Auto Update 2020/01/16 07:00:02

This commit is contained in:
motikan2010-bot 2020-01-16 07:00:02 +09:00
parent f5d6703d2b
commit e13594e9d0
16 changed files with 192 additions and 72 deletions

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2013-05-15T04:12:13Z",
"updated_at": "2019-07-23T19:28:29Z",
"updated_at": "2020-01-15T16:23:42Z",
"pushed_at": "2014-03-29T14:07:38Z",
"stargazers_count": 23,
"watchers_count": 23,

View file

@ -82,13 +82,13 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2020-01-10T09:39:01Z",
"updated_at": "2020-01-15T20:43:37Z",
"pushed_at": "2019-01-31T22:56:17Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 51,
"forks": 51,
"watchers": 171,
"watchers": 172,
"score": 0
}
]

View file

@ -228,5 +228,28 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 234157095,
"name": "Zabbix-Templates",
"full_name": "slunart\/Zabbix-Templates",
"owner": {
"login": "slunart",
"id": 352135,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/352135?v=4",
"html_url": "https:\/\/github.com\/slunart"
},
"html_url": "https:\/\/github.com\/slunart\/Zabbix-Templates",
"description": "Zabbix template for check the CVE-2016-0728 Vulnerability in Red Hat Linux OS like",
"fork": false,
"created_at": "2020-01-15T19:32:15Z",
"updated_at": "2020-01-15T20:11:45Z",
"pushed_at": "2020-01-15T20:07:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Android Blueborne RCE CVE-2017-0781",
"fork": false,
"created_at": "2018-03-17T21:07:24Z",
"updated_at": "2020-01-14T15:53:31Z",
"updated_at": "2020-01-15T18:09:28Z",
"pushed_at": "2018-04-04T12:59:18Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 19,
"forks": 19,
"watchers": 61,
"watchers": 62,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
"fork": false,
"created_at": "2017-09-08T02:50:37Z",
"updated_at": "2019-10-11T19:04:17Z",
"updated_at": "2020-01-15T18:50:34Z",
"pushed_at": "2017-09-08T11:59:20Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 22,
"forks": 22,
"watchers": 36,
"watchers": 37,
"score": 0
}
]

View file

@ -1233,7 +1233,7 @@
"fork": false,
"created_at": "2018-06-26T10:21:50Z",
"updated_at": "2019-11-12T10:42:33Z",
"pushed_at": "2020-01-15T14:40:13Z",
"pushed_at": "2020-01-15T16:12:07Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 122,

View file

@ -13,8 +13,8 @@
"description": "A proof of concept for ReadyAPI 2.5.0\/2.6.0 Remote Code Execution Vulnerability.",
"fork": false,
"created_at": "2019-05-03T17:53:17Z",
"updated_at": "2019-05-10T02:19:59Z",
"pushed_at": "2019-05-10T02:19:57Z",
"updated_at": "2020-01-15T16:15:34Z",
"pushed_at": "2020-01-15T16:15:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,

View file

@ -59,13 +59,13 @@
"description": "Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)",
"fork": false,
"created_at": "2019-04-14T16:32:08Z",
"updated_at": "2020-01-09T23:28:55Z",
"updated_at": "2020-01-15T17:37:09Z",
"pushed_at": "2019-08-06T12:42:05Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-06-28T03:57:26Z",
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 32,
"forks": 32,
"forks_count": 33,
"forks": 33,
"watchers": 185,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-01-15T08:31:25Z",
"updated_at": "2020-01-15T19:30:54Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1513,
"watchers_count": 1513,
"stargazers_count": 1514,
"watchers_count": 1514,
"forks_count": 209,
"forks": 209,
"watchers": 1513,
"watchers": 1514,
"score": 0
},
{

View file

@ -174,8 +174,8 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-01-07T08:45:45Z",
"pushed_at": "2020-01-10T19:53:10Z",
"updated_at": "2020-01-15T17:01:52Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 22,

View file

@ -13,13 +13,13 @@
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
"fork": false,
"created_at": "2019-12-25T16:46:11Z",
"updated_at": "2020-01-09T13:11:17Z",
"updated_at": "2020-01-15T15:42:29Z",
"pushed_at": "2019-12-25T16:48:41Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 4,
"forks": 4,
"watchers": 59,
"watchers": 60,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-01-15T10:20:38Z",
"updated_at": "2020-01-15T17:27:43Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 14,
"forks": 14,
"watchers": 92,
"watchers": 93,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-01-15T12:37:22Z",
"updated_at": "2020-01-15T21:08:51Z",
"pushed_at": "2020-01-11T14:11:43Z",
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 66,
"forks": 66,
"watchers": 250,
"stargazers_count": 254,
"watchers_count": 254,
"forks_count": 67,
"forks": 67,
"watchers": 254,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2020-01-15T14:40:47Z",
"pushed_at": "2020-01-15T14:40:45Z",
"stargazers_count": 401,
"watchers_count": 401,
"forks_count": 84,
"forks": 84,
"watchers": 401,
"updated_at": "2020-01-15T19:22:46Z",
"pushed_at": "2020-01-15T18:53:44Z",
"stargazers_count": 404,
"watchers_count": 404,
"forks_count": 86,
"forks": 86,
"watchers": 404,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2020-01-15T12:54:13Z",
"pushed_at": "2020-01-14T21:26:26Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 14,
"forks": 14,
"watchers": 58,
"updated_at": "2020-01-15T20:40:57Z",
"pushed_at": "2020-01-15T19:46:09Z",
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 16,
"forks": 16,
"watchers": 66,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-01-15T13:55:49Z",
"updated_at": "2020-01-15T20:30:37Z",
"pushed_at": "2020-01-13T18:54:57Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 8,
"forks": 8,
"watchers": 45,
"watchers": 47,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "All Working Exploits",
"fork": false,
"created_at": "2020-01-11T20:43:09Z",
"updated_at": "2020-01-11T22:09:36Z",
"updated_at": "2020-01-15T18:57:44Z",
"pushed_at": "2020-01-11T22:09:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
@ -270,8 +270,8 @@
"pushed_at": "2020-01-15T10:54:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -435,5 +435,51 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234157094,
"name": "CVE-2019-19781_IOCs",
"full_name": "digitalshadows\/CVE-2019-19781_IOCs",
"owner": {
"login": "digitalshadows",
"id": 11042971,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11042971?v=4",
"html_url": "https:\/\/github.com\/digitalshadows"
},
"html_url": "https:\/\/github.com\/digitalshadows\/CVE-2019-19781_IOCs",
"description": "IOCs for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-15T19:32:14Z",
"updated_at": "2020-01-15T19:37:59Z",
"pushed_at": "2020-01-15T19:36:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234169492,
"name": "CVE-2019-19781-Forensic",
"full_name": "onSec-fr\/CVE-2019-19781-Forensic",
"owner": {
"login": "onSec-fr",
"id": 59887731,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/59887731?v=4",
"html_url": "https:\/\/github.com\/onSec-fr"
},
"html_url": "https:\/\/github.com\/onSec-fr\/CVE-2019-19781-Forensic",
"description": "Automated forensic script hunting for cve-2019-19781",
"fork": false,
"created_at": "2020-01-15T20:43:37Z",
"updated_at": "2020-01-15T20:58:13Z",
"pushed_at": "2020-01-15T20:58:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,59 @@
"description": "Zeek package to detect CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T00:01:29Z",
"updated_at": "2020-01-15T15:09:35Z",
"updated_at": "2020-01-15T19:27:10Z",
"pushed_at": "2020-01-15T02:16:00Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 2,
"forks": 2,
"watchers": 19,
"score": 0
},
{
"id": 234134766,
"name": "CVE-2020-0601",
"full_name": "SherlockSec\/CVE-2020-0601",
"owner": {
"login": "SherlockSec",
"id": 37545173,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37545173?v=4",
"html_url": "https:\/\/github.com\/SherlockSec"
},
"html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601",
"description": "A Windows Crypto Exploit",
"fork": false,
"created_at": "2020-01-15T17:26:58Z",
"updated_at": "2020-01-15T20:32:29Z",
"pushed_at": "2020-01-15T17:28:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 13,
"watchers": 1,
"score": 0
},
{
"id": 234146234,
"name": "CVE-2020-0601",
"full_name": "JPurrier\/CVE-2020-0601",
"owner": {
"login": "JPurrier",
"id": 25715340,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25715340?v=4",
"html_url": "https:\/\/github.com\/JPurrier"
},
"html_url": "https:\/\/github.com\/JPurrier\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-15T18:31:30Z",
"updated_at": "2020-01-15T18:34:29Z",
"pushed_at": "2020-01-15T18:34:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1365,6 +1365,7 @@
- [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728)
- [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728)
- [sugarvillela/CVE](https://github.com/sugarvillela/CVE)
- [slunart/Zabbix-Templates](https://github.com/slunart/Zabbix-Templates)
### CVE-2016-0752.json
- [forced-request/rails-rce-cve-2016-0752](https://github.com/forced-request/rails-rce-cve-2016-0752)
@ -5024,6 +5025,8 @@
- [mekhalleh/citrix_dir_trasversal_rce](https://github.com/mekhalleh/citrix_dir_trasversal_rce)
- [zenturacp/cve-2019-19781-web](https://github.com/zenturacp/cve-2019-19781-web)
- [zgelici/CVE-2019-19781-Checker](https://github.com/zgelici/CVE-2019-19781-Checker)
- [digitalshadows/CVE-2019-19781_IOCs](https://github.com/digitalshadows/CVE-2019-19781_IOCs)
- [onSec-fr/CVE-2019-19781-Forensic](https://github.com/onSec-fr/CVE-2019-19781-Forensic)
### CVE-2019-19844.json
- [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc)
@ -5412,6 +5415,8 @@
### CVE-2020-0601.json
- [nissan-sudo/CVE-2020-0601](https://github.com/nissan-sudo/CVE-2020-0601)
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
### CVE-2020-5509.json
- [FULLSHADE/CVE-2020-5509-POC](https://github.com/FULLSHADE/CVE-2020-5509-POC)