Auto Update 2020/01/25 00:08:26

This commit is contained in:
motikan2010-bot 2020-01-25 00:08:26 +09:00
parent 1baff1a353
commit 9830c90071
15 changed files with 145 additions and 93 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-3153 aka towelroot",
"fork": false,
"created_at": "2014-07-24T13:28:00Z",
"updated_at": "2019-10-16T04:37:52Z",
"updated_at": "2020-01-24T13:53:15Z",
"pushed_at": "2017-04-25T07:24:08Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 79,
"forks": 79,
"watchers": 118,
"watchers": 117,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86",
"fork": false,
"created_at": "2014-09-20T08:24:15Z",
"updated_at": "2019-10-24T22:20:19Z",
"updated_at": "2020-01-24T13:53:14Z",
"pushed_at": "2014-10-25T10:45:32Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 21,
"forks": 21,
"watchers": 42,
"watchers": 41,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright stsc MP4 Atom Integer Overflow Remote Code Execution",
"fork": false,
"created_at": "2015-09-10T23:00:59Z",
"updated_at": "2019-12-31T17:36:29Z",
"updated_at": "2020-01-24T13:53:18Z",
"pushed_at": "2015-09-10T23:01:09Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 115,
"forks": 115,
"watchers": 191,
"watchers": 190,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
"updated_at": "2020-01-21T15:51:06Z",
"updated_at": "2020-01-24T13:52:35Z",
"pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 327,
"watchers_count": 327,
"stargazers_count": 326,
"watchers_count": 326,
"forks_count": 148,
"forks": 148,
"watchers": 327,
"watchers": 326,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2016-05-08T06:22:07Z",
"updated_at": "2019-11-20T17:22:28Z",
"updated_at": "2020-01-24T13:51:35Z",
"pushed_at": "2016-05-10T22:41:12Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 16,
"forks": 16,
"watchers": 40,
"watchers": 39,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept code for CVE-2016-5696",
"fork": false,
"created_at": "2016-08-21T00:17:20Z",
"updated_at": "2019-08-17T12:54:19Z",
"updated_at": "2020-01-24T13:52:13Z",
"pushed_at": "2016-08-24T07:56:39Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 38,
"forks": 38,
"watchers": 102,
"watchers": 101,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2018-07-02T02:21:28Z",
"updated_at": "2019-10-29T07:45:22Z",
"updated_at": "2020-01-24T10:54:57Z",
"pushed_at": "2019-05-09T07:07:25Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 10,
"forks": 10,
"watchers": 18,
"watchers": 20,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)",
"fork": false,
"created_at": "2018-02-28T14:45:06Z",
"updated_at": "2020-01-24T00:24:55Z",
"updated_at": "2020-01-24T14:03:01Z",
"pushed_at": "2018-05-08T10:59:23Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 23,
"forks": 23,
"watchers": 77,
"watchers": 76,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2020-01-14T14:33:31Z",
"updated_at": "2020-01-24T14:23:21Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 51,
"forks": 51,
"watchers": 184,
"watchers": 185,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 158,
"watchers_count": 158,
"forks_count": 73,
"forks": 73,
"forks_count": 74,
"forks": 74,
"watchers": 158,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exploit and Mass Pwn3r for CVE-2019-16920",
"fork": false,
"created_at": "2019-10-15T17:54:03Z",
"updated_at": "2019-12-21T17:31:58Z",
"updated_at": "2020-01-24T14:23:43Z",
"pushed_at": "2019-12-21T17:31:56Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 12,
"forks": 12,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 235991076,
"name": "xmlrpc-common-deserialization",
"full_name": "orangecertcc\/xmlrpc-common-deserialization",
"owner": {
"login": "orangecertcc",
"id": 48210684,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48210684?v=4",
"html_url": "https:\/\/github.com\/orangecertcc"
},
"html_url": "https:\/\/github.com\/orangecertcc\/xmlrpc-common-deserialization",
"description": "CVE-2019-17570 details and proof of concept",
"fork": false,
"created_at": "2020-01-24T11:32:18Z",
"updated_at": "2020-01-24T11:52:17Z",
"pushed_at": "2020-01-24T11:52:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-01-23T18:12:16Z",
"updated_at": "2020-01-24T13:05:13Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 294,
"watchers_count": 294,
"stargazers_count": 295,
"watchers_count": 295,
"forks_count": 76,
"forks": 76,
"watchers": 294,
"watchers": 295,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-01-23T21:06:05Z",
"updated_at": "2020-01-24T14:44:41Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 444,
"watchers_count": 444,
"stargazers_count": 445,
"watchers_count": 445,
"forks_count": 94,
"forks": 94,
"watchers": 444,
"watchers": 445,
"score": 0
},
{
@ -312,13 +312,13 @@
"description": "DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-12T23:13:56Z",
"updated_at": "2020-01-24T07:31:27Z",
"updated_at": "2020-01-24T10:02:47Z",
"pushed_at": "2020-01-23T05:55:58Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 8,
"forks": 8,
"watchers": 25,
"watchers": 26,
"score": 0
},
{
@ -726,13 +726,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2020-01-24T05:33:53Z",
"updated_at": "2020-01-24T09:14:15Z",
"pushed_at": "2020-01-24T05:33:51Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 4,
"forks": 4,
"watchers": 27,
"watchers": 28,
"score": 0
},
{
@ -749,13 +749,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T23:13:00Z",
"updated_at": "2020-01-24T07:52:13Z",
"updated_at": "2020-01-24T14:52:54Z",
"pushed_at": "2020-01-23T17:38:45Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 2,
"forks": 2,
"watchers": 25,
"watchers": 27,
"score": 0
},
{
@ -818,8 +818,8 @@
"description": "My Citrix ADC NetScaler CVE-2019-19781 Vulnerability DFIR notes. ",
"fork": false,
"created_at": "2020-01-23T08:41:51Z",
"updated_at": "2020-01-23T14:45:30Z",
"pushed_at": "2020-01-23T14:45:27Z",
"updated_at": "2020-01-24T10:45:10Z",
"pushed_at": "2020-01-24T10:45:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -841,8 +841,8 @@
"description": "a script to look for CVE-2019-19781 Vulnerability within a domain and it's subdomains",
"fork": false,
"created_at": "2020-01-23T15:13:04Z",
"updated_at": "2020-01-23T15:13:23Z",
"pushed_at": "2020-01-23T15:13:21Z",
"updated_at": "2020-01-24T14:55:55Z",
"pushed_at": "2020-01-24T14:55:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-01-24T06:07:33Z",
"updated_at": "2020-01-24T13:35:03Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 712,
"watchers_count": 712,
"forks_count": 179,
"forks": 179,
"watchers": 709,
"watchers": 712,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-01-23T20:26:53Z",
"updated_at": "2020-01-24T13:35:47Z",
"pushed_at": "2020-01-17T13:29:44Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"forks_count": 68,
"forks": 68,
"watchers": 285,
"watchers": 286,
"score": 0
},
{
@ -289,8 +289,8 @@
"description": "Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909",
"fork": false,
"created_at": "2020-01-17T15:13:37Z",
"updated_at": "2020-01-23T19:48:12Z",
"pushed_at": "2020-01-23T19:48:10Z",
"updated_at": "2020-01-24T14:23:49Z",
"pushed_at": "2020-01-24T14:23:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
@ -450,13 +450,13 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2020-01-24T01:02:42Z",
"updated_at": "2020-01-24T10:47:04Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 7,
"forks": 7,
"watchers": 56,
"watchers": 57,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC (DoS) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-01-24T09:02:46Z",
"pushed_at": "2020-01-23T22:58:01Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 6,
"forks": 6,
"watchers": 20,
"updated_at": "2020-01-24T14:09:04Z",
"pushed_at": "2020-01-24T14:00:39Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 9,
"forks": 9,
"watchers": 48,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
"fork": false,
"created_at": "2020-01-24T03:52:49Z",
"updated_at": "2020-01-24T08:15:51Z",
"updated_at": "2020-01-24T14:53:36Z",
"pushed_at": "2020-01-24T08:10:04Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks": 3,
"watchers": 9,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 4,
"forks": 4,
"watchers": 20,
"score": 0
}
]

25
2020/CVE-2020-609.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 236021531,
"name": "CVE-2020-609-POC",
"full_name": "Bechsen\/CVE-2020-609-POC",
"owner": {
"login": "Bechsen",
"id": 6298298,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6298298?v=4",
"html_url": "https:\/\/github.com\/Bechsen"
},
"html_url": "https:\/\/github.com\/Bechsen\/CVE-2020-609-POC",
"description": null,
"fork": false,
"created_at": "2020-01-24T14:51:34Z",
"updated_at": "2020-01-24T14:51:38Z",
"pushed_at": "2020-01-24T14:51:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -4923,6 +4923,7 @@
### CVE-2019-17570
- [r00t4dm/CVE-2019-17570](https://github.com/r00t4dm/CVE-2019-17570)
- [orangecertcc/xmlrpc-common-deserialization](https://github.com/orangecertcc/xmlrpc-common-deserialization)
### CVE-2019-17571
- [shadow-horse/CVE-2019-17571](https://github.com/shadow-horse/CVE-2019-17571)
@ -5515,6 +5516,9 @@
### CVE-2020-5509
- [FULLSHADE/CVE-2020-5509-POC](https://github.com/FULLSHADE/CVE-2020-5509-POC)
### CVE-2020-609
- [Bechsen/CVE-2020-609-POC](https://github.com/Bechsen/CVE-2020-609-POC)
### CVE-2020-6172
- [Jeff-Rowell/CVE-2020-6172](https://github.com/Jeff-Rowell/CVE-2020-6172)