Auto Update 2020/01/28 18:07:33

This commit is contained in:
motikan2010-bot 2020-01-28 18:07:33 +09:00
parent 8f5526b5bd
commit 2d255dd674
14 changed files with 81 additions and 57 deletions

View file

@ -1194,5 +1194,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 236683250,
"name": "Shell-Shock",
"full_name": "somhm-solutions\/Shell-Shock",
"owner": {
"login": "somhm-solutions",
"id": 56839517,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/56839517?v=4",
"html_url": "https:\/\/github.com\/somhm-solutions"
},
"html_url": "https:\/\/github.com\/somhm-solutions\/Shell-Shock",
"description": "*CVE-2014-6271* Unix Arbitrary Code Execution Exploit commonly know as Shell Shock. Examples, Docs, Incident Response and Vulnerability\/Risk Assessment, and Additional Resources may be dumped here. Enjoy :) --- somhmxxghoul ---",
"fork": false,
"created_at": "2020-01-28T07:48:46Z",
"updated_at": "2020-01-28T07:50:28Z",
"pushed_at": "2020-01-28T07:50:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -128,7 +128,7 @@
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
"fork": false,
"created_at": "2019-05-26T12:26:55Z",
"updated_at": "2019-12-07T22:50:31Z",
"updated_at": "2020-01-28T07:46:33Z",
"pushed_at": "2019-05-26T13:06:01Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2020-01-08T05:59:02Z",
"updated_at": "2020-01-28T08:10:05Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 422,
"watchers_count": 422,
"stargazers_count": 423,
"watchers_count": 423,
"forks_count": 192,
"forks": 192,
"watchers": 422,
"watchers": 423,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat Remote Code Execution on Windows",
"fork": false,
"created_at": "2019-04-15T07:54:25Z",
"updated_at": "2020-01-23T09:27:26Z",
"updated_at": "2020-01-28T05:17:34Z",
"pushed_at": "2019-11-27T07:39:40Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 44,
"forks": 44,
"watchers": 162,
"watchers": 163,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-01-27T17:29:39Z",
"updated_at": "2020-01-28T07:52:21Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1528,
"watchers_count": 1528,
"stargazers_count": 1527,
"watchers_count": 1527,
"forks_count": 210,
"forks": 210,
"watchers": 1528,
"watchers": 1527,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)",
"fork": false,
"created_at": "2020-01-27T12:27:53Z",
"updated_at": "2020-01-28T02:15:41Z",
"updated_at": "2020-01-28T07:47:26Z",
"pushed_at": "2020-01-27T12:32:04Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks": 3,
"watchers": 15,
"watchers": 18,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU",
"fork": false,
"created_at": "2020-01-18T08:23:46Z",
"updated_at": "2020-01-28T00:53:21Z",
"updated_at": "2020-01-28T06:50:38Z",
"pushed_at": "2020-01-27T05:46:40Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 7,
"forks": 7,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2020-01-27T06:25:16Z",
"updated_at": "2020-01-28T03:14:08Z",
"pushed_at": "2020-01-22T14:17:33Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 13,
"forks": 13,
"watchers": 67,
"watchers": 68,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)",
"fork": false,
"created_at": "2020-01-14T12:20:18Z",
"updated_at": "2020-01-23T12:32:04Z",
"updated_at": "2020-01-28T08:18:32Z",
"pushed_at": "2020-01-17T10:10:31Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 13,
"forks": 13,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic_cve-2019-2888",
"fork": false,
"created_at": "2019-10-28T06:10:44Z",
"updated_at": "2020-01-05T12:23:19Z",
"updated_at": "2020-01-28T08:37:09Z",
"pushed_at": "2019-10-28T06:13:23Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 7,
"forks": 7,
"watchers": 28,
"watchers": 29,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Confluence Widget Connector path traversal (CVE-2019-3396)",
"fork": false,
"created_at": "2019-04-09T06:20:51Z",
"updated_at": "2019-12-13T12:20:19Z",
"updated_at": "2020-01-28T08:05:08Z",
"pushed_at": "2019-10-04T22:25:03Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 15,
"forks": 15,
"watchers": 21,
"watchers": 20,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2020-01-26T09:05:20Z",
"updated_at": "2020-01-28T06:57:14Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 373,
"watchers_count": 373,
"stargazers_count": 374,
"watchers_count": 374,
"forks_count": 88,
"forks": 88,
"watchers": 373,
"watchers": 374,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
"updated_at": "2020-01-28T02:18:50Z",
"updated_at": "2020-01-28T07:22:37Z",
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 25,
"forks": 25,
"watchers": 127,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 27,
"forks": 27,
"watchers": 130,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
"fork": false,
"created_at": "2020-01-24T03:52:49Z",
"updated_at": "2020-01-27T17:26:47Z",
"updated_at": "2020-01-28T07:22:57Z",
"pushed_at": "2020-01-26T21:04:27Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 11,
"forks": 11,
"watchers": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 12,
"forks": 12,
"watchers": 49,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
"fork": false,
"created_at": "2020-01-24T19:47:45Z",
"updated_at": "2020-01-28T01:53:40Z",
"updated_at": "2020-01-28T05:24:02Z",
"pushed_at": "2020-01-26T12:58:05Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 6,
"forks": 6,
"watchers": 36,
"watchers": 38,
"score": 0
}
]

View file

@ -899,6 +899,7 @@
- [wenyu1999/bash-shellshock](https://github.com/wenyu1999/bash-shellshock)
- [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271)
- [Any3ite/CVE-2014-6271](https://github.com/Any3ite/CVE-2014-6271)
- [somhm-solutions/Shell-Shock](https://github.com/somhm-solutions/Shell-Shock)
### CVE-2014-6287
- [roughiz/cve-2014-6287.py](https://github.com/roughiz/cve-2014-6287.py)