mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/01/28 18:07:33
This commit is contained in:
parent
8f5526b5bd
commit
2d255dd674
14 changed files with 81 additions and 57 deletions
|
@ -1194,5 +1194,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 236683250,
|
||||
"name": "Shell-Shock",
|
||||
"full_name": "somhm-solutions\/Shell-Shock",
|
||||
"owner": {
|
||||
"login": "somhm-solutions",
|
||||
"id": 56839517,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/56839517?v=4",
|
||||
"html_url": "https:\/\/github.com\/somhm-solutions"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/somhm-solutions\/Shell-Shock",
|
||||
"description": "*CVE-2014-6271* Unix Arbitrary Code Execution Exploit commonly know as Shell Shock. Examples, Docs, Incident Response and Vulnerability\/Risk Assessment, and Additional Resources may be dumped here. Enjoy :) --- somhmxxghoul ---",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-28T07:48:46Z",
|
||||
"updated_at": "2020-01-28T07:50:28Z",
|
||||
"pushed_at": "2020-01-28T07:50:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,7 +128,7 @@
|
|||
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-26T12:26:55Z",
|
||||
"updated_at": "2019-12-07T22:50:31Z",
|
||||
"updated_at": "2020-01-28T07:46:33Z",
|
||||
"pushed_at": "2019-05-26T13:06:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2020-01-08T05:59:02Z",
|
||||
"updated_at": "2020-01-28T08:10:05Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 422,
|
||||
"watchers": 423,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat Remote Code Execution on Windows",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-15T07:54:25Z",
|
||||
"updated_at": "2020-01-23T09:27:26Z",
|
||||
"updated_at": "2020-01-28T05:17:34Z",
|
||||
"pushed_at": "2019-11-27T07:39:40Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-01-27T17:29:39Z",
|
||||
"updated_at": "2020-01-28T07:52:21Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1528,
|
||||
"watchers_count": 1528,
|
||||
"stargazers_count": 1527,
|
||||
"watchers_count": 1527,
|
||||
"forks_count": 210,
|
||||
"forks": 210,
|
||||
"watchers": 1528,
|
||||
"watchers": 1527,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-27T12:27:53Z",
|
||||
"updated_at": "2020-01-28T02:15:41Z",
|
||||
"updated_at": "2020-01-28T07:47:26Z",
|
||||
"pushed_at": "2020-01-27T12:32:04Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T08:23:46Z",
|
||||
"updated_at": "2020-01-28T00:53:21Z",
|
||||
"updated_at": "2020-01-28T06:50:38Z",
|
||||
"pushed_at": "2020-01-27T05:46:40Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-01-27T06:25:16Z",
|
||||
"updated_at": "2020-01-28T03:14:08Z",
|
||||
"pushed_at": "2020-01-22T14:17:33Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-14T12:20:18Z",
|
||||
"updated_at": "2020-01-23T12:32:04Z",
|
||||
"updated_at": "2020-01-28T08:18:32Z",
|
||||
"pushed_at": "2020-01-17T10:10:31Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic_cve-2019-2888",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-28T06:10:44Z",
|
||||
"updated_at": "2020-01-05T12:23:19Z",
|
||||
"updated_at": "2020-01-28T08:37:09Z",
|
||||
"pushed_at": "2019-10-28T06:13:23Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Confluence Widget Connector path traversal (CVE-2019-3396)",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-09T06:20:51Z",
|
||||
"updated_at": "2019-12-13T12:20:19Z",
|
||||
"updated_at": "2020-01-28T08:05:08Z",
|
||||
"pushed_at": "2019-10-04T22:25:03Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 21,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2020-01-26T09:05:20Z",
|
||||
"updated_at": "2020-01-28T06:57:14Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 373,
|
||||
"watchers_count": 373,
|
||||
"stargazers_count": 374,
|
||||
"watchers_count": 374,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 373,
|
||||
"watchers": 374,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-01-28T02:18:50Z",
|
||||
"updated_at": "2020-01-28T07:22:37Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 127,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T03:52:49Z",
|
||||
"updated_at": "2020-01-27T17:26:47Z",
|
||||
"updated_at": "2020-01-28T07:22:57Z",
|
||||
"pushed_at": "2020-01-26T21:04:27Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T19:47:45Z",
|
||||
"updated_at": "2020-01-28T01:53:40Z",
|
||||
"updated_at": "2020-01-28T05:24:02Z",
|
||||
"pushed_at": "2020-01-26T12:58:05Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 36,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -899,6 +899,7 @@
|
|||
- [wenyu1999/bash-shellshock](https://github.com/wenyu1999/bash-shellshock)
|
||||
- [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271)
|
||||
- [Any3ite/CVE-2014-6271](https://github.com/Any3ite/CVE-2014-6271)
|
||||
- [somhm-solutions/Shell-Shock](https://github.com/somhm-solutions/Shell-Shock)
|
||||
|
||||
### CVE-2014-6287
|
||||
- [roughiz/cve-2014-6287.py](https://github.com/roughiz/cve-2014-6287.py)
|
||||
|
|
Loading…
Reference in a new issue