Auto Update 2020/03/16 12:07:41

This commit is contained in:
motikan2010-bot 2020-03-16 12:07:41 +09:00
parent 122b439b25
commit e6f48f1efb
32 changed files with 206 additions and 149 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-15T03:26:52Z",
"updated_at": "2020-03-16T01:58:32Z",
"pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 61,
"forks": 61,
"watchers": 271,
"watchers": 272,
"score": 0
}
]

View file

@ -1217,28 +1217,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247497904,
"name": "xShock",
"full_name": "capture0x\/xShock",
"owner": {
"login": "capture0x",
"id": 61238348,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/61238348?v=4",
"html_url": "https:\/\/github.com\/capture0x"
},
"html_url": "https:\/\/github.com\/capture0x\/xShock",
"description": "xShock ShellShock (CVE-2014-6271)",
"fork": false,
"created_at": "2020-03-15T15:48:12Z",
"updated_at": "2020-03-15T21:00:14Z",
"pushed_at": "2020-03-15T21:00:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-15T03:26:52Z",
"updated_at": "2020-03-16T01:58:32Z",
"pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 61,
"forks": 61,
"watchers": 271,
"watchers": 272,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 613,
"watchers_count": 613,
"forks_count": 274,
"forks": 274,
"forks_count": 275,
"forks": 275,
"watchers": 613,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-12-22T22:52:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-18T16:31:07Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 5,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-15T03:26:52Z",
"updated_at": "2020-03-16T01:58:32Z",
"pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 61,
"forks": 61,
"watchers": 271,
"watchers": 272,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-01-25T03:29:30Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 40,
"score": 0
}

View file

@ -1,6 +1,6 @@
[
{
"id": 244543720,
"id": 247577930,
"name": "CVE-2018-17873",
"full_name": "Luct0r\/CVE-2018-17873",
"owner": {
@ -12,9 +12,9 @@
"html_url": "https:\/\/github.com\/Luct0r\/CVE-2018-17873",
"description": "WiFiRanger 7.0.8rc3 Incorrect Access Control - Privilege Escalation",
"fork": false,
"created_at": "2020-03-03T04:45:09Z",
"updated_at": "2020-03-05T21:38:37Z",
"pushed_at": "2020-03-05T21:38:35Z",
"created_at": "2020-03-16T00:44:28Z",
"updated_at": "2020-03-16T00:44:28Z",
"pushed_at": "2020-03-16T00:44:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-11-26T22:39:08Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 10,
"score": 0
}

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-15T03:26:52Z",
"updated_at": "2020-03-16T01:58:32Z",
"pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 61,
"forks": 61,
"watchers": 271,
"watchers": 272,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2018-02-09T22:09:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 0,
"score": 0
},

View file

@ -132,8 +132,8 @@
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 32,
"forks": 32,
"forks_count": 33,
"forks": 33,
"watchers": 63,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2020-03-13T12:19:45Z",
"updated_at": "2020-03-15T21:27:38Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 17,
"forks": 17,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-12-22T19:14:05Z",
"updated_at": "2020-03-15T11:39:08Z",
"updated_at": "2020-03-16T02:14:18Z",
"pushed_at": "2019-12-22T19:18:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-13498",
"fork": false,
"created_at": "2019-08-02T21:22:23Z",
"updated_at": "2019-11-10T20:58:42Z",
"updated_at": "2020-03-16T02:30:51Z",
"pushed_at": "2019-11-10T20:58:40Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

25
2019/CVE-2019-13956.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 247585587,
"name": "CVE-2019-13956",
"full_name": "rhbb\/CVE-2019-13956",
"owner": {
"login": "rhbb",
"id": 62225834,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62225834?v=4",
"html_url": "https:\/\/github.com\/rhbb"
},
"html_url": "https:\/\/github.com\/rhbb\/CVE-2019-13956",
"description": null,
"fork": false,
"created_at": "2020-03-16T01:43:04Z",
"updated_at": "2020-03-16T01:47:44Z",
"pushed_at": "2020-03-16T01:47:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2020-03-14T07:36:17Z",
"updated_at": "2020-03-16T01:35:30Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 8,
"forks": 8,
"watchers": 46,
"watchers": 47,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-15T03:26:52Z",
"updated_at": "2020-03-16T01:58:32Z",
"pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 61,
"forks": 61,
"watchers": 271,
"watchers": 272,
"score": 0
}
]

View file

@ -174,7 +174,7 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-03-15T19:01:24Z",
"updated_at": "2020-03-16T03:00:19Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 312,
"watchers_count": 312,

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-12-06T09:18:56Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 19,
"forks": 19,
"forks_count": 20,
"forks": 20,
"watchers": 75,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-19T20:25:31Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 18,
"score": 0
},

View file

@ -132,8 +132,8 @@
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 787,
"watchers_count": 787,
"forks_count": 195,
"forks": 195,
"forks_count": 196,
"forks": 196,
"watchers": 787,
"score": 0
},
@ -473,13 +473,13 @@
"description": "CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall\/ChainOfFools)",
"fork": false,
"created_at": "2020-01-23T18:26:48Z",
"updated_at": "2020-02-25T01:48:23Z",
"updated_at": "2020-03-15T21:32:59Z",
"pushed_at": "2020-01-28T10:11:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 51,
"forks": 51,
"forks_count": 52,
"forks": 52,
"watchers": 192,
"score": 0
},
@ -63,8 +63,8 @@
"pushed_at": "2020-01-26T21:04:27Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 23,
"forks": 23,
"forks_count": 24,
"forks": 24,
"watchers": 63,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-03-15T19:01:26Z",
"updated_at": "2020-03-16T02:11:48Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"forks_count": 32,
"forks": 32,
"watchers": 149,
"watchers": 150,
"score": 0
},
{

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-03-14T06:12:53Z",
"updated_at": "2020-03-16T01:08:36Z",
"pushed_at": "2020-03-01T12:58:01Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"forks_count": 36,
"forks": 36,
"watchers": 121,
"watchers": 122,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
"fork": false,
"created_at": "2020-03-11T06:51:58Z",
"updated_at": "2020-03-15T15:58:57Z",
"updated_at": "2020-03-16T03:00:31Z",
"pushed_at": "2020-03-13T00:50:55Z",
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 30,
"forks": 30,
"watchers": 120,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 31,
"forks": 31,
"watchers": 125,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-03-15T14:44:49Z",
"updated_at": "2020-03-16T03:05:23Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 90,
"forks": 90,
"watchers": 336,
"stargazers_count": 347,
"watchers_count": 347,
"forks_count": 94,
"forks": 94,
"watchers": 347,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
"fork": false,
"created_at": "2020-03-11T16:23:03Z",
"updated_at": "2020-03-12T21:40:33Z",
"updated_at": "2020-03-16T01:58:02Z",
"pushed_at": "2020-03-11T22:50:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -404,13 +404,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-03-15T19:07:54Z",
"updated_at": "2020-03-16T03:08:08Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 35,
"forks": 35,
"watchers": 91,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 38,
"forks": 38,
"watchers": 106,
"score": 0
},
{
@ -450,13 +450,13 @@
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
"fork": false,
"created_at": "2020-03-12T19:33:18Z",
"updated_at": "2020-03-15T18:30:21Z",
"updated_at": "2020-03-16T01:25:59Z",
"pushed_at": "2020-03-13T07:38:43Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,
"forks": 7,
"watchers": 14,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 8,
"forks": 8,
"watchers": 16,
"score": 0
},
{
@ -703,13 +703,13 @@
"description": "Exploiter la vulnérabilité CVE-2020-0796, Remote Code Execution du protocole SMB 3.1.1 (SMBv3).",
"fork": false,
"created_at": "2020-03-14T16:17:02Z",
"updated_at": "2020-03-14T17:14:13Z",
"updated_at": "2020-03-16T02:01:11Z",
"pushed_at": "2020-03-14T17:14:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -726,13 +726,13 @@
"description": "基于asyncio协程的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。",
"fork": false,
"created_at": "2020-03-14T23:39:25Z",
"updated_at": "2020-03-15T18:58:30Z",
"updated_at": "2020-03-16T00:20:54Z",
"pushed_at": "2020-03-14T23:59:10Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -757,5 +757,51 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 247561192,
"name": "Unauthenticated-CVE-2020-0796-PoC",
"full_name": "maxpl0it\/Unauthenticated-CVE-2020-0796-PoC",
"owner": {
"login": "maxpl0it",
"id": 27973683,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27973683?v=4",
"html_url": "https:\/\/github.com\/maxpl0it"
},
"html_url": "https:\/\/github.com\/maxpl0it\/Unauthenticated-CVE-2020-0796-PoC",
"description": "An unauthenticated PoC for CVE-2020-0796",
"fork": false,
"created_at": "2020-03-15T22:17:50Z",
"updated_at": "2020-03-15T23:33:13Z",
"pushed_at": "2020-03-15T22:20:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 247578292,
"name": "CVE-2020-0796-PoC-and-Scan",
"full_name": "ran-sama\/CVE-2020-0796-PoC-and-Scan",
"owner": {
"login": "ran-sama",
"id": 31311154,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/31311154?v=4",
"html_url": "https:\/\/github.com\/ran-sama"
},
"html_url": "https:\/\/github.com\/ran-sama\/CVE-2020-0796-PoC-and-Scan",
"description": "Lightweight PoC and Scanner for CVE-2020-0796 without authentication.",
"fork": false,
"created_at": "2020-03-16T00:47:41Z",
"updated_at": "2020-03-16T01:12:14Z",
"pushed_at": "2020-03-16T01:06:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-13T14:22:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-02T20:25:35Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 18,
"forks": 18,
"forks_count": 19,
"forks": 19,
"watchers": 28,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-03-15T03:26:52Z",
"updated_at": "2020-03-16T01:58:32Z",
"pushed_at": "2020-03-07T13:15:39Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 61,
"forks": 61,
"watchers": 271,
"watchers": 272,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2020-03-14T18:24:43Z",
"updated_at": "2020-03-16T02:36:48Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"watchers": 10,
"score": 0
}
]

View file

@ -187,6 +187,8 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [miraizeroday/CVE-2020-0796](https://github.com/miraizeroday/CVE-2020-0796)
- [GuoKerS/aioScan_CVE-2020-0796](https://github.com/GuoKerS/aioScan_CVE-2020-0796)
- [jiansiting/CVE-2020-0796-Scanner](https://github.com/jiansiting/CVE-2020-0796-Scanner)
- [maxpl0it/Unauthenticated-CVE-2020-0796-PoC](https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC)
- [ran-sama/CVE-2020-0796-PoC-and-Scan](https://github.com/ran-sama/CVE-2020-0796-PoC-and-Scan)
### CVE-2020-0976
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
@ -1732,6 +1734,14 @@ An elevation of privilege vulnerability exists in the Windows Certificate Dialog
- [jaychouzzk/CVE-2019-1388](https://github.com/jaychouzzk/CVE-2019-1388)
- [sv3nbeast/CVE-2019-1388](https://github.com/sv3nbeast/CVE-2019-1388)
### CVE-2019-13956
<code>
Discuz!ML 3.2 through 3.4 allows remote attackers to execute arbitrary PHP code via a modified language cookie, as demonstrated by changing 4gH4_0df5_language=en to 4gH4_0df5_language=en'.phpinfo().'; (if the random prefix 4gH4_0df5_ were used).
</code>
- [rhbb/CVE-2019-13956](https://github.com/rhbb/CVE-2019-13956)
### CVE-2019-1402
<code>
@ -11098,7 +11108,6 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271)
- [Any3ite/CVE-2014-6271](https://github.com/Any3ite/CVE-2014-6271)
- [somhm-solutions/Shell-Shock](https://github.com/somhm-solutions/Shell-Shock)
- [capture0x/xShock](https://github.com/capture0x/xShock)
### CVE-2014-6287