Auto Update 2020/06/01 00:07:49

This commit is contained in:
motikan2010-bot 2020-06-01 00:07:49 +09:00
parent a28921525d
commit 1933a16e0e
88 changed files with 36 additions and 5056 deletions

View file

@ -13,13 +13,13 @@
"description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-06T17:55:44Z",
"updated_at": "2020-05-18T10:41:57Z",
"updated_at": "2020-05-31T12:46:32Z",
"pushed_at": "2017-01-06T23:34:03Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 11,
"forks": 11,
"watchers": 33,
"watchers": 34,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2020-05-22T22:33:20Z",
"updated_at": "2020-05-31T10:11:20Z",
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 423,
"watchers_count": 423,
"stargazers_count": 424,
"watchers_count": 424,
"forks_count": 137,
"forks": 137,
"watchers": 423,
"watchers": 424,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2020-05-18T10:42:34Z",
"updated_at": "2020-05-31T14:42:49Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 364,
"watchers_count": 364,
"stargazers_count": 365,
"watchers_count": 365,
"forks_count": 100,
"forks": 100,
"watchers": 364,
"watchers": 365,
"score": 0
},
{

View file

@ -1,27 +1,4 @@
[
{
"id": 174814901,
"name": "CVE-2019-0192",
"full_name": "mpgn\/CVE-2019-0192",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-0192",
"description": "RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl",
"fork": false,
"created_at": "2019-03-10T11:35:26Z",
"updated_at": "2020-04-28T07:06:30Z",
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 56,
"forks": 56,
"watchers": 200,
"score": 0
},
{
"id": 218993619,
"name": "Solr-RCE-CVE-2019-0192",

View file

@ -1,27 +1,4 @@
[
{
"id": 176290079,
"name": "CVE-2019-0193",
"full_name": "xConsoIe\/CVE-2019-0193",
"owner": {
"login": "xConsoIe",
"id": 48456709,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48456709?v=4",
"html_url": "https:\/\/github.com\/xConsoIe"
},
"html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193",
"description": null,
"fork": false,
"created_at": "2019-03-18T13:18:01Z",
"updated_at": "2019-09-04T03:22:35Z",
"pushed_at": "2019-03-18T13:22:48Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"watchers": 5,
"score": 0
},
{
"id": 201405406,
"name": "CVE-2019-0193",

View file

@ -1,25 +0,0 @@
[
{
"id": 186238849,
"name": "Apache-Exploit-2019",
"full_name": "ozkanbilge\/Apache-Exploit-2019",
"owner": {
"login": "ozkanbilge",
"id": 39211596,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/39211596?v=4",
"html_url": "https:\/\/github.com\/ozkanbilge"
},
"html_url": "https:\/\/github.com\/ozkanbilge\/Apache-Exploit-2019",
"description": "CVE-2019-0211-apache & CVE-2019-6977-imagecolormatch",
"fork": false,
"created_at": "2019-05-12T10:08:57Z",
"updated_at": "2019-12-20T18:01:46Z",
"pushed_at": "2019-05-12T10:09:35Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -22,52 +22,6 @@
"watchers": 170,
"score": 0
},
{
"id": 181706868,
"name": "CVE-2019-0232",
"full_name": "jas502n\/CVE-2019-0232",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0232",
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
"fork": false,
"created_at": "2019-04-16T14:32:03Z",
"updated_at": "2020-03-12T00:07:25Z",
"pushed_at": "2019-04-17T02:42:03Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 23,
"forks": 23,
"watchers": 53,
"score": 0
},
{
"id": 188168912,
"name": "CVE-2019-0232-EXP",
"full_name": "CherishHair\/CVE-2019-0232-EXP",
"owner": {
"login": "CherishHair",
"id": 16273668,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/16273668?v=4",
"html_url": "https:\/\/github.com\/CherishHair"
},
"html_url": "https:\/\/github.com\/CherishHair\/CVE-2019-0232-EXP",
"description": null,
"fork": false,
"created_at": "2019-05-23T05:44:29Z",
"updated_at": "2019-11-27T11:05:38Z",
"pushed_at": "2019-05-23T13:13:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 223192188,
"name": "CVE-2019-0232",

View file

@ -1,50 +1,4 @@
[
{
"id": 177246255,
"name": "CVE-2019-0604",
"full_name": "linhlhq\/CVE-2019-0604",
"owner": {
"login": "linhlhq",
"id": 28854132,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28854132?v=4",
"html_url": "https:\/\/github.com\/linhlhq"
},
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2020-05-31T02:35:05Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 74,
"forks": 74,
"watchers": 124,
"score": 0
},
{
"id": 179413290,
"name": "CVE-2019-0604_sharepoint_CVE",
"full_name": "denmilu\/CVE-2019-0604_sharepoint_CVE",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/denmilu"
},
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-0604_sharepoint_CVE",
"description": null,
"fork": false,
"created_at": "2019-04-04T03:17:30Z",
"updated_at": "2019-04-04T03:17:59Z",
"pushed_at": "2019-04-04T03:17:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 193926769,
"name": "CVE-2019-0604",

File diff suppressed because it is too large Load diff

View file

@ -21,28 +21,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 189527128,
"name": "CVE-2019-0709",
"full_name": "qq431169079\/CVE-2019-0709",
"owner": {
"login": "qq431169079",
"id": 42376039,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/42376039?v=4",
"html_url": "https:\/\/github.com\/qq431169079"
},
"html_url": "https:\/\/github.com\/qq431169079\/CVE-2019-0709",
"description": "Exploit In Progress",
"fork": false,
"created_at": "2019-05-31T04:23:39Z",
"updated_at": "2019-05-31T23:10:21Z",
"pushed_at": "2019-05-26T15:25:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 188212551,
"name": "ie11_vbscript_exploit",
"full_name": "ruthlezs\/ie11_vbscript_exploit",
"owner": {
"login": "ruthlezs",
"id": 15887791,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
"html_url": "https:\/\/github.com\/ruthlezs"
},
"html_url": "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit",
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
"fork": false,
"created_at": "2019-05-23T10:28:40Z",
"updated_at": "2020-03-04T02:14:02Z",
"pushed_at": "2019-05-23T11:26:38Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187201710,
"name": "CVE-2019-0803",
"full_name": "ExpLife0011\/CVE-2019-0803",
"owner": {
"login": "ExpLife0011",
"id": 37372761,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37372761?v=4",
"html_url": "https:\/\/github.com\/ExpLife0011"
},
"html_url": "https:\/\/github.com\/ExpLife0011\/CVE-2019-0803",
"description": "Win32k Elevation of Privilege Poc",
"fork": false,
"created_at": "2019-05-17T11:05:22Z",
"updated_at": "2020-04-22T11:25:54Z",
"pushed_at": "2019-05-17T10:53:29Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 64,
"forks": 64,
"watchers": 73,
"score": 0
}
]

View file

@ -1,73 +1,4 @@
[
{
"id": 177576776,
"name": "cve-2019-0808-poc",
"full_name": "ze0r\/cve-2019-0808-poc",
"owner": {
"login": "ze0r",
"id": 43227253,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43227253?v=4",
"html_url": "https:\/\/github.com\/ze0r"
},
"html_url": "https:\/\/github.com\/ze0r\/cve-2019-0808-poc",
"description": "cve-2019-0808-poc",
"fork": false,
"created_at": "2019-03-25T11:53:35Z",
"updated_at": "2019-12-19T08:10:56Z",
"pushed_at": "2019-03-25T12:10:40Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 17,
"forks": 17,
"watchers": 38,
"score": 0
},
{
"id": 182577297,
"name": "CVE-2019-0808",
"full_name": "rakesh143\/CVE-2019-0808",
"owner": {
"login": "rakesh143",
"id": 12870599,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12870599?v=4",
"html_url": "https:\/\/github.com\/rakesh143"
},
"html_url": "https:\/\/github.com\/rakesh143\/CVE-2019-0808",
"description": null,
"fork": false,
"created_at": "2019-04-21T20:04:34Z",
"updated_at": "2019-04-21T20:07:45Z",
"pushed_at": "2019-04-21T20:07:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 187227372,
"name": "CVE-2019-0808",
"full_name": "exodusintel\/CVE-2019-0808",
"owner": {
"login": "exodusintel",
"id": 16653014,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16653014?v=4",
"html_url": "https:\/\/github.com\/exodusintel"
},
"html_url": "https:\/\/github.com\/exodusintel\/CVE-2019-0808",
"description": "Win32k Exploit by Grant Willcox",
"fork": false,
"created_at": "2019-05-17T14:08:01Z",
"updated_at": "2020-05-18T10:43:04Z",
"pushed_at": "2019-05-17T14:17:00Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 37,
"forks": 37,
"watchers": 76,
"score": 0
},
{
"id": 264669775,
"name": "CVE-2019-0808-32-64-exp",

View file

@ -1,50 +1,4 @@
[
{
"id": 179680988,
"name": "CVE-2019-0841",
"full_name": "rogue-kdc\/CVE-2019-0841",
"owner": {
"login": "rogue-kdc",
"id": 49311295,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49311295?v=4",
"html_url": "https:\/\/github.com\/rogue-kdc"
},
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2019-0841",
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
"fork": false,
"created_at": "2019-04-05T12:53:52Z",
"updated_at": "2020-05-28T00:02:09Z",
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 220,
"watchers_count": 220,
"forks_count": 95,
"forks": 95,
"watchers": 220,
"score": 0
},
{
"id": 180605162,
"name": "CVE-2019-0841",
"full_name": "denmilu\/CVE-2019-0841",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/denmilu"
},
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-0841",
"description": null,
"fork": false,
"created_at": "2019-04-10T14:58:22Z",
"updated_at": "2019-05-26T06:57:44Z",
"pushed_at": "2019-04-10T14:58:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 191441504,
"name": "CVE-2019-0841-BYPASS",

View file

@ -1,25 +0,0 @@
[
{
"id": 179330253,
"name": "CVE-2019-1002101-Helpers",
"full_name": "brompwnie\/CVE-2019-1002101-Helpers",
"owner": {
"login": "brompwnie",
"id": 8638589,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8638589?v=4",
"html_url": "https:\/\/github.com\/brompwnie"
},
"html_url": "https:\/\/github.com\/brompwnie\/CVE-2019-1002101-Helpers",
"description": "PoC helper scripts and Dockerfile for CVE-2019-1002101",
"fork": false,
"created_at": "2019-04-03T16:36:58Z",
"updated_at": "2020-03-29T07:07:14Z",
"pushed_at": "2019-04-03T17:35:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"score": 0
}
]

View file

@ -21,74 +21,5 @@
"forks": 28,
"watchers": 51,
"score": 0
},
{
"id": 170809838,
"name": "cve-2019-1003000-jenkins-rce-poc",
"full_name": "adamyordan\/cve-2019-1003000-jenkins-rce-poc",
"owner": {
"login": "adamyordan",
"id": 9531164,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9531164?v=4",
"html_url": "https:\/\/github.com\/adamyordan"
},
"html_url": "https:\/\/github.com\/adamyordan\/cve-2019-1003000-jenkins-rce-poc",
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2020-05-30T13:32:55Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 257,
"watchers_count": 257,
"forks_count": 74,
"forks": 74,
"watchers": 257,
"score": 0
},
{
"id": 172198653,
"name": "CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"full_name": "0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"owner": {
"login": "0xtavian",
"id": 21030907,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21030907?v=4",
"html_url": "https:\/\/github.com\/0xtavian"
},
"html_url": "https:\/\/github.com\/0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-02-23T10:00:03Z",
"updated_at": "2020-04-20T00:16:50Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"score": 0
},
{
"id": 183322760,
"name": "CVE-2019-1003000_RCE-DETECTION",
"full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"owner": {
"login": "1NTheKut",
"id": 26243759,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/26243759?v=4",
"html_url": "https:\/\/github.com\/1NTheKut"
},
"html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)",
"fork": false,
"created_at": "2019-04-24T23:52:42Z",
"updated_at": "2019-05-13T06:00:34Z",
"pushed_at": "2019-05-01T07:11:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 185265234,
"name": "cve-2019-10678",
"full_name": "cved-sources\/cve-2019-10678",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-10678",
"description": "cve-2019-10678",
"fork": false,
"created_at": "2019-05-06T20:15:47Z",
"updated_at": "2019-05-06T20:16:09Z",
"pushed_at": "2019-05-06T20:16:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 179077030,
"name": "CVE-2019-10685",
"full_name": "alt3kx\/CVE-2019-10685",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2019-10685",
"description": "A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6",
"fork": false,
"created_at": "2019-04-02T12:50:46Z",
"updated_at": "2019-05-11T02:51:22Z",
"pushed_at": "2019-05-07T11:50:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 186229171,
"name": "CVE-2019-10869",
"full_name": "KTN1990\/CVE-2019-10869",
"owner": {
"login": "KTN1990",
"id": 33407405,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33407405?v=4",
"html_url": "https:\/\/github.com\/KTN1990"
},
"html_url": "https:\/\/github.com\/KTN1990\/CVE-2019-10869",
"description": "(Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2019-05-12T08:20:16Z",
"updated_at": "2020-02-15T08:35:59Z",
"pushed_at": "2019-05-17T10:41:43Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 180679185,
"name": "poc-cribl-rce",
"full_name": "livehybrid\/poc-cribl-rce",
"owner": {
"login": "livehybrid",
"id": 5527349,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5527349?v=4",
"html_url": "https:\/\/github.com\/livehybrid"
},
"html_url": "https:\/\/github.com\/livehybrid\/poc-cribl-rce",
"description": "CVE-2019-11076 - Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthenticated web request",
"fork": false,
"created_at": "2019-04-10T23:31:39Z",
"updated_at": "2020-03-15T20:21:00Z",
"pushed_at": "2019-04-11T12:50:39Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 181940820,
"name": "CVE-2019-11223",
"full_name": "AngelCtulhu\/CVE-2019-11223",
"owner": {
"login": "AngelCtulhu",
"id": 36587659,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36587659?v=4",
"html_url": "https:\/\/github.com\/AngelCtulhu"
},
"html_url": "https:\/\/github.com\/AngelCtulhu\/CVE-2019-11223",
"description": "CVE-2019-11223 - Arbitrary File Upload in Wordpress Support Candy Plugin Version 2.0 Below",
"fork": false,
"created_at": "2019-04-17T17:43:46Z",
"updated_at": "2019-04-19T16:43:54Z",
"pushed_at": "2019-04-19T04:32:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 5,
"forks": 5,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187415847,
"name": "eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"full_name": "fuzzlove\/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"owner": {
"login": "fuzzlove",
"id": 44779781,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44779781?v=4",
"html_url": "https:\/\/github.com\/fuzzlove"
},
"html_url": "https:\/\/github.com\/fuzzlove\/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"description": "eLabFTW 1.8.5 'EntityController' Arbitrary File Upload \/ RCE (CVE-2019-12185)",
"fork": false,
"created_at": "2019-05-18T23:56:52Z",
"updated_at": "2019-11-12T06:27:17Z",
"pushed_at": "2019-05-20T00:29:16Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 187569819,
"name": "CVE-2019-12189",
"full_name": "falconz\/CVE-2019-12189",
"owner": {
"login": "falconz",
"id": 9218490,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9218490?v=4",
"html_url": "https:\/\/github.com\/falconz"
},
"html_url": "https:\/\/github.com\/falconz\/CVE-2019-12189",
"description": null,
"fork": false,
"created_at": "2019-05-20T04:52:38Z",
"updated_at": "2019-05-20T06:03:05Z",
"pushed_at": "2019-05-20T06:03:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 187589027,
"name": "CVE-2019-12189",
"full_name": "tuyenhva\/CVE-2019-12189",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12189",
"description": "CVE-2019-12189 - Zoho ManageEngine ServiceDesk Plus 9.3 XSS vulnerability",
"fork": false,
"created_at": "2019-05-20T07:23:51Z",
"updated_at": "2019-05-20T07:44:03Z",
"pushed_at": "2019-05-20T07:44:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187596474,
"name": "CVE-2019-12190",
"full_name": "tuyenhva\/CVE-2019-12190",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12190",
"description": "CVE-2019-12190 - CentOS-WebPanel XSS vulnerability",
"fork": false,
"created_at": "2019-05-20T08:09:49Z",
"updated_at": "2019-05-20T08:13:09Z",
"pushed_at": "2019-05-20T08:13:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187880000,
"name": "CVE-2019-12252",
"full_name": "tuyenhva\/CVE-2019-12252",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12252",
"description": "CVE-2019-12252 Zoho ManageEngine ServiceDesk Plus < 10.5 Incorrect Access Control",
"fork": false,
"created_at": "2019-05-21T16:59:23Z",
"updated_at": "2019-05-21T17:01:52Z",
"pushed_at": "2019-05-21T17:01:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 188212424,
"name": "WebPort-v1.19.1-Reflected-XSS",
"full_name": "EmreOvunc\/WebPort-v1.19.1-Reflected-XSS",
"owner": {
"login": "EmreOvunc",
"id": 15659223,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
"html_url": "https:\/\/github.com\/EmreOvunc"
},
"html_url": "https:\/\/github.com\/EmreOvunc\/WebPort-v1.19.1-Reflected-XSS",
"description": "CVE-2019-12460|Reflected XSS in WebPort-v1.19.1 impacts users who open a maliciously crafted link or third-party web page.",
"fork": false,
"created_at": "2019-05-23T10:27:49Z",
"updated_at": "2020-05-16T12:47:54Z",
"pushed_at": "2019-05-30T16:21:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 167347037,
"name": "CiscoRV320Dump",
"full_name": "0x27\/CiscoRV320Dump",
"owner": {
"login": "0x27",
"id": 9094330,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9094330?v=4",
"html_url": "https:\/\/github.com\/0x27"
},
"html_url": "https:\/\/github.com\/0x27\/CiscoRV320Dump",
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2020-05-18T10:42:54Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 61,
"forks": 61,
"watchers": 188,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 168361115,
"name": "CVE-2019-1653",
"full_name": "dubfr33\/CVE-2019-1653",
"owner": {
"login": "dubfr33",
"id": 20056018,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20056018?v=4",
"html_url": "https:\/\/github.com\/dubfr33"
},
"html_url": "https:\/\/github.com\/dubfr33\/CVE-2019-1653",
"description": "NSE script to scan for Cisco routers vulnerable to CVE-2019-1653",
"fork": false,
"created_at": "2019-01-30T14:58:48Z",
"updated_at": "2020-04-21T04:04:11Z",
"pushed_at": "2019-01-30T15:01:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 178810790,
"name": "CiscoSpill",
"full_name": "shaheemirza\/CiscoSpill",
"owner": {
"login": "shaheemirza",
"id": 4853436,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4853436?v=4",
"html_url": "https:\/\/github.com\/shaheemirza"
},
"html_url": "https:\/\/github.com\/shaheemirza\/CiscoSpill",
"description": "Just a PoC tool to extract password using CVE-2019-1653.",
"fork": false,
"created_at": "2019-04-01T07:40:01Z",
"updated_at": "2019-04-02T04:57:33Z",
"pushed_at": "2019-04-01T07:50:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187835108,
"name": "CiscoExploit",
"full_name": "k8gege\/CiscoExploit",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/CiscoExploit",
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2020-05-27T05:57:48Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 34,
"forks": 34,
"watchers": 49,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 171108223,
"name": "android-7-9-png-bug",
"full_name": "marcinguy\/android-7-9-png-bug",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/android-7-9-png-bug",
"description": "CVE-2019-1987",
"fork": false,
"created_at": "2019-02-17T10:22:01Z",
"updated_at": "2020-05-18T10:42:55Z",
"pushed_at": "2019-03-02T19:54:06Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 12,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 186277891,
"name": "CVE-2019-2615",
"full_name": "chiaifan\/CVE-2019-2615",
"owner": {
"login": "chiaifan",
"id": 28030381,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28030381?v=4",
"html_url": "https:\/\/github.com\/chiaifan"
},
"html_url": "https:\/\/github.com\/chiaifan\/CVE-2019-2615",
"description": null,
"fork": false,
"created_at": "2019-05-12T16:25:28Z",
"updated_at": "2019-12-12T02:40:06Z",
"pushed_at": "2019-05-12T16:53:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -1,50 +1,4 @@
[
{
"id": 181875107,
"name": "CVE-2019-2618",
"full_name": "pyn3rd\/CVE-2019-2618",
"owner": {
"login": "pyn3rd",
"id": 41412951,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41412951?v=4",
"html_url": "https:\/\/github.com\/pyn3rd"
},
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2019-2618",
"description": "Weblogic Unrestricted File Upload",
"fork": false,
"created_at": "2019-04-17T11:12:32Z",
"updated_at": "2020-01-30T15:19:28Z",
"pushed_at": "2019-04-17T11:13:29Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 11,
"forks": 11,
"watchers": 44,
"score": 0
},
{
"id": 181885950,
"name": "cve-2019-2618",
"full_name": "jas502n\/cve-2019-2618",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/cve-2019-2618",
"description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618",
"fork": false,
"created_at": "2019-04-17T12:23:24Z",
"updated_at": "2020-04-28T05:14:48Z",
"pushed_at": "2019-04-17T15:05:09Z",
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 51,
"forks": 51,
"watchers": 143,
"score": 0
},
{
"id": 185175648,
"name": "CVE-2019-2618-",

View file

@ -22,144 +22,6 @@
"watchers": 191,
"score": 0
},
{
"id": 183346706,
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"owner": {
"login": "SkyBlueEternal",
"id": 46418185,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46418185?v=4",
"html_url": "https:\/\/github.com\/SkyBlueEternal"
},
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2020-04-24T18:17:55Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 37,
"forks": 37,
"watchers": 99,
"score": 0
},
{
"id": 183843413,
"name": "CNTA-2019-0014xCVE-2019-2725",
"full_name": "iceMatcha\/CNTA-2019-0014xCVE-2019-2725",
"owner": {
"login": "iceMatcha",
"id": 18480525,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/18480525?v=4",
"html_url": "https:\/\/github.com\/iceMatcha"
},
"html_url": "https:\/\/github.com\/iceMatcha\/CNTA-2019-0014xCVE-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-04-28T02:18:42Z",
"updated_at": "2019-08-26T16:41:04Z",
"pushed_at": "2019-05-13T10:14:01Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks": 8,
"watchers": 10,
"score": 0
},
{
"id": 184489534,
"name": "cve-2019-2725",
"full_name": "lasensio\/cve-2019-2725",
"owner": {
"login": "lasensio",
"id": 17970238,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17970238?v=4",
"html_url": "https:\/\/github.com\/lasensio"
},
"html_url": "https:\/\/github.com\/lasensio\/cve-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-01T22:25:14Z",
"updated_at": "2020-04-28T05:40:51Z",
"pushed_at": "2019-05-01T23:00:39Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 14,
"forks": 14,
"watchers": 18,
"score": 0
},
{
"id": 184651903,
"name": "CVE-2019-2725",
"full_name": "davidmthomsen\/CVE-2019-2725",
"owner": {
"login": "davidmthomsen",
"id": 22969004,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22969004?v=4",
"html_url": "https:\/\/github.com\/davidmthomsen"
},
"html_url": "https:\/\/github.com\/davidmthomsen\/CVE-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-02T21:09:36Z",
"updated_at": "2019-05-02T21:12:00Z",
"pushed_at": "2019-05-02T21:11:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 185003239,
"name": "CVE-2019-2725",
"full_name": "leerina\/CVE-2019-2725",
"owner": {
"login": "leerina",
"id": 12816285,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12816285?v=4",
"html_url": "https:\/\/github.com\/leerina"
},
"html_url": "https:\/\/github.com\/leerina\/CVE-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-05T08:34:20Z",
"updated_at": "2019-05-24T03:17:10Z",
"pushed_at": "2019-05-05T08:39:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 185956531,
"name": "cve-2019-2725",
"full_name": "zhusx110\/cve-2019-2725",
"owner": {
"login": "zhusx110",
"id": 40231749,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40231749?v=4",
"html_url": "https:\/\/github.com\/zhusx110"
},
"html_url": "https:\/\/github.com\/zhusx110\/cve-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-10T09:07:58Z",
"updated_at": "2019-06-17T03:26:56Z",
"pushed_at": "2019-05-10T09:09:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"score": 0
},
{
"id": 189132043,
"name": "CVE-2019-2725",

View file

@ -1,27 +1,4 @@
[
{
"id": 180277406,
"name": "CVE-2019-3396",
"full_name": "dothanthitiendiettiende\/CVE-2019-3396",
"owner": {
"login": "dothanthitiendiettiende",
"id": 29480786,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29480786?v=4",
"html_url": "https:\/\/github.com\/dothanthitiendiettiende"
},
"html_url": "https:\/\/github.com\/dothanthitiendiettiende\/CVE-2019-3396",
"description": "Confluence Widget Connector RCE",
"fork": false,
"created_at": "2019-04-09T03:26:06Z",
"updated_at": "2019-04-09T11:34:37Z",
"pushed_at": "2019-04-09T03:25:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"forks": 4,
"watchers": 0,
"score": 0
},
{
"id": 180298650,
"name": "CVE-2019-3396",
@ -45,52 +22,6 @@
"watchers": 20,
"score": 0
},
{
"id": 180306648,
"name": "CVE-2019-3396",
"full_name": "shadowsock5\/CVE-2019-3396",
"owner": {
"login": "shadowsock5",
"id": 30398606,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/30398606?v=4",
"html_url": "https:\/\/github.com\/shadowsock5"
},
"html_url": "https:\/\/github.com\/shadowsock5\/CVE-2019-3396",
"description": null,
"fork": false,
"created_at": "2019-04-09T07:09:32Z",
"updated_at": "2019-09-02T09:24:29Z",
"pushed_at": "2019-04-09T11:06:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 180483984,
"name": "CVE-2019-3396_EXP",
"full_name": "Yt1g3r\/CVE-2019-3396_EXP",
"owner": {
"login": "Yt1g3r",
"id": 12625147,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12625147?v=4",
"html_url": "https:\/\/github.com\/Yt1g3r"
},
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2019-3396_EXP",
"description": "CVE-2019-3396 confluence SSTI RCE",
"fork": false,
"created_at": "2019-04-10T02:15:47Z",
"updated_at": "2020-05-18T10:43:01Z",
"pushed_at": "2019-04-12T01:46:33Z",
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 62,
"forks": 62,
"watchers": 149,
"score": 0
},
{
"id": 180484942,
"name": "CVE-2019-3396",
@ -114,98 +45,6 @@
"watchers": 102,
"score": 0
},
{
"id": 180485239,
"name": "CVE-2019-3396",
"full_name": "pyn3rd\/CVE-2019-3396",
"owner": {
"login": "pyn3rd",
"id": 41412951,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41412951?v=4",
"html_url": "https:\/\/github.com\/pyn3rd"
},
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2019-3396",
"description": "Confluence Widget Connector RCE",
"fork": false,
"created_at": "2019-04-10T02:24:29Z",
"updated_at": "2019-11-29T06:43:00Z",
"pushed_at": "2019-04-10T02:26:45Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 14,
"forks": 14,
"watchers": 31,
"score": 0
},
{
"id": 180528467,
"name": "CVE-2019-3396",
"full_name": "s1xg0d\/CVE-2019-3396",
"owner": {
"login": "s1xg0d",
"id": 8321329,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8321329?v=4",
"html_url": "https:\/\/github.com\/s1xg0d"
},
"html_url": "https:\/\/github.com\/s1xg0d\/CVE-2019-3396",
"description": null,
"fork": false,
"created_at": "2019-04-10T07:39:42Z",
"updated_at": "2019-05-13T11:39:51Z",
"pushed_at": "2019-05-13T11:39:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 180627265,
"name": "CVE-2019-3396",
"full_name": "quanpt103\/CVE-2019-3396",
"owner": {
"login": "quanpt103",
"id": 45188297,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/45188297?v=4",
"html_url": "https:\/\/github.com\/quanpt103"
},
"html_url": "https:\/\/github.com\/quanpt103\/CVE-2019-3396",
"description": "Confluence Widget Connector RCE - ptquan",
"fork": false,
"created_at": "2019-04-10T17:05:10Z",
"updated_at": "2019-04-10T17:06:24Z",
"pushed_at": "2019-04-10T17:06:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 183862751,
"name": "confluence_CVE-2019-3396",
"full_name": "vntest11\/confluence_CVE-2019-3396",
"owner": {
"login": "vntest11",
"id": 46453327,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46453327?v=4",
"html_url": "https:\/\/github.com\/vntest11"
},
"html_url": "https:\/\/github.com\/vntest11\/confluence_CVE-2019-3396",
"description": " Confluence Widget Connector path traversal (CVE-2019-3396)",
"fork": false,
"created_at": "2019-04-28T05:59:21Z",
"updated_at": "2019-04-28T06:40:38Z",
"pushed_at": "2019-04-28T06:40:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 194643451,
"name": "test1",

View file

@ -1,48 +0,0 @@
[
{
"id": 167275161,
"name": "check_CVE-2019-3462",
"full_name": "tonejito\/check_CVE-2019-3462",
"owner": {
"login": "tonejito",
"id": 618588,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/618588?v=4",
"html_url": "https:\/\/github.com\/tonejito"
},
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
"fork": false,
"created_at": "2019-01-24T00:30:15Z",
"updated_at": "2019-01-26T01:21:38Z",
"pushed_at": "2019-01-26T01:21:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 170573944,
"name": "update-apt-package",
"full_name": "atilacastro\/update-apt-package",
"owner": {
"login": "atilacastro",
"id": 5832809,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5832809?v=4",
"html_url": "https:\/\/github.com\/atilacastro"
},
"html_url": "https:\/\/github.com\/atilacastro\/update-apt-package",
"description": "Playbook update APT package because CVE-2019-3462",
"fork": false,
"created_at": "2019-02-13T20:22:33Z",
"updated_at": "2019-02-14T18:31:31Z",
"pushed_at": "2019-02-14T18:31:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 184369823,
"name": "CVE-2019-3719",
"full_name": "jiansiting\/CVE-2019-3719",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-3719",
"description": null,
"fork": false,
"created_at": "2019-05-01T04:43:55Z",
"updated_at": "2019-06-02T04:14:24Z",
"pushed_at": "2019-05-01T04:50:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 181969843,
"name": "CVE-2019-3799",
"full_name": "mpgn\/CVE-2019-3799",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-3799",
"description": "CVE-2019-3799 - Spring Cloud Config Server: Directory Traversal < 2.1.2, 2.0.4, 1.4.6",
"fork": false,
"created_at": "2019-04-17T21:19:32Z",
"updated_at": "2020-04-05T17:18:25Z",
"pushed_at": "2019-04-18T10:08:12Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 4,
"forks": 4,
"watchers": 29,
"score": 0
}
]

View file

@ -1,73 +1,4 @@
[
{
"id": 175966226,
"name": "CVE-2019-5418",
"full_name": "mpgn\/CVE-2019-5418",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-5418",
"description": "CVE-2019-5418 - File Content Disclosure on Ruby on Rails",
"fork": false,
"created_at": "2019-03-16T11:58:18Z",
"updated_at": "2020-05-22T22:08:44Z",
"pushed_at": "2019-03-25T07:19:58Z",
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 15,
"forks": 15,
"watchers": 155,
"score": 0
},
{
"id": 176323109,
"name": "CVE-2019-5418",
"full_name": "omarkurt\/CVE-2019-5418",
"owner": {
"login": "omarkurt",
"id": 1712468,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1712468?v=4",
"html_url": "https:\/\/github.com\/omarkurt"
},
"html_url": "https:\/\/github.com\/omarkurt\/CVE-2019-5418",
"description": "File Content Disclosure on Rails Test Case - CVE-2019-5418",
"fork": false,
"created_at": "2019-03-18T16:09:13Z",
"updated_at": "2020-04-17T21:45:45Z",
"pushed_at": "2019-03-18T16:15:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 176545257,
"name": "CVE-2019-5418-Scanner",
"full_name": "brompwnie\/CVE-2019-5418-Scanner",
"owner": {
"login": "brompwnie",
"id": 8638589,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8638589?v=4",
"html_url": "https:\/\/github.com\/brompwnie"
},
"html_url": "https:\/\/github.com\/brompwnie\/CVE-2019-5418-Scanner",
"description": "A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418",
"fork": false,
"created_at": "2019-03-19T15:38:01Z",
"updated_at": "2020-04-13T06:13:20Z",
"pushed_at": "2019-03-21T17:26:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 14,
"forks": 14,
"watchers": 30,
"score": 0
},
{
"id": 177236589,
"name": "Rails-doubletap-RCE",
@ -91,52 +22,6 @@
"watchers": 99,
"score": 0
},
{
"id": 178527770,
"name": "CVE-2019-5418",
"full_name": "takeokunn\/CVE-2019-5418",
"owner": {
"login": "takeokunn",
"id": 11222510,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11222510?v=4",
"html_url": "https:\/\/github.com\/takeokunn"
},
"html_url": "https:\/\/github.com\/takeokunn\/CVE-2019-5418",
"description": null,
"fork": false,
"created_at": "2019-03-30T07:40:11Z",
"updated_at": "2019-10-24T19:07:56Z",
"pushed_at": "2019-03-30T07:54:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 178909066,
"name": "RailroadBandit",
"full_name": "Bad3r\/RailroadBandit",
"owner": {
"login": "Bad3r",
"id": 25513724,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25513724?v=4",
"html_url": "https:\/\/github.com\/Bad3r"
},
"html_url": "https:\/\/github.com\/Bad3r\/RailroadBandit",
"description": "a demo for Ruby on Rails CVE-2019-5418",
"fork": false,
"created_at": "2019-04-01T17:02:57Z",
"updated_at": "2019-04-11T22:45:53Z",
"pushed_at": "2019-04-11T22:45:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 212888337,
"name": "CVE-2019-5418-Rails3",

View file

@ -1,48 +0,0 @@
[
{
"id": 176976251,
"name": "CVE-2019-5420",
"full_name": "knqyf263\/CVE-2019-5420",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-5420",
"description": "CVE-2019-5420 (Ruby on Rails)",
"fork": false,
"created_at": "2019-03-21T15:42:54Z",
"updated_at": "2020-05-12T03:18:30Z",
"pushed_at": "2019-03-21T23:52:48Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
},
{
"id": 178050921,
"name": "cve-2019-5420",
"full_name": "cved-sources\/cve-2019-5420",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-5420",
"description": "cve-2019-5420",
"fork": false,
"created_at": "2019-03-27T18:16:46Z",
"updated_at": "2019-03-27T18:17:07Z",
"pushed_at": "2019-03-27T18:17:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 184600046,
"name": "CVE-2019-5624",
"full_name": "VoidSec\/CVE-2019-5624",
"owner": {
"login": "VoidSec",
"id": 5717603,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5717603?v=4",
"html_url": "https:\/\/github.com\/VoidSec"
},
"html_url": "https:\/\/github.com\/VoidSec\/CVE-2019-5624",
"description": "A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE) ",
"fork": false,
"created_at": "2019-05-02T14:54:08Z",
"updated_at": "2020-04-06T18:19:09Z",
"pushed_at": "2019-05-02T15:15:51Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 6,
"forks": 6,
"watchers": 12,
"score": 0
}
]

View file

@ -1,165 +1,4 @@
[
{
"id": 170398859,
"name": "cve-2019-5736-poc",
"full_name": "q3k\/cve-2019-5736-poc",
"owner": {
"login": "q3k",
"id": 315234,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/315234?v=4",
"html_url": "https:\/\/github.com\/q3k"
},
"html_url": "https:\/\/github.com\/q3k\/cve-2019-5736-poc",
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2020-04-06T10:46:09Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 61,
"forks": 61,
"watchers": 179,
"score": 0
},
{
"id": 170445833,
"name": "CVE-2019-5736-PoC",
"full_name": "Frichetten\/CVE-2019-5736-PoC",
"owner": {
"login": "Frichetten",
"id": 10386884,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10386884?v=4",
"html_url": "https:\/\/github.com\/Frichetten"
},
"html_url": "https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC",
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2020-05-24T03:36:31Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 386,
"watchers_count": 386,
"forks_count": 97,
"forks": 97,
"watchers": 386,
"score": 0
},
{
"id": 170613828,
"name": "CVE-2019-5736",
"full_name": "jas502n\/CVE-2019-5736",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-5736",
"description": "runc容器逃逸漏洞预警",
"fork": false,
"created_at": "2019-02-14T02:30:12Z",
"updated_at": "2020-02-03T01:45:33Z",
"pushed_at": "2019-02-14T02:40:55Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"score": 0
},
{
"id": 170656576,
"name": "CVE-2019-5736",
"full_name": "denmilu\/CVE-2019-5736",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/denmilu"
},
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-02-14T08:37:25Z",
"updated_at": "2019-02-14T08:37:36Z",
"pushed_at": "2019-02-14T08:37:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170656601,
"name": "cve-2019-5736-poc",
"full_name": "denmilu\/cve-2019-5736-poc",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/denmilu"
},
"html_url": "https:\/\/github.com\/denmilu\/cve-2019-5736-poc",
"description": null,
"fork": false,
"created_at": "2019-02-14T08:37:39Z",
"updated_at": "2019-02-14T08:37:49Z",
"pushed_at": "2019-02-14T08:37:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170836971,
"name": "cve-2019-5736-poc",
"full_name": "agppp\/cve-2019-5736-poc",
"owner": {
"login": "agppp",
"id": 10527860,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10527860?v=4",
"html_url": "https:\/\/github.com\/agppp"
},
"html_url": "https:\/\/github.com\/agppp\/cve-2019-5736-poc",
"description": "getshell test",
"fork": false,
"created_at": "2019-02-15T09:22:27Z",
"updated_at": "2019-02-15T09:49:47Z",
"pushed_at": "2019-02-15T09:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 171499608,
"name": "poc-cve-2019-5736",
"full_name": "ebdecastro\/poc-cve-2019-5736",
"owner": {
"login": "ebdecastro",
"id": 46558799,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46558799?v=4",
"html_url": "https:\/\/github.com\/ebdecastro"
},
"html_url": "https:\/\/github.com\/ebdecastro\/poc-cve-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-02-19T15:34:18Z",
"updated_at": "2019-06-04T10:53:26Z",
"pushed_at": "2019-02-19T15:37:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 171668415,
"name": "RunC-CVE-2019-5736",
@ -183,144 +22,6 @@
"watchers": 44,
"score": 0
},
{
"id": 172158413,
"name": "CVE-2019-5736-PoC",
"full_name": "kazu-onis\/CVE-2019-5736-PoC",
"owner": {
"login": "kazu-onis",
"id": 41312202,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41312202?v=4",
"html_url": "https:\/\/github.com\/kazu-onis"
},
"html_url": "https:\/\/github.com\/kazu-onis\/CVE-2019-5736-PoC",
"description": null,
"fork": false,
"created_at": "2019-02-23T01:45:26Z",
"updated_at": "2019-09-25T11:24:16Z",
"pushed_at": "2019-02-23T13:20:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 172198595,
"name": "CVE-2019-5736-PoC-0",
"full_name": "kazu-onis\/CVE-2019-5736-PoC-0",
"owner": {
"login": "kazu-onis",
"id": 41312202,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41312202?v=4",
"html_url": "https:\/\/github.com\/kazu-onis"
},
"html_url": "https:\/\/github.com\/kazu-onis\/CVE-2019-5736-PoC-0",
"description": null,
"fork": false,
"created_at": "2019-02-23T09:59:21Z",
"updated_at": "2019-02-23T09:59:53Z",
"pushed_at": "2019-02-23T09:59:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 174545720,
"name": "CVE-2019-5736-PoC",
"full_name": "zyriuse75\/CVE-2019-5736-PoC",
"owner": {
"login": "zyriuse75",
"id": 225690,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/225690?v=4",
"html_url": "https:\/\/github.com\/zyriuse75"
},
"html_url": "https:\/\/github.com\/zyriuse75\/CVE-2019-5736-PoC",
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5736 poc of CVE-2019-5736 ",
"fork": false,
"created_at": "2019-03-08T13:50:57Z",
"updated_at": "2019-03-08T13:50:59Z",
"pushed_at": "2019-03-08T13:50:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 177891884,
"name": "CVE-2019-5736",
"full_name": "stillan00b\/CVE-2019-5736",
"owner": {
"login": "stillan00b",
"id": 48630837,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/48630837?v=4",
"html_url": "https:\/\/github.com\/stillan00b"
},
"html_url": "https:\/\/github.com\/stillan00b\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-03-27T00:52:49Z",
"updated_at": "2019-03-27T01:05:08Z",
"pushed_at": "2019-03-27T01:05:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 181238407,
"name": "cve-2019-5736-exp",
"full_name": "milloni\/cve-2019-5736-exp",
"owner": {
"login": "milloni",
"id": 2845035,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2845035?v=4",
"html_url": "https:\/\/github.com\/milloni"
},
"html_url": "https:\/\/github.com\/milloni\/cve-2019-5736-exp",
"description": "Exploit for CVE-2019-5736 runc vulnerability",
"fork": false,
"created_at": "2019-04-13T23:18:54Z",
"updated_at": "2019-04-16T18:18:42Z",
"pushed_at": "2019-04-14T21:39:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 185733954,
"name": "Docker-Runc-Exploit",
"full_name": "13paulmurith\/Docker-Runc-Exploit",
"owner": {
"login": "13paulmurith",
"id": 26403285,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26403285?v=4",
"html_url": "https:\/\/github.com\/13paulmurith"
},
"html_url": "https:\/\/github.com\/13paulmurith\/Docker-Runc-Exploit",
"description": "Docker runc CVE-2019-5736 exploit Dockerfile. Credits : https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC.git",
"fork": false,
"created_at": "2019-05-09T05:45:21Z",
"updated_at": "2019-05-09T05:47:46Z",
"pushed_at": "2019-05-09T05:47:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 194520468,
"name": "CVE-2019-5736-POC",

View file

@ -1,25 +0,0 @@
[
{
"id": 172282648,
"name": "cve-2019-5737",
"full_name": "beelzebruh\/cve-2019-5737",
"owner": {
"login": "beelzebruh",
"id": 39379168,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39379168?v=4",
"html_url": "https:\/\/github.com\/beelzebruh"
},
"html_url": "https:\/\/github.com\/beelzebruh\/cve-2019-5737",
"description": null,
"fork": false,
"created_at": "2019-02-24T01:20:04Z",
"updated_at": "2020-05-12T03:29:52Z",
"pushed_at": "2019-02-24T03:43:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 176796740,
"name": "CVE-2019-5786",
"full_name": "exodusintel\/CVE-2019-5786",
"owner": {
"login": "exodusintel",
"id": 16653014,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16653014?v=4",
"html_url": "https:\/\/github.com\/exodusintel"
},
"html_url": "https:\/\/github.com\/exodusintel\/CVE-2019-5786",
"description": "FileReader Exploit",
"fork": false,
"created_at": "2019-03-20T18:43:49Z",
"updated_at": "2020-05-29T06:06:41Z",
"pushed_at": "2019-03-20T18:47:25Z",
"stargazers_count": 246,
"watchers_count": 246,
"forks_count": 83,
"forks": 83,
"watchers": 246,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 165075365,
"name": "OpenSource-ERP-SQL-Injection",
"full_name": "EmreOvunc\/OpenSource-ERP-SQL-Injection",
"owner": {
"login": "EmreOvunc",
"id": 15659223,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
"html_url": "https:\/\/github.com\/EmreOvunc"
},
"html_url": "https:\/\/github.com\/EmreOvunc\/OpenSource-ERP-SQL-Injection",
"description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.",
"fork": false,
"created_at": "2019-01-10T14:36:55Z",
"updated_at": "2020-05-16T12:47:44Z",
"pushed_at": "2019-01-11T07:45:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 185970201,
"name": "CVE-2019-6203-PoC",
"full_name": "qingxp9\/CVE-2019-6203-PoC",
"owner": {
"login": "qingxp9",
"id": 2822242,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2822242?v=4",
"html_url": "https:\/\/github.com\/qingxp9"
},
"html_url": "https:\/\/github.com\/qingxp9\/CVE-2019-6203-PoC",
"description": "PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4",
"fork": false,
"created_at": "2019-05-10T10:36:54Z",
"updated_at": "2019-10-28T14:36:37Z",
"pushed_at": "2019-05-17T03:10:30Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 11,
"forks": 11,
"watchers": 27,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 187157796,
"name": "CVE-2019-6207",
"full_name": "dothanthitiendiettiende\/CVE-2019-6207",
"owner": {
"login": "dothanthitiendiettiende",
"id": 29480786,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29480786?v=4",
"html_url": "https:\/\/github.com\/dothanthitiendiettiende"
},
"html_url": "https:\/\/github.com\/dothanthitiendiettiende\/CVE-2019-6207",
"description": "getdirentriesattr kernel heap inofo leak",
"fork": false,
"created_at": "2019-05-17T06:17:51Z",
"updated_at": "2019-05-17T06:29:13Z",
"pushed_at": "2019-05-17T06:17:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 187160556,
"name": "CVE-2019-6207",

View file

@ -1,27 +1,4 @@
[
{
"id": 168440280,
"name": "OsirisJailbreak12",
"full_name": "fatgrass\/OsirisJailbreak12",
"owner": {
"login": "fatgrass",
"id": 19977419,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19977419?v=4",
"html_url": "https:\/\/github.com\/fatgrass"
},
"html_url": "https:\/\/github.com\/fatgrass\/OsirisJailbreak12",
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
"fork": false,
"created_at": "2019-01-31T01:03:43Z",
"updated_at": "2020-04-08T17:22:51Z",
"pushed_at": "2019-01-31T00:53:03Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 74,
"forks": 74,
"watchers": 9,
"score": 0
},
{
"id": 194542840,
"name": "CVE-2019-6225-macOS",
@ -44,28 +21,5 @@
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 201224192,
"name": "jailbreak-iOS12",
"full_name": "raystyle\/jailbreak-iOS12",
"owner": {
"login": "raystyle",
"id": 3284570,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3284570?v=4",
"html_url": "https:\/\/github.com\/raystyle"
},
"html_url": "https:\/\/github.com\/raystyle\/jailbreak-iOS12",
"description": "OS 12.0 & 12.1.2 - Jailbreak with CVE-2019-6225",
"fork": false,
"created_at": "2019-08-08T09:22:57Z",
"updated_at": "2019-09-28T04:38:14Z",
"pushed_at": "2019-02-27T12:57:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 171827364,
"name": "CVE-2019-6249_Hucart-cms",
"full_name": "NMTech0x90\/CVE-2019-6249_Hucart-cms",
"owner": {
"login": "NMTech0x90",
"id": 27001865,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/27001865?v=4",
"html_url": "https:\/\/github.com\/NMTech0x90"
},
"html_url": "https:\/\/github.com\/NMTech0x90\/CVE-2019-6249_Hucart-cms",
"description": "CVE-2019-6249 Hucart cms 复现环境",
"fork": false,
"created_at": "2019-02-21T08:03:43Z",
"updated_at": "2020-03-25T03:29:55Z",
"pushed_at": "2019-02-21T08:22:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 171957315,
"name": "cve-2019-6260",
"full_name": "amboar\/cve-2019-6260",
"owner": {
"login": "amboar",
"id": 526481,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/526481?v=4",
"html_url": "https:\/\/github.com\/amboar"
},
"html_url": "https:\/\/github.com\/amboar\/cve-2019-6260",
"description": "A Test and Debug Tool for ASPEED BMC AHB Interfaces",
"fork": false,
"created_at": "2019-02-21T22:49:53Z",
"updated_at": "2019-05-30T02:20:23Z",
"pushed_at": "2019-05-30T02:20:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 166368513,
"name": "CVE-2019-6263-Joomla-POC",
"full_name": "praveensutar\/CVE-2019-6263-Joomla-POC",
"owner": {
"login": "praveensutar",
"id": 12555214,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12555214?v=4",
"html_url": "https:\/\/github.com\/praveensutar"
},
"html_url": "https:\/\/github.com\/praveensutar\/CVE-2019-6263-Joomla-POC",
"description": null,
"fork": false,
"created_at": "2019-01-18T08:10:11Z",
"updated_at": "2019-09-12T15:02:55Z",
"pushed_at": "2019-01-19T04:29:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
}
]

View file

@ -1,163 +0,0 @@
[
{
"id": 172094613,
"name": "Drupal-SA-CORE-2019-003",
"full_name": "g0rx\/Drupal-SA-CORE-2019-003",
"owner": {
"login": "g0rx",
"id": 10961397,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10961397?v=4",
"html_url": "https:\/\/github.com\/g0rx"
},
"html_url": "https:\/\/github.com\/g0rx\/Drupal-SA-CORE-2019-003",
"description": "CVE-2019-6340-Drupal SA-CORE-2019-003",
"fork": false,
"created_at": "2019-02-22T16:03:40Z",
"updated_at": "2020-05-23T11:09:04Z",
"pushed_at": "2019-02-24T18:43:05Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 9,
"forks": 9,
"watchers": 30,
"score": 0
},
{
"id": 172217636,
"name": "CVE-2019-6340",
"full_name": "knqyf263\/CVE-2019-6340",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-6340",
"description": "Environment for CVE-2019-6340 (Drupal)",
"fork": false,
"created_at": "2019-02-23T13:28:58Z",
"updated_at": "2020-04-02T13:09:08Z",
"pushed_at": "2019-02-23T17:34:19Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 10,
"forks": 10,
"watchers": 41,
"score": 0
},
{
"id": 172429144,
"name": "CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"full_name": "DevDungeon\/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"owner": {
"login": "DevDungeon",
"id": 16630634,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16630634?v=4",
"html_url": "https:\/\/github.com\/DevDungeon"
},
"html_url": "https:\/\/github.com\/DevDungeon\/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"description": "CVE-2019-6340 Drupal 8.6.9 REST Auth Bypass examples",
"fork": false,
"created_at": "2019-02-25T03:38:47Z",
"updated_at": "2020-05-30T04:32:25Z",
"pushed_at": "2019-02-25T03:47:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 6,
"forks": 6,
"watchers": 3,
"score": 0
},
{
"id": 172458734,
"name": "CVE-2019-6340",
"full_name": "oways\/CVE-2019-6340",
"owner": {
"login": "oways",
"id": 11142952,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11142952?v=4",
"html_url": "https:\/\/github.com\/oways"
},
"html_url": "https:\/\/github.com\/oways\/CVE-2019-6340",
"description": "CVE-2019-6340 POC Drupal rce",
"fork": false,
"created_at": "2019-02-25T07:47:16Z",
"updated_at": "2020-04-02T11:50:43Z",
"pushed_at": "2019-02-25T08:57:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"forks": 5,
"watchers": 12,
"score": 0
},
{
"id": 172766416,
"name": "cve-2019-6340",
"full_name": "cved-sources\/cve-2019-6340",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-6340",
"description": "cve-2019-6340",
"fork": false,
"created_at": "2019-02-26T18:26:50Z",
"updated_at": "2020-04-02T13:08:58Z",
"pushed_at": "2019-02-26T18:38:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 175109773,
"name": "cve-2019-6340-bits",
"full_name": "d1vious\/cve-2019-6340-bits",
"owner": {
"login": "d1vious",
"id": 1476868,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1476868?v=4",
"html_url": "https:\/\/github.com\/d1vious"
},
"html_url": "https:\/\/github.com\/d1vious\/cve-2019-6340-bits",
"description": "Bits generated while analyzing CVE-2019-6340 Drupal RESTful RCE",
"fork": false,
"created_at": "2019-03-12T01:13:56Z",
"updated_at": "2019-04-15T07:13:03Z",
"pushed_at": "2019-03-12T01:41:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 188896047,
"name": "CVE-2019-6340",
"full_name": "jas502n\/CVE-2019-6340",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-6340",
"description": "Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340",
"fork": false,
"created_at": "2019-05-27T19:06:14Z",
"updated_at": "2020-03-20T09:15:19Z",
"pushed_at": "2019-05-28T02:55:03Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 17,
"forks": 17,
"watchers": 62,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 170884262,
"name": "CVE-2019-6440",
"full_name": "hexnone\/CVE-2019-6440",
"owner": {
"login": "hexnone",
"id": 17256467,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17256467?v=4",
"html_url": "https:\/\/github.com\/hexnone"
},
"html_url": "https:\/\/github.com\/hexnone\/CVE-2019-6440",
"description": "CVE-2019-6440. Zemana RCE and privilege escalation.",
"fork": false,
"created_at": "2019-02-15T15:15:52Z",
"updated_at": "2019-03-22T18:53:26Z",
"pushed_at": "2019-03-22T18:53:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 186728497,
"name": "CVE-2019-6446",
"full_name": "RayScri\/CVE-2019-6446",
"owner": {
"login": "RayScri",
"id": 49472130,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/49472130?v=4",
"html_url": "https:\/\/github.com\/RayScri"
},
"html_url": "https:\/\/github.com\/RayScri\/CVE-2019-6446",
"description": "Numpy deserialization command execution",
"fork": false,
"created_at": "2019-05-15T01:39:53Z",
"updated_at": "2020-05-08T12:12:22Z",
"pushed_at": "2019-05-15T02:22:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 164948400,
"name": "ESFileExplorerOpenPortVuln",
"full_name": "fs0c131y\/ESFileExplorerOpenPortVuln",
"owner": {
"login": "fs0c131y",
"id": 36547191,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36547191?v=4",
"html_url": "https:\/\/github.com\/fs0c131y"
},
"html_url": "https:\/\/github.com\/fs0c131y\/ESFileExplorerOpenPortVuln",
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2020-05-27T03:00:08Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 577,
"watchers_count": 577,
"forks_count": 129,
"forks": 129,
"watchers": 577,
"score": 0
},
{
"id": 263921419,
"name": "ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447",

View file

@ -1,27 +1,4 @@
[
{
"id": 171244957,
"name": "cve-2019-6453-poc",
"full_name": "proofofcalc\/cve-2019-6453-poc",
"owner": {
"login": "proofofcalc",
"id": 47607270,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/47607270?v=4",
"html_url": "https:\/\/github.com\/proofofcalc"
},
"html_url": "https:\/\/github.com\/proofofcalc\/cve-2019-6453-poc",
"description": "Proof of calc for CVE-2019-6453",
"fork": false,
"created_at": "2019-02-18T08:35:03Z",
"updated_at": "2020-05-29T08:59:39Z",
"pushed_at": "2019-02-18T13:10:38Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 13,
"forks": 13,
"watchers": 49,
"score": 0
},
{
"id": 197653851,
"name": "mIRC-CVE-2019-6453",

View file

@ -1,25 +0,0 @@
[
{
"id": 183349186,
"name": "CVE-2019-6467",
"full_name": "knqyf263\/CVE-2019-6467",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-6467",
"description": "CVE-2019-6467 (BIND nxdomain-redirect)",
"fork": false,
"created_at": "2019-04-25T03:26:42Z",
"updated_at": "2020-03-20T08:40:22Z",
"pushed_at": "2019-04-25T04:06:48Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 4,
"forks": 4,
"watchers": 25,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 166241615,
"name": "TP-Link-WDR-Router-Command-injection_POC",
"full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"owner": {
"login": "afang5472",
"id": 18503100,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18503100?v=4",
"html_url": "https:\/\/github.com\/afang5472"
},
"html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.",
"fork": false,
"created_at": "2019-01-17T14:44:12Z",
"updated_at": "2020-04-03T02:02:44Z",
"pushed_at": "2019-01-19T10:49:21Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 12,
"forks": 12,
"watchers": 22,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 179225702,
"name": "CVE-2019-6690",
"full_name": "brianwrf\/CVE-2019-6690",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2019-6690",
"description": "It is a simple PoC of Improper Input Validation in python-gnupg 0.4.3 (CVE-2019-6690).",
"fork": false,
"created_at": "2019-04-03T06:34:48Z",
"updated_at": "2019-04-08T14:49:17Z",
"pushed_at": "2019-04-03T07:57:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 168365175,
"name": "CVE-2019-7216",
"full_name": "Ekultek\/CVE-2019-7216",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/CVE-2019-7216",
"description": "Filechucker filter bypass Proof Of Concept",
"fork": false,
"created_at": "2019-01-30T15:23:40Z",
"updated_at": "2020-03-30T04:22:37Z",
"pushed_at": "2019-02-01T16:56:53Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 170672635,
"name": "CVE-2019-7219",
"full_name": "verifysecurity\/CVE-2019-7219",
"owner": {
"login": "verifysecurity",
"id": 17159314,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/17159314?v=4",
"html_url": "https:\/\/github.com\/verifysecurity"
},
"html_url": "https:\/\/github.com\/verifysecurity\/CVE-2019-7219",
"description": "CVE-2019-7219",
"fork": false,
"created_at": "2019-02-14T10:24:48Z",
"updated_at": "2019-04-12T19:30:42Z",
"pushed_at": "2019-04-12T19:30:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 172401532,
"name": "CVE-2019-7238",
"full_name": "mpgn\/CVE-2019-7238",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-7238",
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2020-05-20T14:40:15Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 41,
"forks": 41,
"watchers": 127,
"score": 0
},
{
"id": 187840869,
"name": "CVE-2019-7238",

View file

@ -1,48 +0,0 @@
[
{
"id": 170261590,
"name": "dirty_sock",
"full_name": "initstring\/dirty_sock",
"owner": {
"login": "initstring",
"id": 26131150,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/26131150?v=4",
"html_url": "https:\/\/github.com\/initstring"
},
"html_url": "https:\/\/github.com\/initstring\/dirty_sock",
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2020-05-29T02:26:54Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 510,
"watchers_count": 510,
"forks_count": 106,
"forks": 106,
"watchers": 510,
"score": 0
},
{
"id": 170741210,
"name": "CVE-2019-7304_DirtySock",
"full_name": "SecuritySi\/CVE-2019-7304_DirtySock",
"owner": {
"login": "SecuritySi",
"id": 7517443,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7517443?v=4",
"html_url": "https:\/\/github.com\/SecuritySi"
},
"html_url": "https:\/\/github.com\/SecuritySi\/CVE-2019-7304_DirtySock",
"description": "Payload Generator",
"fork": false,
"created_at": "2019-02-14T18:48:56Z",
"updated_at": "2019-03-05T06:03:09Z",
"pushed_at": "2019-02-14T18:49:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 173723117,
"name": "CVE-2019-7642",
"full_name": "xw77cve\/CVE-2019-7642",
"owner": {
"login": "xw77cve",
"id": 48202281,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48202281?v=4",
"html_url": "https:\/\/github.com\/xw77cve"
},
"html_url": "https:\/\/github.com\/xw77cve\/CVE-2019-7642",
"description": null,
"fork": false,
"created_at": "2019-03-04T10:24:04Z",
"updated_at": "2019-10-04T12:40:46Z",
"pushed_at": "2019-03-04T11:04:30Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 1,
"forks": 1,
"watchers": 15,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 171097356,
"name": "CVE-2019-8389",
"full_name": "shawarkhanethicalhacker\/CVE-2019-8389",
"owner": {
"login": "shawarkhanethicalhacker",
"id": 41706151,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/41706151?v=4",
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker"
},
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker\/CVE-2019-8389",
"description": " [CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application ",
"fork": false,
"created_at": "2019-02-17T08:10:50Z",
"updated_at": "2019-12-06T13:47:51Z",
"pushed_at": "2019-02-17T08:40:06Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187144564,
"name": "CVE-2019-8540",
"full_name": "maldiohead\/CVE-2019-8540",
"owner": {
"login": "maldiohead",
"id": 23315692,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23315692?v=4",
"html_url": "https:\/\/github.com\/maldiohead"
},
"html_url": "https:\/\/github.com\/maldiohead\/CVE-2019-8540",
"description": "Kernel Stack info leak at exportObjectToClient function",
"fork": false,
"created_at": "2019-05-17T04:07:14Z",
"updated_at": "2019-09-14T06:35:22Z",
"pushed_at": "2019-05-21T08:32:39Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 15,
"forks": 15,
"watchers": 33,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187134540,
"name": "CVE-2019-8627",
"full_name": "maldiohead\/CVE-2019-8627",
"owner": {
"login": "maldiohead",
"id": 23315692,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23315692?v=4",
"html_url": "https:\/\/github.com\/maldiohead"
},
"html_url": "https:\/\/github.com\/maldiohead\/CVE-2019-8627",
"description": "a kernel information leak on macOS<= 10.14.4",
"fork": false,
"created_at": "2019-05-17T02:40:39Z",
"updated_at": "2019-10-30T05:52:25Z",
"pushed_at": "2019-05-24T08:44:05Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 172448763,
"name": "WordPress_4.9.8_RCE_POC",
"full_name": "brianwrf\/WordPress_4.9.8_RCE_POC",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/WordPress_4.9.8_RCE_POC",
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
"fork": false,
"created_at": "2019-02-25T06:38:15Z",
"updated_at": "2020-05-26T03:14:22Z",
"pushed_at": "2019-03-18T01:20:52Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 17,
"forks": 17,
"watchers": 52,
"score": 0
},
{
"id": 184548123,
"name": "CVE-2019-8942",
"full_name": "synacktiv\/CVE-2019-8942",
"owner": {
"login": "synacktiv",
"id": 50145679,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/50145679?v=4",
"html_url": "https:\/\/github.com\/synacktiv"
},
"html_url": "https:\/\/github.com\/synacktiv\/CVE-2019-8942",
"description": "WordPress crop-image exploitation",
"fork": false,
"created_at": "2019-05-02T08:41:11Z",
"updated_at": "2019-08-28T08:04:32Z",
"pushed_at": "2019-05-02T08:42:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 188973928,
"name": "CVE-2019-8956",
"full_name": "butterflyhack\/CVE-2019-8956",
"owner": {
"login": "butterflyhack",
"id": 11525772,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11525772?v=4",
"html_url": "https:\/\/github.com\/butterflyhack"
},
"html_url": "https:\/\/github.com\/butterflyhack\/CVE-2019-8956",
"description": "sctp-PoC",
"fork": false,
"created_at": "2019-05-28T07:09:17Z",
"updated_at": "2020-04-13T01:07:35Z",
"pushed_at": "2019-05-28T07:15:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 175870177,
"name": "cve-2019-9184",
"full_name": "cved-sources\/cve-2019-9184",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-9184",
"description": "cve-2019-9184",
"fork": false,
"created_at": "2019-03-15T18:12:49Z",
"updated_at": "2019-03-15T18:15:09Z",
"pushed_at": "2019-03-15T18:15:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 175870594,
"name": "cve-2019-9194",
"full_name": "cved-sources\/cve-2019-9194",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-9194",
"description": "cve-2019-9194",
"fork": false,
"created_at": "2019-03-15T18:16:27Z",
"updated_at": "2019-03-15T18:17:32Z",
"pushed_at": "2019-03-15T18:17:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 182127433,
"name": "CVE-2019-9202",
"full_name": "polict\/CVE-2019-9202",
"owner": {
"login": "polict",
"id": 18173936,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18173936?v=4",
"html_url": "https:\/\/github.com\/polict"
},
"html_url": "https:\/\/github.com\/polict\/CVE-2019-9202",
"description": "Nagios IM 2.6 remote code execution exploit: CSRF + SQLi + RCE + LPE --> remote root",
"fork": false,
"created_at": "2019-04-18T17:09:26Z",
"updated_at": "2020-02-05T08:41:23Z",
"pushed_at": "2019-04-18T17:18:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 175478558,
"name": "CVE-2019-9580",
"full_name": "mpgn\/CVE-2019-9580",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-9580",
"description": "CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE",
"fork": false,
"created_at": "2019-03-13T18:37:18Z",
"updated_at": "2020-04-05T17:19:04Z",
"pushed_at": "2019-03-13T19:26:27Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 5,
"forks": 5,
"watchers": 28,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 187840640,
"name": "CVE-2019-9596-and-CVE-2019-9597",
"full_name": "gerwout\/CVE-2019-9596-and-CVE-2019-9597",
"owner": {
"login": "gerwout",
"id": 975427,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/975427?v=4",
"html_url": "https:\/\/github.com\/gerwout"
},
"html_url": "https:\/\/github.com\/gerwout\/CVE-2019-9596-and-CVE-2019-9597",
"description": "Darktrace CSRF exploit ",
"fork": false,
"created_at": "2019-05-21T13:14:43Z",
"updated_at": "2019-05-27T13:32:46Z",
"pushed_at": "2019-05-24T11:49:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 185226722,
"name": "ZimbraExploit",
"full_name": "k8gege\/ZimbraExploit",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/ZimbraExploit",
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
"fork": false,
"created_at": "2019-05-06T15:47:20Z",
"updated_at": "2020-04-25T16:45:14Z",
"pushed_at": "2019-05-08T16:22:58Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 25,
"forks": 25,
"watchers": 46,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 175789235,
"name": "CVE-2019-9653",
"full_name": "grayoneday\/CVE-2019-9653",
"owner": {
"login": "grayoneday",
"id": 28929076,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28929076?v=4",
"html_url": "https:\/\/github.com\/grayoneday"
},
"html_url": "https:\/\/github.com\/grayoneday\/CVE-2019-9653",
"description": null,
"fork": false,
"created_at": "2019-03-15T09:27:15Z",
"updated_at": "2019-03-15T09:32:42Z",
"pushed_at": "2019-03-15T09:32:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 175058439,
"name": "CVE-2019-9673",
"full_name": "mgrube\/CVE-2019-9673",
"owner": {
"login": "mgrube",
"id": 90159,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/90159?v=4",
"html_url": "https:\/\/github.com\/mgrube"
},
"html_url": "https:\/\/github.com\/mgrube\/CVE-2019-9673",
"description": "Writeup",
"fork": false,
"created_at": "2019-03-11T18:16:15Z",
"updated_at": "2019-08-08T16:04:30Z",
"pushed_at": "2019-03-24T08:21:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 175226868,
"name": "SdoKeyCrypt-sys-local-privilege-elevation",
"full_name": "HyperSine\/SdoKeyCrypt-sys-local-privilege-elevation",
"owner": {
"login": "HyperSine",
"id": 58699351,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/58699351?v=4",
"html_url": "https:\/\/github.com\/HyperSine"
},
"html_url": "https:\/\/github.com\/HyperSine\/SdoKeyCrypt-sys-local-privilege-elevation",
"description": "CVE-2019-9729. Transferred from https:\/\/github.com\/DoubleLabyrinth\/SdoKeyCrypt-sys-local-privilege-elevation",
"fork": false,
"created_at": "2019-03-12T14:18:20Z",
"updated_at": "2020-05-31T02:35:38Z",
"pushed_at": "2019-03-13T01:24:21Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 26,
"forks": 26,
"watchers": 81,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 181268125,
"name": "CVE-2019-9730",
"full_name": "jthuraisamy\/CVE-2019-9730",
"owner": {
"login": "jthuraisamy",
"id": 5413071,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5413071?v=4",
"html_url": "https:\/\/github.com\/jthuraisamy"
},
"html_url": "https:\/\/github.com\/jthuraisamy\/CVE-2019-9730",
"description": "Synaptics Audio Driver LPE",
"fork": false,
"created_at": "2019-04-14T06:16:34Z",
"updated_at": "2020-05-19T07:47:25Z",
"pushed_at": "2019-04-15T11:17:39Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 10,
"forks": 10,
"watchers": 29,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 181409411,
"name": "cve-2019-9787_csrf_poc",
"full_name": "rkatogit\/cve-2019-9787_csrf_poc",
"owner": {
"login": "rkatogit",
"id": 40052696,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40052696?v=4",
"html_url": "https:\/\/github.com\/rkatogit"
},
"html_url": "https:\/\/github.com\/rkatogit\/cve-2019-9787_csrf_poc",
"description": null,
"fork": false,
"created_at": "2019-04-15T03:59:44Z",
"updated_at": "2020-05-17T21:18:04Z",
"pushed_at": "2019-04-15T04:13:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 202961104,
"name": "CodePath_Week_7-8",

View file

@ -1,27 +1,4 @@
[
{
"id": 177500802,
"name": "CVE-2019-9810-PoC",
"full_name": "xuechiyaobai\/CVE-2019-9810-PoC",
"owner": {
"login": "xuechiyaobai",
"id": 8443947,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8443947?v=4",
"html_url": "https:\/\/github.com\/xuechiyaobai"
},
"html_url": "https:\/\/github.com\/xuechiyaobai\/CVE-2019-9810-PoC",
"description": "Array.prototype.slice wrong alias information.",
"fork": false,
"created_at": "2019-03-25T02:33:18Z",
"updated_at": "2020-05-17T11:45:11Z",
"pushed_at": "2019-03-25T02:41:43Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 15,
"forks": 15,
"watchers": 69,
"score": 0
},
{
"id": 185060837,
"name": "CVE-2019-9810",

View file

@ -1,25 +0,0 @@
[
{
"id": 186455638,
"name": "vuln-chm-hijack",
"full_name": "yasinyilmaz\/vuln-chm-hijack",
"owner": {
"login": "yasinyilmaz",
"id": 37842751,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37842751?v=4",
"html_url": "https:\/\/github.com\/yasinyilmaz"
},
"html_url": "https:\/\/github.com\/yasinyilmaz\/vuln-chm-hijack",
"description": "Potential malicious code execution via CHM hijacking (CVE-2019-9896)",
"fork": false,
"created_at": "2019-05-13T16:17:06Z",
"updated_at": "2020-03-30T02:07:41Z",
"pushed_at": "2019-05-13T16:30:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 8,
"forks": 8,
"watchers": 5,
"score": 0
}
]

View file

@ -1,94 +0,0 @@
[
{
"id": 177681155,
"name": "CVE-2019-9978",
"full_name": "mpgn\/CVE-2019-9978",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-9978",
"description": "CVE-2019-9978 - RCE on a Wordpress plugin: Social Warfare < 3.5.3",
"fork": false,
"created_at": "2019-03-25T23:38:58Z",
"updated_at": "2020-04-05T17:18:01Z",
"pushed_at": "2019-05-09T13:36:42Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"score": 0
},
{
"id": 184705705,
"name": "CVE-2019-9978",
"full_name": "hash3liZer\/CVE-2019-9978",
"owner": {
"login": "hash3liZer",
"id": 29171692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29171692?v=4",
"html_url": "https:\/\/github.com\/hash3liZer"
},
"html_url": "https:\/\/github.com\/hash3liZer\/CVE-2019-9978",
"description": "CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)",
"fork": false,
"created_at": "2019-05-03T05:57:44Z",
"updated_at": "2020-03-13T16:14:48Z",
"pushed_at": "2019-05-03T06:18:03Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"forks": 4,
"watchers": 9,
"score": 0
},
{
"id": 185125359,
"name": "CVE-2019-9978",
"full_name": "KTN1990\/CVE-2019-9978",
"owner": {
"login": "KTN1990",
"id": 33407405,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33407405?v=4",
"html_url": "https:\/\/github.com\/KTN1990"
},
"html_url": "https:\/\/github.com\/KTN1990\/CVE-2019-9978",
"description": "Wordpress Social Warfare Remote Code Execution (AUTO UPLOAD SHELL)",
"fork": false,
"created_at": "2019-05-06T04:48:43Z",
"updated_at": "2019-08-27T00:27:37Z",
"pushed_at": "2019-05-07T04:46:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 185264593,
"name": "cve-2019-9978",
"full_name": "cved-sources\/cve-2019-9978",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-9978",
"description": "cve-2019-9978",
"fork": false,
"created_at": "2019-05-06T20:11:20Z",
"updated_at": "2019-05-06T20:11:46Z",
"pushed_at": "2019-05-06T20:11:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "SQL Server Reporting Services(CVE-2020-0618)中的RCE",
"fork": false,
"created_at": "2020-02-15T06:40:23Z",
"updated_at": "2020-05-26T11:25:47Z",
"updated_at": "2020-05-31T09:27:09Z",
"pushed_at": "2020-02-15T06:41:54Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 37,
"forks": 37,
"watchers": 177,
"watchers": 178,
"score": 0
},
{

View file

@ -753,8 +753,8 @@
"pushed_at": "2020-03-15T22:20:58Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 13,
"score": 0
},

View file

@ -316,8 +316,8 @@
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 103,
"watchers_count": 103,
"forks_count": 31,
"forks": 31,
"forks_count": 32,
"forks": 32,
"watchers": 103,
"score": 0
},

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-2551",
"fork": false,
"created_at": "2020-02-24T02:36:46Z",
"updated_at": "2020-04-22T05:15:08Z",
"updated_at": "2020-05-31T12:38:32Z",
"pushed_at": "2020-03-22T14:38:19Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2020-05-31T07:53:00Z",
"updated_at": "2020-05-31T13:40:04Z",
"pushed_at": "2020-05-17T12:07:01Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 3,
"forks": 3,
"watchers": 13,
"watchers": 15,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-05-21T10:15:35Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 14,
"score": 0
},
@ -82,13 +82,13 @@
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
"fork": false,
"created_at": "2020-05-21T14:30:46Z",
"updated_at": "2020-05-29T02:54:25Z",
"updated_at": "2020-05-31T10:47:36Z",
"pushed_at": "2020-05-21T15:13:22Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 14,
"forks": 14,
"watchers": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 15,
"forks": 15,
"watchers": 33,
"score": 0
}
]

582
README.md
View file

@ -1169,7 +1169,6 @@ Insufficient validation of environment variables in the telnet client supplied i
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.
</code>
- [mpgn/CVE-2019-0192](https://github.com/mpgn/CVE-2019-0192)
- [Rapidsafeguard/Solr-RCE-CVE-2019-0192](https://github.com/Rapidsafeguard/Solr-RCE-CVE-2019-0192)
### CVE-2019-0193
@ -1178,19 +1177,10 @@ In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's &quot;dataConfig&quot; parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property &quot;enable.dih.dataConfigParam&quot; to true.
</code>
- [xConsoIe/CVE-2019-0193](https://github.com/xConsoIe/CVE-2019-0193)
- [jas502n/CVE-2019-0193](https://github.com/jas502n/CVE-2019-0193)
- [1135/solr_exploit](https://github.com/1135/solr_exploit)
- [jaychouzzk/CVE-2019-0193-exp](https://github.com/jaychouzzk/CVE-2019-0193-exp)
### CVE-2019-0211
<code>
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
</code>
- [ozkanbilge/Apache-Exploit-2019](https://github.com/ozkanbilge/Apache-Exploit-2019)
### CVE-2019-0227
<code>
@ -1206,8 +1196,6 @@ When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in
</code>
- [pyn3rd/CVE-2019-0232](https://github.com/pyn3rd/CVE-2019-0232)
- [jas502n/CVE-2019-0232](https://github.com/jas502n/CVE-2019-0232)
- [CherishHair/CVE-2019-0232-EXP](https://github.com/CherishHair/CVE-2019-0232-EXP)
- [setrus/CVE-2019-0232](https://github.com/setrus/CVE-2019-0232)
### CVE-2019-0539
@ -1224,8 +1212,6 @@ A remote code execution vulnerability exists in the way that the Chakra scriptin
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594.
</code>
- [linhlhq/CVE-2019-0604](https://github.com/linhlhq/CVE-2019-0604)
- [denmilu/CVE-2019-0604_sharepoint_CVE](https://github.com/denmilu/CVE-2019-0604_sharepoint_CVE)
- [k8gege/CVE-2019-0604](https://github.com/k8gege/CVE-2019-0604)
- [m5050/CVE-2019-0604](https://github.com/m5050/CVE-2019-0604)
- [boxhg/CVE-2019-0604](https://github.com/boxhg/CVE-2019-0604)
@ -1252,76 +1238,17 @@ An elevation of privilege vulnerability exists when Microsoft Edge does not prop
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
</code>
- [hook-s3c/CVE-2019-0708-poc](https://github.com/hook-s3c/CVE-2019-0708-poc)
- [SherlockSec/CVE-2019-0708](https://github.com/SherlockSec/CVE-2019-0708)
- [yetiddbb/CVE-2019-0708-PoC](https://github.com/yetiddbb/CVE-2019-0708-PoC)
- [p0p0p0/CVE-2019-0708-exploit](https://github.com/p0p0p0/CVE-2019-0708-exploit)
- [rockmelodies/CVE-2019-0708-Exploit](https://github.com/rockmelodies/CVE-2019-0708-Exploit)
- [matengfei000/CVE-2019-0708](https://github.com/matengfei000/CVE-2019-0708)
- [xiyangzuishuai/Dark-Network-CVE-2019-0708](https://github.com/xiyangzuishuai/Dark-Network-CVE-2019-0708)
- [temp-user-2014/CVE-2019-0708](https://github.com/temp-user-2014/CVE-2019-0708)
- [areusecure/CVE-2019-0708](https://github.com/areusecure/CVE-2019-0708)
- [pry0cc/cve-2019-0708-2](https://github.com/pry0cc/cve-2019-0708-2)
- [sbkcbig/CVE-2019-0708-EXPloit](https://github.com/sbkcbig/CVE-2019-0708-EXPloit)
- [sbkcbig/CVE-2019-0708-EXPloit-3389](https://github.com/sbkcbig/CVE-2019-0708-EXPloit-3389)
- [YSheldon/MS_T120](https://github.com/YSheldon/MS_T120)
- [k8gege/CVE-2019-0708](https://github.com/k8gege/CVE-2019-0708)
- [hotdog777714/RDS_CVE-2019-0708](https://github.com/hotdog777714/RDS_CVE-2019-0708)
- [jiansiting/CVE-2019-0708](https://github.com/jiansiting/CVE-2019-0708)
- [NullByteSuiteDevs/CVE-2019-0708](https://github.com/NullByteSuiteDevs/CVE-2019-0708)
- [heaphopopotamus/CVE-2019-0708](https://github.com/heaphopopotamus/CVE-2019-0708)
- [thugcrowd/CVE-2019-0708](https://github.com/thugcrowd/CVE-2019-0708)
- [omaidf/CVE-2019-0708-PoC](https://github.com/omaidf/CVE-2019-0708-PoC)
- [blacksunwen/CVE-2019-0708](https://github.com/blacksunwen/CVE-2019-0708)
- [infenet/CVE-2019-0708](https://github.com/infenet/CVE-2019-0708)
- [n0auth/CVE-2019-0708](https://github.com/n0auth/CVE-2019-0708)
- [gildaaa/CVE-2019-0708](https://github.com/gildaaa/CVE-2019-0708)
- [sbkcbig/CVE-2019-0708-Poc-exploit](https://github.com/sbkcbig/CVE-2019-0708-Poc-exploit)
- [HackerJ0e/CVE-2019-0708](https://github.com/HackerJ0e/CVE-2019-0708)
- [syriusbughunt/CVE-2019-0708](https://github.com/syriusbughunt/CVE-2019-0708)
- [Barry-McCockiner/CVE-2019-0708](https://github.com/Barry-McCockiner/CVE-2019-0708)
- [ShadowBrokers-ExploitLeak/CVE-2019-0708](https://github.com/ShadowBrokers-ExploitLeak/CVE-2019-0708)
- [shumtheone/CVE-2019-0708](https://github.com/shumtheone/CVE-2019-0708)
- [safly/CVE-2019-0708](https://github.com/safly/CVE-2019-0708)
- [Jaky5155/cve-2019-0708-exp](https://github.com/Jaky5155/cve-2019-0708-exp)
- [fourtwizzy/CVE-2019-0708-Check-Device-Patch-Status](https://github.com/fourtwizzy/CVE-2019-0708-Check-Device-Patch-Status)
- [303sec/CVE-2019-0708](https://github.com/303sec/CVE-2019-0708)
- [f8al/CVE-2019-0708-POC](https://github.com/f8al/CVE-2019-0708-POC)
- [blockchainguard/CVE-2019-0708](https://github.com/blockchainguard/CVE-2019-0708)
- [haoge8090/CVE-2019-0708](https://github.com/haoge8090/CVE-2019-0708)
- [branbot1000/CVE-2019-0708](https://github.com/branbot1000/CVE-2019-0708)
- [yushiro/CVE-2019-0708](https://github.com/yushiro/CVE-2019-0708)
- [bilawalzardaer/CVE-2019-0708](https://github.com/bilawalzardaer/CVE-2019-0708)
- [skyshell20082008/CVE-2019-0708-PoC-Hitting-Path](https://github.com/skyshell20082008/CVE-2019-0708-PoC-Hitting-Path)
- [ttsite/CVE-2019-0708-](https://github.com/ttsite/CVE-2019-0708-)
- [ttsite/CVE-2019-0708](https://github.com/ttsite/CVE-2019-0708)
- [biggerwing/CVE-2019-0708-poc](https://github.com/biggerwing/CVE-2019-0708-poc)
- [n1xbyte/CVE-2019-0708](https://github.com/n1xbyte/CVE-2019-0708)
- [freeide/CVE-2019-0708](https://github.com/freeide/CVE-2019-0708)
- [edvacco/CVE-2019-0708-POC](https://github.com/edvacco/CVE-2019-0708-POC)
- [pry0cc/BlueKeepTracker](https://github.com/pry0cc/BlueKeepTracker)
- [zjw88282740/CVE-2019-0708-win7](https://github.com/zjw88282740/CVE-2019-0708-win7)
- [zerosum0x0/CVE-2019-0708](https://github.com/zerosum0x0/CVE-2019-0708)
- [herhe/CVE-2019-0708poc](https://github.com/herhe/CVE-2019-0708poc)
- [l9c/rdp0708scanner](https://github.com/l9c/rdp0708scanner)
- [major203/cve-2019-0708-scan](https://github.com/major203/cve-2019-0708-scan)
- [SugiB3o/Check-vuln-CVE-2019-0708](https://github.com/SugiB3o/Check-vuln-CVE-2019-0708)
- [gobysec/CVE-2019-0708](https://github.com/gobysec/CVE-2019-0708)
- [adalenv/CVE-2019-0708-Tool](https://github.com/adalenv/CVE-2019-0708-Tool)
- [smallFunction/CVE-2019-0708-POC](https://github.com/smallFunction/CVE-2019-0708-POC)
- [freeide/CVE-2019-0708-PoC-Exploit](https://github.com/freeide/CVE-2019-0708-PoC-Exploit)
- [robertdavidgraham/rdpscan](https://github.com/robertdavidgraham/rdpscan)
- [closethe/CVE-2019-0708-POC](https://github.com/closethe/CVE-2019-0708-POC)
- [krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
- [Rostelecom-CERT/bluekeepscan](https://github.com/Rostelecom-CERT/bluekeepscan)
- [Leoid/CVE-2019-0708](https://github.com/Leoid/CVE-2019-0708)
- [ht0Ruial/CVE-2019-0708Poc-BatchScanning](https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanning)
- [oneoy/BlueKeep](https://github.com/oneoy/BlueKeep)
- [infiniti-team/CVE-2019-0708](https://github.com/infiniti-team/CVE-2019-0708)
- [haishanzheng/CVE-2019-0708-generate-hosts](https://github.com/haishanzheng/CVE-2019-0708-generate-hosts)
- [Ekultek/BlueKeep](https://github.com/Ekultek/BlueKeep)
- [UraSecTeam/CVE-2019-0708](https://github.com/UraSecTeam/CVE-2019-0708)
- [Gh0st0ne/rdpscan-BlueKeep](https://github.com/Gh0st0ne/rdpscan-BlueKeep)
- [algo7/bluekeep_CVE-2019-0708_poc_to_exploit](https://github.com/algo7/bluekeep_CVE-2019-0708_poc_to_exploit)
- [JasonLOU/CVE-2019-0708](https://github.com/JasonLOU/CVE-2019-0708)
- [shun-gg/CVE-2019-0708](https://github.com/shun-gg/CVE-2019-0708)
@ -1374,15 +1301,6 @@ A remote code execution vulnerability exists when Windows Hyper-V on a host serv
</code>
- [YHZX2013/CVE-2019-0709](https://github.com/YHZX2013/CVE-2019-0709)
- [qq431169079/CVE-2019-0709](https://github.com/qq431169079/CVE-2019-0709)
### CVE-2019-0768
<code>
A security feature bypass vulnerability exists when Internet Explorer VBScript execution policy does not properly restrict VBScript under specific conditions, and to allow requests that should otherwise be ignored, aka 'Internet Explorer Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0761.
</code>
- [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit)
### CVE-2019-0785
@ -1392,23 +1310,12 @@ A memory corruption vulnerability exists in the Windows Server DHCP service when
- [Jaky5155/CVE-2019-0785](https://github.com/Jaky5155/CVE-2019-0785)
### CVE-2019-0803
<code>
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859.
</code>
- [ExpLife0011/CVE-2019-0803](https://github.com/ExpLife0011/CVE-2019-0803)
### CVE-2019-0808
<code>
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797.
</code>
- [ze0r/cve-2019-0808-poc](https://github.com/ze0r/cve-2019-0808-poc)
- [rakesh143/CVE-2019-0808](https://github.com/rakesh143/CVE-2019-0808)
- [exodusintel/CVE-2019-0808](https://github.com/exodusintel/CVE-2019-0808)
- [DreamoneOnly/CVE-2019-0808-32-64-exp](https://github.com/DreamoneOnly/CVE-2019-0808-32-64-exp)
### CVE-2019-0841
@ -1417,8 +1324,6 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836.
</code>
- [rogue-kdc/CVE-2019-0841](https://github.com/rogue-kdc/CVE-2019-0841)
- [denmilu/CVE-2019-0841](https://github.com/denmilu/CVE-2019-0841)
- [0x00-0x00/CVE-2019-0841-BYPASS](https://github.com/0x00-0x00/CVE-2019-0841-BYPASS)
### CVE-2019-0859
@ -1453,14 +1358,6 @@ Zoho ManageEngine ServiceDesk 9.3 allows session hijacking and privilege escalat
- [FlameOfIgnis/CVE-2019-10008](https://github.com/FlameOfIgnis/CVE-2019-10008)
### CVE-2019-1002101
<code>
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the users machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the users machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.
</code>
- [brompwnie/CVE-2019-1002101-Helpers](https://github.com/brompwnie/CVE-2019-1002101-Helpers)
### CVE-2019-1003000
<code>
@ -1468,9 +1365,6 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
</code>
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
- [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
### CVE-2019-10086
@ -1567,22 +1461,6 @@ An elevation of privilege vulnerability exists when Windows AppX Deployment Serv
- [0x00-0x00/CVE-2019-1064](https://github.com/0x00-0x00/CVE-2019-1064)
- [attackgithub/CVE-2019-1064](https://github.com/attackgithub/CVE-2019-1064)
### CVE-2019-10678
<code>
Domoticz before 4.10579 neglects to categorize \n and \r as insecure argument options.
</code>
- [cved-sources/cve-2019-10678](https://github.com/cved-sources/cve-2019-10678)
### CVE-2019-10685
<code>
A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Heidelberg Prinect Archiver v2013 release 1.0.
</code>
- [alt3kx/CVE-2019-10685](https://github.com/alt3kx/CVE-2019-10685)
### CVE-2019-1069
<code>
@ -1616,14 +1494,6 @@ A denial of service vulnerability exists when Microsoft Common Object Runtime Li
- [stevenseeley/HowCVE-2019-1083Works](https://github.com/stevenseeley/HowCVE-2019-1083Works)
### CVE-2019-10869
<code>
Path Traversal and Unrestricted File Upload exists in the Ninja Forms plugin before 3.0.23 for WordPress (when the Uploads add-on is activated). This allows an attacker to traverse the file system to access files and execute code via the includes/fields/upload.php (aka upload/submit page) name and tmp_name parameters.
</code>
- [KTN1990/CVE-2019-10869](https://github.com/KTN1990/CVE-2019-10869)
### CVE-2019-10915
<code>
@ -1681,14 +1551,6 @@ A broken access control vulnerability in HG100 firmware versions up to 4.00.06 a
- [tim124058/ASUS-SmartHome-Exploit](https://github.com/tim124058/ASUS-SmartHome-Exploit)
### CVE-2019-11076
<code>
Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthenticated web request.
</code>
- [livehybrid/poc-cribl-rce](https://github.com/livehybrid/poc-cribl-rce)
### CVE-2019-1108
<code>
@ -1705,14 +1567,6 @@ Improper conditions check in voltage settings for some Intel(R) Processors may a
- [zkenjar/v0ltpwn](https://github.com/zkenjar/v0ltpwn)
### CVE-2019-11223
<code>
An Unrestricted File Upload Vulnerability in the SupportCandy plugin through 2.0.0 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
</code>
- [AngelCtulhu/CVE-2019-11223](https://github.com/AngelCtulhu/CVE-2019-11223)
### CVE-2019-1125
<code>
@ -1941,39 +1795,6 @@ A privilege escalation vulnerability exists in SolarWinds Serv-U before 15.1.7 f
- [guywhataguy/CVE-2019-12181](https://github.com/guywhataguy/CVE-2019-12181)
### CVE-2019-12185
<code>
eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
</code>
- [fuzzlove/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE](https://github.com/fuzzlove/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE)
### CVE-2019-12189
<code>
An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SearchN.do search field.
</code>
- [falconz/CVE-2019-12189](https://github.com/falconz/CVE-2019-12189)
- [tuyenhva/CVE-2019-12189](https://github.com/tuyenhva/CVE-2019-12189)
### CVE-2019-12190
<code>
XSS was discovered in CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.747 via the testacc/fileManager2.php fm_current_dir or filename parameter.
</code>
- [tuyenhva/CVE-2019-12190](https://github.com/tuyenhva/CVE-2019-12190)
### CVE-2019-12252
<code>
In Zoho ManageEngine ServiceDesk Plus through 10.5, users with the lowest privileges (guest) can view an arbitrary post by appending its number to the SDNotify.do?notifyModule=Solution&amp;mode=E-Mail&amp;notifyTo=SOLFORWARD&amp;id= substring.
</code>
- [tuyenhva/CVE-2019-12252](https://github.com/tuyenhva/CVE-2019-12252)
### CVE-2019-12255
<code>
@ -2024,14 +1845,6 @@ In MicroStrategy Web before 10.1 patch 10, stored XSS is possible in the FLTB pa
- [undefinedmode/CVE-2019-12453](https://github.com/undefinedmode/CVE-2019-12453)
### CVE-2019-12460
<code>
Web Port 1.19.1 allows XSS via the /access/setup type parameter.
</code>
- [EmreOvunc/WebPort-v1.19.1-Reflected-XSS](https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS)
### CVE-2019-12475
<code>
@ -2839,23 +2652,6 @@ Centreon Web before 2.8.30, 18.10.x before 18.10.8, 19.04.x before 19.04.5 and 1
- [TheCyberGeek/CVE-2019-16405.rb](https://github.com/TheCyberGeek/CVE-2019-16405.rb)
### CVE-2019-1652
<code>
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
</code>
- [0x27/CiscoRV320Dump](https://github.com/0x27/CiscoRV320Dump)
### CVE-2019-1653
<code>
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
</code>
- [dubfr33/CVE-2019-1653](https://github.com/dubfr33/CVE-2019-1653)
- [shaheemirza/CiscoSpill](https://github.com/shaheemirza/CiscoSpill)
### CVE-2019-16662
<code>
@ -3084,14 +2880,6 @@ In WordPress before 5.2.4, unauthenticated viewing of certain content is possibl
- [rhbb/CVE-2019-17671](https://github.com/rhbb/CVE-2019-17671)
### CVE-2019-1821
<code>
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
</code>
- [k8gege/CiscoExploit](https://github.com/k8gege/CiscoExploit)
### CVE-2019-18371
<code>
@ -3398,14 +3186,6 @@ Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account tak
- [andripwn/django_cve201919844](https://github.com/andripwn/django_cve201919844)
- [0xsha/CVE_2019_19844](https://github.com/0xsha/CVE_2019_19844)
### CVE-2019-1987
<code>
In onSetSampleX of SkSwizzler.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-118143775.
</code>
- [marcinguy/android-7-9-png-bug](https://github.com/marcinguy/android-7-9-png-bug)
### CVE-2019-19871
- [VDISEC/CVE-2019-19871-AuditGuide](https://github.com/VDISEC/CVE-2019-19871-AuditGuide)
@ -3514,22 +3294,12 @@ Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (su
- [Phantomn/VirtualBox_CVE-2019-2525-CVE-2019-2548](https://github.com/Phantomn/VirtualBox_CVE-2019-2525-CVE-2019-2548)
- [wotmd/VirtualBox-6.0.0-Exploit-1-day](https://github.com/wotmd/VirtualBox-6.0.0-Exploit-1-day)
### CVE-2019-2615
<code>
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
</code>
- [chiaifan/CVE-2019-2615](https://github.com/chiaifan/CVE-2019-2615)
### CVE-2019-2618
<code>
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N).
</code>
- [pyn3rd/CVE-2019-2618](https://github.com/pyn3rd/CVE-2019-2618)
- [jas502n/cve-2019-2618](https://github.com/jas502n/cve-2019-2618)
- [wsfengfan/CVE-2019-2618-](https://github.com/wsfengfan/CVE-2019-2618-)
- [dr0op/WeblogicScan](https://github.com/dr0op/WeblogicScan)
- [he1dan/cve-2019-2618](https://github.com/he1dan/cve-2019-2618)
@ -3543,12 +3313,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
</code>
- [shack2/javaserializetools](https://github.com/shack2/javaserializetools)
- [SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961](https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961)
- [iceMatcha/CNTA-2019-0014xCVE-2019-2725](https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725)
- [lasensio/cve-2019-2725](https://github.com/lasensio/cve-2019-2725)
- [davidmthomsen/CVE-2019-2725](https://github.com/davidmthomsen/CVE-2019-2725)
- [leerina/CVE-2019-2725](https://github.com/leerina/CVE-2019-2725)
- [zhusx110/cve-2019-2725](https://github.com/zhusx110/cve-2019-2725)
- [lufeirider/CVE-2019-2725](https://github.com/lufeirider/CVE-2019-2725)
- [CVCLabs/cve-2019-2725](https://github.com/CVCLabs/cve-2019-2725)
- [TopScrew/CVE-2019-2725](https://github.com/TopScrew/CVE-2019-2725)
@ -3613,15 +3377,8 @@ There was a local file disclosure vulnerability in Confluence Server and Conflue
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
</code>
- [dothanthitiendiettiende/CVE-2019-3396](https://github.com/dothanthitiendiettiende/CVE-2019-3396)
- [x-f1v3/CVE-2019-3396](https://github.com/x-f1v3/CVE-2019-3396)
- [shadowsock5/CVE-2019-3396](https://github.com/shadowsock5/CVE-2019-3396)
- [Yt1g3r/CVE-2019-3396_EXP](https://github.com/Yt1g3r/CVE-2019-3396_EXP)
- [jas502n/CVE-2019-3396](https://github.com/jas502n/CVE-2019-3396)
- [pyn3rd/CVE-2019-3396](https://github.com/pyn3rd/CVE-2019-3396)
- [s1xg0d/CVE-2019-3396](https://github.com/s1xg0d/CVE-2019-3396)
- [quanpt103/CVE-2019-3396](https://github.com/quanpt103/CVE-2019-3396)
- [vntest11/confluence_CVE-2019-3396](https://github.com/vntest11/confluence_CVE-2019-3396)
- [tanw923/test1](https://github.com/tanw923/test1)
- [skommando/CVE-2019-3396-confluence-poc](https://github.com/skommando/CVE-2019-3396-confluence-poc)
- [JonathanZhou348/CVE-2019-3396TEST](https://github.com/JonathanZhou348/CVE-2019-3396TEST)
@ -3637,15 +3394,6 @@ Confluence Server and Data Center had a path traversal vulnerability in the down
- [superevr/cve-2019-3398](https://github.com/superevr/cve-2019-3398)
### CVE-2019-3462
<code>
Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
</code>
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
### CVE-2019-3663
<code>
@ -3654,14 +3402,6 @@ Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defen
- [funoverip/mcafee_atd_CVE-2019-3663](https://github.com/funoverip/mcafee_atd_CVE-2019-3663)
### CVE-2019-3719
<code>
Dell SupportAssist Client versions prior to 3.2.0.90 contain a remote code execution vulnerability. An unauthenticated attacker, sharing the network access layer with the vulnerable system, can compromise the vulnerable system by tricking a victim user into downloading and executing arbitrary executables via SupportAssist client from attacker hosted sites.
</code>
- [jiansiting/CVE-2019-3719](https://github.com/jiansiting/CVE-2019-3719)
### CVE-2019-3778
<code>
@ -3670,14 +3410,6 @@ Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and
- [BBB-man/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection](https://github.com/BBB-man/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection)
### CVE-2019-3799
<code>
Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
</code>
- [mpgn/CVE-2019-3799](https://github.com/mpgn/CVE-2019-3799)
### CVE-2019-3847
<code>
@ -3719,24 +3451,10 @@ An exploitable code execution vulnerability exists in the processing of multi-pa
There is a File Content Disclosure vulnerability in Action View &lt;5.2.2.1, &lt;5.1.6.2, &lt;5.0.7.2, &lt;4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
</code>
- [mpgn/CVE-2019-5418](https://github.com/mpgn/CVE-2019-5418)
- [omarkurt/CVE-2019-5418](https://github.com/omarkurt/CVE-2019-5418)
- [brompwnie/CVE-2019-5418-Scanner](https://github.com/brompwnie/CVE-2019-5418-Scanner)
- [mpgn/Rails-doubletap-RCE](https://github.com/mpgn/Rails-doubletap-RCE)
- [takeokunn/CVE-2019-5418](https://github.com/takeokunn/CVE-2019-5418)
- [Bad3r/RailroadBandit](https://github.com/Bad3r/RailroadBandit)
- [ztgrace/CVE-2019-5418-Rails3](https://github.com/ztgrace/CVE-2019-5418-Rails3)
- [random-robbie/CVE-2019-5418](https://github.com/random-robbie/CVE-2019-5418)
### CVE-2019-5420
<code>
A remote code execution vulnerability in development mode Rails &lt;5.2.2.1, &lt;6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
</code>
- [knqyf263/CVE-2019-5420](https://github.com/knqyf263/CVE-2019-5420)
- [cved-sources/cve-2019-5420](https://github.com/cved-sources/cve-2019-5420)
### CVE-2019-5475
<code>
@ -3754,14 +3472,6 @@ The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13
- [mmxsrup/CVE-2019-5489](https://github.com/mmxsrup/CVE-2019-5489)
### CVE-2019-5624
<code>
Rapid7 Metasploit Framework suffers from an instance of CWE-22, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in the Zip import function of Metasploit. Exploiting this vulnerability can allow an attacker to execute arbitrary code in Metasploit at the privilege level of the user running Metasploit. This issue affects: Rapid7 Metasploit Framework version 4.14.0 and prior versions.
</code>
- [VoidSec/CVE-2019-5624](https://github.com/VoidSec/CVE-2019-5624)
### CVE-2019-5630
<code>
@ -3784,20 +3494,7 @@ NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vu
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
</code>
- [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc)
- [Frichetten/CVE-2019-5736-PoC](https://github.com/Frichetten/CVE-2019-5736-PoC)
- [jas502n/CVE-2019-5736](https://github.com/jas502n/CVE-2019-5736)
- [denmilu/CVE-2019-5736](https://github.com/denmilu/CVE-2019-5736)
- [denmilu/cve-2019-5736-poc](https://github.com/denmilu/cve-2019-5736-poc)
- [agppp/cve-2019-5736-poc](https://github.com/agppp/cve-2019-5736-poc)
- [ebdecastro/poc-cve-2019-5736](https://github.com/ebdecastro/poc-cve-2019-5736)
- [twistlock/RunC-CVE-2019-5736](https://github.com/twistlock/RunC-CVE-2019-5736)
- [kazu-onis/CVE-2019-5736-PoC](https://github.com/kazu-onis/CVE-2019-5736-PoC)
- [kazu-onis/CVE-2019-5736-PoC-0](https://github.com/kazu-onis/CVE-2019-5736-PoC-0)
- [zyriuse75/CVE-2019-5736-PoC](https://github.com/zyriuse75/CVE-2019-5736-PoC)
- [stillan00b/CVE-2019-5736](https://github.com/stillan00b/CVE-2019-5736)
- [milloni/cve-2019-5736-exp](https://github.com/milloni/cve-2019-5736-exp)
- [13paulmurith/Docker-Runc-Exploit](https://github.com/13paulmurith/Docker-Runc-Exploit)
- [RyanNgWH/CVE-2019-5736-POC](https://github.com/RyanNgWH/CVE-2019-5736-POC)
- [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study)
- [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc)
@ -3807,22 +3504,6 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
- [shen54/IT19172088](https://github.com/shen54/IT19172088)
### CVE-2019-5737
<code>
In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.
</code>
- [beelzebruh/cve-2019-5737](https://github.com/beelzebruh/cve-2019-5737)
### CVE-2019-5786
<code>
Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
</code>
- [exodusintel/CVE-2019-5786](https://github.com/exodusintel/CVE-2019-5786)
### CVE-2019-5822
<code>
@ -3839,14 +3520,6 @@ Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed
- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825)
### CVE-2019-5893
<code>
Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.
</code>
- [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection)
### CVE-2019-6111
<code>
@ -3855,21 +3528,12 @@ An issue was discovered in OpenSSH 7.9. Due to the scp implementation being deri
- [senthuHac/SNP](https://github.com/senthuHac/SNP)
### CVE-2019-6203
<code>
A logic issue was addressed with improved state management. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2. An attacker in a privileged network position may be able to intercept network traffic.
</code>
- [qingxp9/CVE-2019-6203-PoC](https://github.com/qingxp9/CVE-2019-6203-PoC)
### CVE-2019-6207
<code>
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. A malicious application may be able to determine kernel memory layout.
</code>
- [dothanthitiendiettiende/CVE-2019-6207](https://github.com/dothanthitiendiettiende/CVE-2019-6207)
- [maldiohead/CVE-2019-6207](https://github.com/maldiohead/CVE-2019-6207)
- [DimitriFourny/cve-2019-6207](https://github.com/DimitriFourny/cve-2019-6207)
@ -3879,33 +3543,7 @@ An out-of-bounds read issue existed that led to the disclosure of kernel memory.
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges.
</code>
- [fatgrass/OsirisJailbreak12](https://github.com/fatgrass/OsirisJailbreak12)
- [TrungNguyen1909/CVE-2019-6225-macOS](https://github.com/TrungNguyen1909/CVE-2019-6225-macOS)
- [raystyle/jailbreak-iOS12](https://github.com/raystyle/jailbreak-iOS12)
### CVE-2019-6249
<code>
An issue was discovered in HuCart v5.7.4. There is a CSRF vulnerability that can add an admin account via /adminsys/index.php?load=admins&amp;act=edit_info&amp;act_type=add.
</code>
- [NMTech0x90/CVE-2019-6249_Hucart-cms](https://github.com/NMTech0x90/CVE-2019-6249_Hucart-cms)
### CVE-2019-6260
<code>
The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and firmware implement Advanced High-performance Bus (AHB) bridges, which allow arbitrary read and write access to the BMC's physical address space from the host (or from the network in unusual cases where the BMC console uart is attached to a serial concentrator). This CVE applies to the specific cases of iLPC2AHB bridge Pt I, iLPC2AHB bridge Pt II, PCIe VGA P2A bridge, DMA from/to arbitrary BMC memory via X-DMA, UART-based SoC Debug interface, LPC2AHB bridge, PCIe BMC P2A bridge, and Watchdog setup.
</code>
- [amboar/cve-2019-6260](https://github.com/amboar/cve-2019-6260)
### CVE-2019-6263
<code>
An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS.
</code>
- [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC)
### CVE-2019-6329
@ -3915,43 +3553,12 @@ HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege a
- [ManhNDd/CVE-2019-6329](https://github.com/ManhNDd/CVE-2019-6329)
### CVE-2019-6340
<code>
Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)
</code>
- [g0rx/Drupal-SA-CORE-2019-003](https://github.com/g0rx/Drupal-SA-CORE-2019-003)
- [knqyf263/CVE-2019-6340](https://github.com/knqyf263/CVE-2019-6340)
- [DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass](https://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass)
- [oways/CVE-2019-6340](https://github.com/oways/CVE-2019-6340)
- [cved-sources/cve-2019-6340](https://github.com/cved-sources/cve-2019-6340)
- [d1vious/cve-2019-6340-bits](https://github.com/d1vious/cve-2019-6340-bits)
- [jas502n/CVE-2019-6340](https://github.com/jas502n/CVE-2019-6340)
### CVE-2019-6440
<code>
Zemana AntiMalware before 3.0.658 Beta mishandles update logic.
</code>
- [hexnone/CVE-2019-6440](https://github.com/hexnone/CVE-2019-6440)
### CVE-2019-6446
<code>
** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
</code>
- [RayScri/CVE-2019-6446](https://github.com/RayScri/CVE-2019-6446)
### CVE-2019-6447
<code>
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
</code>
- [fs0c131y/ESFileExplorerOpenPortVuln](https://github.com/fs0c131y/ESFileExplorerOpenPortVuln)
- [SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447](https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447)
### CVE-2019-6453
@ -3960,25 +3567,8 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
</code>
- [proofofcalc/cve-2019-6453-poc](https://github.com/proofofcalc/cve-2019-6453-poc)
- [andripwn/mIRC-CVE-2019-6453](https://github.com/andripwn/mIRC-CVE-2019-6453)
### CVE-2019-6467
<code>
A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally. The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a local copy of the root zone or using mirroring to provide the root zone, although other configurations are also possible. Versions affected: BIND 9.12.0-&gt; 9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.
</code>
- [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467)
### CVE-2019-6487
<code>
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
</code>
- [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC)
### CVE-2019-6690
<code>
@ -3986,7 +3576,6 @@ python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt
</code>
- [stigtsp/CVE-2019-6690-python-gnupg-vulnerability](https://github.com/stigtsp/CVE-2019-6690-python-gnupg-vulnerability)
- [brianwrf/CVE-2019-6690](https://github.com/brianwrf/CVE-2019-6690)
### CVE-2019-6715
@ -4005,42 +3594,16 @@ This improper access control vulnerability allows remote attackers to gain unaut
- [cycraft-corp/cve-2019-7192-check](https://github.com/cycraft-corp/cve-2019-7192-check)
- [th3gundy/CVE-2019-7192_QNAP_Exploit](https://github.com/th3gundy/CVE-2019-7192_QNAP_Exploit)
### CVE-2019-7216
<code>
An issue was discovered in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php.
</code>
- [Ekultek/CVE-2019-7216](https://github.com/Ekultek/CVE-2019-7216)
### CVE-2019-7219
<code>
Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead.
</code>
- [verifysecurity/CVE-2019-7219](https://github.com/verifysecurity/CVE-2019-7219)
### CVE-2019-7238
<code>
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
</code>
- [mpgn/CVE-2019-7238](https://github.com/mpgn/CVE-2019-7238)
- [jas502n/CVE-2019-7238](https://github.com/jas502n/CVE-2019-7238)
- [verctor/nexus_rce_CVE-2019-7238](https://github.com/verctor/nexus_rce_CVE-2019-7238)
- [magicming200/CVE-2019-7238_Nexus_RCE_Tool](https://github.com/magicming200/CVE-2019-7238_Nexus_RCE_Tool)
### CVE-2019-7304
<code>
Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.
</code>
- [initstring/dirty_sock](https://github.com/initstring/dirty_sock)
- [SecuritySi/CVE-2019-7304_DirtySock](https://github.com/SecuritySi/CVE-2019-7304_DirtySock)
### CVE-2019-7482
<code>
@ -4070,14 +3633,6 @@ Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the sec
- [whoami0622/CVE-2019-7610](https://github.com/whoami0622/CVE-2019-7610)
### CVE-2019-7642
<code>
D-Link routers with the mydlink feature have some web interfaces without authentication requirements. An attacker can remotely obtain users' DNS query logs and login logs. Vulnerable targets include but are not limited to the latest firmware versions of DIR-817LW (A1-1.04), DIR-816L (B1-2.06), DIR-816 (B1-2.06?), DIR-850L (A1-1.09), and DIR-868L (A1-1.10).
</code>
- [xw77cve/CVE-2019-7642](https://github.com/xw77cve/CVE-2019-7642)
### CVE-2019-7839
<code>
@ -4086,14 +3641,6 @@ ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 a
- [securifera/CVE-2019-7839](https://github.com/securifera/CVE-2019-7839)
### CVE-2019-8389
<code>
A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicloud 1.6. By default, the application runs a transfer service on port 8080, accessible by everyone on the same Wi-Fi network. An attacker can send the POST parameters downfiles and cur-folder (with a crafted ../ payload) to the download.script endpoint. This will create a MusicPlayerArchive.zip archive that is publicly accessible and includes the content of any requested file (such as the /etc/passwd file).
</code>
- [shawarkhanethicalhacker/CVE-2019-8389](https://github.com/shawarkhanethicalhacker/CVE-2019-8389)
### CVE-2019-8446
<code>
@ -4130,14 +3677,6 @@ This issue was addressed with improved checks. This issue is fixed in macOS Moja
- [genknife/cve-2019-8513](https://github.com/genknife/cve-2019-8513)
### CVE-2019-8540
<code>
A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. A malicious application may be able to determine kernel memory layout.
</code>
- [maldiohead/CVE-2019-8540](https://github.com/maldiohead/CVE-2019-8540)
### CVE-2019-8565
<code>
@ -4162,9 +3701,6 @@ Multiple memory corruption issues were addressed with improved memory handling.
- [BadAccess11/CVE-2019-8601](https://github.com/BadAccess11/CVE-2019-8601)
### CVE-2019-8627
- [maldiohead/CVE-2019-8627](https://github.com/maldiohead/CVE-2019-8627)
### CVE-2019-8641
<code>
@ -4190,23 +3726,6 @@ NTP through 4.2.8p12 has a NULL Pointer Dereference.
- [snappyJack/CVE-2019-8936](https://github.com/snappyJack/CVE-2019-8936)
### CVE-2019-8942
<code>
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
</code>
- [brianwrf/WordPress_4.9.8_RCE_POC](https://github.com/brianwrf/WordPress_4.9.8_RCE_POC)
- [synacktiv/CVE-2019-8942](https://github.com/synacktiv/CVE-2019-8942)
### CVE-2019-8956
<code>
In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the &quot;sctp_sendmsg()&quot; function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
</code>
- [butterflyhack/CVE-2019-8956](https://github.com/butterflyhack/CVE-2019-8956)
### CVE-2019-8978
<code>
@ -4231,14 +3750,6 @@ Improper Verification of a Cryptographic Signature in OpenPGP.js &lt;=4.1.2 allo
- [ZenyWay/opgp-service-cve-2019-9153](https://github.com/ZenyWay/opgp-service-cve-2019-9153)
### CVE-2019-9184
<code>
SQL injection vulnerability in the J2Store plugin 3.x before 3.3.7 for Joomla! allows remote attackers to execute arbitrary SQL commands via the product_option[] parameter.
</code>
- [cved-sources/cve-2019-9184](https://github.com/cved-sources/cve-2019-9184)
### CVE-2019-9193
<code>
@ -4247,22 +3758,6 @@ SQL injection vulnerability in the J2Store plugin 3.x before 3.3.7 for Joomla! a
- [skyship36/CVE-2019-9193](https://github.com/skyship36/CVE-2019-9193)
### CVE-2019-9194
<code>
elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.
</code>
- [cved-sources/cve-2019-9194](https://github.com/cved-sources/cve-2019-9194)
### CVE-2019-9202
<code>
Nagios IM (component of Nagios XI) before 2.2.7 allows authenticated users to execute arbitrary code via API key issues.
</code>
- [polict/CVE-2019-9202](https://github.com/polict/CVE-2019-9202)
### CVE-2019-9465
<code>
@ -4279,22 +3774,6 @@ The Bluetooth BR/EDR specification up to and including version 5.1 permits suffi
- [francozappa/knob](https://github.com/francozappa/knob)
### CVE-2019-9580
<code>
In st2web in StackStorm Web UI before 2.9.3 and 2.10.x before 2.10.3, it is possible to bypass the CORS protection mechanism via a &quot;null&quot; origin value, potentially leading to XSS.
</code>
- [mpgn/CVE-2019-9580](https://github.com/mpgn/CVE-2019-9580)
### CVE-2019-9596
<code>
Darktrace Enterprise Immune System before 3.1 allows CSRF via the /whitelisteddomains endpoint.
</code>
- [gerwout/CVE-2019-9596-and-CVE-2019-9597](https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597)
### CVE-2019-9599
<code>
@ -4303,22 +3782,6 @@ The AirDroid application through 4.2.1.6 for Android allows remote attackers to
- [s4vitar/AirDroidPwner](https://github.com/s4vitar/AirDroidPwner)
### CVE-2019-9621
<code>
Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, and 8.8.x before 8.8.10 patch 7 or 8.8.x before 8.8.11 patch 3 allows SSRF via the ProxyServlet component.
</code>
- [k8gege/ZimbraExploit](https://github.com/k8gege/ZimbraExploit)
### CVE-2019-9653
<code>
NUUO Network Video Recorder Firmware 1.7.x through 3.3.x allows unauthenticated attackers to execute arbitrary commands via shell metacharacters to handle_load_config.php.
</code>
- [grayoneday/CVE-2019-9653](https://github.com/grayoneday/CVE-2019-9653)
### CVE-2019-9670
<code>
@ -4328,30 +3791,6 @@ mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10
- [rek7/Zimbra-RCE](https://github.com/rek7/Zimbra-RCE)
- [attackgithub/Zimbra-RCE](https://github.com/attackgithub/Zimbra-RCE)
### CVE-2019-9673
<code>
Freenet 1483 has a MIME type bypass that allows arbitrary JavaScript execution via a crafted Freenet URI.
</code>
- [mgrube/CVE-2019-9673](https://github.com/mgrube/CVE-2019-9673)
### CVE-2019-9729
<code>
In Shanda MapleStory Online V160, the SdoKeyCrypt.sys driver allows privilege escalation to NT AUTHORITY\SYSTEM because of not validating the IOCtl 0x8000c01c input value, leading to an integer signedness error and a heap-based buffer underflow.
</code>
- [HyperSine/SdoKeyCrypt-sys-local-privilege-elevation](https://github.com/HyperSine/SdoKeyCrypt-sys-local-privilege-elevation)
### CVE-2019-9730
<code>
Incorrect access control in the CxUtilSvc component of the Synaptics Sound Device drivers prior to version 2.29 allows a local attacker to increase access privileges to the Windows Registry via an unpublished API.
</code>
- [jthuraisamy/CVE-2019-9730](https://github.com/jthuraisamy/CVE-2019-9730)
### CVE-2019-9745
<code>
@ -4374,7 +3813,6 @@ Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, a
WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.
</code>
- [rkatogit/cve-2019-9787_csrf_poc](https://github.com/rkatogit/cve-2019-9787_csrf_poc)
- [PalmTreeForest/CodePath_Week_7-8](https://github.com/PalmTreeForest/CodePath_Week_7-8)
- [sijiahi/Wordpress_cve-2019-9787_defense](https://github.com/sijiahi/Wordpress_cve-2019-9787_defense)
- [matinciel/Wordpress_CVE-2019-9787](https://github.com/matinciel/Wordpress_CVE-2019-9787)
@ -4385,28 +3823,8 @@ WordPress before 5.1.1 does not properly filter comment content, leading to Remo
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox &lt; 66.0.1, Firefox ESR &lt; 60.6.1, and Thunderbird &lt; 60.6.1.
</code>
- [xuechiyaobai/CVE-2019-9810-PoC](https://github.com/xuechiyaobai/CVE-2019-9810-PoC)
- [0vercl0k/CVE-2019-9810](https://github.com/0vercl0k/CVE-2019-9810)
### CVE-2019-9896
<code>
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
</code>
- [yasinyilmaz/vuln-chm-hijack](https://github.com/yasinyilmaz/vuln-chm-hijack)
### CVE-2019-9978
<code>
The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
</code>
- [mpgn/CVE-2019-9978](https://github.com/mpgn/CVE-2019-9978)
- [hash3liZer/CVE-2019-9978](https://github.com/hash3liZer/CVE-2019-9978)
- [KTN1990/CVE-2019-9978](https://github.com/KTN1990/CVE-2019-9978)
- [cved-sources/cve-2019-9978](https://github.com/cved-sources/cve-2019-9978)
## 2018
### CVE-2018-0101