From e13594e9d07433757a45ac236f4cbbc13413d0a7 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Thu, 16 Jan 2020 07:00:02 +0900 Subject: [PATCH] Auto Update 2020/01/16 07:00:02 --- 2013/CVE-2013-2729.json | 2 +- 2014/CVE-2014-3566.json | 8 +-- 2016/CVE-2016-0728.json | 23 ++++++++ 2017/CVE-2017-0781.json | 8 +-- 2017/CVE-2017-12611.json | 8 +-- 2017/CVE-2017-5638.json | 2 +- 2018/CVE-2018-20580.json | 4 +- 2018/CVE-2018-2879.json | 8 +-- 2019/CVE-2019-1040.json | 4 +- 2019/CVE-2019-11043.json | 8 +-- 2019/CVE-2019-11510.json | 4 +- 2019/CVE-2019-17571.json | 8 +-- 2019/CVE-2019-18371.json | 8 +-- 2019/CVE-2019-19781.json | 110 +++++++++++++++++++++++++++------------ 2020/CVE-2020-0601.json | 54 +++++++++++++++++-- README.md | 5 ++ 16 files changed, 192 insertions(+), 72 deletions(-) diff --git a/2013/CVE-2013-2729.json b/2013/CVE-2013-2729.json index 8be23e089f..a0d50ab98c 100644 --- a/2013/CVE-2013-2729.json +++ b/2013/CVE-2013-2729.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2013-05-15T04:12:13Z", - "updated_at": "2019-07-23T19:28:29Z", + "updated_at": "2020-01-15T16:23:42Z", "pushed_at": "2014-03-29T14:07:38Z", "stargazers_count": 23, "watchers_count": 23, diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index 0001c4687b..9ac8ee0ee0 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -82,13 +82,13 @@ "description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:", "fork": false, "created_at": "2015-02-03T20:28:27Z", - "updated_at": "2020-01-10T09:39:01Z", + "updated_at": "2020-01-15T20:43:37Z", "pushed_at": "2019-01-31T22:56:17Z", - "stargazers_count": 171, - "watchers_count": 171, + "stargazers_count": 172, + "watchers_count": 172, "forks_count": 51, "forks": 51, - "watchers": 171, + "watchers": 172, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0728.json b/2016/CVE-2016-0728.json index 6cc5dcb66d..e61e6914c9 100644 --- a/2016/CVE-2016-0728.json +++ b/2016/CVE-2016-0728.json @@ -228,5 +228,28 @@ "forks": 1, "watchers": 1, "score": 0 + }, + { + "id": 234157095, + "name": "Zabbix-Templates", + "full_name": "slunart\/Zabbix-Templates", + "owner": { + "login": "slunart", + "id": 352135, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/352135?v=4", + "html_url": "https:\/\/github.com\/slunart" + }, + "html_url": "https:\/\/github.com\/slunart\/Zabbix-Templates", + "description": "Zabbix template for check the CVE-2016-0728 Vulnerability in Red Hat Linux OS like", + "fork": false, + "created_at": "2020-01-15T19:32:15Z", + "updated_at": "2020-01-15T20:11:45Z", + "pushed_at": "2020-01-15T20:07:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index 91e0f4bdcb..a2abc49f32 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -36,13 +36,13 @@ "description": "Android Blueborne RCE CVE-2017-0781", "fork": false, "created_at": "2018-03-17T21:07:24Z", - "updated_at": "2020-01-14T15:53:31Z", + "updated_at": "2020-01-15T18:09:28Z", "pushed_at": "2018-04-04T12:59:18Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "forks_count": 19, "forks": 19, - "watchers": 61, + "watchers": 62, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-12611.json b/2017/CVE-2017-12611.json index a6507ce741..b36f305d9e 100644 --- a/2017/CVE-2017-12611.json +++ b/2017/CVE-2017-12611.json @@ -13,13 +13,13 @@ "description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)", "fork": false, "created_at": "2017-09-08T02:50:37Z", - "updated_at": "2019-10-11T19:04:17Z", + "updated_at": "2020-01-15T18:50:34Z", "pushed_at": "2017-09-08T11:59:20Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "forks_count": 22, "forks": 22, - "watchers": 36, + "watchers": 37, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index 9795cabb46..803dd9ec68 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -1233,7 +1233,7 @@ "fork": false, "created_at": "2018-06-26T10:21:50Z", "updated_at": "2019-11-12T10:42:33Z", - "pushed_at": "2020-01-15T14:40:13Z", + "pushed_at": "2020-01-15T16:12:07Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 122, diff --git a/2018/CVE-2018-20580.json b/2018/CVE-2018-20580.json index 265188d5c8..801e53ecbb 100644 --- a/2018/CVE-2018-20580.json +++ b/2018/CVE-2018-20580.json @@ -13,8 +13,8 @@ "description": "A proof of concept for ReadyAPI 2.5.0\/2.6.0 Remote Code Execution Vulnerability.", "fork": false, "created_at": "2019-05-03T17:53:17Z", - "updated_at": "2019-05-10T02:19:59Z", - "pushed_at": "2019-05-10T02:19:57Z", + "updated_at": "2020-01-15T16:15:34Z", + "pushed_at": "2020-01-15T16:15:32Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, diff --git a/2018/CVE-2018-2879.json b/2018/CVE-2018-2879.json index cee5bb41f0..b4fe4be973 100644 --- a/2018/CVE-2018-2879.json +++ b/2018/CVE-2018-2879.json @@ -59,13 +59,13 @@ "description": "Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)", "fork": false, "created_at": "2019-04-14T16:32:08Z", - "updated_at": "2020-01-09T23:28:55Z", + "updated_at": "2020-01-15T17:37:09Z", "pushed_at": "2019-08-06T12:42:05Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 5, "forks": 5, - "watchers": 17, + "watchers": 18, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index 10cc672d60..893f46d4b2 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -63,8 +63,8 @@ "pushed_at": "2019-06-28T03:57:26Z", "stargazers_count": 185, "watchers_count": 185, - "forks_count": 32, - "forks": 32, + "forks_count": 33, + "forks": 33, "watchers": 185, "score": 0 }, diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 9f969b1129..87ab79c94f 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2020-01-15T08:31:25Z", + "updated_at": "2020-01-15T19:30:54Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1513, - "watchers_count": 1513, + "stargazers_count": 1514, + "watchers_count": 1514, "forks_count": 209, "forks": 209, - "watchers": 1513, + "watchers": 1514, "score": 0 }, { diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index 4b0baad41e..4fb3ba5c8b 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -174,8 +174,8 @@ "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", - "updated_at": "2020-01-07T08:45:45Z", - "pushed_at": "2020-01-10T19:53:10Z", + "updated_at": "2020-01-15T17:01:52Z", + "pushed_at": "2020-01-15T17:01:50Z", "stargazers_count": 56, "watchers_count": 56, "forks_count": 22, diff --git a/2019/CVE-2019-17571.json b/2019/CVE-2019-17571.json index c501904349..6ceeb3278f 100644 --- a/2019/CVE-2019-17571.json +++ b/2019/CVE-2019-17571.json @@ -13,13 +13,13 @@ "description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞", "fork": false, "created_at": "2019-12-25T16:46:11Z", - "updated_at": "2020-01-09T13:11:17Z", + "updated_at": "2020-01-15T15:42:29Z", "pushed_at": "2019-12-25T16:48:41Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "forks_count": 4, "forks": 4, - "watchers": 59, + "watchers": 60, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-18371.json b/2019/CVE-2019-18371.json index 7bf858223b..5d62137e50 100644 --- a/2019/CVE-2019-18371.json +++ b/2019/CVE-2019-18371.json @@ -13,13 +13,13 @@ "description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.", "fork": false, "created_at": "2019-08-30T16:32:13Z", - "updated_at": "2020-01-15T10:20:38Z", + "updated_at": "2020-01-15T17:27:43Z", "pushed_at": "2020-01-12T02:34:45Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "forks_count": 14, "forks": 14, - "watchers": 92, + "watchers": 93, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index c146901db6..74408c5378 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -36,13 +36,13 @@ "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]", "fork": false, "created_at": "2020-01-10T22:56:35Z", - "updated_at": "2020-01-15T12:37:22Z", + "updated_at": "2020-01-15T21:08:51Z", "pushed_at": "2020-01-11T14:11:43Z", - "stargazers_count": 250, - "watchers_count": 250, - "forks_count": 66, - "forks": 66, - "watchers": 250, + "stargazers_count": 254, + "watchers_count": 254, + "forks_count": 67, + "forks": 67, + "watchers": 254, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "fork": false, "created_at": "2020-01-11T00:08:27Z", - "updated_at": "2020-01-15T14:40:47Z", - "pushed_at": "2020-01-15T14:40:45Z", - "stargazers_count": 401, - "watchers_count": 401, - "forks_count": 84, - "forks": 84, - "watchers": 401, + "updated_at": "2020-01-15T19:22:46Z", + "pushed_at": "2020-01-15T18:53:44Z", + "stargazers_count": 404, + "watchers_count": 404, + "forks_count": 86, + "forks": 86, + "watchers": 404, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "Test a host for susceptibility to CVE-2019-19781", "fork": false, "created_at": "2020-01-11T00:26:16Z", - "updated_at": "2020-01-15T12:54:13Z", - "pushed_at": "2020-01-14T21:26:26Z", - "stargazers_count": 58, - "watchers_count": 58, - "forks_count": 14, - "forks": 14, - "watchers": 58, + "updated_at": "2020-01-15T20:40:57Z", + "pushed_at": "2020-01-15T19:46:09Z", + "stargazers_count": 66, + "watchers_count": 66, + "forks_count": 16, + "forks": 16, + "watchers": 66, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "fork": false, "created_at": "2020-01-11T09:49:17Z", - "updated_at": "2020-01-15T13:55:49Z", + "updated_at": "2020-01-15T20:30:37Z", "pushed_at": "2020-01-13T18:54:57Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 8, "forks": 8, - "watchers": 45, + "watchers": 47, "score": 0 }, { @@ -220,13 +220,13 @@ "description": "All Working Exploits", "fork": false, "created_at": "2020-01-11T20:43:09Z", - "updated_at": "2020-01-11T22:09:36Z", + "updated_at": "2020-01-15T18:57:44Z", "pushed_at": "2020-01-11T22:09:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, "score": 0 }, { @@ -270,8 +270,8 @@ "pushed_at": "2020-01-15T10:54:08Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 }, @@ -435,5 +435,51 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 234157094, + "name": "CVE-2019-19781_IOCs", + "full_name": "digitalshadows\/CVE-2019-19781_IOCs", + "owner": { + "login": "digitalshadows", + "id": 11042971, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11042971?v=4", + "html_url": "https:\/\/github.com\/digitalshadows" + }, + "html_url": "https:\/\/github.com\/digitalshadows\/CVE-2019-19781_IOCs", + "description": "IOCs for CVE-2019-19781", + "fork": false, + "created_at": "2020-01-15T19:32:14Z", + "updated_at": "2020-01-15T19:37:59Z", + "pushed_at": "2020-01-15T19:36:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 234169492, + "name": "CVE-2019-19781-Forensic", + "full_name": "onSec-fr\/CVE-2019-19781-Forensic", + "owner": { + "login": "onSec-fr", + "id": 59887731, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/59887731?v=4", + "html_url": "https:\/\/github.com\/onSec-fr" + }, + "html_url": "https:\/\/github.com\/onSec-fr\/CVE-2019-19781-Forensic", + "description": "Automated forensic script hunting for cve-2019-19781", + "fork": false, + "created_at": "2020-01-15T20:43:37Z", + "updated_at": "2020-01-15T20:58:13Z", + "pushed_at": "2020-01-15T20:58:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index 5784ee43fe..08d5295e63 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -36,13 +36,59 @@ "description": "Zeek package to detect CVE-2020-0601", "fork": false, "created_at": "2020-01-15T00:01:29Z", - "updated_at": "2020-01-15T15:09:35Z", + "updated_at": "2020-01-15T19:27:10Z", "pushed_at": "2020-01-15T02:16:00Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 19, + "watchers_count": 19, + "forks_count": 2, + "forks": 2, + "watchers": 19, + "score": 0 + }, + { + "id": 234134766, + "name": "CVE-2020-0601", + "full_name": "SherlockSec\/CVE-2020-0601", + "owner": { + "login": "SherlockSec", + "id": 37545173, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37545173?v=4", + "html_url": "https:\/\/github.com\/SherlockSec" + }, + "html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601", + "description": "A Windows Crypto Exploit", + "fork": false, + "created_at": "2020-01-15T17:26:58Z", + "updated_at": "2020-01-15T20:32:29Z", + "pushed_at": "2020-01-15T17:28:20Z", + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 13, + "watchers": 1, + "score": 0 + }, + { + "id": 234146234, + "name": "CVE-2020-0601", + "full_name": "JPurrier\/CVE-2020-0601", + "owner": { + "login": "JPurrier", + "id": 25715340, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25715340?v=4", + "html_url": "https:\/\/github.com\/JPurrier" + }, + "html_url": "https:\/\/github.com\/JPurrier\/CVE-2020-0601", + "description": null, + "fork": false, + "created_at": "2020-01-15T18:31:30Z", + "updated_at": "2020-01-15T18:34:29Z", + "pushed_at": "2020-01-15T18:34:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 34288af6f0..94617cc429 100644 --- a/README.md +++ b/README.md @@ -1365,6 +1365,7 @@ - [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728) - [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728) - [sugarvillela/CVE](https://github.com/sugarvillela/CVE) +- [slunart/Zabbix-Templates](https://github.com/slunart/Zabbix-Templates) ### CVE-2016-0752.json - [forced-request/rails-rce-cve-2016-0752](https://github.com/forced-request/rails-rce-cve-2016-0752) @@ -5024,6 +5025,8 @@ - [mekhalleh/citrix_dir_trasversal_rce](https://github.com/mekhalleh/citrix_dir_trasversal_rce) - [zenturacp/cve-2019-19781-web](https://github.com/zenturacp/cve-2019-19781-web) - [zgelici/CVE-2019-19781-Checker](https://github.com/zgelici/CVE-2019-19781-Checker) +- [digitalshadows/CVE-2019-19781_IOCs](https://github.com/digitalshadows/CVE-2019-19781_IOCs) +- [onSec-fr/CVE-2019-19781-Forensic](https://github.com/onSec-fr/CVE-2019-19781-Forensic) ### CVE-2019-19844.json - [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc) @@ -5412,6 +5415,8 @@ ### CVE-2020-0601.json - [nissan-sudo/CVE-2020-0601](https://github.com/nissan-sudo/CVE-2020-0601) - [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601) +- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601) +- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601) ### CVE-2020-5509.json - [FULLSHADE/CVE-2020-5509-POC](https://github.com/FULLSHADE/CVE-2020-5509-POC)