mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/03/17 06:08:58
This commit is contained in:
parent
87ee342a8b
commit
45e60819f3
93 changed files with 118 additions and 3966 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-02-03T12:00:39Z",
|
||||
"updated_at": "2021-02-20T15:30:56Z",
|
||||
"updated_at": "2021-03-16T17:43:52Z",
|
||||
"pushed_at": "2017-02-03T15:46:06Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"forks_count": 143,
|
||||
"forks": 143,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"watchers": 356,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 120640426,
|
||||
"name": "CVE-2018-0101-DOS-POC",
|
||||
"full_name": "1337g\/CVE-2018-0101-DOS-POC",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2018-0101-DOS-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T16:25:59Z",
|
||||
"updated_at": "2020-04-06T12:17:46Z",
|
||||
"pushed_at": "2018-02-07T16:43:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120782386,
|
||||
"name": "ciscoasa_honeypot",
|
||||
|
|
|
@ -1,96 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 117077311,
|
||||
"name": "CVE-2018-0802_POC",
|
||||
"full_name": "zldww2011\/CVE-2018-0802_POC",
|
||||
"owner": {
|
||||
"login": "zldww2011",
|
||||
"id": 17902585,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17902585?v=4",
|
||||
"html_url": "https:\/\/github.com\/zldww2011"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zldww2011\/CVE-2018-0802_POC",
|
||||
"description": "Exploit the vulnerability to execute the calculator",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:16:32Z",
|
||||
"updated_at": "2021-03-11T00:53:56Z",
|
||||
"pushed_at": "2018-01-11T09:23:05Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117080574,
|
||||
"name": "CVE-2018-0802",
|
||||
"full_name": "rxwx\/CVE-2018-0802",
|
||||
"owner": {
|
||||
"login": "rxwx",
|
||||
"id": 2202542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
|
||||
"html_url": "https:\/\/github.com\/rxwx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rxwx\/CVE-2018-0802",
|
||||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2021-03-11T01:21:25Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"forks_count": 136,
|
||||
"forks": 136,
|
||||
"watchers": 266,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117234193,
|
||||
"name": "RTF_11882_0802",
|
||||
"full_name": "Ridter\/RTF_11882_0802",
|
||||
"owner": {
|
||||
"login": "Ridter",
|
||||
"id": 6007471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ridter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802",
|
||||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2021-03-11T01:08:36Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117637270,
|
||||
"name": "CVE-2018-0802_CVE-2017-11882",
|
||||
"full_name": "likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T05:49:01Z",
|
||||
"updated_at": "2021-03-11T01:10:37Z",
|
||||
"pushed_at": "2018-01-16T05:49:10Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313441734,
|
||||
"name": "rtfkit",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 120648393,
|
||||
"name": "CVE-2018-1000001",
|
||||
"full_name": "0x00-0x00\/CVE-2018-1000001",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-1000001",
|
||||
"description": "glibc getcwd() local privilege escalation compiled binaries",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T17:34:24Z",
|
||||
"updated_at": "2020-12-02T07:21:01Z",
|
||||
"pushed_at": "2018-02-09T22:35:06Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 118851943,
|
||||
"name": "CVE-2018-1000006-DEMO",
|
||||
"full_name": "CHYbeta\/CVE-2018-1000006-DEMO",
|
||||
"owner": {
|
||||
"login": "CHYbeta",
|
||||
"id": 18642224,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18642224?v=4",
|
||||
"html_url": "https:\/\/github.com\/CHYbeta"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CHYbeta\/CVE-2018-1000006-DEMO",
|
||||
"description": "The Demo for CVE-2018-1000006",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T02:38:44Z",
|
||||
"updated_at": "2020-07-13T15:22:09Z",
|
||||
"pushed_at": "2018-01-25T03:29:30Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 136231159,
|
||||
"name": "CVE-2018-1000117-Exploit",
|
||||
"full_name": "u0pattern\/CVE-2018-1000117-Exploit",
|
||||
"owner": {
|
||||
"login": "u0pattern",
|
||||
"id": 21009276,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21009276?v=4",
|
||||
"html_url": "https:\/\/github.com\/u0pattern"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/u0pattern\/CVE-2018-1000117-Exploit",
|
||||
"description": "Buffer Overflow Vulnerability that can result ACE",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-05T20:28:29Z",
|
||||
"updated_at": "2020-06-30T04:18:59Z",
|
||||
"pushed_at": "2018-06-05T20:45:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131973710,
|
||||
"name": "CVE-2018-1000199",
|
||||
"full_name": "dsfau\/CVE-2018-1000199",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/CVE-2018-1000199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T09:37:56Z",
|
||||
"updated_at": "2018-05-03T09:41:20Z",
|
||||
"pushed_at": "2018-05-03T09:41:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 130343381,
|
||||
"name": "Detecting-the-patch-of-CVE-2018-1010",
|
||||
"full_name": "ymgh96\/Detecting-the-patch-of-CVE-2018-1010",
|
||||
"owner": {
|
||||
"login": "ymgh96",
|
||||
"id": 29282323,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29282323?v=4",
|
||||
"html_url": "https:\/\/github.com\/ymgh96"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ymgh96\/Detecting-the-patch-of-CVE-2018-1010",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-20T09:50:40Z",
|
||||
"updated_at": "2018-04-20T11:01:36Z",
|
||||
"pushed_at": "2018-04-20T11:01:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131403764,
|
||||
"name": "Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"full_name": "ymgh96\/Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"owner": {
|
||||
"login": "ymgh96",
|
||||
"id": 29282323,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29282323?v=4",
|
||||
"html_url": "https:\/\/github.com\/ymgh96"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ymgh96\/Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:28:11Z",
|
||||
"updated_at": "2018-04-28T11:32:03Z",
|
||||
"pushed_at": "2018-04-28T11:32:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131241395,
|
||||
"name": "CVE-2018-10467",
|
||||
"full_name": "alt3kx\/CVE-2018-10467",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10467",
|
||||
"description": "CVE-2018-10467",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-27T03:35:47Z",
|
||||
"updated_at": "2018-05-04T02:07:18Z",
|
||||
"pushed_at": "2018-05-04T02:01:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131973382,
|
||||
"name": "CVE-2018-10546",
|
||||
"full_name": "dsfau\/CVE-2018-10546",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/CVE-2018-10546",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T09:35:27Z",
|
||||
"updated_at": "2018-05-03T09:36:53Z",
|
||||
"pushed_at": "2018-05-03T09:36:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132433462,
|
||||
"name": "Gpon-Routers",
|
||||
"full_name": "rotemkama\/Gpon-Routers",
|
||||
"owner": {
|
||||
"login": "rotemkama",
|
||||
"id": 7814256,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7814256?v=4",
|
||||
"html_url": "https:\/\/github.com\/rotemkama"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rotemkama\/Gpon-Routers",
|
||||
"description": "Authentication Bypass \/ Command Injection Exploit CVE-2018-1056",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T08:52:45Z",
|
||||
"updated_at": "2020-05-28T11:06:32Z",
|
||||
"pushed_at": "2018-05-04T06:52:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,96 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 132445475,
|
||||
"name": "GPON",
|
||||
"full_name": "f3d0x0\/GPON",
|
||||
"owner": {
|
||||
"login": "f3d0x0",
|
||||
"id": 6794063,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6794063?v=4",
|
||||
"html_url": "https:\/\/github.com\/f3d0x0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/f3d0x0\/GPON",
|
||||
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T10:34:10Z",
|
||||
"updated_at": "2021-03-12T14:48:25Z",
|
||||
"pushed_at": "2018-05-10T15:08:43Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133550928,
|
||||
"name": "Pingpon-Exploit",
|
||||
"full_name": "649\/Pingpon-Exploit",
|
||||
"owner": {
|
||||
"login": "649",
|
||||
"id": 23534047,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23534047?v=4",
|
||||
"html_url": "https:\/\/github.com\/649"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/649\/Pingpon-Exploit",
|
||||
"description": "Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-15T17:31:21Z",
|
||||
"updated_at": "2020-01-05T18:02:50Z",
|
||||
"pushed_at": "2018-05-26T06:44:44Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133872939,
|
||||
"name": "GPON-LOADER",
|
||||
"full_name": "Choudai\/GPON-LOADER",
|
||||
"owner": {
|
||||
"login": "Choudai",
|
||||
"id": 28324694,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28324694?v=4",
|
||||
"html_url": "https:\/\/github.com\/Choudai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Choudai\/GPON-LOADER",
|
||||
"description": "Exploit loader for Remote Code Execution w\/ Payload on GPON Home Gateway devices (CVE-2018-10562) written in Python.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T22:03:47Z",
|
||||
"updated_at": "2020-06-27T20:05:00Z",
|
||||
"pushed_at": "2018-05-17T22:15:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134941877,
|
||||
"name": "GPON_RCE",
|
||||
"full_name": "c0ld1\/GPON_RCE",
|
||||
"owner": {
|
||||
"login": "c0ld1",
|
||||
"id": 39249476,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39249476?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0ld1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0ld1\/GPON_RCE",
|
||||
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-26T08:05:22Z",
|
||||
"updated_at": "2019-07-30T02:41:47Z",
|
||||
"pushed_at": "2018-05-26T08:07:37Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136307543,
|
||||
"name": "CVE-2018-10562",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131920571,
|
||||
"name": "CVE-2018-10583",
|
||||
"full_name": "TaharAmine\/CVE-2018-10583",
|
||||
"owner": {
|
||||
"login": "TaharAmine",
|
||||
"id": 35707349,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35707349?v=4",
|
||||
"html_url": "https:\/\/github.com\/TaharAmine"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TaharAmine\/CVE-2018-10583",
|
||||
"description": "An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by \"xlink:href=file:\/\/192.168.0.2\/test.jpg\" within an \"office:document-content\" element in a \".odt XML document\".",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T00:34:08Z",
|
||||
"updated_at": "2021-01-05T12:18:31Z",
|
||||
"pushed_at": "2018-05-03T00:38:56Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132069525,
|
||||
"name": "CVE-2018-10715",
|
||||
"full_name": "alt3kx\/CVE-2018-10715",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10715",
|
||||
"description": "CVE-2018-10715",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-04T01:33:22Z",
|
||||
"updated_at": "2018-05-04T02:17:30Z",
|
||||
"pushed_at": "2018-05-04T02:17:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132435515,
|
||||
"name": "CVE-2018-10732",
|
||||
"full_name": "alt3kx\/CVE-2018-10732",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10732",
|
||||
"description": "Dataiku REST-API by default the software, allows anonymous access to functionality that allows an attacker to know valid users.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T09:07:58Z",
|
||||
"updated_at": "2018-06-05T11:51:00Z",
|
||||
"pushed_at": "2018-06-02T09:15:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 133791805,
|
||||
"name": "CVE-2018-1111",
|
||||
"full_name": "knqyf263\/CVE-2018-1111",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-1111",
|
||||
"description": "Environment for DynoRoot (CVE-2018-1111)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T09:37:19Z",
|
||||
"updated_at": "2020-11-27T01:55:02Z",
|
||||
"pushed_at": "2018-05-17T10:03:18Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133957885,
|
||||
"name": "CVE-2018-1111",
|
||||
"full_name": "kkirsche\/CVE-2018-1111",
|
||||
"owner": {
|
||||
"login": "kkirsche",
|
||||
"id": 947110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4",
|
||||
"html_url": "https:\/\/github.com\/kkirsche"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2018-1111",
|
||||
"description": "CVE-2018-1111 DynoRoot",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-18T13:27:43Z",
|
||||
"updated_at": "2021-03-03T11:34:28Z",
|
||||
"pushed_at": "2018-05-21T13:10:48Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313717464,
|
||||
"name": "FEP3370-advanced-ethical-hacking",
|
||||
|
|
|
@ -22,52 +22,6 @@
|
|||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135556339,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "vmotos\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "vmotos",
|
||||
"id": 22636953,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22636953?v=4",
|
||||
"html_url": "https:\/\/github.com\/vmotos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vmotos\/CVE-2018-11235",
|
||||
"description": "RCE vulnerability to exec \"git clone --recurse-submodule\" (CVE-2018-11235)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T08:38:17Z",
|
||||
"updated_at": "2018-05-31T09:11:10Z",
|
||||
"pushed_at": "2018-05-31T09:11:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135587582,
|
||||
"name": "cve-2018-11235",
|
||||
"full_name": "Choihosu\/cve-2018-11235",
|
||||
"owner": {
|
||||
"login": "Choihosu",
|
||||
"id": 18625744,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18625744?v=4",
|
||||
"html_url": "https:\/\/github.com\/Choihosu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Choihosu\/cve-2018-11235",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T13:29:06Z",
|
||||
"updated_at": "2018-05-31T13:29:06Z",
|
||||
"pushed_at": "2018-05-31T13:29:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135652327,
|
||||
"name": "CVE-2018-11235-DEMO",
|
||||
|
@ -91,52 +45,6 @@
|
|||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136300278,
|
||||
"name": "CVE-2018-11235-poc",
|
||||
"full_name": "Kiss-sh0t\/CVE-2018-11235-poc",
|
||||
"owner": {
|
||||
"login": "Kiss-sh0t",
|
||||
"id": 16567682,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16567682?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kiss-sh0t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kiss-sh0t\/CVE-2018-11235-poc",
|
||||
"description": "for git v2.7.4",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-06T08:48:57Z",
|
||||
"updated_at": "2018-06-06T08:56:02Z",
|
||||
"pushed_at": "2018-06-06T08:54:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136924699,
|
||||
"name": "clone_and_pwn",
|
||||
"full_name": "H0K5\/clone_and_pwn",
|
||||
"owner": {
|
||||
"login": "H0K5",
|
||||
"id": 8493152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8493152?v=4",
|
||||
"html_url": "https:\/\/github.com\/H0K5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H0K5\/clone_and_pwn",
|
||||
"description": "Exploits CVE-2018-11235",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-11T12:41:34Z",
|
||||
"updated_at": "2020-05-25T14:25:16Z",
|
||||
"pushed_at": "2018-06-06T17:24:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 143149359,
|
||||
"name": "CVE-2018-11235",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 135661128,
|
||||
"name": "CVE-2018-11236",
|
||||
"full_name": "evilmiracle\/CVE-2018-11236",
|
||||
"owner": {
|
||||
"login": "evilmiracle",
|
||||
"id": 17810331,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17810331?v=4",
|
||||
"html_url": "https:\/\/github.com\/evilmiracle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/evilmiracle\/CVE-2018-11236",
|
||||
"description": "Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-01T03:05:42Z",
|
||||
"updated_at": "2018-06-04T19:47:31Z",
|
||||
"pushed_at": "2018-05-31T07:32:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308481035,
|
||||
"name": "CVE-2018-11236",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 134974554,
|
||||
"name": "mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"full_name": "EmreOvunc\/mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"description": "CVE-2018-11517 | mySCADA myPRO v7.0.46 has another vulnerability to discover all projects in the system.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-26T15:49:07Z",
|
||||
"updated_at": "2021-03-01T05:24:30Z",
|
||||
"pushed_at": "2018-05-28T21:51:58Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 128482458,
|
||||
"name": "CVE-2018-1270",
|
||||
"full_name": "CaledoniaProject\/CVE-2018-1270",
|
||||
"owner": {
|
||||
"login": "CaledoniaProject",
|
||||
"id": 1357701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1357701?v=4",
|
||||
"html_url": "https:\/\/github.com\/CaledoniaProject"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CaledoniaProject\/CVE-2018-1270",
|
||||
"description": "Spring messaging STOMP protocol RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-07T00:14:33Z",
|
||||
"updated_at": "2021-02-21T18:09:31Z",
|
||||
"pushed_at": "2018-04-12T05:48:24Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129230393,
|
||||
"name": "CVE-2018-1270_EXP",
|
||||
"full_name": "genxor\/CVE-2018-1270_EXP",
|
||||
"owner": {
|
||||
"login": "genxor",
|
||||
"id": 3094713,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3094713?v=4",
|
||||
"html_url": "https:\/\/github.com\/genxor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/genxor\/CVE-2018-1270_EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T09:54:34Z",
|
||||
"updated_at": "2019-10-11T19:04:29Z",
|
||||
"pushed_at": "2018-04-12T10:00:45Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158213121,
|
||||
"name": "CVE-2018-1270",
|
||||
|
|
|
@ -22,29 +22,6 @@
|
|||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129910523,
|
||||
"name": "poc-cve-2018-1273",
|
||||
"full_name": "wearearima\/poc-cve-2018-1273",
|
||||
"owner": {
|
||||
"login": "wearearima",
|
||||
"id": 24791991,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24791991?v=4",
|
||||
"html_url": "https:\/\/github.com\/wearearima"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wearearima\/poc-cve-2018-1273",
|
||||
"description": "POC for CVE-2018-1273",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T13:41:00Z",
|
||||
"updated_at": "2020-09-29T16:06:24Z",
|
||||
"pushed_at": "2018-06-05T15:07:18Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 151734933,
|
||||
"name": "poc-cve-2018-1273",
|
||||
|
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 122712148,
|
||||
"name": "CVE-2018-1304",
|
||||
"full_name": "knqyf263\/CVE-2018-1304",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-1304",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-24T06:45:21Z",
|
||||
"updated_at": "2018-05-07T09:36:43Z",
|
||||
"pushed_at": "2018-02-25T12:29:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 124373835,
|
||||
"name": "tomcat_CVE-2018-1304_testing",
|
||||
"full_name": "thariyarox\/tomcat_CVE-2018-1304_testing",
|
||||
"owner": {
|
||||
"login": "thariyarox",
|
||||
"id": 8102507,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8102507?v=4",
|
||||
"html_url": "https:\/\/github.com\/thariyarox"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thariyarox\/tomcat_CVE-2018-1304_testing",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-03-08T10:12:22Z",
|
||||
"updated_at": "2018-03-08T10:24:11Z",
|
||||
"pushed_at": "2018-03-08T10:30:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 129016985,
|
||||
"name": "CVE-2018-1305",
|
||||
"full_name": "Pa55w0rd\/CVE-2018-1305",
|
||||
"owner": {
|
||||
"login": "Pa55w0rd",
|
||||
"id": 16274549,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16274549?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pa55w0rd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pa55w0rd\/CVE-2018-1305",
|
||||
"description": "Apache Tomcat 安全绕过漏洞 Poc",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-11T01:37:58Z",
|
||||
"updated_at": "2020-12-14T07:06:56Z",
|
||||
"pushed_at": "2018-03-12T18:05:03Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2021-03-16T15:08:37Z",
|
||||
"updated_at": "2021-03-16T18:53:56Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 434,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 125186745,
|
||||
"name": "CVE-2018-2380",
|
||||
"full_name": "erpscanteam\/CVE-2018-2380",
|
||||
"owner": {
|
||||
"login": "erpscanteam",
|
||||
"id": 35491827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35491827?v=4",
|
||||
"html_url": "https:\/\/github.com\/erpscanteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erpscanteam\/CVE-2018-2380",
|
||||
"description": "PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-14T09:20:21Z",
|
||||
"updated_at": "2021-03-04T05:52:00Z",
|
||||
"pushed_at": "2018-03-14T12:13:43Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 129995161,
|
||||
"name": "CVE-2018-2628",
|
||||
"full_name": "forlin\/CVE-2018-2628",
|
||||
"owner": {
|
||||
"login": "forlin",
|
||||
"id": 3012554,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3012554?v=4",
|
||||
"html_url": "https:\/\/github.com\/forlin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/forlin\/CVE-2018-2628",
|
||||
"description": "CVE-2018-2628",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-18T02:56:39Z",
|
||||
"updated_at": "2020-05-16T15:11:58Z",
|
||||
"pushed_at": "2018-04-18T02:48:58Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130009588,
|
||||
"name": "CVE-2018-2628",
|
||||
|
@ -45,259 +22,6 @@
|
|||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130047996,
|
||||
"name": "CVE-2018-2628",
|
||||
"full_name": "skydarker\/CVE-2018-2628",
|
||||
"owner": {
|
||||
"login": "skydarker",
|
||||
"id": 25345671,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25345671?v=4",
|
||||
"html_url": "https:\/\/github.com\/skydarker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/skydarker\/CVE-2018-2628",
|
||||
"description": "CVE-2018-2628",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-18T10:50:09Z",
|
||||
"updated_at": "2018-04-18T11:23:19Z",
|
||||
"pushed_at": "2018-04-18T11:23:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130088305,
|
||||
"name": "weblogic-cve-2018-2628",
|
||||
"full_name": "jiansiting\/weblogic-cve-2018-2628",
|
||||
"owner": {
|
||||
"login": "jiansiting",
|
||||
"id": 28823754,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiansiting"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiansiting\/weblogic-cve-2018-2628",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-18T16:04:17Z",
|
||||
"updated_at": "2019-11-01T06:57:08Z",
|
||||
"pushed_at": "2018-04-18T16:04:26Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130098527,
|
||||
"name": "CVE-2018-2628-detect",
|
||||
"full_name": "zjxzjx\/CVE-2018-2628-detect",
|
||||
"owner": {
|
||||
"login": "zjxzjx",
|
||||
"id": 8297291,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8297291?v=4",
|
||||
"html_url": "https:\/\/github.com\/zjxzjx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zjxzjx\/CVE-2018-2628-detect",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-18T17:28:44Z",
|
||||
"updated_at": "2018-11-14T06:35:35Z",
|
||||
"pushed_at": "2018-04-20T03:47:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130101048,
|
||||
"name": "CVE-2018-2628-MultiThreading",
|
||||
"full_name": "aedoo\/CVE-2018-2628-MultiThreading",
|
||||
"owner": {
|
||||
"login": "aedoo",
|
||||
"id": 19517413,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19517413?v=4",
|
||||
"html_url": "https:\/\/github.com\/aedoo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aedoo\/CVE-2018-2628-MultiThreading",
|
||||
"description": "WebLogic WLS核心组件反序列化漏洞多线程批量检测脚本 CVE-2018-2628-MultiThreading",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-18T17:50:29Z",
|
||||
"updated_at": "2020-05-08T14:01:45Z",
|
||||
"pushed_at": "2018-04-19T06:56:29Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130153239,
|
||||
"name": "CVE-2018-2628",
|
||||
"full_name": "hawk-520\/CVE-2018-2628",
|
||||
"owner": {
|
||||
"login": "hawk-520",
|
||||
"id": 37926610,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37926610?v=4",
|
||||
"html_url": "https:\/\/github.com\/hawk-520"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hawk-520\/CVE-2018-2628",
|
||||
"description": "CVE-2018-2628",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-19T03:19:15Z",
|
||||
"updated_at": "2020-10-20T18:58:02Z",
|
||||
"pushed_at": "2018-04-18T18:28:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130239892,
|
||||
"name": "CVE-2018-2628",
|
||||
"full_name": "9uest\/CVE-2018-2628",
|
||||
"owner": {
|
||||
"login": "9uest",
|
||||
"id": 11766504,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11766504?v=4",
|
||||
"html_url": "https:\/\/github.com\/9uest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/9uest\/CVE-2018-2628",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-19T15:56:49Z",
|
||||
"updated_at": "2018-06-22T05:38:30Z",
|
||||
"pushed_at": "2018-04-19T16:05:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130291417,
|
||||
"name": "CVE-2018-2628all",
|
||||
"full_name": "Shadowshusky\/CVE-2018-2628all",
|
||||
"owner": {
|
||||
"login": "Shadowshusky",
|
||||
"id": 31649758,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31649758?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shadowshusky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shadowshusky\/CVE-2018-2628all",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-20T01:24:17Z",
|
||||
"updated_at": "2019-06-12T09:17:11Z",
|
||||
"pushed_at": "2018-04-20T01:24:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130296227,
|
||||
"name": "CVE-2018-2628",
|
||||
"full_name": "shaoshore\/CVE-2018-2628",
|
||||
"owner": {
|
||||
"login": "shaoshore",
|
||||
"id": 36906351,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36906351?v=4",
|
||||
"html_url": "https:\/\/github.com\/shaoshore"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shaoshore\/CVE-2018-2628",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-20T02:14:21Z",
|
||||
"updated_at": "2018-04-20T02:14:21Z",
|
||||
"pushed_at": "2018-04-20T02:14:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 131935440,
|
||||
"name": "ysoserial-cve-2018-2628",
|
||||
"full_name": "tdy218\/ysoserial-cve-2018-2628",
|
||||
"owner": {
|
||||
"login": "tdy218",
|
||||
"id": 4214030,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4214030?v=4",
|
||||
"html_url": "https:\/\/github.com\/tdy218"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tdy218\/ysoserial-cve-2018-2628",
|
||||
"description": "Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T03:13:05Z",
|
||||
"updated_at": "2021-02-07T08:35:45Z",
|
||||
"pushed_at": "2018-05-21T09:06:43Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134244931,
|
||||
"name": "CVE-2018-2628",
|
||||
"full_name": "s0wr0b1ndef\/CVE-2018-2628",
|
||||
"owner": {
|
||||
"login": "s0wr0b1ndef",
|
||||
"id": 37288034,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37288034?v=4",
|
||||
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/CVE-2018-2628",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-21T09:04:45Z",
|
||||
"updated_at": "2018-06-13T08:54:52Z",
|
||||
"pushed_at": "2018-05-21T09:04:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136104138,
|
||||
"name": "cve-2018-2628",
|
||||
"full_name": "wrysunny\/cve-2018-2628",
|
||||
"owner": {
|
||||
"login": "wrysunny",
|
||||
"id": 20748454,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20748454?v=4",
|
||||
"html_url": "https:\/\/github.com\/wrysunny"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wrysunny\/cve-2018-2628",
|
||||
"description": "cve-2018-2628 反弹shell",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-05T01:47:02Z",
|
||||
"updated_at": "2018-06-05T01:48:07Z",
|
||||
"pushed_at": "2018-06-05T01:48:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136164259,
|
||||
"name": "CVE-2018-2628",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 119399468,
|
||||
"name": "CVE-2018-2636",
|
||||
"full_name": "erpscanteam\/CVE-2018-2636",
|
||||
"owner": {
|
||||
"login": "erpscanteam",
|
||||
"id": 35491827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35491827?v=4",
|
||||
"html_url": "https:\/\/github.com\/erpscanteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erpscanteam\/CVE-2018-2636",
|
||||
"description": "ERPScan Public POC for CVE-2018-2636",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T15:16:02Z",
|
||||
"updated_at": "2020-07-17T11:18:33Z",
|
||||
"pushed_at": "2018-02-01T15:36:19Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120569870,
|
||||
"name": "micros_honeypot",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 120301126,
|
||||
"name": "Trend_Micro_POC",
|
||||
"full_name": "ZhiyuanWang-Chengdu-Qihoo360\/Trend_Micro_POC",
|
||||
"owner": {
|
||||
"login": "ZhiyuanWang-Chengdu-Qihoo360",
|
||||
"id": 35134599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35134599?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZhiyuanWang-Chengdu-Qihoo360"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZhiyuanWang-Chengdu-Qihoo360\/Trend_Micro_POC",
|
||||
"description": "CVE-2018-3608 Trend_Micro_CVE",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-05T12:22:28Z",
|
||||
"updated_at": "2019-09-27T17:09:24Z",
|
||||
"pushed_at": "2018-02-05T12:55:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 135628428,
|
||||
"name": "ssbd-tools",
|
||||
"full_name": "tyhicks\/ssbd-tools",
|
||||
"owner": {
|
||||
"login": "tyhicks",
|
||||
"id": 1051156,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1051156?v=4",
|
||||
"html_url": "https:\/\/github.com\/tyhicks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tyhicks\/ssbd-tools",
|
||||
"description": "Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) using the Speculative Store Bypass Disable (SSBD) feature of x86 processors",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T19:48:18Z",
|
||||
"updated_at": "2019-12-16T15:32:25Z",
|
||||
"pushed_at": "2018-06-01T16:53:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 137829375,
|
||||
"name": "Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 127300096,
|
||||
"name": "CVE-2018-3810",
|
||||
"full_name": "lucad93\/CVE-2018-3810",
|
||||
"owner": {
|
||||
"login": "lucad93",
|
||||
"id": 11524244,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11524244?v=4",
|
||||
"html_url": "https:\/\/github.com\/lucad93"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lucad93\/CVE-2018-3810",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-03-29T14:04:11Z",
|
||||
"updated_at": "2018-03-29T14:06:18Z",
|
||||
"pushed_at": "2018-04-04T13:42:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 168879431,
|
||||
"name": "cve-2018-3810",
|
||||
|
|
|
@ -21,51 +21,5 @@
|
|||
"forks": 22,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123298406,
|
||||
"name": "UnjailMe",
|
||||
"full_name": "MTJailed\/UnjailMe",
|
||||
"owner": {
|
||||
"login": "MTJailed",
|
||||
"id": 31187886,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31187886?v=4",
|
||||
"html_url": "https:\/\/github.com\/MTJailed"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MTJailed\/UnjailMe",
|
||||
"description": "A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-28T14:45:06Z",
|
||||
"updated_at": "2021-03-11T01:57:10Z",
|
||||
"pushed_at": "2018-05-08T10:59:23Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 124429247,
|
||||
"name": "Exploit11.2",
|
||||
"full_name": "joedaguy\/Exploit11.2",
|
||||
"owner": {
|
||||
"login": "joedaguy",
|
||||
"id": 37167590,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37167590?v=4",
|
||||
"html_url": "https:\/\/github.com\/joedaguy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/joedaguy\/Exploit11.2",
|
||||
"description": "Exploit iOS 11.2.x by ZIMPERIUM and semi-completed by me. Sandbox escapes on CVE-2018-4087. ",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-08T18:04:31Z",
|
||||
"updated_at": "2020-04-06T19:47:42Z",
|
||||
"pushed_at": "2018-03-08T15:41:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 105685717,
|
||||
"name": "ios11-cookie-set-expire-issue",
|
||||
"full_name": "bencompton\/ios11-cookie-set-expire-issue",
|
||||
"owner": {
|
||||
"login": "bencompton",
|
||||
"id": 3343482,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3343482?v=4",
|
||||
"html_url": "https:\/\/github.com\/bencompton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bencompton\/ios11-cookie-set-expire-issue",
|
||||
"description": "Reproduction of iOS 11 bug CVE-2018-4110",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-03T18:09:30Z",
|
||||
"updated_at": "2019-05-07T14:07:43Z",
|
||||
"pushed_at": "2017-10-16T15:07:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 130184573,
|
||||
"name": "CVE-2018-4121",
|
||||
"full_name": "FSecureLABS\/CVE-2018-4121",
|
||||
"owner": {
|
||||
"login": "FSecureLABS",
|
||||
"id": 1469843,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1469843?v=4",
|
||||
"html_url": "https:\/\/github.com\/FSecureLABS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FSecureLABS\/CVE-2018-4121",
|
||||
"description": "macOS 10.13.3 (17D47) Safari Wasm Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-19T08:33:12Z",
|
||||
"updated_at": "2020-04-16T03:34:01Z",
|
||||
"pushed_at": "2018-04-19T11:20:41Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 141314432,
|
||||
"name": "CVE-2018-4121",
|
||||
|
|
|
@ -1,71 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132634317,
|
||||
"name": "CVE-2018-4150",
|
||||
"full_name": "Jailbreaks\/CVE-2018-4150",
|
||||
"owner": {
|
||||
"login": "Jailbreaks",
|
||||
"id": 25392316,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25392316?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jailbreaks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jailbreaks\/CVE-2018-4150",
|
||||
"description": "Proof of concept for CVE-2018-4150 by @cmwdotme ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-08T16:12:59Z",
|
||||
"updated_at": "2018-11-16T12:24:04Z",
|
||||
"pushed_at": "2018-05-08T16:14:50Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 132916613,
|
||||
"name": "LovelySn0w",
|
||||
"full_name": "RPwnage\/LovelySn0w",
|
||||
"owner": {
|
||||
"login": "RPwnage",
|
||||
"id": 33968601,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33968601?v=4",
|
||||
"html_url": "https:\/\/github.com\/RPwnage"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RPwnage\/LovelySn0w",
|
||||
"description": "a iOS CVE-2018-4150 Application example.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-10T15:04:44Z",
|
||||
"updated_at": "2021-03-07T13:25:09Z",
|
||||
"pushed_at": "2018-05-14T14:32:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135454936,
|
||||
"name": "incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-",
|
||||
"full_name": "littlelailo\/incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-",
|
||||
"owner": {
|
||||
"login": "littlelailo",
|
||||
"id": 28736661,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28736661?v=4",
|
||||
"html_url": "https:\/\/github.com\/littlelailo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/littlelailo\/incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-",
|
||||
"description": "incomplete exploit for CVE-2018-4150 (by cmwdotme) for devices without SMAP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T14:29:37Z",
|
||||
"updated_at": "2020-09-29T08:51:45Z",
|
||||
"pushed_at": "2018-05-30T14:39:55Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 123051746,
|
||||
"name": "x18-leak",
|
||||
"full_name": "bazad\/x18-leak",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/x18-leak",
|
||||
"description": "CVE-2018-4185: iOS 11.2-11.2.6 kernel pointer disclosure introduced by Apple's Meltdown mitigation.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-27T00:58:39Z",
|
||||
"updated_at": "2020-09-07T11:40:43Z",
|
||||
"pushed_at": "2018-03-07T08:07:29Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 114446755,
|
||||
"name": "gsscred-race",
|
||||
"full_name": "bazad\/gsscred-race",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/gsscred-race",
|
||||
"description": "CVE-2018-4331: Exploit for a race condition in the GSSCred system service on iOS 11.2.",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-16T08:48:08Z",
|
||||
"updated_at": "2020-04-14T17:58:29Z",
|
||||
"pushed_at": "2018-01-09T07:23:15Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 113555592,
|
||||
"name": "gsscred-move-uaf",
|
||||
"full_name": "bazad\/gsscred-move-uaf",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/gsscred-move-uaf",
|
||||
"description": "CVE-2018-4343: Proof-of-concept for a use-after-free in the GSSCred daemon on macOS and iOS.",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-08T09:15:37Z",
|
||||
"updated_at": "2020-10-10T06:38:29Z",
|
||||
"pushed_at": "2017-12-09T23:23:47Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,98 +22,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120909146,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "mdsecactivebreach\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "mdsecactivebreach",
|
||||
"id": 29373540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29373540?v=4",
|
||||
"html_url": "https:\/\/github.com\/mdsecactivebreach"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mdsecactivebreach\/CVE-2018-4878",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T13:30:46Z",
|
||||
"updated_at": "2020-03-26T07:15:42Z",
|
||||
"pushed_at": "2018-02-09T14:38:27Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120962228,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "hybridious\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "hybridious",
|
||||
"id": 26754785,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26754785?v=4",
|
||||
"html_url": "https:\/\/github.com\/hybridious"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hybridious\/CVE-2018-4878",
|
||||
"description": "Aggressor Script to just launch IE driveby for CVE-2018-4878",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T22:25:03Z",
|
||||
"updated_at": "2018-02-10T09:26:14Z",
|
||||
"pushed_at": "2018-02-09T22:09:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121002284,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "vysecurity\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "vysecurity",
|
||||
"id": 3596242,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
|
||||
"html_url": "https:\/\/github.com\/vysecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2018-4878",
|
||||
"description": "Aggressor Script to launch IE driveby for CVE-2018-4878",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-10T09:30:18Z",
|
||||
"updated_at": "2021-02-07T07:18:41Z",
|
||||
"pushed_at": "2018-02-10T19:39:10Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 122663508,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "KathodeN\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "KathodeN",
|
||||
"id": 29355827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29355827?v=4",
|
||||
"html_url": "https:\/\/github.com\/KathodeN"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KathodeN\/CVE-2018-4878",
|
||||
"description": "CVE-2018-4878 样本",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-23T19:24:40Z",
|
||||
"updated_at": "2020-12-10T06:55:01Z",
|
||||
"pushed_at": "2018-02-22T07:10:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 128007297,
|
||||
"name": "CVE-2018-4878",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 125461828,
|
||||
"name": "CVE-2018-4879",
|
||||
"full_name": "H3llozy\/CVE-2018-4879",
|
||||
"owner": {
|
||||
"login": "H3llozy",
|
||||
"id": 15612861,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15612861?v=4",
|
||||
"html_url": "https:\/\/github.com\/H3llozy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H3llozy\/CVE-2018-4879",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-03-16T04:04:55Z",
|
||||
"updated_at": "2021-01-13T15:13:50Z",
|
||||
"pushed_at": "2018-03-15T16:02:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 125818046,
|
||||
"name": "CVE-2018-4901",
|
||||
"full_name": "bigric3\/CVE-2018-4901",
|
||||
"owner": {
|
||||
"login": "bigric3",
|
||||
"id": 22165361,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22165361?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigric3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigric3\/CVE-2018-4901",
|
||||
"description": "crash poc & Leak info PoC",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-19T07:27:53Z",
|
||||
"updated_at": "2018-11-16T12:24:04Z",
|
||||
"pushed_at": "2018-03-19T07:29:42Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131737249,
|
||||
"name": "ble_norton_core",
|
||||
"full_name": "embedi\/ble_norton_core",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/ble_norton_core",
|
||||
"description": "PoC exploit for CVE-2018-5234",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-01T16:40:30Z",
|
||||
"updated_at": "2021-01-15T23:48:08Z",
|
||||
"pushed_at": "2018-05-02T08:50:57Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 119782218,
|
||||
"name": "Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"full_name": "huzhenghui\/Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"owner": {
|
||||
"login": "huzhenghui",
|
||||
"id": 4843755,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4843755?v=4",
|
||||
"html_url": "https:\/\/github.com\/huzhenghui"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huzhenghui\/Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-01T04:21:13Z",
|
||||
"updated_at": "2018-02-02T07:40:36Z",
|
||||
"pushed_at": "2018-02-01T06:24:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 119790221,
|
||||
"name": "Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"full_name": "huzhenghui\/Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"owner": {
|
||||
"login": "huzhenghui",
|
||||
"id": 4843755,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4843755?v=4",
|
||||
"html_url": "https:\/\/github.com\/huzhenghui"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huzhenghui\/Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-01T06:00:14Z",
|
||||
"updated_at": "2018-02-02T04:30:18Z",
|
||||
"pushed_at": "2018-02-01T06:23:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 118846181,
|
||||
"name": "CVE-2018-5951",
|
||||
"full_name": "Nat-Lab\/CVE-2018-5951",
|
||||
"owner": {
|
||||
"login": "Nat-Lab",
|
||||
"id": 18462539,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18462539?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nat-Lab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nat-Lab\/CVE-2018-5951",
|
||||
"description": "MikroTik RouterOS Denial of Service Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T01:40:02Z",
|
||||
"updated_at": "2021-03-08T16:00:44Z",
|
||||
"pushed_at": "2018-02-11T06:51:29Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 387,
|
||||
"watchers_count": 387,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 387,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -22,29 +22,6 @@
|
|||
"watchers": 417,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134342730,
|
||||
"name": "rcm-modchips",
|
||||
"full_name": "reswitched\/rcm-modchips",
|
||||
"owner": {
|
||||
"login": "reswitched",
|
||||
"id": 26338222,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26338222?v=4",
|
||||
"html_url": "https:\/\/github.com\/reswitched"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/reswitched\/rcm-modchips",
|
||||
"description": "Collection of \"modchip\" designs for launching payloads via the Tegra RCM bug (CVE-2018-6242) ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-22T01:15:14Z",
|
||||
"updated_at": "2019-01-22T23:33:39Z",
|
||||
"pushed_at": "2018-05-22T07:44:42Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263447074,
|
||||
"name": "react-tegra-payload-launcher",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 121202213,
|
||||
"name": "CVE-2018-6376",
|
||||
"full_name": "knqyf263\/CVE-2018-6376",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-6376",
|
||||
"description": "Joomla!, Second Order SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-12T05:02:52Z",
|
||||
"updated_at": "2018-10-04T17:23:42Z",
|
||||
"pushed_at": "2018-02-12T12:14:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,211 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 120386140,
|
||||
"name": "wordpress-fix-cve-2018-6389",
|
||||
"full_name": "yolabingo\/wordpress-fix-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "yolabingo",
|
||||
"id": 628954,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628954?v=4",
|
||||
"html_url": "https:\/\/github.com\/yolabingo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yolabingo\/wordpress-fix-cve-2018-6389",
|
||||
"description": "Apache RewriteRule to mitigate potential DoS attack via Wordpress wp-admin\/load-scripts.php file",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T01:43:33Z",
|
||||
"updated_at": "2018-02-08T01:19:57Z",
|
||||
"pushed_at": "2018-02-06T01:46:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120477120,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "WazeHell\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "WazeHell",
|
||||
"id": 20618414,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4",
|
||||
"html_url": "https:\/\/github.com\/WazeHell"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WazeHell\/CVE-2018-6389",
|
||||
"description": "CVE-2018-6389 Exploit In WordPress DoS ",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T15:16:03Z",
|
||||
"updated_at": "2020-07-04T11:10:46Z",
|
||||
"pushed_at": "2018-02-06T15:36:29Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120533146,
|
||||
"name": "modsecurity-cve-2018-6389",
|
||||
"full_name": "rastating\/modsecurity-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "rastating",
|
||||
"id": 2500434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2500434?v=4",
|
||||
"html_url": "https:\/\/github.com\/rastating"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rastating\/modsecurity-cve-2018-6389",
|
||||
"description": "A ModSecurity ruleset for detecting potential attacks using CVE-2018-6389",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T22:51:21Z",
|
||||
"updated_at": "2020-10-21T21:49:25Z",
|
||||
"pushed_at": "2018-02-07T01:05:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120540306,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "knqyf263\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-6389",
|
||||
"description": "WordPress DoS (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T00:20:57Z",
|
||||
"updated_at": "2020-01-17T20:42:25Z",
|
||||
"pushed_at": "2018-02-07T00:43:23Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120617956,
|
||||
"name": "cve-2018-6389-php-patcher",
|
||||
"full_name": "JulienGadanho\/cve-2018-6389-php-patcher",
|
||||
"owner": {
|
||||
"login": "JulienGadanho",
|
||||
"id": 18120161,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18120161?v=4",
|
||||
"html_url": "https:\/\/github.com\/JulienGadanho"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JulienGadanho\/cve-2018-6389-php-patcher",
|
||||
"description": "Patch Wordpress DOS breach (CVE-2018-6389) in PHP",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T13:22:31Z",
|
||||
"updated_at": "2018-12-02T15:55:12Z",
|
||||
"pushed_at": "2018-02-13T08:19:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120916403,
|
||||
"name": "wordpress-CVE-2018-6389",
|
||||
"full_name": "dsfau\/wordpress-CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/wordpress-CVE-2018-6389",
|
||||
"description": "Metasploit module for WordPress DOS load-scripts.php CVE-2018-638",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T14:37:44Z",
|
||||
"updated_at": "2018-12-11T09:20:38Z",
|
||||
"pushed_at": "2018-02-09T19:40:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121636079,
|
||||
"name": "CVE-2018-6389-FIX",
|
||||
"full_name": "Jetserver\/CVE-2018-6389-FIX",
|
||||
"owner": {
|
||||
"login": "Jetserver",
|
||||
"id": 16237996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16237996?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jetserver"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jetserver\/CVE-2018-6389-FIX",
|
||||
"description": "Global Fix for Wordpress CVE-2018-6389",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-15T14:00:14Z",
|
||||
"updated_at": "2018-02-15T14:02:54Z",
|
||||
"pushed_at": "2018-02-18T11:40:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 122881954,
|
||||
"name": "PoC---CVE-2018-6389",
|
||||
"full_name": "thechrono13\/PoC---CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "thechrono13",
|
||||
"id": 23078415,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23078415?v=4",
|
||||
"html_url": "https:\/\/github.com\/thechrono13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thechrono13\/PoC---CVE-2018-6389",
|
||||
"description": "Proof of Concept of vunerability CVE-2018-6389 on Wordpress 4.9.2",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-25T22:06:05Z",
|
||||
"updated_at": "2018-02-25T22:07:50Z",
|
||||
"pushed_at": "2018-02-26T10:13:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 122955721,
|
||||
"name": "cve-2018-6389",
|
||||
"full_name": "BlackRouter\/cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "BlackRouter",
|
||||
"id": 15177510,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15177510?v=4",
|
||||
"html_url": "https:\/\/github.com\/BlackRouter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BlackRouter\/cve-2018-6389",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-26T10:45:27Z",
|
||||
"updated_at": "2018-02-26T10:45:27Z",
|
||||
"pushed_at": "2018-02-26T10:47:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123245165,
|
||||
"name": "PoC---CVE-2018-6389",
|
||||
|
@ -229,52 +22,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123487751,
|
||||
"name": "wordpress-cve-2018-6389",
|
||||
"full_name": "JavierOlmedo\/wordpress-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "JavierOlmedo",
|
||||
"id": 15904748,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904748?v=4",
|
||||
"html_url": "https:\/\/github.com\/JavierOlmedo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JavierOlmedo\/wordpress-cve-2018-6389",
|
||||
"description": "CVE-2018-6389 WordPress Core - 'load-scripts.php' Denial of Service <= 4.9.4",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-01T20:19:14Z",
|
||||
"updated_at": "2018-03-19T20:05:40Z",
|
||||
"pushed_at": "2018-03-07T20:11:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123791550,
|
||||
"name": "wordpress_cve-2018-6389",
|
||||
"full_name": "m3ssap0\/wordpress_cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "m3ssap0",
|
||||
"id": 705120,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
|
||||
"html_url": "https:\/\/github.com\/m3ssap0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/m3ssap0\/wordpress_cve-2018-6389",
|
||||
"description": "Tries to exploit a WordPress vulnerability (CVE-2018-6389) which can be used to cause a Denial of Service.",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-04T13:33:15Z",
|
||||
"updated_at": "2018-09-18T13:02:37Z",
|
||||
"pushed_at": "2018-03-10T11:57:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123796262,
|
||||
"name": "Shiva",
|
||||
|
@ -298,52 +45,6 @@
|
|||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130395597,
|
||||
"name": "Wordpress-Hack-CVE-2018-6389",
|
||||
"full_name": "mudhappy\/Wordpress-Hack-CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "mudhappy",
|
||||
"id": 7614944,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7614944?v=4",
|
||||
"html_url": "https:\/\/github.com\/mudhappy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mudhappy\/Wordpress-Hack-CVE-2018-6389",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-20T17:45:38Z",
|
||||
"updated_at": "2018-04-20T17:48:12Z",
|
||||
"pushed_at": "2018-04-20T17:48:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 132090592,
|
||||
"name": "WP-DOS-Exploit-CVE-2018-6389",
|
||||
"full_name": "armaanpathan12345\/WP-DOS-Exploit-CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "armaanpathan12345",
|
||||
"id": 16278863,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16278863?v=4",
|
||||
"html_url": "https:\/\/github.com\/armaanpathan12345"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/armaanpathan12345\/WP-DOS-Exploit-CVE-2018-6389",
|
||||
"description": "WP-DOS-Exploit-CVE-2018-6389",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-04T05:15:33Z",
|
||||
"updated_at": "2018-05-04T05:19:30Z",
|
||||
"pushed_at": "2018-05-04T05:19:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146678844,
|
||||
"name": "trellis-cve-2018-6389",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 123634317,
|
||||
"name": "joomla-cve-2018-6396",
|
||||
"full_name": "JavierOlmedo\/joomla-cve-2018-6396",
|
||||
"owner": {
|
||||
"login": "JavierOlmedo",
|
||||
"id": 15904748,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904748?v=4",
|
||||
"html_url": "https:\/\/github.com\/JavierOlmedo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JavierOlmedo\/joomla-cve-2018-6396",
|
||||
"description": "Joomla - Component Google Map Landkarten <= 4.2.3 - SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-02T21:46:28Z",
|
||||
"updated_at": "2019-09-20T10:02:47Z",
|
||||
"pushed_at": "2018-03-07T20:13:21Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 119438300,
|
||||
"name": "ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"full_name": "dreadlocked\/ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"owner": {
|
||||
"login": "dreadlocked",
|
||||
"id": 7407033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7407033?v=4",
|
||||
"html_url": "https:\/\/github.com\/dreadlocked"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dreadlocked\/ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"description": "[CVE-2018-6407 & CVE-2018-6408] Conceptronic IPCam Administration panel CSRF and Denial of Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T20:36:54Z",
|
||||
"updated_at": "2020-04-01T13:33:57Z",
|
||||
"pushed_at": "2018-01-31T00:13:31Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 119714188,
|
||||
"name": "netwave-dosvulnerability",
|
||||
"full_name": "dreadlocked\/netwave-dosvulnerability",
|
||||
"owner": {
|
||||
"login": "dreadlocked",
|
||||
"id": 7407033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7407033?v=4",
|
||||
"html_url": "https:\/\/github.com\/dreadlocked"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dreadlocked\/netwave-dosvulnerability",
|
||||
"description": "[CVE-2018-6479] Netwave IP Camera server vulnerable to Denial of Service via one single huge POST request.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-31T16:38:48Z",
|
||||
"updated_at": "2020-04-06T19:50:52Z",
|
||||
"pushed_at": "2018-02-01T20:08:01Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131035487,
|
||||
"name": "Composr-CMS-10.0.13-Cross-Site-Scripting-XSS",
|
||||
"full_name": "faizzaidi\/Composr-CMS-10.0.13-Cross-Site-Scripting-XSS",
|
||||
"owner": {
|
||||
"login": "faizzaidi",
|
||||
"id": 12153050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12153050?v=4",
|
||||
"html_url": "https:\/\/github.com\/faizzaidi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faizzaidi\/Composr-CMS-10.0.13-Cross-Site-Scripting-XSS",
|
||||
"description": "Composr CMS 10.0.13 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2018-6518",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-25T16:35:41Z",
|
||||
"updated_at": "2020-07-17T05:22:18Z",
|
||||
"pushed_at": "2018-04-25T16:37:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 129653418,
|
||||
"name": "CVE-2018-6546-Exploit",
|
||||
"full_name": "securifera\/CVE-2018-6546-Exploit",
|
||||
"owner": {
|
||||
"login": "securifera",
|
||||
"id": 12126525,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4",
|
||||
"html_url": "https:\/\/github.com\/securifera"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/securifera\/CVE-2018-6546-Exploit",
|
||||
"description": "CVE-2018-6546-Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-15T21:42:20Z",
|
||||
"updated_at": "2020-06-06T02:32:24Z",
|
||||
"pushed_at": "2018-04-15T21:59:34Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 142284375,
|
||||
"name": "CVE-2018-6546",
|
||||
|
|
|
@ -1,119 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 127698499,
|
||||
"name": "cve-2018-6574",
|
||||
"full_name": "acole76\/cve-2018-6574",
|
||||
"owner": {
|
||||
"login": "acole76",
|
||||
"id": 1920278,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1920278?v=4",
|
||||
"html_url": "https:\/\/github.com\/acole76"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/acole76\/cve-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-02T03:34:29Z",
|
||||
"updated_at": "2018-04-02T03:44:17Z",
|
||||
"pushed_at": "2018-04-02T03:44:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130792609,
|
||||
"name": "CVE-2018-6574-POC",
|
||||
"full_name": "neargle\/CVE-2018-6574-POC",
|
||||
"owner": {
|
||||
"login": "neargle",
|
||||
"id": 7868679,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7868679?v=4",
|
||||
"html_url": "https:\/\/github.com\/neargle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/neargle\/CVE-2018-6574-POC",
|
||||
"description": "CVE-2018-6574 POC : golang 'go get' remote command execution during source code build",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-24T03:44:20Z",
|
||||
"updated_at": "2021-02-23T14:56:16Z",
|
||||
"pushed_at": "2018-04-24T16:32:22Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133783468,
|
||||
"name": "go-get-rce",
|
||||
"full_name": "willbo4r\/go-get-rce",
|
||||
"owner": {
|
||||
"login": "willbo4r",
|
||||
"id": 13272847,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13272847?v=4",
|
||||
"html_url": "https:\/\/github.com\/willbo4r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/willbo4r\/go-get-rce",
|
||||
"description": "CVE-2018-6574 for pentesterLAB",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T08:32:40Z",
|
||||
"updated_at": "2018-05-17T08:33:33Z",
|
||||
"pushed_at": "2018-05-17T08:33:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134137690,
|
||||
"name": "go-get-rce",
|
||||
"full_name": "ahmetmanga\/go-get-rce",
|
||||
"owner": {
|
||||
"login": "ahmetmanga",
|
||||
"id": 25594206,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25594206?v=4",
|
||||
"html_url": "https:\/\/github.com\/ahmetmanga"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ahmetmanga\/go-get-rce",
|
||||
"description": "cve-2018-6574 @pentesterlab",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-20T09:39:15Z",
|
||||
"updated_at": "2018-05-20T09:40:53Z",
|
||||
"pushed_at": "2018-05-20T09:40:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134184478,
|
||||
"name": "cve-2018-6574",
|
||||
"full_name": "ahmetmanga\/cve-2018-6574",
|
||||
"owner": {
|
||||
"login": "ahmetmanga",
|
||||
"id": 25594206,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25594206?v=4",
|
||||
"html_url": "https:\/\/github.com\/ahmetmanga"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ahmetmanga\/cve-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-20T20:32:15Z",
|
||||
"updated_at": "2018-05-20T20:33:17Z",
|
||||
"pushed_at": "2018-05-20T20:33:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 150020637,
|
||||
"name": "cve-2018-6574",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 125541441,
|
||||
"name": "exim-vuln-poc",
|
||||
"full_name": "c0llision\/exim-vuln-poc",
|
||||
"owner": {
|
||||
"login": "c0llision",
|
||||
"id": 32601427,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32601427?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0llision"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0llision\/exim-vuln-poc",
|
||||
"description": "CVE-2018-6789",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-16T16:21:22Z",
|
||||
"updated_at": "2018-05-03T17:20:25Z",
|
||||
"pushed_at": "2018-05-03T17:20:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 156674030,
|
||||
"name": "CVE-2018-6789",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 121303569,
|
||||
"name": "KDE_Vuln",
|
||||
"full_name": "rarar0\/KDE_Vuln",
|
||||
"owner": {
|
||||
"login": "rarar0",
|
||||
"id": 14985119,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14985119?v=4",
|
||||
"html_url": "https:\/\/github.com\/rarar0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rarar0\/KDE_Vuln",
|
||||
"description": "CVE-2018-6791 Troubleshooting",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-12T21:21:29Z",
|
||||
"updated_at": "2019-01-03T01:14:32Z",
|
||||
"pushed_at": "2018-02-13T21:14:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 121122391,
|
||||
"name": "WolfCMS-XSS-POC",
|
||||
"full_name": "pradeepjairamani\/WolfCMS-XSS-POC",
|
||||
"owner": {
|
||||
"login": "pradeepjairamani",
|
||||
"id": 24669027,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24669027?v=4",
|
||||
"html_url": "https:\/\/github.com\/pradeepjairamani"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pradeepjairamani\/WolfCMS-XSS-POC",
|
||||
"description": "WolfCMS-v0.8.3.1 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2018-6890",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-11T12:43:41Z",
|
||||
"updated_at": "2018-04-15T22:32:05Z",
|
||||
"pushed_at": "2018-04-08T07:41:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 135526594,
|
||||
"name": "CloudMe-Sync-1.10.9---Buffer-Overflow-SEH-DEP-Bypass",
|
||||
"full_name": "manojcode\/CloudMe-Sync-1.10.9---Buffer-Overflow-SEH-DEP-Bypass",
|
||||
"owner": {
|
||||
"login": "manojcode",
|
||||
"id": 17510282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17510282?v=4",
|
||||
"html_url": "https:\/\/github.com\/manojcode"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/manojcode\/CloudMe-Sync-1.10.9---Buffer-Overflow-SEH-DEP-Bypass",
|
||||
"description": "My version - CloudMe-Sync-1.10.9---Buffer-Overflow-SEH-DEP-Bypass on Win7 x64 CVE-2018-6892",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T03:25:02Z",
|
||||
"updated_at": "2018-06-04T01:09:39Z",
|
||||
"pushed_at": "2018-06-04T01:09:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135564232,
|
||||
"name": "-Win10-x64-CloudMe-Sync-1.10.9-Buffer-Overflow-SEH-DEP-Bypass",
|
||||
"full_name": "manojcode\/-Win10-x64-CloudMe-Sync-1.10.9-Buffer-Overflow-SEH-DEP-Bypass",
|
||||
"owner": {
|
||||
"login": "manojcode",
|
||||
"id": 17510282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17510282?v=4",
|
||||
"html_url": "https:\/\/github.com\/manojcode"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/manojcode\/-Win10-x64-CloudMe-Sync-1.10.9-Buffer-Overflow-SEH-DEP-Bypass",
|
||||
"description": "My version - [Win10 x64] CloudMe-Sync-1.10.9-Buffer-Overflow-SEH-DEP-Bypass CVE-2018-6892",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T09:44:07Z",
|
||||
"updated_at": "2018-05-31T16:18:39Z",
|
||||
"pushed_at": "2018-05-31T09:45:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 281250144,
|
||||
"name": "CVE-2018-6892-Golang",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 128607175,
|
||||
"name": "TYPO3-XSS-POC",
|
||||
"full_name": "pradeepjairamani\/TYPO3-XSS-POC",
|
||||
"owner": {
|
||||
"login": "pradeepjairamani",
|
||||
"id": 24669027,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24669027?v=4",
|
||||
"html_url": "https:\/\/github.com\/pradeepjairamani"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pradeepjairamani\/TYPO3-XSS-POC",
|
||||
"description": "Typo3 -v9.1.0 Persistent Cross Site Scripting(XSS) Assigned CVE Number: CVE-2018-6905",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-08T06:34:34Z",
|
||||
"updated_at": "2019-01-18T12:19:17Z",
|
||||
"pushed_at": "2018-04-08T07:42:12Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 116845038,
|
||||
"name": "sharingIsCaring",
|
||||
"full_name": "mechanico\/sharingIsCaring",
|
||||
"owner": {
|
||||
"login": "mechanico",
|
||||
"id": 32109749,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32109749?v=4",
|
||||
"html_url": "https:\/\/github.com\/mechanico"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mechanico\/sharingIsCaring",
|
||||
"description": "TwonkyMedia Server 7.0.11-8.5 Directory Traversal CVE-2018-7171",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T17:01:45Z",
|
||||
"updated_at": "2020-07-11T06:38:46Z",
|
||||
"pushed_at": "2018-06-03T14:54:18Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 122677679,
|
||||
"name": "CVE-2018-7197",
|
||||
"full_name": "Alyssa-o-Herrera\/CVE-2018-7197",
|
||||
"owner": {
|
||||
"login": "Alyssa-o-Herrera",
|
||||
"id": 27867026,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27867026?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alyssa-o-Herrera"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alyssa-o-Herrera\/CVE-2018-7197",
|
||||
"description": "CVE-2018-7197 Write up",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-23T22:06:51Z",
|
||||
"updated_at": "2018-10-04T17:25:29Z",
|
||||
"pushed_at": "2018-02-23T22:07:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 121942694,
|
||||
"name": "CVE-2018-7211-PoC",
|
||||
"full_name": "c3r34lk1ll3r\/CVE-2018-7211-PoC",
|
||||
"owner": {
|
||||
"login": "c3r34lk1ll3r",
|
||||
"id": 12492834,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12492834?v=4",
|
||||
"html_url": "https:\/\/github.com\/c3r34lk1ll3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c3r34lk1ll3r\/CVE-2018-7211-PoC",
|
||||
"description": "This is the original PoC of CVE-2018-7211",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-18T10:47:00Z",
|
||||
"updated_at": "2018-02-18T10:48:45Z",
|
||||
"pushed_at": "2018-02-18T10:53:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 122389904,
|
||||
"name": "NotSecDrv",
|
||||
"full_name": "Elvin9\/NotSecDrv",
|
||||
"owner": {
|
||||
"login": "Elvin9",
|
||||
"id": 10520535,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10520535?v=4",
|
||||
"html_url": "https:\/\/github.com\/Elvin9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Elvin9\/NotSecDrv",
|
||||
"description": "A PoC for CVE-2018-7249",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-21T20:31:09Z",
|
||||
"updated_at": "2020-10-21T22:15:43Z",
|
||||
"pushed_at": "2018-03-01T19:06:50Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 122391619,
|
||||
"name": "SecDrvPoolLeak",
|
||||
"full_name": "Elvin9\/SecDrvPoolLeak",
|
||||
"owner": {
|
||||
"login": "Elvin9",
|
||||
"id": 10520535,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10520535?v=4",
|
||||
"html_url": "https:\/\/github.com\/Elvin9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Elvin9\/SecDrvPoolLeak",
|
||||
"description": "A PoC for CVE-2018-7250",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-21T20:47:39Z",
|
||||
"updated_at": "2020-10-21T22:15:43Z",
|
||||
"pushed_at": "2018-02-27T11:10:01Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 127405676,
|
||||
"name": "CVE-2018-7600-Drupal-RCE",
|
||||
"full_name": "g0rx\/CVE-2018-7600-Drupal-RCE",
|
||||
"owner": {
|
||||
"login": "g0rx",
|
||||
"id": 10961397,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10961397?v=4",
|
||||
"html_url": "https:\/\/github.com\/g0rx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/g0rx\/CVE-2018-7600-Drupal-RCE",
|
||||
"description": "CVE-2018-7600 Drupal RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T08:52:54Z",
|
||||
"updated_at": "2020-11-25T13:33:13Z",
|
||||
"pushed_at": "2018-04-18T06:58:39Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 127436541,
|
||||
"name": "CVE-2018-7600",
|
||||
|
@ -59,13 +36,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2021-03-16T02:24:59Z",
|
||||
"updated_at": "2021-03-16T15:25:44Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 462,
|
||||
"watchers_count": 462,
|
||||
"stargazers_count": 463,
|
||||
"watchers_count": 463,
|
||||
"forks_count": 154,
|
||||
"forks": 154,
|
||||
"watchers": 462,
|
||||
"watchers": 463,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -91,236 +68,6 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129500604,
|
||||
"name": "CVE-2018-7600-Drupal-0day-RCE",
|
||||
"full_name": "dr-iman\/CVE-2018-7600-Drupal-0day-RCE",
|
||||
"owner": {
|
||||
"login": "dr-iman",
|
||||
"id": 25507113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25507113?v=4",
|
||||
"html_url": "https:\/\/github.com\/dr-iman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dr-iman\/CVE-2018-7600-Drupal-0day-RCE",
|
||||
"description": "Drupal 0day Remote PHP Code Execution (Perl)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-14T09:02:54Z",
|
||||
"updated_at": "2020-04-06T19:37:49Z",
|
||||
"pushed_at": "2018-04-14T09:06:44Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129514721,
|
||||
"name": "drupalgeddon2",
|
||||
"full_name": "jirojo2\/drupalgeddon2",
|
||||
"owner": {
|
||||
"login": "jirojo2",
|
||||
"id": 3594710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3594710?v=4",
|
||||
"html_url": "https:\/\/github.com\/jirojo2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jirojo2\/drupalgeddon2",
|
||||
"description": "MSF exploit module for Drupalgeddon 2 (CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-14T12:26:10Z",
|
||||
"updated_at": "2018-04-26T08:15:06Z",
|
||||
"pushed_at": "2018-04-14T23:48:33Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129543577,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "dwisiswant0\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "dwisiswant0",
|
||||
"id": 25837540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
|
||||
"html_url": "https:\/\/github.com\/dwisiswant0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dwisiswant0\/CVE-2018-7600",
|
||||
"description": "PoC for CVE-2018-7600 Drupal SA-CORE-2018-002 (Drupalgeddon 2).",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-14T18:26:26Z",
|
||||
"updated_at": "2021-03-16T07:08:41Z",
|
||||
"pushed_at": "2018-04-14T20:52:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129569913,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "thehappydinoa\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "thehappydinoa",
|
||||
"id": 30162978,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30162978?v=4",
|
||||
"html_url": "https:\/\/github.com\/thehappydinoa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thehappydinoa\/CVE-2018-7600",
|
||||
"description": "Proof-of-Concept for Drupal CVE-2018-7600 \/ SA-CORE-2018-002",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-15T02:21:59Z",
|
||||
"updated_at": "2019-12-30T13:14:00Z",
|
||||
"pushed_at": "2018-05-04T00:53:24Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129605925,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "sl4cky\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "sl4cky",
|
||||
"id": 13188087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13188087?v=4",
|
||||
"html_url": "https:\/\/github.com\/sl4cky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sl4cky\/CVE-2018-7600",
|
||||
"description": "Testing and exploitation tool for Drupalgeddon 2 (CVE-2018-7600)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-15T12:01:41Z",
|
||||
"updated_at": "2020-07-09T18:52:40Z",
|
||||
"pushed_at": "2018-04-15T12:31:03Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129620689,
|
||||
"name": "CVE-2018-7600-Masschecker",
|
||||
"full_name": "sl4cky\/CVE-2018-7600-Masschecker",
|
||||
"owner": {
|
||||
"login": "sl4cky",
|
||||
"id": 13188087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13188087?v=4",
|
||||
"html_url": "https:\/\/github.com\/sl4cky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sl4cky\/CVE-2018-7600-Masschecker",
|
||||
"description": "Tool to check for CVE-2018-7600 vulnerability on several URLS",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-15T14:56:35Z",
|
||||
"updated_at": "2020-07-09T18:52:40Z",
|
||||
"pushed_at": "2018-04-15T14:58:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129800155,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "FireFart\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "FireFart",
|
||||
"id": 105281,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105281?v=4",
|
||||
"html_url": "https:\/\/github.com\/FireFart"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FireFart\/CVE-2018-7600",
|
||||
"description": "CVE-2018-7600 - Drupal 7.x RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-16T20:16:21Z",
|
||||
"updated_at": "2020-12-17T09:40:30Z",
|
||||
"pushed_at": "2018-04-18T20:34:19Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129927277,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "pimps\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "pimps",
|
||||
"id": 11393266,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11393266?v=4",
|
||||
"html_url": "https:\/\/github.com\/pimps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pimps\/CVE-2018-7600",
|
||||
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T15:38:15Z",
|
||||
"updated_at": "2021-03-12T03:42:30Z",
|
||||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130154422,
|
||||
"name": "drupalgeddon2",
|
||||
"full_name": "lorddemon\/drupalgeddon2",
|
||||
"owner": {
|
||||
"login": "lorddemon",
|
||||
"id": 6675738,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6675738?v=4",
|
||||
"html_url": "https:\/\/github.com\/lorddemon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lorddemon\/drupalgeddon2",
|
||||
"description": "Exploit for CVE-2018-7600.. called drupalgeddon2, ",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-19T03:31:47Z",
|
||||
"updated_at": "2020-06-18T08:10:33Z",
|
||||
"pushed_at": "2018-04-19T03:38:24Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 130868059,
|
||||
"name": "drupal-check",
|
||||
"full_name": "Hestat\/drupal-check",
|
||||
"owner": {
|
||||
"login": "Hestat",
|
||||
"id": 22892300,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22892300?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hestat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hestat\/drupal-check",
|
||||
"description": "Tool to dive Apache logs for evidence of exploitation of CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-24T14:34:46Z",
|
||||
"updated_at": "2018-07-08T12:46:15Z",
|
||||
"pushed_at": "2018-05-08T17:30:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 131244306,
|
||||
"name": "CVE-2018-7600-drupalgeddon2-scanner",
|
||||
|
@ -344,52 +91,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 131665156,
|
||||
"name": "drupalgeddon-2",
|
||||
"full_name": "Damian972\/drupalgeddon-2",
|
||||
"owner": {
|
||||
"login": "Damian972",
|
||||
"id": 25445518,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25445518?v=4",
|
||||
"html_url": "https:\/\/github.com\/Damian972"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Damian972\/drupalgeddon-2",
|
||||
"description": "Vuln checker for Drupal v7.x + v8.x (CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-01T01:38:43Z",
|
||||
"updated_at": "2019-02-28T05:09:20Z",
|
||||
"pushed_at": "2018-05-03T01:23:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134812138,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "Jyozi\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "Jyozi",
|
||||
"id": 20456656,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20456656?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jyozi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jyozi\/CVE-2018-7600",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-25T06:19:05Z",
|
||||
"updated_at": "2018-05-25T06:20:54Z",
|
||||
"pushed_at": "2018-05-25T06:20:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 140643631,
|
||||
"name": "CVE-2018-7600",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 131232015,
|
||||
"name": "Drupalgedon3",
|
||||
"full_name": "1337g\/Drupalgedon3",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/Drupalgedon3",
|
||||
"description": "POC to test\/exploit drupal vulnerability SA-CORE-2018-004 \/ CVE-2018-7602",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-27T01:59:31Z",
|
||||
"updated_at": "2020-04-02T11:58:48Z",
|
||||
"pushed_at": "2018-04-26T14:49:51Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 140663638,
|
||||
"name": "CVE-2018-7602",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 130383133,
|
||||
"name": "CVE-2018-7747",
|
||||
"full_name": "mindpr00f\/CVE-2018-7747",
|
||||
"owner": {
|
||||
"login": "mindpr00f",
|
||||
"id": 38467006,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38467006?v=4",
|
||||
"html_url": "https:\/\/github.com\/mindpr00f"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mindpr00f\/CVE-2018-7747",
|
||||
"description": "CalderaForms 1.5.9.1 XSS (WordPress plugin) - tutorial",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-20T15:49:23Z",
|
||||
"updated_at": "2018-04-21T13:40:18Z",
|
||||
"pushed_at": "2018-04-21T13:40:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131338446,
|
||||
"name": "SIOCtl",
|
||||
"full_name": "otavioarj\/SIOCtl",
|
||||
"owner": {
|
||||
"login": "otavioarj",
|
||||
"id": 851029,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/851029?v=4",
|
||||
"html_url": "https:\/\/github.com\/otavioarj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/otavioarj\/SIOCtl",
|
||||
"description": "Simple IOCTL dispatcher for CVE-2018-8060\/8061",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-27T19:45:20Z",
|
||||
"updated_at": "2019-01-22T23:13:45Z",
|
||||
"pushed_at": "2018-05-09T22:05:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 124507539,
|
||||
"name": "YZMCMSxss",
|
||||
"full_name": "AlwaysHereFight\/YZMCMSxss",
|
||||
"owner": {
|
||||
"login": "AlwaysHereFight",
|
||||
"id": 21152658,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21152658?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlwaysHereFight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlwaysHereFight\/YZMCMSxss",
|
||||
"description": "YZMCMS v3.7最新版xss漏洞 CVE-2018-8078",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-09T07:56:56Z",
|
||||
"updated_at": "2020-01-30T09:51:26Z",
|
||||
"pushed_at": "2018-03-13T02:44:27Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 125155388,
|
||||
"name": "BUI-select-xss",
|
||||
"full_name": "zlgxzswjy\/BUI-select-xss",
|
||||
"owner": {
|
||||
"login": "zlgxzswjy",
|
||||
"id": 12388719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12388719?v=4",
|
||||
"html_url": "https:\/\/github.com\/zlgxzswjy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zlgxzswjy\/BUI-select-xss",
|
||||
"description": "cve-2018-8108",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-14T04:32:01Z",
|
||||
"updated_at": "2018-03-14T04:54:50Z",
|
||||
"pushed_at": "2018-03-14T04:54:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,73 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 133785986,
|
||||
"name": "cve-2018-8120",
|
||||
"full_name": "bigric3\/cve-2018-8120",
|
||||
"owner": {
|
||||
"login": "bigric3",
|
||||
"id": 22165361,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22165361?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigric3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigric3\/cve-2018-8120",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T08:51:39Z",
|
||||
"updated_at": "2020-12-18T03:54:01Z",
|
||||
"pushed_at": "2018-05-18T07:49:45Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134023459,
|
||||
"name": "CVE-2018-8120",
|
||||
"full_name": "unamer\/CVE-2018-8120",
|
||||
"owner": {
|
||||
"login": "unamer",
|
||||
"id": 12728984,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12728984?v=4",
|
||||
"html_url": "https:\/\/github.com\/unamer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/unamer\/CVE-2018-8120",
|
||||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2021-03-05T06:17:35Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 447,
|
||||
"watchers_count": 447,
|
||||
"forks_count": 207,
|
||||
"forks": 207,
|
||||
"watchers": 447,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136113184,
|
||||
"name": "cve-2018-8120",
|
||||
"full_name": "ne1llee\/cve-2018-8120",
|
||||
"owner": {
|
||||
"login": "ne1llee",
|
||||
"id": 12810839,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12810839?v=4",
|
||||
"html_url": "https:\/\/github.com\/ne1llee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ne1llee\/cve-2018-8120",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-06-05T03:12:52Z",
|
||||
"updated_at": "2020-07-02T08:47:02Z",
|
||||
"pushed_at": "2018-06-05T03:48:43Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136446726,
|
||||
"name": "CVE-2018-8120",
|
||||
|
|
|
@ -1,73 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 134479769,
|
||||
"name": "CVE-2018-8174-msf",
|
||||
"full_name": "0x09AL\/CVE-2018-8174-msf",
|
||||
"owner": {
|
||||
"login": "0x09AL",
|
||||
"id": 25826294,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25826294?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x09AL"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2018-8174-msf",
|
||||
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-22T21:50:32Z",
|
||||
"updated_at": "2021-03-03T09:47:44Z",
|
||||
"pushed_at": "2018-05-23T20:43:58Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 166,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135381512,
|
||||
"name": "CVE-2018-8174_EXP",
|
||||
"full_name": "Yt1g3r\/CVE-2018-8174_EXP",
|
||||
"owner": {
|
||||
"login": "Yt1g3r",
|
||||
"id": 12625147,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yt1g3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2018-8174_EXP",
|
||||
"description": "CVE-2018-8174_python",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T03:12:32Z",
|
||||
"updated_at": "2021-03-11T01:49:14Z",
|
||||
"pushed_at": "2018-05-30T03:33:14Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135767741,
|
||||
"name": "CVE-2018-8174",
|
||||
"full_name": "SyFi\/CVE-2018-8174",
|
||||
"owner": {
|
||||
"login": "SyFi",
|
||||
"id": 26314806,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4",
|
||||
"html_url": "https:\/\/github.com\/SyFi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-8174",
|
||||
"description": "MS Word MS WordPad via IE VBS Engine RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-01T22:12:54Z",
|
||||
"updated_at": "2021-03-11T01:53:29Z",
|
||||
"pushed_at": "2018-06-01T22:18:59Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 138712476,
|
||||
"name": "Rig-Exploit-for-CVE-2018-8174",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132509937,
|
||||
"name": "Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed",
|
||||
"full_name": "xfer0\/Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed",
|
||||
"owner": {
|
||||
"login": "xfer0",
|
||||
"id": 30201498,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30201498?v=4",
|
||||
"html_url": "https:\/\/github.com\/xfer0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xfer0\/Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed",
|
||||
"description": "Fixed exploit for Nagios CVE-2018-8733, CVE-2018-8734, CVE-2018-8735, CVE-2018-8736 https:\/\/www.exploit-db.com\/exploits\/44560\/",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T19:55:36Z",
|
||||
"updated_at": "2020-04-27T15:35:39Z",
|
||||
"pushed_at": "2018-05-07T19:55:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 127013387,
|
||||
"name": "frevvomapexec",
|
||||
"full_name": "hateshape\/frevvomapexec",
|
||||
"owner": {
|
||||
"login": "hateshape",
|
||||
"id": 31131951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31131951?v=4",
|
||||
"html_url": "https:\/\/github.com\/hateshape"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hateshape\/frevvomapexec",
|
||||
"description": " PoC Exploit for CVE-2018-8820",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-27T16:09:46Z",
|
||||
"updated_at": "2019-01-29T17:35:37Z",
|
||||
"pushed_at": "2018-03-27T17:00:14Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,73 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 132952646,
|
||||
"name": "CVE-2018-8897",
|
||||
"full_name": "nmulasmajic\/CVE-2018-8897",
|
||||
"owner": {
|
||||
"login": "nmulasmajic",
|
||||
"id": 30013958,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30013958?v=4",
|
||||
"html_url": "https:\/\/github.com\/nmulasmajic"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nmulasmajic\/CVE-2018-8897",
|
||||
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-10T20:46:30Z",
|
||||
"updated_at": "2021-03-15T13:20:21Z",
|
||||
"pushed_at": "2018-05-10T20:47:59Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133221173,
|
||||
"name": "pop-mov-ss-exploit",
|
||||
"full_name": "jiazhang0\/pop-mov-ss-exploit",
|
||||
"owner": {
|
||||
"login": "jiazhang0",
|
||||
"id": 10241344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10241344?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiazhang0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiazhang0\/pop-mov-ss-exploit",
|
||||
"description": "The exploitation for CVE-2018-8897",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T09:05:07Z",
|
||||
"updated_at": "2021-02-23T17:18:57Z",
|
||||
"pushed_at": "2018-05-16T14:15:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133268202,
|
||||
"name": "CVE-2018-8897",
|
||||
"full_name": "can1357\/CVE-2018-8897",
|
||||
"owner": {
|
||||
"login": "can1357",
|
||||
"id": 11807264,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11807264?v=4",
|
||||
"html_url": "https:\/\/github.com\/can1357"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/can1357\/CVE-2018-8897",
|
||||
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T19:34:17Z",
|
||||
"updated_at": "2021-03-15T15:00:53Z",
|
||||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 390,
|
||||
"watchers_count": 390,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"watchers": 390,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 144062105,
|
||||
"name": "syscall_exploit_CVE-2018-8897",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 127970329,
|
||||
"name": "CVE-2018-8941",
|
||||
"full_name": "SECFORCE\/CVE-2018-8941",
|
||||
"owner": {
|
||||
"login": "SECFORCE",
|
||||
"id": 8157384,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
|
||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2018-8941",
|
||||
"description": "D-Link DSL-3782 Code Execution (Proof of Concept)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-03T21:22:34Z",
|
||||
"updated_at": "2020-05-18T10:42:30Z",
|
||||
"pushed_at": "2018-04-03T21:59:31Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 126690207,
|
||||
"name": "CVE-2018-8970",
|
||||
"full_name": "tiran\/CVE-2018-8970",
|
||||
"owner": {
|
||||
"login": "tiran",
|
||||
"id": 444071,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/444071?v=4",
|
||||
"html_url": "https:\/\/github.com\/tiran"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tiran\/CVE-2018-8970",
|
||||
"description": "Demo for https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-8970",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-25T11:22:47Z",
|
||||
"updated_at": "2018-04-10T15:41:19Z",
|
||||
"pushed_at": "2018-03-25T11:23:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 134121800,
|
||||
"name": "easy-file-share-7.2-exploit-CVE-2018-9059",
|
||||
"full_name": "manojcode\/easy-file-share-7.2-exploit-CVE-2018-9059",
|
||||
"owner": {
|
||||
"login": "manojcode",
|
||||
"id": 17510282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17510282?v=4",
|
||||
"html_url": "https:\/\/github.com\/manojcode"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/manojcode\/easy-file-share-7.2-exploit-CVE-2018-9059",
|
||||
"description": "My version - Easy File Sharing Web Server 7.2 - 'UserID' - Win 7 'DEP' bypass ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-20T05:13:25Z",
|
||||
"updated_at": "2018-05-21T06:49:16Z",
|
||||
"pushed_at": "2018-05-21T06:49:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131106110,
|
||||
"name": "sickrageWTF",
|
||||
"full_name": "mechanico\/sickrageWTF",
|
||||
"owner": {
|
||||
"login": "mechanico",
|
||||
"id": 32109749,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32109749?v=4",
|
||||
"html_url": "https:\/\/github.com\/mechanico"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mechanico\/sickrageWTF",
|
||||
"description": "CVE-2018-9160",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-26T05:49:09Z",
|
||||
"updated_at": "2018-04-26T06:38:11Z",
|
||||
"pushed_at": "2018-04-26T06:38:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -45,52 +45,6 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 132681023,
|
||||
"name": "CVE-2018-9995_check",
|
||||
"full_name": "Huangkey\/CVE-2018-9995_check",
|
||||
"owner": {
|
||||
"login": "Huangkey",
|
||||
"id": 22346795,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22346795?v=4",
|
||||
"html_url": "https:\/\/github.com\/Huangkey"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Huangkey\/CVE-2018-9995_check",
|
||||
"description": "DVR系列摄像头批量检测",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-09T00:43:24Z",
|
||||
"updated_at": "2020-07-23T08:06:05Z",
|
||||
"pushed_at": "2018-05-09T10:13:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133002644,
|
||||
"name": "CVE-2018-9995-ModifiedByGwolfs",
|
||||
"full_name": "gwolfs\/CVE-2018-9995-ModifiedByGwolfs",
|
||||
"owner": {
|
||||
"login": "gwolfs",
|
||||
"id": 39183087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39183087?v=4",
|
||||
"html_url": "https:\/\/github.com\/gwolfs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gwolfs\/CVE-2018-9995-ModifiedByGwolfs",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-11T07:05:37Z",
|
||||
"updated_at": "2018-05-21T06:35:44Z",
|
||||
"pushed_at": "2018-05-21T06:35:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 139241933,
|
||||
"name": "cve-2018-9995",
|
||||
|
|
25
2019/CVE-2019-1020010.json
Normal file
25
2019/CVE-2019-1020010.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 348430849,
|
||||
"name": "CVE-2019-1020010",
|
||||
"full_name": "DXY0411\/CVE-2019-1020010",
|
||||
"owner": {
|
||||
"login": "DXY0411",
|
||||
"id": 42259364,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42259364?v=4",
|
||||
"html_url": "https:\/\/github.com\/DXY0411"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DXY0411\/CVE-2019-1020010",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T17:13:32Z",
|
||||
"updated_at": "2021-03-16T17:22:00Z",
|
||||
"pushed_at": "2021-03-16T17:21:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-06-04T13:17:10Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 175478558,
|
||||
"name": "CVE-2019-9580",
|
||||
"full_name": "mpgn\/CVE-2019-9580",
|
||||
"owner": {
|
||||
"login": "mpgn",
|
||||
"id": 5891788,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
|
||||
"html_url": "https:\/\/github.com\/mpgn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-9580",
|
||||
"description": "CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-13T18:37:18Z",
|
||||
"updated_at": "2020-04-05T17:19:04Z",
|
||||
"pushed_at": "2019-03-13T19:26:27Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-23T14:00:55Z",
|
||||
"updated_at": "2021-03-15T13:59:58Z",
|
||||
"updated_at": "2021-03-16T16:20:15Z",
|
||||
"pushed_at": "2021-02-23T14:03:00Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-20T16:08:08Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-05T20:40:28Z",
|
||||
"updated_at": "2021-03-01T14:10:01Z",
|
||||
"updated_at": "2021-03-16T19:14:43Z",
|
||||
"pushed_at": "2020-06-05T21:04:43Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-03-16T04:19:50Z",
|
||||
"updated_at": "2021-03-16T18:25:42Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 242,
|
||||
"watchers": 245,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2021-03-16T08:34:14Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -174,8 +174,8 @@
|
|||
"description": "Module pack for #ProxyLogon (part. of my contribute for Metasploit-Framework) [CVE-2021-26855 && CVE-2021-27065]",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T12:12:16Z",
|
||||
"updated_at": "2021-03-16T11:12:20Z",
|
||||
"pushed_at": "2021-03-16T11:12:18Z",
|
||||
"updated_at": "2021-03-16T15:26:52Z",
|
||||
"pushed_at": "2021-03-16T15:26:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2021-26855 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T08:39:05Z",
|
||||
"updated_at": "2021-03-15T13:14:48Z",
|
||||
"updated_at": "2021-03-16T19:04:50Z",
|
||||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T05:21:19Z",
|
||||
"updated_at": "2021-03-15T02:54:24Z",
|
||||
"updated_at": "2021-03-16T16:39:44Z",
|
||||
"pushed_at": "2021-03-12T16:19:50Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -619,5 +619,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348408422,
|
||||
"name": "Scan-Vuln-CVE-2021-26855",
|
||||
"full_name": "shacojx\/Scan-Vuln-CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "shacojx",
|
||||
"id": 19655109,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19655109?v=4",
|
||||
"html_url": "https:\/\/github.com\/shacojx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shacojx\/Scan-Vuln-CVE-2021-26855",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T15:59:17Z",
|
||||
"updated_at": "2021-03-16T16:10:29Z",
|
||||
"pushed_at": "2021-03-16T16:10:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "proxylogon exploit - CVE-2021-26857",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T17:32:32Z",
|
||||
"updated_at": "2021-03-16T14:09:46Z",
|
||||
"updated_at": "2021-03-16T18:20:40Z",
|
||||
"pushed_at": "2021-03-11T17:34:15Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T16:45:42Z",
|
||||
"updated_at": "2021-03-13T09:07:07Z",
|
||||
"updated_at": "2021-03-16T20:48:16Z",
|
||||
"pushed_at": "2021-03-02T07:45:20Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
"forks_count": 185,
|
||||
"forks": 185,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 646,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-03-16T14:57:49Z",
|
||||
"pushed_at": "2021-03-16T04:16:22Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 34,
|
||||
"updated_at": "2021-03-16T20:56:34Z",
|
||||
"pushed_at": "2021-03-16T16:46:38Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
500
README.md
500
README.md
|
@ -420,6 +420,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
- [Mr-xn/CVE-2021-26855-d](https://github.com/Mr-xn/CVE-2021-26855-d)
|
||||
- [RickGeex/ProxyLogon](https://github.com/RickGeex/ProxyLogon)
|
||||
- [Immersive-Labs-Sec/ProxyLogon](https://github.com/Immersive-Labs-Sec/ProxyLogon)
|
||||
- [shacojx/Scan-Vuln-CVE-2021-26855](https://github.com/shacojx/Scan-Vuln-CVE-2021-26855)
|
||||
|
||||
### CVE-2021-26857 (2021-03-02)
|
||||
|
||||
|
@ -5830,14 +5831,6 @@ Some HTTP/2 implementations are vulnerable to window size manipulation and strea
|
|||
|
||||
- [flyniu666/ingress-nginx-0.21-1.19.5](https://github.com/flyniu666/ingress-nginx-0.21-1.19.5)
|
||||
|
||||
### CVE-2019-9580 (2019-03-08)
|
||||
|
||||
<code>
|
||||
In st2web in StackStorm Web UI before 2.9.3 and 2.10.x before 2.10.3, it is possible to bypass the CORS protection mechanism via a "null" origin value, potentially leading to XSS.
|
||||
</code>
|
||||
|
||||
- [mpgn/CVE-2019-9580](https://github.com/mpgn/CVE-2019-9580)
|
||||
|
||||
### CVE-2019-9596 (2019-10-23)
|
||||
|
||||
<code>
|
||||
|
@ -7978,6 +7971,14 @@ Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Buffer Overflow. The impa
|
|||
|
||||
- [RKX1209/CVE-2019-1010298](https://github.com/RKX1209/CVE-2019-1010298)
|
||||
|
||||
### CVE-2019-1020010 (2019-07-29)
|
||||
|
||||
<code>
|
||||
Misskey before 10.102.4 allows hijacking a user's token.
|
||||
</code>
|
||||
|
||||
- [DXY0411/CVE-2019-1020010](https://github.com/DXY0411/CVE-2019-1020010)
|
||||
|
||||
|
||||
## 2018
|
||||
### CVE-2018-0101 (2018-01-29)
|
||||
|
@ -7986,7 +7987,6 @@ Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Buffer Overflow. The impa
|
|||
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device. This vulnerability affects Cisco ASA Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, Firepower Threat Defense Software (FTD). Cisco Bug IDs: CSCvg35618.
|
||||
</code>
|
||||
|
||||
- [1337g/CVE-2018-0101-DOS-POC](https://github.com/1337g/CVE-2018-0101-DOS-POC)
|
||||
- [Cymmetria/ciscoasa_honeypot](https://github.com/Cymmetria/ciscoasa_honeypot)
|
||||
|
||||
### CVE-2018-0114 (2018-01-04)
|
||||
|
@ -8042,10 +8042,6 @@ Command injection vulnerability in networking of QNAP Q'center Virtual Appliance
|
|||
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.
|
||||
</code>
|
||||
|
||||
- [zldww2011/CVE-2018-0802_POC](https://github.com/zldww2011/CVE-2018-0802_POC)
|
||||
- [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802)
|
||||
- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802)
|
||||
- [likescam/CVE-2018-0802_CVE-2017-11882](https://github.com/likescam/CVE-2018-0802_CVE-2017-11882)
|
||||
- [dcsync/rtfkit](https://github.com/dcsync/rtfkit)
|
||||
- [roninAPT/CVE-2018-0802](https://github.com/roninAPT/CVE-2018-0802)
|
||||
|
||||
|
@ -8076,30 +8072,6 @@ An Elevation of Privilege vulnerability exists when Diagnostics Hub Standard Col
|
|||
### CVE-2018-14
|
||||
- [lckJack/legacySymfony](https://github.com/lckJack/legacySymfony)
|
||||
|
||||
### CVE-2018-1010 (2018-04-11)
|
||||
|
||||
<code>
|
||||
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1012, CVE-2018-1013, CVE-2018-1015, CVE-2018-1016.
|
||||
</code>
|
||||
|
||||
- [ymgh96/Detecting-the-patch-of-CVE-2018-1010](https://github.com/ymgh96/Detecting-the-patch-of-CVE-2018-1010)
|
||||
|
||||
### CVE-2018-1026 (2018-04-11)
|
||||
|
||||
<code>
|
||||
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-1030.
|
||||
</code>
|
||||
|
||||
- [ymgh96/Detecting-the-CVE-2018-1026-and-its-patch](https://github.com/ymgh96/Detecting-the-CVE-2018-1026-and-its-patch)
|
||||
|
||||
### CVE-2018-1056 (2018-07-27)
|
||||
|
||||
<code>
|
||||
An out-of-bounds heap buffer read flaw was found in the way advancecomp before 2.1-2018/02 handled processing of ZIP files. An attacker could potentially use this flaw to crash the advzip utility by tricking it into processing crafted ZIP files.
|
||||
</code>
|
||||
|
||||
- [rotemkama/Gpon-Routers](https://github.com/rotemkama/Gpon-Routers)
|
||||
|
||||
### CVE-2018-1088 (2018-04-18)
|
||||
|
||||
<code>
|
||||
|
@ -8114,8 +8086,6 @@ A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any glu
|
|||
DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
|
||||
</code>
|
||||
|
||||
- [knqyf263/CVE-2018-1111](https://github.com/knqyf263/CVE-2018-1111)
|
||||
- [kkirsche/CVE-2018-1111](https://github.com/kkirsche/CVE-2018-1111)
|
||||
- [baldassarreFe/FEP3370-advanced-ethical-hacking](https://github.com/baldassarreFe/FEP3370-advanced-ethical-hacking)
|
||||
|
||||
### CVE-2018-1133 (2018-05-25)
|
||||
|
@ -8157,8 +8127,6 @@ Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used
|
|||
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
|
||||
</code>
|
||||
|
||||
- [CaledoniaProject/CVE-2018-1270](https://github.com/CaledoniaProject/CVE-2018-1270)
|
||||
- [genxor/CVE-2018-1270_EXP](https://github.com/genxor/CVE-2018-1270_EXP)
|
||||
- [tafamace/CVE-2018-1270](https://github.com/tafamace/CVE-2018-1270)
|
||||
- [Venscor/CVE-2018-1270](https://github.com/Venscor/CVE-2018-1270)
|
||||
- [mprunet/owasp-formation-cve-2018-1270](https://github.com/mprunet/owasp-formation-cve-2018-1270)
|
||||
|
@ -8170,7 +8138,6 @@ Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older
|
|||
</code>
|
||||
|
||||
- [knqyf263/CVE-2018-1273](https://github.com/knqyf263/CVE-2018-1273)
|
||||
- [wearearima/poc-cve-2018-1273](https://github.com/wearearima/poc-cve-2018-1273)
|
||||
- [webr0ck/poc-cve-2018-1273](https://github.com/webr0ck/poc-cve-2018-1273)
|
||||
- [cved-sources/cve-2018-1273](https://github.com/cved-sources/cve-2018-1273)
|
||||
- [jas502n/cve-2018-1273](https://github.com/jas502n/cve-2018-1273)
|
||||
|
@ -8192,23 +8159,6 @@ When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an
|
|||
- [xDro1d/CVE-2018-1297](https://github.com/xDro1d/CVE-2018-1297)
|
||||
- [Al1ex/CVE-2018-1297](https://github.com/Al1ex/CVE-2018-1297)
|
||||
|
||||
### CVE-2018-1304 (2018-02-28)
|
||||
|
||||
<code>
|
||||
The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.
|
||||
</code>
|
||||
|
||||
- [knqyf263/CVE-2018-1304](https://github.com/knqyf263/CVE-2018-1304)
|
||||
- [thariyarox/tomcat_CVE-2018-1304_testing](https://github.com/thariyarox/tomcat_CVE-2018-1304_testing)
|
||||
|
||||
### CVE-2018-1305 (2018-02-23)
|
||||
|
||||
<code>
|
||||
Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
|
||||
</code>
|
||||
|
||||
- [Pa55w0rd/CVE-2018-1305](https://github.com/Pa55w0rd/CVE-2018-1305)
|
||||
|
||||
### CVE-2018-1306 (2018-06-27)
|
||||
|
||||
<code>
|
||||
|
@ -8251,14 +8201,6 @@ IBM Security Identity Manager 6.0.0 Virtual Appliance is vulnerable to a XML Ext
|
|||
|
||||
- [attakercyebr/hack4lx_CVE-2018-2019](https://github.com/attakercyebr/hack4lx_CVE-2018-2019)
|
||||
|
||||
### CVE-2018-2380 (2018-03-01)
|
||||
|
||||
<code>
|
||||
SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs.
|
||||
</code>
|
||||
|
||||
- [erpscanteam/CVE-2018-2380](https://github.com/erpscanteam/CVE-2018-2380)
|
||||
|
||||
### CVE-2018-2392 (2018-02-14)
|
||||
|
||||
<code>
|
||||
|
@ -8273,19 +8215,7 @@ Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45,
|
|||
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [forlin/CVE-2018-2628](https://github.com/forlin/CVE-2018-2628)
|
||||
- [shengqi158/CVE-2018-2628](https://github.com/shengqi158/CVE-2018-2628)
|
||||
- [skydarker/CVE-2018-2628](https://github.com/skydarker/CVE-2018-2628)
|
||||
- [jiansiting/weblogic-cve-2018-2628](https://github.com/jiansiting/weblogic-cve-2018-2628)
|
||||
- [zjxzjx/CVE-2018-2628-detect](https://github.com/zjxzjx/CVE-2018-2628-detect)
|
||||
- [aedoo/CVE-2018-2628-MultiThreading](https://github.com/aedoo/CVE-2018-2628-MultiThreading)
|
||||
- [hawk-520/CVE-2018-2628](https://github.com/hawk-520/CVE-2018-2628)
|
||||
- [9uest/CVE-2018-2628](https://github.com/9uest/CVE-2018-2628)
|
||||
- [Shadowshusky/CVE-2018-2628all](https://github.com/Shadowshusky/CVE-2018-2628all)
|
||||
- [shaoshore/CVE-2018-2628](https://github.com/shaoshore/CVE-2018-2628)
|
||||
- [tdy218/ysoserial-cve-2018-2628](https://github.com/tdy218/ysoserial-cve-2018-2628)
|
||||
- [s0wr0b1ndef/CVE-2018-2628](https://github.com/s0wr0b1ndef/CVE-2018-2628)
|
||||
- [wrysunny/cve-2018-2628](https://github.com/wrysunny/cve-2018-2628)
|
||||
- [jas502n/CVE-2018-2628](https://github.com/jas502n/CVE-2018-2628)
|
||||
- [stevenlinfeng/CVE-2018-2628](https://github.com/stevenlinfeng/CVE-2018-2628)
|
||||
- [likescam/CVE-2018-2628](https://github.com/likescam/CVE-2018-2628)
|
||||
|
@ -8301,7 +8231,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Security). Supported versions that are affected are 2.7, 2.8 and 2.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [erpscanteam/CVE-2018-2636](https://github.com/erpscanteam/CVE-2018-2636)
|
||||
- [Cymmetria/micros_honeypot](https://github.com/Cymmetria/micros_honeypot)
|
||||
|
||||
### CVE-2018-2844 (2018-04-18)
|
||||
|
@ -8392,21 +8321,12 @@ Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (su
|
|||
- [ndureiss/e1000_vulnerability_exploit](https://github.com/ndureiss/e1000_vulnerability_exploit)
|
||||
- [vhok74/cve-2018-3295](https://github.com/vhok74/cve-2018-3295)
|
||||
|
||||
### CVE-2018-3608 (2018-07-06)
|
||||
|
||||
<code>
|
||||
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
|
||||
</code>
|
||||
|
||||
- [ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC)
|
||||
|
||||
### CVE-2018-3639 (2018-05-22)
|
||||
|
||||
<code>
|
||||
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
|
||||
</code>
|
||||
|
||||
- [tyhicks/ssbd-tools](https://github.com/tyhicks/ssbd-tools)
|
||||
- [malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate](https://github.com/malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate)
|
||||
- [mmxsrup/CVE-2018-3639](https://github.com/mmxsrup/CVE-2018-3639)
|
||||
- [Shuiliusheng/CVE-2018-3639-specter-v4-](https://github.com/Shuiliusheng/CVE-2018-3639-specter-v4-)
|
||||
|
@ -8442,7 +8362,6 @@ A command injection vulnerability in egg-scripts <v2.8.1 allows arbitrary she
|
|||
Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code.
|
||||
</code>
|
||||
|
||||
- [lucad93/CVE-2018-3810](https://github.com/lucad93/CVE-2018-3810)
|
||||
- [cved-sources/cve-2018-3810](https://github.com/cved-sources/cve-2018-3810)
|
||||
|
||||
### CVE-2018-3811 (2018-01-01)
|
||||
|
@ -8469,16 +8388,6 @@ An issue was discovered in certain Apple products. iOS before 11.2.5 is affected
|
|||
</code>
|
||||
|
||||
- [rani-i/bluetoothdPoC](https://github.com/rani-i/bluetoothdPoC)
|
||||
- [MTJailed/UnjailMe](https://github.com/MTJailed/UnjailMe)
|
||||
- [joedaguy/Exploit11.2](https://github.com/joedaguy/Exploit11.2)
|
||||
|
||||
### CVE-2018-4110 (2018-04-03)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves the "Web App" component. It allows remote attackers to bypass intended restrictions on cookie persistence.
|
||||
</code>
|
||||
|
||||
- [bencompton/ios11-cookie-set-expire-issue](https://github.com/bencompton/ios11-cookie-set-expire-issue)
|
||||
|
||||
### CVE-2018-4121 (2018-04-03)
|
||||
|
||||
|
@ -8486,7 +8395,6 @@ An issue was discovered in certain Apple products. iOS before 11.3 is affected.
|
|||
An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
|
||||
</code>
|
||||
|
||||
- [FSecureLABS/CVE-2018-4121](https://github.com/FSecureLABS/CVE-2018-4121)
|
||||
- [likescam/CVE-2018-4121](https://github.com/likescam/CVE-2018-4121)
|
||||
- [jezzus/CVE-2018-4121](https://github.com/jezzus/CVE-2018-4121)
|
||||
|
||||
|
@ -8498,24 +8406,6 @@ An issue was discovered in certain Apple products. iOS before 11.2.6 is affected
|
|||
|
||||
- [ZecOps/TELUGU_CVE-2018-4124_POC](https://github.com/ZecOps/TELUGU_CVE-2018-4124_POC)
|
||||
|
||||
### CVE-2018-4150 (2018-04-03)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
||||
</code>
|
||||
|
||||
- [Jailbreaks/CVE-2018-4150](https://github.com/Jailbreaks/CVE-2018-4150)
|
||||
- [RPwnage/LovelySn0w](https://github.com/RPwnage/LovelySn0w)
|
||||
- [littlelailo/incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-](https://github.com/littlelailo/incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-)
|
||||
|
||||
### CVE-2018-4185 (2019-01-11)
|
||||
|
||||
<code>
|
||||
In iOS before 11.3, tvOS before 11.3, watchOS before 4.3, and macOS before High Sierra 10.13.4, an information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling.
|
||||
</code>
|
||||
|
||||
- [bazad/x18-leak](https://github.com/bazad/x18-leak)
|
||||
|
||||
### CVE-2018-4193 (2018-06-08)
|
||||
|
||||
<code>
|
||||
|
@ -8590,22 +8480,6 @@ In iOS before 11.4, a memory corruption issue exists and was addressed with impr
|
|||
|
||||
- [omerporze/toothfairy](https://github.com/omerporze/toothfairy)
|
||||
|
||||
### CVE-2018-4331 (2019-04-03)
|
||||
|
||||
<code>
|
||||
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
|
||||
</code>
|
||||
|
||||
- [bazad/gsscred-race](https://github.com/bazad/gsscred-race)
|
||||
|
||||
### CVE-2018-4343 (2019-04-03)
|
||||
|
||||
<code>
|
||||
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
|
||||
</code>
|
||||
|
||||
- [bazad/gsscred-move-uaf](https://github.com/bazad/gsscred-move-uaf)
|
||||
|
||||
### CVE-2018-4407 (2019-04-03)
|
||||
|
||||
<code>
|
||||
|
@ -8667,40 +8541,12 @@ A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.
|
|||
</code>
|
||||
|
||||
- [ydl555/CVE-2018-4878-](https://github.com/ydl555/CVE-2018-4878-)
|
||||
- [mdsecactivebreach/CVE-2018-4878](https://github.com/mdsecactivebreach/CVE-2018-4878)
|
||||
- [hybridious/CVE-2018-4878](https://github.com/hybridious/CVE-2018-4878)
|
||||
- [vysecurity/CVE-2018-4878](https://github.com/vysecurity/CVE-2018-4878)
|
||||
- [KathodeN/CVE-2018-4878](https://github.com/KathodeN/CVE-2018-4878)
|
||||
- [SyFi/CVE-2018-4878](https://github.com/SyFi/CVE-2018-4878)
|
||||
- [ydl555/CVE-2018-4878](https://github.com/ydl555/CVE-2018-4878)
|
||||
- [B0fH/CVE-2018-4878](https://github.com/B0fH/CVE-2018-4878)
|
||||
- [Yable/CVE-2018-4878](https://github.com/Yable/CVE-2018-4878)
|
||||
- [HuanWoWeiLan/SoftwareSystemSecurity-2019](https://github.com/HuanWoWeiLan/SoftwareSystemSecurity-2019)
|
||||
|
||||
### CVE-2018-4879 (2018-02-27)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the image conversion module that processes Enhanced Metafile Format Plus (EMF+) data. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
|
||||
</code>
|
||||
|
||||
- [H3llozy/CVE-2018-4879](https://github.com/H3llozy/CVE-2018-4879)
|
||||
|
||||
### CVE-2018-4901 (2018-02-27)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the document identity representation. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
|
||||
</code>
|
||||
|
||||
- [bigric3/CVE-2018-4901](https://github.com/bigric3/CVE-2018-4901)
|
||||
|
||||
### CVE-2018-5234 (2018-04-30)
|
||||
|
||||
<code>
|
||||
The Norton Core router prior to v237 may be susceptible to a command injection exploit. This is a type of attack in which the goal is execution of arbitrary commands on the host system via vulnerable software.
|
||||
</code>
|
||||
|
||||
- [embedi/ble_norton_core](https://github.com/embedi/ble_norton_core)
|
||||
|
||||
### CVE-2018-5353 (2020-09-29)
|
||||
|
||||
<code>
|
||||
|
@ -8717,15 +8563,6 @@ The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 al
|
|||
|
||||
- [missing0x00/CVE-2018-5354](https://github.com/missing0x00/CVE-2018-5354)
|
||||
|
||||
### CVE-2018-5711 (2018-01-16)
|
||||
|
||||
<code>
|
||||
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
|
||||
</code>
|
||||
|
||||
- [huzhenghui/Test-7-2-0-PHP-CVE-2018-5711](https://github.com/huzhenghui/Test-7-2-0-PHP-CVE-2018-5711)
|
||||
- [huzhenghui/Test-7-2-1-PHP-CVE-2018-5711](https://github.com/huzhenghui/Test-7-2-1-PHP-CVE-2018-5711)
|
||||
|
||||
### CVE-2018-5724 (2018-01-16)
|
||||
|
||||
<code>
|
||||
|
@ -8750,14 +8587,6 @@ Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potenti
|
|||
|
||||
- [sischkg/cve-2018-5740](https://github.com/sischkg/cve-2018-5740)
|
||||
|
||||
### CVE-2018-5951 (2020-03-02)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack.
|
||||
</code>
|
||||
|
||||
- [Nat-Lab/CVE-2018-5951](https://github.com/Nat-Lab/CVE-2018-5951)
|
||||
|
||||
### CVE-2018-5955 (2018-01-21)
|
||||
|
||||
<code>
|
||||
|
@ -8774,39 +8603,17 @@ Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer over
|
|||
</code>
|
||||
|
||||
- [DavidBuchanan314/NXLoader](https://github.com/DavidBuchanan314/NXLoader)
|
||||
- [reswitched/rcm-modchips](https://github.com/reswitched/rcm-modchips)
|
||||
- [ChrisFigura/react-tegra-payload-launcher](https://github.com/ChrisFigura/react-tegra-payload-launcher)
|
||||
- [austinhartzheim/fusee-gelee](https://github.com/austinhartzheim/fusee-gelee)
|
||||
|
||||
### CVE-2018-6376 (2018-01-30)
|
||||
|
||||
<code>
|
||||
In Joomla! before 3.8.4, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the Hathor postinstall message.
|
||||
</code>
|
||||
|
||||
- [knqyf263/CVE-2018-6376](https://github.com/knqyf263/CVE-2018-6376)
|
||||
|
||||
### CVE-2018-6389 (2018-02-06)
|
||||
|
||||
<code>
|
||||
In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.
|
||||
</code>
|
||||
|
||||
- [yolabingo/wordpress-fix-cve-2018-6389](https://github.com/yolabingo/wordpress-fix-cve-2018-6389)
|
||||
- [WazeHell/CVE-2018-6389](https://github.com/WazeHell/CVE-2018-6389)
|
||||
- [rastating/modsecurity-cve-2018-6389](https://github.com/rastating/modsecurity-cve-2018-6389)
|
||||
- [knqyf263/CVE-2018-6389](https://github.com/knqyf263/CVE-2018-6389)
|
||||
- [JulienGadanho/cve-2018-6389-php-patcher](https://github.com/JulienGadanho/cve-2018-6389-php-patcher)
|
||||
- [dsfau/wordpress-CVE-2018-6389](https://github.com/dsfau/wordpress-CVE-2018-6389)
|
||||
- [Jetserver/CVE-2018-6389-FIX](https://github.com/Jetserver/CVE-2018-6389-FIX)
|
||||
- [thechrono13/PoC---CVE-2018-6389](https://github.com/thechrono13/PoC---CVE-2018-6389)
|
||||
- [BlackRouter/cve-2018-6389](https://github.com/BlackRouter/cve-2018-6389)
|
||||
- [alessiogilardi/PoC---CVE-2018-6389](https://github.com/alessiogilardi/PoC---CVE-2018-6389)
|
||||
- [JavierOlmedo/wordpress-cve-2018-6389](https://github.com/JavierOlmedo/wordpress-cve-2018-6389)
|
||||
- [m3ssap0/wordpress_cve-2018-6389](https://github.com/m3ssap0/wordpress_cve-2018-6389)
|
||||
- [s0md3v/Shiva](https://github.com/s0md3v/Shiva)
|
||||
- [mudhappy/Wordpress-Hack-CVE-2018-6389](https://github.com/mudhappy/Wordpress-Hack-CVE-2018-6389)
|
||||
- [armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389](https://github.com/armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389)
|
||||
- [ItinerisLtd/trellis-cve-2018-6389](https://github.com/ItinerisLtd/trellis-cve-2018-6389)
|
||||
- [Zazzzles/Wordpress-DOS](https://github.com/Zazzzles/Wordpress-DOS)
|
||||
- [fakedob/tvsz](https://github.com/fakedob/tvsz)
|
||||
|
@ -8814,45 +8621,12 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
|
|||
- [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389)
|
||||
- [Elsfa7-110/CVE-2018-6389](https://github.com/Elsfa7-110/CVE-2018-6389)
|
||||
|
||||
### CVE-2018-6396 (2018-02-17)
|
||||
|
||||
<code>
|
||||
SQL Injection exists in the Google Map Landkarten through 4.2.3 component for Joomla! via the cid or id parameter in a layout=form_markers action, or the map parameter in a layout=default action.
|
||||
</code>
|
||||
|
||||
- [JavierOlmedo/joomla-cve-2018-6396](https://github.com/JavierOlmedo/joomla-cve-2018-6396)
|
||||
|
||||
### CVE-2018-6407 (2018-01-30)
|
||||
|
||||
<code>
|
||||
An issue was discovered on Conceptronic CIPCAMPTIWL V3 0.61.30.21 devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to /hy-cgi/devices.cgi?cmd=searchlandevice. The crash completely freezes the device.
|
||||
</code>
|
||||
|
||||
- [dreadlocked/ConceptronicIPCam_MultipleVulnerabilities](https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities)
|
||||
|
||||
### CVE-2018-6479 (2018-01-31)
|
||||
|
||||
<code>
|
||||
An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
|
||||
</code>
|
||||
|
||||
- [dreadlocked/netwave-dosvulnerability](https://github.com/dreadlocked/netwave-dosvulnerability)
|
||||
|
||||
### CVE-2018-6518 (2018-04-26)
|
||||
|
||||
<code>
|
||||
Composr CMS 10.0.13 has XSS via the site_name parameter in a page=admin-setupwizard&type=step3 request to /adminzone/index.php.
|
||||
</code>
|
||||
|
||||
- [faizzaidi/Composr-CMS-10.0.13-Cross-Site-Scripting-XSS](https://github.com/faizzaidi/Composr-CMS-10.0.13-Cross-Site-Scripting-XSS)
|
||||
|
||||
### CVE-2018-6546 (2018-04-13)
|
||||
|
||||
<code>
|
||||
plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, executes code at a user-defined (local or SMB) path as SYSTEM when the execute_installer parameter is used in an HTTP message. This occurs without properly authenticating the user.
|
||||
</code>
|
||||
|
||||
- [securifera/CVE-2018-6546-Exploit](https://github.com/securifera/CVE-2018-6546-Exploit)
|
||||
- [YanZiShuang/CVE-2018-6546](https://github.com/YanZiShuang/CVE-2018-6546)
|
||||
|
||||
### CVE-2018-6574 (2018-02-07)
|
||||
|
@ -8861,11 +8635,6 @@ plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD
|
|||
Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
|
||||
</code>
|
||||
|
||||
- [acole76/cve-2018-6574](https://github.com/acole76/cve-2018-6574)
|
||||
- [neargle/CVE-2018-6574-POC](https://github.com/neargle/CVE-2018-6574-POC)
|
||||
- [willbo4r/go-get-rce](https://github.com/willbo4r/go-get-rce)
|
||||
- [ahmetmanga/go-get-rce](https://github.com/ahmetmanga/go-get-rce)
|
||||
- [ahmetmanga/cve-2018-6574](https://github.com/ahmetmanga/cve-2018-6574)
|
||||
- [kenprice/cve-2018-6574](https://github.com/kenprice/cve-2018-6574)
|
||||
- [redirected/cve-2018-6574](https://github.com/redirected/cve-2018-6574)
|
||||
- [20matan/CVE-2018-6574-POC](https://github.com/20matan/CVE-2018-6574-POC)
|
||||
|
@ -8936,45 +8705,18 @@ Infoblox NetMRI 7.1.1 has Reflected Cross-Site Scripting via the /api/docs/index
|
|||
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
|
||||
</code>
|
||||
|
||||
- [c0llision/exim-vuln-poc](https://github.com/c0llision/exim-vuln-poc)
|
||||
- [beraphin/CVE-2018-6789](https://github.com/beraphin/CVE-2018-6789)
|
||||
- [synacktiv/Exim-CVE-2018-6789](https://github.com/synacktiv/Exim-CVE-2018-6789)
|
||||
- [martinclauss/exim-rce-cve-2018-6789](https://github.com/martinclauss/exim-rce-cve-2018-6789)
|
||||
|
||||
### CVE-2018-6791 (2018-02-06)
|
||||
|
||||
<code>
|
||||
An issue was discovered in soliduiserver/deviceserviceaction.cpp in KDE Plasma Workspace before 5.12.0. When a vfat thumbdrive that contains `` or $() in its volume label is plugged in and mounted through the device notifier, it's interpreted as a shell command, leading to a possibility of arbitrary command execution. An example of an offending volume label is "$(touch b)" -- this will create a file called b in the home folder.
|
||||
</code>
|
||||
|
||||
- [rarar0/KDE_Vuln](https://github.com/rarar0/KDE_Vuln)
|
||||
|
||||
### CVE-2018-6890 (2018-02-22)
|
||||
|
||||
<code>
|
||||
Cross-site scripting (XSS) vulnerability in Wolf CMS 0.8.3.1 via the page editing feature, as demonstrated by /?/admin/page/edit/3.
|
||||
</code>
|
||||
|
||||
- [pradeepjairamani/WolfCMS-XSS-POC](https://github.com/pradeepjairamani/WolfCMS-XSS-POC)
|
||||
|
||||
### CVE-2018-6892 (2018-02-11)
|
||||
|
||||
<code>
|
||||
An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the "CloudMe Sync" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution.
|
||||
</code>
|
||||
|
||||
- [manojcode/CloudMe-Sync-1.10.9---Buffer-Overflow-SEH-DEP-Bypass](https://github.com/manojcode/CloudMe-Sync-1.10.9---Buffer-Overflow-SEH-DEP-Bypass)
|
||||
- [manojcode/-Win10-x64-CloudMe-Sync-1.10.9-Buffer-Overflow-SEH-DEP-Bypass](https://github.com/manojcode/-Win10-x64-CloudMe-Sync-1.10.9-Buffer-Overflow-SEH-DEP-Bypass)
|
||||
- [latortuga71/CVE-2018-6892-Golang](https://github.com/latortuga71/CVE-2018-6892-Golang)
|
||||
|
||||
### CVE-2018-6905 (2018-04-08)
|
||||
|
||||
<code>
|
||||
The page module in TYPO3 before 8.7.11, and 9.1.0, has XSS via $GLOBALS['TYPO3_CONF_VARS']['SYS']['sitename'], as demonstrated by an admin entering a crafted site name during the installation process.
|
||||
</code>
|
||||
|
||||
- [pradeepjairamani/TYPO3-XSS-POC](https://github.com/pradeepjairamani/TYPO3-XSS-POC)
|
||||
|
||||
### CVE-2018-6961 (2018-06-11)
|
||||
|
||||
<code>
|
||||
|
@ -8992,46 +8734,6 @@ VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650
|
|||
|
||||
- [heaphopopotamus/vmxnet3Hunter](https://github.com/heaphopopotamus/vmxnet3Hunter)
|
||||
|
||||
### CVE-2018-7171 (2018-03-30)
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in Twonky Server 7.0.11 through 8.5 allows remote attackers to share the contents of arbitrary directories via a .. (dot dot) in the contentbase parameter to rpc/set_all.
|
||||
</code>
|
||||
|
||||
- [mechanico/sharingIsCaring](https://github.com/mechanico/sharingIsCaring)
|
||||
|
||||
### CVE-2018-7197 (2018-02-17)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Pluck through 4.7.4. A stored cross-site scripting (XSS) vulnerability allows remote unauthenticated users to inject arbitrary web script or HTML into admin/blog Reaction Comments via a crafted URL.
|
||||
</code>
|
||||
|
||||
- [Alyssa-o-Herrera/CVE-2018-7197](https://github.com/Alyssa-o-Herrera/CVE-2018-7197)
|
||||
|
||||
### CVE-2018-7211 (2018-02-17)
|
||||
|
||||
<code>
|
||||
An issue was discovered in iDashboards 9.6b. The SSO implementation is affected by a weak obfuscation library, allowing man-in-the-middle attackers to discover credentials.
|
||||
</code>
|
||||
|
||||
- [c3r34lk1ll3r/CVE-2018-7211-PoC](https://github.com/c3r34lk1ll3r/CVE-2018-7211-PoC)
|
||||
|
||||
### CVE-2018-7249 (2018-02-26)
|
||||
|
||||
<code>
|
||||
An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. Two carefully timed calls to IOCTL 0xCA002813 can cause a race condition that leads to a use-after-free. When exploited, an unprivileged attacker can run arbitrary code in the kernel.
|
||||
</code>
|
||||
|
||||
- [Elvin9/NotSecDrv](https://github.com/Elvin9/NotSecDrv)
|
||||
|
||||
### CVE-2018-7250 (2018-02-26)
|
||||
|
||||
<code>
|
||||
An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. An uninitialized kernel pool allocation in IOCTL 0xCA002813 allows a local unprivileged attacker to leak 16 bits of uninitialized kernel PagedPool data.
|
||||
</code>
|
||||
|
||||
- [Elvin9/SecDrvPoolLeak](https://github.com/Elvin9/SecDrvPoolLeak)
|
||||
|
||||
### CVE-2018-7284 (2018-02-21)
|
||||
|
||||
<code>
|
||||
|
@ -9062,23 +8764,10 @@ FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x befor
|
|||
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
|
||||
</code>
|
||||
|
||||
- [g0rx/CVE-2018-7600-Drupal-RCE](https://github.com/g0rx/CVE-2018-7600-Drupal-RCE)
|
||||
- [a2u/CVE-2018-7600](https://github.com/a2u/CVE-2018-7600)
|
||||
- [dreadlocked/Drupalgeddon2](https://github.com/dreadlocked/Drupalgeddon2)
|
||||
- [knqyf263/CVE-2018-7600](https://github.com/knqyf263/CVE-2018-7600)
|
||||
- [dr-iman/CVE-2018-7600-Drupal-0day-RCE](https://github.com/dr-iman/CVE-2018-7600-Drupal-0day-RCE)
|
||||
- [jirojo2/drupalgeddon2](https://github.com/jirojo2/drupalgeddon2)
|
||||
- [dwisiswant0/CVE-2018-7600](https://github.com/dwisiswant0/CVE-2018-7600)
|
||||
- [thehappydinoa/CVE-2018-7600](https://github.com/thehappydinoa/CVE-2018-7600)
|
||||
- [sl4cky/CVE-2018-7600](https://github.com/sl4cky/CVE-2018-7600)
|
||||
- [sl4cky/CVE-2018-7600-Masschecker](https://github.com/sl4cky/CVE-2018-7600-Masschecker)
|
||||
- [FireFart/CVE-2018-7600](https://github.com/FireFart/CVE-2018-7600)
|
||||
- [pimps/CVE-2018-7600](https://github.com/pimps/CVE-2018-7600)
|
||||
- [lorddemon/drupalgeddon2](https://github.com/lorddemon/drupalgeddon2)
|
||||
- [Hestat/drupal-check](https://github.com/Hestat/drupal-check)
|
||||
- [fyraiga/CVE-2018-7600-drupalgeddon2-scanner](https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner)
|
||||
- [Damian972/drupalgeddon-2](https://github.com/Damian972/drupalgeddon-2)
|
||||
- [Jyozi/CVE-2018-7600](https://github.com/Jyozi/CVE-2018-7600)
|
||||
- [happynote3966/CVE-2018-7600](https://github.com/happynote3966/CVE-2018-7600)
|
||||
- [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE)
|
||||
- [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600)
|
||||
|
@ -9098,7 +8787,6 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
|
|||
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.
|
||||
</code>
|
||||
|
||||
- [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
|
||||
- [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602)
|
||||
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
|
||||
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
|
||||
|
@ -9127,14 +8815,6 @@ A potential Remote Unauthorized Access in Micro Focus Fortify Software Security
|
|||
|
||||
- [alt3kx/CVE-2018-7691](https://github.com/alt3kx/CVE-2018-7691)
|
||||
|
||||
### CVE-2018-7747 (2018-04-20)
|
||||
|
||||
<code>
|
||||
Multiple cross-site scripting (XSS) vulnerabilities in the Caldera Forms plugin before 1.6.0-rc.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a greeting message, (2) the email transaction log, or (3) an imported form.
|
||||
</code>
|
||||
|
||||
- [mindpr00f/CVE-2018-7747](https://github.com/mindpr00f/CVE-2018-7747)
|
||||
|
||||
### CVE-2018-7750 (2018-03-13)
|
||||
|
||||
<code>
|
||||
|
@ -9194,14 +8874,6 @@ In Joomla! 3.5.0 through 3.8.5, the lack of type casting of a variable in a SQL
|
|||
|
||||
- [luckybool1020/CVE-2018-8045](https://github.com/luckybool1020/CVE-2018-8045)
|
||||
|
||||
### CVE-2018-8060 (2018-05-09)
|
||||
|
||||
<code>
|
||||
HWiNFO AMD64 Kernel driver version 8.98 and lower allows an unprivileged user to send an IOCTL to the device driver. If input and/or output buffer pointers are NULL or if these buffers' data are invalid, a NULL/invalid pointer access occurs, resulting in a Windows kernel panic aka Blue Screen. This affects IOCTLs higher than 0x85FE2600 with the HWiNFO32 symbolic device name.
|
||||
</code>
|
||||
|
||||
- [otavioarj/SIOCtl](https://github.com/otavioarj/SIOCtl)
|
||||
|
||||
### CVE-2018-8065 (2018-03-12)
|
||||
|
||||
<code>
|
||||
|
@ -9210,14 +8882,6 @@ An issue was discovered in the web server in Flexense SyncBreeze Enterprise 10.6
|
|||
|
||||
- [EgeBalci/CVE-2018-8065](https://github.com/EgeBalci/CVE-2018-8065)
|
||||
|
||||
### CVE-2018-8078 (2018-03-13)
|
||||
|
||||
<code>
|
||||
YzmCMS 3.7 has Stored XSS via the title parameter to advertisement/adver/edit.html.
|
||||
</code>
|
||||
|
||||
- [AlwaysHereFight/YZMCMSxss](https://github.com/AlwaysHereFight/YZMCMSxss)
|
||||
|
||||
### CVE-2018-8090 (2018-07-25)
|
||||
|
||||
<code>
|
||||
|
@ -9226,14 +8890,6 @@ Quick Heal Total Security 64 bit 17.00 (QHTS64.exe), (QHTSFT64.exe) - Version 10
|
|||
|
||||
- [kernelm0de/CVE-2018-8090](https://github.com/kernelm0de/CVE-2018-8090)
|
||||
|
||||
### CVE-2018-8108 (2018-03-14)
|
||||
|
||||
<code>
|
||||
The select component in bui through 2018-03-13 has XSS because it performs an escape operation on already-escaped text, as demonstrated by workGroupList text.
|
||||
</code>
|
||||
|
||||
- [zlgxzswjy/BUI-select-xss](https://github.com/zlgxzswjy/BUI-select-xss)
|
||||
|
||||
### CVE-2018-8115 (2018-05-02)
|
||||
|
||||
<code>
|
||||
|
@ -9248,9 +8904,6 @@ A remote code execution vulnerability exists when the Windows Host Compute Servi
|
|||
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8124, CVE-2018-8164, CVE-2018-8166.
|
||||
</code>
|
||||
|
||||
- [bigric3/cve-2018-8120](https://github.com/bigric3/cve-2018-8120)
|
||||
- [unamer/CVE-2018-8120](https://github.com/unamer/CVE-2018-8120)
|
||||
- [ne1llee/cve-2018-8120](https://github.com/ne1llee/cve-2018-8120)
|
||||
- [alpha1ab/CVE-2018-8120](https://github.com/alpha1ab/CVE-2018-8120)
|
||||
- [areuu/CVE-2018-8120](https://github.com/areuu/CVE-2018-8120)
|
||||
- [EVOL4/CVE-2018-8120](https://github.com/EVOL4/CVE-2018-8120)
|
||||
|
@ -9275,9 +8928,6 @@ A remote code execution vulnerability exists in Visual Studio software when the
|
|||
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
|
||||
</code>
|
||||
|
||||
- [0x09AL/CVE-2018-8174-msf](https://github.com/0x09AL/CVE-2018-8174-msf)
|
||||
- [Yt1g3r/CVE-2018-8174_EXP](https://github.com/Yt1g3r/CVE-2018-8174_EXP)
|
||||
- [SyFi/CVE-2018-8174](https://github.com/SyFi/CVE-2018-8174)
|
||||
- [orf53975/Rig-Exploit-for-CVE-2018-8174](https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174)
|
||||
- [piotrflorczyk/cve-2018-8174_analysis](https://github.com/piotrflorczyk/cve-2018-8174_analysis)
|
||||
- [likescam/CVE-2018-8174-msf](https://github.com/likescam/CVE-2018-8174-msf)
|
||||
|
@ -9395,41 +9045,14 @@ Cross-site request forgery (CSRF) vulnerability in the Mailer Plugin 1.20 for Je
|
|||
|
||||
- [GeunSam2/CVE-2018-8718](https://github.com/GeunSam2/CVE-2018-8718)
|
||||
|
||||
### CVE-2018-8733 (2018-04-17)
|
||||
|
||||
<code>
|
||||
Authentication bypass vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an unauthenticated attacker to make configuration changes and leverage an authenticated SQL injection vulnerability.
|
||||
</code>
|
||||
|
||||
- [xfer0/Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed](https://github.com/xfer0/Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed)
|
||||
|
||||
### CVE-2018-8820 (2018-03-28)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Square 9 GlobalForms 6.2.x. A Time Based SQL injection vulnerability in the "match" parameter allows remote authenticated attackers to execute arbitrary SQL commands. It is possible to upgrade access to full server compromise via xp_cmdshell. In some cases, the authentication requirement for the attack can be met by sending the default admin credentials.
|
||||
</code>
|
||||
|
||||
- [hateshape/frevvomapexec](https://github.com/hateshape/frevvomapexec)
|
||||
|
||||
### CVE-2018-8897 (2018-05-08)
|
||||
|
||||
<code>
|
||||
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
|
||||
</code>
|
||||
|
||||
- [nmulasmajic/CVE-2018-8897](https://github.com/nmulasmajic/CVE-2018-8897)
|
||||
- [jiazhang0/pop-mov-ss-exploit](https://github.com/jiazhang0/pop-mov-ss-exploit)
|
||||
- [can1357/CVE-2018-8897](https://github.com/can1357/CVE-2018-8897)
|
||||
- [nmulasmajic/syscall_exploit_CVE-2018-8897](https://github.com/nmulasmajic/syscall_exploit_CVE-2018-8897)
|
||||
|
||||
### CVE-2018-8941 (2018-04-03)
|
||||
|
||||
<code>
|
||||
Diagnostics functionality on D-Link DSL-3782 devices with firmware EU v. 1.01 has a buffer overflow, allowing authenticated remote attackers to execute arbitrary code via a long Addr value to the 'set Diagnostics_Entry' function in an HTTP request, related to /userfs/bin/tcapi.
|
||||
</code>
|
||||
|
||||
- [SECFORCE/CVE-2018-8941](https://github.com/SECFORCE/CVE-2018-8941)
|
||||
|
||||
### CVE-2018-8943 (2018-03-22)
|
||||
|
||||
<code>
|
||||
|
@ -9438,22 +9061,6 @@ There is a SQL injection in the PHPSHE 1.6 userbank parameter.
|
|||
|
||||
- [coolboy0816/CVE-2018-8943](https://github.com/coolboy0816/CVE-2018-8943)
|
||||
|
||||
### CVE-2018-8970 (2018-03-24)
|
||||
|
||||
<code>
|
||||
The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.
|
||||
</code>
|
||||
|
||||
- [tiran/CVE-2018-8970](https://github.com/tiran/CVE-2018-8970)
|
||||
|
||||
### CVE-2018-9059 (2018-04-20)
|
||||
|
||||
<code>
|
||||
Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 7.2 allows remote attackers to execute arbitrary code via a malicious login request to forum.ghp. NOTE: this may overlap CVE-2014-3791.
|
||||
</code>
|
||||
|
||||
- [manojcode/easy-file-share-7.2-exploit-CVE-2018-9059](https://github.com/manojcode/easy-file-share-7.2-exploit-CVE-2018-9059)
|
||||
|
||||
### CVE-2018-9075 (2018-09-28)
|
||||
|
||||
<code>
|
||||
|
@ -9462,14 +9069,6 @@ For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlie
|
|||
|
||||
- [beverlymiller818/cve-2018-9075](https://github.com/beverlymiller818/cve-2018-9075)
|
||||
|
||||
### CVE-2018-9160 (2018-03-31)
|
||||
|
||||
<code>
|
||||
SickRage before v2018.03.09-1 includes cleartext credentials in HTTP responses.
|
||||
</code>
|
||||
|
||||
- [mechanico/sickrageWTF](https://github.com/mechanico/sickrageWTF)
|
||||
|
||||
### CVE-2018-9206 (2018-10-11)
|
||||
|
||||
<code>
|
||||
|
@ -9574,8 +9173,6 @@ TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in
|
|||
|
||||
- [ezelf/CVE-2018-9995_dvr_credentials](https://github.com/ezelf/CVE-2018-9995_dvr_credentials)
|
||||
- [zzh217/CVE-2018-9995_Batch_scanning_exp](https://github.com/zzh217/CVE-2018-9995_Batch_scanning_exp)
|
||||
- [Huangkey/CVE-2018-9995_check](https://github.com/Huangkey/CVE-2018-9995_check)
|
||||
- [gwolfs/CVE-2018-9995-ModifiedByGwolfs](https://github.com/gwolfs/CVE-2018-9995-ModifiedByGwolfs)
|
||||
- [shacojx/cve-2018-9995](https://github.com/shacojx/cve-2018-9995)
|
||||
- [Cyb0r9/DVR-Exploiter](https://github.com/Cyb0r9/DVR-Exploiter)
|
||||
- [codeholic2k18/CVE-2018-9995](https://github.com/codeholic2k18/CVE-2018-9995)
|
||||
|
@ -9612,9 +9209,6 @@ Format string vulnerability in the logMess function in TFTP Server SP 1.66 and e
|
|||
|
||||
- [0xddaa/CVE-2018-10388](https://github.com/0xddaa/CVE-2018-10388)
|
||||
|
||||
### CVE-2018-10467
|
||||
- [alt3kx/CVE-2018-10467](https://github.com/alt3kx/CVE-2018-10467)
|
||||
|
||||
### CVE-2018-10517 (2018-04-27)
|
||||
|
||||
<code>
|
||||
|
@ -9623,34 +9217,14 @@ In CMS Made Simple (CMSMS) through 2.2.7, the "module import" operatio
|
|||
|
||||
- [0x00-0x00/CVE-2018-10517](https://github.com/0x00-0x00/CVE-2018-10517)
|
||||
|
||||
### CVE-2018-10546 (2018-04-29)
|
||||
|
||||
<code>
|
||||
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
|
||||
</code>
|
||||
|
||||
- [dsfau/CVE-2018-10546](https://github.com/dsfau/CVE-2018-10546)
|
||||
|
||||
### CVE-2018-10562 (2018-05-03)
|
||||
|
||||
<code>
|
||||
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
|
||||
</code>
|
||||
|
||||
- [f3d0x0/GPON](https://github.com/f3d0x0/GPON)
|
||||
- [649/Pingpon-Exploit](https://github.com/649/Pingpon-Exploit)
|
||||
- [Choudai/GPON-LOADER](https://github.com/Choudai/GPON-LOADER)
|
||||
- [c0ld1/GPON_RCE](https://github.com/c0ld1/GPON_RCE)
|
||||
- [ATpiu/CVE-2018-10562](https://github.com/ATpiu/CVE-2018-10562)
|
||||
|
||||
### CVE-2018-10583 (2018-05-01)
|
||||
|
||||
<code>
|
||||
An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by xlink:href=file://192.168.0.2/test.jpg within an office:document-content element in a .odt XML document.
|
||||
</code>
|
||||
|
||||
- [TaharAmine/CVE-2018-10583](https://github.com/TaharAmine/CVE-2018-10583)
|
||||
|
||||
### CVE-2018-10678 (2018-05-13)
|
||||
|
||||
<code>
|
||||
|
@ -9659,17 +9233,6 @@ MyBB 1.8.15, when accessed with Microsoft Edge, mishandles 'target="_blank&
|
|||
|
||||
- [hbranco/CVE-2018-10678](https://github.com/hbranco/CVE-2018-10678)
|
||||
|
||||
### CVE-2018-10715
|
||||
- [alt3kx/CVE-2018-10715](https://github.com/alt3kx/CVE-2018-10715)
|
||||
|
||||
### CVE-2018-10732 (2018-05-28)
|
||||
|
||||
<code>
|
||||
The REST API in Dataiku DSS before 4.2.3 allows remote attackers to obtain sensitive information (i.e., determine if a username is valid) because of profile pictures visibility.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2018-10732](https://github.com/alt3kx/CVE-2018-10732)
|
||||
|
||||
### CVE-2018-10821 (2018-06-14)
|
||||
|
||||
<code>
|
||||
|
@ -9748,11 +9311,7 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before
|
|||
</code>
|
||||
|
||||
- [Rogdham/CVE-2018-11235](https://github.com/Rogdham/CVE-2018-11235)
|
||||
- [vmotos/CVE-2018-11235](https://github.com/vmotos/CVE-2018-11235)
|
||||
- [Choihosu/cve-2018-11235](https://github.com/Choihosu/cve-2018-11235)
|
||||
- [CHYbeta/CVE-2018-11235-DEMO](https://github.com/CHYbeta/CVE-2018-11235-DEMO)
|
||||
- [Kiss-sh0t/CVE-2018-11235-poc](https://github.com/Kiss-sh0t/CVE-2018-11235-poc)
|
||||
- [H0K5/clone_and_pwn](https://github.com/H0K5/clone_and_pwn)
|
||||
- [knqyf263/CVE-2018-11235](https://github.com/knqyf263/CVE-2018-11235)
|
||||
- [ygouzerh/CVE-2018-11235](https://github.com/ygouzerh/CVE-2018-11235)
|
||||
- [qweraqq/CVE-2018-11235-Git-Submodule-CE](https://github.com/qweraqq/CVE-2018-11235-Git-Submodule-CE)
|
||||
|
@ -9772,7 +9331,6 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before
|
|||
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
|
||||
</code>
|
||||
|
||||
- [evilmiracle/CVE-2018-11236](https://github.com/evilmiracle/CVE-2018-11236)
|
||||
- [rockysec/CVE-2018-11236](https://github.com/rockysec/CVE-2018-11236)
|
||||
|
||||
### CVE-2018-11311 (2018-05-20)
|
||||
|
@ -9799,14 +9357,6 @@ The ASUSTOR ADM 3.1.0.RFQ3 NAS portal suffers from an unauthenticated remote cod
|
|||
|
||||
- [mefulton/CVE-2018-11510](https://github.com/mefulton/CVE-2018-11510)
|
||||
|
||||
### CVE-2018-11517 (2018-05-28)
|
||||
|
||||
<code>
|
||||
mySCADA myPRO 7 allows remote attackers to discover all ProjectIDs in a project by sending all of the prj parameter values from 870000 to 875000 in t=0&rq=0 requests to TCP port 11010.
|
||||
</code>
|
||||
|
||||
- [EmreOvunc/mySCADA-myPRO-7-projectID-Disclosure](https://github.com/EmreOvunc/mySCADA-myPRO-7-projectID-Disclosure)
|
||||
|
||||
### CVE-2018-11564 (2018-06-01)
|
||||
|
||||
<code>
|
||||
|
@ -10899,22 +10449,6 @@ The woocommerce-jetpack plugin before 3.8.0 for WordPress has XSS in the Product
|
|||
|
||||
- [parzel/CVE-2018-20966](https://github.com/parzel/CVE-2018-20966)
|
||||
|
||||
### CVE-2018-1000001 (2018-01-31)
|
||||
|
||||
<code>
|
||||
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
|
||||
</code>
|
||||
|
||||
- [0x00-0x00/CVE-2018-1000001](https://github.com/0x00-0x00/CVE-2018-1000001)
|
||||
|
||||
### CVE-2018-1000006 (2018-01-24)
|
||||
|
||||
<code>
|
||||
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
|
||||
</code>
|
||||
|
||||
- [CHYbeta/CVE-2018-1000006-DEMO](https://github.com/CHYbeta/CVE-2018-1000006-DEMO)
|
||||
|
||||
### CVE-2018-1000030 (2018-02-08)
|
||||
|
||||
<code>
|
||||
|
@ -10931,14 +10465,6 @@ Ajenti version version 2 contains a Cross ite Request Forgery (CSRF) vulnerabili
|
|||
|
||||
- [SECFORCE/CVE-2018-1000082-exploit](https://github.com/SECFORCE/CVE-2018-1000082-exploit)
|
||||
|
||||
### CVE-2018-1000117 (2018-03-07)
|
||||
|
||||
<code>
|
||||
Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.
|
||||
</code>
|
||||
|
||||
- [u0pattern/CVE-2018-1000117-Exploit](https://github.com/u0pattern/CVE-2018-1000117-Exploit)
|
||||
|
||||
### CVE-2018-1000134 (2018-03-16)
|
||||
|
||||
<code>
|
||||
|
@ -10956,14 +10482,6 @@ rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerabil
|
|||
- [s0/rsyslog-librelp-CVE-2018-1000140](https://github.com/s0/rsyslog-librelp-CVE-2018-1000140)
|
||||
- [s0/rsyslog-librelp-CVE-2018-1000140-fixed](https://github.com/s0/rsyslog-librelp-CVE-2018-1000140-fixed)
|
||||
|
||||
### CVE-2018-1000199 (2018-05-24)
|
||||
|
||||
<code>
|
||||
The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
|
||||
</code>
|
||||
|
||||
- [dsfau/CVE-2018-1000199](https://github.com/dsfau/CVE-2018-1000199)
|
||||
|
||||
### CVE-2018-1000224 (2018-08-20)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue