Auto Update 2020/01/23 00:07:37

This commit is contained in:
motikan2010-bot 2020-01-23 00:07:37 +09:00
parent fa22427284
commit bdcf034c12
17 changed files with 225 additions and 69 deletions

View file

@ -13,13 +13,13 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2019-12-29T08:33:47Z",
"updated_at": "2020-01-22T13:51:06Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 648,
"watchers_count": 648,
"stargazers_count": 649,
"watchers_count": 649,
"forks_count": 168,
"forks": 168,
"watchers": 648,
"watchers": 649,
"score": 0
},
{

25
2017/CVE-2017-8809.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 235548506,
"name": "CVE-2017-8809_MediaWiki_RFD",
"full_name": "motikan2010\/CVE-2017-8809_MediaWiki_RFD",
"owner": {
"login": "motikan2010",
"id": 3177297,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3177297?v=4",
"html_url": "https:\/\/github.com\/motikan2010"
},
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2017-8809_MediaWiki_RFD",
"description": "CVE-2017-8809 Docker - RFD(Reflected File Download) for MediaWiki",
"fork": false,
"created_at": "2020-01-22T10:21:51Z",
"updated_at": "2020-01-22T12:48:17Z",
"pushed_at": "2020-01-22T10:27:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-6389 Exploit In WordPress DoS ",
"fork": false,
"created_at": "2018-02-06T15:16:03Z",
"updated_at": "2019-12-31T08:33:32Z",
"updated_at": "2020-01-22T14:49:33Z",
"pushed_at": "2018-02-06T15:36:29Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 28,
"forks": 28,
"watchers": 68,
"watchers": 69,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
"updated_at": "2019-12-23T18:51:44Z",
"updated_at": "2020-01-22T12:29:41Z",
"pushed_at": "2019-05-05T15:49:44Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 39,
"forks": 39,
"watchers": 67,
"watchers": 68,
"score": 0
},
{

View file

@ -1650,8 +1650,8 @@
"pushed_at": "2019-07-20T04:48:43Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 113,
"forks": 113,
"forks_count": 114,
"forks": 114,
"watchers": 313,
"score": 0
},
@ -2018,8 +2018,8 @@
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 261,
"watchers_count": 261,
"forks_count": 82,
"forks": 82,
"forks_count": 83,
"forks": 83,
"watchers": 261,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 65,
"forks": 65,
"forks_count": 66,
"forks": 66,
"watchers": 240,
"score": 0
},

View file

@ -59,7 +59,7 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2020-01-13T15:14:17Z",
"updated_at": "2020-01-22T13:14:37Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 95,
"watchers_count": 95,

View file

@ -13,13 +13,13 @@
"description": "Exp of cve-2019-12272",
"fork": false,
"created_at": "2019-07-04T04:54:36Z",
"updated_at": "2020-01-21T15:57:40Z",
"updated_at": "2020-01-22T09:22:35Z",
"pushed_at": "2019-07-10T04:33:30Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": ":unlock: transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)",
"fork": false,
"created_at": "2019-08-05T15:45:02Z",
"updated_at": "2019-10-03T08:35:01Z",
"updated_at": "2020-01-22T09:47:57Z",
"pushed_at": "2019-08-07T13:06:15Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"forks": 4,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

25
2019/CVE-2019-16784.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 235578521,
"name": "PyInstallerPrivEsc",
"full_name": "AlterSolutions\/PyInstallerPrivEsc",
"owner": {
"login": "AlterSolutions",
"id": 42841703,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/42841703?v=4",
"html_url": "https:\/\/github.com\/AlterSolutions"
},
"html_url": "https:\/\/github.com\/AlterSolutions\/PyInstallerPrivEsc",
"description": "Exploit for PyInstaller CVE-2019-16784",
"fork": false,
"created_at": "2020-01-22T13:23:45Z",
"updated_at": "2020-01-22T13:25:02Z",
"pushed_at": "2020-01-22T13:25:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-01-22T06:56:52Z",
"updated_at": "2020-01-22T11:45:13Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 75,
"forks": 75,
"watchers": 285,
"watchers": 287,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-01-21T14:19:41Z",
"updated_at": "2020-01-22T11:20:49Z",
"pushed_at": "2020-01-16T16:23:50Z",
"stargazers_count": 441,
"watchers_count": 441,
"stargazers_count": 442,
"watchers_count": 442,
"forks_count": 94,
"forks": 94,
"watchers": 441,
"watchers": 442,
"score": 0
},
{
@ -151,8 +151,8 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-01-22T08:08:27Z",
"pushed_at": "2020-01-13T18:54:57Z",
"updated_at": "2020-01-22T14:17:35Z",
"pushed_at": "2020-01-22T14:17:33Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 12,
@ -309,10 +309,10 @@
"html_url": "https:\/\/github.com\/x1sec"
},
"html_url": "https:\/\/github.com\/x1sec\/CVE-2019-19781",
"description": "DFIR notes for Citrix Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
"description": "DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-12T23:13:56Z",
"updated_at": "2020-01-20T20:11:09Z",
"updated_at": "2020-01-22T12:59:13Z",
"pushed_at": "2020-01-20T11:01:46Z",
"stargazers_count": 21,
"watchers_count": 21,
@ -734,5 +734,74 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 235373247,
"name": "ioc-scanner-CVE-2019-19781",
"full_name": "fireeye\/ioc-scanner-CVE-2019-19781",
"owner": {
"login": "fireeye",
"id": 4984788,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4984788?v=4",
"html_url": "https:\/\/github.com\/fireeye"
},
"html_url": "https:\/\/github.com\/fireeye\/ioc-scanner-CVE-2019-19781",
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2020-01-22T14:50:40Z",
"pushed_at": "2020-01-22T12:54:38Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
},
{
"id": 235459837,
"name": "ioc-scanner-CVE-2019-19781",
"full_name": "citrix\/ioc-scanner-CVE-2019-19781",
"owner": {
"login": "citrix",
"id": 1635391,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1635391?v=4",
"html_url": "https:\/\/github.com\/citrix"
},
"html_url": "https:\/\/github.com\/citrix\/ioc-scanner-CVE-2019-19781",
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T23:13:00Z",
"updated_at": "2020-01-22T15:03:44Z",
"pushed_at": "2020-01-22T13:53:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 235574304,
"name": "citrix-honeypot",
"full_name": "x1sec\/citrix-honeypot",
"owner": {
"login": "x1sec",
"id": 11153104,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11153104?v=4",
"html_url": "https:\/\/github.com\/x1sec"
},
"html_url": "https:\/\/github.com\/x1sec\/citrix-honeypot",
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-22T13:00:18Z",
"updated_at": "2020-01-22T13:00:22Z",
"pushed_at": "2020-01-22T13:00:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)",
"fork": false,
"created_at": "2020-01-14T12:20:18Z",
"updated_at": "2020-01-21T19:50:08Z",
"updated_at": "2020-01-22T14:03:32Z",
"pushed_at": "2020-01-17T10:10:31Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 12,
"forks": 12,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-01-15T12:18:55Z",
"updated_at": "2020-01-22T09:31:18Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 291,
"watchers_count": 291,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 126,
"forks": 126,
"watchers": 291,
"watchers": 292,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-01-22T07:17:13Z",
"updated_at": "2020-01-22T14:44:54Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 695,
"watchers_count": 695,
"stargazers_count": 699,
"watchers_count": 699,
"forks_count": 175,
"forks": 175,
"watchers": 695,
"watchers": 699,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-01-21T22:06:09Z",
"updated_at": "2020-01-22T09:33:30Z",
"pushed_at": "2020-01-17T13:29:44Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 67,
"forks": 67,
"watchers": 276,
"watchers": 277,
"score": 0
},
{
@ -450,13 +450,13 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2020-01-22T09:06:03Z",
"updated_at": "2020-01-22T14:22:28Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 5,
"forks": 5,
"watchers": 47,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 6,
"forks": 6,
"watchers": 50,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false,
"created_at": "2020-01-21T21:33:17Z",
"updated_at": "2020-01-22T03:28:42Z",
"updated_at": "2020-01-22T09:25:20Z",
"pushed_at": "2020-01-21T21:39:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

25
2020/CVE-2020-1611.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 235582404,
"name": "CVE-2020-1611",
"full_name": "Ibonok\/CVE-2020-1611",
"owner": {
"login": "Ibonok",
"id": 37837775,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37837775?v=4",
"html_url": "https:\/\/github.com\/Ibonok"
},
"html_url": "https:\/\/github.com\/Ibonok\/CVE-2020-1611",
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
"fork": false,
"created_at": "2020-01-22T13:45:21Z",
"updated_at": "2020-01-22T14:01:34Z",
"pushed_at": "2020-01-22T14:01:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-18T07:08:06Z",
"updated_at": "2020-01-22T08:23:05Z",
"updated_at": "2020-01-22T11:34:42Z",
"pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 4,
"forks": 4,
"watchers": 26,
"watchers": 27,
"score": 0
},
{

View file

@ -2675,6 +2675,9 @@
### CVE-2017-8802
- [ozzi-/Zimbra-CVE-2017-8802-Hotifx](https://github.com/ozzi-/Zimbra-CVE-2017-8802-Hotifx)
### CVE-2017-8809
- [motikan2010/CVE-2017-8809_MediaWiki_RFD](https://github.com/motikan2010/CVE-2017-8809_MediaWiki_RFD)
### CVE-2017-8890
- [beraphin/CVE-2017-8890](https://github.com/beraphin/CVE-2017-8890)
- [thinkycx/CVE-2017-8890](https://github.com/thinkycx/CVE-2017-8890)
@ -4882,6 +4885,9 @@
- [FarjaalAhmad/CVE-2019-16759](https://github.com/FarjaalAhmad/CVE-2019-16759)
- [andripwn/pwn-vbulletin](https://github.com/andripwn/pwn-vbulletin)
### CVE-2019-16784
- [AlterSolutions/PyInstallerPrivEsc](https://github.com/AlterSolutions/PyInstallerPrivEsc)
### CVE-2019-16889
- [grampae/meep](https://github.com/grampae/meep)
@ -5060,6 +5066,9 @@
- [DIVD-NL/Citrix-CVE-2019-19781](https://github.com/DIVD-NL/Citrix-CVE-2019-19781)
- [ynsmroztas/citrix.sh](https://github.com/ynsmroztas/citrix.sh)
- [c4pt41nnn/massCitrix](https://github.com/c4pt41nnn/massCitrix)
- [fireeye/ioc-scanner-CVE-2019-19781](https://github.com/fireeye/ioc-scanner-CVE-2019-19781)
- [citrix/ioc-scanner-CVE-2019-19781](https://github.com/citrix/ioc-scanner-CVE-2019-19781)
- [x1sec/citrix-honeypot](https://github.com/x1sec/citrix-honeypot)
### CVE-2019-19844
- [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc)
@ -5483,6 +5492,9 @@
### CVE-2020-0609
- [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609)
### CVE-2020-1611
- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611)
### CVE-2020-2551
- [jas502n/CVE-2020-2551](https://github.com/jas502n/CVE-2020-2551)
- [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551)