Auto Update 2020/01/23 00:07:37

This commit is contained in:
motikan2010-bot 2020-01-23 00:07:37 +09:00
parent fa22427284
commit bdcf034c12
17 changed files with 225 additions and 69 deletions

View file

@ -13,13 +13,13 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false, "fork": false,
"created_at": "2018-01-04T00:28:50Z", "created_at": "2018-01-04T00:28:50Z",
"updated_at": "2019-12-29T08:33:47Z", "updated_at": "2020-01-22T13:51:06Z",
"pushed_at": "2018-01-10T01:14:44Z", "pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 648, "stargazers_count": 649,
"watchers_count": 648, "watchers_count": 649,
"forks_count": 168, "forks_count": 168,
"forks": 168, "forks": 168,
"watchers": 648, "watchers": 649,
"score": 0 "score": 0
}, },
{ {

25
2017/CVE-2017-8809.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 235548506,
"name": "CVE-2017-8809_MediaWiki_RFD",
"full_name": "motikan2010\/CVE-2017-8809_MediaWiki_RFD",
"owner": {
"login": "motikan2010",
"id": 3177297,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3177297?v=4",
"html_url": "https:\/\/github.com\/motikan2010"
},
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2017-8809_MediaWiki_RFD",
"description": "CVE-2017-8809 Docker - RFD(Reflected File Download) for MediaWiki",
"fork": false,
"created_at": "2020-01-22T10:21:51Z",
"updated_at": "2020-01-22T12:48:17Z",
"pushed_at": "2020-01-22T10:27:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-6389 Exploit In WordPress DoS ", "description": "CVE-2018-6389 Exploit In WordPress DoS ",
"fork": false, "fork": false,
"created_at": "2018-02-06T15:16:03Z", "created_at": "2018-02-06T15:16:03Z",
"updated_at": "2019-12-31T08:33:32Z", "updated_at": "2020-01-22T14:49:33Z",
"pushed_at": "2018-02-06T15:36:29Z", "pushed_at": "2018-02-06T15:36:29Z",
"stargazers_count": 68, "stargazers_count": 69,
"watchers_count": 68, "watchers_count": 69,
"forks_count": 28, "forks_count": 28,
"forks": 28, "forks": 28,
"watchers": 68, "watchers": 69,
"score": 0 "score": 0
}, },
{ {
@ -289,13 +289,13 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)", "description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false, "fork": false,
"created_at": "2018-03-04T14:25:09Z", "created_at": "2018-03-04T14:25:09Z",
"updated_at": "2019-12-23T18:51:44Z", "updated_at": "2020-01-22T12:29:41Z",
"pushed_at": "2019-05-05T15:49:44Z", "pushed_at": "2019-05-05T15:49:44Z",
"stargazers_count": 67, "stargazers_count": 68,
"watchers_count": 67, "watchers_count": 68,
"forks_count": 39, "forks_count": 39,
"forks": 39, "forks": 39,
"watchers": 67, "watchers": 68,
"score": 0 "score": 0
}, },
{ {

View file

@ -1650,8 +1650,8 @@
"pushed_at": "2019-07-20T04:48:43Z", "pushed_at": "2019-07-20T04:48:43Z",
"stargazers_count": 313, "stargazers_count": 313,
"watchers_count": 313, "watchers_count": 313,
"forks_count": 113, "forks_count": 114,
"forks": 113, "forks": 114,
"watchers": 313, "watchers": 313,
"score": 0 "score": 0
}, },
@ -2018,8 +2018,8 @@
"pushed_at": "2019-11-19T02:43:38Z", "pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 261, "stargazers_count": 261,
"watchers_count": 261, "watchers_count": 261,
"forks_count": 82, "forks_count": 83,
"forks": 82, "forks": 83,
"watchers": 261, "watchers": 261,
"score": 0 "score": 0
}, },

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-04-01T13:19:49Z", "pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 240, "stargazers_count": 240,
"watchers_count": 240, "watchers_count": 240,
"forks_count": 65, "forks_count": 66,
"forks": 65, "forks": 66,
"watchers": 240, "watchers": 240,
"score": 0 "score": 0
}, },

View file

@ -59,7 +59,7 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif", "description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false, "fork": false,
"created_at": "2019-10-04T14:43:57Z", "created_at": "2019-10-04T14:43:57Z",
"updated_at": "2020-01-13T15:14:17Z", "updated_at": "2020-01-22T13:14:37Z",
"pushed_at": "2019-11-30T10:28:01Z", "pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 95, "stargazers_count": 95,
"watchers_count": 95, "watchers_count": 95,

View file

@ -13,13 +13,13 @@
"description": "Exp of cve-2019-12272", "description": "Exp of cve-2019-12272",
"fork": false, "fork": false,
"created_at": "2019-07-04T04:54:36Z", "created_at": "2019-07-04T04:54:36Z",
"updated_at": "2020-01-21T15:57:40Z", "updated_at": "2020-01-22T09:22:35Z",
"pushed_at": "2019-07-10T04:33:30Z", "pushed_at": "2019-07-10T04:33:30Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"forks_count": 2, "forks_count": 2,
"forks": 2, "forks": 2,
"watchers": 6, "watchers": 7,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": ":unlock: transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)", "description": ":unlock: transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)",
"fork": false, "fork": false,
"created_at": "2019-08-05T15:45:02Z", "created_at": "2019-08-05T15:45:02Z",
"updated_at": "2019-10-03T08:35:01Z", "updated_at": "2020-01-22T09:47:57Z",
"pushed_at": "2019-08-07T13:06:15Z", "pushed_at": "2019-08-07T13:06:15Z",
"stargazers_count": 12, "stargazers_count": 13,
"watchers_count": 12, "watchers_count": 13,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 12, "watchers": 13,
"score": 0 "score": 0
} }
] ]

25
2019/CVE-2019-16784.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 235578521,
"name": "PyInstallerPrivEsc",
"full_name": "AlterSolutions\/PyInstallerPrivEsc",
"owner": {
"login": "AlterSolutions",
"id": 42841703,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/42841703?v=4",
"html_url": "https:\/\/github.com\/AlterSolutions"
},
"html_url": "https:\/\/github.com\/AlterSolutions\/PyInstallerPrivEsc",
"description": "Exploit for PyInstaller CVE-2019-16784",
"fork": false,
"created_at": "2020-01-22T13:23:45Z",
"updated_at": "2020-01-22T13:25:02Z",
"pushed_at": "2020-01-22T13:25:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]", "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false, "fork": false,
"created_at": "2020-01-10T22:56:35Z", "created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-01-22T06:56:52Z", "updated_at": "2020-01-22T11:45:13Z",
"pushed_at": "2020-01-18T07:01:29Z", "pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 285, "stargazers_count": 287,
"watchers_count": 285, "watchers_count": 287,
"forks_count": 75, "forks_count": 75,
"forks": 75, "forks": 75,
"watchers": 285, "watchers": 287,
"score": 0 "score": 0
}, },
{ {
@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false, "fork": false,
"created_at": "2020-01-11T00:08:27Z", "created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-01-21T14:19:41Z", "updated_at": "2020-01-22T11:20:49Z",
"pushed_at": "2020-01-16T16:23:50Z", "pushed_at": "2020-01-16T16:23:50Z",
"stargazers_count": 441, "stargazers_count": 442,
"watchers_count": 441, "watchers_count": 442,
"forks_count": 94, "forks_count": 94,
"forks": 94, "forks": 94,
"watchers": 441, "watchers": 442,
"score": 0 "score": 0
}, },
{ {
@ -151,8 +151,8 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false, "fork": false,
"created_at": "2020-01-11T09:49:17Z", "created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-01-22T08:08:27Z", "updated_at": "2020-01-22T14:17:35Z",
"pushed_at": "2020-01-13T18:54:57Z", "pushed_at": "2020-01-22T14:17:33Z",
"stargazers_count": 63, "stargazers_count": 63,
"watchers_count": 63, "watchers_count": 63,
"forks_count": 12, "forks_count": 12,
@ -309,10 +309,10 @@
"html_url": "https:\/\/github.com\/x1sec" "html_url": "https:\/\/github.com\/x1sec"
}, },
"html_url": "https:\/\/github.com\/x1sec\/CVE-2019-19781", "html_url": "https:\/\/github.com\/x1sec\/CVE-2019-19781",
"description": "DFIR notes for Citrix Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781", "description": "DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
"fork": false, "fork": false,
"created_at": "2020-01-12T23:13:56Z", "created_at": "2020-01-12T23:13:56Z",
"updated_at": "2020-01-20T20:11:09Z", "updated_at": "2020-01-22T12:59:13Z",
"pushed_at": "2020-01-20T11:01:46Z", "pushed_at": "2020-01-20T11:01:46Z",
"stargazers_count": 21, "stargazers_count": 21,
"watchers_count": 21, "watchers_count": 21,
@ -734,5 +734,74 @@
"forks": 1, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 235373247,
"name": "ioc-scanner-CVE-2019-19781",
"full_name": "fireeye\/ioc-scanner-CVE-2019-19781",
"owner": {
"login": "fireeye",
"id": 4984788,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4984788?v=4",
"html_url": "https:\/\/github.com\/fireeye"
},
"html_url": "https:\/\/github.com\/fireeye\/ioc-scanner-CVE-2019-19781",
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2020-01-22T14:50:40Z",
"pushed_at": "2020-01-22T12:54:38Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
},
{
"id": 235459837,
"name": "ioc-scanner-CVE-2019-19781",
"full_name": "citrix\/ioc-scanner-CVE-2019-19781",
"owner": {
"login": "citrix",
"id": 1635391,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1635391?v=4",
"html_url": "https:\/\/github.com\/citrix"
},
"html_url": "https:\/\/github.com\/citrix\/ioc-scanner-CVE-2019-19781",
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T23:13:00Z",
"updated_at": "2020-01-22T15:03:44Z",
"pushed_at": "2020-01-22T13:53:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 235574304,
"name": "citrix-honeypot",
"full_name": "x1sec\/citrix-honeypot",
"owner": {
"login": "x1sec",
"id": 11153104,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11153104?v=4",
"html_url": "https:\/\/github.com\/x1sec"
},
"html_url": "https:\/\/github.com\/x1sec\/citrix-honeypot",
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-22T13:00:18Z",
"updated_at": "2020-01-22T13:00:22Z",
"pushed_at": "2020-01-22T13:00:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)", "description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)",
"fork": false, "fork": false,
"created_at": "2020-01-14T12:20:18Z", "created_at": "2020-01-14T12:20:18Z",
"updated_at": "2020-01-21T19:50:08Z", "updated_at": "2020-01-22T14:03:32Z",
"pushed_at": "2020-01-17T10:10:31Z", "pushed_at": "2020-01-17T10:10:31Z",
"stargazers_count": 21, "stargazers_count": 22,
"watchers_count": 21, "watchers_count": 22,
"forks_count": 12, "forks_count": 12,
"forks": 12, "forks": 12,
"watchers": 21, "watchers": 22,
"score": 0 "score": 0
} }
] ]

View file

@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显", "description": "CVE-2019-2725 命令回显",
"fork": false, "fork": false,
"created_at": "2019-05-29T01:57:05Z", "created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-01-15T12:18:55Z", "updated_at": "2020-01-22T09:31:18Z",
"pushed_at": "2019-08-08T09:48:20Z", "pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 291, "stargazers_count": 292,
"watchers_count": 291, "watchers_count": 292,
"forks_count": 126, "forks_count": 126,
"forks": 126, "forks": 126,
"watchers": 291, "watchers": 292,
"score": 0 "score": 0
}, },
{ {

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601", "description": "PoC for CVE-2020-0601",
"fork": false, "fork": false,
"created_at": "2020-01-15T23:07:41Z", "created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-01-22T07:17:13Z", "updated_at": "2020-01-22T14:44:54Z",
"pushed_at": "2020-01-20T23:33:19Z", "pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 695, "stargazers_count": 699,
"watchers_count": 695, "watchers_count": 699,
"forks_count": 175, "forks_count": 175,
"forks": 175, "forks": 175,
"watchers": 695, "watchers": 699,
"score": 0 "score": 0
}, },
{ {
@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601", "description": "A PoC for CVE-2020-0601",
"fork": false, "fork": false,
"created_at": "2020-01-15T23:15:32Z", "created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-01-21T22:06:09Z", "updated_at": "2020-01-22T09:33:30Z",
"pushed_at": "2020-01-17T13:29:44Z", "pushed_at": "2020-01-17T13:29:44Z",
"stargazers_count": 276, "stargazers_count": 277,
"watchers_count": 276, "watchers_count": 277,
"forks_count": 67, "forks_count": 67,
"forks": 67, "forks": 67,
"watchers": 276, "watchers": 277,
"score": 0 "score": 0
}, },
{ {
@ -450,13 +450,13 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator", "description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false, "fork": false,
"created_at": "2020-01-20T16:24:20Z", "created_at": "2020-01-20T16:24:20Z",
"updated_at": "2020-01-22T09:06:03Z", "updated_at": "2020-01-22T14:22:28Z",
"pushed_at": "2020-01-20T23:00:14Z", "pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 47, "stargazers_count": 50,
"watchers_count": 47, "watchers_count": 50,
"forks_count": 5, "forks_count": 6,
"forks": 5, "forks": 6,
"watchers": 47, "watchers": 50,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)", "description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false, "fork": false,
"created_at": "2020-01-21T21:33:17Z", "created_at": "2020-01-21T21:33:17Z",
"updated_at": "2020-01-22T03:28:42Z", "updated_at": "2020-01-22T09:25:20Z",
"pushed_at": "2020-01-21T21:39:38Z", "pushed_at": "2020-01-21T21:39:38Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 0, "forks_count": 0,
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

25
2020/CVE-2020-1611.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 235582404,
"name": "CVE-2020-1611",
"full_name": "Ibonok\/CVE-2020-1611",
"owner": {
"login": "Ibonok",
"id": 37837775,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37837775?v=4",
"html_url": "https:\/\/github.com\/Ibonok"
},
"html_url": "https:\/\/github.com\/Ibonok\/CVE-2020-1611",
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
"fork": false,
"created_at": "2020-01-22T13:45:21Z",
"updated_at": "2020-01-22T14:01:34Z",
"pushed_at": "2020-01-22T14:01:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Weblogic RCE with IIOP", "description": "Weblogic RCE with IIOP",
"fork": false, "fork": false,
"created_at": "2020-01-18T07:08:06Z", "created_at": "2020-01-18T07:08:06Z",
"updated_at": "2020-01-22T08:23:05Z", "updated_at": "2020-01-22T11:34:42Z",
"pushed_at": "2020-01-18T07:14:34Z", "pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 26, "watchers": 27,
"score": 0 "score": 0
}, },
{ {

View file

@ -2675,6 +2675,9 @@
### CVE-2017-8802 ### CVE-2017-8802
- [ozzi-/Zimbra-CVE-2017-8802-Hotifx](https://github.com/ozzi-/Zimbra-CVE-2017-8802-Hotifx) - [ozzi-/Zimbra-CVE-2017-8802-Hotifx](https://github.com/ozzi-/Zimbra-CVE-2017-8802-Hotifx)
### CVE-2017-8809
- [motikan2010/CVE-2017-8809_MediaWiki_RFD](https://github.com/motikan2010/CVE-2017-8809_MediaWiki_RFD)
### CVE-2017-8890 ### CVE-2017-8890
- [beraphin/CVE-2017-8890](https://github.com/beraphin/CVE-2017-8890) - [beraphin/CVE-2017-8890](https://github.com/beraphin/CVE-2017-8890)
- [thinkycx/CVE-2017-8890](https://github.com/thinkycx/CVE-2017-8890) - [thinkycx/CVE-2017-8890](https://github.com/thinkycx/CVE-2017-8890)
@ -4882,6 +4885,9 @@
- [FarjaalAhmad/CVE-2019-16759](https://github.com/FarjaalAhmad/CVE-2019-16759) - [FarjaalAhmad/CVE-2019-16759](https://github.com/FarjaalAhmad/CVE-2019-16759)
- [andripwn/pwn-vbulletin](https://github.com/andripwn/pwn-vbulletin) - [andripwn/pwn-vbulletin](https://github.com/andripwn/pwn-vbulletin)
### CVE-2019-16784
- [AlterSolutions/PyInstallerPrivEsc](https://github.com/AlterSolutions/PyInstallerPrivEsc)
### CVE-2019-16889 ### CVE-2019-16889
- [grampae/meep](https://github.com/grampae/meep) - [grampae/meep](https://github.com/grampae/meep)
@ -5060,6 +5066,9 @@
- [DIVD-NL/Citrix-CVE-2019-19781](https://github.com/DIVD-NL/Citrix-CVE-2019-19781) - [DIVD-NL/Citrix-CVE-2019-19781](https://github.com/DIVD-NL/Citrix-CVE-2019-19781)
- [ynsmroztas/citrix.sh](https://github.com/ynsmroztas/citrix.sh) - [ynsmroztas/citrix.sh](https://github.com/ynsmroztas/citrix.sh)
- [c4pt41nnn/massCitrix](https://github.com/c4pt41nnn/massCitrix) - [c4pt41nnn/massCitrix](https://github.com/c4pt41nnn/massCitrix)
- [fireeye/ioc-scanner-CVE-2019-19781](https://github.com/fireeye/ioc-scanner-CVE-2019-19781)
- [citrix/ioc-scanner-CVE-2019-19781](https://github.com/citrix/ioc-scanner-CVE-2019-19781)
- [x1sec/citrix-honeypot](https://github.com/x1sec/citrix-honeypot)
### CVE-2019-19844 ### CVE-2019-19844
- [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc) - [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc)
@ -5483,6 +5492,9 @@
### CVE-2020-0609 ### CVE-2020-0609
- [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609) - [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609)
### CVE-2020-1611
- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611)
### CVE-2020-2551 ### CVE-2020-2551
- [jas502n/CVE-2020-2551](https://github.com/jas502n/CVE-2020-2551) - [jas502n/CVE-2020-2551](https://github.com/jas502n/CVE-2020-2551)
- [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551) - [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551)