mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/02/09 06:09:17
This commit is contained in:
parent
0ab8ff430d
commit
48adf5dca8
55 changed files with 92 additions and 1586 deletions
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 917,
|
||||
"watchers_count": 917,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 917,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 52622711,
|
||||
"name": "cve-2016-0040",
|
||||
"full_name": "Rootkitsmm\/cve-2016-0040",
|
||||
"owner": {
|
||||
"login": "Rootkitsmm",
|
||||
"id": 5567904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5567904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm\/cve-2016-0040",
|
||||
"description": "Exploiting CVE-2016-0040 uninitialized pointer",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-26T18:00:30Z",
|
||||
"updated_at": "2020-08-17T02:32:12Z",
|
||||
"pushed_at": "2016-07-17T07:59:10Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 99280066,
|
||||
"name": "CVE-2016-0040",
|
||||
|
|
|
@ -1,71 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 51401477,
|
||||
"name": "CVE-2016-0051",
|
||||
"full_name": "koczkatamas\/CVE-2016-0051",
|
||||
"owner": {
|
||||
"login": "koczkatamas",
|
||||
"id": 2608082,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2608082?v=4",
|
||||
"html_url": "https:\/\/github.com\/koczkatamas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/koczkatamas\/CVE-2016-0051",
|
||||
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-09T21:30:34Z",
|
||||
"updated_at": "2021-01-23T15:10:35Z",
|
||||
"pushed_at": "2016-05-09T17:53:48Z",
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"forks_count": 155,
|
||||
"forks": 155,
|
||||
"watchers": 325,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 58299464,
|
||||
"name": "CVE-2016-0051",
|
||||
"full_name": "hexx0r\/CVE-2016-0051",
|
||||
"owner": {
|
||||
"login": "hexx0r",
|
||||
"id": 13381998,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13381998?v=4",
|
||||
"html_url": "https:\/\/github.com\/hexx0r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hexx0r\/CVE-2016-0051",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-05-08T06:22:07Z",
|
||||
"updated_at": "2020-06-06T02:46:36Z",
|
||||
"pushed_at": "2016-05-10T22:41:12Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 61298858,
|
||||
"name": "CVE-2016-0051",
|
||||
"full_name": "ganrann\/CVE-2016-0051",
|
||||
"owner": {
|
||||
"login": "ganrann",
|
||||
"id": 245381,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/245381?v=4",
|
||||
"html_url": "https:\/\/github.com\/ganrann"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ganrann\/CVE-2016-0051",
|
||||
"description": "CVE-2016-0051 样本库",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-16T14:08:43Z",
|
||||
"updated_at": "2016-06-16T14:12:08Z",
|
||||
"pushed_at": "2016-06-16T14:10:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 61757233,
|
||||
"name": "cve-2016-0189",
|
||||
"full_name": "theori-io\/cve-2016-0189",
|
||||
"owner": {
|
||||
"login": "theori-io",
|
||||
"id": 18063559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18063559?v=4",
|
||||
"html_url": "https:\/\/github.com\/theori-io"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/theori-io\/cve-2016-0189",
|
||||
"description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-22T23:03:30Z",
|
||||
"updated_at": "2020-10-29T06:48:45Z",
|
||||
"pushed_at": "2016-06-23T00:47:50Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 61921909,
|
||||
"name": "MS16-051-poc",
|
||||
"full_name": "deamwork\/MS16-051-poc",
|
||||
"owner": {
|
||||
"login": "deamwork",
|
||||
"id": 7680724,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7680724?v=4",
|
||||
"html_url": "https:\/\/github.com\/deamwork"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/deamwork\/MS16-051-poc",
|
||||
"description": "对CVE-2016-0189漏洞补丁的分析",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-25T01:48:38Z",
|
||||
"updated_at": "2019-11-09T17:06:02Z",
|
||||
"pushed_at": "2016-06-25T01:49:30Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 917,
|
||||
"watchers_count": 917,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 917,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 50957830,
|
||||
"name": "cve-2016-0701",
|
||||
"full_name": "luanjampa\/cve-2016-0701",
|
||||
"owner": {
|
||||
"login": "luanjampa",
|
||||
"id": 4728927,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4728927?v=4",
|
||||
"html_url": "https:\/\/github.com\/luanjampa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/luanjampa\/cve-2016-0701",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-02-02T22:53:34Z",
|
||||
"updated_at": "2016-02-15T06:03:46Z",
|
||||
"pushed_at": "2016-02-24T17:32:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 49952630,
|
||||
"name": "cve-2016-0728",
|
||||
"full_name": "idl3r\/cve-2016-0728",
|
||||
"owner": {
|
||||
"login": "idl3r",
|
||||
"id": 11041719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11041719?v=4",
|
||||
"html_url": "https:\/\/github.com\/idl3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/idl3r\/cve-2016-0728",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-01-19T12:55:49Z",
|
||||
"updated_at": "2016-01-19T12:55:49Z",
|
||||
"pushed_at": "2016-01-19T12:55:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 50038843,
|
||||
"name": "cve_2016_0728",
|
||||
"full_name": "kennetham\/cve_2016_0728",
|
||||
"owner": {
|
||||
"login": "kennetham",
|
||||
"id": 507492,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/507492?v=4",
|
||||
"html_url": "https:\/\/github.com\/kennetham"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kennetham\/cve_2016_0728",
|
||||
"description": "CVE-2016-0728 Linux Kernel Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-20T15:23:52Z",
|
||||
"updated_at": "2018-01-04T10:37:03Z",
|
||||
"pushed_at": "2016-01-20T15:26:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 50156146,
|
||||
"name": "cve-2016-0728",
|
||||
|
@ -68,75 +22,6 @@
|
|||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 50231808,
|
||||
"name": "CVE-2016-0728",
|
||||
"full_name": "googleweb\/CVE-2016-0728",
|
||||
"owner": {
|
||||
"login": "googleweb",
|
||||
"id": 11829793,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11829793?v=4",
|
||||
"html_url": "https:\/\/github.com\/googleweb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/googleweb\/CVE-2016-0728",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-01-23T09:17:21Z",
|
||||
"updated_at": "2019-01-06T01:51:44Z",
|
||||
"pushed_at": "2016-01-20T21:31:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 50619014,
|
||||
"name": "cve-2016-0728-testbed",
|
||||
"full_name": "neuschaefer\/cve-2016-0728-testbed",
|
||||
"owner": {
|
||||
"login": "neuschaefer",
|
||||
"id": 1021512,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1021512?v=4",
|
||||
"html_url": "https:\/\/github.com\/neuschaefer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/neuschaefer\/cve-2016-0728-testbed",
|
||||
"description": "A testbed for CVE-2016-0728, a refcount leak\/overflow bug in Linux",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-28T22:38:13Z",
|
||||
"updated_at": "2017-06-05T14:54:37Z",
|
||||
"pushed_at": "2016-01-29T00:48:38Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 53915696,
|
||||
"name": "cve-2016-0728",
|
||||
"full_name": "bittorrent3389\/cve-2016-0728",
|
||||
"owner": {
|
||||
"login": "bittorrent3389",
|
||||
"id": 5295462,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5295462?v=4",
|
||||
"html_url": "https:\/\/github.com\/bittorrent3389"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bittorrent3389\/cve-2016-0728",
|
||||
"description": "a exploit for cve-2016-0728",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-15T04:52:40Z",
|
||||
"updated_at": "2018-11-12T08:15:48Z",
|
||||
"pushed_at": "2016-03-16T10:15:47Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 80220505,
|
||||
"name": "exploit_cve-2016-0728",
|
||||
|
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 50437751,
|
||||
"name": "rails-rce-cve-2016-0752",
|
||||
"full_name": "forced-request\/rails-rce-cve-2016-0752",
|
||||
"owner": {
|
||||
"login": "forced-request",
|
||||
"id": 961246,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/961246?v=4",
|
||||
"html_url": "https:\/\/github.com\/forced-request"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/forced-request\/rails-rce-cve-2016-0752",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-01-26T15:25:34Z",
|
||||
"updated_at": "2017-03-22T01:11:06Z",
|
||||
"pushed_at": "2016-01-26T15:30:22Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 54231678,
|
||||
"name": "CVE-2016-0752",
|
||||
"full_name": "dachidahu\/CVE-2016-0752",
|
||||
"owner": {
|
||||
"login": "dachidahu",
|
||||
"id": 1536032,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1536032?v=4",
|
||||
"html_url": "https:\/\/github.com\/dachidahu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dachidahu\/CVE-2016-0752",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-03-18T21:10:18Z",
|
||||
"updated_at": "2016-03-18T21:45:54Z",
|
||||
"pushed_at": "2016-03-21T05:02:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 58514622,
|
||||
"name": "CVE-2016-0801",
|
||||
"full_name": "abdsec\/CVE-2016-0801",
|
||||
"owner": {
|
||||
"login": "abdsec",
|
||||
"id": 19299068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19299068?v=4",
|
||||
"html_url": "https:\/\/github.com\/abdsec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/abdsec\/CVE-2016-0801",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-05-11T04:36:45Z",
|
||||
"updated_at": "2020-04-02T08:01:43Z",
|
||||
"pushed_at": "2016-05-13T11:36:17Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 58843093,
|
||||
"name": "CVE-2016-0801-test",
|
||||
"full_name": "zsaurus\/CVE-2016-0801-test",
|
||||
"owner": {
|
||||
"login": "zsaurus",
|
||||
"id": 18712335,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18712335?v=4",
|
||||
"html_url": "https:\/\/github.com\/zsaurus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zsaurus\/CVE-2016-0801-test",
|
||||
"description": "Test modified buggy poc",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-15T03:55:27Z",
|
||||
"updated_at": "2016-05-15T04:16:15Z",
|
||||
"pushed_at": "2016-05-15T04:16:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 55565130,
|
||||
"name": "cve-2016-0805",
|
||||
"full_name": "hulovebin\/cve-2016-0805",
|
||||
"owner": {
|
||||
"login": "hulovebin",
|
||||
"id": 9494192,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9494192?v=4",
|
||||
"html_url": "https:\/\/github.com\/hulovebin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hulovebin\/cve-2016-0805",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-04-06T00:59:43Z",
|
||||
"updated_at": "2016-04-06T00:59:43Z",
|
||||
"pushed_at": "2016-04-06T00:59:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 55751787,
|
||||
"name": "CVE-2016-0846",
|
||||
"full_name": "secmob\/CVE-2016-0846",
|
||||
"owner": {
|
||||
"login": "secmob",
|
||||
"id": 8598783,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8598783?v=4",
|
||||
"html_url": "https:\/\/github.com\/secmob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/secmob\/CVE-2016-0846",
|
||||
"description": "arbitrary memory read\/write by IMemroy OOB",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-08T05:09:15Z",
|
||||
"updated_at": "2020-07-06T09:29:55Z",
|
||||
"pushed_at": "2016-04-08T05:34:58Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 56596683,
|
||||
"name": "CVE-2016-0846-PoC",
|
||||
"full_name": "b0b0505\/CVE-2016-0846-PoC",
|
||||
"owner": {
|
||||
"login": "b0b0505",
|
||||
"id": 6748041,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6748041?v=4",
|
||||
"html_url": "https:\/\/github.com\/b0b0505"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b0b0505\/CVE-2016-0846-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-04-19T12:56:44Z",
|
||||
"updated_at": "2016-04-27T18:05:22Z",
|
||||
"pushed_at": "2016-04-19T13:01:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 51731718,
|
||||
"name": "killasa",
|
||||
"full_name": "jgajek\/killasa",
|
||||
"owner": {
|
||||
"login": "jgajek",
|
||||
"id": 7495374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7495374?v=4",
|
||||
"html_url": "https:\/\/github.com\/jgajek"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jgajek\/killasa",
|
||||
"description": "CVE-2016-1287 vulnerability test",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-15T04:56:15Z",
|
||||
"updated_at": "2020-04-08T00:19:21Z",
|
||||
"pushed_at": "2016-02-15T04:59:43Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 67734857,
|
||||
"name": "asa_tools",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 60321010,
|
||||
"name": "CVE-2016-1734",
|
||||
"full_name": "Manouchehri\/CVE-2016-1734",
|
||||
"owner": {
|
||||
"login": "Manouchehri",
|
||||
"id": 7232674,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7232674?v=4",
|
||||
"html_url": "https:\/\/github.com\/Manouchehri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Manouchehri\/CVE-2016-1734",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-06-03T05:37:06Z",
|
||||
"updated_at": "2016-06-03T05:46:01Z",
|
||||
"pushed_at": "2016-06-03T05:54:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 57211701,
|
||||
"name": "mach_race",
|
||||
"full_name": "gdbinit\/mach_race",
|
||||
"owner": {
|
||||
"login": "gdbinit",
|
||||
"id": 859134,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/859134?v=4",
|
||||
"html_url": "https:\/\/github.com\/gdbinit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gdbinit\/mach_race",
|
||||
"description": "Exploit code for CVE-2016-1757",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-27T12:29:28Z",
|
||||
"updated_at": "2020-09-18T10:32:08Z",
|
||||
"pushed_at": "2016-04-27T14:07:43Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 55790687,
|
||||
"name": "cve-2016-1764",
|
||||
"full_name": "moloch--\/cve-2016-1764",
|
||||
"owner": {
|
||||
"login": "moloch--",
|
||||
"id": 875022,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/875022?v=4",
|
||||
"html_url": "https:\/\/github.com\/moloch--"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/moloch--\/cve-2016-1764",
|
||||
"description": "Extraction of iMessage Data via XSS",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-08T15:45:44Z",
|
||||
"updated_at": "2021-01-18T22:56:44Z",
|
||||
"pushed_at": "2016-04-08T23:00:58Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 59079925,
|
||||
"name": "rootsh",
|
||||
"full_name": "bazad\/rootsh",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/rootsh",
|
||||
"description": "Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-18T03:49:02Z",
|
||||
"updated_at": "2020-06-19T20:05:43Z",
|
||||
"pushed_at": "2016-05-18T03:53:42Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 52896981,
|
||||
"name": "dh-CVE_2016_2098",
|
||||
"full_name": "hderms\/dh-CVE_2016_2098",
|
||||
"owner": {
|
||||
"login": "hderms",
|
||||
"id": 833575,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/833575?v=4",
|
||||
"html_url": "https:\/\/github.com\/hderms"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hderms\/dh-CVE_2016_2098",
|
||||
"description": "Proof of concept showing how CVE-2016-2098 leads to remote code execution",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-01T17:45:29Z",
|
||||
"updated_at": "2020-06-06T02:45:09Z",
|
||||
"pushed_at": "2016-03-01T17:45:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 60613259,
|
||||
"name": "PoC_CVE-2016-2098_Rails42",
|
||||
"full_name": "CyberDefenseInstitute\/PoC_CVE-2016-2098_Rails42",
|
||||
"owner": {
|
||||
"login": "CyberDefenseInstitute",
|
||||
"id": 13356356,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13356356?v=4",
|
||||
"html_url": "https:\/\/github.com\/CyberDefenseInstitute"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CyberDefenseInstitute\/PoC_CVE-2016-2098_Rails42",
|
||||
"description": "A PoC of CVE-2016-2098 (rails4.2.5.1 \/ view render)",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-07T12:59:31Z",
|
||||
"updated_at": "2019-08-26T16:39:44Z",
|
||||
"pushed_at": "2016-06-07T13:15:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 80069309,
|
||||
"name": "rails-PoC-CVE-2016-2098",
|
||||
|
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 56,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 60787819,
|
||||
"name": "docker-cve-2016-2107",
|
||||
"full_name": "tmiklas\/docker-cve-2016-2107",
|
||||
"owner": {
|
||||
"login": "tmiklas",
|
||||
"id": 230130,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/230130?v=4",
|
||||
"html_url": "https:\/\/github.com\/tmiklas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tmiklas\/docker-cve-2016-2107",
|
||||
"description": "Docker container implementing tests for CVE-2016-2107 - LuckyNegative20",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-09T16:01:03Z",
|
||||
"updated_at": "2016-08-25T09:57:07Z",
|
||||
"pushed_at": "2016-06-10T20:18:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 56461631,
|
||||
"name": "cfengine-CVE-2016-2118",
|
||||
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
|
||||
"owner": {
|
||||
"login": "nickanderson",
|
||||
"id": 202896,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickanderson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
|
||||
"description": "An example detection and remediation policy.",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-17T22:22:04Z",
|
||||
"updated_at": "2016-04-18T02:57:44Z",
|
||||
"pushed_at": "2016-04-19T14:24:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 54332427,
|
||||
"name": "cert-pinning-flaw-poc",
|
||||
"full_name": "ikoz\/cert-pinning-flaw-poc",
|
||||
"owner": {
|
||||
"login": "ikoz",
|
||||
"id": 9115937,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9115937?v=4",
|
||||
"html_url": "https:\/\/github.com\/ikoz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ikoz\/cert-pinning-flaw-poc",
|
||||
"description": "Simple script for testing CVE-2016-2402 and similar flaws",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-20T18:04:40Z",
|
||||
"updated_at": "2019-05-15T08:00:43Z",
|
||||
"pushed_at": "2016-03-30T23:37:07Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 55105611,
|
||||
"name": "certPinningVulnerableOkHttp",
|
||||
"full_name": "ikoz\/certPinningVulnerableOkHttp",
|
||||
"owner": {
|
||||
"login": "ikoz",
|
||||
"id": 9115937,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9115937?v=4",
|
||||
"html_url": "https:\/\/github.com\/ikoz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ikoz\/certPinningVulnerableOkHttp",
|
||||
"description": "OkHttp sample app vulnerable to CVE-2016-2402",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-30T23:45:06Z",
|
||||
"updated_at": "2018-11-30T02:52:33Z",
|
||||
"pushed_at": "2016-03-31T00:15:36Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 61202493,
|
||||
"name": "cve-2016-2431",
|
||||
"full_name": "laginimaineb\/cve-2016-2431",
|
||||
"owner": {
|
||||
"login": "laginimaineb",
|
||||
"id": 11378334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11378334?v=4",
|
||||
"html_url": "https:\/\/github.com\/laginimaineb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/laginimaineb\/cve-2016-2431",
|
||||
"description": "Qualcomm TrustZone kernel privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-15T11:21:24Z",
|
||||
"updated_at": "2021-02-04T15:57:53Z",
|
||||
"pushed_at": "2016-06-15T11:27:42Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 62306972,
|
||||
"name": "ExtractKeyMaster",
|
||||
"full_name": "laginimaineb\/ExtractKeyMaster",
|
||||
"owner": {
|
||||
"login": "laginimaineb",
|
||||
"id": 11378334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11378334?v=4",
|
||||
"html_url": "https:\/\/github.com\/laginimaineb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/laginimaineb\/ExtractKeyMaster",
|
||||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2021-02-07T16:36:45Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 289,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 62629216,
|
||||
"name": "CVE-2016-2434",
|
||||
"full_name": "jianqiangzhao\/CVE-2016-2434",
|
||||
"owner": {
|
||||
"login": "jianqiangzhao",
|
||||
"id": 7478900,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7478900?v=4",
|
||||
"html_url": "https:\/\/github.com\/jianqiangzhao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jianqiangzhao\/CVE-2016-2434",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-07-05T10:46:34Z",
|
||||
"updated_at": "2021-02-05T08:17:45Z",
|
||||
"pushed_at": "2016-07-05T10:46:57Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 62454997,
|
||||
"name": "CVE-2016-2468",
|
||||
"full_name": "gitcollect\/CVE-2016-2468",
|
||||
"owner": {
|
||||
"login": "gitcollect",
|
||||
"id": 17906239,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17906239?v=4",
|
||||
"html_url": "https:\/\/github.com\/gitcollect"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gitcollect\/CVE-2016-2468",
|
||||
"description": "Buildable Poc of CVE-2016-2468 based on http:\/\/retme.net\/index.php\/2016\/06\/12\/CVE-2016-2468.html",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-02T14:37:31Z",
|
||||
"updated_at": "2018-03-01T18:02:03Z",
|
||||
"pushed_at": "2016-07-02T10:34:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 56758577,
|
||||
"name": "CVE-2016-3141",
|
||||
"full_name": "peternguyen93\/CVE-2016-3141",
|
||||
"owner": {
|
||||
"login": "peternguyen93",
|
||||
"id": 1802870,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
|
||||
"html_url": "https:\/\/github.com\/peternguyen93"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
|
||||
"description": "CVE-2016-3141",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-21T08:59:05Z",
|
||||
"updated_at": "2019-11-27T06:28:33Z",
|
||||
"pushed_at": "2016-04-23T15:55:01Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,119 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 58022817,
|
||||
"name": "imagick_secure_puppet",
|
||||
"full_name": "jackdpeterson\/imagick_secure_puppet",
|
||||
"owner": {
|
||||
"login": "jackdpeterson",
|
||||
"id": 938961,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/938961?v=4",
|
||||
"html_url": "https:\/\/github.com\/jackdpeterson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jackdpeterson\/imagick_secure_puppet",
|
||||
"description": "a puppet module in response to CVE-2016-3714",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-04T04:30:25Z",
|
||||
"updated_at": "2016-05-04T04:32:03Z",
|
||||
"pushed_at": "2016-05-04T04:42:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 58041137,
|
||||
"name": "CVE-2016-3714",
|
||||
"full_name": "tommiionfire\/CVE-2016-3714",
|
||||
"owner": {
|
||||
"login": "tommiionfire",
|
||||
"id": 12810700,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12810700?v=4",
|
||||
"html_url": "https:\/\/github.com\/tommiionfire"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tommiionfire\/CVE-2016-3714",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-05-04T09:47:42Z",
|
||||
"updated_at": "2016-05-04T09:52:14Z",
|
||||
"pushed_at": "2016-05-04T10:32:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 58125094,
|
||||
"name": "CVE-2016-3714.ansible.role",
|
||||
"full_name": "chusiang\/CVE-2016-3714.ansible.role",
|
||||
"owner": {
|
||||
"login": "chusiang",
|
||||
"id": 219066,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/219066?v=4",
|
||||
"html_url": "https:\/\/github.com\/chusiang"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chusiang\/CVE-2016-3714.ansible.role",
|
||||
"description": "Fix ImageMagick Command Injection (CVE-2016-3714) with Ansible.",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-05T11:05:20Z",
|
||||
"updated_at": "2017-06-09T22:21:33Z",
|
||||
"pushed_at": "2016-05-11T11:02:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 58151390,
|
||||
"name": "ImageTragick-CVE-2016-3714-RShell",
|
||||
"full_name": "jpeanut\/ImageTragick-CVE-2016-3714-RShell",
|
||||
"owner": {
|
||||
"login": "jpeanut",
|
||||
"id": 11488668,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11488668?v=4",
|
||||
"html_url": "https:\/\/github.com\/jpeanut"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jpeanut\/ImageTragick-CVE-2016-3714-RShell",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-05-05T18:16:52Z",
|
||||
"updated_at": "2020-03-13T15:17:07Z",
|
||||
"pushed_at": "2016-05-29T17:27:10Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 58256737,
|
||||
"name": "CVE-2016-3714",
|
||||
"full_name": "Hood3dRob1n\/CVE-2016-3714",
|
||||
"owner": {
|
||||
"login": "Hood3dRob1n",
|
||||
"id": 1881344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881344?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hood3dRob1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hood3dRob1n\/CVE-2016-3714",
|
||||
"description": "ImaegMagick Code Execution (CVE-2016-3714)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-07T08:21:27Z",
|
||||
"updated_at": "2020-12-06T05:49:20Z",
|
||||
"pushed_at": "2016-05-07T17:26:47Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160678045,
|
||||
"name": "CVE-2016-3714",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 55875332,
|
||||
"name": "dsa",
|
||||
"full_name": "alexmullins\/dsa",
|
||||
"owner": {
|
||||
"login": "alexmullins",
|
||||
"id": 174546,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174546?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexmullins"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexmullins\/dsa",
|
||||
"description": "Analysis of CVE-2016-3959 and a Proof of Concept Attack Against a Go SSH Server. ",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-10T01:35:27Z",
|
||||
"updated_at": "2017-04-14T00:56:30Z",
|
||||
"pushed_at": "2016-05-13T23:18:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 63547083,
|
||||
"name": "CVE-2016-3962-Exploit",
|
||||
"full_name": "securifera\/CVE-2016-3962-Exploit",
|
||||
"owner": {
|
||||
"login": "securifera",
|
||||
"id": 12126525,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4",
|
||||
"html_url": "https:\/\/github.com\/securifera"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/securifera\/CVE-2016-3962-Exploit",
|
||||
"description": "CVE-2016-3962-Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-17T18:43:56Z",
|
||||
"updated_at": "2020-03-30T03:53:30Z",
|
||||
"pushed_at": "2016-07-17T18:44:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 59642424,
|
||||
"name": "Magento-CVE-2016-4010",
|
||||
"full_name": "brianwrf\/Magento-CVE-2016-4010",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/Magento-CVE-2016-4010",
|
||||
"description": "Magento Unauthorized Remote Code Execution (CVE-2016-4010)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-25T07:52:28Z",
|
||||
"updated_at": "2020-02-28T07:57:59Z",
|
||||
"pushed_at": "2016-05-25T08:03:20Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 286494930,
|
||||
"name": "CVE-2016-4010",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 61267937,
|
||||
"name": "CVE-2016-4438",
|
||||
"full_name": "jason3e7\/CVE-2016-4438",
|
||||
"owner": {
|
||||
"login": "jason3e7",
|
||||
"id": 3059297,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3059297?v=4",
|
||||
"html_url": "https:\/\/github.com\/jason3e7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jason3e7\/CVE-2016-4438",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-06-16T06:28:55Z",
|
||||
"updated_at": "2020-06-29T01:15:05Z",
|
||||
"pushed_at": "2016-06-16T06:55:03Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158189798,
|
||||
"name": "CVE-2016-4438",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 63757542,
|
||||
"name": "tiffdisabler",
|
||||
"full_name": "hansnielsen\/tiffdisabler",
|
||||
"owner": {
|
||||
"login": "hansnielsen",
|
||||
"id": 1776705,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1776705?v=4",
|
||||
"html_url": "https:\/\/github.com\/hansnielsen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hansnielsen\/tiffdisabler",
|
||||
"description": "Disables ImageIO TIFF support to protect against CVE-2016-4631",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-20T06:47:07Z",
|
||||
"updated_at": "2018-09-18T00:11:49Z",
|
||||
"pushed_at": "2016-07-24T12:58:14Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 66186748,
|
||||
"name": "cve-2016-4845_csrf",
|
||||
"full_name": "kaito834\/cve-2016-4845_csrf",
|
||||
"owner": {
|
||||
"login": "kaito834",
|
||||
"id": 11486648,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11486648?v=4",
|
||||
"html_url": "https:\/\/github.com\/kaito834"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kaito834\/cve-2016-4845_csrf",
|
||||
"description": "Proof of concept for CSRF vulnerability(CVE-2016-4825) on IO-DATA Recording Hard Disc Drive",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-21T07:32:19Z",
|
||||
"updated_at": "2016-08-21T07:47:06Z",
|
||||
"pushed_at": "2016-08-21T07:47:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 61914641,
|
||||
"name": "CVE-2016-4971",
|
||||
"full_name": "BlueCocoa\/CVE-2016-4971",
|
||||
"owner": {
|
||||
"login": "BlueCocoa",
|
||||
"id": 5152503,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5152503?v=4",
|
||||
"html_url": "https:\/\/github.com\/BlueCocoa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BlueCocoa\/CVE-2016-4971",
|
||||
"description": "CVE-2016-4971 written in nodejs",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-24T21:59:33Z",
|
||||
"updated_at": "2020-12-29T19:59:22Z",
|
||||
"pushed_at": "2016-06-24T22:00:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 62455295,
|
||||
"name": "CVE-2016-4971",
|
||||
"full_name": "gitcollect\/CVE-2016-4971",
|
||||
"owner": {
|
||||
"login": "gitcollect",
|
||||
"id": 17906239,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17906239?v=4",
|
||||
"html_url": "https:\/\/github.com\/gitcollect"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gitcollect\/CVE-2016-4971",
|
||||
"description": "CVE-2016-4971 written in nodejs",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-02T14:44:48Z",
|
||||
"updated_at": "2020-06-28T13:56:59Z",
|
||||
"pushed_at": "2016-06-24T22:00:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 164228901,
|
||||
"name": "CVE-2016-4971",
|
||||
|
|
|
@ -1,96 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 66172446,
|
||||
"name": "mountain_goat",
|
||||
"full_name": "Gnoxter\/mountain_goat",
|
||||
"owner": {
|
||||
"login": "Gnoxter",
|
||||
"id": 974856,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/974856?v=4",
|
||||
"html_url": "https:\/\/github.com\/Gnoxter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Gnoxter\/mountain_goat",
|
||||
"description": "A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous ",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-20T23:28:41Z",
|
||||
"updated_at": "2020-11-21T15:56:22Z",
|
||||
"pushed_at": "2016-08-23T21:06:44Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 66173781,
|
||||
"name": "rover",
|
||||
"full_name": "violentshell\/rover",
|
||||
"owner": {
|
||||
"login": "violentshell",
|
||||
"id": 21149221,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21149221?v=4",
|
||||
"html_url": "https:\/\/github.com\/violentshell"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/violentshell\/rover",
|
||||
"description": "Proof of Concept code for CVE-2016-5696",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-21T00:17:20Z",
|
||||
"updated_at": "2020-12-01T03:07:29Z",
|
||||
"pushed_at": "2016-08-24T07:56:39Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 66317906,
|
||||
"name": "challack",
|
||||
"full_name": "jduck\/challack",
|
||||
"owner": {
|
||||
"login": "jduck",
|
||||
"id": 479840,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/479840?v=4",
|
||||
"html_url": "https:\/\/github.com\/jduck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jduck\/challack",
|
||||
"description": "Proof-of-concept exploit code for CVE-2016-5696",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-23T00:21:18Z",
|
||||
"updated_at": "2020-04-07T07:09:32Z",
|
||||
"pushed_at": "2016-08-30T06:32:43Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 66661635,
|
||||
"name": "chackd",
|
||||
"full_name": "bplinux\/chackd",
|
||||
"owner": {
|
||||
"login": "bplinux",
|
||||
"id": 16133169,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16133169?v=4",
|
||||
"html_url": "https:\/\/github.com\/bplinux"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bplinux\/chackd",
|
||||
"description": "Daemon to randomize tcp_challenge_ack_limit to prevent side channel attacks CVE-2016-5696",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-26T16:11:03Z",
|
||||
"updated_at": "2020-10-18T04:17:12Z",
|
||||
"pushed_at": "2016-08-29T17:39:17Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 75864853,
|
||||
"name": "grill",
|
||||
|
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 61809606,
|
||||
"name": "CVE-2016-5699-poc",
|
||||
"full_name": "bunseokbot\/CVE-2016-5699-poc",
|
||||
"owner": {
|
||||
"login": "bunseokbot",
|
||||
"id": 5586218,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5586218?v=4",
|
||||
"html_url": "https:\/\/github.com\/bunseokbot"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bunseokbot\/CVE-2016-5699-poc",
|
||||
"description": "PoC code of CVE-2016-5699 Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-23T14:01:20Z",
|
||||
"updated_at": "2018-03-16T11:26:27Z",
|
||||
"pushed_at": "2016-06-28T05:22:55Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 66328457,
|
||||
"name": "cve-2016-5699-jinzheng-sha",
|
||||
"full_name": "shajinzheng\/cve-2016-5699-jinzheng-sha",
|
||||
"owner": {
|
||||
"login": "shajinzheng",
|
||||
"id": 5466900,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5466900?v=4",
|
||||
"html_url": "https:\/\/github.com\/shajinzheng"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shajinzheng\/cve-2016-5699-jinzheng-sha",
|
||||
"description": "Reading Course Report",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-23T03:06:22Z",
|
||||
"updated_at": "2016-08-27T11:22:40Z",
|
||||
"pushed_at": "2016-08-27T20:55:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 62878044,
|
||||
"name": "CVE-2016-5734",
|
||||
"full_name": "KosukeShimofuji\/CVE-2016-5734",
|
||||
"owner": {
|
||||
"login": "KosukeShimofuji",
|
||||
"id": 19923520,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19923520?v=4",
|
||||
"html_url": "https:\/\/github.com\/KosukeShimofuji"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KosukeShimofuji\/CVE-2016-5734",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-07-08T09:43:26Z",
|
||||
"updated_at": "2016-07-14T01:18:48Z",
|
||||
"pushed_at": "2016-07-20T02:59:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 266001258,
|
||||
"name": "phpmyadmin4.4_cve-2016-5734",
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 917,
|
||||
"watchers_count": 917,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 917,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2021-02-03T11:49:53Z",
|
||||
"updated_at": "2021-02-08T16:16:47Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 263,
|
||||
"watchers": 264,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "POC CVE-2018-14714",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-25T03:43:44Z",
|
||||
"updated_at": "2020-07-14T09:53:13Z",
|
||||
"pushed_at": "2020-04-26T09:57:34Z",
|
||||
"updated_at": "2021-02-08T19:59:22Z",
|
||||
"pushed_at": "2021-02-08T19:59:19Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 917,
|
||||
"watchers_count": 917,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 917,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T08:04:19Z",
|
||||
"updated_at": "2021-02-04T07:25:11Z",
|
||||
"updated_at": "2021-02-08T17:01:33Z",
|
||||
"pushed_at": "2018-08-28T08:06:21Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-04-24T16:32:22Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1029,8 +1029,8 @@
|
|||
"pushed_at": "2020-12-06T04:48:38Z",
|
||||
"stargazers_count": 1135,
|
||||
"watchers_count": 1135,
|
||||
"forks_count": 383,
|
||||
"forks": 383,
|
||||
"forks_count": 384,
|
||||
"forks": 384,
|
||||
"watchers": 1135,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2333,
|
||||
"watchers_count": 2333,
|
||||
"forks_count": 656,
|
||||
"forks": 656,
|
||||
"forks_count": 657,
|
||||
"forks": 657,
|
||||
"watchers": 2333,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 917,
|
||||
"watchers_count": 917,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 917,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-3992 & CVE-2019-5544",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T15:15:22Z",
|
||||
"updated_at": "2021-02-08T07:34:49Z",
|
||||
"updated_at": "2021-02-08T19:13:32Z",
|
||||
"pushed_at": "2021-02-05T06:40:50Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2019-8791 & CVE-2019-8792",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-17T18:49:54Z",
|
||||
"updated_at": "2021-01-17T18:53:37Z",
|
||||
"updated_at": "2021-02-08T20:54:29Z",
|
||||
"pushed_at": "2021-01-17T18:53:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1324,13 +1324,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2021-02-07T11:39:50Z",
|
||||
"updated_at": "2021-02-08T16:24:59Z",
|
||||
"pushed_at": "2021-01-15T19:21:25Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2333,
|
||||
"watchers_count": 2333,
|
||||
"forks_count": 656,
|
||||
"forks": 656,
|
||||
"forks_count": 657,
|
||||
"forks": 657,
|
||||
"watchers": 2333,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2021-02-07T13:43:54Z",
|
||||
"updated_at": "2021-02-08T18:07:59Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 172,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 917,
|
||||
"watchers_count": 917,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 917,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-3992 & CVE-2019-5544",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T15:15:22Z",
|
||||
"updated_at": "2021-02-08T07:34:49Z",
|
||||
"updated_at": "2021-02-08T19:13:32Z",
|
||||
"pushed_at": "2021-02-05T06:40:50Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-02-08T11:54:57Z",
|
||||
"updated_at": "2021-02-08T20:13:25Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 303,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-02-08T13:25:47Z",
|
||||
"updated_at": "2021-02-08T19:55:28Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 535,
|
||||
"watchers_count": 535,
|
||||
"stargazers_count": 536,
|
||||
"watchers_count": 536,
|
||||
"forks_count": 157,
|
||||
"forks": 157,
|
||||
"watchers": 535,
|
||||
"watchers": 536,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -634,13 +634,13 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-02-05T11:22:31Z",
|
||||
"updated_at": "2021-02-08T19:47:33Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -711,5 +711,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 337169035,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "0xDevil\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "0xDevil",
|
||||
"id": 52781556,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52781556?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xDevil"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xDevil\/CVE-2021-3156",
|
||||
"description": "CVE-2021-3156: Sudo exploit for Debain 10",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-08T18:21:58Z",
|
||||
"updated_at": "2021-02-08T20:35:33Z",
|
||||
"pushed_at": "2021-02-08T19:15:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
210
README.md
210
README.md
|
@ -109,6 +109,7 @@ Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalat
|
|||
- [perlun/sudo-1.8.3p1-patched](https://github.com/perlun/sudo-1.8.3p1-patched)
|
||||
- [1N53C/CVE-2021-3156-PoC](https://github.com/1N53C/CVE-2021-3156-PoC)
|
||||
- [Hello12112020/CVE-2021-3156](https://github.com/Hello12112020/CVE-2021-3156)
|
||||
- [0xDevil/CVE-2021-3156](https://github.com/0xDevil/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [Y3rbit4/CVE-2021-3157](https://github.com/Y3rbit4/CVE-2021-3157)
|
||||
|
@ -12796,7 +12797,6 @@ Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during de
|
|||
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."
|
||||
</code>
|
||||
|
||||
- [Rootkitsmm/cve-2016-0040](https://github.com/Rootkitsmm/cve-2016-0040)
|
||||
- [de7ec7ed/CVE-2016-0040](https://github.com/de7ec7ed/CVE-2016-0040)
|
||||
|
||||
### CVE-2016-0049 (2016-02-10)
|
||||
|
@ -12807,16 +12807,6 @@ Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Win
|
|||
|
||||
- [JackOfMostTrades/bluebox](https://github.com/JackOfMostTrades/bluebox)
|
||||
|
||||
### CVE-2016-0051 (2016-02-10)
|
||||
|
||||
<code>
|
||||
The WebDAV client in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "WebDAV Elevation of Privilege Vulnerability."
|
||||
</code>
|
||||
|
||||
- [koczkatamas/CVE-2016-0051](https://github.com/koczkatamas/CVE-2016-0051)
|
||||
- [hexx0r/CVE-2016-0051](https://github.com/hexx0r/CVE-2016-0051)
|
||||
- [ganrann/CVE-2016-0051](https://github.com/ganrann/CVE-2016-0051)
|
||||
|
||||
### CVE-2016-0095 (2016-03-09)
|
||||
|
||||
<code>
|
||||
|
@ -12836,15 +12826,6 @@ The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008
|
|||
### CVE-2016-010033
|
||||
- [zi0Black/CVE-2016-010033-010045](https://github.com/zi0Black/CVE-2016-010033-010045)
|
||||
|
||||
### CVE-2016-0189 (2016-05-10)
|
||||
|
||||
<code>
|
||||
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0187.
|
||||
</code>
|
||||
|
||||
- [theori-io/cve-2016-0189](https://github.com/theori-io/cve-2016-0189)
|
||||
- [deamwork/MS16-051-poc](https://github.com/deamwork/MS16-051-poc)
|
||||
|
||||
### CVE-2016-0199 (2016-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -12862,40 +12843,18 @@ Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusi
|
|||
- [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner)
|
||||
- [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln)
|
||||
|
||||
### CVE-2016-0701 (2016-02-14)
|
||||
|
||||
<code>
|
||||
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
|
||||
</code>
|
||||
|
||||
- [luanjampa/cve-2016-0701](https://github.com/luanjampa/cve-2016-0701)
|
||||
|
||||
### CVE-2016-0728 (2016-02-07)
|
||||
|
||||
<code>
|
||||
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
|
||||
</code>
|
||||
|
||||
- [idl3r/cve-2016-0728](https://github.com/idl3r/cve-2016-0728)
|
||||
- [kennetham/cve_2016_0728](https://github.com/kennetham/cve_2016_0728)
|
||||
- [nardholio/cve-2016-0728](https://github.com/nardholio/cve-2016-0728)
|
||||
- [googleweb/CVE-2016-0728](https://github.com/googleweb/CVE-2016-0728)
|
||||
- [neuschaefer/cve-2016-0728-testbed](https://github.com/neuschaefer/cve-2016-0728-testbed)
|
||||
- [bittorrent3389/cve-2016-0728](https://github.com/bittorrent3389/cve-2016-0728)
|
||||
- [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728)
|
||||
- [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728)
|
||||
- [sugarvillela/CVE](https://github.com/sugarvillela/CVE)
|
||||
- [th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit](https://github.com/th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit)
|
||||
|
||||
### CVE-2016-0752 (2016-02-15)
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
|
||||
</code>
|
||||
|
||||
- [forced-request/rails-rce-cve-2016-0752](https://github.com/forced-request/rails-rce-cve-2016-0752)
|
||||
- [dachidahu/CVE-2016-0752](https://github.com/dachidahu/CVE-2016-0752)
|
||||
|
||||
### CVE-2016-0792 (2016-04-07)
|
||||
|
||||
<code>
|
||||
|
@ -12921,32 +12880,6 @@ The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and
|
|||
|
||||
- [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan)
|
||||
|
||||
### CVE-2016-0801 (2016-02-06)
|
||||
|
||||
<code>
|
||||
The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49G, and 6.x before 2016-02-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets, aka internal bug 25662029.
|
||||
</code>
|
||||
|
||||
- [abdsec/CVE-2016-0801](https://github.com/abdsec/CVE-2016-0801)
|
||||
- [zsaurus/CVE-2016-0801-test](https://github.com/zsaurus/CVE-2016-0801-test)
|
||||
|
||||
### CVE-2016-0805 (2016-02-06)
|
||||
|
||||
<code>
|
||||
The performance event manager for Qualcomm ARM processors in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49G, and 6.x before 2016-02-01 allows attackers to gain privileges via a crafted application, aka internal bug 25773204.
|
||||
</code>
|
||||
|
||||
- [hulovebin/cve-2016-0805](https://github.com/hulovebin/cve-2016-0805)
|
||||
|
||||
### CVE-2016-0846 (2016-04-17)
|
||||
|
||||
<code>
|
||||
libs/binder/IMemory.cpp in the IMemory Native Interface in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not properly consider the heap size, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26877992.
|
||||
</code>
|
||||
|
||||
- [secmob/CVE-2016-0846](https://github.com/secmob/CVE-2016-0846)
|
||||
- [b0b0505/CVE-2016-0846-PoC](https://github.com/b0b0505/CVE-2016-0846-PoC)
|
||||
|
||||
### CVE-2016-0974 (2016-02-10)
|
||||
|
||||
<code>
|
||||
|
@ -12970,7 +12903,6 @@ The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8
|
|||
Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via crafted UDP packets, aka Bug IDs CSCux29978 and CSCux42019.
|
||||
</code>
|
||||
|
||||
- [jgajek/killasa](https://github.com/jgajek/killasa)
|
||||
- [NetSPI/asa_tools](https://github.com/NetSPI/asa_tools)
|
||||
|
||||
### CVE-2016-1494 (2016-01-13)
|
||||
|
@ -12998,30 +12930,6 @@ The RPC API in RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x
|
|||
|
||||
- [ide0x90/cve-2016-1555](https://github.com/ide0x90/cve-2016-1555)
|
||||
|
||||
### CVE-2016-1734 (2016-03-23)
|
||||
|
||||
<code>
|
||||
AppleUSBNetworking in Apple iOS before 9.3 and OS X before 10.11.4 allows physically proximate attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted USB device.
|
||||
</code>
|
||||
|
||||
- [Manouchehri/CVE-2016-1734](https://github.com/Manouchehri/CVE-2016-1734)
|
||||
|
||||
### CVE-2016-1757 (2016-03-23)
|
||||
|
||||
<code>
|
||||
Race condition in the kernel in Apple iOS before 9.3 and OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context via a crafted app.
|
||||
</code>
|
||||
|
||||
- [gdbinit/mach_race](https://github.com/gdbinit/mach_race)
|
||||
|
||||
### CVE-2016-1764 (2016-03-23)
|
||||
|
||||
<code>
|
||||
The Content Security Policy (CSP) implementation in Messages in Apple OS X before 10.11.4 allows remote attackers to obtain sensitive information via a javascript: URL.
|
||||
</code>
|
||||
|
||||
- [moloch--/cve-2016-1764](https://github.com/moloch--/cve-2016-1764)
|
||||
|
||||
### CVE-2016-1825 (2016-05-20)
|
||||
|
||||
<code>
|
||||
|
@ -13038,14 +12946,6 @@ The kernel in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, an
|
|||
|
||||
- [bazad/flow_divert-heap-overflow](https://github.com/bazad/flow_divert-heap-overflow)
|
||||
|
||||
### CVE-2016-1828 (2016-05-20)
|
||||
|
||||
<code>
|
||||
The kernel in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1827, CVE-2016-1829, and CVE-2016-1830.
|
||||
</code>
|
||||
|
||||
- [bazad/rootsh](https://github.com/bazad/rootsh)
|
||||
|
||||
### CVE-2016-2067 (2016-07-10)
|
||||
|
||||
<code>
|
||||
|
@ -13060,8 +12960,6 @@ drivers/gpu/msm/kgsl.c in the MSM graphics driver (aka GPU driver) for the Linux
|
|||
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
|
||||
</code>
|
||||
|
||||
- [hderms/dh-CVE_2016_2098](https://github.com/hderms/dh-CVE_2016_2098)
|
||||
- [CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42](https://github.com/CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42)
|
||||
- [Alejandro-MartinG/rails-PoC-CVE-2016-2098](https://github.com/Alejandro-MartinG/rails-PoC-CVE-2016-2098)
|
||||
- [0x00-0x00/CVE-2016-2098](https://github.com/0x00-0x00/CVE-2016-2098)
|
||||
- [its-arun/CVE-2016-2098](https://github.com/its-arun/CVE-2016-2098)
|
||||
|
@ -13075,15 +12973,6 @@ The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does
|
|||
</code>
|
||||
|
||||
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
|
||||
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
|
||||
|
||||
### CVE-2016-2118 (2016-04-12)
|
||||
|
||||
<code>
|
||||
The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
|
||||
</code>
|
||||
|
||||
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
|
||||
|
||||
### CVE-2016-2173 (2017-04-21)
|
||||
|
||||
|
@ -13117,40 +13006,6 @@ SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40
|
|||
|
||||
- [murataydemir/CVE-2016-2386](https://github.com/murataydemir/CVE-2016-2386)
|
||||
|
||||
### CVE-2016-2402 (2017-01-30)
|
||||
|
||||
<code>
|
||||
OkHttp before 2.7.4 and 3.x before 3.1.2 allows man-in-the-middle attackers to bypass certificate pinning by sending a certificate chain with a certificate from a non-pinned trusted CA and the pinned certificate.
|
||||
</code>
|
||||
|
||||
- [ikoz/cert-pinning-flaw-poc](https://github.com/ikoz/cert-pinning-flaw-poc)
|
||||
- [ikoz/certPinningVulnerableOkHttp](https://github.com/ikoz/certPinningVulnerableOkHttp)
|
||||
|
||||
### CVE-2016-2431 (2016-05-09)
|
||||
|
||||
<code>
|
||||
The Qualcomm TrustZone component in Android before 2016-05-01 on Nexus 5, Nexus 6, Nexus 7 (2013), and Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 24968809.
|
||||
</code>
|
||||
|
||||
- [laginimaineb/cve-2016-2431](https://github.com/laginimaineb/cve-2016-2431)
|
||||
- [laginimaineb/ExtractKeyMaster](https://github.com/laginimaineb/ExtractKeyMaster)
|
||||
|
||||
### CVE-2016-2434 (2016-05-09)
|
||||
|
||||
<code>
|
||||
The NVIDIA video driver in Android before 2016-05-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27251090.
|
||||
</code>
|
||||
|
||||
- [jianqiangzhao/CVE-2016-2434](https://github.com/jianqiangzhao/CVE-2016-2434)
|
||||
|
||||
### CVE-2016-2468 (2016-06-12)
|
||||
|
||||
<code>
|
||||
The Qualcomm GPU driver in Android before 2016-06-01 on Nexus 5, 5X, 6, 6P, and 7 devices allows attackers to gain privileges via a crafted application, aka internal bug 27475454.
|
||||
</code>
|
||||
|
||||
- [gitcollect/CVE-2016-2468](https://github.com/gitcollect/CVE-2016-2468)
|
||||
|
||||
### CVE-2016-2555 (2017-04-13)
|
||||
|
||||
<code>
|
||||
|
@ -13201,14 +13056,6 @@ Cross-site scripting (XSS) vulnerability in ovirt-engine allows remote attackers
|
|||
|
||||
- [0xEmanuel/CVE-2016-3113](https://github.com/0xEmanuel/CVE-2016-3113)
|
||||
|
||||
### CVE-2016-3141 (2016-03-31)
|
||||
|
||||
<code>
|
||||
Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
|
||||
</code>
|
||||
|
||||
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
|
||||
|
||||
### CVE-2016-3238 (2016-07-12)
|
||||
|
||||
<code>
|
||||
|
@ -13239,11 +13086,6 @@ The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2
|
|||
The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
|
||||
</code>
|
||||
|
||||
- [jackdpeterson/imagick_secure_puppet](https://github.com/jackdpeterson/imagick_secure_puppet)
|
||||
- [tommiionfire/CVE-2016-3714](https://github.com/tommiionfire/CVE-2016-3714)
|
||||
- [chusiang/CVE-2016-3714.ansible.role](https://github.com/chusiang/CVE-2016-3714.ansible.role)
|
||||
- [jpeanut/ImageTragick-CVE-2016-3714-RShell](https://github.com/jpeanut/ImageTragick-CVE-2016-3714-RShell)
|
||||
- [Hood3dRob1n/CVE-2016-3714](https://github.com/Hood3dRob1n/CVE-2016-3714)
|
||||
- [HRSkraps/CVE-2016-3714](https://github.com/HRSkraps/CVE-2016-3714)
|
||||
|
||||
### CVE-2016-3749 (2016-07-10)
|
||||
|
@ -13270,29 +13112,12 @@ The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.l
|
|||
|
||||
- [sj/web2py-e94946d-CVE-2016-3957](https://github.com/sj/web2py-e94946d-CVE-2016-3957)
|
||||
|
||||
### CVE-2016-3959 (2016-05-23)
|
||||
|
||||
<code>
|
||||
The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
|
||||
</code>
|
||||
|
||||
- [alexmullins/dsa](https://github.com/alexmullins/dsa)
|
||||
|
||||
### CVE-2016-3962 (2016-07-03)
|
||||
|
||||
<code>
|
||||
Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.
|
||||
</code>
|
||||
|
||||
- [securifera/CVE-2016-3962-Exploit](https://github.com/securifera/CVE-2016-3962-Exploit)
|
||||
|
||||
### CVE-2016-4010 (2017-01-23)
|
||||
|
||||
<code>
|
||||
Magento CE and EE before 2.0.6 allows remote attackers to conduct PHP objection injection attacks and execute arbitrary PHP code via crafted serialized shopping cart data.
|
||||
</code>
|
||||
|
||||
- [brianwrf/Magento-CVE-2016-4010](https://github.com/brianwrf/Magento-CVE-2016-4010)
|
||||
- [shadofren/CVE-2016-4010](https://github.com/shadofren/CVE-2016-4010)
|
||||
|
||||
### CVE-2016-4014 (2016-04-14)
|
||||
|
@ -13326,7 +13151,6 @@ Apache Shiro before 1.2.5, when a cipher key has not been configured for the &qu
|
|||
The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
|
||||
</code>
|
||||
|
||||
- [jason3e7/CVE-2016-4438](https://github.com/jason3e7/CVE-2016-4438)
|
||||
- [tafamace/CVE-2016-4438](https://github.com/tafamace/CVE-2016-4438)
|
||||
|
||||
### CVE-2016-4463 (2016-07-08)
|
||||
|
@ -13354,14 +13178,6 @@ WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 all
|
|||
- [saelo/jscpwn](https://github.com/saelo/jscpwn)
|
||||
- [hdbreaker/WebKit-CVE-2016-4622](https://github.com/hdbreaker/WebKit-CVE-2016-4622)
|
||||
|
||||
### CVE-2016-4631 (2016-07-21)
|
||||
|
||||
<code>
|
||||
ImageIO in Apple iOS before 9.3.3, OS X before 10.11.6, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TIFF file.
|
||||
</code>
|
||||
|
||||
- [hansnielsen/tiffdisabler](https://github.com/hansnielsen/tiffdisabler)
|
||||
|
||||
### CVE-2016-4655 (2016-08-25)
|
||||
|
||||
<code>
|
||||
|
@ -13390,14 +13206,6 @@ An issue was discovered in certain Apple products. iOS before 10.1 is affected.
|
|||
|
||||
- [i-o-s/CVE-2016-4669](https://github.com/i-o-s/CVE-2016-4669)
|
||||
|
||||
### CVE-2016-4845 (2016-09-24)
|
||||
|
||||
<code>
|
||||
Cross-site request forgery (CSRF) vulnerability on I-O DATA DEVICE HVL-A2.0, HVL-A3.0, HVL-A4.0, HVL-AT1.0S, HVL-AT2.0, HVL-AT3.0, HVL-AT4.0, HVL-AT2.0A, HVL-AT3.0A, and HVL-AT4.0A devices with firmware before 2.04 allows remote attackers to hijack the authentication of arbitrary users for requests that delete content.
|
||||
</code>
|
||||
|
||||
- [kaito834/cve-2016-4845_csrf](https://github.com/kaito834/cve-2016-4845_csrf)
|
||||
|
||||
### CVE-2016-4861 (2017-02-16)
|
||||
|
||||
<code>
|
||||
|
@ -13412,8 +13220,6 @@ The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework befo
|
|||
GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
|
||||
</code>
|
||||
|
||||
- [BlueCocoa/CVE-2016-4971](https://github.com/BlueCocoa/CVE-2016-4971)
|
||||
- [gitcollect/CVE-2016-4971](https://github.com/gitcollect/CVE-2016-4971)
|
||||
- [mbadanoiu/CVE-2016-4971](https://github.com/mbadanoiu/CVE-2016-4971)
|
||||
- [dinidhu96/IT19013756_-CVE-2016-4971-](https://github.com/dinidhu96/IT19013756_-CVE-2016-4971-)
|
||||
|
||||
|
@ -13514,28 +13320,14 @@ Directory traversal vulnerability in cgi-bin/rftest.cgi on Crestron AirMedia AM-
|
|||
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
|
||||
</code>
|
||||
|
||||
- [Gnoxter/mountain_goat](https://github.com/Gnoxter/mountain_goat)
|
||||
- [violentshell/rover](https://github.com/violentshell/rover)
|
||||
- [jduck/challack](https://github.com/jduck/challack)
|
||||
- [bplinux/chackd](https://github.com/bplinux/chackd)
|
||||
- [nogoegst/grill](https://github.com/nogoegst/grill)
|
||||
|
||||
### CVE-2016-5699 (2016-09-02)
|
||||
|
||||
<code>
|
||||
CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
|
||||
</code>
|
||||
|
||||
- [bunseokbot/CVE-2016-5699-poc](https://github.com/bunseokbot/CVE-2016-5699-poc)
|
||||
- [shajinzheng/cve-2016-5699-jinzheng-sha](https://github.com/shajinzheng/cve-2016-5699-jinzheng-sha)
|
||||
|
||||
### CVE-2016-5734 (2016-07-02)
|
||||
|
||||
<code>
|
||||
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
|
||||
</code>
|
||||
|
||||
- [KosukeShimofuji/CVE-2016-5734](https://github.com/KosukeShimofuji/CVE-2016-5734)
|
||||
- [HKirito/phpmyadmin4.4_cve-2016-5734](https://github.com/HKirito/phpmyadmin4.4_cve-2016-5734)
|
||||
|
||||
### CVE-2016-6187 (2016-08-06)
|
||||
|
|
Loading…
Reference in a new issue