From 2d255dd674e178b2de25358187758c3417d51f40 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 28 Jan 2020 18:07:33 +0900 Subject: [PATCH] Auto Update 2020/01/28 18:07:33 --- 2014/CVE-2014-6271.json | 23 +++++++++++++++++++++++ 2018/CVE-2018-14847.json | 2 +- 2018/CVE-2018-8120.json | 8 ++++---- 2019/CVE-2019-0232.json | 8 ++++---- 2019/CVE-2019-11043.json | 8 ++++---- 2019/CVE-2019-1125.json | 8 ++++---- 2019/CVE-2019-14615.json | 8 ++++---- 2019/CVE-2019-19781.json | 8 ++++---- 2019/CVE-2019-2198.json | 8 ++++---- 2019/CVE-2019-2888.json | 8 ++++---- 2019/CVE-2019-3396.json | 8 ++++---- 2019/CVE-2019-5736.json | 8 ++++---- 2020/CVE-2020-0609.json | 32 ++++++++++++++++---------------- README.md | 1 + 14 files changed, 81 insertions(+), 57 deletions(-) diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index 7fa913dfa1..4db3664922 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1194,5 +1194,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 236683250, + "name": "Shell-Shock", + "full_name": "somhm-solutions\/Shell-Shock", + "owner": { + "login": "somhm-solutions", + "id": 56839517, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/56839517?v=4", + "html_url": "https:\/\/github.com\/somhm-solutions" + }, + "html_url": "https:\/\/github.com\/somhm-solutions\/Shell-Shock", + "description": "*CVE-2014-6271* Unix Arbitrary Code Execution Exploit commonly know as Shell Shock. Examples, Docs, Incident Response and Vulnerability\/Risk Assessment, and Additional Resources may be dumped here. Enjoy :) --- somhmxxghoul ---", + "fork": false, + "created_at": "2020-01-28T07:48:46Z", + "updated_at": "2020-01-28T07:50:28Z", + "pushed_at": "2020-01-28T07:50:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 65095c61d3..569e5b583a 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -128,7 +128,7 @@ "description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ", "fork": false, "created_at": "2019-05-26T12:26:55Z", - "updated_at": "2019-12-07T22:50:31Z", + "updated_at": "2020-01-28T07:46:33Z", "pushed_at": "2019-05-26T13:06:01Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 0cd4e910ca..470cb79685 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -36,13 +36,13 @@ "description": "CVE-2018-8120 Windows LPE exploit", "fork": false, "created_at": "2018-05-19T02:43:15Z", - "updated_at": "2020-01-08T05:59:02Z", + "updated_at": "2020-01-28T08:10:05Z", "pushed_at": "2018-05-30T13:09:54Z", - "stargazers_count": 422, - "watchers_count": 422, + "stargazers_count": 423, + "watchers_count": 423, "forks_count": 192, "forks": 192, - "watchers": 422, + "watchers": 423, "score": 0 }, { diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index 6fdf2790fb..67ede27485 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -13,13 +13,13 @@ "description": "Apache Tomcat Remote Code Execution on Windows", "fork": false, "created_at": "2019-04-15T07:54:25Z", - "updated_at": "2020-01-23T09:27:26Z", + "updated_at": "2020-01-28T05:17:34Z", "pushed_at": "2019-11-27T07:39:40Z", - "stargazers_count": 162, - "watchers_count": 162, + "stargazers_count": 163, + "watchers_count": 163, "forks_count": 44, "forks": 44, - "watchers": 162, + "watchers": 163, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 5c3dd4c7b4..ae6df6c3b0 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2020-01-27T17:29:39Z", + "updated_at": "2020-01-28T07:52:21Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1528, - "watchers_count": 1528, + "stargazers_count": 1527, + "watchers_count": 1527, "forks_count": 210, "forks": 210, - "watchers": 1528, + "watchers": 1527, "score": 0 }, { diff --git a/2019/CVE-2019-1125.json b/2019/CVE-2019-1125.json index 6f78ca4b17..5f758c3f82 100644 --- a/2019/CVE-2019-1125.json +++ b/2019/CVE-2019-1125.json @@ -13,13 +13,13 @@ "description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)", "fork": false, "created_at": "2020-01-27T12:27:53Z", - "updated_at": "2020-01-28T02:15:41Z", + "updated_at": "2020-01-28T07:47:26Z", "pushed_at": "2020-01-27T12:32:04Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 3, "forks": 3, - "watchers": 15, + "watchers": 18, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-14615.json b/2019/CVE-2019-14615.json index 3e928522ca..e4010f3fdd 100644 --- a/2019/CVE-2019-14615.json +++ b/2019/CVE-2019-14615.json @@ -13,13 +13,13 @@ "description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU", "fork": false, "created_at": "2020-01-18T08:23:46Z", - "updated_at": "2020-01-28T00:53:21Z", + "updated_at": "2020-01-28T06:50:38Z", "pushed_at": "2020-01-27T05:46:40Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 7, "forks": 7, - "watchers": 31, + "watchers": 32, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 1173150253..9deb5c8af9 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -151,13 +151,13 @@ "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "fork": false, "created_at": "2020-01-11T09:49:17Z", - "updated_at": "2020-01-27T06:25:16Z", + "updated_at": "2020-01-28T03:14:08Z", "pushed_at": "2020-01-22T14:17:33Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "forks_count": 13, "forks": 13, - "watchers": 67, + "watchers": 68, "score": 0 }, { diff --git a/2019/CVE-2019-2198.json b/2019/CVE-2019-2198.json index 2f3bd2336b..8726a053de 100644 --- a/2019/CVE-2019-2198.json +++ b/2019/CVE-2019-2198.json @@ -13,13 +13,13 @@ "description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)", "fork": false, "created_at": "2020-01-14T12:20:18Z", - "updated_at": "2020-01-23T12:32:04Z", + "updated_at": "2020-01-28T08:18:32Z", "pushed_at": "2020-01-17T10:10:31Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "forks_count": 13, "forks": 13, - "watchers": 24, + "watchers": 25, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2888.json b/2019/CVE-2019-2888.json index 94b03667f4..8b02c8b85a 100644 --- a/2019/CVE-2019-2888.json +++ b/2019/CVE-2019-2888.json @@ -13,13 +13,13 @@ "description": "weblogic_cve-2019-2888", "fork": false, "created_at": "2019-10-28T06:10:44Z", - "updated_at": "2020-01-05T12:23:19Z", + "updated_at": "2020-01-28T08:37:09Z", "pushed_at": "2019-10-28T06:13:23Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 7, "forks": 7, - "watchers": 28, + "watchers": 29, "score": 0 }, { diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index cda5a90416..0d50a52158 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -36,13 +36,13 @@ "description": "Confluence Widget Connector path traversal (CVE-2019-3396)", "fork": false, "created_at": "2019-04-09T06:20:51Z", - "updated_at": "2019-12-13T12:20:19Z", + "updated_at": "2020-01-28T08:05:08Z", "pushed_at": "2019-10-04T22:25:03Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 15, "forks": 15, - "watchers": 21, + "watchers": 20, "score": 0 }, { diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index be0920efd4..c551c947b7 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -36,13 +36,13 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2020-01-26T09:05:20Z", + "updated_at": "2020-01-28T06:57:14Z", "pushed_at": "2019-02-19T11:45:13Z", - "stargazers_count": 373, - "watchers_count": 373, + "stargazers_count": 374, + "watchers_count": 374, "forks_count": 88, "forks": 88, - "watchers": 373, + "watchers": 374, "score": 0 }, { diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index ff6f638153..4718580c22 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -36,13 +36,13 @@ "description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE", "fork": false, "created_at": "2020-01-23T22:29:46Z", - "updated_at": "2020-01-28T02:18:50Z", + "updated_at": "2020-01-28T07:22:37Z", "pushed_at": "2020-01-24T15:21:06Z", - "stargazers_count": 127, - "watchers_count": 127, - "forks_count": 25, - "forks": 25, - "watchers": 127, + "stargazers_count": 130, + "watchers_count": 130, + "forks_count": 27, + "forks": 27, + "watchers": 130, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.", "fork": false, "created_at": "2020-01-24T03:52:49Z", - "updated_at": "2020-01-27T17:26:47Z", + "updated_at": "2020-01-28T07:22:57Z", "pushed_at": "2020-01-26T21:04:27Z", - "stargazers_count": 48, - "watchers_count": 48, - "forks_count": 11, - "forks": 11, - "watchers": 48, + "stargazers_count": 49, + "watchers_count": 49, + "forks_count": 12, + "forks": 12, + "watchers": 49, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610", "fork": false, "created_at": "2020-01-24T19:47:45Z", - "updated_at": "2020-01-28T01:53:40Z", + "updated_at": "2020-01-28T05:24:02Z", "pushed_at": "2020-01-26T12:58:05Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 38, + "watchers_count": 38, "forks_count": 6, "forks": 6, - "watchers": 36, + "watchers": 38, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index a8b3cdc778..3484393833 100644 --- a/README.md +++ b/README.md @@ -899,6 +899,7 @@ - [wenyu1999/bash-shellshock](https://github.com/wenyu1999/bash-shellshock) - [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271) - [Any3ite/CVE-2014-6271](https://github.com/Any3ite/CVE-2014-6271) +- [somhm-solutions/Shell-Shock](https://github.com/somhm-solutions/Shell-Shock) ### CVE-2014-6287 - [roughiz/cve-2014-6287.py](https://github.com/roughiz/cve-2014-6287.py)