diff --git a/2010/CVE-2010-0738.json b/2010/CVE-2010-0738.json index 29098651e6..e7da22b3b6 100644 --- a/2010/CVE-2010-0738.json +++ b/2010/CVE-2010-0738.json @@ -1,27 +1,4 @@ [ - { - "id": 29914821, - "name": "jboss-autopwn", - "full_name": "ChristianPapathanasiou\/jboss-autopwn", - "owner": { - "login": "ChristianPapathanasiou", - "id": 5354349, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5354349?v=4", - "html_url": "https:\/\/github.com\/ChristianPapathanasiou" - }, - "html_url": "https:\/\/github.com\/ChristianPapathanasiou\/jboss-autopwn", - "description": "JBoss Autopwn as featured at BlackHat Europe 2010 - this version incorporates CVE-2010-0738 the JBoss authentication bypass VERB manipulation vulnerability as discovered by Minded Security", - "fork": false, - "created_at": "2015-01-27T13:16:45Z", - "updated_at": "2020-01-13T09:44:30Z", - "pushed_at": "2015-01-27T13:23:18Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 7, - "forks": 7, - "watchers": 11, - "score": 0 - }, { "id": 62456741, "name": "jboss-autopwn", diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 7dbe87cde6..fb9fd98851 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -13,13 +13,13 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2020-02-16T09:48:12Z", + "updated_at": "2020-02-26T20:35:52Z", "pushed_at": "2016-05-07T19:35:14Z", - "stargazers_count": 2238, - "watchers_count": 2238, - "forks_count": 484, - "forks": 484, - "watchers": 2238, + "stargazers_count": 2239, + "watchers_count": 2239, + "forks_count": 485, + "forks": 485, + "watchers": 2239, "score": 0 }, { diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 0a6fe8d92f..f24d02485e 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-26T13:26:56Z", + "updated_at": "2020-02-26T20:33:13Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 233, - "watchers_count": 233, - "forks_count": 41, - "forks": 41, - "watchers": 233, + "stargazers_count": 235, + "watchers_count": 235, + "forks_count": 42, + "forks": 42, + "watchers": 235, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 8423132f63..d93d8ab912 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-26T13:26:56Z", + "updated_at": "2020-02-26T20:33:13Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 233, - "watchers_count": 233, - "forks_count": 41, - "forks": 41, - "watchers": 233, + "stargazers_count": 235, + "watchers_count": 235, + "forks_count": 42, + "forks": 42, + "watchers": 235, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index ff36b1fe24..fc453fa53b 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -63,8 +63,8 @@ "pushed_at": "2017-11-19T11:01:16Z", "stargazers_count": 613, "watchers_count": 613, - "forks_count": 273, - "forks": 273, + "forks_count": 274, + "forks": 274, "watchers": 613, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 6980147661..1747afccec 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-26T13:26:56Z", + "updated_at": "2020-02-26T20:33:13Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 233, - "watchers_count": 233, - "forks_count": 41, - "forks": 41, - "watchers": 233, + "stargazers_count": 235, + "watchers_count": 235, + "forks_count": 42, + "forks": 42, + "watchers": 235, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index 2b0be2a6ff..6ac84b442b 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -17,8 +17,8 @@ "pushed_at": "2018-01-10T01:14:44Z", "stargazers_count": 653, "watchers_count": 653, - "forks_count": 171, - "forks": 171, + "forks_count": 172, + "forks": 172, "watchers": 653, "score": 0 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 577507a8c9..6145d6e49f 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-26T13:26:56Z", + "updated_at": "2020-02-26T20:33:13Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 233, - "watchers_count": 233, - "forks_count": 41, - "forks": 41, - "watchers": 233, + "stargazers_count": 235, + "watchers_count": 235, + "forks_count": 42, + "forks": 42, + "watchers": 235, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json index 29bc9f3609..4aa3239226 100644 --- a/2018/CVE-2018-8174.json +++ b/2018/CVE-2018-8174.json @@ -36,13 +36,13 @@ "description": "CVE-2018-8174_python", "fork": false, "created_at": "2018-05-30T03:12:32Z", - "updated_at": "2020-02-06T06:52:26Z", + "updated_at": "2020-02-26T16:25:14Z", "pushed_at": "2018-05-30T03:33:14Z", - "stargazers_count": 120, - "watchers_count": 120, + "stargazers_count": 121, + "watchers_count": 121, "forks_count": 50, "forks": 50, - "watchers": 120, + "watchers": 121, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)", "fork": false, "created_at": "2019-05-23T10:28:40Z", - "updated_at": "2019-11-09T17:32:18Z", + "updated_at": "2020-02-26T16:27:43Z", "pushed_at": "2019-05-23T11:26:38Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 3, "forks": 3, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0192.json b/2019/CVE-2019-0192.json index 66925d89cb..817275a759 100644 --- a/2019/CVE-2019-0192.json +++ b/2019/CVE-2019-0192.json @@ -17,8 +17,8 @@ "pushed_at": "2019-03-10T18:33:43Z", "stargazers_count": 197, "watchers_count": 197, - "forks_count": 55, - "forks": 55, + "forks_count": 56, + "forks": 56, "watchers": 197, "score": 0 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index c5af42dbf3..193ac9dac7 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -316,8 +316,8 @@ "pushed_at": "2019-06-13T13:07:03Z", "stargazers_count": 285, "watchers_count": 285, - "forks_count": 172, - "forks": 172, + "forks_count": 173, + "forks": 173, "watchers": 285, "score": 0 }, @@ -1140,13 +1140,13 @@ "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", - "updated_at": "2020-02-24T18:16:09Z", + "updated_at": "2020-02-26T20:32:37Z", "pushed_at": "2019-10-01T12:23:59Z", - "stargazers_count": 1083, - "watchers_count": 1083, - "forks_count": 361, - "forks": 361, - "watchers": 1083, + "stargazers_count": 1084, + "watchers_count": 1084, + "forks_count": 362, + "forks": 362, + "watchers": 1084, "score": 0 }, { @@ -1558,8 +1558,8 @@ "pushed_at": "2019-09-03T20:50:28Z", "stargazers_count": 1006, "watchers_count": 1006, - "forks_count": 347, - "forks": 347, + "forks_count": 348, + "forks": 348, "watchers": 1006, "score": 0 }, diff --git a/2019/CVE-2019-0768.json b/2019/CVE-2019-0768.json index 760ad7b19f..19e11d2d41 100644 --- a/2019/CVE-2019-0768.json +++ b/2019/CVE-2019-0768.json @@ -13,13 +13,13 @@ "description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)", "fork": false, "created_at": "2019-05-23T10:28:40Z", - "updated_at": "2019-11-09T17:32:18Z", + "updated_at": "2020-02-26T16:27:43Z", "pushed_at": "2019-05-23T11:26:38Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 3, "forks": 3, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index b44d14c27e..a85422f0ab 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -197,13 +197,13 @@ "description": "(PoC) Python version of CVE-2019-11043 exploit by neex", "fork": false, "created_at": "2019-10-28T11:09:06Z", - "updated_at": "2020-01-27T10:24:04Z", + "updated_at": "2020-02-26T15:39:26Z", "pushed_at": "2019-10-29T15:47:02Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "forks_count": 22, "forks": 22, - "watchers": 115, + "watchers": 116, "score": 0 }, { diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index fd7d69f178..d738b6baf7 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -59,13 +59,13 @@ "description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif", "fork": false, "created_at": "2019-10-04T14:43:57Z", - "updated_at": "2020-02-26T07:46:59Z", + "updated_at": "2020-02-26T15:21:59Z", "pushed_at": "2019-11-30T10:28:01Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "forks_count": 51, "forks": 51, - "watchers": 108, + "watchers": 109, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index aff3e837fa..b974d22064 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -36,12 +36,12 @@ "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]", "fork": false, "created_at": "2020-01-10T22:56:35Z", - "updated_at": "2020-02-24T01:29:49Z", + "updated_at": "2020-02-26T19:00:25Z", "pushed_at": "2020-01-18T07:01:29Z", "stargazers_count": 313, "watchers_count": 313, - "forks_count": 85, - "forks": 85, + "forks_count": 86, + "forks": 86, "watchers": 313, "score": 0 }, @@ -358,13 +358,13 @@ "description": "Automated script for Citrix ADC scanner (CVE-2019-19781) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.", "fork": false, "created_at": "2020-01-13T07:42:27Z", - "updated_at": "2020-01-15T10:38:33Z", + "updated_at": "2020-02-26T19:27:56Z", "pushed_at": "2020-01-14T15:53:14Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 2, "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 162d27d27d..a877051770 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-02-26T13:26:56Z", + "updated_at": "2020-02-26T20:33:13Z", "pushed_at": "2020-02-15T14:24:04Z", - "stargazers_count": 233, - "watchers_count": 233, - "forks_count": 41, - "forks": 41, - "watchers": 233, + "stargazers_count": 235, + "watchers_count": 235, + "forks_count": 42, + "forks": 42, + "watchers": 235, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index d6011ca8cd..ad5f3bac3b 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -688,5 +688,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 243353551, + "name": "meetup-2-curveball", + "full_name": "bsides-rijeka\/meetup-2-curveball", + "owner": { + "login": "bsides-rijeka", + "id": 61519397, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/61519397?v=4", + "html_url": "https:\/\/github.com\/bsides-rijeka" + }, + "html_url": "https:\/\/github.com\/bsides-rijeka\/meetup-2-curveball", + "description": "Materials for the second Rijeka secuity meetup. We will be discussing Microsoft cryptoapi vulnerability dubbed CurveBall (CVE-2020-0601)", + "fork": false, + "created_at": "2020-02-26T19:59:25Z", + "updated_at": "2020-02-26T19:59:25Z", + "pushed_at": "2020-02-26T19:59:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json index 6383adb4a1..d92b9b42c6 100644 --- a/2020/CVE-2020-0668.json +++ b/2020/CVE-2020-0668.json @@ -13,13 +13,13 @@ "description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability", "fork": false, "created_at": "2019-10-11T09:08:02Z", - "updated_at": "2020-02-26T12:19:10Z", + "updated_at": "2020-02-26T15:21:39Z", "pushed_at": "2020-02-26T09:24:45Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "fork": false, "created_at": "2020-02-20T06:22:40Z", - "updated_at": "2020-02-26T14:51:41Z", + "updated_at": "2020-02-26T16:09:53Z", "pushed_at": "2020-02-20T11:03:18Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "forks_count": 17, "forks": 17, - "watchers": 114, + "watchers": 115, "score": 0 }, { diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index d349c5f848..996b0dee02 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -13,13 +13,13 @@ "description": "cve-2020-0688", "fork": false, "created_at": "2020-02-25T23:44:16Z", - "updated_at": "2020-02-26T14:50:51Z", + "updated_at": "2020-02-26T19:50:49Z", "pushed_at": "2020-02-26T00:58:39Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 78, + "watchers_count": 78, "forks_count": 19, "forks": 19, - "watchers": 68, + "watchers": 78, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "CVE-2020-0688 - Exchange", "fork": false, "created_at": "2020-02-26T12:28:11Z", - "updated_at": "2020-02-26T14:06:56Z", + "updated_at": "2020-02-26T16:28:44Z", "pushed_at": "2020-02-26T12:41:37Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 2, "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index dec7385245..194cbc7392 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -105,13 +105,13 @@ "description": "CVE-2020-1938漏洞复现", "fork": false, "created_at": "2020-02-21T02:36:37Z", - "updated_at": "2020-02-25T18:52:03Z", + "updated_at": "2020-02-26T15:14:20Z", "pushed_at": "2020-02-21T02:49:57Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 }, { @@ -335,8 +335,8 @@ "description": "Learnings on how to verify if vulnerable to Ghostcat (aka CVE-2020-1938)", "fork": false, "created_at": "2020-02-26T14:40:12Z", - "updated_at": "2020-02-26T14:41:37Z", - "pushed_at": "2020-02-26T14:41:35Z", + "updated_at": "2020-02-26T15:34:00Z", + "pushed_at": "2020-02-26T15:33:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-8813.json b/2020/CVE-2020-8813.json index 4cbfeb8012..56600f73ea 100644 --- a/2020/CVE-2020-8813.json +++ b/2020/CVE-2020-8813.json @@ -13,13 +13,13 @@ "description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813", "fork": false, "created_at": "2020-02-22T16:27:41Z", - "updated_at": "2020-02-26T13:37:56Z", + "updated_at": "2020-02-26T17:16:44Z", "pushed_at": "2020-02-22T16:33:31Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "forks_count": 10, "forks": 10, - "watchers": 51, + "watchers": 52, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 2ba766688e..7639637994 100644 --- a/README.md +++ b/README.md @@ -46,6 +46,7 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid - [eastmountyxz/CVE-2020-0601-EXP](https://github.com/eastmountyxz/CVE-2020-0601-EXP) - [eastmountyxz/CVE-2018-20250-WinRAR](https://github.com/eastmountyxz/CVE-2018-20250-WinRAR) - [gremwell/cve-2020-0601_poc](https://github.com/gremwell/cve-2020-0601_poc) +- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball) ### CVE-2020-0609 @@ -11707,7 +11708,6 @@ sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is en The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method. -- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn) - [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn) ### CVE-2010-1205