diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index 2f214e7c90..c51dd8e379 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -13,13 +13,13 @@ "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", "fork": false, "created_at": "2018-01-04T00:28:50Z", - "updated_at": "2019-12-29T08:33:47Z", + "updated_at": "2020-01-22T13:51:06Z", "pushed_at": "2018-01-10T01:14:44Z", - "stargazers_count": 648, - "watchers_count": 648, + "stargazers_count": 649, + "watchers_count": 649, "forks_count": 168, "forks": 168, - "watchers": 648, + "watchers": 649, "score": 0 }, { diff --git a/2017/CVE-2017-8809.json b/2017/CVE-2017-8809.json new file mode 100644 index 0000000000..d79fe1846d --- /dev/null +++ b/2017/CVE-2017-8809.json @@ -0,0 +1,25 @@ +[ + { + "id": 235548506, + "name": "CVE-2017-8809_MediaWiki_RFD", + "full_name": "motikan2010\/CVE-2017-8809_MediaWiki_RFD", + "owner": { + "login": "motikan2010", + "id": 3177297, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3177297?v=4", + "html_url": "https:\/\/github.com\/motikan2010" + }, + "html_url": "https:\/\/github.com\/motikan2010\/CVE-2017-8809_MediaWiki_RFD", + "description": "CVE-2017-8809 Docker - RFD(Reflected File Download) for MediaWiki", + "fork": false, + "created_at": "2020-01-22T10:21:51Z", + "updated_at": "2020-01-22T12:48:17Z", + "pushed_at": "2020-01-22T10:27:26Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 466dea31e5..001dffa1af 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -36,13 +36,13 @@ "description": "CVE-2018-6389 Exploit In WordPress DoS ", "fork": false, "created_at": "2018-02-06T15:16:03Z", - "updated_at": "2019-12-31T08:33:32Z", + "updated_at": "2020-01-22T14:49:33Z", "pushed_at": "2018-02-06T15:36:29Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 69, + "watchers_count": 69, "forks_count": 28, "forks": 28, - "watchers": 68, + "watchers": 69, "score": 0 }, { @@ -289,13 +289,13 @@ "description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)", "fork": false, "created_at": "2018-03-04T14:25:09Z", - "updated_at": "2019-12-23T18:51:44Z", + "updated_at": "2020-01-22T12:29:41Z", "pushed_at": "2019-05-05T15:49:44Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "forks_count": 39, "forks": 39, - "watchers": 67, + "watchers": 68, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 5c7fa8fee8..5eb833b78d 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1650,8 +1650,8 @@ "pushed_at": "2019-07-20T04:48:43Z", "stargazers_count": 313, "watchers_count": 313, - "forks_count": 113, - "forks": 113, + "forks_count": 114, + "forks": 114, "watchers": 313, "score": 0 }, @@ -2018,8 +2018,8 @@ "pushed_at": "2019-11-19T02:43:38Z", "stargazers_count": 261, "watchers_count": 261, - "forks_count": 82, - "forks": 82, + "forks_count": 83, + "forks": 83, "watchers": 261, "score": 0 }, diff --git a/2019/CVE-2019-1003000.json b/2019/CVE-2019-1003000.json index 5f13137a9b..b29219cef4 100644 --- a/2019/CVE-2019-1003000.json +++ b/2019/CVE-2019-1003000.json @@ -40,8 +40,8 @@ "pushed_at": "2019-04-01T13:19:49Z", "stargazers_count": 240, "watchers_count": 240, - "forks_count": 65, - "forks": 65, + "forks_count": 66, + "forks": 66, "watchers": 240, "score": 0 }, diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 19da3d3099..678436ca2c 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -59,7 +59,7 @@ "description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif", "fork": false, "created_at": "2019-10-04T14:43:57Z", - "updated_at": "2020-01-13T15:14:17Z", + "updated_at": "2020-01-22T13:14:37Z", "pushed_at": "2019-11-30T10:28:01Z", "stargazers_count": 95, "watchers_count": 95, diff --git a/2019/CVE-2019-12272.json b/2019/CVE-2019-12272.json index 98d242c521..add5f2e9ff 100644 --- a/2019/CVE-2019-12272.json +++ b/2019/CVE-2019-12272.json @@ -13,13 +13,13 @@ "description": "Exp of cve-2019-12272", "fork": false, "created_at": "2019-07-04T04:54:36Z", - "updated_at": "2020-01-21T15:57:40Z", + "updated_at": "2020-01-22T09:22:35Z", "pushed_at": "2019-07-10T04:33:30Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 2, "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0 }, { diff --git a/2019/CVE-2019-13143.json b/2019/CVE-2019-13143.json index 404d9cd44f..e7a6037a04 100644 --- a/2019/CVE-2019-13143.json +++ b/2019/CVE-2019-13143.json @@ -13,13 +13,13 @@ "description": ":unlock: transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)", "fork": false, "created_at": "2019-08-05T15:45:02Z", - "updated_at": "2019-10-03T08:35:01Z", + "updated_at": "2020-01-22T09:47:57Z", "pushed_at": "2019-08-07T13:06:15Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 4, "forks": 4, - "watchers": 12, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-16784.json b/2019/CVE-2019-16784.json new file mode 100644 index 0000000000..5d8477e5fc --- /dev/null +++ b/2019/CVE-2019-16784.json @@ -0,0 +1,25 @@ +[ + { + "id": 235578521, + "name": "PyInstallerPrivEsc", + "full_name": "AlterSolutions\/PyInstallerPrivEsc", + "owner": { + "login": "AlterSolutions", + "id": 42841703, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/42841703?v=4", + "html_url": "https:\/\/github.com\/AlterSolutions" + }, + "html_url": "https:\/\/github.com\/AlterSolutions\/PyInstallerPrivEsc", + "description": "Exploit for PyInstaller CVE-2019-16784", + "fork": false, + "created_at": "2020-01-22T13:23:45Z", + "updated_at": "2020-01-22T13:25:02Z", + "pushed_at": "2020-01-22T13:25:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 85d76eace0..ad438603db 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -36,13 +36,13 @@ "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]", "fork": false, "created_at": "2020-01-10T22:56:35Z", - "updated_at": "2020-01-22T06:56:52Z", + "updated_at": "2020-01-22T11:45:13Z", "pushed_at": "2020-01-18T07:01:29Z", - "stargazers_count": 285, - "watchers_count": 285, + "stargazers_count": 287, + "watchers_count": 287, "forks_count": 75, "forks": 75, - "watchers": 285, + "watchers": 287, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "fork": false, "created_at": "2020-01-11T00:08:27Z", - "updated_at": "2020-01-21T14:19:41Z", + "updated_at": "2020-01-22T11:20:49Z", "pushed_at": "2020-01-16T16:23:50Z", - "stargazers_count": 441, - "watchers_count": 441, + "stargazers_count": 442, + "watchers_count": 442, "forks_count": 94, "forks": 94, - "watchers": 441, + "watchers": 442, "score": 0 }, { @@ -151,8 +151,8 @@ "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "fork": false, "created_at": "2020-01-11T09:49:17Z", - "updated_at": "2020-01-22T08:08:27Z", - "pushed_at": "2020-01-13T18:54:57Z", + "updated_at": "2020-01-22T14:17:35Z", + "pushed_at": "2020-01-22T14:17:33Z", "stargazers_count": 63, "watchers_count": 63, "forks_count": 12, @@ -309,10 +309,10 @@ "html_url": "https:\/\/github.com\/x1sec" }, "html_url": "https:\/\/github.com\/x1sec\/CVE-2019-19781", - "description": "DFIR notes for Citrix Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781", + "description": "DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781", "fork": false, "created_at": "2020-01-12T23:13:56Z", - "updated_at": "2020-01-20T20:11:09Z", + "updated_at": "2020-01-22T12:59:13Z", "pushed_at": "2020-01-20T11:01:46Z", "stargazers_count": 21, "watchers_count": 21, @@ -734,5 +734,74 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 235373247, + "name": "ioc-scanner-CVE-2019-19781", + "full_name": "fireeye\/ioc-scanner-CVE-2019-19781", + "owner": { + "login": "fireeye", + "id": 4984788, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4984788?v=4", + "html_url": "https:\/\/github.com\/fireeye" + }, + "html_url": "https:\/\/github.com\/fireeye\/ioc-scanner-CVE-2019-19781", + "description": "Indicator of Compromise Scanner for CVE-2019-19781", + "fork": false, + "created_at": "2020-01-21T15:20:25Z", + "updated_at": "2020-01-22T14:50:40Z", + "pushed_at": "2020-01-22T12:54:38Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 0, + "forks": 0, + "watchers": 6, + "score": 0 + }, + { + "id": 235459837, + "name": "ioc-scanner-CVE-2019-19781", + "full_name": "citrix\/ioc-scanner-CVE-2019-19781", + "owner": { + "login": "citrix", + "id": 1635391, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1635391?v=4", + "html_url": "https:\/\/github.com\/citrix" + }, + "html_url": "https:\/\/github.com\/citrix\/ioc-scanner-CVE-2019-19781", + "description": "Indicator of Compromise Scanner for CVE-2019-19781", + "fork": false, + "created_at": "2020-01-21T23:13:00Z", + "updated_at": "2020-01-22T15:03:44Z", + "pushed_at": "2020-01-22T13:53:36Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, + "forks": 1, + "watchers": 4, + "score": 0 + }, + { + "id": 235574304, + "name": "citrix-honeypot", + "full_name": "x1sec\/citrix-honeypot", + "owner": { + "login": "x1sec", + "id": 11153104, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11153104?v=4", + "html_url": "https:\/\/github.com\/x1sec" + }, + "html_url": "https:\/\/github.com\/x1sec\/citrix-honeypot", + "description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781", + "fork": false, + "created_at": "2020-01-22T13:00:18Z", + "updated_at": "2020-01-22T13:00:22Z", + "pushed_at": "2020-01-22T13:00:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2198.json b/2019/CVE-2019-2198.json index b6a0ebf9f4..82561b8d30 100644 --- a/2019/CVE-2019-2198.json +++ b/2019/CVE-2019-2198.json @@ -13,13 +13,13 @@ "description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)", "fork": false, "created_at": "2020-01-14T12:20:18Z", - "updated_at": "2020-01-21T19:50:08Z", + "updated_at": "2020-01-22T14:03:32Z", "pushed_at": "2020-01-17T10:10:31Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 12, "forks": 12, - "watchers": 21, + "watchers": 22, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index a277267b76..1577a9fd77 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -174,13 +174,13 @@ "description": "CVE-2019-2725 命令回显", "fork": false, "created_at": "2019-05-29T01:57:05Z", - "updated_at": "2020-01-15T12:18:55Z", + "updated_at": "2020-01-22T09:31:18Z", "pushed_at": "2019-08-08T09:48:20Z", - "stargazers_count": 291, - "watchers_count": 291, + "stargazers_count": 292, + "watchers_count": 292, "forks_count": 126, "forks": 126, - "watchers": 291, + "watchers": 292, "score": 0 }, { diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index 55a1576c48..52fd2c3c6f 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -128,13 +128,13 @@ "description": "PoC for CVE-2020-0601", "fork": false, "created_at": "2020-01-15T23:07:41Z", - "updated_at": "2020-01-22T07:17:13Z", + "updated_at": "2020-01-22T14:44:54Z", "pushed_at": "2020-01-20T23:33:19Z", - "stargazers_count": 695, - "watchers_count": 695, + "stargazers_count": 699, + "watchers_count": 699, "forks_count": 175, "forks": 175, - "watchers": 695, + "watchers": 699, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "A PoC for CVE-2020-0601", "fork": false, "created_at": "2020-01-15T23:15:32Z", - "updated_at": "2020-01-21T22:06:09Z", + "updated_at": "2020-01-22T09:33:30Z", "pushed_at": "2020-01-17T13:29:44Z", - "stargazers_count": 276, - "watchers_count": 276, + "stargazers_count": 277, + "watchers_count": 277, "forks_count": 67, "forks": 67, - "watchers": 276, + "watchers": 277, "score": 0 }, { @@ -450,13 +450,13 @@ "description": "CVE-2020-0601 #curveball - Alternative Key Calculator", "fork": false, "created_at": "2020-01-20T16:24:20Z", - "updated_at": "2020-01-22T09:06:03Z", + "updated_at": "2020-01-22T14:22:28Z", "pushed_at": "2020-01-20T23:00:14Z", - "stargazers_count": 47, - "watchers_count": 47, - "forks_count": 5, - "forks": 5, - "watchers": 47, + "stargazers_count": 50, + "watchers_count": 50, + "forks_count": 6, + "forks": 6, + "watchers": 50, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index 7001bab4d2..17b2c7912b 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -13,13 +13,13 @@ "description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)", "fork": false, "created_at": "2020-01-21T21:33:17Z", - "updated_at": "2020-01-22T03:28:42Z", + "updated_at": "2020-01-22T09:25:20Z", "pushed_at": "2020-01-21T21:39:38Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1611.json b/2020/CVE-2020-1611.json new file mode 100644 index 0000000000..8514ee2295 --- /dev/null +++ b/2020/CVE-2020-1611.json @@ -0,0 +1,25 @@ +[ + { + "id": 235582404, + "name": "CVE-2020-1611", + "full_name": "Ibonok\/CVE-2020-1611", + "owner": { + "login": "Ibonok", + "id": 37837775, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37837775?v=4", + "html_url": "https:\/\/github.com\/Ibonok" + }, + "html_url": "https:\/\/github.com\/Ibonok\/CVE-2020-1611", + "description": "Juniper Junos Space (CVE-2020-1611) (PoC)", + "fork": false, + "created_at": "2020-01-22T13:45:21Z", + "updated_at": "2020-01-22T14:01:34Z", + "pushed_at": "2020-01-22T14:01:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 69915c4203..de7b28b8a4 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "Weblogic RCE with IIOP", "fork": false, "created_at": "2020-01-18T07:08:06Z", - "updated_at": "2020-01-22T08:23:05Z", + "updated_at": "2020-01-22T11:34:42Z", "pushed_at": "2020-01-18T07:14:34Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "forks_count": 4, "forks": 4, - "watchers": 26, + "watchers": 27, "score": 0 }, { diff --git a/README.md b/README.md index 1f5919043f..79f34aba3f 100644 --- a/README.md +++ b/README.md @@ -2675,6 +2675,9 @@ ### CVE-2017-8802 - [ozzi-/Zimbra-CVE-2017-8802-Hotifx](https://github.com/ozzi-/Zimbra-CVE-2017-8802-Hotifx) +### CVE-2017-8809 +- [motikan2010/CVE-2017-8809_MediaWiki_RFD](https://github.com/motikan2010/CVE-2017-8809_MediaWiki_RFD) + ### CVE-2017-8890 - [beraphin/CVE-2017-8890](https://github.com/beraphin/CVE-2017-8890) - [thinkycx/CVE-2017-8890](https://github.com/thinkycx/CVE-2017-8890) @@ -4882,6 +4885,9 @@ - [FarjaalAhmad/CVE-2019-16759](https://github.com/FarjaalAhmad/CVE-2019-16759) - [andripwn/pwn-vbulletin](https://github.com/andripwn/pwn-vbulletin) +### CVE-2019-16784 +- [AlterSolutions/PyInstallerPrivEsc](https://github.com/AlterSolutions/PyInstallerPrivEsc) + ### CVE-2019-16889 - [grampae/meep](https://github.com/grampae/meep) @@ -5060,6 +5066,9 @@ - [DIVD-NL/Citrix-CVE-2019-19781](https://github.com/DIVD-NL/Citrix-CVE-2019-19781) - [ynsmroztas/citrix.sh](https://github.com/ynsmroztas/citrix.sh) - [c4pt41nnn/massCitrix](https://github.com/c4pt41nnn/massCitrix) +- [fireeye/ioc-scanner-CVE-2019-19781](https://github.com/fireeye/ioc-scanner-CVE-2019-19781) +- [citrix/ioc-scanner-CVE-2019-19781](https://github.com/citrix/ioc-scanner-CVE-2019-19781) +- [x1sec/citrix-honeypot](https://github.com/x1sec/citrix-honeypot) ### CVE-2019-19844 - [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc) @@ -5483,6 +5492,9 @@ ### CVE-2020-0609 - [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609) +### CVE-2020-1611 +- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611) + ### CVE-2020-2551 - [jas502n/CVE-2020-2551](https://github.com/jas502n/CVE-2020-2551) - [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551)