Auto Update 2023/08/29 14:04:40

This commit is contained in:
motikan2010-bot 2023-08-29 23:04:40 +09:00
parent 5c503a3444
commit 3f72ffa1bb
94 changed files with 1296 additions and 1286 deletions

View file

@ -28,35 +28,5 @@
"watchers": 15,
"score": 0,
"subscribers_count": 3
},
{
"id": 62456741,
"name": "jboss-autopwn",
"full_name": "gitcollect\/jboss-autopwn",
"owner": {
"login": "gitcollect",
"id": 17906239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17906239?v=4",
"html_url": "https:\/\/github.com\/gitcollect"
},
"html_url": "https:\/\/github.com\/gitcollect\/jboss-autopwn",
"description": "JBoss Autopwn CVE-2010-0738 JBoss authentication bypass ",
"fork": false,
"created_at": "2016-07-02T15:17:07Z",
"updated_at": "2018-06-15T07:31:47Z",
"pushed_at": "2016-04-03T09:57:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,34 +1,4 @@
[
{
"id": 69224981,
"name": "cve-2010-3333",
"full_name": "whiteHat001\/cve-2010-3333",
"owner": {
"login": "whiteHat001",
"id": 18191034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18191034?v=4",
"html_url": "https:\/\/github.com\/whiteHat001"
},
"html_url": "https:\/\/github.com\/whiteHat001\/cve-2010-3333",
"description": null,
"fork": false,
"created_at": "2016-09-26T07:35:41Z",
"updated_at": "2016-09-26T07:35:41Z",
"pushed_at": "2016-09-26T08:19:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 524884923,
"name": "CVE-2010-3333-reproduction",

View file

@ -1,32 +0,0 @@
[
{
"id": 37162047,
"name": "-cve-2010-3904-report",
"full_name": "redhatkaty\/-cve-2010-3904-report",
"owner": {
"login": "redhatkaty",
"id": 5626053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5626053?v=4",
"html_url": "https:\/\/github.com\/redhatkaty"
},
"html_url": "https:\/\/github.com\/redhatkaty\/-cve-2010-3904-report",
"description": null,
"fork": false,
"created_at": "2015-06-09T22:27:23Z",
"updated_at": "2016-09-04T16:50:01Z",
"pushed_at": "2015-06-09T22:45:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -2073,5 +2073,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 684457708,
"name": "CVE-2014-6271_pwnable",
"full_name": "hanmin0512\/CVE-2014-6271_pwnable",
"owner": {
"login": "hanmin0512",
"id": 37041208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37041208?v=4",
"html_url": "https:\/\/github.com\/hanmin0512"
},
"html_url": "https:\/\/github.com\/hanmin0512\/CVE-2014-6271_pwnable",
"description": null,
"fork": false,
"created_at": "2023-08-29T06:58:26Z",
"updated_at": "2023-08-29T07:31:52Z",
"pushed_at": "2023-08-29T07:32:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-28T09:44:30Z",
"updated_at": "2023-08-29T13:24:01Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1774,
"watchers_count": 1774,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 331,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1774,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 493,
"watchers_count": 493,
"has_discussions": false,
"forks_count": 196,
"forks_count": 195,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 196,
"forks": 195,
"watchers": 493,
"score": 0,
"subscribers_count": 39

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-28T09:44:30Z",
"updated_at": "2023-08-29T13:24:01Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1774,
"watchers_count": 1774,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 331,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1774,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -179,36 +179,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 580053579,
"name": "CVE-2017-5487.exploit",
"full_name": "Sabotase-Syndicate-Team\/CVE-2017-5487.exploit",
"owner": {
"login": "Sabotase-Syndicate-Team",
"id": 120641620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120641620?v=4",
"html_url": "https:\/\/github.com\/Sabotase-Syndicate-Team"
},
"html_url": "https:\/\/github.com\/Sabotase-Syndicate-Team\/CVE-2017-5487.exploit",
"description": null,
"fork": false,
"created_at": "2022-12-19T15:50:55Z",
"updated_at": "2022-12-19T16:05:48Z",
"pushed_at": "2022-12-19T16:04:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 594614443,
"name": "CVE-2017-5487",

View file

@ -75,10 +75,10 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2023-05-27T19:14:25Z",
"updated_at": "2023-08-29T08:16:09Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 247,
"watchers_count": 247,
"stargazers_count": 248,
"watchers_count": 248,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 78,
"watchers": 247,
"watchers": 248,
"score": 0,
"subscribers_count": 17
},

32
2018/CVE-2018-10920.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 167577440,
"name": "CVE-2018-10920_PoC",
"full_name": "shutingrz\/CVE-2018-10920_PoC",
"owner": {
"login": "shutingrz",
"id": 2587857,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2587857?v=4",
"html_url": "https:\/\/github.com\/shutingrz"
},
"html_url": "https:\/\/github.com\/shutingrz\/CVE-2018-10920_PoC",
"description": "Knot Resolver CVE-2018-10920 \/ DO NOT ABUSE",
"fork": false,
"created_at": "2019-01-25T16:24:49Z",
"updated_at": "2021-12-05T20:25:35Z",
"pushed_at": "2019-01-25T16:26:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -209,41 +209,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 153643745,
"name": "hunt-for-cve-2018-10933",
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
"owner": {
"login": "marco-lancini",
"id": 1472968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
"html_url": "https:\/\/github.com\/marco-lancini"
},
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
"fork": false,
"created_at": "2018-10-18T15:08:25Z",
"updated_at": "2023-06-20T11:06:21Z",
"pushed_at": "2018-10-18T15:11:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"elasticsearch",
"exploit",
"nmap",
"pentesting"
],
"visibility": "public",
"forks": 4,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 153675108,
"name": "cve-2018-10933",
@ -428,36 +393,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 153975086,
"name": "pythonprojects-CVE-2018-10933",
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
"owner": {
"login": "shifa123",
"id": 18241082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
"html_url": "https:\/\/github.com\/shifa123"
},
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-21T05:01:12Z",
"updated_at": "2022-01-03T19:20:42Z",
"pushed_at": "2018-10-21T05:13:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 154050332,
"name": "CVE-2018-10933",
@ -758,6 +693,36 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 169983604,
"name": "LibSSH-exploit",
"full_name": "Kurlee\/LibSSH-exploit",
"owner": {
"login": "Kurlee",
"id": 44727604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44727604?v=4",
"html_url": "https:\/\/github.com\/Kurlee"
},
"html_url": "https:\/\/github.com\/Kurlee\/LibSSH-exploit",
"description": "Takes advantage of CVE-2018-10933",
"fork": false,
"created_at": "2019-02-10T13:55:06Z",
"updated_at": "2019-02-10T14:02:29Z",
"pushed_at": "2019-02-10T14:02:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 223548534,
"name": "Libssh-server-CVE-2018-10933",

32
2018/CVE-2018-11761.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 167112093,
"name": "CVE-2018-11761",
"full_name": "brianwrf\/CVE-2018-11761",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11761",
"description": "Apache Tika Denial of Service Vulnerability (CVE-2018-11761)",
"fork": false,
"created_at": "2019-01-23T03:40:26Z",
"updated_at": "2021-06-22T12:32:25Z",
"pushed_at": "2019-01-23T03:44:46Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 2
}
]

32
2018/CVE-2018-11788.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 164298909,
"name": "CVE-2018-11788",
"full_name": "brianwrf\/CVE-2018-11788",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11788",
"description": "Apache Karaf XXE Vulnerability (CVE-2018-11788)",
"fork": false,
"created_at": "2019-01-06T11:01:39Z",
"updated_at": "2023-06-07T08:56:29Z",
"pushed_at": "2019-01-06T11:50:43Z",
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 38,
"score": 0,
"subscribers_count": 2
}
]

32
2018/CVE-2018-13410.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 171778059,
"name": "zip",
"full_name": "shinecome\/zip",
"owner": {
"login": "shinecome",
"id": 10205789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10205789?v=4",
"html_url": "https:\/\/github.com\/shinecome"
},
"html_url": "https:\/\/github.com\/shinecome\/zip",
"description": "patch to fix CVE-2018-13410 of zip-30",
"fork": false,
"created_at": "2019-02-21T01:29:00Z",
"updated_at": "2019-02-21T01:38:43Z",
"pushed_at": "2019-02-21T01:36:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -149,6 +149,36 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 210848831,
"name": "winboxPOC",
"full_name": "Tr33-He11\/winboxPOC",
"owner": {
"login": "Tr33-He11",
"id": 18653509,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4",
"html_url": "https:\/\/github.com\/Tr33-He11"
},
"html_url": "https:\/\/github.com\/Tr33-He11\/winboxPOC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
"fork": false,
"created_at": "2019-09-25T13:12:56Z",
"updated_at": "2021-12-23T21:35:48Z",
"pushed_at": "2019-02-18T09:51:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 211658714,
"name": "Python-MikrotikLoginExploit",

View file

@ -261,6 +261,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 167137381,
"name": "CVE-2018-15473-exp",
"full_name": "LINYIKAI\/CVE-2018-15473-exp",
"owner": {
"login": "LINYIKAI",
"id": 18764303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18764303?v=4",
"html_url": "https:\/\/github.com\/LINYIKAI"
},
"html_url": "https:\/\/github.com\/LINYIKAI\/CVE-2018-15473-exp",
"description": "This is a exp of CVE-2018-15473",
"fork": false,
"created_at": "2019-01-23T07:25:21Z",
"updated_at": "2022-11-09T18:02:13Z",
"pushed_at": "2019-01-23T07:30:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 192739498,
"name": "-",

View file

@ -1,4 +1,41 @@
[
{
"id": 167646347,
"name": "CVE-2018-18852",
"full_name": "hook-s3c\/CVE-2018-18852",
"owner": {
"login": "hook-s3c",
"id": 31825993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
"html_url": "https:\/\/github.com\/hook-s3c"
},
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-18852",
"description": "CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.",
"fork": false,
"created_at": "2019-01-26T03:41:24Z",
"updated_at": "2023-02-06T13:45:54Z",
"pushed_at": "2019-01-26T03:49:09Z",
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"cerio",
"cve-2018-18852",
"exploit",
"rce",
"router"
],
"visibility": "public",
"forks": 16,
"watchers": 47,
"score": 0,
"subscribers_count": 2
},
{
"id": 197655822,
"name": "CVE-2018-18852",

View file

@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 174141495,
"name": "CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"full_name": "slowmistio\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"owner": {
"login": "slowmistio",
"id": 25600994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25600994?v=4",
"html_url": "https:\/\/github.com\/slowmistio"
},
"html_url": "https:\/\/github.com\/slowmistio\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-03-06T12:31:57Z",
"updated_at": "2019-03-06T12:32:00Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 207471889,
"name": "CVE-2018-1999002",

32
2018/CVE-2018-20162.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 170612541,
"name": "CVE-2018-20162-digi-lr54-restricted-shell-escape",
"full_name": "stigtsp\/CVE-2018-20162-digi-lr54-restricted-shell-escape",
"owner": {
"login": "stigtsp",
"id": 75371,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75371?v=4",
"html_url": "https:\/\/github.com\/stigtsp"
},
"html_url": "https:\/\/github.com\/stigtsp\/CVE-2018-20162-digi-lr54-restricted-shell-escape",
"description": null,
"fork": false,
"created_at": "2019-02-14T02:20:13Z",
"updated_at": "2019-02-17T14:14:20Z",
"pushed_at": "2019-02-17T13:56:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

32
2018/CVE-2018-20165.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 167376412,
"name": "Reflected-XSS-on-Opentext-Portal-v7.4.4",
"full_name": "hect0rS\/Reflected-XSS-on-Opentext-Portal-v7.4.4",
"owner": {
"login": "hect0rS",
"id": 47000097,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47000097?v=4",
"html_url": "https:\/\/github.com\/hect0rS"
},
"html_url": "https:\/\/github.com\/hect0rS\/Reflected-XSS-on-Opentext-Portal-v7.4.4",
"description": "Reflected XSS on Opentext Portal v7.4.4: CVE-2018-20165",
"fork": false,
"created_at": "2019-01-24T13:59:14Z",
"updated_at": "2019-01-24T14:17:24Z",
"pushed_at": "2019-01-24T14:17:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,6 +29,252 @@
"score": 0,
"subscribers_count": 10
},
{
"id": 172009558,
"name": "CVE-2018-20250",
"full_name": "QAX-A-Team\/CVE-2018-20250",
"owner": {
"login": "QAX-A-Team",
"id": 35417332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35417332?v=4",
"html_url": "https:\/\/github.com\/QAX-A-Team"
},
"html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250",
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
"fork": false,
"created_at": "2019-02-22T06:47:01Z",
"updated_at": "2021-05-29T18:38:32Z",
"pushed_at": "2019-02-22T07:47:26Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 25,
"score": 0,
"subscribers_count": 2
},
{
"id": 172069488,
"name": "CVE-2018-20250-poc-winrar",
"full_name": "nmweizi\/CVE-2018-20250-poc-winrar",
"owner": {
"login": "nmweizi",
"id": 1232444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1232444?v=4",
"html_url": "https:\/\/github.com\/nmweizi"
},
"html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar",
"description": null,
"fork": false,
"created_at": "2019-02-22T13:18:14Z",
"updated_at": "2019-02-22T13:20:31Z",
"pushed_at": "2019-02-22T13:20:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 172078598,
"name": "UNACEV2.DLL-CVE-2018-20250",
"full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250",
"owner": {
"login": "blunden",
"id": 249915,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/249915?v=4",
"html_url": "https:\/\/github.com\/blunden"
},
"html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250",
"description": "A version of the binary patched to address CVE-2018-20250",
"fork": false,
"created_at": "2019-02-22T14:19:20Z",
"updated_at": "2019-02-22T14:29:30Z",
"pushed_at": "2019-02-22T14:29:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 172156568,
"name": "CVE-2018-20250-WinRAR-ACE",
"full_name": "easis\/CVE-2018-20250-WinRAR-ACE",
"owner": {
"login": "easis",
"id": 50383201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50383201?v=4",
"html_url": "https:\/\/github.com\/easis"
},
"html_url": "https:\/\/github.com\/easis\/CVE-2018-20250-WinRAR-ACE",
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
"fork": false,
"created_at": "2019-02-23T01:20:34Z",
"updated_at": "2023-02-10T19:05:26Z",
"pushed_at": "2019-03-01T13:35:59Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 6
},
{
"id": 173153306,
"name": "CVE-2018-20250",
"full_name": "STP5940\/CVE-2018-20250",
"owner": {
"login": "STP5940",
"id": 21144303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21144303?v=4",
"html_url": "https:\/\/github.com\/STP5940"
},
"html_url": "https:\/\/github.com\/STP5940\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-02-28T17:07:52Z",
"updated_at": "2021-05-14T13:49:21Z",
"pushed_at": "2019-02-28T17:10:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 173733018,
"name": "WinAce-POC",
"full_name": "n4r1b\/WinAce-POC",
"owner": {
"login": "n4r1b",
"id": 7025964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7025964?v=4",
"html_url": "https:\/\/github.com\/n4r1b"
},
"html_url": "https:\/\/github.com\/n4r1b\/WinAce-POC",
"description": "Simple POC to leverage CVE-2018-20250 from inside an EXE",
"fork": false,
"created_at": "2019-03-04T11:34:17Z",
"updated_at": "2019-03-04T14:32:05Z",
"pushed_at": "2019-03-04T14:42:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
},
{
"id": 173733367,
"name": "hack-winrar",
"full_name": "technicaldada\/hack-winrar",
"owner": {
"login": "technicaldada",
"id": 32122182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32122182?v=4",
"html_url": "https:\/\/github.com\/technicaldada"
},
"html_url": "https:\/\/github.com\/technicaldada\/hack-winrar",
"description": "WinRar is a very widely known software for windows. Previous version of WinRaR was a vulnerability which has been patched in Feb-2019. Most of the people didn't update winrar so they are vulnerable in this Absolute Path Traversal bug [CVE-2018-20250]",
"fork": false,
"created_at": "2019-03-04T11:36:43Z",
"updated_at": "2023-01-02T23:04:53Z",
"pushed_at": "2019-03-04T11:39:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"absolute-path-traversal-bug",
"bug",
"hack",
"windows",
"winrar"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 173947919,
"name": "ezwinrar",
"full_name": "Ektoplasma\/ezwinrar",
"owner": {
"login": "Ektoplasma",
"id": 15208659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15208659?v=4",
"html_url": "https:\/\/github.com\/Ektoplasma"
},
"html_url": "https:\/\/github.com\/Ektoplasma\/ezwinrar",
"description": "Python tool exploiting CVE-2018-20250 found by CheckPoint folks",
"fork": false,
"created_at": "2019-03-05T13:05:03Z",
"updated_at": "2023-03-14T14:38:11Z",
"pushed_at": "2019-03-05T15:51:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 174533873,
"name": "CVE-2018-20250-WINRAR-ACE-GUI",

View file

@ -543,6 +543,36 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 164424976,
"name": "CVE-2018-2628",
"full_name": "0xMJ\/CVE-2018-2628",
"owner": {
"login": "0xMJ",
"id": 31585175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31585175?v=4",
"html_url": "https:\/\/github.com\/0xMJ"
},
"html_url": "https:\/\/github.com\/0xMJ\/CVE-2018-2628",
"description": "漏洞利用工具",
"fork": false,
"created_at": "2019-01-07T11:47:59Z",
"updated_at": "2022-06-29T01:38:41Z",
"pushed_at": "2019-01-07T12:13:37Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
{
"id": 233997916,
"name": "weblogicScanner",
@ -557,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-28T09:44:30Z",
"updated_at": "2023-08-29T13:24:01Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1774,
"watchers_count": 1774,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 331,
"allow_forking": true,
@ -590,7 +620,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1774,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -1,4 +1,34 @@
[
{
"id": 170207286,
"name": "e1000_vulnerability_exploit",
"full_name": "ndureiss\/e1000_vulnerability_exploit",
"owner": {
"login": "ndureiss",
"id": 38342872,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38342872?v=4",
"html_url": "https:\/\/github.com\/ndureiss"
},
"html_url": "https:\/\/github.com\/ndureiss\/e1000_vulnerability_exploit",
"description": "Exploitation of VirtualBox vulnerability (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-3295)",
"fork": false,
"created_at": "2019-02-11T21:44:47Z",
"updated_at": "2019-04-28T14:26:42Z",
"pushed_at": "2019-03-06T14:12:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 307046811,
"name": "cve-2018-3295",

32
2018/CVE-2018-4193.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 170509373,
"name": "CVE-2018-4193",
"full_name": "Synacktiv-contrib\/CVE-2018-4193",
"owner": {
"login": "Synacktiv-contrib",
"id": 28860793,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28860793?v=4",
"html_url": "https:\/\/github.com\/Synacktiv-contrib"
},
"html_url": "https:\/\/github.com\/Synacktiv-contrib\/CVE-2018-4193",
"description": "exploit for CVE-2018-4193",
"fork": false,
"created_at": "2019-02-13T13:06:11Z",
"updated_at": "2022-07-24T14:07:42Z",
"pushed_at": "2019-02-13T13:07:25Z",
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 70,
"score": 0,
"subscribers_count": 3
}
]

36
2018/CVE-2018-4441.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 174585423,
"name": "PS4-6.20-WebKit-Code-Execution-Exploit",
"full_name": "Cryptogenic\/PS4-6.20-WebKit-Code-Execution-Exploit",
"owner": {
"login": "Cryptogenic",
"id": 9409828,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9409828?v=4",
"html_url": "https:\/\/github.com\/Cryptogenic"
},
"html_url": "https:\/\/github.com\/Cryptogenic\/PS4-6.20-WebKit-Code-Execution-Exploit",
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2023-08-22T17:02:00Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 201,
"watchers_count": 201,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploitation",
"javascript",
"webkit"
],
"visibility": "public",
"forks": 57,
"watchers": 201,
"score": 0,
"subscribers_count": 33
}
]

View file

@ -523,6 +523,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 164352797,
"name": "tvsz",
"full_name": "fakedob\/tvsz",
"owner": {
"login": "fakedob",
"id": 8687970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8687970?v=4",
"html_url": "https:\/\/github.com\/fakedob"
},
"html_url": "https:\/\/github.com\/fakedob\/tvsz",
"description": "CVE-2018-6389 PoC node js multisite with proxy",
"fork": false,
"created_at": "2019-01-06T22:57:48Z",
"updated_at": "2019-07-08T20:41:54Z",
"pushed_at": "2019-01-06T23:37:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
},
{
"id": 220969745,
"name": "Wordpress-DOS-Attack-CVE-2018-6389",

View file

@ -269,6 +269,66 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 165045501,
"name": "go-get-rce",
"full_name": "veter069\/go-get-rce",
"owner": {
"login": "veter069",
"id": 4894034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4894034?v=4",
"html_url": "https:\/\/github.com\/veter069"
},
"html_url": "https:\/\/github.com\/veter069\/go-get-rce",
"description": "CVE-2018-6574",
"fork": false,
"created_at": "2019-01-10T11:09:06Z",
"updated_at": "2019-01-11T05:02:16Z",
"pushed_at": "2019-01-11T05:02:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 166348598,
"name": "CVE-2018-6574-POC",
"full_name": "duckzsc2\/CVE-2018-6574-POC",
"owner": {
"login": "duckzsc2",
"id": 6966941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6966941?v=4",
"html_url": "https:\/\/github.com\/duckzsc2"
},
"html_url": "https:\/\/github.com\/duckzsc2\/CVE-2018-6574-POC",
"description": null,
"fork": false,
"created_at": "2019-01-18T05:22:25Z",
"updated_at": "2019-01-21T00:16:50Z",
"pushed_at": "2019-01-21T00:16:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 176511633,
"name": "cve-2018-6574",

View file

@ -28,5 +28,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 169735606,
"name": "CVE-2018-6961",
"full_name": "r3dxpl0it\/CVE-2018-6961",
"owner": {
"login": "r3dxpl0it",
"id": 43002597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4",
"html_url": "https:\/\/github.com\/r3dxpl0it"
},
"html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-6961",
"description": "VMware NSX SD-WAN command injection vulnerability ",
"fork": false,
"created_at": "2019-02-08T13:00:35Z",
"updated_at": "2023-03-14T23:14:23Z",
"pushed_at": "2019-02-08T13:05:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 166348798,
"name": "cve-2018-8453-exp",
"full_name": "Mkv4\/cve-2018-8453-exp",
"owner": {
"login": "Mkv4",
"id": 28436576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28436576?v=4",
"html_url": "https:\/\/github.com\/Mkv4"
},
"html_url": "https:\/\/github.com\/Mkv4\/cve-2018-8453-exp",
"description": "cve-2018-8453 exp",
"fork": false,
"created_at": "2019-01-18T05:24:22Z",
"updated_at": "2020-02-26T06:25:56Z",
"pushed_at": "2019-01-18T05:23:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 166389170,
"name": "cve-2018-8453-exp",

View file

@ -73,10 +73,10 @@
"description": "CVE-2018-8581",
"fork": false,
"created_at": "2019-01-24T06:08:23Z",
"updated_at": "2023-08-12T14:40:23Z",
"updated_at": "2023-08-29T09:50:45Z",
"pushed_at": "2022-10-21T08:29:33Z",
"stargazers_count": 363,
"watchers_count": 363,
"stargazers_count": 364,
"watchers_count": 364,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 363,
"watchers": 364,
"score": 0,
"subscribers_count": 10
}

View file

@ -179,6 +179,36 @@
"score": 0,
"subscribers_count": 15
},
{
"id": 167874136,
"name": "CVE-2018-9995",
"full_name": "codeholic2k18\/CVE-2018-9995",
"owner": {
"login": "codeholic2k18",
"id": 47091820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47091820?v=4",
"html_url": "https:\/\/github.com\/codeholic2k18"
},
"html_url": "https:\/\/github.com\/codeholic2k18\/CVE-2018-9995",
"description": "DVR username password recovery.",
"fork": false,
"created_at": "2019-01-28T00:16:48Z",
"updated_at": "2023-05-15T04:23:45Z",
"pushed_at": "2019-01-28T00:26:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 182380838,
"name": "CVE-2018-9995-ModifiedByGwolfs",

View file

@ -3230,36 +3230,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 318113571,
"name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"full_name": "DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"owner": {
"login": "DeathStroke-source",
"id": 23089257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23089257?v=4",
"html_url": "https:\/\/github.com\/DeathStroke-source"
},
"html_url": "https:\/\/github.com\/DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"description": "Scan through given ip list",
"fork": false,
"created_at": "2020-12-03T07:40:19Z",
"updated_at": "2021-01-29T14:08:43Z",
"pushed_at": "2019-05-22T22:32:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 330872202,
"name": "CVE-2019-0708-EXP-Windows",

View file

@ -1,32 +0,0 @@
[
{
"id": 435284718,
"name": "CVE-2019-1041",
"full_name": "5l1v3r1\/CVE-2019-1041",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2019-1041",
"description": null,
"fork": false,
"created_at": "2021-12-05T21:36:21Z",
"updated_at": "2023-06-08T15:44:37Z",
"pushed_at": "2019-09-17T15:53:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,35 +28,5 @@
"watchers": 112,
"score": 0,
"subscribers_count": 3
},
{
"id": 231926488,
"name": "CVE-2019-10758",
"full_name": "lp008\/CVE-2019-10758",
"owner": {
"login": "lp008",
"id": 11436275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
"html_url": "https:\/\/github.com\/lp008"
},
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-10758",
"description": "CVE-2019-10758",
"fork": false,
"created_at": "2020-01-05T14:05:56Z",
"updated_at": "2021-12-05T21:57:04Z",
"pushed_at": "2020-01-05T14:21:15Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -81,10 +81,10 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2023-05-12T12:24:55Z",
"updated_at": "2023-08-29T13:31:22Z",
"pushed_at": "2022-08-22T12:00:56Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -105,7 +105,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 7
},

View file

@ -1,32 +0,0 @@
[
{
"id": 232197518,
"name": "CVE-2019-1215",
"full_name": "bluefrostsecurity\/CVE-2019-1215",
"owner": {
"login": "bluefrostsecurity",
"id": 4976074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4",
"html_url": "https:\/\/github.com\/bluefrostsecurity"
},
"html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2019-1215",
"description": null,
"fork": false,
"created_at": "2020-01-06T22:34:16Z",
"updated_at": "2023-05-22T09:24:46Z",
"pushed_at": "2020-01-07T14:29:45Z",
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 147,
"score": 0,
"subscribers_count": 5
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 231223198,
"name": "CVE-2019-13404",
"full_name": "alidnf\/CVE-2019-13404",
"owner": {
"login": "alidnf",
"id": 54067374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54067374?v=4",
"html_url": "https:\/\/github.com\/alidnf"
},
"html_url": "https:\/\/github.com\/alidnf\/CVE-2019-13404",
"description": null,
"fork": false,
"created_at": "2020-01-01T14:00:55Z",
"updated_at": "2022-11-24T11:11:19Z",
"pushed_at": "2020-01-01T14:09:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 435291799,
"name": "fuzzenv-exiv2",
"full_name": "5l1v3r1\/fuzzenv-exiv2",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/fuzzenv-exiv2",
"description": "https:\/\/fuzzit.dev\/2019\/07\/11\/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing\/",
"fork": false,
"created_at": "2021-12-05T22:15:28Z",
"updated_at": "2022-08-16T08:26:01Z",
"pushed_at": "2019-09-08T12:59:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 269204367,
"name": "CVE-2019-1385",
"full_name": "0x413x4\/CVE-2019-1385",
"owner": {
"login": "0x413x4",
"id": 11176964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11176964?v=4",
"html_url": "https:\/\/github.com\/0x413x4"
},
"html_url": "https:\/\/github.com\/0x413x4\/CVE-2019-1385",
"description": "Enjoy hacking ;)",
"fork": false,
"created_at": "2020-06-03T22:06:49Z",
"updated_at": "2020-07-15T19:44:52Z",
"pushed_at": "2019-12-25T11:20:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -308,36 +308,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 258967892,
"name": "sudo-vulnerability-CVE-2019-14287",
"full_name": "axax002\/sudo-vulnerability-CVE-2019-14287",
"owner": {
"login": "axax002",
"id": 55937601,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55937601?v=4",
"html_url": "https:\/\/github.com\/axax002"
},
"html_url": "https:\/\/github.com\/axax002\/sudo-vulnerability-CVE-2019-14287",
"description": "Sudo Vulnerability CVE-2019-14287",
"fork": false,
"created_at": "2020-04-26T07:29:44Z",
"updated_at": "2021-04-14T16:06:10Z",
"pushed_at": "2019-12-04T07:25:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 263100309,
"name": "Exploit-CVE-2019-14287",
@ -702,36 +672,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 435340206,
"name": "cve-2019-14287sudoexp",
"full_name": "5l1v3r1\/cve-2019-14287sudoexp",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/cve-2019-14287sudoexp",
"description": null,
"fork": false,
"created_at": "2021-12-06T02:50:12Z",
"updated_at": "2021-12-06T02:50:13Z",
"pushed_at": "2019-10-21T02:01:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 550531926,
"name": "CVE-2019-14287",

View file

@ -18,7 +18,7 @@
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 13,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 13,
"forks": 12,
"watchers": 55,
"score": 0,
"subscribers_count": 8

View file

@ -1,32 +0,0 @@
[
{
"id": 435339590,
"name": "CVE-2019-15112",
"full_name": "5l1v3r1\/CVE-2019-15112",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2019-15112",
"description": null,
"fork": false,
"created_at": "2021-12-06T02:47:15Z",
"updated_at": "2021-12-06T02:47:16Z",
"pushed_at": "2019-08-25T06:03:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -209,36 +209,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 231220055,
"name": "CVE-2019-16278",
"full_name": "NHPT\/CVE-2019-16278",
"owner": {
"login": "NHPT",
"id": 42366434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
"html_url": "https:\/\/github.com\/NHPT"
},
"html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo Web服务器的RCE漏洞",
"fork": false,
"created_at": "2020-01-01T13:28:40Z",
"updated_at": "2023-01-31T11:26:23Z",
"pushed_at": "2020-01-01T13:36:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 251251110,
"name": "cve-2019-16278",

View file

@ -1,32 +0,0 @@
[
{
"id": 231651324,
"name": "CVE-2019-17427",
"full_name": "RealLinkers\/CVE-2019-17427",
"owner": {
"login": "RealLinkers",
"id": 22389074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
"html_url": "https:\/\/github.com\/RealLinkers"
},
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-17427",
"description": "CVE-2019-17427 Persistent XSS POC",
"fork": false,
"created_at": "2020-01-03T19:25:54Z",
"updated_at": "2021-07-17T15:56:02Z",
"pushed_at": "2020-01-03T19:32:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-08-28T23:09:48Z",
"updated_at": "2023-08-29T06:24:35Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3854,
"watchers_count": 3854,
"stargazers_count": 3855,
"watchers_count": 3855,
"has_discussions": false,
"forks_count": 1086,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1086,
"watchers": 3854,
"watchers": 3855,
"score": 0,
"subscribers_count": 155
},

View file

@ -1,32 +0,0 @@
[
{
"id": 231370688,
"name": "CVE-2019-18890",
"full_name": "RealLinkers\/CVE-2019-18890",
"owner": {
"login": "RealLinkers",
"id": 22389074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
"html_url": "https:\/\/github.com\/RealLinkers"
},
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-18890",
"description": "CVE-2019-18890 POC (Proof of Concept)",
"fork": false,
"created_at": "2020-01-02T11:44:47Z",
"updated_at": "2023-07-19T22:07:24Z",
"pushed_at": "2020-01-06T13:13:58Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 233213627,
"name": "CVE-2019-19782",
"full_name": "Underwood12\/CVE-2019-19782",
"owner": {
"login": "Underwood12",
"id": 19386296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19386296?v=4",
"html_url": "https:\/\/github.com\/Underwood12"
},
"html_url": "https:\/\/github.com\/Underwood12\/CVE-2019-19782",
"description": null,
"fork": false,
"created_at": "2020-01-11T10:25:18Z",
"updated_at": "2020-01-11T10:25:20Z",
"pushed_at": "2020-01-10T05:12:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,62 +0,0 @@
[
{
"id": 232512469,
"name": "CVE-2019-20197",
"full_name": "lp008\/CVE-2019-20197",
"owner": {
"login": "lp008",
"id": 11436275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
"html_url": "https:\/\/github.com\/lp008"
},
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-20197",
"description": "CVE-2019-20197",
"fork": false,
"created_at": "2020-01-08T08:11:58Z",
"updated_at": "2020-01-08T08:20:44Z",
"pushed_at": "2020-01-08T08:19:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 232513269,
"name": "CVE-2019-20197",
"full_name": "jas502n\/CVE-2019-20197",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-20197",
"description": "Nagios XI远程命令执行漏洞 <v5.6.9",
"fork": false,
"created_at": "2020-01-08T08:16:30Z",
"updated_at": "2023-02-28T01:21:42Z",
"pushed_at": "2020-01-08T08:30:03Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 23,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 233055034,
"name": "CVE-2019-20224",
"full_name": "mhaskar\/CVE-2019-20224",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-20224",
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
"fork": false,
"created_at": "2020-01-10T13:41:28Z",
"updated_at": "2023-06-05T10:09:18Z",
"pushed_at": "2020-01-10T13:42:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-28T09:44:30Z",
"updated_at": "2023-08-29T13:24:01Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1774,
"watchers_count": 1774,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 331,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1774,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
}

View file

@ -1,32 +0,0 @@
[
{
"id": 232403416,
"name": "CVE-2019-5630",
"full_name": "rbeede\/CVE-2019-5630",
"owner": {
"login": "rbeede",
"id": 1429214,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1429214?v=4",
"html_url": "https:\/\/github.com\/rbeede"
},
"html_url": "https:\/\/github.com\/rbeede\/CVE-2019-5630",
"description": "https:\/\/www.rodneybeede.com\/curriculum%20vitae\/bio.html",
"fork": false,
"created_at": "2020-01-07T19:43:42Z",
"updated_at": "2020-01-07T19:44:19Z",
"pushed_at": "2020-01-07T19:44:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -514,36 +514,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 232528693,
"name": "CVE-2019-5736",
"full_name": "geropl\/CVE-2019-5736",
"owner": {
"login": "geropl",
"id": 32448529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32448529?v=4",
"html_url": "https:\/\/github.com\/geropl"
},
"html_url": "https:\/\/github.com\/geropl\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2020-01-08T09:37:54Z",
"updated_at": "2021-10-21T21:43:59Z",
"pushed_at": "2020-01-08T10:28:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 238321546,
"name": "CVE-2019-5736-Custom-Runtime",

View file

@ -1,32 +0,0 @@
[
{
"id": 231278850,
"name": "CVE-2019-8601",
"full_name": "BadAccess11\/CVE-2019-8601",
"owner": {
"login": "BadAccess11",
"id": 59069469,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59069469?v=4",
"html_url": "https:\/\/github.com\/BadAccess11"
},
"html_url": "https:\/\/github.com\/BadAccess11\/CVE-2019-8601",
"description": "Exploiting a patched vulnerability in JavaScriptCore",
"fork": false,
"created_at": "2020-01-02T00:12:22Z",
"updated_at": "2023-07-10T12:03:02Z",
"pushed_at": "2020-01-02T00:13:22Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 18,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-11T09:48:51Z",
"updated_at": "2022-04-11T09:51:32Z",
"updated_at": "2023-08-29T13:22:08Z",
"pushed_at": "2022-04-11T09:51:49Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -154,38 +154,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 234191063,
"name": "CurveBall",
"full_name": "ly4k\/CurveBall",
"owner": {
"login": "ly4k",
"id": 53348818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ly4k"
},
"html_url": "https:\/\/github.com\/ly4k\/CurveBall",
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2023-08-04T19:34:59Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 882,
"watchers_count": 882,
"has_discussions": false,
"forks_count": 219,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-0601"
],
"visibility": "public",
"forks": 219,
"watchers": 882,
"score": 0,
"subscribers_count": 34
},
{
"id": 234192123,
"name": "chainoffools",
@ -315,36 +283,6 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 234442281,
"name": "cve-2020-0601-utils",
"full_name": "0xxon\/cve-2020-0601-utils",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
"fork": false,
"created_at": "2020-01-17T01:02:52Z",
"updated_at": "2021-12-05T20:30:51Z",
"pushed_at": "2020-01-21T19:48:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 234574037,
"name": "Windows10_Cumulative_Updates_PowerShell",

View file

@ -1,34 +1,4 @@
[
{
"id": 236109748,
"name": "CVE-2020-0674",
"full_name": "5l1v3r1\/CVE-2020-0674",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0674",
"description": "Info about CVE-2020-0674",
"fork": false,
"created_at": "2020-01-25T01:08:08Z",
"updated_at": "2022-11-09T23:02:59Z",
"pushed_at": "2020-01-23T12:54:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 262167867,
"name": "CVE-2020-0674-Exploit",

View file

@ -13,10 +13,10 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2023-05-12T12:24:55Z",
"updated_at": "2023-08-29T13:31:22Z",
"pushed_at": "2022-08-22T12:00:56Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 7
}

View file

@ -1,20 +1,20 @@
[
{
"id": 684085334,
"name": "linux-4.1.15_CVE-2020-15436",
"full_name": "Trinadh465\/linux-4.1.15_CVE-2020-15436",
"id": 684541518,
"name": "linux-4.19.72_CVE-2020-15436",
"full_name": "Trinadh465\/linux-4.19.72_CVE-2020-15436",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/linux-4.1.15_CVE-2020-15436",
"html_url": "https:\/\/github.com\/Trinadh465\/linux-4.19.72_CVE-2020-15436",
"description": null,
"fork": false,
"created_at": "2023-08-28T12:28:56Z",
"updated_at": "2023-08-28T12:28:57Z",
"pushed_at": "2023-08-28T12:28:57Z",
"created_at": "2023-08-29T10:53:27Z",
"updated_at": "2023-08-29T10:59:41Z",
"pushed_at": "2023-08-29T10:57:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -1,38 +0,0 @@
[
{
"id": 235582404,
"name": "CVE-2020-1611",
"full_name": "Ibonok\/CVE-2020-1611",
"owner": {
"login": "Ibonok",
"id": 37837775,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37837775?v=4",
"html_url": "https:\/\/github.com\/Ibonok"
},
"html_url": "https:\/\/github.com\/Ibonok\/CVE-2020-1611",
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
"fork": false,
"created_at": "2020-01-22T13:45:21Z",
"updated_at": "2022-12-18T15:46:11Z",
"pushed_at": "2020-01-22T14:01:32Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-1611",
"description",
"juniper",
"poc",
"vulnerability"
],
"visibility": "public",
"forks": 9,
"watchers": 29,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-28T09:44:30Z",
"updated_at": "2023-08-29T13:24:01Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1774,
"watchers_count": 1774,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 331,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1774,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-01T03:31:38Z",
"updated_at": "2022-04-01T03:35:40Z",
"updated_at": "2023-08-29T13:42:11Z",
"pushed_at": "2022-04-01T03:35:59Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-29T04:30:40Z",
"updated_at": "2022-04-29T04:38:41Z",
"updated_at": "2023-08-29T13:26:17Z",
"pushed_at": "2022-04-29T04:39:05Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -43,7 +43,7 @@
"description": null,
"fork": false,
"created_at": "2022-06-06T12:13:41Z",
"updated_at": "2022-06-06T12:15:33Z",
"updated_at": "2023-08-29T12:48:33Z",
"pushed_at": "2022-06-06T12:15:48Z",
"stargazers_count": 0,
"watchers_count": 0,

File diff suppressed because one or more lines are too long

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-08-27T06:27:41Z",
"updated_at": "2023-08-29T07:20:13Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1732,
"watchers_count": 1732,
"stargazers_count": 1733,
"watchers_count": 1733,
"has_discussions": false,
"forks_count": 589,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 589,
"watchers": 1732,
"watchers": 1733,
"score": 0,
"subscribers_count": 46
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-08-29T06:23:18Z",
"updated_at": "2023-08-29T07:40:34Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 1070,
"watchers_count": 1070,
"stargazers_count": 1072,
"watchers_count": 1072,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 134,
"watchers": 1070,
"watchers": 1072,
"score": 0,
"subscribers_count": 10
}

View file

@ -473,10 +473,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
"updated_at": "2023-08-28T19:26:14Z",
"updated_at": "2023-08-29T11:02:06Z",
"pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 188,
"watchers_count": 188,
"stargazers_count": 189,
"watchers_count": 189,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -492,7 +492,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 188,
"watchers": 189,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
"updated_at": "2023-08-29T05:15:44Z",
"updated_at": "2023-08-29T08:27:59Z",
"pushed_at": "2023-08-13T21:00:46Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 4
}

View file

@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2023-08-29T02:20:59Z",
"updated_at": "2023-08-29T08:31:14Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 619,
"watchers_count": 619,
"stargazers_count": 620,
"watchers_count": 620,
"has_discussions": false,
"forks_count": 161,
"allow_forking": true,
@ -1086,7 +1086,7 @@
"topics": [],
"visibility": "public",
"forks": 161,
"watchers": 619,
"watchers": 620,
"score": 0,
"subscribers_count": 10
},

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2022-01-14T05:52:17Z",
"updated_at": "2023-08-07T01:47:33Z",
"updated_at": "2023-08-29T06:49:10Z",
"pushed_at": "2022-01-14T05:56:09Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 4
}

View file

@ -138,7 +138,7 @@
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 21,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -147,7 +147,7 @@
"exploit"
],
"visibility": "public",
"forks": 21,
"forks": 20,
"watchers": 97,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false,
"created_at": "2021-11-15T14:48:14Z",
"updated_at": "2023-08-10T20:52:55Z",
"updated_at": "2023-08-29T11:23:57Z",
"pushed_at": "2023-01-01T21:12:20Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2023-08-27T06:14:36Z",
"updated_at": "2023-08-29T07:32:26Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1248,
"watchers_count": 1248,
"stargazers_count": 1249,
"watchers_count": 1249,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 318,
"watchers": 1248,
"watchers": 1249,
"score": 0,
"subscribers_count": 27
},

View file

@ -369,12 +369,12 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2023-08-22T17:55:17Z",
"updated_at": "2023-08-29T08:41:20Z",
"pushed_at": "2023-05-11T11:29:46Z",
"stargazers_count": 1066,
"watchers_count": 1066,
"stargazers_count": 1067,
"watchers_count": 1067,
"has_discussions": false,
"forks_count": 503,
"forks_count": 504,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -382,8 +382,8 @@
"log4shell"
],
"visibility": "public",
"forks": 503,
"watchers": 1066,
"forks": 504,
"watchers": 1067,
"score": 0,
"subscribers_count": 23
},
@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-08-27T16:31:09Z",
"updated_at": "2023-08-29T09:29:53Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1631,
"watchers_count": 1631,
"stargazers_count": 1632,
"watchers_count": 1632,
"has_discussions": false,
"forks_count": 479,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 479,
"watchers": 1631,
"watchers": 1632,
"score": 0,
"subscribers_count": 25
},
@ -3703,10 +3703,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-08-27T16:31:09Z",
"updated_at": "2023-08-29T07:11:56Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3282,
"watchers_count": 3282,
"stargazers_count": 3283,
"watchers_count": 3283,
"has_discussions": true,
"forks_count": 744,
"allow_forking": true,
@ -3715,7 +3715,7 @@
"topics": [],
"visibility": "public",
"forks": 744,
"watchers": 3282,
"watchers": 3283,
"score": 0,
"subscribers_count": 60
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-08-29T06:23:18Z",
"updated_at": "2023-08-29T07:40:34Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 1070,
"watchers_count": 1070,
"stargazers_count": 1072,
"watchers_count": 1072,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 134,
"watchers": 1070,
"watchers": 1072,
"score": 0,
"subscribers_count": 10
},

View file

@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-15T09:08:00Z",
"updated_at": "2023-07-04T07:59:22Z",
"updated_at": "2023-08-29T11:16:12Z",
"pushed_at": "2022-04-15T09:13:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-08-28T12:43:29Z",
"updated_at": "2023-08-29T09:28:51Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1026,
"watchers_count": 1026,
"stargazers_count": 1027,
"watchers_count": 1027,
"has_discussions": true,
"forks_count": 181,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 181,
"watchers": 1026,
"watchers": 1027,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-28T03:09:00Z",
"updated_at": "2023-08-09T00:01:31Z",
"updated_at": "2023-08-29T08:58:17Z",
"pushed_at": "2023-08-09T01:37:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -116,13 +116,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 20,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-08-24T14:39:56Z",
"updated_at": "2023-08-29T11:18:50Z",
"pushed_at": "2023-04-23T17:54:49Z",
"stargazers_count": 606,
"watchers_count": 606,
"stargazers_count": 607,
"watchers_count": 607,
"has_discussions": false,
"forks_count": 99,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 99,
"watchers": 606,
"watchers": 607,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "JDK CVE-2023-21939",
"fork": false,
"created_at": "2023-08-26T06:45:26Z",
"updated_at": "2023-08-29T03:20:57Z",
"updated_at": "2023-08-29T13:08:50Z",
"pushed_at": "2023-08-26T06:57:55Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 69,
"watchers": 71,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2023-08-22T13:31:51Z",
"updated_at": "2023-08-29T07:01:58Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 153,
"watchers": 154,
"score": 0,
"subscribers_count": 2
},

View file

@ -313,5 +313,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 684617839,
"name": "CVE-2023-27163",
"full_name": "josephberger\/CVE-2023-27163",
"owner": {
"login": "josephberger",
"id": 38740973,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38740973?v=4",
"html_url": "https:\/\/github.com\/josephberger"
},
"html_url": "https:\/\/github.com\/josephberger\/CVE-2023-27163",
"description": "PoC for 2023-27163 Maltrail v0.53",
"fork": false,
"created_at": "2023-08-29T14:02:42Z",
"updated_at": "2023-08-29T14:03:28Z",
"pushed_at": "2023-08-29T14:03:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-27T12:22:05Z",
"updated_at": "2023-08-28T05:53:06Z",
"updated_at": "2023-08-29T08:18:14Z",
"pushed_at": "2023-07-10T16:57:44Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 123,
"watchers": 124,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-09T15:36:45Z",
"updated_at": "2023-08-26T20:44:13Z",
"updated_at": "2023-08-29T12:05:43Z",
"pushed_at": "2023-06-09T15:41:53Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows",
"fork": false,
"created_at": "2023-06-08T20:43:03Z",
"updated_at": "2023-08-20T23:42:10Z",
"updated_at": "2023-08-29T12:15:30Z",
"pushed_at": "2023-06-09T07:33:40Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 413,
"watchers_count": 413,
"has_discussions": false,
"forks_count": 76,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 76,
"forks": 77,
"watchers": 413,
"score": 0,
"subscribers_count": 3

View file

@ -28,5 +28,35 @@
"watchers": 47,
"score": 0,
"subscribers_count": 2
},
{
"id": 684617460,
"name": "Scan_GhostScript",
"full_name": "winkler-winsen\/Scan_GhostScript",
"owner": {
"login": "winkler-winsen",
"id": 43114182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43114182?v=4",
"html_url": "https:\/\/github.com\/winkler-winsen"
},
"html_url": "https:\/\/github.com\/winkler-winsen\/Scan_GhostScript",
"description": "Scan for GhostScript files affected to CVE-2023-36664",
"fork": false,
"created_at": "2023-08-29T14:01:49Z",
"updated_at": "2023-08-29T14:01:50Z",
"pushed_at": "2023-08-29T14:01:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-08-25T07:28:06Z",
"updated_at": "2023-08-29T03:01:54Z",
"updated_at": "2023-08-29T13:15:34Z",
"pushed_at": "2023-08-25T09:38:05Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 11,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 31,
"forks": 13,
"watchers": 39,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 63,
"score": 0,
"subscribers_count": 1
@ -73,19 +73,19 @@
"description": null,
"fork": false,
"created_at": "2023-08-23T12:07:40Z",
"updated_at": "2023-08-29T06:20:11Z",
"updated_at": "2023-08-29T10:01:08Z",
"pushed_at": "2023-08-23T16:46:53Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 33,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 152,
"forks": 36,
"watchers": 154,
"score": 0,
"subscribers_count": 4
},
@ -103,19 +103,19 @@
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
"fork": false,
"created_at": "2023-08-24T22:24:34Z",
"updated_at": "2023-08-29T06:21:53Z",
"updated_at": "2023-08-29T07:19:10Z",
"pushed_at": "2023-08-25T00:30:01Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 116,
"forks": 19,
"watchers": 117,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Apache RocketMQ Arbitrary File Write Vulnerability Exploit",
"fork": false,
"created_at": "2023-07-14T12:22:45Z",
"updated_at": "2023-08-12T02:29:11Z",
"updated_at": "2023-08-29T08:46:27Z",
"pushed_at": "2023-07-19T02:29:39Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover",
"fork": false,
"created_at": "2023-08-27T00:30:16Z",
"updated_at": "2023-08-28T14:53:35Z",
"updated_at": "2023-08-29T11:45:11Z",
"pushed_at": "2023-08-27T00:41:40Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
"fork": false,
"created_at": "2023-08-24T16:03:07Z",
"updated_at": "2023-08-29T05:03:44Z",
"updated_at": "2023-08-29T10:50:52Z",
"pushed_at": "2023-08-24T16:13:02Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 86,
"forks": 17,
"watchers": 89,
"score": 0,
"subscribers_count": 2
},
@ -43,12 +43,12 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-08-29T05:51:07Z",
"updated_at": "2023-08-29T14:00:25Z",
"pushed_at": "2023-08-27T03:22:22Z",
"stargazers_count": 294,
"watchers_count": 294,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 45,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,8 +58,8 @@
"exploit"
],
"visibility": "public",
"forks": 45,
"watchers": 294,
"forks": 48,
"watchers": 323,
"score": 0,
"subscribers_count": 4
},
@ -107,10 +107,10 @@
"description": "一款用于生成winrar程序RCE即cve-2023-38831的POC的工具。",
"fork": false,
"created_at": "2023-08-27T14:08:36Z",
"updated_at": "2023-08-29T03:58:45Z",
"updated_at": "2023-08-29T12:51:40Z",
"pushed_at": "2023-08-27T14:35:00Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
@ -137,12 +137,12 @@
"description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23",
"fork": false,
"created_at": "2023-08-27T21:49:37Z",
"updated_at": "2023-08-29T05:33:06Z",
"updated_at": "2023-08-29T13:14:54Z",
"pushed_at": "2023-08-27T22:17:56Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 8,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -155,8 +155,8 @@
"winrar"
],
"visibility": "public",
"forks": 8,
"watchers": 36,
"forks": 10,
"watchers": 49,
"score": 0,
"subscribers_count": 1
},
@ -174,10 +174,10 @@
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2023-08-28T05:26:52Z",
"updated_at": "2023-08-29T13:56:05Z",
"pushed_at": "2023-08-28T20:41:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -186,7 +186,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
@ -204,10 +204,10 @@
"description": "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.",
"fork": false,
"created_at": "2023-08-28T08:56:16Z",
"updated_at": "2023-08-29T05:18:35Z",
"updated_at": "2023-08-29T13:15:41Z",
"pushed_at": "2023-08-28T09:32:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -216,7 +216,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -234,10 +234,10 @@
"description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ",
"fork": false,
"created_at": "2023-08-28T14:48:22Z",
"updated_at": "2023-08-29T06:48:17Z",
"updated_at": "2023-08-29T12:12:04Z",
"pushed_at": "2023-08-28T15:33:27Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -246,7 +246,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 17,
"score": 0,
"subscribers_count": 2
},
@ -294,10 +294,10 @@
"description": "KQL Hunting for WinRAR CVE-2023-38831",
"fork": false,
"created_at": "2023-08-28T15:26:14Z",
"updated_at": "2023-08-29T02:32:05Z",
"updated_at": "2023-08-29T13:56:11Z",
"pushed_at": "2023-08-28T16:06:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -306,7 +306,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -324,10 +324,10 @@
"description": "CVE-2023-38831 winrar exploit generator and get reverse shell",
"fork": false,
"created_at": "2023-08-28T22:08:31Z",
"updated_at": "2023-08-28T22:11:59Z",
"updated_at": "2023-08-29T13:31:29Z",
"pushed_at": "2023-08-28T23:51:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -336,7 +336,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

202
README.md
View file

@ -1279,6 +1279,7 @@
- [thomas-osgood/CVE-2023-27163](https://github.com/thomas-osgood/CVE-2023-27163)
- [0xFTW/CVE-2023-27163](https://github.com/0xFTW/CVE-2023-27163)
- [samh4cks/CVE-2023-27163-InternalProber](https://github.com/samh4cks/CVE-2023-27163-InternalProber)
- [josephberger/CVE-2023-27163](https://github.com/josephberger/CVE-2023-27163)
### CVE-2023-27216 (2023-04-12)
@ -2583,6 +2584,7 @@
</code>
- [jakabakos/CVE-2023-36664-Ghostscript-command-injection](https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection)
- [winkler-winsen/Scan_GhostScript](https://github.com/winkler-winsen/Scan_GhostScript)
### CVE-2023-36844 (2023-08-17)
@ -15877,12 +15879,10 @@
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
- [ly4k/CurveBall](https://github.com/ly4k/CurveBall)
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
- [BlueTeamSteve/CVE-2020-0601](https://github.com/BlueTeamSteve/CVE-2020-0601)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
- [Doug-Moody/Windows10_Cumulative_Updates_PowerShell](https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell)
- [MarkusZehnle/CVE-2020-0601](https://github.com/MarkusZehnle/CVE-2020-0601)
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
@ -15957,7 +15957,6 @@
<code>A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
</code>
- [5l1v3r1/CVE-2020-0674](https://github.com/5l1v3r1/CVE-2020-0674)
- [maxpl0it/CVE-2020-0674-Exploit](https://github.com/maxpl0it/CVE-2020-0674-Exploit)
- [Ken-Abruzzi/CVE-2020-0674](https://github.com/Ken-Abruzzi/CVE-2020-0674)
- [Neko-chanQwQ/CVE-2020-0674-PoC](https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC)
@ -16374,13 +16373,6 @@
- [0neb1n/CVE-2020-1493](https://github.com/0neb1n/CVE-2020-1493)
### CVE-2020-1611 (2020-01-15)
<code>A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
</code>
- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611)
### CVE-2020-1764 (2020-03-26)
<code>A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
@ -18913,7 +18905,7 @@
<code>Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
</code>
- [Trinadh465/linux-4.1.15_CVE-2020-15436](https://github.com/Trinadh465/linux-4.1.15_CVE-2020-15436)
- [Trinadh465/linux-4.19.72_CVE-2020-15436](https://github.com/Trinadh465/linux-4.19.72_CVE-2020-15436)
### CVE-2020-15492 (2020-07-23)
@ -20673,7 +20665,6 @@
- [JSec1337/Scanner-CVE-2019-0708](https://github.com/JSec1337/Scanner-CVE-2019-0708)
- [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI)
- [AaronCaiii/CVE-2019-0708-POC](https://github.com/AaronCaiii/CVE-2019-0708-POC)
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
- [CircuitSoul/CVE-2019-0708](https://github.com/CircuitSoul/CVE-2019-0708)
- [pywc/CVE-2019-0708](https://github.com/pywc/CVE-2019-0708)
@ -20793,13 +20784,6 @@
- [fox-it/cve-2019-1040-scanner](https://github.com/fox-it/cve-2019-1040-scanner)
- [QAX-A-Team/dcpwn](https://github.com/QAX-A-Team/dcpwn)
### CVE-2019-1041 (2019-06-12)
<code>An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1065.
</code>
- [5l1v3r1/CVE-2019-1041](https://github.com/5l1v3r1/CVE-2019-1041)
### CVE-2019-1064 (2019-06-12)
<code>An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.
@ -20873,13 +20857,6 @@
- [info4mationprivate8tools/CVE-2019-1205](https://github.com/info4mationprivate8tools/CVE-2019-1205)
### CVE-2019-1215 (2019-09-11)
<code>An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303.
</code>
- [bluefrostsecurity/CVE-2019-1215](https://github.com/bluefrostsecurity/CVE-2019-1215)
### CVE-2019-1218 (2019-08-14)
<code>A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages, aka 'Outlook iOS Spoofing Vulnerability'.
@ -20925,13 +20902,6 @@
- [mandarenmanman/CVE-2019-1367](https://github.com/mandarenmanman/CVE-2019-1367)
### CVE-2019-1385 (2019-11-12)
<code>An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.
</code>
- [0x413x4/CVE-2019-1385](https://github.com/0x413x4/CVE-2019-1385)
### CVE-2019-1388 (2019-11-12)
<code>An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'.
@ -21403,13 +21373,6 @@
- [VoidSec/CVE-2019-5624](https://github.com/VoidSec/CVE-2019-5624)
### CVE-2019-5630 (2019-07-03)
<code>A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68. This issue allows attackers to exploit CSRF vulnerabilities on API endpoints using Flash to circumvent a cross-domain pre-flight OPTIONS request.
</code>
- [rbeede/CVE-2019-5630](https://github.com/rbeede/CVE-2019-5630)
### CVE-2019-5700 (2019-10-09)
<code>NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.
@ -21439,7 +21402,6 @@
- [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study)
- [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc)
- [epsteina16/Docker-Escape-Miner](https://github.com/epsteina16/Docker-Escape-Miner)
- [geropl/CVE-2019-5736](https://github.com/geropl/CVE-2019-5736)
- [GiverOfGifts/CVE-2019-5736-Custom-Runtime](https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime)
- [Billith/CVE-2019-5736-PoC](https://github.com/Billith/CVE-2019-5736-PoC)
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
@ -21860,13 +21822,6 @@
- [jsherman212/used_sock](https://github.com/jsherman212/used_sock)
### CVE-2019-8601 (2019-12-18)
<code>Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
</code>
- [BadAccess11/CVE-2019-8601](https://github.com/BadAccess11/CVE-2019-8601)
### CVE-2019-8605 (2019-12-18)
<code>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges.
@ -22299,7 +22254,6 @@
</code>
- [masahiro331/CVE-2019-10758](https://github.com/masahiro331/CVE-2019-10758)
- [lp008/CVE-2019-10758](https://github.com/lp008/CVE-2019-10758)
### CVE-2019-10779 (2020-01-27)
@ -22950,13 +22904,6 @@
- [B3Bo1d/CVE-2019-13403](https://github.com/B3Bo1d/CVE-2019-13403)
### CVE-2019-13404 (2019-07-07)
<code>** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.
</code>
- [alidnf/CVE-2019-13404](https://github.com/alidnf/CVE-2019-13404)
### CVE-2019-13496 (2019-11-04)
<code>One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response.
@ -22978,13 +22925,6 @@
- [FurqanKhan1/CVE-2019-13498](https://github.com/FurqanKhan1/CVE-2019-13498)
### CVE-2019-13504 (2019-07-10)
<code>There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.
</code>
- [5l1v3r1/fuzzenv-exiv2](https://github.com/5l1v3r1/fuzzenv-exiv2)
### CVE-2019-13574 (2019-07-11)
<code>In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
@ -23078,7 +23018,6 @@
- [Sindadziy/cve-2019-14287](https://github.com/Sindadziy/cve-2019-14287)
- [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271)
- [CMNatic/Dockerized-CVE-2019-14287](https://github.com/CMNatic/Dockerized-CVE-2019-14287)
- [axax002/sudo-vulnerability-CVE-2019-14287](https://github.com/axax002/sudo-vulnerability-CVE-2019-14287)
- [SachinthaDeSilva-cmd/Exploit-CVE-2019-14287](https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287)
- [HussyCool/CVE-2019-14287-IT18030372-](https://github.com/HussyCool/CVE-2019-14287-IT18030372-)
- [ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287](https://github.com/ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287)
@ -23091,7 +23030,6 @@
- [DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights](https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights)
- [crypticdante/CVE-2019-14287](https://github.com/crypticdante/CVE-2019-14287)
- [Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287](https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287)
- [5l1v3r1/cve-2019-14287sudoexp](https://github.com/5l1v3r1/cve-2019-14287sudoexp)
- [MariliaMeira/CVE-2019-14287](https://github.com/MariliaMeira/CVE-2019-14287)
### CVE-2019-14314 (2019-08-27)
@ -23280,13 +23218,6 @@
- [gozn/detect-CVE-2019-15107-by-pyshark](https://github.com/gozn/detect-CVE-2019-15107-by-pyshark)
- [h4ck0rman/CVE-2019-15107](https://github.com/h4ck0rman/CVE-2019-15107)
### CVE-2019-15112 (2019-08-21)
<code>The wp-slimstat plugin before 4.8.1 for WordPress has XSS.
</code>
- [5l1v3r1/CVE-2019-15112](https://github.com/5l1v3r1/CVE-2019-15112)
### CVE-2019-15120 (2019-08-16)
<code>The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode.
@ -23444,7 +23375,6 @@
- [AnubisSec/CVE-2019-16278](https://github.com/AnubisSec/CVE-2019-16278)
- [theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE](https://github.com/theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE)
- [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278)
- [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278)
- [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278)
- [crypticdante/CVE-2019-16278](https://github.com/crypticdante/CVE-2019-16278)
- [alexander-fernandes/CVE-2019-16278](https://github.com/alexander-fernandes/CVE-2019-16278)
@ -23645,13 +23575,6 @@
- [mavlevin/CVE-2019-17424](https://github.com/mavlevin/CVE-2019-17424)
### CVE-2019-17427 (2019-10-09)
<code>In Redmine before 3.4.11 and 4.0.x before 4.0.4, persistent XSS exists due to textile formatting errors.
</code>
- [RealLinkers/CVE-2019-17427](https://github.com/RealLinkers/CVE-2019-17427)
### CVE-2019-17495 (2019-10-10)
<code>A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that &lt;style&gt;@import within the JSON data was a functional attack method.
@ -23872,13 +23795,6 @@
- [bobfuzzer/CVE-2019-18885](https://github.com/bobfuzzer/CVE-2019-18885)
### CVE-2019-18890 (2019-11-21)
<code>A SQL injection vulnerability in Redmine through 3.2.9 and 3.3.x before 3.3.10 allows Redmine users to access protected information via a crafted object query.
</code>
- [RealLinkers/CVE-2019-18890](https://github.com/RealLinkers/CVE-2019-18890)
### CVE-2019-18935 (2019-12-11)
<code>Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
@ -24121,13 +24037,6 @@
- [Vulnmachines/Ctirix_RCE-CVE-2019-19781](https://github.com/Vulnmachines/Ctirix_RCE-CVE-2019-19781)
- [k-fire/CVE-2019-19781-exploit](https://github.com/k-fire/CVE-2019-19781-exploit)
### CVE-2019-19782 (2019-12-13)
<code>The FTP client in AceaXe Plus 1.0 allows a buffer overflow via a long EHLO response from an FTP server.
</code>
- [Underwood12/CVE-2019-19782](https://github.com/Underwood12/CVE-2019-19782)
### CVE-2019-19844 (2019-12-18)
<code>Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
@ -24175,21 +24084,6 @@
- [AleDiBen/NVMS1000-Exploit](https://github.com/AleDiBen/NVMS1000-Exploit)
### CVE-2019-20197 (2019-12-31)
<code>In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account.
</code>
- [lp008/CVE-2019-20197](https://github.com/lp008/CVE-2019-20197)
- [jas502n/CVE-2019-20197](https://github.com/jas502n/CVE-2019-20197)
### CVE-2019-20224 (2020-01-09)
<code>netflow_get_stats in functions_netflow.php in Pandora FMS 7.0NG allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ip_src parameter in an index.php?operation/netflow/nf_live_view request. This issue has been fixed in Pandora FMS 7.0 NG 742.
</code>
- [mhaskar/CVE-2019-20224](https://github.com/mhaskar/CVE-2019-20224)
### CVE-2019-20326 (2020-03-16)
<code>A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file.
@ -24625,6 +24519,7 @@
- [likescam/CVE-2018-2628](https://github.com/likescam/CVE-2018-2628)
- [Nervous/WebLogic-RCE-exploit](https://github.com/Nervous/WebLogic-RCE-exploit)
- [Lighird/CVE-2018-2628](https://github.com/Lighird/CVE-2018-2628)
- [0xMJ/CVE-2018-2628](https://github.com/0xMJ/CVE-2018-2628)
- [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner)
- [seethen/cve-2018-2628](https://github.com/seethen/cve-2018-2628)
- [BabyTeam1024/cve-2018-2628](https://github.com/BabyTeam1024/cve-2018-2628)
@ -24715,6 +24610,7 @@
<code>Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
</code>
- [ndureiss/e1000_vulnerability_exploit](https://github.com/ndureiss/e1000_vulnerability_exploit)
- [vhok74/cve-2018-3295](https://github.com/vhok74/cve-2018-3295)
### CVE-2018-3608 (2018-07-06)
@ -24837,6 +24733,13 @@
- [xigexbh/bazad1](https://github.com/xigexbh/bazad1)
- [Giler2004/bazad1](https://github.com/Giler2004/bazad1)
### CVE-2018-4193 (2018-06-08)
<code>An issue was discovered in certain Apple products. macOS before 10.13.5 is affected. The issue involves the &quot;Windows Server&quot; component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
</code>
- [Synacktiv-contrib/CVE-2018-4193](https://github.com/Synacktiv-contrib/CVE-2018-4193)
### CVE-2018-4233 (2018-06-08)
<code>An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the &quot;WebKit&quot; component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
@ -24958,6 +24861,13 @@
- [ktiOSz/PoC_iOS12](https://github.com/ktiOSz/PoC_iOS12)
### CVE-2018-4441 (2019-04-03)
<code>A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
</code>
- [Cryptogenic/PS4-6.20-WebKit-Code-Execution-Exploit](https://github.com/Cryptogenic/PS4-6.20-WebKit-Code-Execution-Exploit)
### CVE-2018-4878 (2018-02-06)
<code>A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
@ -25131,6 +25041,7 @@
- [armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389](https://github.com/armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389)
- [ItinerisLtd/trellis-cve-2018-6389](https://github.com/ItinerisLtd/trellis-cve-2018-6389)
- [Zazzzles/Wordpress-DOS](https://github.com/Zazzzles/Wordpress-DOS)
- [fakedob/tvsz](https://github.com/fakedob/tvsz)
- [vineetkia/Wordpress-DOS-Attack-CVE-2018-6389](https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389)
- [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389)
- [amit-pathak009/CVE-2018-6389-FIX](https://github.com/amit-pathak009/CVE-2018-6389-FIX)
@ -25185,6 +25096,8 @@
- [20matan/CVE-2018-6574-POC](https://github.com/20matan/CVE-2018-6574-POC)
- [zur250/Zur-Go-GET-RCE-Solution](https://github.com/zur250/Zur-Go-GET-RCE-Solution)
- [mekhalleh/cve-2018-6574](https://github.com/mekhalleh/cve-2018-6574)
- [veter069/go-get-rce](https://github.com/veter069/go-get-rce)
- [duckzsc2/CVE-2018-6574-POC](https://github.com/duckzsc2/CVE-2018-6574-POC)
- [dollyptm/cve-2018-6574](https://github.com/dollyptm/cve-2018-6574)
- [qweraqq/CVE-2018-6574](https://github.com/qweraqq/CVE-2018-6574)
- [d4rkshell/go-get-rce](https://github.com/d4rkshell/go-get-rce)
@ -25317,6 +25230,7 @@
</code>
- [bokanrb/CVE-2018-6961](https://github.com/bokanrb/CVE-2018-6961)
- [r3dxpl0it/CVE-2018-6961](https://github.com/r3dxpl0it/CVE-2018-6961)
### CVE-2018-6981 (2018-12-04)
@ -25692,6 +25606,7 @@
<code>An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka &quot;Win32k Elevation of Privilege Vulnerability.&quot; This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
</code>
- [Mkv4/cve-2018-8453-exp](https://github.com/Mkv4/cve-2018-8453-exp)
- [ze0r/cve-2018-8453-exp](https://github.com/ze0r/cve-2018-8453-exp)
- [thepwnrip/leHACK-Analysis-of-CVE-2018-8453](https://github.com/thepwnrip/leHACK-Analysis-of-CVE-2018-8453)
@ -25905,6 +25820,7 @@
- [gwolfs/CVE-2018-9995-ModifiedByGwolfs](https://github.com/gwolfs/CVE-2018-9995-ModifiedByGwolfs)
- [shacojx/cve-2018-9995](https://github.com/shacojx/cve-2018-9995)
- [Cyb0r9/DVR-Exploiter](https://github.com/Cyb0r9/DVR-Exploiter)
- [codeholic2k18/CVE-2018-9995](https://github.com/codeholic2k18/CVE-2018-9995)
- [TateYdq/CVE-2018-9995-ModifiedByGwolfs](https://github.com/TateYdq/CVE-2018-9995-ModifiedByGwolfs)
- [ABIZCHI/CVE-2018-9995_dvr_credentials](https://github.com/ABIZCHI/CVE-2018-9995_dvr_credentials)
- [IHA114/CVE-2018-9995_dvr_credentials](https://github.com/IHA114/CVE-2018-9995_dvr_credentials)
@ -26000,6 +25916,13 @@
- [BalvinderSingh23/Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3](https://github.com/BalvinderSingh23/Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3)
### CVE-2018-10920 (2018-08-02)
<code>Improper input validation bug in DNS resolver component of Knot Resolver before 2.4.1 allows remote attacker to poison cache.
</code>
- [shutingrz/CVE-2018-10920_PoC](https://github.com/shutingrz/CVE-2018-10920_PoC)
### CVE-2018-10933 (2018-10-17)
<code>A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
@ -26012,14 +25935,12 @@
- [gojhonny/libssh-scanner](https://github.com/gojhonny/libssh-scanner)
- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh)
- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass)
- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933)
- [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933)
- [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933)
- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933)
- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc)
- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner)
- [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933)
- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933)
- [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933)
- [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933)
- [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933)
@ -26030,6 +25951,7 @@
- [0xadaw/libSSH-bypass](https://github.com/0xadaw/libSSH-bypass)
- [sambiyal/CVE-2018-10933-POC](https://github.com/sambiyal/CVE-2018-10933-POC)
- [nikhil1232/LibSSH-Authentication-Bypass](https://github.com/nikhil1232/LibSSH-Authentication-Bypass)
- [Kurlee/LibSSH-exploit](https://github.com/Kurlee/LibSSH-exploit)
- [crispy-peppers/Libssh-server-CVE-2018-10933](https://github.com/crispy-peppers/Libssh-server-CVE-2018-10933)
- [youkergav/CVE-2018-10933](https://github.com/youkergav/CVE-2018-10933)
- [kristyna-mlcakova/CVE-2018-10933](https://github.com/kristyna-mlcakova/CVE-2018-10933)
@ -26146,6 +26068,13 @@
- [immunIT/CVE-2018-11759](https://github.com/immunIT/CVE-2018-11759)
- [Jul10l1r4/Identificador-CVE-2018-11759](https://github.com/Jul10l1r4/Identificador-CVE-2018-11759)
### CVE-2018-11761 (2018-09-19)
<code>In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.
</code>
- [brianwrf/CVE-2018-11761](https://github.com/brianwrf/CVE-2018-11761)
### CVE-2018-11770 (2018-08-13)
<code>From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'.
@ -26176,6 +26105,13 @@
- [freshdemo/ApacheStruts-CVE-2018-11776](https://github.com/freshdemo/ApacheStruts-CVE-2018-11776)
- [tsong0ku/CVE-2018-11776-FIS](https://github.com/tsong0ku/CVE-2018-11776-FIS)
### CVE-2018-11788 (2019-01-07)
<code>Apache Karaf provides a features deployer, which allows users to &quot;hot deploy&quot; a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as an user can inject external XML entities in Apache Karaf version prior to 4.1.7 or 4.2.2. It has been fixed in Apache Karaf 4.1.7 and 4.2.2 releases.
</code>
- [brianwrf/CVE-2018-11788](https://github.com/brianwrf/CVE-2018-11788)
### CVE-2018-11790 (2019-01-31)
<code>When loading a document with Apache Open Office 4.1.5 and earlier with smaller end line termination than the operating system uses, the defect occurs. In this case OpenOffice runs into an Arithmetic Overflow at a string length calculation.
@ -26352,6 +26288,13 @@
- [milo2012/CVE-2018-13382](https://github.com/milo2012/CVE-2018-13382)
- [tumikoto/Exploit-FortinetMagicBackdoor](https://github.com/tumikoto/Exploit-FortinetMagicBackdoor)
### CVE-2018-13410 (2018-07-06)
<code>** DISPUTED ** Info-ZIP Zip 3.0, when the -T and -TT command-line options are used, allows attackers to cause a denial of service (invalid free and application crash) or possibly have unspecified other impact because of an off-by-one error. NOTE: it is unclear whether there are realistic scenarios in which an untrusted party controls the -TT value, given that the entire purpose of -TT is execution of arbitrary commands.
</code>
- [shinecome/zip](https://github.com/shinecome/zip)
### CVE-2018-13784 (2018-07-09)
<code>PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption in Cookie.php, Rinjdael.php, and Blowfish.php.
@ -26489,6 +26432,7 @@
- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot)
- [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847)
- [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast)
- [Tr33-He11/winboxPOC](https://github.com/Tr33-He11/winboxPOC)
- [sinichi449/Python-MikrotikLoginExploit](https://github.com/sinichi449/Python-MikrotikLoginExploit)
- [yukar1z0e/CVE-2018-14847](https://github.com/yukar1z0e/CVE-2018-14847)
- [hacker30468/Mikrotik-router-hack](https://github.com/hacker30468/Mikrotik-router-hack)
@ -26545,6 +26489,7 @@
- [r3dxpl0it/CVE-2018-15473](https://github.com/r3dxpl0it/CVE-2018-15473)
- [JoeBlackSecurity/SSHUsernameBruter-SSHUB](https://github.com/JoeBlackSecurity/SSHUsernameBruter-SSHUB)
- [cved-sources/cve-2018-15473](https://github.com/cved-sources/cve-2018-15473)
- [LINYIKAI/CVE-2018-15473-exp](https://github.com/LINYIKAI/CVE-2018-15473-exp)
- [trickster1103/-](https://github.com/trickster1103/-)
- [NHPT/SSH-account-enumeration-verification-script](https://github.com/NHPT/SSH-account-enumeration-verification-script)
- [CaioCGH/EP4-redes](https://github.com/CaioCGH/EP4-redes)
@ -27003,6 +26948,7 @@
<code>Cerio DT-300N 1.1.6 through 1.1.12 devices allow OS command injection because of improper input validation of the web-interface PING feature's use of Save.cgi to execute a ping command, as exploited in the wild in October 2018.
</code>
- [hook-s3c/CVE-2018-18852](https://github.com/hook-s3c/CVE-2018-18852)
- [andripwn/CVE-2018-18852](https://github.com/andripwn/CVE-2018-18852)
### CVE-2018-18893 (2019-01-02)
@ -27200,12 +27146,34 @@
- [nth347/CVE-2018-20148_exploit](https://github.com/nth347/CVE-2018-20148_exploit)
### CVE-2018-20162 (2019-03-17)
<code>Digi TransPort LR54 4.4.0.26 and possible earlier devices have Improper Input Validation that allows users with 'super' CLI access privileges to bypass a restricted shell and execute arbitrary commands as root.
</code>
- [stigtsp/CVE-2018-20162-digi-lr54-restricted-shell-escape](https://github.com/stigtsp/CVE-2018-20162-digi-lr54-restricted-shell-escape)
### CVE-2018-20165 (2019-03-22)
<code>Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
</code>
- [hect0rS/Reflected-XSS-on-Opentext-Portal-v7.4.4](https://github.com/hect0rS/Reflected-XSS-on-Opentext-Portal-v7.4.4)
### CVE-2018-20250 (2019-02-05)
<code>In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
</code>
- [WyAtu/CVE-2018-20250](https://github.com/WyAtu/CVE-2018-20250)
- [QAX-A-Team/CVE-2018-20250](https://github.com/QAX-A-Team/CVE-2018-20250)
- [nmweizi/CVE-2018-20250-poc-winrar](https://github.com/nmweizi/CVE-2018-20250-poc-winrar)
- [blunden/UNACEV2.DLL-CVE-2018-20250](https://github.com/blunden/UNACEV2.DLL-CVE-2018-20250)
- [easis/CVE-2018-20250-WinRAR-ACE](https://github.com/easis/CVE-2018-20250-WinRAR-ACE)
- [STP5940/CVE-2018-20250](https://github.com/STP5940/CVE-2018-20250)
- [n4r1b/WinAce-POC](https://github.com/n4r1b/WinAce-POC)
- [technicaldada/hack-winrar](https://github.com/technicaldada/hack-winrar)
- [Ektoplasma/ezwinrar](https://github.com/Ektoplasma/ezwinrar)
- [arkangel-dev/CVE-2018-20250-WINRAR-ACE-GUI](https://github.com/arkangel-dev/CVE-2018-20250-WINRAR-ACE-GUI)
- [AeolusTF/CVE-2018-20250](https://github.com/AeolusTF/CVE-2018-20250)
- [joydragon/Detect-CVE-2018-20250](https://github.com/joydragon/Detect-CVE-2018-20250)
@ -27402,6 +27370,7 @@
</code>
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
- [slowmistio/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/slowmistio/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
- [0x6b7966/CVE-2018-1999002](https://github.com/0x6b7966/CVE-2018-1999002)
@ -27922,7 +27891,6 @@
- [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit)
- [kr4dd/CVE-2017-5487](https://github.com/kr4dd/CVE-2017-5487)
- [zkhalidul/GrabberWP-CVE-2017-5487](https://github.com/zkhalidul/GrabberWP-CVE-2017-5487)
- [Sabotase-Syndicate-Team/CVE-2017-5487.exploit](https://github.com/Sabotase-Syndicate-Team/CVE-2017-5487.exploit)
- [SeasonLeague/CVE-2017-5487](https://github.com/SeasonLeague/CVE-2017-5487)
- [Ravindu-Priyankara/CVE-2017-5487-vulnerability-on-NSBM](https://github.com/Ravindu-Priyankara/CVE-2017-5487-vulnerability-on-NSBM)
- [K3ysTr0K3R/CVE-2017-5487-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2017-5487-EXPLOIT)
@ -32362,6 +32330,7 @@
- [mritunjay-k/CVE-2014-6271](https://github.com/mritunjay-k/CVE-2014-6271)
- [Brandaoo/CVE-2014-6271](https://github.com/Brandaoo/CVE-2014-6271)
- [Jsmoreira02/CVE-2014-6271](https://github.com/Jsmoreira02/CVE-2014-6271)
- [hanmin0512/CVE-2014-6271_pwnable](https://github.com/hanmin0512/CVE-2014-6271_pwnable)
### CVE-2014-6287 (2014-10-07)
@ -33454,7 +33423,6 @@
</code>
- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn)
- [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn)
### CVE-2010-1205 (2010-06-30)
@ -33526,7 +33494,6 @@
<code>Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka &quot;RTF Stack Buffer Overflow Vulnerability.&quot;
</code>
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
- [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction)
### CVE-2010-3490 (2010-09-28)
@ -33550,13 +33517,6 @@
- [magisterquis/cve-2010-3847](https://github.com/magisterquis/cve-2010-3847)
### CVE-2010-3904 (2010-12-06)
<code>The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
</code>
- [redhatkaty/-cve-2010-3904-report](https://github.com/redhatkaty/-cve-2010-3904-report)
### CVE-2010-3971 (2010-12-22)
<code>Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka &quot;CSS Memory Corruption Vulnerability.&quot;