file read vulnerability. The vulnerability exists in the page.open() function of the webpage module, which loads the specified URL and calls a given callback. When opening a HTML file, an attacker can supply specially crafted file content, which allows reading arbitrary files on the filesystem. The vulnerability is demonstrated by using page.render() as the function callback, resulting in the generation of a PDF or an image of the targeted file.",
"fork": false,
"created_at": "2020-01-16T18:07:07Z",
"updated_at": "2020-01-23T09:40:21Z",
"updated_at": "2020-01-23T15:23:36Z",
"pushed_at": "2020-01-16T18:08:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2019-12-04T15:01:00Z",
"updated_at": "2020-01-11T20:06:52Z",
"pushed_at": "2020-01-16T22:18:25Z",
"pushed_at": "2020-01-23T15:48:37Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-01-23T14:20:15Z",
"updated_at": "2020-01-23T18:12:16Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 294,
"watchers_count": 294,
"forks_count": 76,
"forks": 76,
"watchers": 292,
"watchers": 294,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-01-22T20:25:47Z",
"updated_at": "2020-01-23T21:06:05Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 443,
"watchers_count": 443,
"forks_count": 93,
"forks": 93,
"watchers": 443,
"stargazers_count": 444,
"watchers_count": 444,
"forks_count": 94,
"forks": 94,
"watchers": 444,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2020-01-22T20:33:30Z",
"updated_at": "2020-01-23T17:07:16Z",
"pushed_at": "2020-01-15T19:46:09Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 17,
"forks": 17,
"watchers": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 18,
"forks": 18,
"watchers": 85,
"score": 0
},
{
@ -266,7 +266,7 @@
"description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix",
"fork": false,
"created_at": "2020-01-12T15:16:54Z",
"updated_at": "2020-01-21T03:22:24Z",
"updated_at": "2020-01-23T19:30:34Z",
"pushed_at": "2020-01-17T22:01:20Z",
"stargazers_count": 18,
"watchers_count": 18,
@ -381,13 +381,13 @@
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
"fork": false,
"created_at": "2020-01-13T10:09:31Z",
"updated_at": "2020-01-22T02:00:24Z",
"updated_at": "2020-01-23T17:10:02Z",
"pushed_at": "2020-01-15T13:58:22Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 23,
"forks": 23,
"watchers": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 24,
"forks": 24,
"watchers": 85,
"score": 0
},
{
@ -749,13 +749,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2020-01-23T14:57:38Z",
"updated_at": "2020-01-23T18:49:34Z",
"pushed_at": "2020-01-22T18:25:12Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 2,
"forks": 2,
"watchers": 22,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 3,
"forks": 3,
"watchers": 25,
"score": 0
},
{
@ -772,13 +772,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T23:13:00Z",
"updated_at": "2020-01-23T13:17:54Z",
"pushed_at": "2020-01-22T13:53:36Z",
"stargazers_count": 15,
"watchers_count": 15,
"updated_at": "2020-01-23T18:49:36Z",
"pushed_at": "2020-01-23T17:38:45Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 2,
"forks": 2,
"watchers": 15,
"watchers": 21,
"score": 0
},
{
@ -795,13 +795,13 @@
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts",
"fork": false,
"created_at": "2020-01-22T13:00:18Z",
"updated_at": "2020-01-23T14:57:23Z",
"updated_at": "2020-01-23T20:57:19Z",
"pushed_at": "2020-01-23T09:10:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
},
{
@ -818,8 +818,8 @@
"description": "[WIP] Jupyter notebook to help automate some of the forensic analysis related to Citrix Netscalers compromised via CVE-2019-19781",
"fork": false,
"created_at": "2020-01-23T04:59:51Z",
"updated_at": "2020-01-23T05:38:54Z",
"pushed_at": "2020-01-23T05:38:52Z",
"updated_at": "2020-01-23T17:48:13Z",
"pushed_at": "2020-01-23T17:48:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -849,5 +849,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 235820941,
"name": "citrixvulncheck",
"full_name": "0xams\/citrixvulncheck",
"owner": {
"login": "0xams",
"id": 50754216,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50754216?v=4",
"html_url": "https:\/\/github.com\/0xams"
},
"html_url": "https:\/\/github.com\/0xams\/citrixvulncheck",
"description": "a script to look for CVE-2019-19781 Vulnerability within a domain and it's subdomains",
"fork": false,
"created_at": "2020-01-23T15:13:04Z",
"updated_at": "2020-01-23T15:13:23Z",
"pushed_at": "2020-01-23T15:13:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Audit Guide for the Citrix ADC Vulnerability CVE-2019-19871. Collected from multiple sources and threat assessments. Will be updated as new methods come up.",
"fork": false,
"created_at": "2020-01-20T18:34:51Z",
"updated_at": "2020-01-22T16:39:17Z",
"pushed_at": "2020-01-20T21:23:36Z",
"updated_at": "2020-01-23T20:30:34Z",
"pushed_at": "2020-01-23T20:30:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-10-15T17:05:38Z",
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 46,
"forks": 46,
"forks_count": 47,
"forks": 47,
"watchers": 258,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-17T17:13:52Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 33,
"score": 0
},
@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-01-23T11:47:09Z",
"updated_at": "2020-01-23T20:58:50Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 704,
"watchers_count": 704,
"forks_count": 177,
"forks": 177,
"watchers": 704,
"stargazers_count": 707,
"watchers_count": 707,
"forks_count": 179,
"forks": 179,
"watchers": 707,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-01-22T21:09:09Z",
"updated_at": "2020-01-23T20:26:53Z",
"pushed_at": "2020-01-17T13:29:44Z",
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 67,
"forks": 67,
"watchers": 282,
"stargazers_count": 285,
"watchers_count": 285,
"forks_count": 68,
"forks": 68,
"watchers": 285,
"score": 0
},
{
@ -247,8 +247,8 @@
"pushed_at": "2020-01-17T16:32:39Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 41,
"score": 0
},
@ -289,12 +289,12 @@
"description": "Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909",
"fork": false,
"created_at": "2020-01-17T15:13:37Z",
"updated_at": "2020-01-23T03:34:32Z",
"pushed_at": "2020-01-23T03:34:30Z",
"updated_at": "2020-01-23T19:48:12Z",
"pushed_at": "2020-01-23T19:48:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
@ -450,13 +450,13 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2020-01-23T12:18:57Z",
"updated_at": "2020-01-23T15:37:23Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 6,
"forks": 6,
"watchers": 53,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 7,
"forks": 7,
"watchers": 55,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-01-14T15:59:48Z",
"updated_at": "2020-01-21T12:58:49Z",
"updated_at": "2020-01-23T17:06:49Z",
"pushed_at": "2020-01-20T10:45:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept exploit for CVE-2020-5509 | RCE in the Car Rental Project v.1.0 webapplication",
"fork": false,
"created_at": "2020-01-05T22:13:24Z",
"updated_at": "2020-01-19T04:45:14Z",
"updated_at": "2020-01-23T15:25:48Z",
"pushed_at": "2020-01-05T22:23:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -5071,6 +5071,7 @@
- [x1sec/citrix-honeypot](https://github.com/x1sec/citrix-honeypot)
- [L4r1k/CitrixNetscalerAnalysis](https://github.com/L4r1k/CitrixNetscalerAnalysis)
- [Azeemering/CVE-2019-19781-DFIR-Notes](https://github.com/Azeemering/CVE-2019-19781-DFIR-Notes)
- [0xams/citrixvulncheck](https://github.com/0xams/citrixvulncheck)
### CVE-2019-19844
- [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc)