Auto Update 2021/03/07 12:08:28

This commit is contained in:
motikan2010-bot 2021-03-07 12:08:28 +09:00
parent 37e77aff72
commit 15c217b12e
199 changed files with 332 additions and 10602 deletions

48
2004/CVE-2004-1561.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 250585913,
"name": "CVE-2004-1561",
"full_name": "ivanitlearning\/CVE-2004-1561",
"owner": {
"login": "ivanitlearning",
"id": 52420671,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4",
"html_url": "https:\/\/github.com\/ivanitlearning"
},
"html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2004-1561",
"description": "Icecast Header Overwrite buffer overflow RCE < 2.0.1 (Win32)",
"fork": false,
"created_at": "2020-03-27T16:30:22Z",
"updated_at": "2020-12-22T18:40:20Z",
"pushed_at": "2020-03-27T17:53:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 274131989,
"name": "CVE-2004-1561",
"full_name": "darrynb89\/CVE-2004-1561",
"owner": {
"login": "darrynb89",
"id": 23241437,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23241437?v=4",
"html_url": "https:\/\/github.com\/darrynb89"
},
"html_url": "https:\/\/github.com\/darrynb89\/CVE-2004-1561",
"description": "Python version of Metasploit exploit for CVE-2004-1561",
"fork": false,
"created_at": "2020-06-22T12:33:49Z",
"updated_at": "2020-06-26T09:48:30Z",
"pushed_at": "2020-06-26T09:48:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

48
2004/CVE-2004-1769.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 257726272,
"name": "shiguresh",
"full_name": "sinkaroid\/shiguresh",
"owner": {
"login": "sinkaroid",
"id": 12372481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12372481?v=4",
"html_url": "https:\/\/github.com\/sinkaroid"
},
"html_url": "https:\/\/github.com\/sinkaroid\/shiguresh",
"description": "CVE-2004-1769 \/\/ Mass cPanel Reset password",
"fork": false,
"created_at": "2020-04-21T22:03:18Z",
"updated_at": "2020-08-22T13:10:27Z",
"pushed_at": "2020-04-21T22:24:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 263513846,
"name": "shiguresh",
"full_name": "Redsplit\/shiguresh",
"owner": {
"login": "Redsplit",
"id": 65139960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65139960?v=4",
"html_url": "https:\/\/github.com\/Redsplit"
},
"html_url": "https:\/\/github.com\/Redsplit\/shiguresh",
"description": "CVE-2004-1769 \/\/ Mass cPanel Reset password",
"fork": false,
"created_at": "2020-05-13T03:18:46Z",
"updated_at": "2020-06-19T02:20:21Z",
"pushed_at": "2020-04-21T22:24:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 117777418,
"name": "CVE-2004-2271",
"full_name": "kkirsche\/CVE-2004-2271",
"owner": {
"login": "kkirsche",
"id": 947110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4",
"html_url": "https:\/\/github.com\/kkirsche"
},
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2004-2271",
"description": "Minishare 1.4.1 Remote Buffer Overflow",
"fork": false,
"created_at": "2018-01-17T03:18:32Z",
"updated_at": "2021-01-04T01:14:15Z",
"pushed_at": "2018-01-17T22:01:39Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 5,
"score": 0
},
{
"id": 142364033,
"name": "CVE-2004-2271-MiniShare-1.4.1-Buffer-Overflow",
"full_name": "PercussiveElbow\/CVE-2004-2271-MiniShare-1.4.1-Buffer-Overflow",
"owner": {
"login": "PercussiveElbow",
"id": 10052381,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10052381?v=4",
"html_url": "https:\/\/github.com\/PercussiveElbow"
},
"html_url": "https:\/\/github.com\/PercussiveElbow\/CVE-2004-2271-MiniShare-1.4.1-Buffer-Overflow",
"description": null,
"fork": false,
"created_at": "2018-07-25T23:31:21Z",
"updated_at": "2018-07-25T23:42:11Z",
"pushed_at": "2018-07-25T23:41:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 162361072,
"name": "CVE-2004-2271",
"full_name": "war4uthor\/CVE-2004-2271",
"owner": {
"login": "war4uthor",
"id": 45926018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor"
},
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2004-2271",
"description": "CVE-2004-2271 - Minishare 1.4.1 HTTP Server Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",
"fork": false,
"created_at": "2018-12-19T00:27:20Z",
"updated_at": "2020-08-05T11:37:32Z",
"pushed_at": "2018-12-19T00:31:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 237763952,
"name": "CVE-2004-2271-MiniShare-1.4.1-BOF",

View file

@ -243,8 +243,8 @@
"description": null,
"fork": false,
"created_at": "2021-03-06T20:39:21Z",
"updated_at": "2021-03-06T20:39:23Z",
"pushed_at": "2021-03-06T20:39:22Z",
"updated_at": "2021-03-06T22:11:41Z",
"pushed_at": "2021-03-06T22:11:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2021-03-01T09:21:34Z",
"updated_at": "2021-03-07T00:16:22Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 288,
"watchers_count": 288,
"forks_count": 90,
"forks": 90,
"watchers": 287,
"watchers": 288,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2021-01-20T07:16:14Z",
"updated_at": "2021-03-06T21:21:52Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"forks_count": 109,
"forks": 109,
"watchers": 274,
"watchers": 275,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2021-02-28T08:19:23Z",
"updated_at": "2021-03-06T22:27:07Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 8,
"forks": 8,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -1171,5 +1171,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 345243566,
"name": "POC-CVE-2018-6574",
"full_name": "killtr0\/POC-CVE-2018-6574",
"owner": {
"login": "killtr0",
"id": 22793707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4",
"html_url": "https:\/\/github.com\/killtr0"
},
"html_url": "https:\/\/github.com\/killtr0\/POC-CVE-2018-6574",
"description": null,
"fork": false,
"created_at": "2021-03-07T02:45:41Z",
"updated_at": "2021-03-07T02:56:30Z",
"pushed_at": "2021-03-07T02:56:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 174814901,
"name": "CVE-2019-0192",
"full_name": "mpgn\/CVE-2019-0192",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-0192",
"description": "RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl",
"fork": false,
"created_at": "2019-03-10T11:35:26Z",
"updated_at": "2021-01-19T21:06:07Z",
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 209,
"watchers_count": 209,
"forks_count": 60,
"forks": 60,
"watchers": 209,
"score": 0
},
{
"id": 218993619,
"name": "Solr-RCE-CVE-2019-0192",

View file

@ -1,50 +1,4 @@
[
{
"id": 176290079,
"name": "CVE-2019-0193",
"full_name": "xConsoIe\/CVE-2019-0193",
"owner": {
"login": "xConsoIe",
"id": 48456709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48456709?v=4",
"html_url": "https:\/\/github.com\/xConsoIe"
},
"html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193",
"description": null,
"fork": false,
"created_at": "2019-03-18T13:18:01Z",
"updated_at": "2020-11-29T10:18:07Z",
"pushed_at": "2019-03-18T13:22:48Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"forks": 7,
"watchers": 8,
"score": 0
},
{
"id": 201405406,
"name": "CVE-2019-0193",
"full_name": "jas502n\/CVE-2019-0193",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0193",
"description": "Apache Solr DataImport Handler RCE",
"fork": false,
"created_at": "2019-08-09T06:27:39Z",
"updated_at": "2021-02-19T09:18:13Z",
"pushed_at": "2019-08-12T02:23:38Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 39,
"forks": 39,
"watchers": 75,
"score": 0
},
{
"id": 201878363,
"name": "solr_exploit",
@ -67,28 +21,5 @@
"forks": 11,
"watchers": 45,
"score": 0
},
{
"id": 206173868,
"name": "CVE-2019-0193-exp",
"full_name": "jaychouzzk\/CVE-2019-0193-exp",
"owner": {
"login": "jaychouzzk",
"id": 45549315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45549315?v=4",
"html_url": "https:\/\/github.com\/jaychouzzk"
},
"html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-0193-exp",
"description": null,
"fork": false,
"created_at": "2019-09-03T21:16:24Z",
"updated_at": "2020-09-06T01:31:02Z",
"pushed_at": "2019-09-04T15:40:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 186238849,
"name": "Apache-Exploit-2019",
"full_name": "ozkanbilge\/Apache-Exploit-2019",
"owner": {
"login": "ozkanbilge",
"id": 39211596,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39211596?v=4",
"html_url": "https:\/\/github.com\/ozkanbilge"
},
"html_url": "https:\/\/github.com\/ozkanbilge\/Apache-Exploit-2019",
"description": "CVE-2019-0211-apache & CVE-2019-6977-imagecolormatch",
"fork": false,
"created_at": "2019-05-12T10:08:57Z",
"updated_at": "2020-10-28T12:43:15Z",
"pushed_at": "2019-05-12T10:09:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"forks": 7,
"watchers": 11,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 217869109,
"name": "cve-2019-0227",
"full_name": "ianxtianxt\/cve-2019-0227",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt"
},
"html_url": "https:\/\/github.com\/ianxtianxt\/cve-2019-0227",
"description": "apache axis1.4远程代码执行漏洞",
"fork": false,
"created_at": "2019-10-27T14:42:54Z",
"updated_at": "2020-10-29T03:05:29Z",
"pushed_at": "2019-10-27T14:51:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -22,52 +22,6 @@
"watchers": 178,
"score": 0
},
{
"id": 181706868,
"name": "CVE-2019-0232",
"full_name": "jas502n\/CVE-2019-0232",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0232",
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
"fork": false,
"created_at": "2019-04-16T14:32:03Z",
"updated_at": "2020-12-23T03:59:42Z",
"pushed_at": "2019-04-17T02:42:03Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 25,
"forks": 25,
"watchers": 62,
"score": 0
},
{
"id": 188168912,
"name": "CVE-2019-0232-EXP",
"full_name": "CherishHair\/CVE-2019-0232-EXP",
"owner": {
"login": "CherishHair",
"id": 16273668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16273668?v=4",
"html_url": "https:\/\/github.com\/CherishHair"
},
"html_url": "https:\/\/github.com\/CherishHair\/CVE-2019-0232-EXP",
"description": null,
"fork": false,
"created_at": "2019-05-23T05:44:29Z",
"updated_at": "2019-11-27T11:05:38Z",
"pushed_at": "2019-05-23T13:13:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 223192188,
"name": "CVE-2019-0232",

View file

@ -1,25 +0,0 @@
[
{
"id": 196580913,
"name": "CVE-2019-0539",
"full_name": "0x43434343\/CVE-2019-0539",
"owner": {
"login": "0x43434343",
"id": 28482599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28482599?v=4",
"html_url": "https:\/\/github.com\/0x43434343"
},
"html_url": "https:\/\/github.com\/0x43434343\/CVE-2019-0539",
"description": "R\/W ",
"fork": false,
"created_at": "2019-07-12T13:06:17Z",
"updated_at": "2020-06-15T12:29:01Z",
"pushed_at": "2019-07-12T13:18:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,96 +1,4 @@
[
{
"id": 177246255,
"name": "CVE-2019-0604",
"full_name": "linhlhq\/CVE-2019-0604",
"owner": {
"login": "linhlhq",
"id": 28854132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28854132?v=4",
"html_url": "https:\/\/github.com\/linhlhq"
},
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2021-01-29T22:25:59Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 78,
"forks": 78,
"watchers": 130,
"score": 0
},
{
"id": 179413290,
"name": "CVE-2019-0604_sharepoint_CVE",
"full_name": "likescam\/CVE-2019-0604_sharepoint_CVE",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-0604_sharepoint_CVE",
"description": null,
"fork": false,
"created_at": "2019-04-04T03:17:30Z",
"updated_at": "2019-04-04T03:17:59Z",
"pushed_at": "2019-04-04T03:17:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 193926769,
"name": "CVE-2019-0604",
"full_name": "k8gege\/CVE-2019-0604",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/CVE-2019-0604",
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2021-02-09T20:34:20Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 65,
"forks": 65,
"watchers": 91,
"score": 0
},
{
"id": 208650796,
"name": "CVE-2019-0604",
"full_name": "m5050\/CVE-2019-0604",
"owner": {
"login": "m5050",
"id": 18764171,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18764171?v=4",
"html_url": "https:\/\/github.com\/m5050"
},
"html_url": "https:\/\/github.com\/m5050\/CVE-2019-0604",
"description": "CVE-2019-0604: SharePoint RCE detection rules and sample PCAP",
"fork": false,
"created_at": "2019-09-15T20:06:54Z",
"updated_at": "2020-06-25T02:16:52Z",
"pushed_at": "2019-09-17T19:40:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 227013447,
"name": "CVE-2019-0604",

View file

@ -1,25 +0,0 @@
[
{
"id": 197764635,
"name": "CVE-2019-0678",
"full_name": "c0d3G33k\/CVE-2019-0678",
"owner": {
"login": "c0d3G33k",
"id": 16446505,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16446505?v=4",
"html_url": "https:\/\/github.com\/c0d3G33k"
},
"html_url": "https:\/\/github.com\/c0d3G33k\/CVE-2019-0678",
"description": "Microsoft Edge Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2019-07-19T11:55:32Z",
"updated_at": "2019-07-19T12:15:21Z",
"pushed_at": "2019-07-19T12:15:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

File diff suppressed because it is too large Load diff

View file

@ -1,48 +0,0 @@
[
{
"id": 189502228,
"name": "CVE-2019-0709",
"full_name": "YHZX2013\/CVE-2019-0709",
"owner": {
"login": "YHZX2013",
"id": 17893549,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17893549?v=4",
"html_url": "https:\/\/github.com\/YHZX2013"
},
"html_url": "https:\/\/github.com\/YHZX2013\/CVE-2019-0709",
"description": "CVE-2019-0708 Exploit using Python",
"fork": false,
"created_at": "2019-05-31T00:48:49Z",
"updated_at": "2020-11-03T10:44:32Z",
"pushed_at": "2019-05-30T22:52:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 189527128,
"name": "CVE-2019-0709",
"full_name": "qq431169079\/CVE-2019-0709",
"owner": {
"login": "qq431169079",
"id": 42376039,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42376039?v=4",
"html_url": "https:\/\/github.com\/qq431169079"
},
"html_url": "https:\/\/github.com\/qq431169079\/CVE-2019-0709",
"description": "Exploit In Progress",
"fork": false,
"created_at": "2019-05-31T04:23:39Z",
"updated_at": "2020-11-03T11:02:24Z",
"pushed_at": "2019-05-26T15:25:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 188212551,
"name": "ie11_vbscript_exploit",
"full_name": "ruthlezs\/ie11_vbscript_exploit",
"owner": {
"login": "ruthlezs",
"id": 15887791,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15887791?v=4",
"html_url": "https:\/\/github.com\/ruthlezs"
},
"html_url": "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit",
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
"fork": false,
"created_at": "2019-05-23T10:28:40Z",
"updated_at": "2020-09-18T13:59:25Z",
"pushed_at": "2019-05-23T11:26:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 196208560,
"name": "CVE-2019-0785",
"full_name": "Jaky5155\/CVE-2019-0785",
"owner": {
"login": "Jaky5155",
"id": 47801640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47801640?v=4",
"html_url": "https:\/\/github.com\/Jaky5155"
},
"html_url": "https:\/\/github.com\/Jaky5155\/CVE-2019-0785",
"description": "CVE-2019-0785",
"fork": false,
"created_at": "2019-07-10T13:16:42Z",
"updated_at": "2020-04-05T09:53:47Z",
"pushed_at": "2019-07-10T13:18:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187201710,
"name": "CVE-2019-0803",
"full_name": "ExpLife0011\/CVE-2019-0803",
"owner": {
"login": "ExpLife0011",
"id": 37372761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37372761?v=4",
"html_url": "https:\/\/github.com\/ExpLife0011"
},
"html_url": "https:\/\/github.com\/ExpLife0011\/CVE-2019-0803",
"description": "Win32k Elevation of Privilege Poc",
"fork": false,
"created_at": "2019-05-17T11:05:22Z",
"updated_at": "2021-02-17T14:30:51Z",
"pushed_at": "2019-05-17T10:53:29Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 67,
"forks": 67,
"watchers": 74,
"score": 0
}
]

View file

@ -1,73 +1,4 @@
[
{
"id": 177576776,
"name": "cve-2019-0808-poc",
"full_name": "ze0r\/cve-2019-0808-poc",
"owner": {
"login": "ze0r",
"id": 43227253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4",
"html_url": "https:\/\/github.com\/ze0r"
},
"html_url": "https:\/\/github.com\/ze0r\/cve-2019-0808-poc",
"description": "cve-2019-0808-poc",
"fork": false,
"created_at": "2019-03-25T11:53:35Z",
"updated_at": "2020-12-23T12:17:23Z",
"pushed_at": "2019-03-25T12:10:40Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 19,
"forks": 19,
"watchers": 43,
"score": 0
},
{
"id": 182577297,
"name": "CVE-2019-0808",
"full_name": "rakesh143\/CVE-2019-0808",
"owner": {
"login": "rakesh143",
"id": 12870599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12870599?v=4",
"html_url": "https:\/\/github.com\/rakesh143"
},
"html_url": "https:\/\/github.com\/rakesh143\/CVE-2019-0808",
"description": null,
"fork": false,
"created_at": "2019-04-21T20:04:34Z",
"updated_at": "2019-04-21T20:07:45Z",
"pushed_at": "2019-04-21T20:07:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 187227372,
"name": "CVE-2019-0808",
"full_name": "exodusintel\/CVE-2019-0808",
"owner": {
"login": "exodusintel",
"id": 16653014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16653014?v=4",
"html_url": "https:\/\/github.com\/exodusintel"
},
"html_url": "https:\/\/github.com\/exodusintel\/CVE-2019-0808",
"description": "Win32k Exploit by Grant Willcox",
"fork": false,
"created_at": "2019-05-17T14:08:01Z",
"updated_at": "2021-02-25T20:19:02Z",
"pushed_at": "2019-05-17T14:17:00Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 38,
"forks": 38,
"watchers": 82,
"score": 0
},
{
"id": 264669775,
"name": "CVE-2019-0808-32-64-exp",

View file

@ -1,71 +0,0 @@
[
{
"id": 179680988,
"name": "CVE-2019-0841",
"full_name": "rogue-kdc\/CVE-2019-0841",
"owner": {
"login": "rogue-kdc",
"id": 49311295,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49311295?v=4",
"html_url": "https:\/\/github.com\/rogue-kdc"
},
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2019-0841",
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
"fork": false,
"created_at": "2019-04-05T12:53:52Z",
"updated_at": "2021-01-13T19:57:59Z",
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 223,
"watchers_count": 223,
"forks_count": 99,
"forks": 99,
"watchers": 223,
"score": 0
},
{
"id": 180605162,
"name": "CVE-2019-0841",
"full_name": "likescam\/CVE-2019-0841",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-0841",
"description": null,
"fork": false,
"created_at": "2019-04-10T14:58:22Z",
"updated_at": "2019-05-26T06:57:44Z",
"pushed_at": "2019-04-10T14:58:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 191441504,
"name": "CVE-2019-0841-BYPASS",
"full_name": "0x00-0x00\/CVE-2019-0841-BYPASS",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2019-0841-BYPASS",
"description": "A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.",
"fork": false,
"created_at": "2019-06-11T20:05:26Z",
"updated_at": "2021-03-06T19:37:31Z",
"pushed_at": "2019-06-11T20:49:42Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 29,
"forks": 29,
"watchers": 56,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 193166704,
"name": "CVE-2019-0888",
"full_name": "sophoslabs\/CVE-2019-0888",
"owner": {
"login": "sophoslabs",
"id": 40878494,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40878494?v=4",
"html_url": "https:\/\/github.com\/sophoslabs"
},
"html_url": "https:\/\/github.com\/sophoslabs\/CVE-2019-0888",
"description": "PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)",
"fork": false,
"created_at": "2019-06-21T22:26:52Z",
"updated_at": "2020-03-21T18:23:15Z",
"pushed_at": "2019-07-09T18:40:05Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 21,
"forks": 21,
"watchers": 41,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 176955881,
"name": "CVE-2019-0986",
"full_name": "padovah4ck\/CVE-2019-0986",
"owner": {
"login": "padovah4ck",
"id": 13963076,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13963076?v=4",
"html_url": "https:\/\/github.com\/padovah4ck"
},
"html_url": "https:\/\/github.com\/padovah4ck\/CVE-2019-0986",
"description": "Security Research",
"fork": false,
"created_at": "2019-03-21T13:58:25Z",
"updated_at": "2020-11-17T08:28:22Z",
"pushed_at": "2019-06-17T08:10:53Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 11,
"forks": 11,
"watchers": 34,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 179552575,
"name": "CVE-2019-10008",
"full_name": "FlameOfIgnis\/CVE-2019-10008",
"owner": {
"login": "FlameOfIgnis",
"id": 16636092,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16636092?v=4",
"html_url": "https:\/\/github.com\/FlameOfIgnis"
},
"html_url": "https:\/\/github.com\/FlameOfIgnis\/CVE-2019-10008",
"description": "ManageEngine Service Desk Plus 10.0 Privilaged account Hijacking",
"fork": false,
"created_at": "2019-04-04T18:20:23Z",
"updated_at": "2020-05-04T08:50:11Z",
"pushed_at": "2019-08-17T15:17:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 179330253,
"name": "CVE-2019-1002101-Helpers",
"full_name": "brompwnie\/CVE-2019-1002101-Helpers",
"owner": {
"login": "brompwnie",
"id": 8638589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8638589?v=4",
"html_url": "https:\/\/github.com\/brompwnie"
},
"html_url": "https:\/\/github.com\/brompwnie\/CVE-2019-1002101-Helpers",
"description": "PoC helper scripts and Dockerfile for CVE-2019-1002101",
"fork": false,
"created_at": "2019-04-03T16:36:58Z",
"updated_at": "2020-07-14T14:11:03Z",
"pushed_at": "2019-04-03T17:35:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"watchers": 5,
"score": 0
}
]

View file

@ -21,51 +21,5 @@
"forks": 30,
"watchers": 51,
"score": 0
},
{
"id": 170809838,
"name": "cve-2019-1003000-jenkins-rce-poc",
"full_name": "adamyordan\/cve-2019-1003000-jenkins-rce-poc",
"owner": {
"login": "adamyordan",
"id": 9531164,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9531164?v=4",
"html_url": "https:\/\/github.com\/adamyordan"
},
"html_url": "https:\/\/github.com\/adamyordan\/cve-2019-1003000-jenkins-rce-poc",
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2021-03-04T03:15:56Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 270,
"watchers_count": 270,
"forks_count": 83,
"forks": 83,
"watchers": 270,
"score": 0
},
{
"id": 183322760,
"name": "CVE-2019-1003000_RCE-DETECTION",
"full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"owner": {
"login": "1NTheKut",
"id": 26243759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26243759?v=4",
"html_url": "https:\/\/github.com\/1NTheKut"
},
"html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)",
"fork": false,
"created_at": "2019-04-24T23:52:42Z",
"updated_at": "2020-09-25T09:24:39Z",
"pushed_at": "2019-05-01T07:11:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 201962859,
"name": "CVE-2019-1010298",
"full_name": "RKX1209\/CVE-2019-1010298",
"owner": {
"login": "RKX1209",
"id": 964758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/964758?v=4",
"html_url": "https:\/\/github.com\/RKX1209"
},
"html_url": "https:\/\/github.com\/RKX1209\/CVE-2019-1010298",
"description": "Proof of Concept of TrustZone exploit ",
"fork": false,
"created_at": "2019-08-12T15:58:06Z",
"updated_at": "2021-02-05T03:37:59Z",
"pushed_at": "2019-08-12T16:01:24Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"forks": 4,
"watchers": 13,
"score": 0
}
]

View file

@ -1,211 +1,4 @@
[
{
"id": 191233980,
"name": "exim-rce-quickfix",
"full_name": "bananaphones\/exim-rce-quickfix",
"owner": {
"login": "bananaphones",
"id": 4877449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4877449?v=4",
"html_url": "https:\/\/github.com\/bananaphones"
},
"html_url": "https:\/\/github.com\/bananaphones\/exim-rce-quickfix",
"description": "quick fix for CVE-2019-10149, works on Debian\\Ubuntu\\Centos",
"fork": false,
"created_at": "2019-06-10T19:37:05Z",
"updated_at": "2020-10-11T13:08:22Z",
"pushed_at": "2019-06-14T10:16:02Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 18,
"forks": 18,
"watchers": 23,
"score": 0
},
{
"id": 191493140,
"name": "eximrce-CVE-2019-10149",
"full_name": "cowbe0x004\/eximrce-CVE-2019-10149",
"owner": {
"login": "cowbe0x004",
"id": 3072913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3072913?v=4",
"html_url": "https:\/\/github.com\/cowbe0x004"
},
"html_url": "https:\/\/github.com\/cowbe0x004\/eximrce-CVE-2019-10149",
"description": "simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in \/tmp\/eximrce.",
"fork": false,
"created_at": "2019-06-12T03:47:16Z",
"updated_at": "2021-02-03T22:54:05Z",
"pushed_at": "2019-07-08T18:25:12Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 13,
"forks": 13,
"watchers": 14,
"score": 0
},
{
"id": 191845568,
"name": "PoC--CVE-2019-10149_Exim",
"full_name": "MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
"owner": {
"login": "MNEMO-CERT",
"id": 51804856,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51804856?v=4",
"html_url": "https:\/\/github.com\/MNEMO-CERT"
},
"html_url": "https:\/\/github.com\/MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
"description": "PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.",
"fork": false,
"created_at": "2019-06-13T23:21:53Z",
"updated_at": "2021-02-03T12:57:10Z",
"pushed_at": "2019-06-18T14:57:22Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"forks": 6,
"watchers": 16,
"score": 0
},
{
"id": 191952969,
"name": "CVE-2019-10149-quick",
"full_name": "aishee\/CVE-2019-10149-quick",
"owner": {
"login": "aishee",
"id": 8377283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8377283?v=4",
"html_url": "https:\/\/github.com\/aishee"
},
"html_url": "https:\/\/github.com\/aishee\/CVE-2019-10149-quick",
"description": "Simple Bash shell quick fix CVE-2019-10149",
"fork": false,
"created_at": "2019-06-14T14:02:43Z",
"updated_at": "2019-06-14T14:03:33Z",
"pushed_at": "2019-06-14T14:03:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 194002154,
"name": "CVE-2019-10149-privilege-escalation",
"full_name": "AzizMea\/CVE-2019-10149-privilege-escalation",
"owner": {
"login": "AzizMea",
"id": 30970260,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30970260?v=4",
"html_url": "https:\/\/github.com\/AzizMea"
},
"html_url": "https:\/\/github.com\/AzizMea\/CVE-2019-10149-privilege-escalation",
"description": "CVE-2019-10149 privilege escalation",
"fork": false,
"created_at": "2019-06-27T01:34:41Z",
"updated_at": "2020-05-30T20:35:51Z",
"pushed_at": "2019-06-27T17:46:25Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"score": 0
},
{
"id": 198729185,
"name": "StickyExim",
"full_name": "Brets0150\/StickyExim",
"owner": {
"login": "Brets0150",
"id": 40045956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40045956?v=4",
"html_url": "https:\/\/github.com\/Brets0150"
},
"html_url": "https:\/\/github.com\/Brets0150\/StickyExim",
"description": "Exim Honey Pot for CVE-2019-10149 exploit attempts.",
"fork": false,
"created_at": "2019-07-25T00:46:37Z",
"updated_at": "2019-08-06T20:21:47Z",
"pushed_at": "2019-08-06T20:21:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 206647936,
"name": "exim.exp",
"full_name": "ChrissHack\/exim.exp",
"owner": {
"login": "ChrissHack",
"id": 36897897,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36897897?v=4",
"html_url": "https:\/\/github.com\/ChrissHack"
},
"html_url": "https:\/\/github.com\/ChrissHack\/exim.exp",
"description": "CVE-2019-10149",
"fork": false,
"created_at": "2019-09-05T20:04:14Z",
"updated_at": "2019-09-11T01:27:28Z",
"pushed_at": "2019-09-05T20:34:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 216513053,
"name": "CVE-2019-10149",
"full_name": "darsigovrustam\/CVE-2019-10149",
"owner": {
"login": "darsigovrustam",
"id": 36308333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36308333?v=4",
"html_url": "https:\/\/github.com\/darsigovrustam"
},
"html_url": "https:\/\/github.com\/darsigovrustam\/CVE-2019-10149",
"description": "Instructions for installing a vulnerable version of Exim and its expluatation",
"fork": false,
"created_at": "2019-10-21T08:13:27Z",
"updated_at": "2020-04-13T06:36:31Z",
"pushed_at": "2019-10-24T07:19:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 217788444,
"name": "CVE-2019-10149",
"full_name": "Diefunction\/CVE-2019-10149",
"owner": {
"login": "Diefunction",
"id": 17242631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17242631?v=4",
"html_url": "https:\/\/github.com\/Diefunction"
},
"html_url": "https:\/\/github.com\/Diefunction\/CVE-2019-10149",
"description": "CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in \/src\/deliver.c may lead to remote command execution.",
"fork": false,
"created_at": "2019-10-27T01:03:11Z",
"updated_at": "2021-01-19T21:03:28Z",
"pushed_at": "2019-10-27T01:08:17Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"forks": 5,
"watchers": 12,
"score": 0
},
{
"id": 263372042,
"name": "CVE-2019-10149",

View file

@ -1,25 +0,0 @@
[
{
"id": 199611138,
"name": "CVE-2019-10207",
"full_name": "butterflyhack\/CVE-2019-10207",
"owner": {
"login": "butterflyhack",
"id": 11525772,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11525772?v=4",
"html_url": "https:\/\/github.com\/butterflyhack"
},
"html_url": "https:\/\/github.com\/butterflyhack\/CVE-2019-10207",
"description": "PoC for CVE-2019-10207",
"fork": false,
"created_at": "2019-07-30T08:39:21Z",
"updated_at": "2020-10-26T08:01:10Z",
"pushed_at": "2019-07-30T08:50:32Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 211009198,
"name": "CVE-2019-10392",
"full_name": "jas502n\/CVE-2019-10392",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-10392",
"description": "CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)",
"fork": false,
"created_at": "2019-09-26T05:45:00Z",
"updated_at": "2020-11-06T17:52:46Z",
"pushed_at": "2019-09-26T05:49:21Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 19,
"score": 0
},
{
"id": 211651844,
"name": "CVE-2019-10392_EXP",
"full_name": "ftk-sostupid\/CVE-2019-10392_EXP",
"owner": {
"login": "ftk-sostupid",
"id": 30171892,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30171892?v=4",
"html_url": "https:\/\/github.com\/ftk-sostupid"
},
"html_url": "https:\/\/github.com\/ftk-sostupid\/CVE-2019-10392_EXP",
"description": "Jenkins Git Client RCE CVE-2019-10392_Exp",
"fork": false,
"created_at": "2019-09-29T11:22:41Z",
"updated_at": "2019-10-27T17:19:37Z",
"pushed_at": "2019-10-21T02:02:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -45,29 +45,6 @@
"watchers": 25,
"score": 0
},
{
"id": 192691928,
"name": "UltraRealy_with_CVE-2019-1040",
"full_name": "lazaars\/UltraRealy_with_CVE-2019-1040",
"owner": {
"login": "lazaars",
"id": 36127186,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36127186?v=4",
"html_url": "https:\/\/github.com\/lazaars"
},
"html_url": "https:\/\/github.com\/lazaars\/UltraRealy_with_CVE-2019-1040",
"description": "Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit",
"fork": false,
"created_at": "2019-06-19T08:32:31Z",
"updated_at": "2020-10-21T22:17:03Z",
"pushed_at": "2019-06-19T09:15:16Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"score": 0
},
{
"id": 193532426,
"name": "cve-2019-1040-scanner",
@ -91,29 +68,6 @@
"watchers": 248,
"score": 0
},
{
"id": 209096168,
"name": "CVE-2019-1040",
"full_name": "wzxmt\/CVE-2019-1040",
"owner": {
"login": "wzxmt",
"id": 44249535,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44249535?v=4",
"html_url": "https:\/\/github.com\/wzxmt"
},
"html_url": "https:\/\/github.com\/wzxmt\/CVE-2019-1040",
"description": null,
"fork": false,
"created_at": "2019-09-17T15:53:25Z",
"updated_at": "2020-04-01T05:23:50Z",
"pushed_at": "2019-09-17T15:53:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 325925728,
"name": "dcpwn",

View file

@ -1,71 +0,0 @@
[
{
"id": 191548642,
"name": "CVE-2019-1064",
"full_name": "RythmStick\/CVE-2019-1064",
"owner": {
"login": "RythmStick",
"id": 43847240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43847240?v=4",
"html_url": "https:\/\/github.com\/RythmStick"
},
"html_url": "https:\/\/github.com\/RythmStick\/CVE-2019-1064",
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-06-12T10:21:35Z",
"updated_at": "2021-02-05T12:57:26Z",
"pushed_at": "2019-06-13T09:55:07Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 11,
"forks": 11,
"watchers": 17,
"score": 0
},
{
"id": 191602145,
"name": "CVE-2019-1064",
"full_name": "0x00-0x00\/CVE-2019-1064",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2019-1064",
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-06-12T15:54:55Z",
"updated_at": "2020-07-13T12:07:03Z",
"pushed_at": "2019-06-12T12:25:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 17,
"forks": 17,
"watchers": 11,
"score": 0
},
{
"id": 192173000,
"name": "CVE-2019-1064",
"full_name": "attackgithub\/CVE-2019-1064",
"owner": {
"login": "attackgithub",
"id": 45205753,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45205753?v=4",
"html_url": "https:\/\/github.com\/attackgithub"
},
"html_url": "https:\/\/github.com\/attackgithub\/CVE-2019-1064",
"description": "CVE-2019-1064 - AppXSVC Local Privilege Escalation",
"fork": false,
"created_at": "2019-06-16T09:31:11Z",
"updated_at": "2019-06-18T21:49:16Z",
"pushed_at": "2019-06-14T07:47:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 185265234,
"name": "cve-2019-10678",
"full_name": "cved-sources\/cve-2019-10678",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-10678",
"description": "cve-2019-10678",
"fork": false,
"created_at": "2019-05-06T20:15:47Z",
"updated_at": "2019-05-06T20:16:09Z",
"pushed_at": "2019-05-06T20:16:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 179077030,
"name": "CVE-2019-10685",
"full_name": "alt3kx\/CVE-2019-10685",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2019-10685",
"description": "A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6",
"fork": false,
"created_at": "2019-04-02T12:50:46Z",
"updated_at": "2019-05-11T02:51:22Z",
"pushed_at": "2019-05-07T11:50:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 189962146,
"name": "SharpPolarBear",
"full_name": "S3cur3Th1sSh1t\/SharpPolarBear",
"owner": {
"login": "S3cur3Th1sSh1t",
"id": 27858067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27858067?v=4",
"html_url": "https:\/\/github.com\/S3cur3Th1sSh1t"
},
"html_url": "https:\/\/github.com\/S3cur3Th1sSh1t\/SharpPolarBear",
"description": "Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069",
"fork": false,
"created_at": "2019-06-03T08:07:32Z",
"updated_at": "2021-01-19T21:04:02Z",
"pushed_at": "2019-06-26T11:53:08Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 14,
"forks": 14,
"watchers": 33,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 202295806,
"name": "CVE-2019-10708",
"full_name": "stavhaygn\/CVE-2019-10708",
"owner": {
"login": "stavhaygn",
"id": 17663058,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17663058?v=4",
"html_url": "https:\/\/github.com\/stavhaygn"
},
"html_url": "https:\/\/github.com\/stavhaygn\/CVE-2019-10708",
"description": "CVE-2019-10708 SQL injection PoC",
"fork": false,
"created_at": "2019-08-14T07:15:58Z",
"updated_at": "2019-08-18T10:17:37Z",
"pushed_at": "2019-08-18T10:17:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 186229171,
"name": "CVE-2019-10869",
"full_name": "KTN1990\/CVE-2019-10869",
"owner": {
"login": "KTN1990",
"id": 33407405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4",
"html_url": "https:\/\/github.com\/KTN1990"
},
"html_url": "https:\/\/github.com\/KTN1990\/CVE-2019-10869",
"description": "(Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2019-05-12T08:20:16Z",
"updated_at": "2020-09-06T05:31:01Z",
"pushed_at": "2019-05-17T10:41:43Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 6,
"forks": 6,
"watchers": 14,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 198133475,
"name": "CVE-2019-10915",
"full_name": "jiansiting\/CVE-2019-10915",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-10915",
"description": "Siemens TIA administrator Tool RCE",
"fork": false,
"created_at": "2019-07-22T02:38:54Z",
"updated_at": "2020-03-18T01:41:48Z",
"pushed_at": "2019-07-22T11:48:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 198785536,
"name": "cve-2019-1096-poc",
"full_name": "CrackerCat\/cve-2019-1096-poc",
"owner": {
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat"
},
"html_url": "https:\/\/github.com\/CrackerCat\/cve-2019-1096-poc",
"description": null,
"fork": false,
"created_at": "2019-07-25T07:58:44Z",
"updated_at": "2020-08-17T10:36:33Z",
"pushed_at": "2019-07-25T07:24:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -22,52 +22,6 @@
"watchers": 1638,
"score": 0
},
{
"id": 217065303,
"name": "CVE-2019-11043",
"full_name": "B1gd0g\/CVE-2019-11043",
"owner": {
"login": "B1gd0g",
"id": 49259860,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49259860?v=4",
"html_url": "https:\/\/github.com\/B1gd0g"
},
"html_url": "https:\/\/github.com\/B1gd0g\/CVE-2019-11043",
"description": "CVE-2019-11043",
"fork": false,
"created_at": "2019-10-23T13:32:14Z",
"updated_at": "2020-09-07T00:53:59Z",
"pushed_at": "2019-10-23T13:35:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 217065801,
"name": "CVE-2019-11043",
"full_name": "tinker-li\/CVE-2019-11043",
"owner": {
"login": "tinker-li",
"id": 41416976,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41416976?v=4",
"html_url": "https:\/\/github.com\/tinker-li"
},
"html_url": "https:\/\/github.com\/tinker-li\/CVE-2019-11043",
"description": null,
"fork": false,
"created_at": "2019-10-23T13:34:28Z",
"updated_at": "2020-09-09T02:32:37Z",
"pushed_at": "2019-10-23T13:41:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 217171261,
"name": "CVE-2019-11043",
@ -114,167 +68,6 @@
"watchers": 4,
"score": 0
},
{
"id": 217257852,
"name": "CVE-2019-11043",
"full_name": "ianxtianxt\/CVE-2019-11043",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt"
},
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-11043",
"description": null,
"fork": false,
"created_at": "2019-10-24T09:09:01Z",
"updated_at": "2020-09-09T02:32:38Z",
"pushed_at": "2019-10-24T09:12:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 217258558,
"name": "CVE-2019-11043",
"full_name": "fairyming\/CVE-2019-11043",
"owner": {
"login": "fairyming",
"id": 44915879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44915879?v=4",
"html_url": "https:\/\/github.com\/fairyming"
},
"html_url": "https:\/\/github.com\/fairyming\/CVE-2019-11043",
"description": null,
"fork": false,
"created_at": "2019-10-24T09:12:38Z",
"updated_at": "2020-04-05T08:53:01Z",
"pushed_at": "2019-10-24T10:04:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 217294430,
"name": "CVE-2019-11043-Docker",
"full_name": "akamajoris\/CVE-2019-11043-Docker",
"owner": {
"login": "akamajoris",
"id": 4648441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4648441?v=4",
"html_url": "https:\/\/github.com\/akamajoris"
},
"html_url": "https:\/\/github.com\/akamajoris\/CVE-2019-11043-Docker",
"description": null,
"fork": false,
"created_at": "2019-10-24T12:32:02Z",
"updated_at": "2020-09-07T00:19:06Z",
"pushed_at": "2019-10-28T10:23:17Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 8,
"forks": 8,
"watchers": 27,
"score": 0
},
{
"id": 218028044,
"name": "CVE-2019-11043",
"full_name": "theMiddleBlue\/CVE-2019-11043",
"owner": {
"login": "theMiddleBlue",
"id": 4454961,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4454961?v=4",
"html_url": "https:\/\/github.com\/theMiddleBlue"
},
"html_url": "https:\/\/github.com\/theMiddleBlue\/CVE-2019-11043",
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false,
"created_at": "2019-10-28T11:09:06Z",
"updated_at": "2020-12-23T06:36:38Z",
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 29,
"forks": 29,
"watchers": 127,
"score": 0
},
{
"id": 218080163,
"name": "cve-2019-11043",
"full_name": "shadow-horse\/cve-2019-11043",
"owner": {
"login": "shadow-horse",
"id": 5432330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5432330?v=4",
"html_url": "https:\/\/github.com\/shadow-horse"
},
"html_url": "https:\/\/github.com\/shadow-horse\/cve-2019-11043",
"description": "CVE-2019-11043 PHP远程代码执行",
"fork": false,
"created_at": "2019-10-28T15:31:34Z",
"updated_at": "2019-10-29T15:39:20Z",
"pushed_at": "2019-10-29T15:39:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 218269194,
"name": "CVE-2019-11043",
"full_name": "huowen\/CVE-2019-11043",
"owner": {
"login": "huowen",
"id": 31957041,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957041?v=4",
"html_url": "https:\/\/github.com\/huowen"
},
"html_url": "https:\/\/github.com\/huowen\/CVE-2019-11043",
"description": "Python exp for CVE-2019-11043",
"fork": false,
"created_at": "2019-10-29T11:16:12Z",
"updated_at": "2020-08-23T10:21:00Z",
"pushed_at": "2019-10-30T06:19:21Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 218500391,
"name": "docker-CVE-2019-11043",
"full_name": "ypereirareis\/docker-CVE-2019-11043",
"owner": {
"login": "ypereirareis",
"id": 6838923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6838923?v=4",
"html_url": "https:\/\/github.com\/ypereirareis"
},
"html_url": "https:\/\/github.com\/ypereirareis\/docker-CVE-2019-11043",
"description": "Docker image and commands to check CVE-2019-11043 vulnerability on nginx\/php-fpm applications.",
"fork": false,
"created_at": "2019-10-30T10:22:41Z",
"updated_at": "2020-10-20T01:33:47Z",
"pushed_at": "2019-10-30T12:53:43Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 220021213,
"name": "CVE-2019-11043",

View file

@ -1,25 +0,0 @@
[
{
"id": 178342166,
"name": "ASUS-SmartHome-Exploit",
"full_name": "tim124058\/ASUS-SmartHome-Exploit",
"owner": {
"login": "tim124058",
"id": 12321191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12321191?v=4",
"html_url": "https:\/\/github.com\/tim124058"
},
"html_url": "https:\/\/github.com\/tim124058\/ASUS-SmartHome-Exploit",
"description": "ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063",
"fork": false,
"created_at": "2019-03-29T06:01:49Z",
"updated_at": "2020-08-30T21:54:35Z",
"pushed_at": "2019-08-27T04:23:24Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 7,
"forks": 7,
"watchers": 24,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 180679185,
"name": "poc-cribl-rce",
"full_name": "livehybrid\/poc-cribl-rce",
"owner": {
"login": "livehybrid",
"id": 5527349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5527349?v=4",
"html_url": "https:\/\/github.com\/livehybrid"
},
"html_url": "https:\/\/github.com\/livehybrid\/poc-cribl-rce",
"description": "CVE-2019-11076 - Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthenticated web request",
"fork": false,
"created_at": "2019-04-10T23:31:39Z",
"updated_at": "2021-02-01T04:39:30Z",
"pushed_at": "2019-04-11T12:50:39Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 181940820,
"name": "CVE-2019-11223",
"full_name": "AngelCtulhu\/CVE-2019-11223",
"owner": {
"login": "AngelCtulhu",
"id": 36587659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36587659?v=4",
"html_url": "https:\/\/github.com\/AngelCtulhu"
},
"html_url": "https:\/\/github.com\/AngelCtulhu\/CVE-2019-11223",
"description": "CVE-2019-11223 - Arbitrary File Upload in Wordpress Support Candy Plugin Version 2.0 Below",
"fork": false,
"created_at": "2019-04-17T17:43:46Z",
"updated_at": "2019-04-19T16:43:54Z",
"pushed_at": "2019-04-19T04:32:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 5,
"forks": 5,
"watchers": 1,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 198963113,
"name": "CVE-2019-1132",
"full_name": "Vlad-tri\/CVE-2019-1132",
"owner": {
"login": "Vlad-tri",
"id": 20975540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20975540?v=4",
"html_url": "https:\/\/github.com\/Vlad-tri"
},
"html_url": "https:\/\/github.com\/Vlad-tri\/CVE-2019-1132",
"description": "EoP POC for CVE-2019-1132",
"fork": false,
"created_at": "2019-07-26T06:51:28Z",
"updated_at": "2020-10-21T22:17:08Z",
"pushed_at": "2019-09-08T07:58:12Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 36,
"forks": 36,
"watchers": 60,
"score": 0
},
{
"id": 199763019,
"name": "CVE-2019-1132",
"full_name": "petercc\/CVE-2019-1132",
"owner": {
"login": "petercc",
"id": 1819628,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1819628?v=4",
"html_url": "https:\/\/github.com\/petercc"
},
"html_url": "https:\/\/github.com\/petercc\/CVE-2019-1132",
"description": "CVE-2019-1132",
"fork": false,
"created_at": "2019-07-31T02:30:28Z",
"updated_at": "2020-12-07T22:04:33Z",
"pushed_at": "2019-07-31T02:38:41Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -22,29 +22,6 @@
"watchers": 21,
"score": 0
},
{
"id": 197643691,
"name": "jquery-prototype-pollution-fix",
"full_name": "bitnesswise\/jquery-prototype-pollution-fix",
"owner": {
"login": "bitnesswise",
"id": 32780182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32780182?v=4",
"html_url": "https:\/\/github.com\/bitnesswise"
},
"html_url": "https:\/\/github.com\/bitnesswise\/jquery-prototype-pollution-fix",
"description": "A fix for CVE-2019-11358 (prototype pollution in jquery)",
"fork": false,
"created_at": "2019-07-18T19:15:33Z",
"updated_at": "2020-04-04T15:02:00Z",
"pushed_at": "2019-07-18T20:00:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 255702097,
"name": "snyk-js-jquery-565129",

View file

@ -1,25 +0,0 @@
[
{
"id": 198296662,
"name": "cve-2019-11477-poc",
"full_name": "sasqwatch\/cve-2019-11477-poc",
"owner": {
"login": "sasqwatch",
"id": 22352904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22352904?v=4",
"html_url": "https:\/\/github.com\/sasqwatch"
},
"html_url": "https:\/\/github.com\/sasqwatch\/cve-2019-11477-poc",
"description": null,
"fork": false,
"created_at": "2019-07-22T20:23:08Z",
"updated_at": "2020-06-28T07:56:08Z",
"pushed_at": "2019-07-21T15:56:43Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -22,144 +22,6 @@
"watchers": 340,
"score": 0
},
{
"id": 203575464,
"name": "Pulse",
"full_name": "nuc13us\/Pulse",
"owner": {
"login": "nuc13us",
"id": 22916937,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22916937?v=4",
"html_url": "https:\/\/github.com\/nuc13us"
},
"html_url": "https:\/\/github.com\/nuc13us\/Pulse",
"description": "Pulse Secure VPN CVE-2019-11510",
"fork": false,
"created_at": "2019-08-21T12:03:14Z",
"updated_at": "2020-10-19T12:40:24Z",
"pushed_at": "2019-08-21T12:03:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 203747377,
"name": "CVE-2019-11510-poc",
"full_name": "imjdl\/CVE-2019-11510-poc",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc",
"description": "Pulse Secure SSL VPN pre-auth file reading",
"fork": false,
"created_at": "2019-08-22T08:18:19Z",
"updated_at": "2020-11-24T06:07:33Z",
"pushed_at": "2019-08-26T19:33:43Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 15,
"forks": 15,
"watchers": 48,
"score": 0
},
{
"id": 204579243,
"name": "CVE-2019-11510_poc",
"full_name": "es0\/CVE-2019-11510_poc",
"owner": {
"login": "es0",
"id": 10739380,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10739380?v=4",
"html_url": "https:\/\/github.com\/es0"
},
"html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc",
"description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability",
"fork": false,
"created_at": "2019-08-26T23:30:15Z",
"updated_at": "2020-07-07T01:57:08Z",
"pushed_at": "2019-08-27T00:52:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 204608508,
"name": "http-pulse_ssl_vpn.nse",
"full_name": "r00tpgp\/http-pulse_ssl_vpn.nse",
"owner": {
"login": "r00tpgp",
"id": 29351179,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29351179?v=4",
"html_url": "https:\/\/github.com\/r00tpgp"
},
"html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse",
"description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510",
"fork": false,
"created_at": "2019-08-27T03:04:19Z",
"updated_at": "2020-11-22T22:05:15Z",
"pushed_at": "2019-08-27T07:03:26Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 6,
"forks": 6,
"watchers": 15,
"score": 0
},
{
"id": 204666616,
"name": "CVE-2019-11510-1",
"full_name": "jas502n\/CVE-2019-11510-1",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1",
"description": "SSL VPN Rce",
"fork": false,
"created_at": "2019-08-27T09:21:10Z",
"updated_at": "2020-08-11T18:29:29Z",
"pushed_at": "2019-08-27T09:29:05Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 18,
"forks": 18,
"watchers": 51,
"score": 0
},
{
"id": 205106127,
"name": "CVE-2019-11510",
"full_name": "jason3e7\/CVE-2019-11510",
"owner": {
"login": "jason3e7",
"id": 3059297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3059297?v=4",
"html_url": "https:\/\/github.com\/jason3e7"
},
"html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510",
"description": null,
"fork": false,
"created_at": "2019-08-29T07:27:57Z",
"updated_at": "2019-08-29T07:28:54Z",
"pushed_at": "2019-08-29T07:28:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 207348255,
"name": "pwn-pulse",

View file

@ -1,25 +0,0 @@
[
{
"id": 182799429,
"name": "anviz-m3-rfid-cve-2019-11523-poc",
"full_name": "wizlab-it\/anviz-m3-rfid-cve-2019-11523-poc",
"owner": {
"login": "wizlab-it",
"id": 19650583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19650583?v=4",
"html_url": "https:\/\/github.com\/wizlab-it"
},
"html_url": "https:\/\/github.com\/wizlab-it\/anviz-m3-rfid-cve-2019-11523-poc",
"description": "Anviz M3 RFID CVE-2019-11523 PoC",
"fork": false,
"created_at": "2019-04-22T14:00:50Z",
"updated_at": "2019-06-13T16:23:09Z",
"pushed_at": "2019-06-13T16:23:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 206321288,
"name": "CVE-2019-11539",
"full_name": "0xDezzy\/CVE-2019-11539",
"owner": {
"login": "0xDezzy",
"id": 4141697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4141697?v=4",
"html_url": "https:\/\/github.com\/0xDezzy"
},
"html_url": "https:\/\/github.com\/0xDezzy\/CVE-2019-11539",
"description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect",
"fork": false,
"created_at": "2019-09-04T13:06:02Z",
"updated_at": "2020-12-26T09:25:33Z",
"pushed_at": "2019-09-04T17:39:35Z",
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 36,
"forks": 36,
"watchers": 115,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 197342430,
"name": "CVE-2019-11580",
"full_name": "jas502n\/CVE-2019-11580",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11580",
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2021-02-20T03:40:33Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 19,
"forks": 19,
"watchers": 85,
"score": 0
},
{
"id": 245476096,
"name": "CVE-2019-11580",

View file

@ -1,27 +1,4 @@
[
{
"id": 197105656,
"name": "CVE-2019-11581",
"full_name": "jas502n\/CVE-2019-11581",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11581",
"description": "Atlassian JIRA Template injection vulnerability RCE",
"fork": false,
"created_at": "2019-07-16T02:27:00Z",
"updated_at": "2021-01-31T21:42:24Z",
"pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 27,
"forks": 27,
"watchers": 74,
"score": 0
},
{
"id": 198763431,
"name": "CVE-2019-11581",

View file

@ -1,27 +1,4 @@
[
{
"id": 202974494,
"name": "CVE-2019-11707",
"full_name": "vigneshsrao\/CVE-2019-11707",
"owner": {
"login": "vigneshsrao",
"id": 20860267,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20860267?v=4",
"html_url": "https:\/\/github.com\/vigneshsrao"
},
"html_url": "https:\/\/github.com\/vigneshsrao\/CVE-2019-11707",
"description": "Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu ",
"fork": false,
"created_at": "2019-08-18T07:41:01Z",
"updated_at": "2021-02-18T07:39:11Z",
"pushed_at": "2019-08-18T07:42:36Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"forks": 10,
"watchers": 42,
"score": 0
},
{
"id": 255362000,
"name": "cve-2019-11707",

View file

@ -1,25 +0,0 @@
[
{
"id": 202264461,
"name": "cve-2019-1181",
"full_name": "major203\/cve-2019-1181",
"owner": {
"login": "major203",
"id": 7425945,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7425945?v=4",
"html_url": "https:\/\/github.com\/major203"
},
"html_url": "https:\/\/github.com\/major203\/cve-2019-1181",
"description": null,
"fork": false,
"created_at": "2019-08-14T03:07:02Z",
"updated_at": "2019-08-14T03:07:02Z",
"pushed_at": "2019-08-14T03:07:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 188323560,
"name": "VanCleef",
"full_name": "MauroEldritch\/VanCleef",
"owner": {
"login": "MauroEldritch",
"id": 1292978,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1292978?v=4",
"html_url": "https:\/\/github.com\/MauroEldritch"
},
"html_url": "https:\/\/github.com\/MauroEldritch\/VanCleef",
"description": "Exploit for CVE-2019-11881 (Rancher 2.1.4 Web Parameter Tampering)",
"fork": false,
"created_at": "2019-05-24T00:09:21Z",
"updated_at": "2020-09-22T13:43:27Z",
"pushed_at": "2019-06-10T22:10:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 212541592,
"name": "CVE-2019-11932",
"full_name": "dorkerdevil\/CVE-2019-11932",
"owner": {
"login": "dorkerdevil",
"id": 15796745,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
"html_url": "https:\/\/github.com\/dorkerdevil"
},
"html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2019-11932",
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2021-02-26T21:51:56Z",
"pushed_at": "2019-10-03T09:43:55Z",
"stargazers_count": 243,
"watchers_count": 243,
"forks_count": 76,
"forks": 76,
"watchers": 243,
"score": 0
},
{
"id": 212824676,
"name": "WhatsRCE",
@ -68,144 +45,6 @@
"watchers": 142,
"score": 0
},
{
"id": 212954402,
"name": "CVE-2019-11932",
"full_name": "TulungagungCyberLink\/CVE-2019-11932",
"owner": {
"login": "TulungagungCyberLink",
"id": 46483873,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46483873?v=4",
"html_url": "https:\/\/github.com\/TulungagungCyberLink"
},
"html_url": "https:\/\/github.com\/TulungagungCyberLink\/CVE-2019-11932",
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2019-10-05T06:24:08Z",
"updated_at": "2019-11-03T03:01:39Z",
"pushed_at": "2019-10-08T06:17:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 213187543,
"name": "CVE-2019-11932",
"full_name": "infiniteLoopers\/CVE-2019-11932",
"owner": {
"login": "infiniteLoopers",
"id": 27885817,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27885817?v=4",
"html_url": "https:\/\/github.com\/infiniteLoopers"
},
"html_url": "https:\/\/github.com\/infiniteLoopers\/CVE-2019-11932",
"description": null,
"fork": false,
"created_at": "2019-10-06T14:54:35Z",
"updated_at": "2019-10-18T20:41:54Z",
"pushed_at": "2019-10-06T15:34:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 213971107,
"name": "CVE-2019-11932",
"full_name": "alexanderstonec\/CVE-2019-11932",
"owner": {
"login": "alexanderstonec",
"id": 52692998,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52692998?v=4",
"html_url": "https:\/\/github.com\/alexanderstonec"
},
"html_url": "https:\/\/github.com\/alexanderstonec\/CVE-2019-11932",
"description": "The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244",
"fork": false,
"created_at": "2019-10-09T16:41:38Z",
"updated_at": "2020-03-19T03:06:30Z",
"pushed_at": "2019-10-09T17:00:02Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"score": 0
},
{
"id": 215516489,
"name": "CVE-2019-11932-SupportApp",
"full_name": "valbrux\/CVE-2019-11932-SupportApp",
"owner": {
"login": "valbrux",
"id": 20357515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20357515?v=4",
"html_url": "https:\/\/github.com\/valbrux"
},
"html_url": "https:\/\/github.com\/valbrux\/CVE-2019-11932-SupportApp",
"description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ",
"fork": false,
"created_at": "2019-10-16T10:04:30Z",
"updated_at": "2020-07-16T04:23:00Z",
"pushed_at": "2019-10-16T12:20:53Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 13,
"forks": 13,
"watchers": 22,
"score": 0
},
{
"id": 215635890,
"name": "CVE-2019-11932",
"full_name": "fastmo\/CVE-2019-11932",
"owner": {
"login": "fastmo",
"id": 53575270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53575270?v=4",
"html_url": "https:\/\/github.com\/fastmo"
},
"html_url": "https:\/\/github.com\/fastmo\/CVE-2019-11932",
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
"fork": false,
"created_at": "2019-10-16T20:13:23Z",
"updated_at": "2020-03-30T02:16:58Z",
"pushed_at": "2019-10-16T20:24:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 217001772,
"name": "CVE-2019-11932-whatsApp-exploit",
"full_name": "mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
"owner": {
"login": "mRanonyMousTZ",
"id": 38766899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38766899?v=4",
"html_url": "https:\/\/github.com\/mRanonyMousTZ"
},
"html_url": "https:\/\/github.com\/mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
"description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
"fork": false,
"created_at": "2019-10-23T08:02:15Z",
"updated_at": "2020-12-27T09:47:19Z",
"pushed_at": "2019-10-23T08:25:48Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 9,
"forks": 9,
"watchers": 8,
"score": 0
},
{
"id": 228222453,
"name": "CVE-2019-11932",

View file

@ -1,25 +0,0 @@
[
{
"id": 188356491,
"name": "ATutor-2.2.4-Language-Exploit",
"full_name": "fuzzlove\/ATutor-2.2.4-Language-Exploit",
"owner": {
"login": "fuzzlove",
"id": 44779781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4",
"html_url": "https:\/\/github.com\/fuzzlove"
},
"html_url": "https:\/\/github.com\/fuzzlove\/ATutor-2.2.4-Language-Exploit",
"description": "ATutor 2.2.4 Arbitrary File Upload \/ RCE (CVE-2019-12169)",
"fork": false,
"created_at": "2019-05-24T05:15:17Z",
"updated_at": "2021-03-03T11:28:24Z",
"pushed_at": "2019-06-09T21:39:55Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 186354983,
"name": "ATutor-Instructor-Backup-Arbitrary-File",
"full_name": "fuzzlove\/ATutor-Instructor-Backup-Arbitrary-File",
"owner": {
"login": "fuzzlove",
"id": 44779781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4",
"html_url": "https:\/\/github.com\/fuzzlove"
},
"html_url": "https:\/\/github.com\/fuzzlove\/ATutor-Instructor-Backup-Arbitrary-File",
"description": "ATutor 2.2.4 'Backup' Remote Command Execution (CVE-2019-12170)",
"fork": false,
"created_at": "2019-05-13T06:01:47Z",
"updated_at": "2021-03-03T11:28:34Z",
"pushed_at": "2019-06-03T04:12:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 191652233,
"name": "CVE-2019-12181",
"full_name": "guywhataguy\/CVE-2019-12181",
"owner": {
"login": "guywhataguy",
"id": 33753158,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33753158?v=4",
"html_url": "https:\/\/github.com\/guywhataguy"
},
"html_url": "https:\/\/github.com\/guywhataguy\/CVE-2019-12181",
"description": "LPE Exploit For CVE-2019-12181 (Serv-U FTP 15.1.6)",
"fork": false,
"created_at": "2019-06-12T22:18:45Z",
"updated_at": "2021-03-03T08:40:59Z",
"pushed_at": "2019-10-20T21:36:23Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187415847,
"name": "eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"full_name": "fuzzlove\/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"owner": {
"login": "fuzzlove",
"id": 44779781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4",
"html_url": "https:\/\/github.com\/fuzzlove"
},
"html_url": "https:\/\/github.com\/fuzzlove\/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"description": "eLabFTW 1.8.5 'EntityController' Arbitrary File Upload \/ RCE (CVE-2019-12185)",
"fork": false,
"created_at": "2019-05-18T23:56:52Z",
"updated_at": "2021-03-03T11:28:33Z",
"pushed_at": "2019-05-20T00:29:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 187569819,
"name": "CVE-2019-12189",
"full_name": "falconz\/CVE-2019-12189",
"owner": {
"login": "falconz",
"id": 9218490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9218490?v=4",
"html_url": "https:\/\/github.com\/falconz"
},
"html_url": "https:\/\/github.com\/falconz\/CVE-2019-12189",
"description": null,
"fork": false,
"created_at": "2019-05-20T04:52:38Z",
"updated_at": "2019-05-20T06:03:05Z",
"pushed_at": "2019-05-20T06:03:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 187589027,
"name": "CVE-2019-12189",
"full_name": "tuyenhva\/CVE-2019-12189",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12189",
"description": "CVE-2019-12189 - Zoho ManageEngine ServiceDesk Plus 9.3 XSS vulnerability",
"fork": false,
"created_at": "2019-05-20T07:23:51Z",
"updated_at": "2019-05-20T07:44:03Z",
"pushed_at": "2019-05-20T07:44:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187596474,
"name": "CVE-2019-12190",
"full_name": "tuyenhva\/CVE-2019-12190",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12190",
"description": "CVE-2019-12190 - CentOS-WebPanel XSS vulnerability",
"fork": false,
"created_at": "2019-05-20T08:09:49Z",
"updated_at": "2019-05-20T08:13:09Z",
"pushed_at": "2019-05-20T08:13:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187880000,
"name": "CVE-2019-12252",
"full_name": "tuyenhva\/CVE-2019-12252",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12252",
"description": "CVE-2019-12252 Zoho ManageEngine ServiceDesk Plus < 10.5 Incorrect Access Control",
"fork": false,
"created_at": "2019-05-21T16:59:23Z",
"updated_at": "2019-05-21T17:01:52Z",
"pushed_at": "2019-05-21T17:01:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 195171033,
"name": "LuCI_RCE_exp",
"full_name": "HACHp1\/LuCI_RCE_exp",
"owner": {
"login": "HACHp1",
"id": 25722416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25722416?v=4",
"html_url": "https:\/\/github.com\/HACHp1"
},
"html_url": "https:\/\/github.com\/HACHp1\/LuCI_RCE_exp",
"description": "Exp of cve-2019-12272",
"fork": false,
"created_at": "2019-07-04T04:54:36Z",
"updated_at": "2020-04-22T15:44:21Z",
"pushed_at": "2019-07-10T04:33:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"score": 0
},
{
"id": 226418974,
"name": "lede-17.01.3",

View file

@ -1,27 +1,4 @@
[
{
"id": 198579428,
"name": "CVE-2019-12384",
"full_name": "jas502n\/CVE-2019-12384",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12384",
"description": "Jackson Rce For CVE-2019-12384 ",
"fork": false,
"created_at": "2019-07-24T07:12:14Z",
"updated_at": "2021-03-06T08:48:27Z",
"pushed_at": "2019-07-24T07:31:42Z",
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 17,
"forks": 17,
"watchers": 89,
"score": 0
},
{
"id": 198939305,
"name": "Jackson_RCE-CVE-2019-12384",

View file

@ -1,25 +0,0 @@
[
{
"id": 197012907,
"name": "CVE-2019-12453",
"full_name": "undefinedmode\/CVE-2019-12453",
"owner": {
"login": "undefinedmode",
"id": 4165481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4165481?v=4",
"html_url": "https:\/\/github.com\/undefinedmode"
},
"html_url": "https:\/\/github.com\/undefinedmode\/CVE-2019-12453",
"description": "Authenticated XSS in Microstrategy Web - Versions prior to 10.1 patch 10",
"fork": false,
"created_at": "2019-07-15T14:17:10Z",
"updated_at": "2019-07-15T14:44:49Z",
"pushed_at": "2019-07-15T14:44:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 188212424,
"name": "WebPort-v1.19.1-Reflected-XSS",
"full_name": "EmreOvunc\/WebPort-v1.19.1-Reflected-XSS",
"owner": {
"login": "EmreOvunc",
"id": 15659223,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4",
"html_url": "https:\/\/github.com\/EmreOvunc"
},
"html_url": "https:\/\/github.com\/EmreOvunc\/WebPort-v1.19.1-Reflected-XSS",
"description": "CVE-2019-12460|Reflected XSS in WebPort-v1.19.1 impacts users who open a maliciously crafted link or third-party web page.",
"fork": false,
"created_at": "2019-05-23T10:27:49Z",
"updated_at": "2021-03-04T03:26:49Z",
"pushed_at": "2019-05-30T16:21:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 197017455,
"name": "CVE-2019-12475",
"full_name": "undefinedmode\/CVE-2019-12475",
"owner": {
"login": "undefinedmode",
"id": 4165481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4165481?v=4",
"html_url": "https:\/\/github.com\/undefinedmode"
},
"html_url": "https:\/\/github.com\/undefinedmode\/CVE-2019-12475",
"description": "Stored XSS in MicroStrategy Web prior to 10.4.6",
"fork": false,
"created_at": "2019-07-15T14:42:53Z",
"updated_at": "2019-07-15T14:47:02Z",
"pushed_at": "2019-07-15T14:47:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,94 +0,0 @@
[
{
"id": 180551311,
"name": "CVE-2019-1253",
"full_name": "rogue-kdc\/CVE-2019-1253",
"owner": {
"login": "rogue-kdc",
"id": 49311295,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49311295?v=4",
"html_url": "https:\/\/github.com\/rogue-kdc"
},
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2019-1253",
"description": null,
"fork": false,
"created_at": "2019-04-10T09:44:38Z",
"updated_at": "2020-12-21T21:53:48Z",
"pushed_at": "2019-09-11T08:46:24Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 19,
"forks": 19,
"watchers": 49,
"score": 0
},
{
"id": 207780184,
"name": "CVE-2019-1253",
"full_name": "likescam\/CVE-2019-1253",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-1253",
"description": null,
"fork": false,
"created_at": "2019-09-11T09:59:22Z",
"updated_at": "2020-11-26T04:16:55Z",
"pushed_at": "2019-09-11T09:59:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 207902814,
"name": "CVE-2019-1253",
"full_name": "padovah4ck\/CVE-2019-1253",
"owner": {
"login": "padovah4ck",
"id": 13963076,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13963076?v=4",
"html_url": "https:\/\/github.com\/padovah4ck"
},
"html_url": "https:\/\/github.com\/padovah4ck\/CVE-2019-1253",
"description": "Poc for CVE-2019-1253",
"fork": false,
"created_at": "2019-09-11T20:40:15Z",
"updated_at": "2020-12-05T21:34:17Z",
"pushed_at": "2019-09-12T14:43:47Z",
"stargazers_count": 135,
"watchers_count": 135,
"forks_count": 40,
"forks": 40,
"watchers": 135,
"score": 0
},
{
"id": 207924388,
"name": "CVE-2019-1253",
"full_name": "sgabe\/CVE-2019-1253",
"owner": {
"login": "sgabe",
"id": 5206619,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5206619?v=4",
"html_url": "https:\/\/github.com\/sgabe"
},
"html_url": "https:\/\/github.com\/sgabe\/CVE-2019-1253",
"description": "AppXSvc Arbitrary File Security Descriptor Overwrite EoP",
"fork": false,
"created_at": "2019-09-11T23:28:59Z",
"updated_at": "2020-12-25T20:06:24Z",
"pushed_at": "2019-09-15T17:09:51Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 4,
"forks": 4,
"watchers": 17,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 212626761,
"name": "CVE-2019-12562",
"full_name": "MAYASEVEN\/CVE-2019-12562",
"owner": {
"login": "MAYASEVEN",
"id": 1219852,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1219852?v=4",
"html_url": "https:\/\/github.com\/MAYASEVEN"
},
"html_url": "https:\/\/github.com\/MAYASEVEN\/CVE-2019-12562",
"description": "Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 | XSS to RCE",
"fork": false,
"created_at": "2019-10-03T16:29:58Z",
"updated_at": "2020-07-12T12:12:02Z",
"pushed_at": "2019-10-03T17:28:50Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 206106300,
"name": "esp32_esp8266_attacks",
"full_name": "Matheus-Garbelini\/esp32_esp8266_attacks",
"owner": {
"login": "Matheus-Garbelini",
"id": 6465668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6465668?v=4",
"html_url": "https:\/\/github.com\/Matheus-Garbelini"
},
"html_url": "https:\/\/github.com\/Matheus-Garbelini\/esp32_esp8266_attacks",
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2021-02-21T03:50:57Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 686,
"watchers_count": 686,
"forks_count": 62,
"forks": 62,
"watchers": 686,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 194123487,
"name": "CVE-2019-12594",
"full_name": "Alexandre-Bartel\/CVE-2019-12594",
"owner": {
"login": "Alexandre-Bartel",
"id": 655248,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/655248?v=4",
"html_url": "https:\/\/github.com\/Alexandre-Bartel"
},
"html_url": "https:\/\/github.com\/Alexandre-Bartel\/CVE-2019-12594",
"description": "This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.",
"fork": false,
"created_at": "2019-06-27T15:49:16Z",
"updated_at": "2020-12-09T18:01:25Z",
"pushed_at": "2019-07-01T17:36:42Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 190523226,
"name": "ace-vim-neovim",
"full_name": "pcy190\/ace-vim-neovim",
"owner": {
"login": "pcy190",
"id": 40729789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40729789?v=4",
"html_url": "https:\/\/github.com\/pcy190"
},
"html_url": "https:\/\/github.com\/pcy190\/ace-vim-neovim",
"description": "Vim\/Neovim Arbitrary Code Execution via Modelines (CVE-2019-12735)",
"fork": false,
"created_at": "2019-06-06T06:00:06Z",
"updated_at": "2020-11-17T05:53:56Z",
"pushed_at": "2019-06-06T06:09:56Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"score": 0
},
{
"id": 192580764,
"name": "CVE-2019-12735-VIM-NEOVIM",
"full_name": "oldthree3\/CVE-2019-12735-VIM-NEOVIM",
"owner": {
"login": "oldthree3",
"id": 51964995,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51964995?v=4",
"html_url": "https:\/\/github.com\/oldthree3"
},
"html_url": "https:\/\/github.com\/oldthree3\/CVE-2019-12735-VIM-NEOVIM",
"description": null,
"fork": false,
"created_at": "2019-06-18T16:59:39Z",
"updated_at": "2019-06-19T07:30:04Z",
"pushed_at": "2019-06-19T07:30:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 192375622,
"name": "CVE-2019-12796",
"full_name": "PeterUpfold\/CVE-2019-12796",
"owner": {
"login": "PeterUpfold",
"id": 1255375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1255375?v=4",
"html_url": "https:\/\/github.com\/PeterUpfold"
},
"html_url": "https:\/\/github.com\/PeterUpfold\/CVE-2019-12796",
"description": "This repository will contain information regarding CVE-2019-12796 once it is made public.",
"fork": false,
"created_at": "2019-06-17T15:47:12Z",
"updated_at": "2019-06-17T17:02:01Z",
"pushed_at": "2019-06-17T15:49:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 199214840,
"name": "CVE-2019-12815",
"full_name": "KTN1990\/CVE-2019-12815",
"owner": {
"login": "KTN1990",
"id": 33407405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4",
"html_url": "https:\/\/github.com\/KTN1990"
},
"html_url": "https:\/\/github.com\/KTN1990\/CVE-2019-12815",
"description": "ProFTPd mod_copy - arbitrary file copy without authentication",
"fork": false,
"created_at": "2019-07-27T21:26:06Z",
"updated_at": "2020-09-06T05:30:02Z",
"pushed_at": "2019-09-24T02:06:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 5,
"forks": 5,
"watchers": 2,
"score": 0
},
{
"id": 290230078,
"name": "proftpd-cve-2019-12815",

View file

@ -1,25 +0,0 @@
[
{
"id": 196251116,
"name": "CVE-2019-12889",
"full_name": "nulsect0r\/CVE-2019-12889",
"owner": {
"login": "nulsect0r",
"id": 52004761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52004761?v=4",
"html_url": "https:\/\/github.com\/nulsect0r"
},
"html_url": "https:\/\/github.com\/nulsect0r\/CVE-2019-12889",
"description": null,
"fork": false,
"created_at": "2019-07-10T17:49:51Z",
"updated_at": "2019-08-12T15:14:04Z",
"pushed_at": "2019-08-12T15:14:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 193627360,
"name": "CVE-2019-12949",
"full_name": "tarantula-team\/CVE-2019-12949",
"owner": {
"login": "tarantula-team",
"id": 51333391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51333391?v=4",
"html_url": "https:\/\/github.com\/tarantula-team"
},
"html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-12949",
"description": "CVE-2019-12949 ",
"fork": false,
"created_at": "2019-06-25T03:22:23Z",
"updated_at": "2020-05-04T07:57:28Z",
"pushed_at": "2019-06-28T04:19:38Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 9,
"forks": 9,
"watchers": 27,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 211231317,
"name": "chanleakcheck",
"full_name": "lightninglabs\/chanleakcheck",
"owner": {
"login": "lightninglabs",
"id": 24724349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24724349?v=4",
"html_url": "https:\/\/github.com\/lightninglabs"
},
"html_url": "https:\/\/github.com\/lightninglabs\/chanleakcheck",
"description": "A tool to check if your lnd node was targeted by CVE-2019-12999",
"fork": false,
"created_at": "2019-09-27T03:47:09Z",
"updated_at": "2021-01-11T17:27:22Z",
"pushed_at": "2019-09-27T21:08:41Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 211268436,
"name": "detection-tool-cve-2019-13000",
"full_name": "ACINQ\/detection-tool-cve-2019-13000",
"owner": {
"login": "ACINQ",
"id": 7670721,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7670721?v=4",
"html_url": "https:\/\/github.com\/ACINQ"
},
"html_url": "https:\/\/github.com\/ACINQ\/detection-tool-cve-2019-13000",
"description": "A tool that detect if your node has been victim of the invalid funding tx attack.",
"fork": false,
"created_at": "2019-09-27T08:07:07Z",
"updated_at": "2019-09-27T15:02:33Z",
"pushed_at": "2019-09-27T13:44:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 204202778,
"name": "CVE-2019-13024",
"full_name": "mhaskar\/CVE-2019-13024",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-13024",
"description": "The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024",
"fork": false,
"created_at": "2019-08-24T19:26:19Z",
"updated_at": "2020-08-24T04:58:20Z",
"pushed_at": "2019-08-24T19:27:24Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"score": 0
},
{
"id": 220509225,
"name": "Centreon-RCE",

View file

@ -1,25 +0,0 @@
[
{
"id": 212197607,
"name": "CVE-2019-13025",
"full_name": "x1tan\/CVE-2019-13025",
"owner": {
"login": "x1tan",
"id": 5700584,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5700584?v=4",
"html_url": "https:\/\/github.com\/x1tan"
},
"html_url": "https:\/\/github.com\/x1tan\/CVE-2019-13025",
"description": "Connect Box CH7465LG (CVE-2019-13025)",
"fork": false,
"created_at": "2019-10-01T20:53:47Z",
"updated_at": "2021-02-08T11:18:50Z",
"pushed_at": "2019-10-04T18:40:51Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 6,
"forks": 6,
"watchers": 30,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 195768661,
"name": "CVE-2019-13027",
"full_name": "IckoGZ\/CVE-2019-13027",
"owner": {
"login": "IckoGZ",
"id": 52542268,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52542268?v=4",
"html_url": "https:\/\/github.com\/IckoGZ"
},
"html_url": "https:\/\/github.com\/IckoGZ\/CVE-2019-13027",
"description": "Details for disclosing CVE-2019-13027",
"fork": false,
"created_at": "2019-07-08T08:25:07Z",
"updated_at": "2019-07-11T08:33:11Z",
"pushed_at": "2019-07-11T08:33:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 216841467,
"name": "CVE-2019-13051",
"full_name": "pr0tean\/CVE-2019-13051",
"owner": {
"login": "pr0tean",
"id": 52039659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52039659?v=4",
"html_url": "https:\/\/github.com\/pr0tean"
},
"html_url": "https:\/\/github.com\/pr0tean\/CVE-2019-13051",
"description": null,
"fork": false,
"created_at": "2019-10-22T15:00:48Z",
"updated_at": "2020-08-29T01:57:47Z",
"pushed_at": "2019-10-22T15:03:34Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 19,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 196970646,
"name": "CVE-2019-13063-POC",
"full_name": "0x6b7966\/CVE-2019-13063-POC",
"owner": {
"login": "0x6b7966",
"id": 22814832,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22814832?v=4",
"html_url": "https:\/\/github.com\/0x6b7966"
},
"html_url": "https:\/\/github.com\/0x6b7966\/CVE-2019-13063-POC",
"description": "Proof of concept tool to exploit the directory traversal and local file inclusion vulnerability that resides in the Sahi-pro web application CVE-2019-13063",
"fork": false,
"created_at": "2019-07-15T09:45:36Z",
"updated_at": "2019-08-18T02:47:49Z",
"pushed_at": "2019-07-01T19:16:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 202451022,
"name": "dlkploit600",
"full_name": "halencarjunior\/dlkploit600",
"owner": {
"login": "halencarjunior",
"id": 403088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4",
"html_url": "https:\/\/github.com\/halencarjunior"
},
"html_url": "https:\/\/github.com\/halencarjunior\/dlkploit600",
"description": "Simple Python script for D-Link vulnerability scan and test [CVE-2019-13101]",
"fork": false,
"created_at": "2019-08-15T01:20:45Z",
"updated_at": "2019-08-15T15:17:18Z",
"pushed_at": "2019-08-15T15:17:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 212644372,
"name": "libssh2-Exploit",
"full_name": "CSSProject\/libssh2-Exploit",
"owner": {
"login": "CSSProject",
"id": 56131742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56131742?v=4",
"html_url": "https:\/\/github.com\/CSSProject"
},
"html_url": "https:\/\/github.com\/CSSProject\/libssh2-Exploit",
"description": "Create an exploit to libssh2 vulnerabulity described in CVE-2019-13115",
"fork": false,
"created_at": "2019-10-03T17:58:03Z",
"updated_at": "2019-10-03T17:59:45Z",
"pushed_at": "2019-10-03T17:59:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 200684724,
"name": "pwnfb50",
"full_name": "securelayer7\/pwnfb50",
"owner": {
"login": "securelayer7",
"id": 14994455,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14994455?v=4",
"html_url": "https:\/\/github.com\/securelayer7"
},
"html_url": "https:\/\/github.com\/securelayer7\/pwnfb50",
"description": ":unlock: transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)",
"fork": false,
"created_at": "2019-08-05T15:45:02Z",
"updated_at": "2020-12-20T09:40:47Z",
"pushed_at": "2019-08-07T13:06:15Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 218240051,
"name": "CVE-2019-1315",
"full_name": "Mayter\/CVE-2019-1315",
"owner": {
"login": "Mayter",
"id": 6148807,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6148807?v=4",
"html_url": "https:\/\/github.com\/Mayter"
},
"html_url": "https:\/\/github.com\/Mayter\/CVE-2019-1315",
"description": null,
"fork": false,
"created_at": "2019-10-29T08:36:25Z",
"updated_at": "2020-10-14T20:51:43Z",
"pushed_at": "2019-10-29T08:46:08Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
}
]

View file

@ -1,119 +1,4 @@
[
{
"id": 199781061,
"name": "CVE-2019-13272",
"full_name": "jas502n\/CVE-2019-13272",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272",
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2021-03-05T01:54:21Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 97,
"forks": 97,
"watchers": 250,
"score": 0
},
{
"id": 199794841,
"name": "CVE-2019-13272",
"full_name": "Cyc1eC\/CVE-2019-13272",
"owner": {
"login": "Cyc1eC",
"id": 26767829,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767829?v=4",
"html_url": "https:\/\/github.com\/Cyc1eC"
},
"html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272",
"description": "The exploit for CVE-2019-13272",
"fork": false,
"created_at": "2019-07-31T06:36:21Z",
"updated_at": "2020-12-14T12:01:59Z",
"pushed_at": "2019-07-31T07:05:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 7,
"forks": 7,
"watchers": 4,
"score": 0
},
{
"id": 200459882,
"name": "cve-2019-13272",
"full_name": "bigbigliang-malwarebenchmark\/cve-2019-13272",
"owner": {
"login": "bigbigliang-malwarebenchmark",
"id": 45776349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45776349?v=4",
"html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark"
},
"html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark\/cve-2019-13272",
"description": "提权漏洞",
"fork": false,
"created_at": "2019-08-04T06:51:36Z",
"updated_at": "2019-09-12T15:32:19Z",
"pushed_at": "2019-08-04T07:06:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 200948343,
"name": "CVE-2019-13272",
"full_name": "oneoy\/CVE-2019-13272",
"owner": {
"login": "oneoy",
"id": 38435398,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
"html_url": "https:\/\/github.com\/oneoy"
},
"html_url": "https:\/\/github.com\/oneoy\/CVE-2019-13272",
"description": "linux 提权",
"fork": false,
"created_at": "2019-08-07T01:21:26Z",
"updated_at": "2020-03-25T06:34:45Z",
"pushed_at": "2019-08-07T01:21:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 209440455,
"name": "CVE-2019-13272",
"full_name": "Huandtx\/CVE-2019-13272",
"owner": {
"login": "Huandtx",
"id": 44591522,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44591522?v=4",
"html_url": "https:\/\/github.com\/Huandtx"
},
"html_url": "https:\/\/github.com\/Huandtx\/CVE-2019-13272",
"description": "5.1.17之前的Linux内核中普通用户执行文件提权为root用户",
"fork": false,
"created_at": "2019-09-19T01:58:35Z",
"updated_at": "2021-01-04T12:16:18Z",
"pushed_at": "2019-09-19T02:09:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 245129315,
"name": "CVE-2019-13272",

View file

@ -1,25 +0,0 @@
[
{
"id": 201811193,
"name": "CVE-2019-13361",
"full_name": "lodi-g\/CVE-2019-13361",
"owner": {
"login": "lodi-g",
"id": 4528943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4528943?v=4",
"html_url": "https:\/\/github.com\/lodi-g"
},
"html_url": "https:\/\/github.com\/lodi-g\/CVE-2019-13361",
"description": "Smanos W100 1.0.0 devices have Insecure Permissions, exploitable by an attacker on the same Wi-Fi network.",
"fork": false,
"created_at": "2019-08-11T20:21:07Z",
"updated_at": "2019-08-11T20:36:22Z",
"pushed_at": "2019-08-11T20:35:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 196799368,
"name": "CVE-2019-13403",
"full_name": "B3Bo1d\/CVE-2019-13403",
"owner": {
"login": "B3Bo1d",
"id": 19810607,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19810607?v=4",
"html_url": "https:\/\/github.com\/B3Bo1d"
},
"html_url": "https:\/\/github.com\/B3Bo1d\/CVE-2019-13403",
"description": "CVE-2019-13403",
"fork": false,
"created_at": "2019-07-14T05:52:01Z",
"updated_at": "2019-07-14T06:10:02Z",
"pushed_at": "2019-07-14T06:10:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 207112945,
"name": "fuzzenv-exiv2",
"full_name": "hazedic\/fuzzenv-exiv2",
"owner": {
"login": "hazedic",
"id": 13882826,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13882826?v=4",
"html_url": "https:\/\/github.com\/hazedic"
},
"html_url": "https:\/\/github.com\/hazedic\/fuzzenv-exiv2",
"description": "https:\/\/fuzzit.dev\/2019\/07\/11\/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing\/",
"fork": false,
"created_at": "2019-09-08T12:58:45Z",
"updated_at": "2019-09-08T13:00:07Z",
"pushed_at": "2019-09-08T12:59:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 210525167,
"name": "CVE-2019-1367",
"full_name": "mandarenmanman\/CVE-2019-1367",
"owner": {
"login": "mandarenmanman",
"id": 11764268,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11764268?v=4",
"html_url": "https:\/\/github.com\/mandarenmanman"
},
"html_url": "https:\/\/github.com\/mandarenmanman\/CVE-2019-1367",
"description": "CVE-2019-1367",
"fork": false,
"created_at": "2019-09-24T06:11:10Z",
"updated_at": "2019-10-15T06:44:17Z",
"pushed_at": "2019-09-24T06:13:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 211860095,
"name": "cve-2019-14220",
"full_name": "seqred-s-a\/cve-2019-14220",
"owner": {
"login": "seqred-s-a",
"id": 49437606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49437606?v=4",
"html_url": "https:\/\/github.com\/seqred-s-a"
},
"html_url": "https:\/\/github.com\/seqred-s-a\/cve-2019-14220",
"description": "Arbitrary file read in BlueStacks",
"fork": false,
"created_at": "2019-09-30T12:57:35Z",
"updated_at": "2019-10-01T11:53:47Z",
"pushed_at": "2019-09-30T13:11:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 215227089,
"name": "sudo-cve-2019-14287",
"full_name": "FauxFaux\/sudo-cve-2019-14287",
"owner": {
"login": "FauxFaux",
"id": 328180,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/328180?v=4",
"html_url": "https:\/\/github.com\/FauxFaux"
},
"html_url": "https:\/\/github.com\/FauxFaux\/sudo-cve-2019-14287",
"description": null,
"fork": false,
"created_at": "2019-10-15T06:47:58Z",
"updated_at": "2019-10-20T12:06:59Z",
"pushed_at": "2019-10-15T06:48:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 215363376,
"name": "CVE-2019-14287-demo",
@ -45,52 +22,6 @@
"watchers": 1,
"score": 0
},
{
"id": 215379835,
"name": "CVE-2019-14287",
"full_name": "n0w4n\/CVE-2019-14287",
"owner": {
"login": "n0w4n",
"id": 43784479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43784479?v=4",
"html_url": "https:\/\/github.com\/n0w4n"
},
"html_url": "https:\/\/github.com\/n0w4n\/CVE-2019-14287",
"description": "Sudo exploit",
"fork": false,
"created_at": "2019-10-15T19:26:42Z",
"updated_at": "2020-12-12T13:58:25Z",
"pushed_at": "2019-10-15T20:02:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 215573200,
"name": "CVE-2019-14287-write-up",
"full_name": "gurneesh\/CVE-2019-14287-write-up",
"owner": {
"login": "gurneesh",
"id": 26605645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26605645?v=4",
"html_url": "https:\/\/github.com\/gurneesh"
},
"html_url": "https:\/\/github.com\/gurneesh\/CVE-2019-14287-write-up",
"description": null,
"fork": false,
"created_at": "2019-10-16T14:47:08Z",
"updated_at": "2019-10-16T15:09:22Z",
"pushed_at": "2019-10-16T15:09:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 215939284,
"name": "Sudo-Security-Bypass-CVE-2019-14287",
@ -114,29 +45,6 @@
"watchers": 2,
"score": 0
},
{
"id": 216456479,
"name": "cve-2019-14287sudoexp",
"full_name": "Janette88\/cve-2019-14287sudoexp",
"owner": {
"login": "Janette88",
"id": 20410684,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20410684?v=4",
"html_url": "https:\/\/github.com\/Janette88"
},
"html_url": "https:\/\/github.com\/Janette88\/cve-2019-14287sudoexp",
"description": null,
"fork": false,
"created_at": "2019-10-21T01:54:45Z",
"updated_at": "2019-10-21T02:01:14Z",
"pushed_at": "2019-10-21T02:01:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 217958958,
"name": "cve-2019-14287-PPT",

View file

@ -1,25 +0,0 @@
[
{
"id": 206061423,
"name": "CVE-2019-14319",
"full_name": "MelroyB\/CVE-2019-14319",
"owner": {
"login": "MelroyB",
"id": 39052594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39052594?v=4",
"html_url": "https:\/\/github.com\/MelroyB"
},
"html_url": "https:\/\/github.com\/MelroyB\/CVE-2019-14319",
"description": null,
"fork": false,
"created_at": "2019-09-03T11:29:51Z",
"updated_at": "2020-09-05T14:15:28Z",
"pushed_at": "2019-09-03T11:30:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 198801002,
"name": "CVE-2019-14339",
"full_name": "0x48piraj\/CVE-2019-14339",
"owner": {
"login": "0x48piraj",
"id": 5800726,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5800726?v=4",
"html_url": "https:\/\/github.com\/0x48piraj"
},
"html_url": "https:\/\/github.com\/0x48piraj\/CVE-2019-14339",
"description": "POC for CVE-2019-14339 Canon PRINT 2.5.5",
"fork": false,
"created_at": "2019-07-25T09:30:02Z",
"updated_at": "2020-09-27T02:27:14Z",
"pushed_at": "2019-09-15T16:45:19Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 199983488,
"name": "CVE-2019-14439",
"full_name": "jas502n\/CVE-2019-14439",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-14439",
"description": "Jackson-databind RCE",
"fork": false,
"created_at": "2019-08-01T05:33:06Z",
"updated_at": "2019-12-15T16:09:26Z",
"pushed_at": "2019-08-01T05:33:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 202034341,
"name": "CVE-2019-14529",
"full_name": "Wezery\/CVE-2019-14529",
"owner": {
"login": "Wezery",
"id": 53606486,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53606486?v=4",
"html_url": "https:\/\/github.com\/Wezery"
},
"html_url": "https:\/\/github.com\/Wezery\/CVE-2019-14529",
"description": "OpenEMR Security issue",
"fork": false,
"created_at": "2019-08-13T01:01:51Z",
"updated_at": "2019-10-14T10:21:18Z",
"pushed_at": "2019-10-14T10:21:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

Some files were not shown because too many files have changed in this diff Show more