mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/01/02 00:09:36
This commit is contained in:
parent
40f2912f99
commit
0aae27907a
261 changed files with 14609 additions and 111 deletions
|
@ -67,51 +67,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 247077498,
|
||||
"name": "CVE-2003-0264-SLmail-5.5",
|
||||
"full_name": "pwncone\/CVE-2003-0264-SLmail-5.5",
|
||||
"owner": {
|
||||
"login": "pwncone",
|
||||
"id": 57570315,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/57570315?v=4",
|
||||
"html_url": "https:\/\/github.com\/pwncone"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
|
||||
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T13:27:56Z",
|
||||
"updated_at": "2020-03-13T13:31:38Z",
|
||||
"pushed_at": "2020-03-13T13:31:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323381650,
|
||||
"name": "CVE-2003-0264",
|
||||
"full_name": "PepeTheRital\/CVE-2003-0264",
|
||||
"owner": {
|
||||
"login": "PepeTheRital",
|
||||
"id": 65770864,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/65770864?v=4",
|
||||
"html_url": "https:\/\/github.com\/PepeTheRital"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PepeTheRital\/CVE-2003-0264",
|
||||
"description": "Exploit CVE-2003-0264 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T15:52:32Z",
|
||||
"updated_at": "2020-12-21T15:58:48Z",
|
||||
"pushed_at": "2020-12-21T15:58:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2007/CVE-2007-1858.json
Normal file
25
2007/CVE-2007-1858.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 325974459,
|
||||
"name": "A2SV--SSL-VUL-Scan",
|
||||
"full_name": "nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"owner": {
|
||||
"login": "nyctophile6",
|
||||
"id": 75995332,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/75995332?v=4",
|
||||
"html_url": "https:\/\/github.com\/nyctophile6"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-01T12:26:08Z",
|
||||
"updated_at": "2021-01-01T12:26:12Z",
|
||||
"pushed_at": "2021-01-01T12:26:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 325974459,
|
||||
"name": "A2SV--SSL-VUL-Scan",
|
||||
"full_name": "nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"owner": {
|
||||
"login": "nyctophile6",
|
||||
"id": 75995332,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/75995332?v=4",
|
||||
"html_url": "https:\/\/github.com\/nyctophile6"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-01T12:26:08Z",
|
||||
"updated_at": "2021-01-01T12:26:12Z",
|
||||
"pushed_at": "2021-01-01T12:26:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1194,5 +1194,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 325974459,
|
||||
"name": "A2SV--SSL-VUL-Scan",
|
||||
"full_name": "nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"owner": {
|
||||
"login": "nyctophile6",
|
||||
"id": 75995332,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/75995332?v=4",
|
||||
"html_url": "https:\/\/github.com\/nyctophile6"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-01T12:26:08Z",
|
||||
"updated_at": "2021-01-01T12:26:12Z",
|
||||
"pushed_at": "2021-01-01T12:26:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 325974459,
|
||||
"name": "A2SV--SSL-VUL-Scan",
|
||||
"full_name": "nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"owner": {
|
||||
"login": "nyctophile6",
|
||||
"id": 75995332,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/75995332?v=4",
|
||||
"html_url": "https:\/\/github.com\/nyctophile6"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-01T12:26:08Z",
|
||||
"updated_at": "2021-01-01T12:26:12Z",
|
||||
"pushed_at": "2021-01-01T12:26:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2016/CVE-2016-0800.json
Normal file
25
2016/CVE-2016-0800.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 325974459,
|
||||
"name": "A2SV--SSL-VUL-Scan",
|
||||
"full_name": "nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"owner": {
|
||||
"login": "nyctophile6",
|
||||
"id": 75995332,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/75995332?v=4",
|
||||
"html_url": "https:\/\/github.com\/nyctophile6"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nyctophile6\/A2SV--SSL-VUL-Scan",
|
||||
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-01T12:26:08Z",
|
||||
"updated_at": "2021-01-01T12:26:12Z",
|
||||
"pushed_at": "2021-01-01T12:26:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 139,
|
||||
"forks": 139,
|
||||
"forks_count": 140,
|
||||
"forks": 140,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2017/CVE-2017-0038.json
Normal file
25
2017/CVE-2017-0038.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 85834314,
|
||||
"name": "CVE-2017-0038-EXP-C-JS",
|
||||
"full_name": "k0keoyo\/CVE-2017-0038-EXP-C-JS",
|
||||
"owner": {
|
||||
"login": "k0keoyo",
|
||||
"id": 13257929,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13257929?v=4",
|
||||
"html_url": "https:\/\/github.com\/k0keoyo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k0keoyo\/CVE-2017-0038-EXP-C-JS",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-22T13:59:48Z",
|
||||
"updated_at": "2019-09-13T11:40:59Z",
|
||||
"pushed_at": "2017-03-23T14:07:37Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-0065.json
Normal file
25
2017/CVE-2017-0065.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 85072866,
|
||||
"name": "cve-2017-0065",
|
||||
"full_name": "Dankirk\/cve-2017-0065",
|
||||
"owner": {
|
||||
"login": "Dankirk",
|
||||
"id": 10588760,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10588760?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dankirk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dankirk\/cve-2017-0065",
|
||||
"description": "Exploiting Edge's read:\/\/ urlhandler",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-15T13:01:29Z",
|
||||
"updated_at": "2019-10-26T13:38:33Z",
|
||||
"pushed_at": "2020-10-01T04:14:25Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-0106.json
Normal file
25
2017/CVE-2017-0106.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 88117539,
|
||||
"name": "CVE-2017-0106",
|
||||
"full_name": "ryhanson\/CVE-2017-0106",
|
||||
"owner": {
|
||||
"login": "ryhanson",
|
||||
"id": 3486433,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
|
||||
"html_url": "https:\/\/github.com\/ryhanson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0106",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T02:42:08Z",
|
||||
"updated_at": "2017-04-13T02:42:08Z",
|
||||
"pushed_at": "2017-04-13T02:42:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-0108.json
Normal file
25
2017/CVE-2017-0108.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 88317204,
|
||||
"name": "CVE-2017-0108",
|
||||
"full_name": "homjxi0e\/CVE-2017-0108",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-0108",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-15T02:10:16Z",
|
||||
"updated_at": "2017-12-04T20:08:18Z",
|
||||
"pushed_at": "2017-04-15T02:16:09Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 91496993,
|
||||
"name": "wannafind",
|
||||
"full_name": "valarauco\/wannafind",
|
||||
"owner": {
|
||||
"login": "valarauco",
|
||||
"id": 434898,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/434898?v=4",
|
||||
"html_url": "https:\/\/github.com\/valarauco"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/valarauco\/wannafind",
|
||||
"description": "Simple script using nmap to detect CVE-2017-0143 MS17-010 in your network",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-16T19:34:38Z",
|
||||
"updated_at": "2017-12-06T14:25:10Z",
|
||||
"pushed_at": "2017-05-26T17:28:09Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 301944849,
|
||||
"name": "Etern-blue-Windows-7-Checker",
|
||||
|
|
25
2017/CVE-2017-0145.json
Normal file
25
2017/CVE-2017-0145.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 91811261,
|
||||
"name": "chef_tissues",
|
||||
"full_name": "MelonSmasher\/chef_tissues",
|
||||
"owner": {
|
||||
"login": "MelonSmasher",
|
||||
"id": 1491053,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1491053?v=4",
|
||||
"html_url": "https:\/\/github.com\/MelonSmasher"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MelonSmasher\/chef_tissues",
|
||||
"description": "Install patch for CVE-2017-0145 AKA WannaCry.",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-19T13:55:06Z",
|
||||
"updated_at": "2018-04-04T01:07:21Z",
|
||||
"pushed_at": "2017-05-19T16:49:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,372 @@
|
|||
[
|
||||
{
|
||||
"id": 88117490,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "ryhanson\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "ryhanson",
|
||||
"id": 3486433,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
|
||||
"html_url": "https:\/\/github.com\/ryhanson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T02:41:36Z",
|
||||
"updated_at": "2017-04-13T02:41:36Z",
|
||||
"pushed_at": "2017-04-13T02:41:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88185964,
|
||||
"name": "cve-2017-0199",
|
||||
"full_name": "SyFi\/cve-2017-0199",
|
||||
"owner": {
|
||||
"login": "SyFi",
|
||||
"id": 26314806,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
|
||||
"html_url": "https:\/\/github.com\/SyFi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SyFi\/cve-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T16:40:27Z",
|
||||
"updated_at": "2019-12-06T00:55:16Z",
|
||||
"pushed_at": "2017-04-13T16:45:10Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88486475,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "bhdresh\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "bhdresh",
|
||||
"id": 8931885,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8931885?v=4",
|
||||
"html_url": "https:\/\/github.com\/bhdresh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-0199",
|
||||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2020-12-30T20:45:13Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 637,
|
||||
"watchers_count": 637,
|
||||
"forks_count": 283,
|
||||
"forks": 283,
|
||||
"watchers": 637,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88590374,
|
||||
"name": "CVE-2017-0199-Fix",
|
||||
"full_name": "NotAwful\/CVE-2017-0199-Fix",
|
||||
"owner": {
|
||||
"login": "NotAwful",
|
||||
"id": 25178947,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25178947?v=4",
|
||||
"html_url": "https:\/\/github.com\/NotAwful"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NotAwful\/CVE-2017-0199-Fix",
|
||||
"description": "Quick and dirty fix to OLE2 executing code via .hta",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-18T06:33:45Z",
|
||||
"updated_at": "2018-03-18T10:23:47Z",
|
||||
"pushed_at": "2017-04-24T20:48:36Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88700030,
|
||||
"name": "CVE-2017-0199-master",
|
||||
"full_name": "haibara3839\/CVE-2017-0199-master",
|
||||
"owner": {
|
||||
"login": "haibara3839",
|
||||
"id": 17246565,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17246565?v=4",
|
||||
"html_url": "https:\/\/github.com\/haibara3839"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/haibara3839\/CVE-2017-0199-master",
|
||||
"description": "CVE-2017-0199",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-19T04:15:54Z",
|
||||
"updated_at": "2020-08-13T13:59:18Z",
|
||||
"pushed_at": "2017-04-19T04:25:47Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89043209,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "Exploit-install\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "Exploit-install",
|
||||
"id": 13824191,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/13824191?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploit-install"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploit-install\/CVE-2017-0199",
|
||||
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-22T04:01:38Z",
|
||||
"updated_at": "2020-04-07T06:30:43Z",
|
||||
"pushed_at": "2017-04-22T04:01:54Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89065031,
|
||||
"name": "PoC-CVE-2017-0199",
|
||||
"full_name": "zakybstrd21215\/PoC-CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "zakybstrd21215",
|
||||
"id": 22362343,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4",
|
||||
"html_url": "https:\/\/github.com\/zakybstrd21215"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-0199",
|
||||
"description": "Exploit toolkit for vulnerability RCE Microsoft RTF",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-22T11:32:39Z",
|
||||
"updated_at": "2019-02-02T15:31:28Z",
|
||||
"pushed_at": "2017-04-22T11:35:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89145802,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "n1shant-sinha\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "n1shant-sinha",
|
||||
"id": 8848453,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8848453?v=4",
|
||||
"html_url": "https:\/\/github.com\/n1shant-sinha"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n1shant-sinha\/CVE-2017-0199",
|
||||
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-23T13:58:30Z",
|
||||
"updated_at": "2018-10-18T14:32:17Z",
|
||||
"pushed_at": "2017-04-23T14:05:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89296859,
|
||||
"name": "htattack",
|
||||
"full_name": "kn0wm4d\/htattack",
|
||||
"owner": {
|
||||
"login": "kn0wm4d",
|
||||
"id": 15344287,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15344287?v=4",
|
||||
"html_url": "https:\/\/github.com\/kn0wm4d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kn0wm4d\/htattack",
|
||||
"description": "An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-24T23:44:31Z",
|
||||
"updated_at": "2020-08-29T04:54:33Z",
|
||||
"pushed_at": "2017-04-24T23:45:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89314149,
|
||||
"name": "Cve-2017-0199",
|
||||
"full_name": "joke998\/Cve-2017-0199",
|
||||
"owner": {
|
||||
"login": "joke998",
|
||||
"id": 25948923,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4",
|
||||
"html_url": "https:\/\/github.com\/joke998"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-25T03:38:15Z",
|
||||
"updated_at": "2017-04-25T03:38:15Z",
|
||||
"pushed_at": "2017-04-25T03:38:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89314954,
|
||||
"name": "Cve-2017-0199-",
|
||||
"full_name": "joke998\/Cve-2017-0199-",
|
||||
"owner": {
|
||||
"login": "joke998",
|
||||
"id": 25948923,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4",
|
||||
"html_url": "https:\/\/github.com\/joke998"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199-",
|
||||
"description": "Cve-2017-0199",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-25T03:48:53Z",
|
||||
"updated_at": "2017-04-25T03:48:53Z",
|
||||
"pushed_at": "2017-04-25T03:48:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 95870771,
|
||||
"name": "Microsoft-Word-CVE-2017-0199-",
|
||||
"full_name": "sUbc0ol\/Microsoft-Word-CVE-2017-0199-",
|
||||
"owner": {
|
||||
"login": "sUbc0ol",
|
||||
"id": 24601456,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
|
||||
"html_url": "https:\/\/github.com\/sUbc0ol"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sUbc0ol\/Microsoft-Word-CVE-2017-0199-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-06-30T09:08:40Z",
|
||||
"updated_at": "2020-03-26T07:51:03Z",
|
||||
"pushed_at": "2017-06-30T09:11:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104072875,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "viethdgit\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "viethdgit",
|
||||
"id": 24888568,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24888568?v=4",
|
||||
"html_url": "https:\/\/github.com\/viethdgit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/viethdgit\/CVE-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-19T12:38:47Z",
|
||||
"updated_at": "2017-09-19T12:38:47Z",
|
||||
"pushed_at": "2017-09-19T12:47:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 109420190,
|
||||
"name": "RTF-Cleaner",
|
||||
"full_name": "nicpenning\/RTF-Cleaner",
|
||||
"owner": {
|
||||
"login": "nicpenning",
|
||||
"id": 5582679,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5582679?v=4",
|
||||
"html_url": "https:\/\/github.com\/nicpenning"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner",
|
||||
"description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-03T16:47:16Z",
|
||||
"updated_at": "2019-06-29T16:49:45Z",
|
||||
"pushed_at": "2017-11-03T20:55:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111145351,
|
||||
"name": "2017-11-17-Maldoc-Using-CVE-2017-0199",
|
||||
"full_name": "bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "bloomer1016",
|
||||
"id": 12056770,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12056770?v=4",
|
||||
"html_url": "https:\/\/github.com\/bloomer1016"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-17T20:00:29Z",
|
||||
"updated_at": "2020-03-29T03:29:38Z",
|
||||
"pushed_at": "2017-11-17T20:00:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 113558617,
|
||||
"name": "RTF-Cleaner",
|
||||
"full_name": "jacobsoo\/RTF-Cleaner",
|
||||
"owner": {
|
||||
"login": "jacobsoo",
|
||||
"id": 3516693,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3516693?v=4",
|
||||
"html_url": "https:\/\/github.com\/jacobsoo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jacobsoo\/RTF-Cleaner",
|
||||
"description": "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-08T09:45:25Z",
|
||||
"updated_at": "2018-02-21T04:37:47Z",
|
||||
"pushed_at": "2017-12-08T09:46:07Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 126305253,
|
||||
"name": "CVE-2017-0199",
|
||||
|
|
25
2017/CVE-2017-0204.json
Normal file
25
2017/CVE-2017-0204.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 88117558,
|
||||
"name": "CVE-2017-0204",
|
||||
"full_name": "ryhanson\/CVE-2017-0204",
|
||||
"owner": {
|
||||
"login": "ryhanson",
|
||||
"id": 3486433,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
|
||||
"html_url": "https:\/\/github.com\/ryhanson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0204",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T02:42:24Z",
|
||||
"updated_at": "2017-04-13T03:12:29Z",
|
||||
"pushed_at": "2017-04-13T02:42:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 95809289,
|
||||
"name": "CVE-2017-0213-",
|
||||
"full_name": "shaheemirza\/CVE-2017-0213-",
|
||||
"owner": {
|
||||
"login": "shaheemirza",
|
||||
"id": 4853436,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4853436?v=4",
|
||||
"html_url": "https:\/\/github.com\/shaheemirza"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shaheemirza\/CVE-2017-0213-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-06-29T18:49:44Z",
|
||||
"updated_at": "2020-11-25T23:12:09Z",
|
||||
"pushed_at": "2017-06-07T17:09:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 95974378,
|
||||
"name": "CVE-2017-0213",
|
||||
"full_name": "zcgonvh\/CVE-2017-0213",
|
||||
"owner": {
|
||||
"login": "zcgonvh",
|
||||
"id": 25787677,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4",
|
||||
"html_url": "https:\/\/github.com\/zcgonvh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
|
||||
"description": "CVE-2017-0213 for command line",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-01T16:07:04Z",
|
||||
"updated_at": "2020-10-21T22:15:15Z",
|
||||
"pushed_at": "2017-07-01T16:19:12Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105444160,
|
||||
"name": "CVE-2017-0213",
|
||||
"full_name": "billa3283\/CVE-2017-0213",
|
||||
"owner": {
|
||||
"login": "billa3283",
|
||||
"id": 32428387,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32428387?v=4",
|
||||
"html_url": "https:\/\/github.com\/billa3283"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/billa3283\/CVE-2017-0213",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-01T13:29:59Z",
|
||||
"updated_at": "2017-10-01T13:29:59Z",
|
||||
"pushed_at": "2017-10-01T13:30:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 125799686,
|
||||
"name": "CVE-2017-0213",
|
||||
|
|
25
2017/CVE-2017-0290.json
Normal file
25
2017/CVE-2017-0290.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 90935850,
|
||||
"name": "CVE-2017-0290-",
|
||||
"full_name": "homjxi0e\/CVE-2017-0290-",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-0290-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-11T04:01:51Z",
|
||||
"updated_at": "2017-05-11T04:01:51Z",
|
||||
"pushed_at": "2017-05-11T05:24:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 85445247,
|
||||
"name": "CVE-2017-0478",
|
||||
"full_name": "JiounDai\/CVE-2017-0478",
|
||||
"owner": {
|
||||
"login": "JiounDai",
|
||||
"id": 4220640,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4220640?v=4",
|
||||
"html_url": "https:\/\/github.com\/JiounDai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JiounDai\/CVE-2017-0478",
|
||||
"description": "poc of CVE-2017-0478",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-19T02:18:37Z",
|
||||
"updated_at": "2020-08-11T04:38:14Z",
|
||||
"pushed_at": "2017-03-19T02:43:19Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 141312944,
|
||||
"name": "CVE-2017-0478",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 87639690,
|
||||
"name": "CVE-2017-0541",
|
||||
"full_name": "JiounDai\/CVE-2017-0541",
|
||||
"owner": {
|
||||
"login": "JiounDai",
|
||||
"id": 4220640,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4220640?v=4",
|
||||
"html_url": "https:\/\/github.com\/JiounDai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JiounDai\/CVE-2017-0541",
|
||||
"description": "poc and vulnerability analysis of CVE-2017-0541",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-08T14:28:22Z",
|
||||
"updated_at": "2018-11-26T08:18:04Z",
|
||||
"pushed_at": "2017-04-08T14:45:44Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 141312906,
|
||||
"name": "CVE-2017-0541",
|
||||
|
|
25
2017/CVE-2017-0554.json
Normal file
25
2017/CVE-2017-0554.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 115291853,
|
||||
"name": "tethr",
|
||||
"full_name": "lanrat\/tethr",
|
||||
"owner": {
|
||||
"login": "lanrat",
|
||||
"id": 164192,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/164192?v=4",
|
||||
"html_url": "https:\/\/github.com\/lanrat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lanrat\/tethr",
|
||||
"description": "Android Tethering Provisioning Check Bypass (CVE-2017-0554)",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-24T23:18:28Z",
|
||||
"updated_at": "2020-09-10T21:28:07Z",
|
||||
"pushed_at": "2020-09-11T04:45:20Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-0564.json
Normal file
25
2017/CVE-2017-0564.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 117041381,
|
||||
"name": "CVE-2017-0564-ION-PoC",
|
||||
"full_name": "guoygang\/CVE-2017-0564-ION-PoC",
|
||||
"owner": {
|
||||
"login": "guoygang",
|
||||
"id": 16954452,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16954452?v=4",
|
||||
"html_url": "https:\/\/github.com\/guoygang"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guoygang\/CVE-2017-0564-ION-PoC",
|
||||
"description": "ION通用提权漏洞PoC以及分析",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T02:50:26Z",
|
||||
"updated_at": "2019-07-16T01:41:58Z",
|
||||
"pushed_at": "2018-01-11T02:53:43Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 106299703,
|
||||
"name": "CVE-2017-0781",
|
||||
"full_name": "ojasookert\/CVE-2017-0781",
|
||||
"owner": {
|
||||
"login": "ojasookert",
|
||||
"id": 12931198,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12931198?v=4",
|
||||
"html_url": "https:\/\/github.com\/ojasookert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0781",
|
||||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2020-12-21T16:51:53Z",
|
||||
"pushed_at": "2017-10-09T15:20:11Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 125669064,
|
||||
"name": "android712-blueborne",
|
||||
|
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 104278164,
|
||||
"name": "CVE-2017-0785",
|
||||
"full_name": "ojasookert\/CVE-2017-0785",
|
||||
"owner": {
|
||||
"login": "ojasookert",
|
||||
"id": 12931198,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12931198?v=4",
|
||||
"html_url": "https:\/\/github.com\/ojasookert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0785",
|
||||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2020-10-25T00:52:16Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"watchers": 431,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104516404,
|
||||
"name": "CVE-2017-0785",
|
||||
"full_name": "aymankhalfatni\/CVE-2017-0785",
|
||||
"owner": {
|
||||
"login": "aymankhalfatni",
|
||||
"id": 19715320,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/19715320?v=4",
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni\/CVE-2017-0785",
|
||||
"description": "CVE-2017-0785: BlueBorne PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-22T20:33:12Z",
|
||||
"updated_at": "2017-09-22T20:34:33Z",
|
||||
"pushed_at": "2017-09-22T20:34:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104522460,
|
||||
"name": "-CVE-2017-0785-BlueBorne-PoC",
|
||||
"full_name": "Alfa100001\/-CVE-2017-0785-BlueBorne-PoC",
|
||||
"owner": {
|
||||
"login": "Alfa100001",
|
||||
"id": 29385626,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29385626?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alfa100001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alfa100001\/-CVE-2017-0785-BlueBorne-PoC",
|
||||
"description": "CVE-2017-0785 BlueBorne PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-22T22:03:40Z",
|
||||
"updated_at": "2020-09-10T09:52:50Z",
|
||||
"pushed_at": "2017-09-22T22:23:52Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105568835,
|
||||
"name": "BlueBorne-CVE-2017-0785",
|
||||
"full_name": "Hackerscript\/BlueBorne-CVE-2017-0785",
|
||||
"owner": {
|
||||
"login": "Hackerscript",
|
||||
"id": 29609985,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29609985?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hackerscript"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hackerscript\/BlueBorne-CVE-2017-0785",
|
||||
"description": "this script is used for hack bluetooth devices CVE 2017 0785 which was done by ARMIS This File is password protected for password contact atusha@gmail.comr",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-02T18:21:43Z",
|
||||
"updated_at": "2017-10-02T18:21:43Z",
|
||||
"pushed_at": "2017-10-02T18:21:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105816209,
|
||||
"name": "blueborne",
|
||||
|
@ -22,6 +114,52 @@
|
|||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116589306,
|
||||
"name": "diff",
|
||||
"full_name": "sigbitsadmin\/diff",
|
||||
"owner": {
|
||||
"login": "sigbitsadmin",
|
||||
"id": 33204560,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33204560?v=4",
|
||||
"html_url": "https:\/\/github.com\/sigbitsadmin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sigbitsadmin\/diff",
|
||||
"description": "Simply diff for CVE-2017-0785",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-07T18:30:42Z",
|
||||
"updated_at": "2018-01-07T18:31:03Z",
|
||||
"pushed_at": "2018-01-07T18:31:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117460479,
|
||||
"name": "diff",
|
||||
"full_name": "SigBitsLabs\/diff",
|
||||
"owner": {
|
||||
"login": "SigBitsLabs",
|
||||
"id": 33204577,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33204577?v=4",
|
||||
"html_url": "https:\/\/github.com\/SigBitsLabs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SigBitsLabs\/diff",
|
||||
"description": "diff for CVE-2017-0785 (Blueborne)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-14T19:36:03Z",
|
||||
"updated_at": "2018-01-14T19:36:27Z",
|
||||
"pushed_at": "2018-01-14T19:36:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 122293991,
|
||||
"name": "Bluetooth-Crash-CVE-2017-0785",
|
||||
|
|
25
2017/CVE-2017-0807.json
Normal file
25
2017/CVE-2017-0807.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 117631583,
|
||||
"name": "PoC_CVE-2017-0807",
|
||||
"full_name": "kpatsakis\/PoC_CVE-2017-0807",
|
||||
"owner": {
|
||||
"login": "kpatsakis",
|
||||
"id": 9294190,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9294190?v=4",
|
||||
"html_url": "https:\/\/github.com\/kpatsakis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kpatsakis\/PoC_CVE-2017-0807",
|
||||
"description": "Proof of concept of CVE-2017-0807",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T04:34:06Z",
|
||||
"updated_at": "2018-11-26T05:17:02Z",
|
||||
"pushed_at": "2018-01-16T04:55:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-1000000.json
Normal file
25
2017/CVE-2017-1000000.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 91563154,
|
||||
"name": "DWF-CVE-2017-1000000",
|
||||
"full_name": "smythtech\/DWF-CVE-2017-1000000",
|
||||
"owner": {
|
||||
"login": "smythtech",
|
||||
"id": 9844564,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9844564?v=4",
|
||||
"html_url": "https:\/\/github.com\/smythtech"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/smythtech\/DWF-CVE-2017-1000000",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-17T10:14:54Z",
|
||||
"updated_at": "2017-07-06T21:23:57Z",
|
||||
"pushed_at": "2017-05-17T10:27:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,464 @@
|
|||
[
|
||||
{
|
||||
"id": 100002532,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "timwr\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "timwr",
|
||||
"id": 684924,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/684924?v=4",
|
||||
"html_url": "https:\/\/github.com\/timwr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timwr\/CVE-2017-1000117",
|
||||
"description": "Proof of concept of CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T07:03:23Z",
|
||||
"updated_at": "2019-01-23T02:32:39Z",
|
||||
"pushed_at": "2017-08-11T08:27:04Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100058519,
|
||||
"name": "test-git-vuln_CVE-2017-1000117",
|
||||
"full_name": "GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "GrahamMThomas",
|
||||
"id": 14031456,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/14031456?v=4",
|
||||
"html_url": "https:\/\/github.com\/GrahamMThomas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
|
||||
"description": "Repo to test the new git vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T18:05:01Z",
|
||||
"updated_at": "2017-09-26T17:09:13Z",
|
||||
"pushed_at": "2017-08-11T20:15:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100069051,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "Manouchehri\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "Manouchehri",
|
||||
"id": 7232674,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7232674?v=4",
|
||||
"html_url": "https:\/\/github.com\/Manouchehri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Manouchehri\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T20:47:53Z",
|
||||
"updated_at": "2018-04-19T04:23:54Z",
|
||||
"pushed_at": "2017-08-11T21:26:33Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100080640,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "thelastbyte\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "thelastbyte",
|
||||
"id": 7829097,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7829097?v=4",
|
||||
"html_url": "https:\/\/github.com\/thelastbyte"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thelastbyte\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T01:10:49Z",
|
||||
"updated_at": "2017-09-01T22:06:02Z",
|
||||
"pushed_at": "2017-09-01T22:08:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100116587,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "alilangtest\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "alilangtest",
|
||||
"id": 20162983,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20162983?v=4",
|
||||
"html_url": "https:\/\/github.com\/alilangtest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alilangtest\/CVE-2017-1000117",
|
||||
"description": "test",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T14:14:55Z",
|
||||
"updated_at": "2019-05-09T09:27:01Z",
|
||||
"pushed_at": "2017-08-12T14:25:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100130122,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "VulApps\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "VulApps",
|
||||
"id": 29811930,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29811930?v=4",
|
||||
"html_url": "https:\/\/github.com\/VulApps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VulApps\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T18:20:02Z",
|
||||
"updated_at": "2020-03-21T15:06:32Z",
|
||||
"pushed_at": "2017-08-12T18:22:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100280254,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "greymd\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "greymd",
|
||||
"id": 3874767,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3874767?v=4",
|
||||
"html_url": "https:\/\/github.com\/greymd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/greymd\/CVE-2017-1000117",
|
||||
"description": "Check Git's vulnerability CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-14T15:05:48Z",
|
||||
"updated_at": "2020-06-01T01:41:41Z",
|
||||
"pushed_at": "2017-08-16T15:39:15Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100325886,
|
||||
"name": "Fix-CVE-2017-1000117",
|
||||
"full_name": "shogo82148\/Fix-CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "shogo82148",
|
||||
"id": 1157344,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1157344?v=4",
|
||||
"html_url": "https:\/\/github.com\/shogo82148"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shogo82148\/Fix-CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T01:40:18Z",
|
||||
"updated_at": "2017-08-17T03:44:20Z",
|
||||
"pushed_at": "2017-08-17T03:44:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100357293,
|
||||
"name": "CVE-2017-1000117_wasawasa",
|
||||
"full_name": "sasairc\/CVE-2017-1000117_wasawasa",
|
||||
"owner": {
|
||||
"login": "sasairc",
|
||||
"id": 9349287,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9349287?v=4",
|
||||
"html_url": "https:\/\/github.com\/sasairc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sasairc\/CVE-2017-1000117_wasawasa",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T08:39:23Z",
|
||||
"updated_at": "2017-08-15T09:39:16Z",
|
||||
"pushed_at": "2017-08-15T08:43:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100374790,
|
||||
"name": "CVE-2017-1000117-test",
|
||||
"full_name": "Shadow5523\/CVE-2017-1000117-test",
|
||||
"owner": {
|
||||
"login": "Shadow5523",
|
||||
"id": 22784789,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22784789?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shadow5523"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shadow5523\/CVE-2017-1000117-test",
|
||||
"description": "CVE-2017-1000117の検証",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T12:24:57Z",
|
||||
"updated_at": "2017-08-17T14:54:39Z",
|
||||
"pushed_at": "2017-08-18T02:18:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100437085,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "bells17\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "bells17",
|
||||
"id": 2158863,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2158863?v=4",
|
||||
"html_url": "https:\/\/github.com\/bells17"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bells17\/CVE-2017-1000117",
|
||||
"description": "https:\/\/github.com\/greymd\/CVE-2017-1000117 の勉強用",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T02:04:02Z",
|
||||
"updated_at": "2017-10-13T17:48:19Z",
|
||||
"pushed_at": "2017-08-16T09:35:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100437171,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "ieee0824\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "ieee0824",
|
||||
"id": 5692475,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5692475?v=4",
|
||||
"html_url": "https:\/\/github.com\/ieee0824"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T02:05:08Z",
|
||||
"updated_at": "2017-08-16T08:10:25Z",
|
||||
"pushed_at": "2017-08-16T10:03:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100445561,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "rootclay\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "rootclay",
|
||||
"id": 29671471,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29671471?v=4",
|
||||
"html_url": "https:\/\/github.com\/rootclay"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rootclay\/CVE-2017-1000117",
|
||||
"description": "CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T03:52:27Z",
|
||||
"updated_at": "2017-08-16T04:00:53Z",
|
||||
"pushed_at": "2017-08-16T06:14:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100446125,
|
||||
"name": "CVE-2017-1000117-sl",
|
||||
"full_name": "ieee0824\/CVE-2017-1000117-sl",
|
||||
"owner": {
|
||||
"login": "ieee0824",
|
||||
"id": 5692475,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5692475?v=4",
|
||||
"html_url": "https:\/\/github.com\/ieee0824"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117-sl",
|
||||
"description": "Experiment of CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T04:01:08Z",
|
||||
"updated_at": "2017-08-16T05:42:26Z",
|
||||
"pushed_at": "2017-08-16T09:54:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100498924,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "takehaya\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "takehaya",
|
||||
"id": 10973623,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10973623?v=4",
|
||||
"html_url": "https:\/\/github.com\/takehaya"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/takehaya\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T14:34:37Z",
|
||||
"updated_at": "2017-08-16T14:34:37Z",
|
||||
"pushed_at": "2017-08-17T18:45:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100544749,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "ikmski\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "ikmski",
|
||||
"id": 6622579,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6622579?v=4",
|
||||
"html_url": "https:\/\/github.com\/ikmski"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ikmski\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-17T00:37:47Z",
|
||||
"updated_at": "2017-08-17T00:37:47Z",
|
||||
"pushed_at": "2017-08-17T00:57:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100730507,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "nkoneko\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "nkoneko",
|
||||
"id": 1922341,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1922341?v=4",
|
||||
"html_url": "https:\/\/github.com\/nkoneko"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nkoneko\/CVE-2017-1000117",
|
||||
"description": "GitのCommand Injectionの脆弱性を利用してスクリプトを落として実行する例",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-18T16:23:53Z",
|
||||
"updated_at": "2018-06-27T07:59:10Z",
|
||||
"pushed_at": "2017-08-18T16:30:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100926724,
|
||||
"name": "test",
|
||||
"full_name": "chenzhuo0618\/test",
|
||||
"owner": {
|
||||
"login": "chenzhuo0618",
|
||||
"id": 5562130,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5562130?v=4",
|
||||
"html_url": "https:\/\/github.com\/chenzhuo0618"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chenzhuo0618\/test",
|
||||
"description": "test for CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-21T07:46:16Z",
|
||||
"updated_at": "2017-08-21T07:46:48Z",
|
||||
"pushed_at": "2017-08-21T08:51:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 102318198,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "siling2017\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "siling2017",
|
||||
"id": 27729343,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27729343?v=4",
|
||||
"html_url": "https:\/\/github.com\/siling2017"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/siling2017\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-04T04:18:19Z",
|
||||
"updated_at": "2017-09-04T04:18:29Z",
|
||||
"pushed_at": "2017-09-04T04:18:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112913757,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "Q2h1Cg\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "Q2h1Cg",
|
||||
"id": 3953030,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3953030?v=4",
|
||||
"html_url": "https:\/\/github.com\/Q2h1Cg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Q2h1Cg\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-12-03T08:58:18Z",
|
||||
"updated_at": "2017-12-03T08:58:33Z",
|
||||
"pushed_at": "2017-12-03T08:59:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 166267328,
|
||||
"name": "cve-2017-1000117",
|
||||
|
|
25
2017/CVE-2017-1000250.json
Normal file
25
2017/CVE-2017-1000250.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 110457097,
|
||||
"name": "CVE-2017-1000250-PoC",
|
||||
"full_name": "olav-st\/CVE-2017-1000250-PoC",
|
||||
"owner": {
|
||||
"login": "olav-st",
|
||||
"id": 1856634,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1856634?v=4",
|
||||
"html_url": "https:\/\/github.com\/olav-st"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/olav-st\/CVE-2017-1000250-PoC",
|
||||
"description": "Proof of concept exploit script for CVE-2017-1000250. Written while researching for the essay in TTM4137 Wireless Security.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-12T18:18:52Z",
|
||||
"updated_at": "2019-03-20T07:23:31Z",
|
||||
"pushed_at": "2017-11-12T19:46:35Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
94
2017/CVE-2017-1000251.json
Normal file
94
2017/CVE-2017-1000251.json
Normal file
|
@ -0,0 +1,94 @@
|
|||
[
|
||||
{
|
||||
"id": 104546702,
|
||||
"name": "Blueborne-CVE-2017-1000251",
|
||||
"full_name": "hayzamjs\/Blueborne-CVE-2017-1000251",
|
||||
"owner": {
|
||||
"login": "hayzamjs",
|
||||
"id": 3922884,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3922884?v=4",
|
||||
"html_url": "https:\/\/github.com\/hayzamjs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hayzamjs\/Blueborne-CVE-2017-1000251",
|
||||
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-23T06:29:31Z",
|
||||
"updated_at": "2020-11-04T16:52:04Z",
|
||||
"pushed_at": "2017-10-11T17:46:21Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105091487,
|
||||
"name": "blueborne-CVE-2017-1000251",
|
||||
"full_name": "tlatkdgus1\/blueborne-CVE-2017-1000251",
|
||||
"owner": {
|
||||
"login": "tlatkdgus1",
|
||||
"id": 13446909,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13446909?v=4",
|
||||
"html_url": "https:\/\/github.com\/tlatkdgus1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tlatkdgus1\/blueborne-CVE-2017-1000251",
|
||||
"description": "clone",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-28T02:12:57Z",
|
||||
"updated_at": "2017-09-28T02:19:14Z",
|
||||
"pushed_at": "2017-09-28T02:19:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105433963,
|
||||
"name": "blueborne-CVE-2017-1000251-POC",
|
||||
"full_name": "own2pwn\/blueborne-CVE-2017-1000251-POC",
|
||||
"owner": {
|
||||
"login": "own2pwn",
|
||||
"id": 7850039,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7850039?v=4",
|
||||
"html_url": "https:\/\/github.com\/own2pwn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/own2pwn\/blueborne-CVE-2017-1000251-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-01T10:15:40Z",
|
||||
"updated_at": "2018-11-16T07:29:50Z",
|
||||
"pushed_at": "2017-10-01T10:23:36Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 110958300,
|
||||
"name": "blueborne-CVE-2017-1000251",
|
||||
"full_name": "marcinguy\/blueborne-CVE-2017-1000251",
|
||||
"owner": {
|
||||
"login": "marcinguy",
|
||||
"id": 20355405,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20355405?v=4",
|
||||
"html_url": "https:\/\/github.com\/marcinguy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marcinguy\/blueborne-CVE-2017-1000251",
|
||||
"description": "Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC) BlueBorne - Proof of Concept - Unarmed\/Unweaponized - DoS (Crash) only",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-16T10:35:05Z",
|
||||
"updated_at": "2019-11-23T05:24:53Z",
|
||||
"pushed_at": "2018-02-11T18:25:40Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-1000253.json
Normal file
25
2017/CVE-2017-1000253.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 137769369,
|
||||
"name": "PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"owner": {
|
||||
"login": "RicterZ",
|
||||
"id": 5282759,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5282759?v=4",
|
||||
"html_url": "https:\/\/github.com\/RicterZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"description": "Demo-ing CVE-2017-1000253 in a container",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-18T15:22:01Z",
|
||||
"updated_at": "2020-09-21T07:09:05Z",
|
||||
"pushed_at": "2017-11-01T07:59:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
71
2017/CVE-2017-1000367.json
Normal file
71
2017/CVE-2017-1000367.json
Normal file
|
@ -0,0 +1,71 @@
|
|||
[
|
||||
{
|
||||
"id": 92862379,
|
||||
"name": "sudo-CVE-2017-1000367",
|
||||
"full_name": "c0d3z3r0\/sudo-CVE-2017-1000367",
|
||||
"owner": {
|
||||
"login": "c0d3z3r0",
|
||||
"id": 6205797,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6205797?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0d3z3r0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0d3z3r0\/sudo-CVE-2017-1000367",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-30T18:12:38Z",
|
||||
"updated_at": "2020-12-12T08:21:34Z",
|
||||
"pushed_at": "2017-06-05T19:53:35Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 93312242,
|
||||
"name": "CVE-2017-1000367",
|
||||
"full_name": "homjxi0e\/CVE-2017-1000367",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-1000367",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-06-04T12:31:59Z",
|
||||
"updated_at": "2020-05-18T10:42:07Z",
|
||||
"pushed_at": "2017-06-04T12:49:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 93726308,
|
||||
"name": "sudo_exploit",
|
||||
"full_name": "pucerpocok\/sudo_exploit",
|
||||
"owner": {
|
||||
"login": "pucerpocok",
|
||||
"id": 25666150,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25666150?v=4",
|
||||
"html_url": "https:\/\/github.com\/pucerpocok"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pucerpocok\/sudo_exploit",
|
||||
"description": "own implementation of the CVE-2017-1000367 sudo privilege escalation vulnerability in python",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-08T08:37:38Z",
|
||||
"updated_at": "2020-10-21T10:34:25Z",
|
||||
"pushed_at": "2017-06-08T08:38:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-1000405.json
Normal file
25
2017/CVE-2017-1000405.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 112534496,
|
||||
"name": "HugeDirtyCowPOC",
|
||||
"full_name": "bindecy\/HugeDirtyCowPOC",
|
||||
"owner": {
|
||||
"login": "bindecy",
|
||||
"id": 33990073,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33990073?v=4",
|
||||
"html_url": "https:\/\/github.com\/bindecy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bindecy\/HugeDirtyCowPOC",
|
||||
"description": "A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-29T22:19:51Z",
|
||||
"updated_at": "2020-12-23T12:22:34Z",
|
||||
"pushed_at": "2017-11-30T00:24:14Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-1000475.json
Normal file
25
2017/CVE-2017-1000475.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 118515767,
|
||||
"name": "CVE-2017-1000475",
|
||||
"full_name": "lajarajorge\/CVE-2017-1000475",
|
||||
"owner": {
|
||||
"login": "lajarajorge",
|
||||
"id": 35707370,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/35707370?v=4",
|
||||
"html_url": "https:\/\/github.com\/lajarajorge"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lajarajorge\/CVE-2017-1000475",
|
||||
"description": "Unquoted Path Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-22T21:10:22Z",
|
||||
"updated_at": "2018-01-22T21:10:22Z",
|
||||
"pushed_at": "2018-01-22T21:34:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-10235.json
Normal file
25
2017/CVE-2017-10235.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 104800054,
|
||||
"name": "vbox_cve_2017_10235",
|
||||
"full_name": "fundacion-sadosky\/vbox_cve_2017_10235",
|
||||
"owner": {
|
||||
"login": "fundacion-sadosky",
|
||||
"id": 30127931,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/30127931?v=4",
|
||||
"html_url": "https:\/\/github.com\/fundacion-sadosky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fundacion-sadosky\/vbox_cve_2017_10235",
|
||||
"description": "[CVE-2017-10235] Description and PoC of VirtualBox E1000 device Buffer Overflow",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-25T20:42:47Z",
|
||||
"updated_at": "2020-09-16T11:51:04Z",
|
||||
"pushed_at": "2018-01-15T19:26:45Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 115195951,
|
||||
"name": "CVE-2017-10271",
|
||||
"full_name": "1337g\/CVE-2017-10271",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-10271",
|
||||
"description": "CVE-2017-10271 WEBLOGIC RCE (TESTED)",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-23T13:04:23Z",
|
||||
"updated_at": "2020-09-01T16:02:59Z",
|
||||
"pushed_at": "2017-12-23T13:12:06Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 115311346,
|
||||
"name": "CVE-2017-10271",
|
||||
"full_name": "s3xy\/CVE-2017-10271",
|
||||
"owner": {
|
||||
"login": "s3xy",
|
||||
"id": 34327996,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34327996?v=4",
|
||||
"html_url": "https:\/\/github.com\/s3xy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/s3xy\/CVE-2017-10271",
|
||||
"description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-25T06:11:54Z",
|
||||
"updated_at": "2020-12-11T01:36:14Z",
|
||||
"pushed_at": "2017-12-25T06:21:23Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 115339400,
|
||||
"name": "PoCs-Weblogic_2017_10271",
|
||||
"full_name": "ZH3FENG\/PoCs-Weblogic_2017_10271",
|
||||
"owner": {
|
||||
"login": "ZH3FENG",
|
||||
"id": 20502660,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20502660?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZH3FENG"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271",
|
||||
"description": "Simplified PoC for Weblogic-CVE-2017-10271",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-25T13:18:45Z",
|
||||
"updated_at": "2019-03-19T07:31:45Z",
|
||||
"pushed_at": "2017-12-25T13:23:32Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 115571903,
|
||||
"name": "CVE-2017-10271",
|
||||
|
@ -22,6 +91,75 @@
|
|||
"watchers": 128,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 115596796,
|
||||
"name": "CVE-2017-10271",
|
||||
"full_name": "Luffin\/CVE-2017-10271",
|
||||
"owner": {
|
||||
"login": "Luffin",
|
||||
"id": 13807870,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13807870?v=4",
|
||||
"html_url": "https:\/\/github.com\/Luffin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Luffin\/CVE-2017-10271",
|
||||
"description": "CVE-2017-10271 POC",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-28T07:19:13Z",
|
||||
"updated_at": "2020-08-10T02:31:05Z",
|
||||
"pushed_at": "2018-01-10T02:34:56Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116099094,
|
||||
"name": "weblogic_wls_wsat_rce",
|
||||
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
|
||||
"owner": {
|
||||
"login": "cjjduck",
|
||||
"id": 23519154,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23519154?v=4",
|
||||
"html_url": "https:\/\/github.com\/cjjduck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
|
||||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T06:14:28Z",
|
||||
"updated_at": "2020-10-09T02:33:00Z",
|
||||
"pushed_at": "2018-01-03T00:42:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116430643,
|
||||
"name": "CVE-2017-10271",
|
||||
"full_name": "kkirsche\/CVE-2017-10271",
|
||||
"owner": {
|
||||
"login": "kkirsche",
|
||||
"id": 947110,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/947110?v=4",
|
||||
"html_url": "https:\/\/github.com\/kkirsche"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2017-10271",
|
||||
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T21:57:03Z",
|
||||
"updated_at": "2020-12-04T14:32:52Z",
|
||||
"pushed_at": "2018-01-26T14:28:58Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117624791,
|
||||
"name": "CVE-2017-10271",
|
||||
|
@ -45,6 +183,29 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117926261,
|
||||
"name": "cve-2017-10271-poc",
|
||||
"full_name": "SuperHacker-liuan\/cve-2017-10271-poc",
|
||||
"owner": {
|
||||
"login": "SuperHacker-liuan",
|
||||
"id": 30787037,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30787037?v=4",
|
||||
"html_url": "https:\/\/github.com\/SuperHacker-liuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc",
|
||||
"description": "cve-2017-10271 POC",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-18T03:21:15Z",
|
||||
"updated_at": "2020-01-06T03:15:27Z",
|
||||
"pushed_at": "2018-02-02T07:47:30Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 118044092,
|
||||
"name": "CVE-2017-10271",
|
||||
|
@ -68,6 +229,52 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 118144871,
|
||||
"name": "Oracle-WebLogic-CVE-2017-10271",
|
||||
"full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
|
||||
"owner": {
|
||||
"login": "peterpeter228",
|
||||
"id": 22089258,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22089258?v=4",
|
||||
"html_url": "https:\/\/github.com\/peterpeter228"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
|
||||
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-19T15:50:08Z",
|
||||
"updated_at": "2020-09-24T10:47:12Z",
|
||||
"pushed_at": "2018-01-19T11:29:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120462394,
|
||||
"name": "CVE-2017-10271",
|
||||
"full_name": "Sch01ar\/CVE-2017-10271",
|
||||
"owner": {
|
||||
"login": "Sch01ar",
|
||||
"id": 28928231,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/28928231?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sch01ar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sch01ar\/CVE-2017-10271",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T13:38:40Z",
|
||||
"updated_at": "2018-02-06T13:59:34Z",
|
||||
"pushed_at": "2018-02-08T09:21:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120571410,
|
||||
"name": "weblogic_honeypot",
|
||||
|
|
25
2017/CVE-2017-10661.json
Normal file
25
2017/CVE-2017-10661.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100021936,
|
||||
"name": "CVE-2017-10661_POC",
|
||||
"full_name": "GeneBlue\/CVE-2017-10661_POC",
|
||||
"owner": {
|
||||
"login": "GeneBlue",
|
||||
"id": 10919709,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10919709?v=4",
|
||||
"html_url": "https:\/\/github.com\/GeneBlue"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GeneBlue\/CVE-2017-10661_POC",
|
||||
"description": "poc for cve-2017-10661",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T10:45:10Z",
|
||||
"updated_at": "2020-12-17T10:26:55Z",
|
||||
"pushed_at": "2017-08-11T10:45:56Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-10797.json
Normal file
25
2017/CVE-2017-10797.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 119376202,
|
||||
"name": "CVE-2017-10797",
|
||||
"full_name": "n4xh4ck5\/CVE-2017-10797",
|
||||
"owner": {
|
||||
"login": "n4xh4ck5",
|
||||
"id": 26029224,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26029224?v=4",
|
||||
"html_url": "https:\/\/github.com\/n4xh4ck5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n4xh4ck5\/CVE-2017-10797",
|
||||
"description": "CVE-2017-10797- User Enumeration in OwnCloud Server 8.1-10.0",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T11:53:14Z",
|
||||
"updated_at": "2020-03-26T17:06:19Z",
|
||||
"pushed_at": "2018-01-29T11:56:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-11611.json
Normal file
25
2017/CVE-2017-11611.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 101361478,
|
||||
"name": "Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"full_name": "faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"owner": {
|
||||
"login": "faizzaidi",
|
||||
"id": 12153050,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
|
||||
"html_url": "https:\/\/github.com\/faizzaidi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"description": "WolfCMS-v0.8.3.1 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-11611",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-25T03:19:05Z",
|
||||
"updated_at": "2020-07-17T05:22:39Z",
|
||||
"pushed_at": "2017-08-25T03:19:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-11816.json
Normal file
25
2017/CVE-2017-11816.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 106789971,
|
||||
"name": "CVE-2017-11816",
|
||||
"full_name": "lr3800\/CVE-2017-11816",
|
||||
"owner": {
|
||||
"login": "lr3800",
|
||||
"id": 22863274,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22863274?v=4",
|
||||
"html_url": "https:\/\/github.com\/lr3800"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lr3800\/CVE-2017-11816",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-13T07:05:55Z",
|
||||
"updated_at": "2017-10-13T07:05:55Z",
|
||||
"pushed_at": "2017-10-13T14:25:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,280 @@
|
|||
[
|
||||
{
|
||||
"id": 111305094,
|
||||
"name": "cve-2017-11882",
|
||||
"full_name": "zhouat\/cve-2017-11882",
|
||||
"owner": {
|
||||
"login": "zhouat",
|
||||
"id": 8078184,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8078184?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhouat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhouat\/cve-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-19T14:57:41Z",
|
||||
"updated_at": "2017-11-21T09:11:26Z",
|
||||
"pushed_at": "2017-11-18T14:21:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111435936,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "embedi\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"description": "Proof-of-Concept exploits for CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-20T16:35:30Z",
|
||||
"updated_at": "2020-12-29T03:30:26Z",
|
||||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 479,
|
||||
"watchers_count": 479,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 479,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111505810,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "Ridter\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "Ridter",
|
||||
"id": 6007471,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6007471?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ridter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ridter\/CVE-2017-11882",
|
||||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2020-12-31T12:10:38Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 479,
|
||||
"watchers_count": 479,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 479,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111525857,
|
||||
"name": "2017-11882_Generator",
|
||||
"full_name": "BlackMathIT\/2017-11882_Generator",
|
||||
"owner": {
|
||||
"login": "BlackMathIT",
|
||||
"id": 26303870,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26303870?v=4",
|
||||
"html_url": "https:\/\/github.com\/BlackMathIT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BlackMathIT\/2017-11882_Generator",
|
||||
"description": "CVE-2017-11882 File Generator PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T09:15:28Z",
|
||||
"updated_at": "2020-03-26T09:20:58Z",
|
||||
"pushed_at": "2017-11-22T08:38:18Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111566147,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "unamer\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "unamer",
|
||||
"id": 12728984,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12728984?v=4",
|
||||
"html_url": "https:\/\/github.com\/unamer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/unamer\/CVE-2017-11882",
|
||||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2020-12-21T21:53:43Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111585219,
|
||||
"name": "CVE-2017-11882-metasploit",
|
||||
"full_name": "0x09AL\/CVE-2017-11882-metasploit",
|
||||
"owner": {
|
||||
"login": "0x09AL",
|
||||
"id": 25826294,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25826294?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x09AL"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2017-11882-metasploit",
|
||||
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T18:17:28Z",
|
||||
"updated_at": "2020-09-30T09:12:42Z",
|
||||
"pushed_at": "2017-11-21T20:34:57Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111601525,
|
||||
"name": "ABC",
|
||||
"full_name": "HZachev\/ABC",
|
||||
"owner": {
|
||||
"login": "HZachev",
|
||||
"id": 33879843,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/33879843?v=4",
|
||||
"html_url": "https:\/\/github.com\/HZachev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HZachev\/ABC",
|
||||
"description": "CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T21:07:57Z",
|
||||
"updated_at": "2017-11-21T21:07:57Z",
|
||||
"pushed_at": "2017-11-21T22:04:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111619944,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "starnightcyber\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "starnightcyber",
|
||||
"id": 19260696,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19260696?v=4",
|
||||
"html_url": "https:\/\/github.com\/starnightcyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/starnightcyber\/CVE-2017-11882",
|
||||
"description": "CVE-2017-11882 exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-22T01:11:39Z",
|
||||
"updated_at": "2020-11-09T03:32:38Z",
|
||||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111637919,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "Grey-Li\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "Grey-Li",
|
||||
"id": 33873392,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/33873392?v=4",
|
||||
"html_url": "https:\/\/github.com\/Grey-Li"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Grey-Li\/CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-22T04:53:44Z",
|
||||
"updated_at": "2017-11-22T04:54:38Z",
|
||||
"pushed_at": "2017-11-22T04:54:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111887551,
|
||||
"name": "CVE-2017-11882-for-Kali",
|
||||
"full_name": "legendsec\/CVE-2017-11882-for-Kali",
|
||||
"owner": {
|
||||
"login": "legendsec",
|
||||
"id": 13389492,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13389492?v=4",
|
||||
"html_url": "https:\/\/github.com\/legendsec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/legendsec\/CVE-2017-11882-for-Kali",
|
||||
"description": "# CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to \/usr\/share\/metasploit-framework\/modules\/exploits\/windows\/local\/ 2) Copy the cve-2017-11882.rtf to \/usr\/share\/metasploit-framework\/data\/exploits\/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-24T07:11:13Z",
|
||||
"updated_at": "2017-11-24T07:11:13Z",
|
||||
"pushed_at": "2017-11-24T07:11:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111904379,
|
||||
"name": "cve-2017-11882",
|
||||
"full_name": "CSC-pentest\/cve-2017-11882",
|
||||
"owner": {
|
||||
"login": "CSC-pentest",
|
||||
"id": 33954862,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33954862?v=4",
|
||||
"html_url": "https:\/\/github.com\/CSC-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CSC-pentest\/cve-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-24T10:09:49Z",
|
||||
"updated_at": "2017-11-24T10:09:49Z",
|
||||
"pushed_at": "2017-11-24T10:13:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112133932,
|
||||
"name": "CVE-2017-11882-",
|
||||
"full_name": "Shadowshusky\/CVE-2017-11882-",
|
||||
"owner": {
|
||||
"login": "Shadowshusky",
|
||||
"id": 31649758,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31649758?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shadowshusky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shadowshusky\/CVE-2017-11882-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-27T01:50:44Z",
|
||||
"updated_at": "2017-11-27T01:50:54Z",
|
||||
"pushed_at": "2017-11-27T01:50:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117080574,
|
||||
"name": "CVE-2018-0802",
|
||||
|
@ -22,6 +298,75 @@
|
|||
"watchers": 266,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117234193,
|
||||
"name": "RTF_11882_0802",
|
||||
"full_name": "Ridter\/RTF_11882_0802",
|
||||
"owner": {
|
||||
"login": "Ridter",
|
||||
"id": 6007471,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6007471?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ridter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802",
|
||||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2020-12-16T09:38:06Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117637164,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "likescam\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T05:47:47Z",
|
||||
"updated_at": "2018-01-16T05:47:59Z",
|
||||
"pushed_at": "2018-01-16T05:47:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117637270,
|
||||
"name": "CVE-2018-0802_CVE-2017-11882",
|
||||
"full_name": "likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T05:49:01Z",
|
||||
"updated_at": "2020-11-26T04:09:34Z",
|
||||
"pushed_at": "2018-01-16T05:49:10Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130633082,
|
||||
"name": "CVE-2017-11882-Possible-Remcos-Malspam",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 111536144,
|
||||
"name": "CVE-2017-12149",
|
||||
"full_name": "sevck\/CVE-2017-12149",
|
||||
"owner": {
|
||||
"login": "sevck",
|
||||
"id": 11308052,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11308052?v=4",
|
||||
"html_url": "https:\/\/github.com\/sevck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sevck\/CVE-2017-12149",
|
||||
"description": "CVE-2017-12149 JBOSS as 6.X反序列化(反弹shell版)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T10:48:24Z",
|
||||
"updated_at": "2020-05-13T05:16:58Z",
|
||||
"pushed_at": "2017-11-22T06:59:57Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112277258,
|
||||
"name": "jboss-_CVE-2017-12149",
|
||||
|
@ -22,6 +45,29 @@
|
|||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 115089440,
|
||||
"name": "CVE-2017-12149",
|
||||
"full_name": "1337g\/CVE-2017-12149",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-12149",
|
||||
"description": "CVE-2017-12149 JBOSS RCE (TESTED) ",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-22T07:30:29Z",
|
||||
"updated_at": "2020-03-10T20:03:04Z",
|
||||
"pushed_at": "2017-12-23T06:43:16Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 203873391,
|
||||
"name": "CVE-2017-12149",
|
||||
|
|
25
2017/CVE-2017-12426.json
Normal file
25
2017/CVE-2017-12426.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100264267,
|
||||
"name": "CVE-2017-12426",
|
||||
"full_name": "sm-paul-schuette\/CVE-2017-12426",
|
||||
"owner": {
|
||||
"login": "sm-paul-schuette",
|
||||
"id": 29304646,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29304646?v=4",
|
||||
"html_url": "https:\/\/github.com\/sm-paul-schuette"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sm-paul-schuette\/CVE-2017-12426",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-14T12:18:15Z",
|
||||
"updated_at": "2017-08-14T12:18:15Z",
|
||||
"pushed_at": "2017-08-14T12:19:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-12611.json
Normal file
25
2017/CVE-2017-12611.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 102809812,
|
||||
"name": "S2-053-CVE-2017-12611",
|
||||
"full_name": "brianwrf\/S2-053-CVE-2017-12611",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/S2-053-CVE-2017-12611",
|
||||
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T02:50:37Z",
|
||||
"updated_at": "2020-12-14T01:19:43Z",
|
||||
"pushed_at": "2017-09-08T11:59:20Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,121 @@
|
|||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104743685,
|
||||
"name": "cve-2017-12615",
|
||||
"full_name": "mefulton\/cve-2017-12615",
|
||||
"owner": {
|
||||
"login": "mefulton",
|
||||
"id": 27797094,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27797094?v=4",
|
||||
"html_url": "https:\/\/github.com\/mefulton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mefulton\/cve-2017-12615",
|
||||
"description": "just a python script for cve-2017-12615",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-25T11:53:02Z",
|
||||
"updated_at": "2019-04-28T08:33:21Z",
|
||||
"pushed_at": "2017-10-01T08:13:44Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 106053959,
|
||||
"name": "POC-CVE-2017-12615-or-CVE-2017-12717",
|
||||
"full_name": "zi0Black\/POC-CVE-2017-12615-or-CVE-2017-12717",
|
||||
"owner": {
|
||||
"login": "zi0Black",
|
||||
"id": 13380579,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13380579?v=4",
|
||||
"html_url": "https:\/\/github.com\/zi0Black"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zi0Black\/POC-CVE-2017-12615-or-CVE-2017-12717",
|
||||
"description": "CVE-2017-12617 and CVE-2017-12615 for tomcat server",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-06T22:04:23Z",
|
||||
"updated_at": "2019-03-06T16:07:08Z",
|
||||
"pushed_at": "2017-10-10T14:23:31Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 109152824,
|
||||
"name": "cve-2017-12615",
|
||||
"full_name": "wsg00d\/cve-2017-12615",
|
||||
"owner": {
|
||||
"login": "wsg00d",
|
||||
"id": 20575929,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20575929?v=4",
|
||||
"html_url": "https:\/\/github.com\/wsg00d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wsg00d\/cve-2017-12615",
|
||||
"description": "tomcat-put-cve-2017-12615",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-01T16:05:32Z",
|
||||
"updated_at": "2018-04-30T18:16:21Z",
|
||||
"pushed_at": "2017-11-01T16:12:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112277075,
|
||||
"name": "CVE-2017-12615",
|
||||
"full_name": "BeyondCy\/CVE-2017-12615",
|
||||
"owner": {
|
||||
"login": "BeyondCy",
|
||||
"id": 4694785,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4694785?v=4",
|
||||
"html_url": "https:\/\/github.com\/BeyondCy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BeyondCy\/CVE-2017-12615",
|
||||
"description": "Tomcat 远程代码执行漏洞 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-28T02:51:16Z",
|
||||
"updated_at": "2020-11-28T11:13:12Z",
|
||||
"pushed_at": "2017-10-18T13:15:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 115383252,
|
||||
"name": "CVE-2017-12615",
|
||||
"full_name": "1337g\/CVE-2017-12615",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-12615",
|
||||
"description": "CVE-2017-12615 Tomcat RCE (TESTED)",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-26T03:48:14Z",
|
||||
"updated_at": "2018-04-30T18:15:17Z",
|
||||
"pushed_at": "2017-12-26T12:38:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 127641351,
|
||||
"name": "CVE-2017-12615",
|
||||
|
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 105951164,
|
||||
"name": "CVE-2017-12617",
|
||||
"full_name": "cyberheartmi9\/CVE-2017-12617",
|
||||
"owner": {
|
||||
"login": "cyberheartmi9",
|
||||
"id": 12415756,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12415756?v=4",
|
||||
"html_url": "https:\/\/github.com\/cyberheartmi9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cyberheartmi9\/CVE-2017-12617",
|
||||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2020-12-16T08:00:31Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 352,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120838002,
|
||||
"name": "CVE-2017-12617",
|
||||
"full_name": "devcoinfet\/CVE-2017-12617",
|
||||
"owner": {
|
||||
"login": "devcoinfet",
|
||||
"id": 34756993,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/34756993?v=4",
|
||||
"html_url": "https:\/\/github.com\/devcoinfet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/devcoinfet\/CVE-2017-12617",
|
||||
"description": "Code put together from a few peoples ideas credit given don't use maliciously please",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T01:02:32Z",
|
||||
"updated_at": "2018-02-09T01:04:38Z",
|
||||
"pushed_at": "2018-02-09T01:04:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162421259,
|
||||
"name": "CVE-2017-12617",
|
||||
|
|
25
2017/CVE-2017-12792.json
Normal file
25
2017/CVE-2017-12792.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 107090388,
|
||||
"name": "cve-2017-12792",
|
||||
"full_name": "ZZS2017\/cve-2017-12792",
|
||||
"owner": {
|
||||
"login": "ZZS2017",
|
||||
"id": 30464951,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30464951?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZZS2017"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZZS2017\/cve-2017-12792",
|
||||
"description": "NexusPHP CSRF+XSS",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-16T07:06:19Z",
|
||||
"updated_at": "2019-11-21T10:28:20Z",
|
||||
"pushed_at": "2017-08-21T09:38:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-12852.json
Normal file
25
2017/CVE-2017-12852.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 105343958,
|
||||
"name": "numpy-1.13.1",
|
||||
"full_name": "BT123\/numpy-1.13.1",
|
||||
"owner": {
|
||||
"login": "BT123",
|
||||
"id": 9165608,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/9165608?v=4",
|
||||
"html_url": "https:\/\/github.com\/BT123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BT123\/numpy-1.13.1",
|
||||
"description": "test the CVE-2017-12852 in numpy v1.13.1 and v1.13.3 has fixed the bug ",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-30T05:21:48Z",
|
||||
"updated_at": "2017-11-03T06:18:22Z",
|
||||
"pushed_at": "2017-10-20T03:34:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-12943.json
Normal file
25
2017/CVE-2017-12943.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 105268887,
|
||||
"name": "D-Link",
|
||||
"full_name": "aymankhalfatni\/D-Link",
|
||||
"owner": {
|
||||
"login": "aymankhalfatni",
|
||||
"id": 19715320,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/19715320?v=4",
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni\/D-Link",
|
||||
"description": "CVE-2017-12943",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-29T12:18:40Z",
|
||||
"updated_at": "2017-09-29T12:18:40Z",
|
||||
"pushed_at": "2017-09-29T12:22:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2017/CVE-2017-13089.json
Normal file
48
2017/CVE-2017-13089.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 108590896,
|
||||
"name": "CVE-2017-13089",
|
||||
"full_name": "r1b\/CVE-2017-13089",
|
||||
"owner": {
|
||||
"login": "r1b",
|
||||
"id": 5550520,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5550520?v=4",
|
||||
"html_url": "https:\/\/github.com\/r1b"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r1b\/CVE-2017-13089",
|
||||
"description": "PoC for wget v1.19.1",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-27T20:06:11Z",
|
||||
"updated_at": "2020-12-26T09:31:18Z",
|
||||
"pushed_at": "2018-02-02T11:30:04Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 110805304,
|
||||
"name": "CVE-2017-13089",
|
||||
"full_name": "mzeyong\/CVE-2017-13089",
|
||||
"owner": {
|
||||
"login": "mzeyong",
|
||||
"id": 20426501,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20426501?v=4",
|
||||
"html_url": "https:\/\/github.com\/mzeyong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mzeyong\/CVE-2017-13089",
|
||||
"description": "CVE-2017-13089",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-15T08:22:58Z",
|
||||
"updated_at": "2019-05-21T04:08:55Z",
|
||||
"pushed_at": "2017-11-15T08:36:12Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 115697431,
|
||||
"name": "Janus-CVE-2017-13156",
|
||||
"full_name": "xyzAsian\/Janus-CVE-2017-13156",
|
||||
"owner": {
|
||||
"login": "xyzAsian",
|
||||
"id": 34933799,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34933799?v=4",
|
||||
"html_url": "https:\/\/github.com\/xyzAsian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xyzAsian\/Janus-CVE-2017-13156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-12-29T07:11:42Z",
|
||||
"updated_at": "2019-11-26T05:42:27Z",
|
||||
"pushed_at": "2017-12-29T08:01:10Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188905732,
|
||||
"name": "CVE-2017-13156",
|
||||
|
|
25
2017/CVE-2017-13672.json
Normal file
25
2017/CVE-2017-13672.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 115146971,
|
||||
"name": "CVE-2017-13672",
|
||||
"full_name": "DavidBuchanan314\/CVE-2017-13672",
|
||||
"owner": {
|
||||
"login": "DavidBuchanan314",
|
||||
"id": 13520633,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13520633?v=4",
|
||||
"html_url": "https:\/\/github.com\/DavidBuchanan314"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DavidBuchanan314\/CVE-2017-13672",
|
||||
"description": "POCs for CVE-2017-13672 (OOB read in VGA Cirrus QEMU driver, causing DoS)",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-22T20:08:33Z",
|
||||
"updated_at": "2018-01-29T04:34:02Z",
|
||||
"pushed_at": "2017-12-22T22:52:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-13868.json
Normal file
25
2017/CVE-2017-13868.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 106086726,
|
||||
"name": "ctl_ctloutput-leak",
|
||||
"full_name": "bazad\/ctl_ctloutput-leak",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/ctl_ctloutput-leak",
|
||||
"description": "CVE-2017-13868: Information leak of uninitialized kernel heap data in XNU.",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-07T09:42:05Z",
|
||||
"updated_at": "2019-11-05T03:14:33Z",
|
||||
"pushed_at": "2017-12-07T01:04:52Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-13872.json
Normal file
25
2017/CVE-2017-13872.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 112584924,
|
||||
"name": "CVE-2017-13872-Patch",
|
||||
"full_name": "giovannidispoto\/CVE-2017-13872-Patch",
|
||||
"owner": {
|
||||
"login": "giovannidispoto",
|
||||
"id": 7195434,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7195434?v=4",
|
||||
"html_url": "https:\/\/github.com\/giovannidispoto"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/giovannidispoto\/CVE-2017-13872-Patch",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-30T08:22:00Z",
|
||||
"updated_at": "2017-11-30T08:23:41Z",
|
||||
"pushed_at": "2017-11-30T15:26:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-14105.json
Normal file
25
2017/CVE-2017-14105.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 102123441,
|
||||
"name": "CVE-2017-14105",
|
||||
"full_name": "theguly\/CVE-2017-14105",
|
||||
"owner": {
|
||||
"login": "theguly",
|
||||
"id": 1745802,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1745802?v=4",
|
||||
"html_url": "https:\/\/github.com\/theguly"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/theguly\/CVE-2017-14105",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-01T14:51:31Z",
|
||||
"updated_at": "2019-01-08T00:25:52Z",
|
||||
"pushed_at": "2017-09-14T13:14:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-14262.json
Normal file
25
2017/CVE-2017-14262.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 102810621,
|
||||
"name": "CVE-2017-14262",
|
||||
"full_name": "zzz66686\/CVE-2017-14262",
|
||||
"owner": {
|
||||
"login": "zzz66686",
|
||||
"id": 14144972,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/14144972?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzz66686"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14262",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T02:59:21Z",
|
||||
"updated_at": "2020-12-02T19:55:31Z",
|
||||
"pushed_at": "2017-09-13T14:39:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-14263.json
Normal file
25
2017/CVE-2017-14263.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 102832029,
|
||||
"name": "CVE-2017-14263",
|
||||
"full_name": "zzz66686\/CVE-2017-14263",
|
||||
"owner": {
|
||||
"login": "zzz66686",
|
||||
"id": 14144972,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/14144972?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzz66686"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14263",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T07:27:13Z",
|
||||
"updated_at": "2020-05-18T10:42:14Z",
|
||||
"pushed_at": "2017-09-13T14:40:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-14491.json
Normal file
25
2017/CVE-2017-14491.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 108858920,
|
||||
"name": "dnsmasq-2.4.1-fix-CVE-2017-14491",
|
||||
"full_name": "skyformat99\/dnsmasq-2.4.1-fix-CVE-2017-14491",
|
||||
"owner": {
|
||||
"login": "skyformat99",
|
||||
"id": 10938976,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10938976?v=4",
|
||||
"html_url": "https:\/\/github.com\/skyformat99"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/skyformat99\/dnsmasq-2.4.1-fix-CVE-2017-14491",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-30T14:02:52Z",
|
||||
"updated_at": "2020-07-25T01:12:06Z",
|
||||
"pushed_at": "2017-10-30T01:43:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 107277248,
|
||||
"name": "Infineon-CVE-2017-15361",
|
||||
"full_name": "lva\/Infineon-CVE-2017-15361",
|
||||
"owner": {
|
||||
"login": "lva",
|
||||
"id": 1962037,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1962037?v=4",
|
||||
"html_url": "https:\/\/github.com\/lva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lva\/Infineon-CVE-2017-15361",
|
||||
"description": "Simple PowerShell script to check whether a computer is using an Infineon TPM chip that is vulnerable to CVE-2017-15361.",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-17T14:07:45Z",
|
||||
"updated_at": "2017-10-23T02:23:23Z",
|
||||
"pushed_at": "2017-10-19T11:24:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107299810,
|
||||
"name": "rocacheck",
|
||||
"full_name": "titanous\/rocacheck",
|
||||
"owner": {
|
||||
"login": "titanous",
|
||||
"id": 13026,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13026?v=4",
|
||||
"html_url": "https:\/\/github.com\/titanous"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/titanous\/rocacheck",
|
||||
"description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-17T17:08:22Z",
|
||||
"updated_at": "2020-10-13T11:26:22Z",
|
||||
"pushed_at": "2017-10-23T19:39:21Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107551756,
|
||||
"name": "RocaCmTest",
|
||||
"full_name": "jnpuskar\/RocaCmTest",
|
||||
"owner": {
|
||||
"login": "jnpuskar",
|
||||
"id": 8107471,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8107471?v=4",
|
||||
"html_url": "https:\/\/github.com\/jnpuskar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jnpuskar\/RocaCmTest",
|
||||
"description": "Windows tool that analyzes your computer for Infineon TPM weak RSA keys (CVE-2017-15361) ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-19T13:42:52Z",
|
||||
"updated_at": "2017-10-19T17:24:19Z",
|
||||
"pushed_at": "2017-10-20T12:09:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107592667,
|
||||
"name": "Detect-CVE-2017-15361-TPM",
|
||||
|
@ -45,6 +114,29 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 108287639,
|
||||
"name": "roca",
|
||||
"full_name": "0xxon\/roca",
|
||||
"owner": {
|
||||
"login": "0xxon",
|
||||
"id": 1538460,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xxon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xxon\/roca",
|
||||
"description": "Reimplementation of CVE-2017-15361 checker in C",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-25T15:16:11Z",
|
||||
"updated_at": "2017-10-25T15:16:43Z",
|
||||
"pushed_at": "2017-10-25T15:16:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 309390412,
|
||||
"name": "Attacco-ROCA-sulla-vulnerabilita-CVE-2017-15361",
|
||||
|
|
25
2017/CVE-2017-15394.json
Normal file
25
2017/CVE-2017-15394.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 112094225,
|
||||
"name": "CVE-2017-15394",
|
||||
"full_name": "sudosammy\/CVE-2017-15394",
|
||||
"owner": {
|
||||
"login": "sudosammy",
|
||||
"id": 18524051,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18524051?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudosammy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudosammy\/CVE-2017-15394",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-26T15:32:04Z",
|
||||
"updated_at": "2017-11-26T15:32:04Z",
|
||||
"pushed_at": "2017-11-26T15:32:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-15708.json
Normal file
25
2017/CVE-2017-15708.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 114627582,
|
||||
"name": "CVE-2017-15708",
|
||||
"full_name": "HuSoul\/CVE-2017-15708",
|
||||
"owner": {
|
||||
"login": "HuSoul",
|
||||
"id": 17831277,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/17831277?v=4",
|
||||
"html_url": "https:\/\/github.com\/HuSoul"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HuSoul\/CVE-2017-15708",
|
||||
"description": "Apache synapse 反序列化 CVE–2017–15708",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-18T10:27:58Z",
|
||||
"updated_at": "2020-09-24T10:42:20Z",
|
||||
"pushed_at": "2017-12-18T07:16:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 114719978,
|
||||
"name": "CVE-2017-15944-POC",
|
||||
"full_name": "xxnbyy\/CVE-2017-15944-POC",
|
||||
"owner": {
|
||||
"login": "xxnbyy",
|
||||
"id": 20261647,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/20261647?v=4",
|
||||
"html_url": "https:\/\/github.com\/xxnbyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xxnbyy\/CVE-2017-15944-POC",
|
||||
"description": "CVE-2017-15944 Palo Alto Networks firewalls remote root code execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-19T04:43:24Z",
|
||||
"updated_at": "2019-08-27T03:14:33Z",
|
||||
"pushed_at": "2017-12-15T02:57:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134778333,
|
||||
"name": "PaloAltoRceDetectionAndExploit",
|
||||
|
|
25
2017/CVE-2017-1635.json
Normal file
25
2017/CVE-2017-1635.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 120433534,
|
||||
"name": "tivoli-poc",
|
||||
"full_name": "emcalv\/tivoli-poc",
|
||||
"owner": {
|
||||
"login": "emcalv",
|
||||
"id": 36189787,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/36189787?v=4",
|
||||
"html_url": "https:\/\/github.com\/emcalv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/emcalv\/tivoli-poc",
|
||||
"description": "CVE-2017-1635 PoC code",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T09:43:28Z",
|
||||
"updated_at": "2019-05-15T02:02:47Z",
|
||||
"pushed_at": "2018-02-06T12:14:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-16524.json
Normal file
25
2017/CVE-2017-16524.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 109582148,
|
||||
"name": "CVE-2017-16524",
|
||||
"full_name": "realistic-security\/CVE-2017-16524",
|
||||
"owner": {
|
||||
"login": "realistic-security",
|
||||
"id": 33375077,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/33375077?v=4",
|
||||
"html_url": "https:\/\/github.com\/realistic-security"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/realistic-security\/CVE-2017-16524",
|
||||
"description": "Unrestricted file upload vulnerability - Web Viewer 1.0.0.193 on Samsung SRN-1670D",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-05T13:32:43Z",
|
||||
"updated_at": "2019-11-18T19:42:37Z",
|
||||
"pushed_at": "2017-11-05T23:17:44Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-16806.json
Normal file
25
2017/CVE-2017-16806.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 110611562,
|
||||
"name": "ulteriusExploit",
|
||||
"full_name": "rickoooooo\/ulteriusExploit",
|
||||
"owner": {
|
||||
"login": "rickoooooo",
|
||||
"id": 33641230,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/33641230?v=4",
|
||||
"html_url": "https:\/\/github.com\/rickoooooo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rickoooooo\/ulteriusExploit",
|
||||
"description": "Python exploit for CVE-2017-16806",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-13T22:48:46Z",
|
||||
"updated_at": "2017-11-13T22:52:09Z",
|
||||
"pushed_at": "2017-11-13T23:04:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-16997.json
Normal file
25
2017/CVE-2017-16997.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 116118639,
|
||||
"name": "CVE-2017-16997-poc",
|
||||
"full_name": "Xiami2012\/CVE-2017-16997-poc",
|
||||
"owner": {
|
||||
"login": "Xiami2012",
|
||||
"id": 1927254,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1927254?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xiami2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
|
||||
"description": "A proof-of-concept for CVE-2017-16997",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T09:31:55Z",
|
||||
"updated_at": "2018-01-03T09:33:01Z",
|
||||
"pushed_at": "2018-01-03T10:39:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 115311315,
|
||||
"name": "CVE-2017-17215",
|
||||
"full_name": "1337g\/CVE-2017-17215",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-17215",
|
||||
"description": "CVE-2017-17215 HuaWei Router RCE (NOT TESTED)",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-25T06:11:24Z",
|
||||
"updated_at": "2020-06-23T07:42:36Z",
|
||||
"pushed_at": "2018-01-04T02:31:57Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313596733,
|
||||
"name": "HG532d-RCE-Exploit",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 123458951,
|
||||
"name": "Jackson-CVE-2017-17485",
|
||||
"full_name": "maxbitcoin\/Jackson-CVE-2017-17485",
|
||||
"owner": {
|
||||
"login": "maxbitcoin",
|
||||
"id": 5998127,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5998127?v=4",
|
||||
"html_url": "https:\/\/github.com\/maxbitcoin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maxbitcoin\/Jackson-CVE-2017-17485",
|
||||
"description": "Jackson 反序列化",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-01T16:09:20Z",
|
||||
"updated_at": "2020-11-28T11:13:43Z",
|
||||
"pushed_at": "2018-01-24T03:03:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158195318,
|
||||
"name": "CVE-2017-17485",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 115486127,
|
||||
"name": "CVE-2017-17562",
|
||||
"full_name": "1337g\/CVE-2017-17562",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-17562",
|
||||
"description": "CVE-2017-17562 GOAHEAD RCE (Author: Daniel Hodson)",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-27T05:46:50Z",
|
||||
"updated_at": "2018-11-30T02:36:05Z",
|
||||
"pushed_at": "2017-12-27T05:51:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 215594323,
|
||||
"name": "CVE-2017-17562",
|
||||
|
|
25
2017/CVE-2017-17692.json
Normal file
25
2017/CVE-2017-17692.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 116019676,
|
||||
"name": "CVE-2017-17692",
|
||||
"full_name": "lr3800\/CVE-2017-17692",
|
||||
"owner": {
|
||||
"login": "lr3800",
|
||||
"id": 22863274,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22863274?v=4",
|
||||
"html_url": "https:\/\/github.com\/lr3800"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lr3800\/CVE-2017-17692",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T13:47:36Z",
|
||||
"updated_at": "2018-10-30T16:01:07Z",
|
||||
"pushed_at": "2018-01-02T13:58:02Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-18486.json
Normal file
25
2017/CVE-2017-18486.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 104919233,
|
||||
"name": "JitBit_Helpdesk_Auth_Bypass",
|
||||
"full_name": "Kc57\/JitBit_Helpdesk_Auth_Bypass",
|
||||
"owner": {
|
||||
"login": "Kc57",
|
||||
"id": 16500627,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/16500627?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kc57"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kc57\/JitBit_Helpdesk_Auth_Bypass",
|
||||
"description": "Utility to derive the shared secret on a JitBit Helpdesk install which can be used for authentication bypass (CVE-2017-18486)",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-26T17:51:01Z",
|
||||
"updated_at": "2019-08-09T18:35:26Z",
|
||||
"pushed_at": "2017-09-26T17:56:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-2368.json
Normal file
25
2017/CVE-2017-2368.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100696664,
|
||||
"name": "CVE-2017-2368",
|
||||
"full_name": "vincedes3\/CVE-2017-2368",
|
||||
"owner": {
|
||||
"login": "vincedes3",
|
||||
"id": 26314689,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26314689?v=4",
|
||||
"html_url": "https:\/\/github.com\/vincedes3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vincedes3\/CVE-2017-2368",
|
||||
"description": "CVE-2017-2368 VCF Message App Crash Bug",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-18T09:33:57Z",
|
||||
"updated_at": "2017-08-18T09:33:57Z",
|
||||
"pushed_at": "2017-08-18T09:36:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 80148945,
|
||||
"name": "extra_recipe",
|
||||
"full_name": "maximehip\/extra_recipe",
|
||||
"owner": {
|
||||
"login": "maximehip",
|
||||
"id": 6273425,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6273425?v=4",
|
||||
"html_url": "https:\/\/github.com\/maximehip"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maximehip\/extra_recipe",
|
||||
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-26T19:47:43Z",
|
||||
"updated_at": "2017-01-26T19:48:19Z",
|
||||
"pushed_at": "2017-01-26T19:48:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 80717942,
|
||||
"name": "extra_recipe",
|
||||
"full_name": "JackBro\/extra_recipe",
|
||||
"owner": {
|
||||
"login": "JackBro",
|
||||
"id": 21210712,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21210712?v=4",
|
||||
"html_url": "https:\/\/github.com\/JackBro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
|
||||
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-02T11:16:38Z",
|
||||
"updated_at": "2017-10-14T08:34:32Z",
|
||||
"pushed_at": "2017-01-27T17:44:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 81874110,
|
||||
"name": "extra_recipe-iOS-10.2",
|
||||
"full_name": "Rootkitsmm\/extra_recipe-iOS-10.2",
|
||||
"owner": {
|
||||
"login": "Rootkitsmm",
|
||||
"id": 5567904,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5567904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm\/extra_recipe-iOS-10.2",
|
||||
"description": "CVE-2017-2370",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-13T21:32:40Z",
|
||||
"updated_at": "2019-01-03T05:45:15Z",
|
||||
"pushed_at": "2017-02-01T11:36:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 142854846,
|
||||
"name": "CVE-2017-2370",
|
||||
|
|
25
2017/CVE-2017-2388.json
Normal file
25
2017/CVE-2017-2388.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 99374230,
|
||||
"name": "IOFireWireFamily-null-deref",
|
||||
"full_name": "bazad\/IOFireWireFamily-null-deref",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/IOFireWireFamily-null-deref",
|
||||
"description": "CVE-2017-2388: Null-pointer dereference in IOFireWireFamily.",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-04T19:35:20Z",
|
||||
"updated_at": "2018-09-24T18:54:13Z",
|
||||
"pushed_at": "2017-08-16T20:16:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-2636.json
Normal file
25
2017/CVE-2017-2636.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 84497885,
|
||||
"name": "cve-2017-2636-el",
|
||||
"full_name": "alexzorin\/cve-2017-2636-el",
|
||||
"owner": {
|
||||
"login": "alexzorin",
|
||||
"id": 311534,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/311534?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexzorin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexzorin\/cve-2017-2636-el",
|
||||
"description": "Ansible role for workaround for CVE-2017-2636 (Red Hat) - https:\/\/access.redhat.com\/security\/cve\/CVE-2017-2636",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-09T23:20:42Z",
|
||||
"updated_at": "2017-03-18T16:23:19Z",
|
||||
"pushed_at": "2017-03-09T23:21:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-2671.json
Normal file
25
2017/CVE-2017-2671.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 93707325,
|
||||
"name": "CVE-2017-2671",
|
||||
"full_name": "homjxi0e\/CVE-2017-2671",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-2671",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-06-08T04:28:31Z",
|
||||
"updated_at": "2017-06-08T04:46:23Z",
|
||||
"pushed_at": "2017-06-08T04:46:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-2793.json
Normal file
25
2017/CVE-2017-2793.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 95873037,
|
||||
"name": "Detection-for-CVE-2017-2793",
|
||||
"full_name": "sUbc0ol\/Detection-for-CVE-2017-2793",
|
||||
"owner": {
|
||||
"login": "sUbc0ol",
|
||||
"id": 24601456,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
|
||||
"html_url": "https:\/\/github.com\/sUbc0ol"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sUbc0ol\/Detection-for-CVE-2017-2793",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-06-30T09:32:42Z",
|
||||
"updated_at": "2020-03-26T07:50:50Z",
|
||||
"pushed_at": "2017-06-30T09:35:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-3078.json
Normal file
25
2017/CVE-2017-3078.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 95431299,
|
||||
"name": "CVE-2017-3078",
|
||||
"full_name": "homjxi0e\/CVE-2017-3078",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3078",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-06-26T09:34:59Z",
|
||||
"updated_at": "2017-06-26T09:34:59Z",
|
||||
"pushed_at": "2017-06-26T09:49:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-3241.json
Normal file
25
2017/CVE-2017-3241.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 96219146,
|
||||
"name": "CVE-2017-3241-POC",
|
||||
"full_name": "xfei3\/CVE-2017-3241-POC",
|
||||
"owner": {
|
||||
"login": "xfei3",
|
||||
"id": 29874084,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29874084?v=4",
|
||||
"html_url": "https:\/\/github.com\/xfei3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC",
|
||||
"description": "POC for java RMI deserialization vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-04T13:05:46Z",
|
||||
"updated_at": "2020-03-29T07:05:46Z",
|
||||
"pushed_at": "2017-07-19T23:55:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-3599.json
Normal file
25
2017/CVE-2017-3599.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 88650555,
|
||||
"name": "CVE-2017-3599",
|
||||
"full_name": "SECFORCE\/CVE-2017-3599",
|
||||
"owner": {
|
||||
"login": "SECFORCE",
|
||||
"id": 8157384,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
|
||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2017-3599",
|
||||
"description": "Proof of concept exploit for CVE-2017-3599",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-18T17:08:39Z",
|
||||
"updated_at": "2020-08-03T19:51:16Z",
|
||||
"pushed_at": "2017-04-18T17:10:18Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2017/CVE-2017-3730.json
Normal file
48
2017/CVE-2017-3730.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 79682713,
|
||||
"name": "CVE-2017-3730",
|
||||
"full_name": "guidovranken\/CVE-2017-3730",
|
||||
"owner": {
|
||||
"login": "guidovranken",
|
||||
"id": 6846644,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6846644?v=4",
|
||||
"html_url": "https:\/\/github.com\/guidovranken"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
|
||||
"description": "OpenSSL CVE-2017-3730 proof-of-concept",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-22T00:40:34Z",
|
||||
"updated_at": "2018-12-04T20:01:55Z",
|
||||
"pushed_at": "2017-01-26T01:30:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 97466064,
|
||||
"name": "OpenSSL-CVE-2017-3730",
|
||||
"full_name": "ymmah\/OpenSSL-CVE-2017-3730",
|
||||
"owner": {
|
||||
"login": "ymmah",
|
||||
"id": 22575313,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22575313?v=4",
|
||||
"html_url": "https:\/\/github.com\/ymmah"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ymmah\/OpenSSL-CVE-2017-3730",
|
||||
"description": "挑戰 (U+8101): OpenSSL CVE-2017-3730 proof-of-concept",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-17T10:51:09Z",
|
||||
"updated_at": "2017-07-17T11:09:15Z",
|
||||
"pushed_at": "2017-07-17T10:51:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
117
2017/CVE-2017-3881.json
Normal file
117
2017/CVE-2017-3881.json
Normal file
|
@ -0,0 +1,117 @@
|
|||
[
|
||||
{
|
||||
"id": 87763747,
|
||||
"name": "cisco-rce",
|
||||
"full_name": "artkond\/cisco-rce",
|
||||
"owner": {
|
||||
"login": "artkond",
|
||||
"id": 4436674,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4436674?v=4",
|
||||
"html_url": "https:\/\/github.com\/artkond"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/artkond\/cisco-rce",
|
||||
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-10T03:44:04Z",
|
||||
"updated_at": "2020-12-10T07:44:34Z",
|
||||
"pushed_at": "2017-04-12T09:17:27Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88804675,
|
||||
"name": "CVE-2017-3881-exploit-cisco-",
|
||||
"full_name": "homjxi0e\/CVE-2017-3881-exploit-cisco-",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3881-exploit-cisco-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-20T00:52:10Z",
|
||||
"updated_at": "2020-04-07T06:31:35Z",
|
||||
"pushed_at": "2017-04-20T00:52:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 90087111,
|
||||
"name": "CVE-2017-3881-Cisco",
|
||||
"full_name": "homjxi0e\/CVE-2017-3881-Cisco",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3881-Cisco",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-02T23:21:53Z",
|
||||
"updated_at": "2017-05-02T23:28:05Z",
|
||||
"pushed_at": "2017-05-02T23:28:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 90975256,
|
||||
"name": "PoC-CVE-2017-3881",
|
||||
"full_name": "zakybstrd21215\/PoC-CVE-2017-3881",
|
||||
"owner": {
|
||||
"login": "zakybstrd21215",
|
||||
"id": 22362343,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4",
|
||||
"html_url": "https:\/\/github.com\/zakybstrd21215"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-3881",
|
||||
"description": "Cisco Catalyst Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-11T12:11:51Z",
|
||||
"updated_at": "2017-05-11T12:16:43Z",
|
||||
"pushed_at": "2017-05-11T13:52:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 115962692,
|
||||
"name": "CVE-2017-3881",
|
||||
"full_name": "1337g\/CVE-2017-3881",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881",
|
||||
"description": "credit to artkond",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T01:45:15Z",
|
||||
"updated_at": "2018-01-10T18:55:16Z",
|
||||
"pushed_at": "2018-01-02T01:46:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2017/CVE-2017-4490.json
Normal file
48
2017/CVE-2017-4490.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 89991237,
|
||||
"name": "CVE-2017-4490-",
|
||||
"full_name": "homjxi0e\/CVE-2017-4490-",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-02T04:21:46Z",
|
||||
"updated_at": "2017-08-23T09:25:02Z",
|
||||
"pushed_at": "2017-07-10T23:37:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 96573883,
|
||||
"name": "CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T20:21:51Z",
|
||||
"updated_at": "2017-08-23T09:24:55Z",
|
||||
"pushed_at": "2017-07-11T15:36:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-4878.json
Normal file
25
2017/CVE-2017-4878.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 120257153,
|
||||
"name": "CVE-2017-4878-Samples",
|
||||
"full_name": "brianwrf\/CVE-2017-4878-Samples",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2017-4878-Samples",
|
||||
"description": "CVE-2017-4878 Samples - http:\/\/blog.talosintelligence.com\/2018\/02\/group-123-goes-wild.html",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-05T05:01:40Z",
|
||||
"updated_at": "2020-07-17T00:46:48Z",
|
||||
"pushed_at": "2018-02-05T05:17:41Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-5005.json
Normal file
25
2017/CVE-2017-5005.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 77828551,
|
||||
"name": "QuickHeal",
|
||||
"full_name": "payatu\/QuickHeal",
|
||||
"owner": {
|
||||
"login": "payatu",
|
||||
"id": 16715624,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16715624?v=4",
|
||||
"html_url": "https:\/\/github.com\/payatu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/payatu\/QuickHeal",
|
||||
"description": "CVE-2017-5005 for Quick Heal Antivirus",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-02T11:21:00Z",
|
||||
"updated_at": "2020-03-27T02:45:54Z",
|
||||
"pushed_at": "2017-03-31T14:49:28Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 108940978,
|
||||
"name": "CVE-2017-5123",
|
||||
"full_name": "FloatingGuy\/CVE-2017-5123",
|
||||
"owner": {
|
||||
"login": "FloatingGuy",
|
||||
"id": 6472909,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6472909?v=4",
|
||||
"html_url": "https:\/\/github.com\/FloatingGuy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FloatingGuy\/CVE-2017-5123",
|
||||
"description": "linux kernel exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-31T03:35:31Z",
|
||||
"updated_at": "2017-12-31T09:13:28Z",
|
||||
"pushed_at": "2017-10-31T03:39:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 109344615,
|
||||
"name": "CVE-2017-5123",
|
||||
"full_name": "0x5068656e6f6c\/CVE-2017-5123",
|
||||
"owner": {
|
||||
"login": "0x5068656e6f6c",
|
||||
"id": 22329435,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22329435?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x5068656e6f6c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x5068656e6f6c\/CVE-2017-5123",
|
||||
"description": "Exploit for the linux kernel vulnerability CVE-2017-5123",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-03T02:52:26Z",
|
||||
"updated_at": "2018-10-20T20:12:24Z",
|
||||
"pushed_at": "2017-11-03T02:58:39Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123423508,
|
||||
"name": "exploiting-cve-2017-5123",
|
||||
|
|
25
2017/CVE-2017-5124.json
Normal file
25
2017/CVE-2017-5124.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 110604918,
|
||||
"name": "CVE-2017-5124",
|
||||
"full_name": "Bo0oM\/CVE-2017-5124",
|
||||
"owner": {
|
||||
"login": "Bo0oM",
|
||||
"id": 3492361,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3492361?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bo0oM"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bo0oM\/CVE-2017-5124",
|
||||
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-13T21:33:55Z",
|
||||
"updated_at": "2020-12-18T03:59:38Z",
|
||||
"pushed_at": "2017-11-14T10:26:28Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-5415.json
Normal file
25
2017/CVE-2017-5415.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 88234209,
|
||||
"name": "CVE-2017-5415",
|
||||
"full_name": "649\/CVE-2017-5415",
|
||||
"owner": {
|
||||
"login": "649",
|
||||
"id": 23534047,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23534047?v=4",
|
||||
"html_url": "https:\/\/github.com\/649"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/649\/CVE-2017-5415",
|
||||
"description": "Addressbar spoofing through blob URL (Firefox browser). An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by blob: as the protocol, leading to user confusion and further spoofing attacks.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-14T04:55:41Z",
|
||||
"updated_at": "2020-07-12T20:54:15Z",
|
||||
"pushed_at": "2017-04-14T04:55:51Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 107852472,
|
||||
"name": "wpUsersScan",
|
||||
"full_name": "teambugsbunny\/wpUsersScan",
|
||||
"owner": {
|
||||
"login": "teambugsbunny",
|
||||
"id": 32997799,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/32997799?v=4",
|
||||
"html_url": "https:\/\/github.com\/teambugsbunny"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan",
|
||||
"description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-22T09:22:28Z",
|
||||
"updated_at": "2020-04-06T12:23:41Z",
|
||||
"pushed_at": "2017-06-11T16:47:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121831599,
|
||||
"name": "wpUsersScan",
|
||||
|
|
25
2017/CVE-2017-5633.json
Normal file
25
2017/CVE-2017-5633.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 88568725,
|
||||
"name": "Exploit-CVE-2017-5633",
|
||||
"full_name": "cardangi\/Exploit-CVE-2017-5633",
|
||||
"owner": {
|
||||
"login": "cardangi",
|
||||
"id": 22066466,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22066466?v=4",
|
||||
"html_url": "https:\/\/github.com\/cardangi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cardangi\/Exploit-CVE-2017-5633",
|
||||
"description": "Exploit developed by me for CVE-2017-5633.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-18T01:44:33Z",
|
||||
"updated_at": "2020-04-07T06:34:50Z",
|
||||
"pushed_at": "2017-04-18T02:54:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
File diff suppressed because it is too large
Load diff
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 90210170,
|
||||
"name": "CVE-2017-5689",
|
||||
"full_name": "CerberusSecurity\/CVE-2017-5689",
|
||||
"owner": {
|
||||
"login": "CerberusSecurity",
|
||||
"id": 21088337,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21088337?v=4",
|
||||
"html_url": "https:\/\/github.com\/CerberusSecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CerberusSecurity\/CVE-2017-5689",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-04T01:51:26Z",
|
||||
"updated_at": "2020-01-01T00:38:18Z",
|
||||
"pushed_at": "2017-05-04T03:06:32Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 90472957,
|
||||
"name": "amthoneypot",
|
||||
|
@ -21,5 +44,51 @@
|
|||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 90724328,
|
||||
"name": "intel_amt_bypass",
|
||||
"full_name": "Bijaye\/intel_amt_bypass",
|
||||
"owner": {
|
||||
"login": "Bijaye",
|
||||
"id": 4318412,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4318412?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bijaye"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bijaye\/intel_amt_bypass",
|
||||
"description": "simple python poc for CVE-2017-5689",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-09T08:55:39Z",
|
||||
"updated_at": "2020-07-05T02:24:05Z",
|
||||
"pushed_at": "2017-05-09T00:42:12Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 98579784,
|
||||
"name": "amt_auth_bypass_poc",
|
||||
"full_name": "embedi\/amt_auth_bypass_poc",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
|
||||
"description": "CVE-2017-5689 Proof-of-Concept exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-27T21:06:08Z",
|
||||
"updated_at": "2020-05-17T13:44:14Z",
|
||||
"pushed_at": "2017-07-27T21:08:49Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 116768537,
|
||||
"name": "exploit-cve-2017-5715",
|
||||
"full_name": "opsxcq\/exploit-cve-2017-5715",
|
||||
"owner": {
|
||||
"login": "opsxcq",
|
||||
"id": 16995025,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16995025?v=4",
|
||||
"html_url": "https:\/\/github.com\/opsxcq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
|
||||
"description": "Spectre exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T05:06:12Z",
|
||||
"updated_at": "2020-12-29T20:01:04Z",
|
||||
"pushed_at": "2018-01-09T22:27:25Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117425769,
|
||||
"name": "meltdown-spectre-bios-list",
|
||||
|
@ -44,5 +67,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117944815,
|
||||
"name": "retpoline-audit",
|
||||
"full_name": "dmo2118\/retpoline-audit",
|
||||
"owner": {
|
||||
"login": "dmo2118",
|
||||
"id": 11342823,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11342823?v=4",
|
||||
"html_url": "https:\/\/github.com\/dmo2118"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dmo2118\/retpoline-audit",
|
||||
"description": "A quick-and-dirty tool to verify that userspace executables are immune to Spectre variant 2 (CVE-2017-5715).",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-18T06:55:53Z",
|
||||
"updated_at": "2018-01-20T08:00:58Z",
|
||||
"pushed_at": "2018-02-01T07:40:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-5721.json
Normal file
25
2017/CVE-2017-5721.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 107970036,
|
||||
"name": "smm_usbrt_poc",
|
||||
"full_name": "embedi\/smm_usbrt_poc",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/smm_usbrt_poc",
|
||||
"description": "CVE-2017-5721 Proof-of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-23T11:00:18Z",
|
||||
"updated_at": "2020-10-05T13:22:55Z",
|
||||
"pushed_at": "2017-10-23T12:41:22Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,142 @@
|
|||
[
|
||||
{
|
||||
"id": 116195445,
|
||||
"name": "spectre-attack",
|
||||
"full_name": "Eugnis\/spectre-attack",
|
||||
"owner": {
|
||||
"login": "Eugnis",
|
||||
"id": 2463830,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2463830?v=4",
|
||||
"html_url": "https:\/\/github.com\/Eugnis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Eugnis\/spectre-attack",
|
||||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2020-12-24T00:42:22Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 685,
|
||||
"watchers_count": 685,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 685,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116268310,
|
||||
"name": "Spectre-PoC",
|
||||
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"owner": {
|
||||
"login": "EdwardOwusuAdjei",
|
||||
"id": 16462560,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16462560?v=4",
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T14:20:13Z",
|
||||
"updated_at": "2020-03-29T03:06:24Z",
|
||||
"pushed_at": "2018-01-04T14:27:29Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116347505,
|
||||
"name": "spectre-attack-example",
|
||||
"full_name": "poilynx\/spectre-attack-example",
|
||||
"owner": {
|
||||
"login": "poilynx",
|
||||
"id": 8926090,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8926090?v=4",
|
||||
"html_url": "https:\/\/github.com\/poilynx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
|
||||
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用例子",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T05:51:34Z",
|
||||
"updated_at": "2020-07-18T14:08:00Z",
|
||||
"pushed_at": "2018-01-05T05:56:02Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116402577,
|
||||
"name": "cve-2017-5753",
|
||||
"full_name": "xsscx\/cve-2017-5753",
|
||||
"owner": {
|
||||
"login": "xsscx",
|
||||
"id": 10790582,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/10790582?v=4",
|
||||
"html_url": "https:\/\/github.com\/xsscx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xsscx\/cve-2017-5753",
|
||||
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T16:05:05Z",
|
||||
"updated_at": "2019-12-01T20:12:59Z",
|
||||
"pushed_at": "2018-01-06T13:06:25Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116442461,
|
||||
"name": "spectre-attack-demo",
|
||||
"full_name": "pedrolucasoliva\/spectre-attack-demo",
|
||||
"owner": {
|
||||
"login": "pedrolucasoliva",
|
||||
"id": 10757421,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10757421?v=4",
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo",
|
||||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T01:08:15Z",
|
||||
"updated_at": "2018-01-15T06:12:51Z",
|
||||
"pushed_at": "2018-01-06T01:09:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116505944,
|
||||
"name": "spectreScope",
|
||||
"full_name": "ixtal23\/spectreScope",
|
||||
"owner": {
|
||||
"login": "ixtal23",
|
||||
"id": 11915559,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11915559?v=4",
|
||||
"html_url": "https:\/\/github.com\/ixtal23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ixtal23\/spectreScope",
|
||||
"description": "The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715).",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T18:27:03Z",
|
||||
"updated_at": "2020-08-31T06:58:31Z",
|
||||
"pushed_at": "2018-01-21T22:48:08Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263311084,
|
||||
"name": "Spectre-Vulnerability-CVE-2017-5753-",
|
||||
|
|
|
@ -67,5 +67,74 @@
|
|||
"forks": 43,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116449314,
|
||||
"name": "Am-I-affected-by-Meltdown",
|
||||
"full_name": "speecyy\/Am-I-affected-by-Meltdown",
|
||||
"owner": {
|
||||
"login": "speecyy",
|
||||
"id": 35145287,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35145287?v=4",
|
||||
"html_url": "https:\/\/github.com\/speecyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown",
|
||||
"description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T03:16:33Z",
|
||||
"updated_at": "2020-02-27T19:31:43Z",
|
||||
"pushed_at": "2018-01-06T03:17:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 118008705,
|
||||
"name": "Meltdown",
|
||||
"full_name": "zzado\/Meltdown",
|
||||
"owner": {
|
||||
"login": "zzado",
|
||||
"id": 17024462,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/17024462?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzado"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzado\/Meltdown",
|
||||
"description": "PoC for Meltdown in linux (CVE-2017-5754)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-18T16:32:50Z",
|
||||
"updated_at": "2019-01-07T02:00:09Z",
|
||||
"pushed_at": "2018-02-07T07:33:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 119104266,
|
||||
"name": "meltdown-aws-scanner",
|
||||
"full_name": "jdmulloy\/meltdown-aws-scanner",
|
||||
"owner": {
|
||||
"login": "jdmulloy",
|
||||
"id": 3395292,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/3395292?v=4",
|
||||
"html_url": "https:\/\/github.com\/jdmulloy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner",
|
||||
"description": "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-26T21:18:13Z",
|
||||
"updated_at": "2019-02-27T18:46:20Z",
|
||||
"pushed_at": "2018-01-26T21:25:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-6370.json
Normal file
25
2017/CVE-2017-6370.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 85539985,
|
||||
"name": "TYPO3-v7.6.15-Unencrypted-Login-Request",
|
||||
"full_name": "faizzaidi\/TYPO3-v7.6.15-Unencrypted-Login-Request",
|
||||
"owner": {
|
||||
"login": "faizzaidi",
|
||||
"id": 12153050,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
|
||||
"html_url": "https:\/\/github.com\/faizzaidi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faizzaidi\/TYPO3-v7.6.15-Unencrypted-Login-Request",
|
||||
"description": "TYPO3 v7.6.15 Unencrypted Login Request Assigned CVE Number: CVE-2017-6370",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-20T05:51:07Z",
|
||||
"updated_at": "2020-07-17T05:22:53Z",
|
||||
"pushed_at": "2017-03-20T05:51:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 117869057,
|
||||
"name": "CiscoSpectreTakeover",
|
||||
"full_name": "GarnetSunset\/CiscoSpectreTakeover",
|
||||
"owner": {
|
||||
"login": "GarnetSunset",
|
||||
"id": 13430434,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13430434?v=4",
|
||||
"html_url": "https:\/\/github.com\/GarnetSunset"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GarnetSunset\/CiscoSpectreTakeover",
|
||||
"description": "A POC chain exploit using the recent Cisco SMP exploit (CVE-2017-6736) to chain into Spectre (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-17T17:26:14Z",
|
||||
"updated_at": "2019-01-03T02:21:40Z",
|
||||
"pushed_at": "2018-01-23T19:54:07Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 118516301,
|
||||
"name": "CiscoIOSSNMPToolkit",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 87749039,
|
||||
"name": "nfsen-exploit",
|
||||
"full_name": "patrickfreed\/nfsen-exploit",
|
||||
"owner": {
|
||||
"login": "patrickfreed",
|
||||
"id": 936020,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/936020?v=4",
|
||||
"html_url": "https:\/\/github.com\/patrickfreed"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/patrickfreed\/nfsen-exploit",
|
||||
"description": "Exploit for CVE-2017-6971 remote command execution in nfsen 1.3.7.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-10T00:13:24Z",
|
||||
"updated_at": "2020-04-07T06:36:25Z",
|
||||
"pushed_at": "2017-04-10T16:06:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 183134145,
|
||||
"name": "nfsen_1.3.7_CVE-2017-6971",
|
||||
|
|
25
2017/CVE-2017-7038.json
Normal file
25
2017/CVE-2017-7038.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 113333614,
|
||||
"name": "CVE-2017-7038",
|
||||
"full_name": "ansjdnakjdnajkd\/CVE-2017-7038",
|
||||
"owner": {
|
||||
"login": "ansjdnakjdnajkd",
|
||||
"id": 1408055,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1408055?v=4",
|
||||
"html_url": "https:\/\/github.com\/ansjdnakjdnajkd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ansjdnakjdnajkd\/CVE-2017-7038",
|
||||
"description": "Safari XSS (CVE-2017-7038) https:\/\/support.apple.com\/en-us\/HT207923",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-06T15:31:08Z",
|
||||
"updated_at": "2020-05-08T13:12:10Z",
|
||||
"pushed_at": "2017-12-06T15:41:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2017/CVE-2017-7047.json
Normal file
48
2017/CVE-2017-7047.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 99396176,
|
||||
"name": "Triple_Fetch-Kernel-Creds",
|
||||
"full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds",
|
||||
"owner": {
|
||||
"login": "JosephShenton",
|
||||
"id": 12966231,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12966231?v=4",
|
||||
"html_url": "https:\/\/github.com\/JosephShenton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds",
|
||||
"description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-05T03:23:13Z",
|
||||
"updated_at": "2020-08-25T15:10:04Z",
|
||||
"pushed_at": "2017-08-05T09:21:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 99915573,
|
||||
"name": "Triple_fetch",
|
||||
"full_name": "q1f3\/Triple_fetch",
|
||||
"owner": {
|
||||
"login": "q1f3",
|
||||
"id": 9603950,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9603950?v=4",
|
||||
"html_url": "https:\/\/github.com\/q1f3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/q1f3\/Triple_fetch",
|
||||
"description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-10T11:24:47Z",
|
||||
"updated_at": "2020-04-07T05:58:43Z",
|
||||
"pushed_at": "2017-08-03T23:47:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-7061.json
Normal file
25
2017/CVE-2017-7061.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 118516190,
|
||||
"name": "jailbreakme103",
|
||||
"full_name": "TheLoneHaxor\/jailbreakme103",
|
||||
"owner": {
|
||||
"login": "TheLoneHaxor",
|
||||
"id": 25874459,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25874459?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheLoneHaxor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheLoneHaxor\/jailbreakme103",
|
||||
"description": "Javascript Web-Kit exploit. CVE-2017-7061. By Lokihardt from Google Project Zero",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-22T21:14:30Z",
|
||||
"updated_at": "2020-07-14T10:02:28Z",
|
||||
"pushed_at": "2018-01-22T21:29:22Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue