mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/07/12 06:11:52
This commit is contained in:
parent
e76ee4e01c
commit
26102fae6b
56 changed files with 741 additions and 1617 deletions
|
@ -289,13 +289,13 @@
|
|||
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-09T15:59:14Z",
|
||||
"updated_at": "2020-06-09T05:59:22Z",
|
||||
"updated_at": "2020-07-11T17:47:57Z",
|
||||
"pushed_at": "2014-07-10T21:17:22Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-05-18T03:53:42Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-10-27T20:23:15Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 85834314,
|
||||
"name": "CVE-2017-0038-EXP-C-JS",
|
||||
"full_name": "k0keoyo\/CVE-2017-0038-EXP-C-JS",
|
||||
"owner": {
|
||||
"login": "k0keoyo",
|
||||
"id": 13257929,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13257929?v=4",
|
||||
"html_url": "https:\/\/github.com\/k0keoyo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k0keoyo\/CVE-2017-0038-EXP-C-JS",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-22T13:59:48Z",
|
||||
"updated_at": "2019-09-13T11:40:59Z",
|
||||
"pushed_at": "2017-03-23T14:07:37Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 85072866,
|
||||
"name": "cve-2017-0065",
|
||||
"full_name": "Dankirk\/cve-2017-0065",
|
||||
"owner": {
|
||||
"login": "Dankirk",
|
||||
"id": 10588760,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10588760?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dankirk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dankirk\/cve-2017-0065",
|
||||
"description": "Exploiting Edge's read:\/\/ urlhandler",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-15T13:01:29Z",
|
||||
"updated_at": "2019-10-26T13:38:33Z",
|
||||
"pushed_at": "2017-03-15T13:47:22Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 88117539,
|
||||
"name": "CVE-2017-0106",
|
||||
"full_name": "ryhanson\/CVE-2017-0106",
|
||||
"owner": {
|
||||
"login": "ryhanson",
|
||||
"id": 3486433,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
|
||||
"html_url": "https:\/\/github.com\/ryhanson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0106",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T02:42:08Z",
|
||||
"updated_at": "2017-04-13T02:42:08Z",
|
||||
"pushed_at": "2017-04-13T02:42:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 88317204,
|
||||
"name": "CVE-2017-0108",
|
||||
"full_name": "homjxi0e\/CVE-2017-0108",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-0108",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-15T02:10:16Z",
|
||||
"updated_at": "2017-12-04T20:08:18Z",
|
||||
"pushed_at": "2017-04-15T02:16:09Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 88117490,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "ryhanson\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "ryhanson",
|
||||
"id": 3486433,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
|
||||
"html_url": "https:\/\/github.com\/ryhanson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T02:41:36Z",
|
||||
"updated_at": "2017-04-13T02:41:36Z",
|
||||
"pushed_at": "2017-04-13T02:41:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88185964,
|
||||
"name": "cve-2017-0199",
|
||||
"full_name": "SyFi\/cve-2017-0199",
|
||||
"owner": {
|
||||
"login": "SyFi",
|
||||
"id": 26314806,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
|
||||
"html_url": "https:\/\/github.com\/SyFi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SyFi\/cve-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T16:40:27Z",
|
||||
"updated_at": "2019-12-06T00:55:16Z",
|
||||
"pushed_at": "2017-04-13T16:45:10Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88486475,
|
||||
"name": "CVE-2017-0199",
|
||||
|
@ -91,98 +45,6 @@
|
|||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88700030,
|
||||
"name": "CVE-2017-0199-master",
|
||||
"full_name": "haibara3839\/CVE-2017-0199-master",
|
||||
"owner": {
|
||||
"login": "haibara3839",
|
||||
"id": 17246565,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17246565?v=4",
|
||||
"html_url": "https:\/\/github.com\/haibara3839"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/haibara3839\/CVE-2017-0199-master",
|
||||
"description": "CVE-2017-0199",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-19T04:15:54Z",
|
||||
"updated_at": "2018-11-12T16:42:51Z",
|
||||
"pushed_at": "2017-04-19T04:25:47Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89043209,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "Exploit-install\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "Exploit-install",
|
||||
"id": 13824191,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/13824191?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploit-install"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploit-install\/CVE-2017-0199",
|
||||
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-22T04:01:38Z",
|
||||
"updated_at": "2020-04-07T06:30:43Z",
|
||||
"pushed_at": "2017-04-22T04:01:54Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89065031,
|
||||
"name": "PoC-CVE-2017-0199",
|
||||
"full_name": "zakybstrd21215\/PoC-CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "zakybstrd21215",
|
||||
"id": 22362343,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4",
|
||||
"html_url": "https:\/\/github.com\/zakybstrd21215"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-0199",
|
||||
"description": "Exploit toolkit for vulnerability RCE Microsoft RTF",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-22T11:32:39Z",
|
||||
"updated_at": "2019-02-02T15:31:28Z",
|
||||
"pushed_at": "2017-04-22T11:35:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89145802,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "n1shant-sinha\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "n1shant-sinha",
|
||||
"id": 8848453,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8848453?v=4",
|
||||
"html_url": "https:\/\/github.com\/n1shant-sinha"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n1shant-sinha\/CVE-2017-0199",
|
||||
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-23T13:58:30Z",
|
||||
"updated_at": "2018-10-18T14:32:17Z",
|
||||
"pushed_at": "2017-04-23T14:05:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89296859,
|
||||
"name": "htattack",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 88117558,
|
||||
"name": "CVE-2017-0204",
|
||||
"full_name": "ryhanson\/CVE-2017-0204",
|
||||
"owner": {
|
||||
"login": "ryhanson",
|
||||
"id": 3486433,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
|
||||
"html_url": "https:\/\/github.com\/ryhanson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0204",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T02:42:24Z",
|
||||
"updated_at": "2017-04-13T03:12:29Z",
|
||||
"pushed_at": "2017-04-13T02:42:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 85445247,
|
||||
"name": "CVE-2017-0478",
|
||||
"full_name": "JiounDai\/CVE-2017-0478",
|
||||
"owner": {
|
||||
"login": "JiounDai",
|
||||
"id": 4220640,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4220640?v=4",
|
||||
"html_url": "https:\/\/github.com\/JiounDai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JiounDai\/CVE-2017-0478",
|
||||
"description": "poc of CVE-2017-0478",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-19T02:18:37Z",
|
||||
"updated_at": "2018-08-02T19:14:29Z",
|
||||
"pushed_at": "2017-03-19T02:43:19Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 141312944,
|
||||
"name": "CVE-2017-0478",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 87639690,
|
||||
"name": "CVE-2017-0541",
|
||||
"full_name": "JiounDai\/CVE-2017-0541",
|
||||
"owner": {
|
||||
"login": "JiounDai",
|
||||
"id": 4220640,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4220640?v=4",
|
||||
"html_url": "https:\/\/github.com\/JiounDai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JiounDai\/CVE-2017-0541",
|
||||
"description": "poc and vulnerability analysis of CVE-2017-0541",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-08T14:28:22Z",
|
||||
"updated_at": "2018-11-26T08:18:04Z",
|
||||
"pushed_at": "2017-04-08T14:45:44Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 141312906,
|
||||
"name": "CVE-2017-0541",
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 464,
|
||||
"watchers_count": 464,
|
||||
"forks_count": 240,
|
||||
"forks": 240,
|
||||
"forks_count": 241,
|
||||
"forks": 241,
|
||||
"watchers": 464,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,73 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 80148945,
|
||||
"name": "extra_recipe",
|
||||
"full_name": "maximehip\/extra_recipe",
|
||||
"owner": {
|
||||
"login": "maximehip",
|
||||
"id": 6273425,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6273425?v=4",
|
||||
"html_url": "https:\/\/github.com\/maximehip"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maximehip\/extra_recipe",
|
||||
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-26T19:47:43Z",
|
||||
"updated_at": "2017-01-26T19:48:19Z",
|
||||
"pushed_at": "2017-01-26T19:48:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 80717942,
|
||||
"name": "extra_recipe",
|
||||
"full_name": "JackBro\/extra_recipe",
|
||||
"owner": {
|
||||
"login": "JackBro",
|
||||
"id": 21210712,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21210712?v=4",
|
||||
"html_url": "https:\/\/github.com\/JackBro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
|
||||
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-02T11:16:38Z",
|
||||
"updated_at": "2017-10-14T08:34:32Z",
|
||||
"pushed_at": "2017-01-27T17:44:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 81874110,
|
||||
"name": "extra_recipe-iOS-10.2",
|
||||
"full_name": "Rootkitsmm\/extra_recipe-iOS-10.2",
|
||||
"owner": {
|
||||
"login": "Rootkitsmm",
|
||||
"id": 5567904,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5567904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm\/extra_recipe-iOS-10.2",
|
||||
"description": "CVE-2017-2370",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-13T21:32:40Z",
|
||||
"updated_at": "2019-01-03T05:45:15Z",
|
||||
"pushed_at": "2017-02-01T11:36:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 142854846,
|
||||
"name": "CVE-2017-2370",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 84497885,
|
||||
"name": "cve-2017-2636-el",
|
||||
"full_name": "alexzorin\/cve-2017-2636-el",
|
||||
"owner": {
|
||||
"login": "alexzorin",
|
||||
"id": 311534,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/311534?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexzorin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexzorin\/cve-2017-2636-el",
|
||||
"description": "Ansible role for workaround for CVE-2017-2636 (Red Hat) - https:\/\/access.redhat.com\/security\/cve\/CVE-2017-2636",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-09T23:20:42Z",
|
||||
"updated_at": "2017-03-18T16:23:19Z",
|
||||
"pushed_at": "2017-03-09T23:21:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 88650555,
|
||||
"name": "CVE-2017-3599",
|
||||
"full_name": "SECFORCE\/CVE-2017-3599",
|
||||
"owner": {
|
||||
"login": "SECFORCE",
|
||||
"id": 8157384,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
|
||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2017-3599",
|
||||
"description": "Proof of concept exploit for CVE-2017-3599",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-18T17:08:39Z",
|
||||
"updated_at": "2020-05-15T17:39:30Z",
|
||||
"pushed_at": "2017-04-18T17:10:18Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 79682713,
|
||||
"name": "CVE-2017-3730",
|
||||
"full_name": "guidovranken\/CVE-2017-3730",
|
||||
"owner": {
|
||||
"login": "guidovranken",
|
||||
"id": 6846644,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6846644?v=4",
|
||||
"html_url": "https:\/\/github.com\/guidovranken"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
|
||||
"description": "OpenSSL CVE-2017-3730 proof-of-concept",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-22T00:40:34Z",
|
||||
"updated_at": "2018-12-04T20:01:55Z",
|
||||
"pushed_at": "2017-01-26T01:30:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 97466064,
|
||||
"name": "OpenSSL-CVE-2017-3730",
|
||||
|
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 87763747,
|
||||
"name": "cisco-rce",
|
||||
"full_name": "artkond\/cisco-rce",
|
||||
"owner": {
|
||||
"login": "artkond",
|
||||
"id": 4436674,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4436674?v=4",
|
||||
"html_url": "https:\/\/github.com\/artkond"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/artkond\/cisco-rce",
|
||||
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-10T03:44:04Z",
|
||||
"updated_at": "2020-07-10T00:03:11Z",
|
||||
"pushed_at": "2017-04-12T09:17:27Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 168,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88804675,
|
||||
"name": "CVE-2017-3881-exploit-cisco-",
|
||||
"full_name": "homjxi0e\/CVE-2017-3881-exploit-cisco-",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3881-exploit-cisco-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-20T00:52:10Z",
|
||||
"updated_at": "2020-04-07T06:31:35Z",
|
||||
"pushed_at": "2017-04-20T00:52:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 90087111,
|
||||
"name": "CVE-2017-3881-Cisco",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 77828551,
|
||||
"name": "QuickHeal",
|
||||
"full_name": "payatu\/QuickHeal",
|
||||
"owner": {
|
||||
"login": "payatu",
|
||||
"id": 16715624,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16715624?v=4",
|
||||
"html_url": "https:\/\/github.com\/payatu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/payatu\/QuickHeal",
|
||||
"description": "CVE-2017-5005 for Quick Heal Antivirus",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-02T11:21:00Z",
|
||||
"updated_at": "2020-03-27T02:45:54Z",
|
||||
"pushed_at": "2017-03-31T14:49:28Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 88234209,
|
||||
"name": "CVE-2017-5415",
|
||||
"full_name": "649\/CVE-2017-5415",
|
||||
"owner": {
|
||||
"login": "649",
|
||||
"id": 23534047,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23534047?v=4",
|
||||
"html_url": "https:\/\/github.com\/649"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/649\/CVE-2017-5415",
|
||||
"description": "Addressbar spoofing through blob URL (Firefox browser). An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by blob: as the protocol, leading to user confusion and further spoofing attacks.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-14T04:55:41Z",
|
||||
"updated_at": "2019-07-14T21:46:17Z",
|
||||
"pushed_at": "2017-04-14T04:55:51Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 88568725,
|
||||
"name": "Exploit-CVE-2017-5633",
|
||||
"full_name": "cardangi\/Exploit-CVE-2017-5633",
|
||||
"owner": {
|
||||
"login": "cardangi",
|
||||
"id": 22066466,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22066466?v=4",
|
||||
"html_url": "https:\/\/github.com\/cardangi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cardangi\/Exploit-CVE-2017-5633",
|
||||
"description": "Exploit developed by me for CVE-2017-5633.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-18T01:44:33Z",
|
||||
"updated_at": "2020-04-07T06:34:50Z",
|
||||
"pushed_at": "2017-04-18T02:54:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,280 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 84158718,
|
||||
"name": "S2-045",
|
||||
"full_name": "PolarisLab\/S2-045",
|
||||
"owner": {
|
||||
"login": "PolarisLab",
|
||||
"id": 25890110,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25890110?v=4",
|
||||
"html_url": "https:\/\/github.com\/PolarisLab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
|
||||
"description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-07T05:30:30Z",
|
||||
"updated_at": "2019-06-29T02:30:57Z",
|
||||
"pushed_at": "2017-03-07T05:37:55Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84186490,
|
||||
"name": "Struts2-045-Exp",
|
||||
"full_name": "Flyteas\/Struts2-045-Exp",
|
||||
"owner": {
|
||||
"login": "Flyteas",
|
||||
"id": 15673913,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15673913?v=4",
|
||||
"html_url": "https:\/\/github.com\/Flyteas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Flyteas\/Struts2-045-Exp",
|
||||
"description": "Struts2 S2-045(CVE-2017-5638)Exp with GUI",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-07T10:30:20Z",
|
||||
"updated_at": "2020-04-10T02:04:59Z",
|
||||
"pushed_at": "2017-03-13T06:30:41Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84277596,
|
||||
"name": "cve-2017-5638",
|
||||
"full_name": "bongbongco\/cve-2017-5638",
|
||||
"owner": {
|
||||
"login": "bongbongco",
|
||||
"id": 3170006,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3170006?v=4",
|
||||
"html_url": "https:\/\/github.com\/bongbongco"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-08T04:17:33Z",
|
||||
"updated_at": "2017-03-08T04:31:28Z",
|
||||
"pushed_at": "2017-03-08T04:31:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84481525,
|
||||
"name": "S2-045-EXP-POC-TOOLS",
|
||||
"full_name": "jas502n\/S2-045-EXP-POC-TOOLS",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/S2-045-EXP-POC-TOOLS",
|
||||
"description": "S2-045 漏洞 POC-TOOLS CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-09T19:40:47Z",
|
||||
"updated_at": "2020-06-16T02:37:44Z",
|
||||
"pushed_at": "2017-03-09T19:50:50Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84518902,
|
||||
"name": "strutszeiro",
|
||||
"full_name": "mthbernardes\/strutszeiro",
|
||||
"owner": {
|
||||
"login": "mthbernardes",
|
||||
"id": 12648924,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12648924?v=4",
|
||||
"html_url": "https:\/\/github.com\/mthbernardes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mthbernardes\/strutszeiro",
|
||||
"description": "Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T04:23:41Z",
|
||||
"updated_at": "2020-05-11T01:31:47Z",
|
||||
"pushed_at": "2017-03-11T04:11:39Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84581800,
|
||||
"name": "cve-2017-5638",
|
||||
"full_name": "xsscx\/cve-2017-5638",
|
||||
"owner": {
|
||||
"login": "xsscx",
|
||||
"id": 10790582,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/10790582?v=4",
|
||||
"html_url": "https:\/\/github.com\/xsscx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xsscx\/cve-2017-5638",
|
||||
"description": "Example PoC Code for CVE-2017-5638 | Apache Struts Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T16:56:14Z",
|
||||
"updated_at": "2020-06-27T11:29:42Z",
|
||||
"pushed_at": "2017-03-12T15:43:27Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84602394,
|
||||
"name": "apache-struts2-CVE-2017-5638",
|
||||
"full_name": "immunio\/apache-struts2-CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "immunio",
|
||||
"id": 6700387,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6700387?v=4",
|
||||
"html_url": "https:\/\/github.com\/immunio"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/immunio\/apache-struts2-CVE-2017-5638",
|
||||
"description": "Demo Application and Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T21:33:25Z",
|
||||
"updated_at": "2020-05-29T01:57:57Z",
|
||||
"pushed_at": "2017-03-13T15:03:32Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84620334,
|
||||
"name": "OgnlContentTypeRejectorValve",
|
||||
"full_name": "Masahiro-Yamada\/OgnlContentTypeRejectorValve",
|
||||
"owner": {
|
||||
"login": "Masahiro-Yamada",
|
||||
"id": 479387,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/479387?v=4",
|
||||
"html_url": "https:\/\/github.com\/Masahiro-Yamada"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Masahiro-Yamada\/OgnlContentTypeRejectorValve",
|
||||
"description": "This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-11T03:18:12Z",
|
||||
"updated_at": "2017-04-11T00:06:36Z",
|
||||
"pushed_at": "2017-03-13T14:49:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84639178,
|
||||
"name": "CVE-2017-5638-Apache-Struts2",
|
||||
"full_name": "aljazceru\/CVE-2017-5638-Apache-Struts2",
|
||||
"owner": {
|
||||
"login": "aljazceru",
|
||||
"id": 4439523,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4439523?v=4",
|
||||
"html_url": "https:\/\/github.com\/aljazceru"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aljazceru\/CVE-2017-5638-Apache-Struts2",
|
||||
"description": "Tweaking original PoC (https:\/\/github.com\/rapid7\/metasploit-framework\/issues\/8064) to work on self-signed certificates ",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-11T09:39:09Z",
|
||||
"updated_at": "2019-07-15T22:02:37Z",
|
||||
"pushed_at": "2017-03-11T09:41:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84640546,
|
||||
"name": "test_struts2_vulnerability_CVE-2017-5638",
|
||||
"full_name": "sjitech\/test_struts2_vulnerability_CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "sjitech",
|
||||
"id": 5180638,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5180638?v=4",
|
||||
"html_url": "https:\/\/github.com\/sjitech"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sjitech\/test_struts2_vulnerability_CVE-2017-5638",
|
||||
"description": "test struts2 vulnerability CVE-2017-5638 in Mac OS X",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-11T10:03:54Z",
|
||||
"updated_at": "2017-03-13T11:14:00Z",
|
||||
"pushed_at": "2017-03-13T07:38:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84642680,
|
||||
"name": "CVE-2017-5638",
|
||||
"full_name": "jrrombaldo\/CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "jrrombaldo",
|
||||
"id": 121948,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/121948?v=4",
|
||||
"html_url": "https:\/\/github.com\/jrrombaldo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-5638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-11T10:43:16Z",
|
||||
"updated_at": "2017-03-11T13:07:57Z",
|
||||
"pushed_at": "2017-03-24T19:12:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84644857,
|
||||
"name": "CVE-2017-5638",
|
||||
"full_name": "random-robbie\/CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "random-robbie",
|
||||
"id": 4902869,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4902869?v=4",
|
||||
"html_url": "https:\/\/github.com\/random-robbie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/random-robbie\/CVE-2017-5638",
|
||||
"description": "CVE: 2017-5638 in different formats",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-11T11:22:44Z",
|
||||
"updated_at": "2017-03-11T11:28:58Z",
|
||||
"pushed_at": "2017-03-16T11:26:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84655941,
|
||||
"name": "CVE-2017-5638_struts",
|
||||
|
@ -321,167 +45,6 @@
|
|||
"watchers": 371,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84705148,
|
||||
"name": "Struts-Apache-ExploitPack",
|
||||
"full_name": "ret2jazzy\/Struts-Apache-ExploitPack",
|
||||
"owner": {
|
||||
"login": "ret2jazzy",
|
||||
"id": 20831187,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20831187?v=4",
|
||||
"html_url": "https:\/\/github.com\/ret2jazzy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ret2jazzy\/Struts-Apache-ExploitPack",
|
||||
"description": "These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T06:28:51Z",
|
||||
"updated_at": "2020-04-07T06:39:58Z",
|
||||
"pushed_at": "2017-03-12T07:26:03Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84725982,
|
||||
"name": "ExpStruts",
|
||||
"full_name": "lolwaleet\/ExpStruts",
|
||||
"owner": {
|
||||
"login": "lolwaleet",
|
||||
"id": 20018319,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20018319?v=4",
|
||||
"html_url": "https:\/\/github.com\/lolwaleet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lolwaleet\/ExpStruts",
|
||||
"description": "A php based exploiter for CVE-2017-5638.",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T13:03:52Z",
|
||||
"updated_at": "2020-03-15T16:58:21Z",
|
||||
"pushed_at": "2017-03-12T13:04:33Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84819853,
|
||||
"name": "CVE-2017-5638-Apache-Struts2",
|
||||
"full_name": "oktavianto\/CVE-2017-5638-Apache-Struts2",
|
||||
"owner": {
|
||||
"login": "oktavianto",
|
||||
"id": 8210275,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8210275?v=4",
|
||||
"html_url": "https:\/\/github.com\/oktavianto"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oktavianto\/CVE-2017-5638-Apache-Struts2",
|
||||
"description": "Example PHP Exploiter for CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-13T11:39:55Z",
|
||||
"updated_at": "2020-04-07T06:38:46Z",
|
||||
"pushed_at": "2017-03-20T19:40:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 85010282,
|
||||
"name": "cve-2017-5638",
|
||||
"full_name": "jrrdev\/cve-2017-5638",
|
||||
"owner": {
|
||||
"login": "jrrdev",
|
||||
"id": 17674081,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17674081?v=4",
|
||||
"html_url": "https:\/\/github.com\/jrrdev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jrrdev\/cve-2017-5638",
|
||||
"description": "cve-2017-5638 Vulnerable site sample",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-15T00:19:33Z",
|
||||
"updated_at": "2020-05-19T19:36:03Z",
|
||||
"pushed_at": "2017-04-04T19:57:38Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 85145901,
|
||||
"name": "Strutshock",
|
||||
"full_name": "opt9\/Strutshock",
|
||||
"owner": {
|
||||
"login": "opt9",
|
||||
"id": 192655,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/192655?v=4",
|
||||
"html_url": "https:\/\/github.com\/opt9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/opt9\/Strutshock",
|
||||
"description": "Struts2 RCE CVE-2017-5638 non-intrusive check shell script",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-16T02:59:22Z",
|
||||
"updated_at": "2017-05-04T20:58:47Z",
|
||||
"pushed_at": "2017-03-16T04:02:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 85341283,
|
||||
"name": "StrutsShell",
|
||||
"full_name": "falcon-lnhg\/StrutsShell",
|
||||
"owner": {
|
||||
"login": "falcon-lnhg",
|
||||
"id": 5199658,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5199658?v=4",
|
||||
"html_url": "https:\/\/github.com\/falcon-lnhg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/falcon-lnhg\/StrutsShell",
|
||||
"description": "Apache Struts (CVE-2017-5638) Shell",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-17T18:05:55Z",
|
||||
"updated_at": "2017-08-31T21:27:12Z",
|
||||
"pushed_at": "2017-04-04T16:11:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 85390529,
|
||||
"name": "CVE-2017-5638",
|
||||
"full_name": "bhagdave\/CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "bhagdave",
|
||||
"id": 3230037,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3230037?v=4",
|
||||
"html_url": "https:\/\/github.com\/bhagdave"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bhagdave\/CVE-2017-5638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-18T09:39:59Z",
|
||||
"updated_at": "2017-03-19T01:25:24Z",
|
||||
"pushed_at": "2017-03-21T21:53:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 85664016,
|
||||
"name": "st2-046-poc",
|
||||
|
@ -528,75 +91,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 85926594,
|
||||
"name": "S2-Reaper",
|
||||
"full_name": "gsfish\/S2-Reaper",
|
||||
"owner": {
|
||||
"login": "gsfish",
|
||||
"id": 15968154,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15968154?v=4",
|
||||
"html_url": "https:\/\/github.com\/gsfish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gsfish\/S2-Reaper",
|
||||
"description": "CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-23T08:44:10Z",
|
||||
"updated_at": "2017-03-30T09:51:23Z",
|
||||
"pushed_at": "2017-03-30T10:06:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 86200933,
|
||||
"name": "cve-2017-5638",
|
||||
"full_name": "mcassano\/cve-2017-5638",
|
||||
"owner": {
|
||||
"login": "mcassano",
|
||||
"id": 2073030,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2073030?v=4",
|
||||
"html_url": "https:\/\/github.com\/mcassano"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mcassano\/cve-2017-5638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-26T01:58:52Z",
|
||||
"updated_at": "2017-03-26T02:00:58Z",
|
||||
"pushed_at": "2017-04-01T04:20:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 86415022,
|
||||
"name": "Strutscli",
|
||||
"full_name": "opt9\/Strutscli",
|
||||
"owner": {
|
||||
"login": "opt9",
|
||||
"id": 192655,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/192655?v=4",
|
||||
"html_url": "https:\/\/github.com\/opt9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/opt9\/Strutscli",
|
||||
"description": "Struts2 RCE CVE-2017-5638 CLI shell",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-28T04:31:44Z",
|
||||
"updated_at": "2017-04-14T08:03:48Z",
|
||||
"pushed_at": "2017-03-28T04:36:11Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 87695524,
|
||||
"name": "strutsy",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-07-11T09:29:13Z",
|
||||
"updated_at": "2020-07-11T19:24:03Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 537,
|
||||
"watchers": 538,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 85539985,
|
||||
"name": "TYPO3-v7.6.15-Unencrypted-Login-Request",
|
||||
"full_name": "faizzaidi\/TYPO3-v7.6.15-Unencrypted-Login-Request",
|
||||
"owner": {
|
||||
"login": "faizzaidi",
|
||||
"id": 12153050,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
|
||||
"html_url": "https:\/\/github.com\/faizzaidi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faizzaidi\/TYPO3-v7.6.15-Unencrypted-Login-Request",
|
||||
"description": "TYPO3 v7.6.15 Unencrypted Login Request Assigned CVE Number: CVE-2017-6370",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-20T05:51:07Z",
|
||||
"updated_at": "2018-05-07T17:02:28Z",
|
||||
"pushed_at": "2017-03-20T05:51:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 87749039,
|
||||
"name": "nfsen-exploit",
|
||||
"full_name": "patrickfreed\/nfsen-exploit",
|
||||
"owner": {
|
||||
"login": "patrickfreed",
|
||||
"id": 936020,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/936020?v=4",
|
||||
"html_url": "https:\/\/github.com\/patrickfreed"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/patrickfreed\/nfsen-exploit",
|
||||
"description": "Exploit for CVE-2017-6971 remote command execution in nfsen 1.3.7.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-10T00:13:24Z",
|
||||
"updated_at": "2020-04-07T06:36:25Z",
|
||||
"pushed_at": "2017-04-10T16:06:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 183134145,
|
||||
"name": "nfsen_1.3.7_CVE-2017-6971",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 87800336,
|
||||
"name": "Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC",
|
||||
"full_name": "faizzaidi\/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC",
|
||||
"owner": {
|
||||
"login": "faizzaidi",
|
||||
"id": 12153050,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
|
||||
"html_url": "https:\/\/github.com\/faizzaidi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faizzaidi\/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC",
|
||||
"description": "Zurmo-Stable-3.1.1 Cross Site Scripting (XSS) Assigned CVE Number: CVE-2017-7188",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-10T10:52:13Z",
|
||||
"updated_at": "2018-05-07T17:03:10Z",
|
||||
"pushed_at": "2017-04-10T10:52:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 86543900,
|
||||
"name": "webdav_exploit",
|
||||
"full_name": "eliuha\/webdav_exploit",
|
||||
"owner": {
|
||||
"login": "eliuha",
|
||||
"id": 2240516,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2240516?v=4",
|
||||
"html_url": "https:\/\/github.com\/eliuha"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/eliuha\/webdav_exploit",
|
||||
"description": "An exploit for Microsoft IIS 6.0 CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-29T05:59:30Z",
|
||||
"updated_at": "2020-06-03T02:48:00Z",
|
||||
"pushed_at": "2017-03-29T07:26:41Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 86573461,
|
||||
"name": "CVE-2017-7269-Echo-PoC",
|
||||
|
@ -45,213 +22,6 @@
|
|||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 86581754,
|
||||
"name": "CVE-2017-7269-exploit",
|
||||
"full_name": "caicai1355\/CVE-2017-7269-exploit",
|
||||
"owner": {
|
||||
"login": "caicai1355",
|
||||
"id": 24385053,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24385053?v=4",
|
||||
"html_url": "https:\/\/github.com\/caicai1355"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/caicai1355\/CVE-2017-7269-exploit",
|
||||
"description": "exec 8 bytes command",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-29T12:52:54Z",
|
||||
"updated_at": "2020-04-07T06:37:12Z",
|
||||
"pushed_at": "2017-03-29T13:08:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 86659284,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "M1a0rz\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "M1a0rz",
|
||||
"id": 25101765,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25101765?v=4",
|
||||
"html_url": "https:\/\/github.com\/M1a0rz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M1a0rz\/CVE-2017-7269",
|
||||
"description": "Poc for iis6.0",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-30T04:35:13Z",
|
||||
"updated_at": "2017-03-30T04:35:13Z",
|
||||
"pushed_at": "2017-03-30T04:35:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 86697845,
|
||||
"name": "cve-2017-7269picture",
|
||||
"full_name": "whiteHat001\/cve-2017-7269picture",
|
||||
"owner": {
|
||||
"login": "whiteHat001",
|
||||
"id": 18191034,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18191034?v=4",
|
||||
"html_url": "https:\/\/github.com\/whiteHat001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whiteHat001\/cve-2017-7269picture",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-30T12:03:05Z",
|
||||
"updated_at": "2017-03-30T12:03:05Z",
|
||||
"pushed_at": "2017-03-30T12:11:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 86754251,
|
||||
"name": "cve-2017-7269",
|
||||
"full_name": "zcgonvh\/cve-2017-7269",
|
||||
"owner": {
|
||||
"login": "zcgonvh",
|
||||
"id": 25787677,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4",
|
||||
"html_url": "https:\/\/github.com\/zcgonvh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zcgonvh\/cve-2017-7269",
|
||||
"description": "fixed msf module for cve-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-30T22:20:36Z",
|
||||
"updated_at": "2020-06-02T01:44:08Z",
|
||||
"pushed_at": "2017-03-30T22:20:51Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 87165305,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "jrrombaldo\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "jrrombaldo",
|
||||
"id": 121948,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/121948?v=4",
|
||||
"html_url": "https:\/\/github.com\/jrrombaldo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-04T08:47:22Z",
|
||||
"updated_at": "2018-01-08T16:52:30Z",
|
||||
"pushed_at": "2017-04-04T17:20:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 87365181,
|
||||
"name": "iis6-exploit-2017-CVE-2017-7269",
|
||||
"full_name": "g0rx\/iis6-exploit-2017-CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "g0rx",
|
||||
"id": 10961397,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10961397?v=4",
|
||||
"html_url": "https:\/\/github.com\/g0rx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/g0rx\/iis6-exploit-2017-CVE-2017-7269",
|
||||
"description": "iis6 exploit 2017 CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-05T23:21:12Z",
|
||||
"updated_at": "2020-06-23T06:57:30Z",
|
||||
"pushed_at": "2017-04-05T23:29:03Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 87432387,
|
||||
"name": "IIS_6.0_WebDAV_Ruby",
|
||||
"full_name": "slimpagey\/IIS_6.0_WebDAV_Ruby",
|
||||
"owner": {
|
||||
"login": "slimpagey",
|
||||
"id": 10183644,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10183644?v=4",
|
||||
"html_url": "https:\/\/github.com\/slimpagey"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/slimpagey\/IIS_6.0_WebDAV_Ruby",
|
||||
"description": "Ruby Exploit for IIS 6.0 Buffer Overflow (CVE-2017-7269)",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-06T13:27:20Z",
|
||||
"updated_at": "2019-02-27T06:05:06Z",
|
||||
"pushed_at": "2017-04-06T13:47:49Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 88148249,
|
||||
"name": "cve-2017-7269",
|
||||
"full_name": "homjxi0e\/cve-2017-7269",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/cve-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-04-13T09:27:01Z",
|
||||
"updated_at": "2017-04-13T09:27:01Z",
|
||||
"pushed_at": "2017-04-13T12:33:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 89217126,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "xiaovpn\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "xiaovpn",
|
||||
"id": 22736797,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22736797?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiaovpn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xiaovpn\/CVE-2017-7269",
|
||||
"description": "CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-24T08:42:59Z",
|
||||
"updated_at": "2017-04-24T08:42:59Z",
|
||||
"pushed_at": "2017-04-24T08:43:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 91493002,
|
||||
"name": "cve-2017-7269-tool",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 87845394,
|
||||
"name": "CVE-2017-7648.",
|
||||
"full_name": "notmot\/CVE-2017-7648.",
|
||||
"owner": {
|
||||
"login": "notmot",
|
||||
"id": 4649277,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4649277?v=4",
|
||||
"html_url": "https:\/\/github.com\/notmot"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/notmot\/CVE-2017-7648.",
|
||||
"description": "A writeup of CVE-2017-7648",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-10T18:41:59Z",
|
||||
"updated_at": "2017-04-10T18:47:31Z",
|
||||
"pushed_at": "2017-04-10T18:42:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2020-07-08T14:40:16Z",
|
||||
"updated_at": "2020-07-11T19:53:00Z",
|
||||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"forks_count": 327,
|
||||
"forks": 327,
|
||||
"watchers": 359,
|
||||
"watchers": 360,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-07-11T09:29:13Z",
|
||||
"updated_at": "2020-07-11T19:24:03Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 537,
|
||||
"watchers": 538,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2020-07-11T01:40:08Z",
|
||||
"updated_at": "2020-07-11T17:27:59Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 397,
|
||||
"watchers_count": 397,
|
||||
"stargazers_count": 398,
|
||||
"watchers_count": 398,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 397,
|
||||
"watchers": 398,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,6 +45,29 @@
|
|||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172198653,
|
||||
"name": "CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"full_name": "0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"owner": {
|
||||
"login": "0xtavian",
|
||||
"id": 21030907,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21030907?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xtavian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T10:00:03Z",
|
||||
"updated_at": "2020-04-20T00:16:50Z",
|
||||
"pushed_at": "2019-02-23T10:01:26Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 183322760,
|
||||
"name": "CVE-2019-1003000_RCE-DETECTION",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-07-09T17:00:35Z",
|
||||
"updated_at": "2020-07-11T15:48:34Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1591,
|
||||
"watchers_count": 1591,
|
||||
"forks_count": 228,
|
||||
"forks": 228,
|
||||
"watchers": 1591,
|
||||
"stargazers_count": 1592,
|
||||
"watchers_count": 1592,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1592,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2020-07-09T06:46:42Z",
|
||||
"updated_at": "2020-07-11T17:44:00Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 119,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2019/CVE-2019-1652.json
Normal file
25
2019/CVE-2019-1652.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 167347037,
|
||||
"name": "CiscoRV320Dump",
|
||||
"full_name": "0x27\/CiscoRV320Dump",
|
||||
"owner": {
|
||||
"login": "0x27",
|
||||
"id": 9094330,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9094330?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x27"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x27\/CiscoRV320Dump",
|
||||
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T10:12:44Z",
|
||||
"updated_at": "2020-06-12T03:47:41Z",
|
||||
"pushed_at": "2019-02-08T12:38:05Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 168361115,
|
||||
"name": "CVE-2019-1653",
|
||||
"full_name": "dubfr33\/CVE-2019-1653",
|
||||
"owner": {
|
||||
"login": "dubfr33",
|
||||
"id": 20056018,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20056018?v=4",
|
||||
"html_url": "https:\/\/github.com\/dubfr33"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dubfr33\/CVE-2019-1653",
|
||||
"description": "NSE script to scan for Cisco routers vulnerable to CVE-2019-1653",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-30T14:58:48Z",
|
||||
"updated_at": "2020-04-21T04:04:11Z",
|
||||
"pushed_at": "2019-01-30T15:01:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 178810790,
|
||||
"name": "CiscoSpill",
|
||||
|
|
48
2019/CVE-2019-3462.json
Normal file
48
2019/CVE-2019-3462.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 167275161,
|
||||
"name": "check_CVE-2019-3462",
|
||||
"full_name": "tonejito\/check_CVE-2019-3462",
|
||||
"owner": {
|
||||
"login": "tonejito",
|
||||
"id": 618588,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/618588?v=4",
|
||||
"html_url": "https:\/\/github.com\/tonejito"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
|
||||
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T00:30:15Z",
|
||||
"updated_at": "2019-01-26T01:21:38Z",
|
||||
"pushed_at": "2019-01-26T01:21:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170573944,
|
||||
"name": "update-apt-package",
|
||||
"full_name": "atilacastro\/update-apt-package",
|
||||
"owner": {
|
||||
"login": "atilacastro",
|
||||
"id": 5832809,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5832809?v=4",
|
||||
"html_url": "https:\/\/github.com\/atilacastro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/atilacastro\/update-apt-package",
|
||||
"description": "Playbook update APT package because CVE-2019-3462",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T20:22:33Z",
|
||||
"updated_at": "2019-02-14T18:31:31Z",
|
||||
"pushed_at": "2019-02-14T18:31:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,165 @@
|
|||
[
|
||||
{
|
||||
"id": 170398859,
|
||||
"name": "cve-2019-5736-poc",
|
||||
"full_name": "q3k\/cve-2019-5736-poc",
|
||||
"owner": {
|
||||
"login": "q3k",
|
||||
"id": 315234,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/315234?v=4",
|
||||
"html_url": "https:\/\/github.com\/q3k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/q3k\/cve-2019-5736-poc",
|
||||
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T22:07:47Z",
|
||||
"updated_at": "2020-04-06T10:46:09Z",
|
||||
"pushed_at": "2019-02-20T15:35:34Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170445833,
|
||||
"name": "CVE-2019-5736-PoC",
|
||||
"full_name": "Frichetten\/CVE-2019-5736-PoC",
|
||||
"owner": {
|
||||
"login": "Frichetten",
|
||||
"id": 10386884,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10386884?v=4",
|
||||
"html_url": "https:\/\/github.com\/Frichetten"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC",
|
||||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2020-07-11T05:53:11Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 391,
|
||||
"watchers_count": 391,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 391,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170613828,
|
||||
"name": "CVE-2019-5736",
|
||||
"full_name": "jas502n\/CVE-2019-5736",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-5736",
|
||||
"description": "runc容器逃逸漏洞预警",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-14T02:30:12Z",
|
||||
"updated_at": "2020-02-03T01:45:33Z",
|
||||
"pushed_at": "2019-02-14T02:40:55Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170656576,
|
||||
"name": "CVE-2019-5736",
|
||||
"full_name": "denmilu\/CVE-2019-5736",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-14T08:37:25Z",
|
||||
"updated_at": "2019-02-14T08:37:36Z",
|
||||
"pushed_at": "2019-02-14T08:37:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170656601,
|
||||
"name": "cve-2019-5736-poc",
|
||||
"full_name": "denmilu\/cve-2019-5736-poc",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/cve-2019-5736-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-14T08:37:39Z",
|
||||
"updated_at": "2019-02-14T08:37:49Z",
|
||||
"pushed_at": "2019-02-14T08:37:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170836971,
|
||||
"name": "cve-2019-5736-poc",
|
||||
"full_name": "agppp\/cve-2019-5736-poc",
|
||||
"owner": {
|
||||
"login": "agppp",
|
||||
"id": 10527860,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10527860?v=4",
|
||||
"html_url": "https:\/\/github.com\/agppp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/agppp\/cve-2019-5736-poc",
|
||||
"description": "getshell test",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T09:22:27Z",
|
||||
"updated_at": "2019-02-15T09:49:47Z",
|
||||
"pushed_at": "2019-02-15T09:49:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 171499608,
|
||||
"name": "poc-cve-2019-5736",
|
||||
"full_name": "ebdecastro\/poc-cve-2019-5736",
|
||||
"owner": {
|
||||
"login": "ebdecastro",
|
||||
"id": 46558799,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46558799?v=4",
|
||||
"html_url": "https:\/\/github.com\/ebdecastro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ebdecastro\/poc-cve-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-19T15:34:18Z",
|
||||
"updated_at": "2019-06-04T10:53:26Z",
|
||||
"pushed_at": "2019-02-19T15:37:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 171668415,
|
||||
"name": "RunC-CVE-2019-5736",
|
||||
|
@ -22,6 +183,29 @@
|
|||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 173057459,
|
||||
"name": "CVE-2019-5736-PoC-2",
|
||||
"full_name": "yyqs2008\/CVE-2019-5736-PoC-2",
|
||||
"owner": {
|
||||
"login": "yyqs2008",
|
||||
"id": 1332668,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1332668?v=4",
|
||||
"html_url": "https:\/\/github.com\/yyqs2008"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yyqs2008\/CVE-2019-5736-PoC-2",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-28T06:48:13Z",
|
||||
"updated_at": "2020-06-11T14:27:08Z",
|
||||
"pushed_at": "2019-02-23T13:20:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 174545720,
|
||||
"name": "CVE-2019-5736-PoC",
|
||||
|
|
25
2019/CVE-2019-5737.json
Normal file
25
2019/CVE-2019-5737.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 172282648,
|
||||
"name": "cve-2019-5737",
|
||||
"full_name": "beelzebruh\/cve-2019-5737",
|
||||
"owner": {
|
||||
"login": "beelzebruh",
|
||||
"id": 39379168,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39379168?v=4",
|
||||
"html_url": "https:\/\/github.com\/beelzebruh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/beelzebruh\/cve-2019-5737",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-24T01:20:04Z",
|
||||
"updated_at": "2020-05-12T03:29:52Z",
|
||||
"pushed_at": "2019-02-24T03:43:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-5893.json
Normal file
25
2019/CVE-2019-5893.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 165075365,
|
||||
"name": "OpenSource-ERP-SQL-Injection",
|
||||
"full_name": "EmreOvunc\/OpenSource-ERP-SQL-Injection",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/OpenSource-ERP-SQL-Injection",
|
||||
"description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-10T14:36:55Z",
|
||||
"updated_at": "2020-05-16T12:47:44Z",
|
||||
"pushed_at": "2019-01-11T07:45:37Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 168440280,
|
||||
"name": "OsirisJailbreak12",
|
||||
"full_name": "fatgrass\/OsirisJailbreak12",
|
||||
"owner": {
|
||||
"login": "fatgrass",
|
||||
"id": 19977419,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19977419?v=4",
|
||||
"html_url": "https:\/\/github.com\/fatgrass"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fatgrass\/OsirisJailbreak12",
|
||||
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-31T01:03:43Z",
|
||||
"updated_at": "2020-04-08T17:22:51Z",
|
||||
"pushed_at": "2019-01-31T00:53:03Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 194542840,
|
||||
"name": "CVE-2019-6225-macOS",
|
||||
|
|
25
2019/CVE-2019-6249.json
Normal file
25
2019/CVE-2019-6249.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 171827364,
|
||||
"name": "CVE-2019-6249_Hucart-cms",
|
||||
"full_name": "NMTech0x90\/CVE-2019-6249_Hucart-cms",
|
||||
"owner": {
|
||||
"login": "NMTech0x90",
|
||||
"id": 27001865,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/27001865?v=4",
|
||||
"html_url": "https:\/\/github.com\/NMTech0x90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NMTech0x90\/CVE-2019-6249_Hucart-cms",
|
||||
"description": "CVE-2019-6249 Hucart cms 复现环境",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-21T08:03:43Z",
|
||||
"updated_at": "2020-03-25T03:29:55Z",
|
||||
"pushed_at": "2019-02-21T08:22:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-6263.json
Normal file
25
2019/CVE-2019-6263.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 166368513,
|
||||
"name": "CVE-2019-6263-Joomla-POC",
|
||||
"full_name": "praveensutar\/CVE-2019-6263-Joomla-POC",
|
||||
"owner": {
|
||||
"login": "praveensutar",
|
||||
"id": 12555214,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12555214?v=4",
|
||||
"html_url": "https:\/\/github.com\/praveensutar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/praveensutar\/CVE-2019-6263-Joomla-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-01-18T08:10:11Z",
|
||||
"updated_at": "2019-09-12T15:02:55Z",
|
||||
"pushed_at": "2019-01-19T04:29:22Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,29 @@
|
|||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172217636,
|
||||
"name": "CVE-2019-6340",
|
||||
"full_name": "knqyf263\/CVE-2019-6340",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-6340",
|
||||
"description": "Environment for CVE-2019-6340 (Drupal)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T13:28:58Z",
|
||||
"updated_at": "2020-04-02T13:09:08Z",
|
||||
"pushed_at": "2019-02-23T17:34:19Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172429144,
|
||||
"name": "CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 164948400,
|
||||
"name": "ESFileExplorerOpenPortVuln",
|
||||
"full_name": "fs0c131y\/ESFileExplorerOpenPortVuln",
|
||||
"owner": {
|
||||
"login": "fs0c131y",
|
||||
"id": 36547191,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36547191?v=4",
|
||||
"html_url": "https:\/\/github.com\/fs0c131y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fs0c131y\/ESFileExplorerOpenPortVuln",
|
||||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2020-07-11T13:09:53Z",
|
||||
"pushed_at": "2019-01-22T21:00:36Z",
|
||||
"stargazers_count": 581,
|
||||
"watchers_count": 581,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"watchers": 581,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263921419,
|
||||
"name": "ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 171244957,
|
||||
"name": "cve-2019-6453-poc",
|
||||
"full_name": "proofofcalc\/cve-2019-6453-poc",
|
||||
"owner": {
|
||||
"login": "proofofcalc",
|
||||
"id": 47607270,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/47607270?v=4",
|
||||
"html_url": "https:\/\/github.com\/proofofcalc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/proofofcalc\/cve-2019-6453-poc",
|
||||
"description": "Proof of calc for CVE-2019-6453",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-18T08:35:03Z",
|
||||
"updated_at": "2020-05-29T08:59:39Z",
|
||||
"pushed_at": "2019-02-18T13:10:38Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 197653851,
|
||||
"name": "mIRC-CVE-2019-6453",
|
||||
|
|
25
2019/CVE-2019-6487.json
Normal file
25
2019/CVE-2019-6487.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 166241615,
|
||||
"name": "TP-Link-WDR-Router-Command-injection_POC",
|
||||
"full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC",
|
||||
"owner": {
|
||||
"login": "afang5472",
|
||||
"id": 18503100,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18503100?v=4",
|
||||
"html_url": "https:\/\/github.com\/afang5472"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC",
|
||||
"description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-17T14:44:12Z",
|
||||
"updated_at": "2020-07-10T12:22:52Z",
|
||||
"pushed_at": "2019-01-19T10:49:21Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-7216.json
Normal file
25
2019/CVE-2019-7216.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 168365175,
|
||||
"name": "CVE-2019-7216",
|
||||
"full_name": "Ekultek\/CVE-2019-7216",
|
||||
"owner": {
|
||||
"login": "Ekultek",
|
||||
"id": 14183473,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ekultek"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ekultek\/CVE-2019-7216",
|
||||
"description": "Filechucker filter bypass Proof Of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-30T15:23:40Z",
|
||||
"updated_at": "2020-03-30T04:22:37Z",
|
||||
"pushed_at": "2019-02-01T16:56:53Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 107,
|
||||
"watchers": 511,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170741210,
|
||||
"name": "CVE-2019-7304_DirtySock",
|
||||
"full_name": "SecuritySi\/CVE-2019-7304_DirtySock",
|
||||
"owner": {
|
||||
"login": "SecuritySi",
|
||||
"id": 7517443,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7517443?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecuritySi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecuritySi\/CVE-2019-7304_DirtySock",
|
||||
"description": "Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-14T18:48:56Z",
|
||||
"updated_at": "2019-03-05T06:03:09Z",
|
||||
"pushed_at": "2019-02-14T18:49:32Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-8389.json
Normal file
25
2019/CVE-2019-8389.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 171097356,
|
||||
"name": "CVE-2019-8389",
|
||||
"full_name": "shawarkhanethicalhacker\/CVE-2019-8389",
|
||||
"owner": {
|
||||
"login": "shawarkhanethicalhacker",
|
||||
"id": 41706151,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/41706151?v=4",
|
||||
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker\/CVE-2019-8389",
|
||||
"description": " [CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application ",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-17T08:10:50Z",
|
||||
"updated_at": "2019-12-06T13:47:51Z",
|
||||
"pushed_at": "2019-02-17T08:40:06Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -933,13 +933,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-07-10T10:10:32Z",
|
||||
"updated_at": "2020-07-11T15:41:04Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 971,
|
||||
"watchers_count": 971,
|
||||
"stargazers_count": 972,
|
||||
"watchers_count": 972,
|
||||
"forks_count": 319,
|
||||
"forks": 319,
|
||||
"watchers": 971,
|
||||
"watchers": 972,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1416,13 +1416,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2020-07-11T14:21:20Z",
|
||||
"updated_at": "2020-07-11T19:38:55Z",
|
||||
"pushed_at": "2020-07-08T08:26:24Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Technical Write-Up on and PoC Exploit for CVE-2020-11519 and CVE-2020-11520",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-30T23:01:33Z",
|
||||
"updated_at": "2020-07-10T18:02:59Z",
|
||||
"updated_at": "2020-07-11T18:43:38Z",
|
||||
"pushed_at": "2020-07-10T10:39:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -979,8 +979,8 @@
|
|||
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T15:33:00Z",
|
||||
"updated_at": "2020-07-11T13:55:10Z",
|
||||
"pushed_at": "2020-07-11T07:44:13Z",
|
||||
"updated_at": "2020-07-11T18:38:36Z",
|
||||
"pushed_at": "2020-07-11T18:38:34Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Citrix ADC Vulns",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T20:00:17Z",
|
||||
"updated_at": "2020-07-11T14:46:51Z",
|
||||
"updated_at": "2020-07-11T17:35:26Z",
|
||||
"pushed_at": "2020-07-10T21:03:20Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
239
README.md
239
README.md
|
@ -2057,12 +2057,21 @@ Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier
|
|||
|
||||
- [securifera/CVE-2019-1579](https://github.com/securifera/CVE-2019-1579)
|
||||
|
||||
### CVE-2019-1652
|
||||
|
||||
<code>
|
||||
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
|
||||
</code>
|
||||
|
||||
- [0x27/CiscoRV320Dump](https://github.com/0x27/CiscoRV320Dump)
|
||||
|
||||
### CVE-2019-1653
|
||||
|
||||
<code>
|
||||
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
|
||||
</code>
|
||||
|
||||
- [dubfr33/CVE-2019-1653](https://github.com/dubfr33/CVE-2019-1653)
|
||||
- [shaheemirza/CiscoSpill](https://github.com/shaheemirza/CiscoSpill)
|
||||
|
||||
### CVE-2019-1759
|
||||
|
@ -2261,6 +2270,15 @@ Confluence Server and Data Center had a path traversal vulnerability in the down
|
|||
|
||||
- [superevr/cve-2019-3398](https://github.com/superevr/cve-2019-3398)
|
||||
|
||||
### CVE-2019-3462
|
||||
|
||||
<code>
|
||||
Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
|
||||
</code>
|
||||
|
||||
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
|
||||
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
|
||||
|
||||
### CVE-2019-3663
|
||||
|
||||
<code>
|
||||
|
@ -2396,7 +2414,15 @@ NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vu
|
|||
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
|
||||
</code>
|
||||
|
||||
- [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc)
|
||||
- [Frichetten/CVE-2019-5736-PoC](https://github.com/Frichetten/CVE-2019-5736-PoC)
|
||||
- [jas502n/CVE-2019-5736](https://github.com/jas502n/CVE-2019-5736)
|
||||
- [denmilu/CVE-2019-5736](https://github.com/denmilu/CVE-2019-5736)
|
||||
- [denmilu/cve-2019-5736-poc](https://github.com/denmilu/cve-2019-5736-poc)
|
||||
- [agppp/cve-2019-5736-poc](https://github.com/agppp/cve-2019-5736-poc)
|
||||
- [ebdecastro/poc-cve-2019-5736](https://github.com/ebdecastro/poc-cve-2019-5736)
|
||||
- [twistlock/RunC-CVE-2019-5736](https://github.com/twistlock/RunC-CVE-2019-5736)
|
||||
- [yyqs2008/CVE-2019-5736-PoC-2](https://github.com/yyqs2008/CVE-2019-5736-PoC-2)
|
||||
- [zyriuse75/CVE-2019-5736-PoC](https://github.com/zyriuse75/CVE-2019-5736-PoC)
|
||||
- [stillan00b/CVE-2019-5736](https://github.com/stillan00b/CVE-2019-5736)
|
||||
- [milloni/cve-2019-5736-exp](https://github.com/milloni/cve-2019-5736-exp)
|
||||
|
@ -2410,6 +2436,14 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow
|
|||
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
|
||||
- [shen54/IT19172088](https://github.com/shen54/IT19172088)
|
||||
|
||||
### CVE-2019-5737
|
||||
|
||||
<code>
|
||||
In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.
|
||||
</code>
|
||||
|
||||
- [beelzebruh/cve-2019-5737](https://github.com/beelzebruh/cve-2019-5737)
|
||||
|
||||
### CVE-2019-5786
|
||||
|
||||
<code>
|
||||
|
@ -2434,6 +2468,14 @@ Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed
|
|||
|
||||
- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825)
|
||||
|
||||
### CVE-2019-5893
|
||||
|
||||
<code>
|
||||
Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.
|
||||
</code>
|
||||
|
||||
- [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection)
|
||||
|
||||
### CVE-2019-6111
|
||||
|
||||
<code>
|
||||
|
@ -2466,9 +2508,18 @@ An out-of-bounds read issue existed that led to the disclosure of kernel memory.
|
|||
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges.
|
||||
</code>
|
||||
|
||||
- [fatgrass/OsirisJailbreak12](https://github.com/fatgrass/OsirisJailbreak12)
|
||||
- [TrungNguyen1909/CVE-2019-6225-macOS](https://github.com/TrungNguyen1909/CVE-2019-6225-macOS)
|
||||
- [raystyle/jailbreak-iOS12](https://github.com/raystyle/jailbreak-iOS12)
|
||||
|
||||
### CVE-2019-6249
|
||||
|
||||
<code>
|
||||
An issue was discovered in HuCart v5.7.4. There is a CSRF vulnerability that can add an admin account via /adminsys/index.php?load=admins&act=edit_info&act_type=add.
|
||||
</code>
|
||||
|
||||
- [NMTech0x90/CVE-2019-6249_Hucart-cms](https://github.com/NMTech0x90/CVE-2019-6249_Hucart-cms)
|
||||
|
||||
### CVE-2019-6260
|
||||
|
||||
<code>
|
||||
|
@ -2477,6 +2528,14 @@ The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and
|
|||
|
||||
- [amboar/cve-2019-6260](https://github.com/amboar/cve-2019-6260)
|
||||
|
||||
### CVE-2019-6263
|
||||
|
||||
<code>
|
||||
An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS.
|
||||
</code>
|
||||
|
||||
- [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC)
|
||||
|
||||
### CVE-2019-6329
|
||||
|
||||
<code>
|
||||
|
@ -2492,6 +2551,7 @@ Some field types do not properly sanitize data from non-form sources in Drupal 8
|
|||
</code>
|
||||
|
||||
- [g0rx/Drupal-SA-CORE-2019-003](https://github.com/g0rx/Drupal-SA-CORE-2019-003)
|
||||
- [knqyf263/CVE-2019-6340](https://github.com/knqyf263/CVE-2019-6340)
|
||||
- [DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass](https://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass)
|
||||
- [oways/CVE-2019-6340](https://github.com/oways/CVE-2019-6340)
|
||||
- [cved-sources/cve-2019-6340](https://github.com/cved-sources/cve-2019-6340)
|
||||
|
@ -2520,6 +2580,7 @@ Zemana AntiMalware before 3.0.658 Beta mishandles update logic.
|
|||
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
|
||||
</code>
|
||||
|
||||
- [fs0c131y/ESFileExplorerOpenPortVuln](https://github.com/fs0c131y/ESFileExplorerOpenPortVuln)
|
||||
- [SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447](https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447)
|
||||
|
||||
### CVE-2019-6453
|
||||
|
@ -2528,6 +2589,7 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
|
|||
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
|
||||
</code>
|
||||
|
||||
- [proofofcalc/cve-2019-6453-poc](https://github.com/proofofcalc/cve-2019-6453-poc)
|
||||
- [andripwn/mIRC-CVE-2019-6453](https://github.com/andripwn/mIRC-CVE-2019-6453)
|
||||
|
||||
### CVE-2019-6467
|
||||
|
@ -2538,6 +2600,14 @@ A programming error in the nxdomain-redirect feature can cause an assertion fail
|
|||
|
||||
- [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467)
|
||||
|
||||
### CVE-2019-6487
|
||||
|
||||
<code>
|
||||
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
|
||||
</code>
|
||||
|
||||
- [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC)
|
||||
|
||||
### CVE-2019-6690
|
||||
|
||||
<code>
|
||||
|
@ -2564,6 +2634,14 @@ This improper access control vulnerability allows remote attackers to gain unaut
|
|||
- [cycraft-corp/cve-2019-7192-check](https://github.com/cycraft-corp/cve-2019-7192-check)
|
||||
- [th3gundy/CVE-2019-7192_QNAP_Exploit](https://github.com/th3gundy/CVE-2019-7192_QNAP_Exploit)
|
||||
|
||||
### CVE-2019-7216
|
||||
|
||||
<code>
|
||||
An issue was discovered in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php.
|
||||
</code>
|
||||
|
||||
- [Ekultek/CVE-2019-7216](https://github.com/Ekultek/CVE-2019-7216)
|
||||
|
||||
### CVE-2019-7219
|
||||
|
||||
<code>
|
||||
|
@ -2590,6 +2668,7 @@ Canonical snapd before version 2.37.1 incorrectly performed socket owner validat
|
|||
</code>
|
||||
|
||||
- [initstring/dirty_sock](https://github.com/initstring/dirty_sock)
|
||||
- [SecuritySi/CVE-2019-7304_DirtySock](https://github.com/SecuritySi/CVE-2019-7304_DirtySock)
|
||||
|
||||
### CVE-2019-7482
|
||||
|
||||
|
@ -2644,6 +2723,14 @@ ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 a
|
|||
|
||||
- [securifera/CVE-2019-7839](https://github.com/securifera/CVE-2019-7839)
|
||||
|
||||
### CVE-2019-8389
|
||||
|
||||
<code>
|
||||
A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicloud 1.6. By default, the application runs a transfer service on port 8080, accessible by everyone on the same Wi-Fi network. An attacker can send the POST parameters downfiles and cur-folder (with a crafted ../ payload) to the download.script endpoint. This will create a MusicPlayerArchive.zip archive that is publicly accessible and includes the content of any requested file (such as the /etc/passwd file).
|
||||
</code>
|
||||
|
||||
- [shawarkhanethicalhacker/CVE-2019-8389](https://github.com/shawarkhanethicalhacker/CVE-2019-8389)
|
||||
|
||||
### CVE-2019-8446
|
||||
|
||||
<code>
|
||||
|
@ -4765,6 +4852,7 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
|
|||
|
||||
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
|
||||
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
|
||||
- [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
|
||||
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
|
||||
|
||||
### CVE-2019-1010054
|
||||
|
@ -7985,22 +8073,6 @@ The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Serv
|
|||
|
||||
- [sheri31/0005poc](https://github.com/sheri31/0005poc)
|
||||
|
||||
### CVE-2017-0038
|
||||
|
||||
<code>
|
||||
gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3216, CVE-2016-3219, and/or CVE-2016-3220.
|
||||
</code>
|
||||
|
||||
- [k0keoyo/CVE-2017-0038-EXP-C-JS](https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS)
|
||||
|
||||
### CVE-2017-0065
|
||||
|
||||
<code>
|
||||
Microsoft Edge allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0011, CVE-2017-0017, and CVE-2017-0068.
|
||||
</code>
|
||||
|
||||
- [Dankirk/cve-2017-0065](https://github.com/Dankirk/cve-2017-0065)
|
||||
|
||||
### CVE-2017-0075
|
||||
|
||||
<code>
|
||||
|
@ -8009,22 +8081,6 @@ Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows
|
|||
|
||||
- [4B5F5F4B/HyperV](https://github.com/4B5F5F4B/HyperV)
|
||||
|
||||
### CVE-2017-0106
|
||||
|
||||
<code>
|
||||
Microsoft Excel 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
|
||||
</code>
|
||||
|
||||
- [ryhanson/CVE-2017-0106](https://github.com/ryhanson/CVE-2017-0106)
|
||||
|
||||
### CVE-2017-0108
|
||||
|
||||
<code>
|
||||
The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0014.
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-0108](https://github.com/homjxi0e/CVE-2017-0108)
|
||||
|
||||
### CVE-2017-0143
|
||||
|
||||
<code>
|
||||
|
@ -8056,14 +8112,8 @@ The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2
|
|||
Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
|
||||
</code>
|
||||
|
||||
- [ryhanson/CVE-2017-0199](https://github.com/ryhanson/CVE-2017-0199)
|
||||
- [SyFi/cve-2017-0199](https://github.com/SyFi/cve-2017-0199)
|
||||
- [bhdresh/CVE-2017-0199](https://github.com/bhdresh/CVE-2017-0199)
|
||||
- [NotAwful/CVE-2017-0199-Fix](https://github.com/NotAwful/CVE-2017-0199-Fix)
|
||||
- [haibara3839/CVE-2017-0199-master](https://github.com/haibara3839/CVE-2017-0199-master)
|
||||
- [Exploit-install/CVE-2017-0199](https://github.com/Exploit-install/CVE-2017-0199)
|
||||
- [zakybstrd21215/PoC-CVE-2017-0199](https://github.com/zakybstrd21215/PoC-CVE-2017-0199)
|
||||
- [n1shant-sinha/CVE-2017-0199](https://github.com/n1shant-sinha/CVE-2017-0199)
|
||||
- [kn0wm4d/htattack](https://github.com/kn0wm4d/htattack)
|
||||
- [joke998/Cve-2017-0199](https://github.com/joke998/Cve-2017-0199)
|
||||
- [joke998/Cve-2017-0199-](https://github.com/joke998/Cve-2017-0199-)
|
||||
|
@ -8074,14 +8124,6 @@ Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1,
|
|||
- [jacobsoo/RTF-Cleaner](https://github.com/jacobsoo/RTF-Cleaner)
|
||||
- [denmilu/CVE-2017-0199](https://github.com/denmilu/CVE-2017-0199)
|
||||
|
||||
### CVE-2017-0204
|
||||
|
||||
<code>
|
||||
Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to bypass the Office Protected View via a specially crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability."
|
||||
</code>
|
||||
|
||||
- [ryhanson/CVE-2017-0204](https://github.com/ryhanson/CVE-2017-0204)
|
||||
|
||||
### CVE-2017-0213
|
||||
|
||||
<code>
|
||||
|
@ -8142,7 +8184,6 @@ An elevation of privilege vulnerability in the Framework APIs could enable a loc
|
|||
A remote code execution vulnerability in the Framesequence library could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses the Framesequence library. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33718716.
|
||||
</code>
|
||||
|
||||
- [JiounDai/CVE-2017-0478](https://github.com/JiounDai/CVE-2017-0478)
|
||||
- [denmilu/CVE-2017-0478](https://github.com/denmilu/CVE-2017-0478)
|
||||
|
||||
### CVE-2017-0541
|
||||
|
@ -8151,7 +8192,6 @@ A remote code execution vulnerability in the Framesequence library could enable
|
|||
A remote code execution vulnerability in sonivox in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-34031018.
|
||||
</code>
|
||||
|
||||
- [JiounDai/CVE-2017-0541](https://github.com/JiounDai/CVE-2017-0541)
|
||||
- [denmilu/CVE-2017-0541](https://github.com/denmilu/CVE-2017-0541)
|
||||
|
||||
### CVE-2017-0554
|
||||
|
@ -8233,9 +8273,6 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
|
|||
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app.
|
||||
</code>
|
||||
|
||||
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
|
||||
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
|
||||
- [Rootkitsmm/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm/extra_recipe-iOS-10.2)
|
||||
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
|
||||
|
||||
### CVE-2017-2388
|
||||
|
@ -8246,14 +8283,6 @@ An issue was discovered in certain Apple products. macOS before 10.12.4 is affec
|
|||
|
||||
- [bazad/IOFireWireFamily-null-deref](https://github.com/bazad/IOFireWireFamily-null-deref)
|
||||
|
||||
### CVE-2017-2636
|
||||
|
||||
<code>
|
||||
Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
|
||||
</code>
|
||||
|
||||
- [alexzorin/cve-2017-2636-el](https://github.com/alexzorin/cve-2017-2636-el)
|
||||
|
||||
### CVE-2017-2666
|
||||
|
||||
<code>
|
||||
|
@ -8344,21 +8373,12 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
|
||||
- [ianxtianxt/CVE-2017-3506](https://github.com/ianxtianxt/CVE-2017-3506)
|
||||
|
||||
### CVE-2017-3599
|
||||
|
||||
<code>
|
||||
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet.
|
||||
</code>
|
||||
|
||||
- [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599)
|
||||
|
||||
### CVE-2017-3730
|
||||
|
||||
<code>
|
||||
In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
|
||||
</code>
|
||||
|
||||
- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730)
|
||||
- [ymmah/OpenSSL-CVE-2017-3730](https://github.com/ymmah/OpenSSL-CVE-2017-3730)
|
||||
|
||||
### CVE-2017-3881
|
||||
|
@ -8367,8 +8387,6 @@ In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters fo
|
|||
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
|
||||
</code>
|
||||
|
||||
- [artkond/cisco-rce](https://github.com/artkond/cisco-rce)
|
||||
- [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-)
|
||||
- [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco)
|
||||
- [zakybstrd21215/PoC-CVE-2017-3881](https://github.com/zakybstrd21215/PoC-CVE-2017-3881)
|
||||
- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881)
|
||||
|
@ -8388,14 +8406,6 @@ An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications t
|
|||
|
||||
- [cved-sources/cve-2017-4971](https://github.com/cved-sources/cve-2017-4971)
|
||||
|
||||
### CVE-2017-5005
|
||||
|
||||
<code>
|
||||
Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earlier, Total Security 10.1.0.316 and earlier, and AntiVirus Pro 10.1.0.316 and earlier on OS X allows remote attackers to execute arbitrary code via a crafted LC_UNIXTHREAD.cmdsize field in a Mach-O file that is mishandled during a Security Scan (aka Custom Scan) operation.
|
||||
</code>
|
||||
|
||||
- [payatu/QuickHeal](https://github.com/payatu/QuickHeal)
|
||||
|
||||
### CVE-2017-5007
|
||||
|
||||
<code>
|
||||
|
@ -8427,14 +8437,6 @@ An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method a
|
|||
|
||||
- [cscli/CVE-2017-5223](https://github.com/cscli/CVE-2017-5223)
|
||||
|
||||
### CVE-2017-5415
|
||||
|
||||
<code>
|
||||
An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and further spoofing attacks. This vulnerability affects Firefox < 52.
|
||||
</code>
|
||||
|
||||
- [649/CVE-2017-5415](https://github.com/649/CVE-2017-5415)
|
||||
|
||||
### CVE-2017-5487
|
||||
|
||||
<code>
|
||||
|
@ -8446,46 +8448,16 @@ wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST AP
|
|||
- [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487)
|
||||
- [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit)
|
||||
|
||||
### CVE-2017-5633
|
||||
|
||||
<code>
|
||||
Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs.
|
||||
</code>
|
||||
|
||||
- [cardangi/Exploit-CVE-2017-5633](https://github.com/cardangi/Exploit-CVE-2017-5633)
|
||||
|
||||
### CVE-2017-5638
|
||||
|
||||
<code>
|
||||
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
|
||||
</code>
|
||||
|
||||
- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045)
|
||||
- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp)
|
||||
- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638)
|
||||
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
|
||||
- [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro)
|
||||
- [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638)
|
||||
- [immunio/apache-struts2-CVE-2017-5638](https://github.com/immunio/apache-struts2-CVE-2017-5638)
|
||||
- [Masahiro-Yamada/OgnlContentTypeRejectorValve](https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValve)
|
||||
- [aljazceru/CVE-2017-5638-Apache-Struts2](https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2)
|
||||
- [sjitech/test_struts2_vulnerability_CVE-2017-5638](https://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638)
|
||||
- [jrrombaldo/CVE-2017-5638](https://github.com/jrrombaldo/CVE-2017-5638)
|
||||
- [random-robbie/CVE-2017-5638](https://github.com/random-robbie/CVE-2017-5638)
|
||||
- [initconf/CVE-2017-5638_struts](https://github.com/initconf/CVE-2017-5638_struts)
|
||||
- [mazen160/struts-pwn](https://github.com/mazen160/struts-pwn)
|
||||
- [ret2jazzy/Struts-Apache-ExploitPack](https://github.com/ret2jazzy/Struts-Apache-ExploitPack)
|
||||
- [lolwaleet/ExpStruts](https://github.com/lolwaleet/ExpStruts)
|
||||
- [oktavianto/CVE-2017-5638-Apache-Struts2](https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2)
|
||||
- [jrrdev/cve-2017-5638](https://github.com/jrrdev/cve-2017-5638)
|
||||
- [opt9/Strutshock](https://github.com/opt9/Strutshock)
|
||||
- [falcon-lnhg/StrutsShell](https://github.com/falcon-lnhg/StrutsShell)
|
||||
- [bhagdave/CVE-2017-5638](https://github.com/bhagdave/CVE-2017-5638)
|
||||
- [jas502n/st2-046-poc](https://github.com/jas502n/st2-046-poc)
|
||||
- [KarzsGHR/S2-046_S2-045_POC](https://github.com/KarzsGHR/S2-046_S2-045_POC)
|
||||
- [gsfish/S2-Reaper](https://github.com/gsfish/S2-Reaper)
|
||||
- [mcassano/cve-2017-5638](https://github.com/mcassano/cve-2017-5638)
|
||||
- [opt9/Strutscli](https://github.com/opt9/Strutscli)
|
||||
- [tahmed11/strutsy](https://github.com/tahmed11/strutsy)
|
||||
- [payatu/CVE-2017-5638](https://github.com/payatu/CVE-2017-5638)
|
||||
- [Aasron/Struts2-045-Exp](https://github.com/Aasron/Struts2-045-Exp)
|
||||
|
@ -8649,14 +8621,6 @@ D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DG
|
|||
|
||||
- [varangamin/CVE-2017-6206](https://github.com/varangamin/CVE-2017-6206)
|
||||
|
||||
### CVE-2017-6370
|
||||
|
||||
<code>
|
||||
TYPO3 7.6.15 sends an http request to an index.php?loginProvider URI in cases with an https Referer, which allows remote attackers to obtain sensitive cleartext information by sniffing the network and reading the userident and username fields.
|
||||
</code>
|
||||
|
||||
- [faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request](https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request)
|
||||
|
||||
### CVE-2017-6558
|
||||
|
||||
<code>
|
||||
|
@ -8696,7 +8660,6 @@ Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.
|
|||
AlienVault USM and OSSIM before 5.3.7 and NfSen before 1.3.8 allow remote authenticated users to execute arbitrary commands in a privileged context, or launch a reverse shell, via vectors involving the PHP session ID and the NfSen PHP code, aka AlienVault ID ENG-104862.
|
||||
</code>
|
||||
|
||||
- [patrickfreed/nfsen-exploit](https://github.com/patrickfreed/nfsen-exploit)
|
||||
- [KeyStrOke95/nfsen_1.3.7_CVE-2017-6971](https://github.com/KeyStrOke95/nfsen_1.3.7_CVE-2017-6971)
|
||||
|
||||
### CVE-2017-7038
|
||||
|
@ -8758,31 +8721,13 @@ The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel
|
|||
- [rockl/cve-2017-7184](https://github.com/rockl/cve-2017-7184)
|
||||
- [rockl/cve-2017-7184-bak](https://github.com/rockl/cve-2017-7184-bak)
|
||||
|
||||
### CVE-2017-7188
|
||||
|
||||
<code>
|
||||
Zurmo 3.1.1 Stable allows a Cross-Site Scripting (XSS) attack with a base64-encoded SCRIPT element within a data: URL in the returnUrl parameter to default/toggleCollapse.
|
||||
</code>
|
||||
|
||||
- [faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC](https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC)
|
||||
|
||||
### CVE-2017-7269
|
||||
|
||||
<code>
|
||||
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
|
||||
</code>
|
||||
|
||||
- [eliuha/webdav_exploit](https://github.com/eliuha/webdav_exploit)
|
||||
- [lcatro/CVE-2017-7269-Echo-PoC](https://github.com/lcatro/CVE-2017-7269-Echo-PoC)
|
||||
- [caicai1355/CVE-2017-7269-exploit](https://github.com/caicai1355/CVE-2017-7269-exploit)
|
||||
- [M1a0rz/CVE-2017-7269](https://github.com/M1a0rz/CVE-2017-7269)
|
||||
- [whiteHat001/cve-2017-7269picture](https://github.com/whiteHat001/cve-2017-7269picture)
|
||||
- [zcgonvh/cve-2017-7269](https://github.com/zcgonvh/cve-2017-7269)
|
||||
- [jrrombaldo/CVE-2017-7269](https://github.com/jrrombaldo/CVE-2017-7269)
|
||||
- [g0rx/iis6-exploit-2017-CVE-2017-7269](https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269)
|
||||
- [slimpagey/IIS_6.0_WebDAV_Ruby](https://github.com/slimpagey/IIS_6.0_WebDAV_Ruby)
|
||||
- [homjxi0e/cve-2017-7269](https://github.com/homjxi0e/cve-2017-7269)
|
||||
- [xiaovpn/CVE-2017-7269](https://github.com/xiaovpn/CVE-2017-7269)
|
||||
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
|
||||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
|
@ -8857,14 +8802,6 @@ Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer
|
|||
- [cyberk1w1/CVE-2017-7529](https://github.com/cyberk1w1/CVE-2017-7529)
|
||||
- [cyberharsh/nginx-CVE-2017-7529](https://github.com/cyberharsh/nginx-CVE-2017-7529)
|
||||
|
||||
### CVE-2017-7648
|
||||
|
||||
<code>
|
||||
Foscam networked devices use the same hardcoded SSL private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
|
||||
</code>
|
||||
|
||||
- [notmot/CVE-2017-7648.](https://github.com/notmot/CVE-2017-7648.)
|
||||
|
||||
### CVE-2017-7679
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue