diff --git a/2006/CVE-2006-0187.json b/2006/CVE-2006-0187.json new file mode 100644 index 0000000000..a5accf747c --- /dev/null +++ b/2006/CVE-2006-0187.json @@ -0,0 +1,25 @@ +[ + { + "id": 312174046, + "name": "CVE-2006-0187", + "full_name": "j0ndoe\/CVE-2006-0187", + "owner": { + "login": "j0ndoe", + "id": 71747405, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/71747405?v=4", + "html_url": "https:\/\/github.com\/j0ndoe" + }, + "html_url": "https:\/\/github.com\/j0ndoe\/CVE-2006-0187", + "description": "Microsoft Visual Studio Exploit", + "fork": false, + "created_at": "2020-11-12T05:11:50Z", + "updated_at": "2020-11-12T05:23:47Z", + "pushed_at": "2020-11-12T05:21:03Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2006/CVE-2006-0450.json b/2006/CVE-2006-0450.json new file mode 100644 index 0000000000..db17c853c0 --- /dev/null +++ b/2006/CVE-2006-0450.json @@ -0,0 +1,25 @@ +[ + { + "id": 289235311, + "name": "CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities", + "full_name": "Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities", + "owner": { + "login": "Parcer0", + "id": 70012338, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/70012338?v=4", + "html_url": "https:\/\/github.com\/Parcer0" + }, + "html_url": "https:\/\/github.com\/Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities", + "description": "CVE-2006-0450. phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.", + "fork": false, + "created_at": "2020-08-21T09:50:57Z", + "updated_at": "2020-08-28T14:58:56Z", + "pushed_at": "2020-08-28T14:58:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2006/CVE-2006-3392.json b/2006/CVE-2006-3392.json new file mode 100644 index 0000000000..a22204d7bd --- /dev/null +++ b/2006/CVE-2006-3392.json @@ -0,0 +1,48 @@ +[ + { + "id": 276101400, + "name": "CVE-2006-3392", + "full_name": "Ziani52\/CVE-2006-3392", + "owner": { + "login": "Ziani52", + "id": 53442065, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53442065?v=4", + "html_url": "https:\/\/github.com\/Ziani52" + }, + "html_url": "https:\/\/github.com\/Ziani52\/CVE-2006-3392", + "description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)", + "fork": false, + "created_at": "2020-06-30T13:07:31Z", + "updated_at": "2020-08-05T16:17:06Z", + "pushed_at": "2020-06-30T22:21:46Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 293079568, + "name": "cve-2006-3392", + "full_name": "notclement\/cve-2006-3392", + "owner": { + "login": "notclement", + "id": 19283318, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19283318?v=4", + "html_url": "https:\/\/github.com\/notclement" + }, + "html_url": "https:\/\/github.com\/notclement\/cve-2006-3392", + "description": "Read arbitrary files for servers running Webmin before 1.290 and Usermin before 1.220.", + "fork": false, + "created_at": "2020-09-05T13:17:44Z", + "updated_at": "2020-09-05T13:22:15Z", + "pushed_at": "2020-09-05T13:22:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2006/CVE-2006-6184.json b/2006/CVE-2006-6184.json new file mode 100644 index 0000000000..2aba08a534 --- /dev/null +++ b/2006/CVE-2006-6184.json @@ -0,0 +1,48 @@ +[ + { + "id": 63907042, + "name": "cve-2006-6184", + "full_name": "shauntdergrigorian\/cve-2006-6184", + "owner": { + "login": "shauntdergrigorian", + "id": 7718028, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7718028?v=4", + "html_url": "https:\/\/github.com\/shauntdergrigorian" + }, + "html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184", + "description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.", + "fork": false, + "created_at": "2016-07-21T22:43:43Z", + "updated_at": "2020-11-03T22:12:05Z", + "pushed_at": "2020-11-03T22:12:03Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 11, + "forks": 11, + "watchers": 11, + "score": 0 + }, + { + "id": 205628184, + "name": "CVE-2006-6184", + "full_name": "b03902043\/CVE-2006-6184", + "owner": { + "login": "b03902043", + "id": 9023845, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9023845?v=4", + "html_url": "https:\/\/github.com\/b03902043" + }, + "html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184", + "description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184", + "fork": false, + "created_at": "2019-09-01T04:18:53Z", + "updated_at": "2019-09-01T04:23:25Z", + "pushed_at": "2019-09-01T04:23:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-10033.json b/2016/CVE-2016-10033.json index 5db9248faa..9a65a9e79c 100644 --- a/2016/CVE-2016-10033.json +++ b/2016/CVE-2016-10033.json @@ -13,13 +13,13 @@ "description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2016-12-26T13:39:03Z", - "updated_at": "2020-11-04T13:57:23Z", + "updated_at": "2020-11-15T01:33:51Z", "pushed_at": "2019-10-13T12:23:02Z", - "stargazers_count": 352, - "watchers_count": 352, + "stargazers_count": 351, + "watchers_count": 351, "forks_count": 135, "forks": 135, - "watchers": 352, + "watchers": 351, "score": 0 }, { diff --git a/2017/CVE-2017-0038.json b/2017/CVE-2017-0038.json deleted file mode 100644 index aff487d412..0000000000 --- a/2017/CVE-2017-0038.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 85834314, - "name": "CVE-2017-0038-EXP-C-JS", - "full_name": "k0keoyo\/CVE-2017-0038-EXP-C-JS", - "owner": { - "login": "k0keoyo", - "id": 13257929, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13257929?v=4", - "html_url": "https:\/\/github.com\/k0keoyo" - }, - "html_url": "https:\/\/github.com\/k0keoyo\/CVE-2017-0038-EXP-C-JS", - "description": null, - "fork": false, - "created_at": "2017-03-22T13:59:48Z", - "updated_at": "2019-09-13T11:40:59Z", - "pushed_at": "2017-03-23T14:07:37Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 8, - "forks": 8, - "watchers": 6, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-0065.json b/2017/CVE-2017-0065.json deleted file mode 100644 index 318519d2a2..0000000000 --- a/2017/CVE-2017-0065.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 85072866, - "name": "cve-2017-0065", - "full_name": "Dankirk\/cve-2017-0065", - "owner": { - "login": "Dankirk", - "id": 10588760, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10588760?v=4", - "html_url": "https:\/\/github.com\/Dankirk" - }, - "html_url": "https:\/\/github.com\/Dankirk\/cve-2017-0065", - "description": "Exploiting Edge's read:\/\/ urlhandler", - "fork": false, - "created_at": "2017-03-15T13:01:29Z", - "updated_at": "2019-10-26T13:38:33Z", - "pushed_at": "2020-10-01T04:14:25Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 15, - "forks": 15, - "watchers": 15, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-0106.json b/2017/CVE-2017-0106.json deleted file mode 100644 index 54ea8d497c..0000000000 --- a/2017/CVE-2017-0106.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 88117539, - "name": "CVE-2017-0106", - "full_name": "ryhanson\/CVE-2017-0106", - "owner": { - "login": "ryhanson", - "id": 3486433, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4", - "html_url": "https:\/\/github.com\/ryhanson" - }, - "html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0106", - "description": null, - "fork": false, - "created_at": "2017-04-13T02:42:08Z", - "updated_at": "2017-04-13T02:42:08Z", - "pushed_at": "2017-04-13T02:42:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-0108.json b/2017/CVE-2017-0108.json deleted file mode 100644 index 8c1c66ead4..0000000000 --- a/2017/CVE-2017-0108.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 88317204, - "name": "CVE-2017-0108", - "full_name": "homjxi0e\/CVE-2017-0108", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-0108", - "description": null, - "fork": false, - "created_at": "2017-04-15T02:10:16Z", - "updated_at": "2017-12-04T20:08:18Z", - "pushed_at": "2017-04-15T02:16:09Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, - "forks": 2, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-0143.json b/2017/CVE-2017-0143.json index 9720c465a1..e8c4df551e 100644 --- a/2017/CVE-2017-0143.json +++ b/2017/CVE-2017-0143.json @@ -1,27 +1,4 @@ [ - { - "id": 91496993, - "name": "wannafind", - "full_name": "valarauco\/wannafind", - "owner": { - "login": "valarauco", - "id": 434898, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/434898?v=4", - "html_url": "https:\/\/github.com\/valarauco" - }, - "html_url": "https:\/\/github.com\/valarauco\/wannafind", - "description": "Simple script using nmap to detect CVE-2017-0143 MS17-010 in your network", - "fork": false, - "created_at": "2017-05-16T19:34:38Z", - "updated_at": "2017-12-06T14:25:10Z", - "pushed_at": "2017-05-26T17:28:09Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, { "id": 301944849, "name": "Etern-blue-Windows-7-Checker", diff --git a/2017/CVE-2017-0145.json b/2017/CVE-2017-0145.json deleted file mode 100644 index d13fa5253f..0000000000 --- a/2017/CVE-2017-0145.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 91811261, - "name": "chef_tissues", - "full_name": "MelonSmasher\/chef_tissues", - "owner": { - "login": "MelonSmasher", - "id": 1491053, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1491053?v=4", - "html_url": "https:\/\/github.com\/MelonSmasher" - }, - "html_url": "https:\/\/github.com\/MelonSmasher\/chef_tissues", - "description": "Install patch for CVE-2017-0145 AKA WannaCry.", - "fork": false, - "created_at": "2017-05-19T13:55:06Z", - "updated_at": "2018-04-04T01:07:21Z", - "pushed_at": "2017-05-19T16:49:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index 101298d3fd..31356cc023 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -1,50 +1,4 @@ [ - { - "id": 88117490, - "name": "CVE-2017-0199", - "full_name": "ryhanson\/CVE-2017-0199", - "owner": { - "login": "ryhanson", - "id": 3486433, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4", - "html_url": "https:\/\/github.com\/ryhanson" - }, - "html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0199", - "description": null, - "fork": false, - "created_at": "2017-04-13T02:41:36Z", - "updated_at": "2017-04-13T02:41:36Z", - "pushed_at": "2017-04-13T02:41:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 88185964, - "name": "cve-2017-0199", - "full_name": "SyFi\/cve-2017-0199", - "owner": { - "login": "SyFi", - "id": 26314806, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4", - "html_url": "https:\/\/github.com\/SyFi" - }, - "html_url": "https:\/\/github.com\/SyFi\/cve-2017-0199", - "description": null, - "fork": false, - "created_at": "2017-04-13T16:40:27Z", - "updated_at": "2019-12-06T00:55:16Z", - "pushed_at": "2017-04-13T16:45:10Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 7, - "forks": 7, - "watchers": 12, - "score": 0 - }, { "id": 88486475, "name": "CVE-2017-0199", @@ -68,213 +22,6 @@ "watchers": 633, "score": 0 }, - { - "id": 88590374, - "name": "CVE-2017-0199-Fix", - "full_name": "NotAwful\/CVE-2017-0199-Fix", - "owner": { - "login": "NotAwful", - "id": 25178947, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25178947?v=4", - "html_url": "https:\/\/github.com\/NotAwful" - }, - "html_url": "https:\/\/github.com\/NotAwful\/CVE-2017-0199-Fix", - "description": "Quick and dirty fix to OLE2 executing code via .hta", - "fork": false, - "created_at": "2017-04-18T06:33:45Z", - "updated_at": "2018-03-18T10:23:47Z", - "pushed_at": "2017-04-24T20:48:36Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 1, - "forks": 1, - "watchers": 14, - "score": 0 - }, - { - "id": 88700030, - "name": "CVE-2017-0199-master", - "full_name": "haibara3839\/CVE-2017-0199-master", - "owner": { - "login": "haibara3839", - "id": 17246565, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17246565?v=4", - "html_url": "https:\/\/github.com\/haibara3839" - }, - "html_url": "https:\/\/github.com\/haibara3839\/CVE-2017-0199-master", - "description": "CVE-2017-0199", - "fork": false, - "created_at": "2017-04-19T04:15:54Z", - "updated_at": "2020-08-13T13:59:18Z", - "pushed_at": "2017-04-19T04:25:47Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 11, - "forks": 11, - "watchers": 16, - "score": 0 - }, - { - "id": 89043209, - "name": "CVE-2017-0199", - "full_name": "Exploit-install\/CVE-2017-0199", - "owner": { - "login": "Exploit-install", - "id": 13824191, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/13824191?v=4", - "html_url": "https:\/\/github.com\/Exploit-install" - }, - "html_url": "https:\/\/github.com\/Exploit-install\/CVE-2017-0199", - "description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.", - "fork": false, - "created_at": "2017-04-22T04:01:38Z", - "updated_at": "2020-04-07T06:30:43Z", - "pushed_at": "2017-04-22T04:01:54Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 11, - "forks": 11, - "watchers": 7, - "score": 0 - }, - { - "id": 89065031, - "name": "PoC-CVE-2017-0199", - "full_name": "zakybstrd21215\/PoC-CVE-2017-0199", - "owner": { - "login": "zakybstrd21215", - "id": 22362343, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4", - "html_url": "https:\/\/github.com\/zakybstrd21215" - }, - "html_url": "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-0199", - "description": "Exploit toolkit for vulnerability RCE Microsoft RTF", - "fork": false, - "created_at": "2017-04-22T11:32:39Z", - "updated_at": "2019-02-02T15:31:28Z", - "pushed_at": "2017-04-22T11:35:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 89145802, - "name": "CVE-2017-0199", - "full_name": "n1shant-sinha\/CVE-2017-0199", - "owner": { - "login": "n1shant-sinha", - "id": 8848453, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8848453?v=4", - "html_url": "https:\/\/github.com\/n1shant-sinha" - }, - "html_url": "https:\/\/github.com\/n1shant-sinha\/CVE-2017-0199", - "description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter payload to victim without any complex configuration.", - "fork": false, - "created_at": "2017-04-23T13:58:30Z", - "updated_at": "2018-10-18T14:32:17Z", - "pushed_at": "2017-04-23T14:05:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 89296859, - "name": "htattack", - "full_name": "kn0wm4d\/htattack", - "owner": { - "login": "kn0wm4d", - "id": 15344287, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15344287?v=4", - "html_url": "https:\/\/github.com\/kn0wm4d" - }, - "html_url": "https:\/\/github.com\/kn0wm4d\/htattack", - "description": "An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)", - "fork": false, - "created_at": "2017-04-24T23:44:31Z", - "updated_at": "2020-08-29T04:54:33Z", - "pushed_at": "2017-04-24T23:45:18Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 3, - "forks": 3, - "watchers": 4, - "score": 0 - }, - { - "id": 89314149, - "name": "Cve-2017-0199", - "full_name": "joke998\/Cve-2017-0199", - "owner": { - "login": "joke998", - "id": 25948923, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4", - "html_url": "https:\/\/github.com\/joke998" - }, - "html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199", - "description": null, - "fork": false, - "created_at": "2017-04-25T03:38:15Z", - "updated_at": "2017-04-25T03:38:15Z", - "pushed_at": "2017-04-25T03:38:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 89314954, - "name": "Cve-2017-0199-", - "full_name": "joke998\/Cve-2017-0199-", - "owner": { - "login": "joke998", - "id": 25948923, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4", - "html_url": "https:\/\/github.com\/joke998" - }, - "html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199-", - "description": "Cve-2017-0199", - "fork": false, - "created_at": "2017-04-25T03:48:53Z", - "updated_at": "2017-04-25T03:48:53Z", - "pushed_at": "2017-04-25T03:48:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 95870771, - "name": "Microsoft-Word-CVE-2017-0199-", - "full_name": "sUbc0ol\/Microsoft-Word-CVE-2017-0199-", - "owner": { - "login": "sUbc0ol", - "id": 24601456, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4", - "html_url": "https:\/\/github.com\/sUbc0ol" - }, - "html_url": "https:\/\/github.com\/sUbc0ol\/Microsoft-Word-CVE-2017-0199-", - "description": null, - "fork": false, - "created_at": "2017-06-30T09:08:40Z", - "updated_at": "2020-03-26T07:51:03Z", - "pushed_at": "2017-06-30T09:11:27Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - }, { "id": 104072875, "name": "CVE-2017-0199", diff --git a/2017/CVE-2017-0204.json b/2017/CVE-2017-0204.json deleted file mode 100644 index d6031649dd..0000000000 --- a/2017/CVE-2017-0204.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 88117558, - "name": "CVE-2017-0204", - "full_name": "ryhanson\/CVE-2017-0204", - "owner": { - "login": "ryhanson", - "id": 3486433, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4", - "html_url": "https:\/\/github.com\/ryhanson" - }, - "html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0204", - "description": null, - "fork": false, - "created_at": "2017-04-13T02:42:24Z", - "updated_at": "2017-04-13T03:12:29Z", - "pushed_at": "2017-04-13T02:42:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-0213.json b/2017/CVE-2017-0213.json index a587c303a8..7f8f98c428 100644 --- a/2017/CVE-2017-0213.json +++ b/2017/CVE-2017-0213.json @@ -1,50 +1,4 @@ [ - { - "id": 95809289, - "name": "CVE-2017-0213-", - "full_name": "shaheemirza\/CVE-2017-0213-", - "owner": { - "login": "shaheemirza", - "id": 4853436, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4853436?v=4", - "html_url": "https:\/\/github.com\/shaheemirza" - }, - "html_url": "https:\/\/github.com\/shaheemirza\/CVE-2017-0213-", - "description": null, - "fork": false, - "created_at": "2017-06-29T18:49:44Z", - "updated_at": "2020-03-29T00:05:56Z", - "pushed_at": "2017-06-07T17:09:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 95974378, - "name": "CVE-2017-0213", - "full_name": "zcgonvh\/CVE-2017-0213", - "owner": { - "login": "zcgonvh", - "id": 25787677, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4", - "html_url": "https:\/\/github.com\/zcgonvh" - }, - "html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213", - "description": "CVE-2017-0213 for command line", - "fork": false, - "created_at": "2017-07-01T16:07:04Z", - "updated_at": "2020-10-21T22:15:15Z", - "pushed_at": "2017-07-01T16:19:12Z", - "stargazers_count": 55, - "watchers_count": 55, - "forks_count": 25, - "forks": 25, - "watchers": 55, - "score": 0 - }, { "id": 105444160, "name": "CVE-2017-0213", diff --git a/2017/CVE-2017-0290.json b/2017/CVE-2017-0290.json deleted file mode 100644 index 7c61c69cf8..0000000000 --- a/2017/CVE-2017-0290.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 90935850, - "name": "CVE-2017-0290-", - "full_name": "homjxi0e\/CVE-2017-0290-", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-0290-", - "description": null, - "fork": false, - "created_at": "2017-05-11T04:01:51Z", - "updated_at": "2017-05-11T04:01:51Z", - "pushed_at": "2017-05-11T05:24:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-0478.json b/2017/CVE-2017-0478.json index a420023ef6..01b1ed5429 100644 --- a/2017/CVE-2017-0478.json +++ b/2017/CVE-2017-0478.json @@ -1,27 +1,4 @@ [ - { - "id": 85445247, - "name": "CVE-2017-0478", - "full_name": "JiounDai\/CVE-2017-0478", - "owner": { - "login": "JiounDai", - "id": 4220640, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4220640?v=4", - "html_url": "https:\/\/github.com\/JiounDai" - }, - "html_url": "https:\/\/github.com\/JiounDai\/CVE-2017-0478", - "description": "poc of CVE-2017-0478", - "fork": false, - "created_at": "2017-03-19T02:18:37Z", - "updated_at": "2020-08-11T04:38:14Z", - "pushed_at": "2017-03-19T02:43:19Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 5, - "forks": 5, - "watchers": 7, - "score": 0 - }, { "id": 141312944, "name": "CVE-2017-0478", diff --git a/2017/CVE-2017-0541.json b/2017/CVE-2017-0541.json index 496585240f..85e70a6879 100644 --- a/2017/CVE-2017-0541.json +++ b/2017/CVE-2017-0541.json @@ -1,27 +1,4 @@ [ - { - "id": 87639690, - "name": "CVE-2017-0541", - "full_name": "JiounDai\/CVE-2017-0541", - "owner": { - "login": "JiounDai", - "id": 4220640, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4220640?v=4", - "html_url": "https:\/\/github.com\/JiounDai" - }, - "html_url": "https:\/\/github.com\/JiounDai\/CVE-2017-0541", - "description": "poc and vulnerability analysis of CVE-2017-0541", - "fork": false, - "created_at": "2017-04-08T14:28:22Z", - "updated_at": "2018-11-26T08:18:04Z", - "pushed_at": "2017-04-08T14:45:44Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 11, - "forks": 11, - "watchers": 19, - "score": 0 - }, { "id": 141312906, "name": "CVE-2017-0541", diff --git a/2017/CVE-2017-1000000.json b/2017/CVE-2017-1000000.json deleted file mode 100644 index ff74bdb86a..0000000000 --- a/2017/CVE-2017-1000000.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 91563154, - "name": "DWF-CVE-2017-1000000", - "full_name": "smythtech\/DWF-CVE-2017-1000000", - "owner": { - "login": "smythtech", - "id": 9844564, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9844564?v=4", - "html_url": "https:\/\/github.com\/smythtech" - }, - "html_url": "https:\/\/github.com\/smythtech\/DWF-CVE-2017-1000000", - "description": null, - "fork": false, - "created_at": "2017-05-17T10:14:54Z", - "updated_at": "2017-07-06T21:23:57Z", - "pushed_at": "2017-05-17T10:27:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-1000367.json b/2017/CVE-2017-1000367.json deleted file mode 100644 index f31ea70014..0000000000 --- a/2017/CVE-2017-1000367.json +++ /dev/null @@ -1,71 +0,0 @@ -[ - { - "id": 92862379, - "name": "sudo-CVE-2017-1000367", - "full_name": "c0d3z3r0\/sudo-CVE-2017-1000367", - "owner": { - "login": "c0d3z3r0", - "id": 6205797, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6205797?v=4", - "html_url": "https:\/\/github.com\/c0d3z3r0" - }, - "html_url": "https:\/\/github.com\/c0d3z3r0\/sudo-CVE-2017-1000367", - "description": null, - "fork": false, - "created_at": "2017-05-30T18:12:38Z", - "updated_at": "2020-08-27T17:36:56Z", - "pushed_at": "2017-06-05T19:53:35Z", - "stargazers_count": 115, - "watchers_count": 115, - "forks_count": 41, - "forks": 41, - "watchers": 115, - "score": 0 - }, - { - "id": 93312242, - "name": "CVE-2017-1000367", - "full_name": "homjxi0e\/CVE-2017-1000367", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-1000367", - "description": null, - "fork": false, - "created_at": "2017-06-04T12:31:59Z", - "updated_at": "2020-05-18T10:42:07Z", - "pushed_at": "2017-06-04T12:49:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 4, - "forks": 4, - "watchers": 1, - "score": 0 - }, - { - "id": 93726308, - "name": "sudo_exploit", - "full_name": "pucerpocok\/sudo_exploit", - "owner": { - "login": "pucerpocok", - "id": 25666150, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25666150?v=4", - "html_url": "https:\/\/github.com\/pucerpocok" - }, - "html_url": "https:\/\/github.com\/pucerpocok\/sudo_exploit", - "description": "own implementation of the CVE-2017-1000367 sudo privilege escalation vulnerability in python", - "fork": false, - "created_at": "2017-06-08T08:37:38Z", - "updated_at": "2020-10-21T10:34:25Z", - "pushed_at": "2017-06-08T08:38:49Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, - "forks": 2, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-2370.json b/2017/CVE-2017-2370.json index 62ba0b77cb..2792fc01bd 100644 --- a/2017/CVE-2017-2370.json +++ b/2017/CVE-2017-2370.json @@ -1,73 +1,4 @@ [ - { - "id": 80148945, - "name": "extra_recipe", - "full_name": "maximehip\/extra_recipe", - "owner": { - "login": "maximehip", - "id": 6273425, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6273425?v=4", - "html_url": "https:\/\/github.com\/maximehip" - }, - "html_url": "https:\/\/github.com\/maximehip\/extra_recipe", - "description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004", - "fork": false, - "created_at": "2017-01-26T19:47:43Z", - "updated_at": "2017-01-26T19:48:19Z", - "pushed_at": "2017-01-26T19:48:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 80717942, - "name": "extra_recipe", - "full_name": "JackBro\/extra_recipe", - "owner": { - "login": "JackBro", - "id": 21210712, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21210712?v=4", - "html_url": "https:\/\/github.com\/JackBro" - }, - "html_url": "https:\/\/github.com\/JackBro\/extra_recipe", - "description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)", - "fork": false, - "created_at": "2017-02-02T11:16:38Z", - "updated_at": "2017-10-14T08:34:32Z", - "pushed_at": "2017-01-27T17:44:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 81874110, - "name": "extra_recipe-iOS-10.2", - "full_name": "Rootkitsmm\/extra_recipe-iOS-10.2", - "owner": { - "login": "Rootkitsmm", - "id": 5567904, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5567904?v=4", - "html_url": "https:\/\/github.com\/Rootkitsmm" - }, - "html_url": "https:\/\/github.com\/Rootkitsmm\/extra_recipe-iOS-10.2", - "description": "CVE-2017-2370", - "fork": false, - "created_at": "2017-02-13T21:32:40Z", - "updated_at": "2019-01-03T05:45:15Z", - "pushed_at": "2017-02-01T11:36:26Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 4, - "forks": 4, - "watchers": 1, - "score": 0 - }, { "id": 142854846, "name": "CVE-2017-2370", diff --git a/2017/CVE-2017-2636.json b/2017/CVE-2017-2636.json deleted file mode 100644 index 7e6d3e1bd5..0000000000 --- a/2017/CVE-2017-2636.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 84497885, - "name": "cve-2017-2636-el", - "full_name": "alexzorin\/cve-2017-2636-el", - "owner": { - "login": "alexzorin", - "id": 311534, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/311534?v=4", - "html_url": "https:\/\/github.com\/alexzorin" - }, - "html_url": "https:\/\/github.com\/alexzorin\/cve-2017-2636-el", - "description": "Ansible role for workaround for CVE-2017-2636 (Red Hat) - https:\/\/access.redhat.com\/security\/cve\/CVE-2017-2636", - "fork": false, - "created_at": "2017-03-09T23:20:42Z", - "updated_at": "2017-03-18T16:23:19Z", - "pushed_at": "2017-03-09T23:21:14Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-2671.json b/2017/CVE-2017-2671.json deleted file mode 100644 index 2a9a0d5781..0000000000 --- a/2017/CVE-2017-2671.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 93707325, - "name": "CVE-2017-2671", - "full_name": "homjxi0e\/CVE-2017-2671", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-2671", - "description": null, - "fork": false, - "created_at": "2017-06-08T04:28:31Z", - "updated_at": "2017-06-08T04:46:23Z", - "pushed_at": "2017-06-08T04:46:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-2793.json b/2017/CVE-2017-2793.json deleted file mode 100644 index 90ee5b2e38..0000000000 --- a/2017/CVE-2017-2793.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 95873037, - "name": "Detection-for-CVE-2017-2793", - "full_name": "sUbc0ol\/Detection-for-CVE-2017-2793", - "owner": { - "login": "sUbc0ol", - "id": 24601456, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4", - "html_url": "https:\/\/github.com\/sUbc0ol" - }, - "html_url": "https:\/\/github.com\/sUbc0ol\/Detection-for-CVE-2017-2793", - "description": null, - "fork": false, - "created_at": "2017-06-30T09:32:42Z", - "updated_at": "2020-03-26T07:50:50Z", - "pushed_at": "2017-06-30T09:35:59Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-3078.json b/2017/CVE-2017-3078.json deleted file mode 100644 index c0d7f512c8..0000000000 --- a/2017/CVE-2017-3078.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 95431299, - "name": "CVE-2017-3078", - "full_name": "homjxi0e\/CVE-2017-3078", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3078", - "description": null, - "fork": false, - "created_at": "2017-06-26T09:34:59Z", - "updated_at": "2017-06-26T09:34:59Z", - "pushed_at": "2017-06-26T09:49:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-3599.json b/2017/CVE-2017-3599.json deleted file mode 100644 index cbb1878864..0000000000 --- a/2017/CVE-2017-3599.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 88650555, - "name": "CVE-2017-3599", - "full_name": "SECFORCE\/CVE-2017-3599", - "owner": { - "login": "SECFORCE", - "id": 8157384, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4", - "html_url": "https:\/\/github.com\/SECFORCE" - }, - "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2017-3599", - "description": "Proof of concept exploit for CVE-2017-3599", - "fork": false, - "created_at": "2017-04-18T17:08:39Z", - "updated_at": "2020-08-03T19:51:16Z", - "pushed_at": "2017-04-18T17:10:18Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 18, - "forks": 18, - "watchers": 17, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-3730.json b/2017/CVE-2017-3730.json index d160053a9d..23fa2045df 100644 --- a/2017/CVE-2017-3730.json +++ b/2017/CVE-2017-3730.json @@ -1,27 +1,4 @@ [ - { - "id": 79682713, - "name": "CVE-2017-3730", - "full_name": "guidovranken\/CVE-2017-3730", - "owner": { - "login": "guidovranken", - "id": 6846644, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6846644?v=4", - "html_url": "https:\/\/github.com\/guidovranken" - }, - "html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730", - "description": "OpenSSL CVE-2017-3730 proof-of-concept", - "fork": false, - "created_at": "2017-01-22T00:40:34Z", - "updated_at": "2018-12-04T20:01:55Z", - "pushed_at": "2017-01-26T01:30:54Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 5, - "forks": 5, - "watchers": 11, - "score": 0 - }, { "id": 97466064, "name": "OpenSSL-CVE-2017-3730", diff --git a/2017/CVE-2017-3881.json b/2017/CVE-2017-3881.json index ff56bb6b82..3df52c1892 100644 --- a/2017/CVE-2017-3881.json +++ b/2017/CVE-2017-3881.json @@ -1,96 +1,4 @@ [ - { - "id": 87763747, - "name": "cisco-rce", - "full_name": "artkond\/cisco-rce", - "owner": { - "login": "artkond", - "id": 4436674, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4436674?v=4", - "html_url": "https:\/\/github.com\/artkond" - }, - "html_url": "https:\/\/github.com\/artkond\/cisco-rce", - "description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC", - "fork": false, - "created_at": "2017-04-10T03:44:04Z", - "updated_at": "2020-11-12T10:36:38Z", - "pushed_at": "2017-04-12T09:17:27Z", - "stargazers_count": 171, - "watchers_count": 171, - "forks_count": 81, - "forks": 81, - "watchers": 171, - "score": 0 - }, - { - "id": 88804675, - "name": "CVE-2017-3881-exploit-cisco-", - "full_name": "homjxi0e\/CVE-2017-3881-exploit-cisco-", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3881-exploit-cisco-", - "description": null, - "fork": false, - "created_at": "2017-04-20T00:52:10Z", - "updated_at": "2020-04-07T06:31:35Z", - "pushed_at": "2017-04-20T00:52:56Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 4, - "forks": 4, - "watchers": 2, - "score": 0 - }, - { - "id": 90087111, - "name": "CVE-2017-3881-Cisco", - "full_name": "homjxi0e\/CVE-2017-3881-Cisco", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3881-Cisco", - "description": null, - "fork": false, - "created_at": "2017-05-02T23:21:53Z", - "updated_at": "2017-05-02T23:28:05Z", - "pushed_at": "2017-05-02T23:28:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 90975256, - "name": "PoC-CVE-2017-3881", - "full_name": "zakybstrd21215\/PoC-CVE-2017-3881", - "owner": { - "login": "zakybstrd21215", - "id": 22362343, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4", - "html_url": "https:\/\/github.com\/zakybstrd21215" - }, - "html_url": "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-3881", - "description": "Cisco Catalyst Remote Code Execution PoC", - "fork": false, - "created_at": "2017-05-11T12:11:51Z", - "updated_at": "2017-05-11T12:16:43Z", - "pushed_at": "2017-05-11T13:52:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, { "id": 115962692, "name": "CVE-2017-3881", diff --git a/2017/CVE-2017-5005.json b/2017/CVE-2017-5005.json deleted file mode 100644 index cb2c0a3e09..0000000000 --- a/2017/CVE-2017-5005.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 77828551, - "name": "QuickHeal", - "full_name": "payatu\/QuickHeal", - "owner": { - "login": "payatu", - "id": 16715624, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16715624?v=4", - "html_url": "https:\/\/github.com\/payatu" - }, - "html_url": "https:\/\/github.com\/payatu\/QuickHeal", - "description": "CVE-2017-5005 for Quick Heal Antivirus", - "fork": false, - "created_at": "2017-01-02T11:21:00Z", - "updated_at": "2020-03-27T02:45:54Z", - "pushed_at": "2017-03-31T14:49:28Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 8, - "forks": 8, - "watchers": 16, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-5415.json b/2017/CVE-2017-5415.json deleted file mode 100644 index 3de681def6..0000000000 --- a/2017/CVE-2017-5415.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 88234209, - "name": "CVE-2017-5415", - "full_name": "649\/CVE-2017-5415", - "owner": { - "login": "649", - "id": 23534047, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23534047?v=4", - "html_url": "https:\/\/github.com\/649" - }, - "html_url": "https:\/\/github.com\/649\/CVE-2017-5415", - "description": "Addressbar spoofing through blob URL (Firefox browser). An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by blob: as the protocol, leading to user confusion and further spoofing attacks.", - "fork": false, - "created_at": "2017-04-14T04:55:41Z", - "updated_at": "2020-07-12T20:54:15Z", - "pushed_at": "2017-04-14T04:55:51Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 7, - "forks": 7, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-5487.json b/2017/CVE-2017-5487.json index 2656dd735e..272249f93d 100644 --- a/2017/CVE-2017-5487.json +++ b/2017/CVE-2017-5487.json @@ -1,27 +1,4 @@ [ - { - "id": 107852472, - "name": "wpUsersScan", - "full_name": "teambugsbunny\/wpUsersScan", - "owner": { - "login": "teambugsbunny", - "id": 32997799, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/32997799?v=4", - "html_url": "https:\/\/github.com\/teambugsbunny" - }, - "html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan", - "description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ", - "fork": false, - "created_at": "2017-10-22T09:22:28Z", - "updated_at": "2020-04-06T12:23:41Z", - "pushed_at": "2017-06-11T16:47:07Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 4, - "forks": 4, - "watchers": 1, - "score": 0 - }, { "id": 121831599, "name": "wpUsersScan", diff --git a/2017/CVE-2017-5633.json b/2017/CVE-2017-5633.json deleted file mode 100644 index 4a6aec60c0..0000000000 --- a/2017/CVE-2017-5633.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 88568725, - "name": "Exploit-CVE-2017-5633", - "full_name": "cardangi\/Exploit-CVE-2017-5633", - "owner": { - "login": "cardangi", - "id": 22066466, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22066466?v=4", - "html_url": "https:\/\/github.com\/cardangi" - }, - "html_url": "https:\/\/github.com\/cardangi\/Exploit-CVE-2017-5633", - "description": "Exploit developed by me for CVE-2017-5633.", - "fork": false, - "created_at": "2017-04-18T01:44:33Z", - "updated_at": "2020-04-07T06:34:50Z", - "pushed_at": "2017-04-18T02:54:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index 7e52cef389..c4e86f40fa 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -1,280 +1,4 @@ [ - { - "id": 84158718, - "name": "S2-045", - "full_name": "PolarisLab\/S2-045", - "owner": { - "login": "PolarisLab", - "id": 25890110, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25890110?v=4", - "html_url": "https:\/\/github.com\/PolarisLab" - }, - "html_url": "https:\/\/github.com\/PolarisLab\/S2-045", - "description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html", - "fork": false, - "created_at": "2017-03-07T05:30:30Z", - "updated_at": "2020-09-22T06:33:06Z", - "pushed_at": "2017-03-07T05:37:55Z", - "stargazers_count": 23, - "watchers_count": 23, - "forks_count": 12, - "forks": 12, - "watchers": 23, - "score": 0 - }, - { - "id": 84186490, - "name": "Struts2-045-Exp", - "full_name": "Flyteas\/Struts2-045-Exp", - "owner": { - "login": "Flyteas", - "id": 15673913, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15673913?v=4", - "html_url": "https:\/\/github.com\/Flyteas" - }, - "html_url": "https:\/\/github.com\/Flyteas\/Struts2-045-Exp", - "description": "Struts2 S2-045(CVE-2017-5638)Exp with GUI", - "fork": false, - "created_at": "2017-03-07T10:30:20Z", - "updated_at": "2020-09-11T23:13:21Z", - "pushed_at": "2017-03-13T06:30:41Z", - "stargazers_count": 60, - "watchers_count": 60, - "forks_count": 29, - "forks": 29, - "watchers": 60, - "score": 0 - }, - { - "id": 84277596, - "name": "cve-2017-5638", - "full_name": "bongbongco\/cve-2017-5638", - "owner": { - "login": "bongbongco", - "id": 3170006, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3170006?v=4", - "html_url": "https:\/\/github.com\/bongbongco" - }, - "html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638", - "description": null, - "fork": false, - "created_at": "2017-03-08T04:17:33Z", - "updated_at": "2017-03-08T04:31:28Z", - "pushed_at": "2017-03-08T04:31:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 84481525, - "name": "S2-045-EXP-POC-TOOLS", - "full_name": "jas502n\/S2-045-EXP-POC-TOOLS", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/S2-045-EXP-POC-TOOLS", - "description": "S2-045 漏洞 POC-TOOLS CVE-2017-5638", - "fork": false, - "created_at": "2017-03-09T19:40:47Z", - "updated_at": "2020-10-24T13:59:45Z", - "pushed_at": "2017-03-09T19:50:50Z", - "stargazers_count": 21, - "watchers_count": 21, - "forks_count": 19, - "forks": 19, - "watchers": 21, - "score": 0 - }, - { - "id": 84518902, - "name": "strutszeiro", - "full_name": "mthbernardes\/strutszeiro", - "owner": { - "login": "mthbernardes", - "id": 12648924, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12648924?v=4", - "html_url": "https:\/\/github.com\/mthbernardes" - }, - "html_url": "https:\/\/github.com\/mthbernardes\/strutszeiro", - "description": "Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)", - "fork": false, - "created_at": "2017-03-10T04:23:41Z", - "updated_at": "2020-05-11T01:31:47Z", - "pushed_at": "2017-03-11T04:11:39Z", - "stargazers_count": 38, - "watchers_count": 38, - "forks_count": 27, - "forks": 27, - "watchers": 38, - "score": 0 - }, - { - "id": 84581800, - "name": "cve-2017-5638", - "full_name": "xsscx\/cve-2017-5638", - "owner": { - "login": "xsscx", - "id": 10790582, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/10790582?v=4", - "html_url": "https:\/\/github.com\/xsscx" - }, - "html_url": "https:\/\/github.com\/xsscx\/cve-2017-5638", - "description": "Example PoC Code for CVE-2017-5638 | Apache Struts Exploit ", - "fork": false, - "created_at": "2017-03-10T16:56:14Z", - "updated_at": "2020-08-31T01:27:42Z", - "pushed_at": "2017-03-12T15:43:27Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 21, - "forks": 21, - "watchers": 12, - "score": 0 - }, - { - "id": 84602394, - "name": "apache-struts2-CVE-2017-5638", - "full_name": "immunio\/apache-struts2-CVE-2017-5638", - "owner": { - "login": "immunio", - "id": 6700387, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6700387?v=4", - "html_url": "https:\/\/github.com\/immunio" - }, - "html_url": "https:\/\/github.com\/immunio\/apache-struts2-CVE-2017-5638", - "description": "Demo Application and Exploit", - "fork": false, - "created_at": "2017-03-10T21:33:25Z", - "updated_at": "2020-05-29T01:57:57Z", - "pushed_at": "2017-03-13T15:03:32Z", - "stargazers_count": 37, - "watchers_count": 37, - "forks_count": 35, - "forks": 35, - "watchers": 37, - "score": 0 - }, - { - "id": 84620334, - "name": "OgnlContentTypeRejectorValve", - "full_name": "Masahiro-Yamada\/OgnlContentTypeRejectorValve", - "owner": { - "login": "Masahiro-Yamada", - "id": 479387, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/479387?v=4", - "html_url": "https:\/\/github.com\/Masahiro-Yamada" - }, - "html_url": "https:\/\/github.com\/Masahiro-Yamada\/OgnlContentTypeRejectorValve", - "description": "This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)", - "fork": false, - "created_at": "2017-03-11T03:18:12Z", - "updated_at": "2017-04-11T00:06:36Z", - "pushed_at": "2017-03-13T14:49:25Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 84639178, - "name": "CVE-2017-5638-Apache-Struts2", - "full_name": "aljazceru\/CVE-2017-5638-Apache-Struts2", - "owner": { - "login": "aljazceru", - "id": 4439523, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4439523?v=4", - "html_url": "https:\/\/github.com\/aljazceru" - }, - "html_url": "https:\/\/github.com\/aljazceru\/CVE-2017-5638-Apache-Struts2", - "description": "Tweaking original PoC (https:\/\/github.com\/rapid7\/metasploit-framework\/issues\/8064) to work on self-signed certificates ", - "fork": false, - "created_at": "2017-03-11T09:39:09Z", - "updated_at": "2019-07-15T22:02:37Z", - "pushed_at": "2017-03-11T09:41:27Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 84640546, - "name": "test_struts2_vulnerability_CVE-2017-5638", - "full_name": "sjitech\/test_struts2_vulnerability_CVE-2017-5638", - "owner": { - "login": "sjitech", - "id": 5180638, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5180638?v=4", - "html_url": "https:\/\/github.com\/sjitech" - }, - "html_url": "https:\/\/github.com\/sjitech\/test_struts2_vulnerability_CVE-2017-5638", - "description": "test struts2 vulnerability CVE-2017-5638 in Mac OS X", - "fork": false, - "created_at": "2017-03-11T10:03:54Z", - "updated_at": "2017-03-13T11:14:00Z", - "pushed_at": "2017-03-13T07:38:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 84642680, - "name": "CVE-2017-5638", - "full_name": "jrrombaldo\/CVE-2017-5638", - "owner": { - "login": "jrrombaldo", - "id": 121948, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/121948?v=4", - "html_url": "https:\/\/github.com\/jrrombaldo" - }, - "html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-5638", - "description": null, - "fork": false, - "created_at": "2017-03-11T10:43:16Z", - "updated_at": "2017-03-11T13:07:57Z", - "pushed_at": "2017-03-24T19:12:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 84644857, - "name": "CVE-2017-5638", - "full_name": "random-robbie\/CVE-2017-5638", - "owner": { - "login": "random-robbie", - "id": 4902869, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4902869?v=4", - "html_url": "https:\/\/github.com\/random-robbie" - }, - "html_url": "https:\/\/github.com\/random-robbie\/CVE-2017-5638", - "description": "CVE: 2017-5638 in different formats", - "fork": false, - "created_at": "2017-03-11T11:22:44Z", - "updated_at": "2017-03-11T11:28:58Z", - "pushed_at": "2017-03-16T11:26:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, { "id": 84655941, "name": "CVE-2017-5638_struts", @@ -321,167 +45,6 @@ "watchers": 379, "score": 0 }, - { - "id": 84705148, - "name": "Struts-Apache-ExploitPack", - "full_name": "ret2jazzy\/Struts-Apache-ExploitPack", - "owner": { - "login": "ret2jazzy", - "id": 20831187, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20831187?v=4", - "html_url": "https:\/\/github.com\/ret2jazzy" - }, - "html_url": "https:\/\/github.com\/ret2jazzy\/Struts-Apache-ExploitPack", - "description": "These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)", - "fork": false, - "created_at": "2017-03-12T06:28:51Z", - "updated_at": "2020-09-16T08:08:19Z", - "pushed_at": "2017-03-12T07:26:03Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 13, - "forks": 13, - "watchers": 16, - "score": 0 - }, - { - "id": 84725982, - "name": "ExpStruts", - "full_name": "lolwaleet\/ExpStruts", - "owner": { - "login": "lolwaleet", - "id": 20018319, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20018319?v=4", - "html_url": "https:\/\/github.com\/lolwaleet" - }, - "html_url": "https:\/\/github.com\/lolwaleet\/ExpStruts", - "description": "A php based exploiter for CVE-2017-5638.", - "fork": false, - "created_at": "2017-03-12T13:03:52Z", - "updated_at": "2020-03-15T16:58:21Z", - "pushed_at": "2017-03-12T13:04:33Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, - "forks": 2, - "watchers": 2, - "score": 0 - }, - { - "id": 84819853, - "name": "CVE-2017-5638-Apache-Struts2", - "full_name": "oktavianto\/CVE-2017-5638-Apache-Struts2", - "owner": { - "login": "oktavianto", - "id": 8210275, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8210275?v=4", - "html_url": "https:\/\/github.com\/oktavianto" - }, - "html_url": "https:\/\/github.com\/oktavianto\/CVE-2017-5638-Apache-Struts2", - "description": "Example PHP Exploiter for CVE-2017-5638", - "fork": false, - "created_at": "2017-03-13T11:39:55Z", - "updated_at": "2020-04-07T06:38:46Z", - "pushed_at": "2017-03-20T19:40:16Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 4, - "forks": 4, - "watchers": 2, - "score": 0 - }, - { - "id": 85010282, - "name": "cve-2017-5638", - "full_name": "jrrdev\/cve-2017-5638", - "owner": { - "login": "jrrdev", - "id": 17674081, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17674081?v=4", - "html_url": "https:\/\/github.com\/jrrdev" - }, - "html_url": "https:\/\/github.com\/jrrdev\/cve-2017-5638", - "description": "cve-2017-5638 Vulnerable site sample", - "fork": false, - "created_at": "2017-03-15T00:19:33Z", - "updated_at": "2020-05-19T19:36:03Z", - "pushed_at": "2017-04-04T19:57:38Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 9, - "forks": 9, - "watchers": 11, - "score": 0 - }, - { - "id": 85145901, - "name": "Strutshock", - "full_name": "opt9\/Strutshock", - "owner": { - "login": "opt9", - "id": 192655, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/192655?v=4", - "html_url": "https:\/\/github.com\/opt9" - }, - "html_url": "https:\/\/github.com\/opt9\/Strutshock", - "description": "Struts2 RCE CVE-2017-5638 non-intrusive check shell script", - "fork": false, - "created_at": "2017-03-16T02:59:22Z", - "updated_at": "2017-05-04T20:58:47Z", - "pushed_at": "2017-03-16T04:02:40Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, - { - "id": 85341283, - "name": "StrutsShell", - "full_name": "falcon-lnhg\/StrutsShell", - "owner": { - "login": "falcon-lnhg", - "id": 5199658, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5199658?v=4", - "html_url": "https:\/\/github.com\/falcon-lnhg" - }, - "html_url": "https:\/\/github.com\/falcon-lnhg\/StrutsShell", - "description": "Apache Struts (CVE-2017-5638) Shell", - "fork": false, - "created_at": "2017-03-17T18:05:55Z", - "updated_at": "2017-08-31T21:27:12Z", - "pushed_at": "2017-04-04T16:11:25Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, - { - "id": 85390529, - "name": "CVE-2017-5638", - "full_name": "bhagdave\/CVE-2017-5638", - "owner": { - "login": "bhagdave", - "id": 3230037, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3230037?v=4", - "html_url": "https:\/\/github.com\/bhagdave" - }, - "html_url": "https:\/\/github.com\/bhagdave\/CVE-2017-5638", - "description": null, - "fork": false, - "created_at": "2017-03-18T09:39:59Z", - "updated_at": "2017-03-19T01:25:24Z", - "pushed_at": "2017-03-21T21:53:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 85664016, "name": "st2-046-poc", @@ -505,98 +68,6 @@ "watchers": 21, "score": 0 }, - { - "id": 85733752, - "name": "S2-046_S2-045_POC", - "full_name": "KarzsGHR\/S2-046_S2-045_POC", - "owner": { - "login": "KarzsGHR", - "id": 12841587, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12841587?v=4", - "html_url": "https:\/\/github.com\/KarzsGHR" - }, - "html_url": "https:\/\/github.com\/KarzsGHR\/S2-046_S2-045_POC", - "description": "S2-046|S2-045: Struts 2 Remote Code Execution vulnerability(CVE-2017-5638)", - "fork": false, - "created_at": "2017-03-21T17:36:40Z", - "updated_at": "2019-11-20T02:42:35Z", - "pushed_at": "2017-04-26T09:12:33Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 85926594, - "name": "S2-Reaper", - "full_name": "gsfish\/S2-Reaper", - "owner": { - "login": "gsfish", - "id": 15968154, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15968154?v=4", - "html_url": "https:\/\/github.com\/gsfish" - }, - "html_url": "https:\/\/github.com\/gsfish\/S2-Reaper", - "description": "CVE-2017-5638", - "fork": false, - "created_at": "2017-03-23T08:44:10Z", - "updated_at": "2017-03-30T09:51:23Z", - "pushed_at": "2017-03-30T10:06:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, - "score": 0 - }, - { - "id": 86200933, - "name": "cve-2017-5638", - "full_name": "mcassano\/cve-2017-5638", - "owner": { - "login": "mcassano", - "id": 2073030, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2073030?v=4", - "html_url": "https:\/\/github.com\/mcassano" - }, - "html_url": "https:\/\/github.com\/mcassano\/cve-2017-5638", - "description": null, - "fork": false, - "created_at": "2017-03-26T01:58:52Z", - "updated_at": "2017-03-26T02:00:58Z", - "pushed_at": "2017-04-01T04:20:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 86415022, - "name": "Strutscli", - "full_name": "opt9\/Strutscli", - "owner": { - "login": "opt9", - "id": 192655, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/192655?v=4", - "html_url": "https:\/\/github.com\/opt9" - }, - "html_url": "https:\/\/github.com\/opt9\/Strutscli", - "description": "Struts2 RCE CVE-2017-5638 CLI shell", - "fork": false, - "created_at": "2017-03-28T04:31:44Z", - "updated_at": "2017-04-14T08:03:48Z", - "pushed_at": "2017-03-28T04:36:11Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 87695524, "name": "strutsy", @@ -620,52 +91,6 @@ "watchers": 11, "score": 0 }, - { - "id": 90377429, - "name": "CVE-2017-5638", - "full_name": "payatu\/CVE-2017-5638", - "owner": { - "login": "payatu", - "id": 16715624, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16715624?v=4", - "html_url": "https:\/\/github.com\/payatu" - }, - "html_url": "https:\/\/github.com\/payatu\/CVE-2017-5638", - "description": "Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header ", - "fork": false, - "created_at": "2017-05-05T13:17:37Z", - "updated_at": "2020-03-27T02:45:32Z", - "pushed_at": "2017-05-05T13:55:53Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 4, - "forks": 4, - "watchers": 7, - "score": 0 - }, - { - "id": 92562840, - "name": "Struts2-045-Exp", - "full_name": "Aasron\/Struts2-045-Exp", - "owner": { - "login": "Aasron", - "id": 17878407, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17878407?v=4", - "html_url": "https:\/\/github.com\/Aasron" - }, - "html_url": "https:\/\/github.com\/Aasron\/Struts2-045-Exp", - "description": "CVE-2017-5638", - "fork": false, - "created_at": "2017-05-27T02:03:28Z", - "updated_at": "2017-05-27T02:33:31Z", - "pushed_at": "2017-06-01T09:53:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 92638419, "name": "Stutsfi", @@ -689,167 +114,6 @@ "watchers": 0, "score": 0 }, - { - "id": 92644725, - "name": "Struts2Shell", - "full_name": "jpacora\/Struts2Shell", - "owner": { - "login": "jpacora", - "id": 2137673, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2137673?v=4", - "html_url": "https:\/\/github.com\/jpacora" - }, - "html_url": "https:\/\/github.com\/jpacora\/Struts2Shell", - "description": "An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.", - "fork": false, - "created_at": "2017-05-28T06:44:13Z", - "updated_at": "2017-05-28T06:44:27Z", - "pushed_at": "2017-06-03T06:33:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 93442387, - "name": "CVE-2017-5638", - "full_name": "AndreasKl\/CVE-2017-5638", - "owner": { - "login": "AndreasKl", - "id": 1105899, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1105899?v=4", - "html_url": "https:\/\/github.com\/AndreasKl" - }, - "html_url": "https:\/\/github.com\/AndreasKl\/CVE-2017-5638", - "description": null, - "fork": false, - "created_at": "2017-06-05T20:11:06Z", - "updated_at": "2020-10-14T14:40:32Z", - "pushed_at": "2017-06-05T21:43:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 93710291, - "name": "struts-rce-cve-2017-5638", - "full_name": "riyazwalikar\/struts-rce-cve-2017-5638", - "owner": { - "login": "riyazwalikar", - "id": 1900486, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1900486?v=4", - "html_url": "https:\/\/github.com\/riyazwalikar" - }, - "html_url": "https:\/\/github.com\/riyazwalikar\/struts-rce-cve-2017-5638", - "description": "Struts-RCE CVE-2017-5638", - "fork": false, - "created_at": "2017-06-08T05:22:31Z", - "updated_at": "2017-06-08T08:18:51Z", - "pushed_at": "2017-06-08T05:25:42Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - }, - { - "id": 93794473, - "name": "CVE-2017-5638", - "full_name": "homjxi0e\/CVE-2017-5638", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-5638", - "description": null, - "fork": false, - "created_at": "2017-06-08T21:47:11Z", - "updated_at": "2017-06-08T21:47:11Z", - "pushed_at": "2017-06-08T21:48:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 94180453, - "name": "CVE-2017-5638", - "full_name": "eeehit\/CVE-2017-5638", - "owner": { - "login": "eeehit", - "id": 22052276, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22052276?v=4", - "html_url": "https:\/\/github.com\/eeehit" - }, - "html_url": "https:\/\/github.com\/eeehit\/CVE-2017-5638", - "description": "CVE-2017-5638 Test environment", - "fork": false, - "created_at": "2017-06-13T06:59:15Z", - "updated_at": "2017-06-13T07:07:06Z", - "pushed_at": "2017-06-13T07:00:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 95873695, - "name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", - "full_name": "sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", - "owner": { - "login": "sUbc0ol", - "id": 24601456, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4", - "html_url": "https:\/\/github.com\/sUbc0ol" - }, - "html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", - "description": null, - "fork": false, - "created_at": "2017-06-30T09:40:31Z", - "updated_at": "2020-03-26T07:50:37Z", - "pushed_at": "2017-06-30T09:41:31Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 95874930, - "name": "Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638", - "full_name": "sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638", - "owner": { - "login": "sUbc0ol", - "id": 24601456, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4", - "html_url": "https:\/\/github.com\/sUbc0ol" - }, - "html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638", - "description": null, - "fork": false, - "created_at": "2017-06-30T09:55:41Z", - "updated_at": "2020-03-26T07:49:41Z", - "pushed_at": "2017-06-30T09:57:01Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 8, - "forks": 8, - "watchers": 14, - "score": 0 - }, { "id": 98150795, "name": "Apache-Struts-2-CVE-2017-5638-Exploit-", @@ -965,29 +229,6 @@ "watchers": 0, "score": 0 }, - { - "id": 107489354, - "name": "Apache-Struts", - "full_name": "c002\/Apache-Struts", - "owner": { - "login": "c002", - "id": 26592580, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26592580?v=4", - "html_url": "https:\/\/github.com\/c002" - }, - "html_url": "https:\/\/github.com\/c002\/Apache-Struts", - "description": " An exploit for Apache Struts CVE-2017-5638", - "fork": false, - "created_at": "2017-10-19T02:40:45Z", - "updated_at": "2020-05-17T04:32:06Z", - "pushed_at": "2017-05-28T14:03:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 108805305, "name": "Common-Vulnerability-and-Exploit", diff --git a/2017/CVE-2017-5689.json b/2017/CVE-2017-5689.json index 204e2d8adb..a69ccdb41e 100644 --- a/2017/CVE-2017-5689.json +++ b/2017/CVE-2017-5689.json @@ -1,27 +1,4 @@ [ - { - "id": 90210170, - "name": "CVE-2017-5689", - "full_name": "CerberusSecurity\/CVE-2017-5689", - "owner": { - "login": "CerberusSecurity", - "id": 21088337, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21088337?v=4", - "html_url": "https:\/\/github.com\/CerberusSecurity" - }, - "html_url": "https:\/\/github.com\/CerberusSecurity\/CVE-2017-5689", - "description": null, - "fork": false, - "created_at": "2017-05-04T01:51:26Z", - "updated_at": "2020-01-01T00:38:18Z", - "pushed_at": "2017-05-04T03:06:32Z", - "stargazers_count": 39, - "watchers_count": 39, - "forks_count": 10, - "forks": 10, - "watchers": 39, - "score": 0 - }, { "id": 90472957, "name": "amthoneypot", @@ -45,29 +22,6 @@ "watchers": 12, "score": 0 }, - { - "id": 90724328, - "name": "intel_amt_bypass", - "full_name": "Bijaye\/intel_amt_bypass", - "owner": { - "login": "Bijaye", - "id": 4318412, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4318412?v=4", - "html_url": "https:\/\/github.com\/Bijaye" - }, - "html_url": "https:\/\/github.com\/Bijaye\/intel_amt_bypass", - "description": "simple python poc for CVE-2017-5689", - "fork": false, - "created_at": "2017-05-09T08:55:39Z", - "updated_at": "2020-07-05T02:24:05Z", - "pushed_at": "2017-05-09T00:42:12Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 7, - "forks": 7, - "watchers": 3, - "score": 0 - }, { "id": 98579784, "name": "amt_auth_bypass_poc", diff --git a/2017/CVE-2017-6370.json b/2017/CVE-2017-6370.json deleted file mode 100644 index 0f21368824..0000000000 --- a/2017/CVE-2017-6370.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 85539985, - "name": "TYPO3-v7.6.15-Unencrypted-Login-Request", - "full_name": "faizzaidi\/TYPO3-v7.6.15-Unencrypted-Login-Request", - "owner": { - "login": "faizzaidi", - "id": 12153050, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4", - "html_url": "https:\/\/github.com\/faizzaidi" - }, - "html_url": "https:\/\/github.com\/faizzaidi\/TYPO3-v7.6.15-Unencrypted-Login-Request", - "description": "TYPO3 v7.6.15 Unencrypted Login Request Assigned CVE Number: CVE-2017-6370", - "fork": false, - "created_at": "2017-03-20T05:51:07Z", - "updated_at": "2020-07-17T05:22:53Z", - "pushed_at": "2017-03-20T05:51:43Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-6971.json b/2017/CVE-2017-6971.json index 8da1982e53..cb167b413c 100644 --- a/2017/CVE-2017-6971.json +++ b/2017/CVE-2017-6971.json @@ -1,27 +1,4 @@ [ - { - "id": 87749039, - "name": "nfsen-exploit", - "full_name": "patrickfreed\/nfsen-exploit", - "owner": { - "login": "patrickfreed", - "id": 936020, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/936020?v=4", - "html_url": "https:\/\/github.com\/patrickfreed" - }, - "html_url": "https:\/\/github.com\/patrickfreed\/nfsen-exploit", - "description": "Exploit for CVE-2017-6971 remote command execution in nfsen 1.3.7.", - "fork": false, - "created_at": "2017-04-10T00:13:24Z", - "updated_at": "2020-04-07T06:36:25Z", - "pushed_at": "2017-04-10T16:06:56Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 7, - "forks": 7, - "watchers": 4, - "score": 0 - }, { "id": 183134145, "name": "nfsen_1.3.7_CVE-2017-6971", diff --git a/2017/CVE-2017-7188.json b/2017/CVE-2017-7188.json deleted file mode 100644 index 603aa6250f..0000000000 --- a/2017/CVE-2017-7188.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 87800336, - "name": "Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC", - "full_name": "faizzaidi\/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC", - "owner": { - "login": "faizzaidi", - "id": 12153050, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4", - "html_url": "https:\/\/github.com\/faizzaidi" - }, - "html_url": "https:\/\/github.com\/faizzaidi\/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC", - "description": "Zurmo-Stable-3.1.1 Cross Site Scripting (XSS) Assigned CVE Number: CVE-2017-7188", - "fork": false, - "created_at": "2017-04-10T10:52:13Z", - "updated_at": "2020-07-17T05:22:49Z", - "pushed_at": "2017-04-10T10:52:52Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index 021a297a26..b9899daeca 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -1,27 +1,4 @@ [ - { - "id": 86543900, - "name": "webdav_exploit", - "full_name": "eliuha\/webdav_exploit", - "owner": { - "login": "eliuha", - "id": 2240516, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2240516?v=4", - "html_url": "https:\/\/github.com\/eliuha" - }, - "html_url": "https:\/\/github.com\/eliuha\/webdav_exploit", - "description": "An exploit for Microsoft IIS 6.0 CVE-2017-7269", - "fork": false, - "created_at": "2017-03-29T05:59:30Z", - "updated_at": "2020-07-12T14:05:27Z", - "pushed_at": "2017-03-29T07:26:41Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 16, - "forks": 16, - "watchers": 16, - "score": 0 - }, { "id": 86573461, "name": "CVE-2017-7269-Echo-PoC", @@ -45,236 +22,6 @@ "watchers": 84, "score": 0 }, - { - "id": 86581754, - "name": "CVE-2017-7269-exploit", - "full_name": "caicai1355\/CVE-2017-7269-exploit", - "owner": { - "login": "caicai1355", - "id": 24385053, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24385053?v=4", - "html_url": "https:\/\/github.com\/caicai1355" - }, - "html_url": "https:\/\/github.com\/caicai1355\/CVE-2017-7269-exploit", - "description": "exec 8 bytes command", - "fork": false, - "created_at": "2017-03-29T12:52:54Z", - "updated_at": "2020-04-07T06:37:12Z", - "pushed_at": "2017-03-29T13:08:44Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 7, - "forks": 7, - "watchers": 2, - "score": 0 - }, - { - "id": 86659284, - "name": "CVE-2017-7269", - "full_name": "M1a0rz\/CVE-2017-7269", - "owner": { - "login": "M1a0rz", - "id": 25101765, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25101765?v=4", - "html_url": "https:\/\/github.com\/M1a0rz" - }, - "html_url": "https:\/\/github.com\/M1a0rz\/CVE-2017-7269", - "description": "Poc for iis6.0", - "fork": false, - "created_at": "2017-03-30T04:35:13Z", - "updated_at": "2017-03-30T04:35:13Z", - "pushed_at": "2017-03-30T04:35:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 86697845, - "name": "cve-2017-7269picture", - "full_name": "whiteHat001\/cve-2017-7269picture", - "owner": { - "login": "whiteHat001", - "id": 18191034, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18191034?v=4", - "html_url": "https:\/\/github.com\/whiteHat001" - }, - "html_url": "https:\/\/github.com\/whiteHat001\/cve-2017-7269picture", - "description": null, - "fork": false, - "created_at": "2017-03-30T12:03:05Z", - "updated_at": "2017-03-30T12:03:05Z", - "pushed_at": "2017-03-30T12:11:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 86754251, - "name": "cve-2017-7269", - "full_name": "zcgonvh\/cve-2017-7269", - "owner": { - "login": "zcgonvh", - "id": 25787677, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4", - "html_url": "https:\/\/github.com\/zcgonvh" - }, - "html_url": "https:\/\/github.com\/zcgonvh\/cve-2017-7269", - "description": "fixed msf module for cve-2017-7269", - "fork": false, - "created_at": "2017-03-30T22:20:36Z", - "updated_at": "2020-11-13T03:47:28Z", - "pushed_at": "2017-03-30T22:20:51Z", - "stargazers_count": 109, - "watchers_count": 109, - "forks_count": 60, - "forks": 60, - "watchers": 109, - "score": 0 - }, - { - "id": 87165305, - "name": "CVE-2017-7269", - "full_name": "jrrombaldo\/CVE-2017-7269", - "owner": { - "login": "jrrombaldo", - "id": 121948, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/121948?v=4", - "html_url": "https:\/\/github.com\/jrrombaldo" - }, - "html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-7269", - "description": null, - "fork": false, - "created_at": "2017-04-04T08:47:22Z", - "updated_at": "2018-01-08T16:52:30Z", - "pushed_at": "2017-04-04T17:20:50Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 87365181, - "name": "iis6-exploit-2017-CVE-2017-7269", - "full_name": "g0rx\/iis6-exploit-2017-CVE-2017-7269", - "owner": { - "login": "g0rx", - "id": 10961397, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10961397?v=4", - "html_url": "https:\/\/github.com\/g0rx" - }, - "html_url": "https:\/\/github.com\/g0rx\/iis6-exploit-2017-CVE-2017-7269", - "description": "iis6 exploit 2017 CVE-2017-7269", - "fork": false, - "created_at": "2017-04-05T23:21:12Z", - "updated_at": "2020-11-11T11:19:06Z", - "pushed_at": "2017-04-05T23:29:03Z", - "stargazers_count": 30, - "watchers_count": 30, - "forks_count": 26, - "forks": 26, - "watchers": 30, - "score": 0 - }, - { - "id": 87432387, - "name": "IIS_6.0_WebDAV_Ruby", - "full_name": "slimpagey\/IIS_6.0_WebDAV_Ruby", - "owner": { - "login": "slimpagey", - "id": 10183644, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10183644?v=4", - "html_url": "https:\/\/github.com\/slimpagey" - }, - "html_url": "https:\/\/github.com\/slimpagey\/IIS_6.0_WebDAV_Ruby", - "description": "Ruby Exploit for IIS 6.0 Buffer Overflow (CVE-2017-7269)", - "fork": false, - "created_at": "2017-04-06T13:27:20Z", - "updated_at": "2019-02-27T06:05:06Z", - "pushed_at": "2017-04-06T13:47:49Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 2, - "forks": 2, - "watchers": 6, - "score": 0 - }, - { - "id": 88148249, - "name": "cve-2017-7269", - "full_name": "homjxi0e\/cve-2017-7269", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/cve-2017-7269", - "description": null, - "fork": false, - "created_at": "2017-04-13T09:27:01Z", - "updated_at": "2017-04-13T09:27:01Z", - "pushed_at": "2017-04-13T12:33:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 89217126, - "name": "CVE-2017-7269", - "full_name": "xiaovpn\/CVE-2017-7269", - "owner": { - "login": "xiaovpn", - "id": 22736797, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22736797?v=4", - "html_url": "https:\/\/github.com\/xiaovpn" - }, - "html_url": "https:\/\/github.com\/xiaovpn\/CVE-2017-7269", - "description": "CVE-2017-7269", - "fork": false, - "created_at": "2017-04-24T08:42:59Z", - "updated_at": "2017-04-24T08:42:59Z", - "pushed_at": "2017-04-24T08:43:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 91493002, - "name": "cve-2017-7269-tool", - "full_name": "zcgonvh\/cve-2017-7269-tool", - "owner": { - "login": "zcgonvh", - "id": 25787677, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4", - "html_url": "https:\/\/github.com\/zcgonvh" - }, - "html_url": "https:\/\/github.com\/zcgonvh\/cve-2017-7269-tool", - "description": "CVE-2017-7269 to webshell or shellcode loader", - "fork": false, - "created_at": "2017-05-16T18:47:45Z", - "updated_at": "2020-09-14T21:00:11Z", - "pushed_at": "2017-05-16T18:48:15Z", - "stargazers_count": 84, - "watchers_count": 84, - "forks_count": 32, - "forks": 32, - "watchers": 84, - "score": 0 - }, { "id": 118708741, "name": "CVE-2017-7269", diff --git a/2017/CVE-2017-7472.json b/2017/CVE-2017-7472.json deleted file mode 100644 index 99f8345fb7..0000000000 --- a/2017/CVE-2017-7472.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 93704978, - "name": "CVE-2017-7472", - "full_name": "homjxi0e\/CVE-2017-7472", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7472", - "description": null, - "fork": false, - "created_at": "2017-06-08T03:47:57Z", - "updated_at": "2017-06-08T03:52:03Z", - "pushed_at": "2017-06-08T03:52:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 049470b03e..88bcad1746 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -22,29 +22,6 @@ "watchers": 174, "score": 0 }, - { - "id": 92410132, - "name": "CVE-2017-7494", - "full_name": "homjxi0e\/CVE-2017-7494", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7494", - "description": null, - "fork": false, - "created_at": "2017-05-25T14:13:10Z", - "updated_at": "2017-05-26T08:46:45Z", - "pushed_at": "2017-05-26T08:46:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, - "score": 0 - }, { "id": 92457464, "name": "exploit-CVE-2017-7494", @@ -68,52 +45,6 @@ "watchers": 253, "score": 0 }, - { - "id": 92484269, - "name": "SambaCry", - "full_name": "Waffles-2\/SambaCry", - "owner": { - "login": "Waffles-2", - "id": 21175535, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21175535?v=4", - "html_url": "https:\/\/github.com\/Waffles-2" - }, - "html_url": "https:\/\/github.com\/Waffles-2\/SambaCry", - "description": "CVE-2017-7494 - Detection Scripts", - "fork": false, - "created_at": "2017-05-26T07:28:26Z", - "updated_at": "2020-08-27T17:36:56Z", - "pushed_at": "2017-05-26T07:43:02Z", - "stargazers_count": 61, - "watchers_count": 61, - "forks_count": 24, - "forks": 24, - "watchers": 61, - "score": 0 - }, - { - "id": 92845566, - "name": "SambaHunter", - "full_name": "brianwrf\/SambaHunter", - "owner": { - "login": "brianwrf", - "id": 8141813, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4", - "html_url": "https:\/\/github.com\/brianwrf" - }, - "html_url": "https:\/\/github.com\/brianwrf\/SambaHunter", - "description": "It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).", - "fork": false, - "created_at": "2017-05-30T15:08:32Z", - "updated_at": "2020-04-07T06:25:10Z", - "pushed_at": "2017-05-30T16:13:24Z", - "stargazers_count": 40, - "watchers_count": 40, - "forks_count": 22, - "forks": 22, - "watchers": 40, - "score": 0 - }, { "id": 93424064, "name": "CVE-2017-7494", diff --git a/2017/CVE-2017-7648.json b/2017/CVE-2017-7648.json deleted file mode 100644 index 71083acee3..0000000000 --- a/2017/CVE-2017-7648.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 87845394, - "name": "CVE-2017-7648.", - "full_name": "notmot\/CVE-2017-7648.", - "owner": { - "login": "notmot", - "id": 4649277, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4649277?v=4", - "html_url": "https:\/\/github.com\/notmot" - }, - "html_url": "https:\/\/github.com\/notmot\/CVE-2017-7648.", - "description": "A writeup of CVE-2017-7648", - "fork": false, - "created_at": "2017-04-10T18:41:59Z", - "updated_at": "2017-04-10T18:47:31Z", - "pushed_at": "2017-04-10T18:42:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-8295.json b/2017/CVE-2017-8295.json index e68e211b70..3f8caa1ce5 100644 --- a/2017/CVE-2017-8295.json +++ b/2017/CVE-2017-8295.json @@ -1,50 +1,4 @@ [ - { - "id": 90299927, - "name": "CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset", - "full_name": "homjxi0e\/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset", - "description": null, - "fork": false, - "created_at": "2017-05-04T19:05:12Z", - "updated_at": "2017-05-04T19:05:12Z", - "pushed_at": "2017-05-04T19:13:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 90396412, - "name": "wp-allowed-hosts", - "full_name": "alash3al\/wp-allowed-hosts", - "owner": { - "login": "alash3al", - "id": 3078292, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/3078292?v=4", - "html_url": "https:\/\/github.com\/alash3al" - }, - "html_url": "https:\/\/github.com\/alash3al\/wp-allowed-hosts", - "description": "a plugin that protects your wp site from the CVE-2017-8295 vulnerability", - "fork": false, - "created_at": "2017-05-05T16:34:17Z", - "updated_at": "2017-05-06T06:41:07Z", - "pushed_at": "2017-05-05T17:05:15Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, { "id": 90453472, "name": "CVE-2017-8295", diff --git a/2017/CVE-2017-8382.json b/2017/CVE-2017-8382.json deleted file mode 100644 index 8ca1b2683c..0000000000 --- a/2017/CVE-2017-8382.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 91959764, - "name": "Admidio-3.2.8-CSRF-POC-by-Provensec-llc", - "full_name": "faizzaidi\/Admidio-3.2.8-CSRF-POC-by-Provensec-llc", - "owner": { - "login": "faizzaidi", - "id": 12153050, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4", - "html_url": "https:\/\/github.com\/faizzaidi" - }, - "html_url": "https:\/\/github.com\/faizzaidi\/Admidio-3.2.8-CSRF-POC-by-Provensec-llc", - "description": "Admidio 3.2.8 Cross-Site Request Forgery Assigned CVE Number: CVE-2017-8382", - "fork": false, - "created_at": "2017-05-21T13:36:51Z", - "updated_at": "2020-07-17T05:22:45Z", - "pushed_at": "2017-05-21T13:38:56Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-8543.json b/2017/CVE-2017-8543.json deleted file mode 100644 index 7c4ea901c4..0000000000 --- a/2017/CVE-2017-8543.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 94720681, - "name": "windows-security-cve-2017-8543", - "full_name": "americanhanko\/windows-security-cve-2017-8543", - "owner": { - "login": "americanhanko", - "id": 8458267, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8458267?v=4", - "html_url": "https:\/\/github.com\/americanhanko" - }, - "html_url": "https:\/\/github.com\/americanhanko\/windows-security-cve-2017-8543", - "description": "InSpec profile to verify a node is patched and compliant for CVE-2017-8543", - "fork": false, - "created_at": "2017-06-19T00:15:09Z", - "updated_at": "2017-06-19T00:16:02Z", - "pushed_at": "2017-06-19T02:07:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-8779.json b/2017/CVE-2017-8779.json deleted file mode 100644 index c809294299..0000000000 --- a/2017/CVE-2017-8779.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 90798298, - "name": "GO-RPCBOMB", - "full_name": "drbothen\/GO-RPCBOMB", - "owner": { - "login": "drbothen", - "id": 6192325, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6192325?v=4", - "html_url": "https:\/\/github.com\/drbothen" - }, - "html_url": "https:\/\/github.com\/drbothen\/GO-RPCBOMB", - "description": "CVE-2017-8779 aka RPCBomb", - "fork": false, - "created_at": "2017-05-09T22:43:10Z", - "updated_at": "2020-09-28T00:42:01Z", - "pushed_at": "2017-05-10T16:48:34Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-8917.json b/2017/CVE-2017-8917.json index 0ba4de2458..8dde55ec8d 100644 --- a/2017/CVE-2017-8917.json +++ b/2017/CVE-2017-8917.json @@ -1,27 +1,4 @@ [ - { - "id": 91819199, - "name": "Joomla3.7-SQLi-CVE-2017-8917", - "full_name": "brianwrf\/Joomla3.7-SQLi-CVE-2017-8917", - "owner": { - "login": "brianwrf", - "id": 8141813, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4", - "html_url": "https:\/\/github.com\/brianwrf" - }, - "html_url": "https:\/\/github.com\/brianwrf\/Joomla3.7-SQLi-CVE-2017-8917", - "description": "Joomla 3.7 SQL injection (CVE-2017-8917)", - "fork": false, - "created_at": "2017-05-19T15:21:46Z", - "updated_at": "2020-10-03T06:01:00Z", - "pushed_at": "2017-05-19T15:30:18Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 3, - "forks": 3, - "watchers": 8, - "score": 0 - }, { "id": 111313970, "name": "Exploit-Joomla", diff --git a/2017/CVE-2017-9430.json b/2017/CVE-2017-9430.json index da1ad4f932..fc1d44b978 100644 --- a/2017/CVE-2017-9430.json +++ b/2017/CVE-2017-9430.json @@ -1,27 +1,4 @@ [ - { - "id": 93714446, - "name": "CVE-2017-9430", - "full_name": "homjxi0e\/CVE-2017-9430", - "owner": { - "login": "homjxi0e", - "id": 25440152, - "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4", - "html_url": "https:\/\/github.com\/homjxi0e" - }, - "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9430", - "description": null, - "fork": false, - "created_at": "2017-06-08T06:22:37Z", - "updated_at": "2017-06-08T06:30:44Z", - "pushed_at": "2017-06-08T06:30:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 111662357, "name": "Dnstracer-1.9-Fix", diff --git a/2017/CVE-2017-9606.json b/2017/CVE-2017-9606.json deleted file mode 100644 index 9776aed411..0000000000 --- a/2017/CVE-2017-9606.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 94288997, - "name": "CVE-2017-9606", - "full_name": "Houl777\/CVE-2017-9606", - "owner": { - "login": "Houl777", - "id": 29420363, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29420363?v=4", - "html_url": "https:\/\/github.com\/Houl777" - }, - "html_url": "https:\/\/github.com\/Houl777\/CVE-2017-9606", - "description": null, - "fork": false, - "created_at": "2017-06-14T04:30:36Z", - "updated_at": "2017-06-14T04:30:36Z", - "pushed_at": "2017-06-14T08:15:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-9609.json b/2017/CVE-2017-9609.json deleted file mode 100644 index 1cc8637c24..0000000000 --- a/2017/CVE-2017-9609.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 94987347, - "name": "Blackcat-cms-v1.2-xss-POC-by-Provensec-llc", - "full_name": "faizzaidi\/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc", - "owner": { - "login": "faizzaidi", - "id": 12153050, - "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4", - "html_url": "https:\/\/github.com\/faizzaidi" - }, - "html_url": "https:\/\/github.com\/faizzaidi\/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc", - "description": "BlackCat-CMS-Bundle-v1.2 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-9609", - "fork": false, - "created_at": "2017-06-21T09:30:58Z", - "updated_at": "2020-07-17T05:22:42Z", - "pushed_at": "2017-06-21T09:31:13Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-9791.json b/2017/CVE-2017-9791.json index b056f9fadd..e53705b373 100644 --- a/2017/CVE-2017-9791.json +++ b/2017/CVE-2017-9791.json @@ -1,50 +1,4 @@ [ - { - "id": 96536969, - "name": "s2-048", - "full_name": "IanSmith123\/s2-048", - "owner": { - "login": "IanSmith123", - "id": 19611084, - "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19611084?v=4", - "html_url": "https:\/\/github.com\/IanSmith123" - }, - "html_url": "https:\/\/github.com\/IanSmith123\/s2-048", - "description": "Apache struts struts 2 048, CVE-2017-9791.", - "fork": false, - "created_at": "2017-07-07T12:35:55Z", - "updated_at": "2017-07-07T14:05:07Z", - "pushed_at": "2017-07-07T17:10:50Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 96565902, - "name": "Struts2-048", - "full_name": "dragoneeg\/Struts2-048", - "owner": { - "login": "dragoneeg", - "id": 4232461, - "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4232461?v=4", - "html_url": "https:\/\/github.com\/dragoneeg" - }, - "html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048", - "description": "CVE-2017-9791", - "fork": false, - "created_at": "2017-07-07T18:27:31Z", - "updated_at": "2020-10-21T14:13:27Z", - "pushed_at": "2017-07-08T02:08:36Z", - "stargazers_count": 26, - "watchers_count": 26, - "forks_count": 31, - "forks": 31, - "watchers": 26, - "score": 0 - }, { "id": 104592299, "name": "CVE-2017-9791", diff --git a/2018/CVE-2018-1111.json b/2018/CVE-2018-1111.json index a572ae20c0..cade2847a0 100644 --- a/2018/CVE-2018-1111.json +++ b/2018/CVE-2018-1111.json @@ -40,8 +40,8 @@ "pushed_at": "2018-05-21T13:10:48Z", "stargazers_count": 13, "watchers_count": 13, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 13, "score": 0 } diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 5cf61a234a..e97452f7d8 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -316,8 +316,8 @@ "pushed_at": "2019-06-13T13:07:03Z", "stargazers_count": 343, "watchers_count": 343, - "forks_count": 191, - "forks": 191, + "forks_count": 190, + "forks": 190, "watchers": 343, "score": 0 }, @@ -1071,13 +1071,13 @@ "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", - "updated_at": "2020-11-09T05:10:56Z", + "updated_at": "2020-11-15T01:59:31Z", "pushed_at": "2019-10-01T12:23:59Z", - "stargazers_count": 1125, - "watchers_count": 1125, + "stargazers_count": 1124, + "watchers_count": 1124, "forks_count": 379, "forks": 379, - "watchers": 1125, + "watchers": 1124, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 6d9661f60f..8edbda805d 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2020-11-14T20:01:56Z", + "updated_at": "2020-11-15T02:48:34Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 218, - "watchers_count": 218, + "stargazers_count": 219, + "watchers_count": 219, "forks_count": 85, "forks": 85, - "watchers": 218, + "watchers": 219, "score": 0 }, { diff --git a/2020/CVE-2020-2546.json b/2020/CVE-2020-2546.json index 3bf2ec60db..516ae0440a 100644 --- a/2020/CVE-2020-2546.json +++ b/2020/CVE-2020-2546.json @@ -13,13 +13,13 @@ "description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,", "fork": false, "created_at": "2020-03-02T15:54:46Z", - "updated_at": "2020-11-02T17:14:36Z", + "updated_at": "2020-11-14T22:28:46Z", "pushed_at": "2020-06-10T10:49:38Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "forks_count": 27, "forks": 27, - "watchers": 115, + "watchers": 116, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 48b813d91f..122a0812e4 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -82,13 +82,13 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2020-11-13T23:40:30Z", + "updated_at": "2020-11-15T00:56:43Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 189, - "watchers_count": 189, + "stargazers_count": 190, + "watchers_count": 190, "forks_count": 26, "forks": 26, - "watchers": 189, + "watchers": 190, "score": 0 }, { diff --git a/2020/CVE-2020-4040.json b/2020/CVE-2020-4040.json new file mode 100644 index 0000000000..ccf36e19f7 --- /dev/null +++ b/2020/CVE-2020-4040.json @@ -0,0 +1,25 @@ +[ + { + "id": 312934644, + "name": "RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041", + "full_name": "jpvispo\/RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041", + "owner": { + "login": "jpvispo", + "id": 11736106, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11736106?v=4", + "html_url": "https:\/\/github.com\/jpvispo" + }, + "html_url": "https:\/\/github.com\/jpvispo\/RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041", + "description": null, + "fork": false, + "created_at": "2020-11-15T01:23:12Z", + "updated_at": "2020-11-15T01:33:08Z", + "pushed_at": "2020-11-15T01:33:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-7661.json b/2020/CVE-2020-7661.json index 803a33b056..6bfc648700 100644 --- a/2020/CVE-2020-7661.json +++ b/2020/CVE-2020-7661.json @@ -13,13 +13,13 @@ "description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.", "fork": false, "created_at": "2020-08-15T07:42:50Z", - "updated_at": "2020-10-12T06:24:29Z", + "updated_at": "2020-11-15T01:36:30Z", "pushed_at": "2020-10-19T18:03:23Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 2, "forks": 2, - "watchers": 13, + "watchers": 14, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index d042fd36a3..dde1c0845c 100644 --- a/README.md +++ b/README.md @@ -794,6 +794,14 @@ VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x be - [aaronsvk/CVE-2020-3956](https://github.com/aaronsvk/CVE-2020-3956) +### CVE-2020-4040 (2020-06-08) + + +Bolt CMS before version 3.7.1 lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. This has been fixed in Bolt 3.7.1 + + +- [jpvispo/RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041](https://github.com/jpvispo/RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041) + ### CVE-2020-4276 (2020-03-26) @@ -9731,22 +9739,6 @@ The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Serv - [sheri31/0005poc](https://github.com/sheri31/0005poc) -### CVE-2017-0038 (2017-02-20) - - -gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3216, CVE-2016-3219, and/or CVE-2016-3220. - - -- [k0keoyo/CVE-2017-0038-EXP-C-JS](https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS) - -### CVE-2017-0065 (2017-03-16) - - -Microsoft Edge allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0011, CVE-2017-0017, and CVE-2017-0068. - - -- [Dankirk/cve-2017-0065](https://github.com/Dankirk/cve-2017-0065) - ### CVE-2017-0075 (2017-03-16) @@ -9755,29 +9747,12 @@ Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows - [4B5F5F4B/HyperV](https://github.com/4B5F5F4B/HyperV) -### CVE-2017-0106 (2017-04-12) - - -Microsoft Excel 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." - - -- [ryhanson/CVE-2017-0106](https://github.com/ryhanson/CVE-2017-0106) - -### CVE-2017-0108 (2017-03-16) - - -The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0014. - - -- [homjxi0e/CVE-2017-0108](https://github.com/homjxi0e/CVE-2017-0108) - ### CVE-2017-0143 (2017-03-16) The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. -- [valarauco/wannafind](https://github.com/valarauco/wannafind) - [6A0BCD80/Etern-blue-Windows-7-Checker](https://github.com/6A0BCD80/Etern-blue-Windows-7-Checker) ### CVE-2017-0144 (2017-03-16) @@ -9789,32 +9764,13 @@ The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 - [peterpt/eternal_scanner](https://github.com/peterpt/eternal_scanner) - [kimocoder/eternalblue](https://github.com/kimocoder/eternalblue) -### CVE-2017-0145 (2017-03-16) - - -The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148. - - -- [MelonSmasher/chef_tissues](https://github.com/MelonSmasher/chef_tissues) - ### CVE-2017-0199 (2017-04-12) Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API." -- [ryhanson/CVE-2017-0199](https://github.com/ryhanson/CVE-2017-0199) -- [SyFi/cve-2017-0199](https://github.com/SyFi/cve-2017-0199) - [bhdresh/CVE-2017-0199](https://github.com/bhdresh/CVE-2017-0199) -- [NotAwful/CVE-2017-0199-Fix](https://github.com/NotAwful/CVE-2017-0199-Fix) -- [haibara3839/CVE-2017-0199-master](https://github.com/haibara3839/CVE-2017-0199-master) -- [Exploit-install/CVE-2017-0199](https://github.com/Exploit-install/CVE-2017-0199) -- [zakybstrd21215/PoC-CVE-2017-0199](https://github.com/zakybstrd21215/PoC-CVE-2017-0199) -- [n1shant-sinha/CVE-2017-0199](https://github.com/n1shant-sinha/CVE-2017-0199) -- [kn0wm4d/htattack](https://github.com/kn0wm4d/htattack) -- [joke998/Cve-2017-0199](https://github.com/joke998/Cve-2017-0199) -- [joke998/Cve-2017-0199-](https://github.com/joke998/Cve-2017-0199-) -- [sUbc0ol/Microsoft-Word-CVE-2017-0199-](https://github.com/sUbc0ol/Microsoft-Word-CVE-2017-0199-) - [viethdgit/CVE-2017-0199](https://github.com/viethdgit/CVE-2017-0199) - [nicpenning/RTF-Cleaner](https://github.com/nicpenning/RTF-Cleaner) - [bloomer1016/2017-11-17-Maldoc-Using-CVE-2017-0199](https://github.com/bloomer1016/2017-11-17-Maldoc-Using-CVE-2017-0199) @@ -9822,22 +9778,12 @@ Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, - [likescam/CVE-2017-0199](https://github.com/likescam/CVE-2017-0199) - [stealth-ronin/CVE-2017-0199-PY-KIT](https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT) -### CVE-2017-0204 (2017-04-12) - - -Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to bypass the Office Protected View via a specially crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability." - - -- [ryhanson/CVE-2017-0204](https://github.com/ryhanson/CVE-2017-0204) - ### CVE-2017-0213 (2017-05-12) Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when an attacker runs a specially crafted application, aka "Windows COM Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-0214. -- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-) -- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213) - [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213) - [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213) - [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213) @@ -9869,14 +9815,6 @@ The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows - [R06otMD5/cve-2017-0263-poc](https://github.com/R06otMD5/cve-2017-0263-poc) -### CVE-2017-0290 (2017-05-09) - - -The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 does not properly scan a specially crafted file leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." - - -- [homjxi0e/CVE-2017-0290-](https://github.com/homjxi0e/CVE-2017-0290-) - ### CVE-2017-0411 (2017-02-08) @@ -9891,7 +9829,6 @@ An elevation of privilege vulnerability in the Framework APIs could enable a loc A remote code execution vulnerability in the Framesequence library could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses the Framesequence library. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33718716. -- [JiounDai/CVE-2017-0478](https://github.com/JiounDai/CVE-2017-0478) - [likescam/CVE-2017-0478](https://github.com/likescam/CVE-2017-0478) ### CVE-2017-0541 (2017-04-07) @@ -9900,7 +9837,6 @@ A remote code execution vulnerability in the Framesequence library could enable A remote code execution vulnerability in sonivox in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-34031018. -- [JiounDai/CVE-2017-0541](https://github.com/JiounDai/CVE-2017-0541) - [likescam/CVE-2017-0541](https://github.com/likescam/CVE-2017-0541) ### CVE-2017-0554 (2017-04-07) @@ -9983,9 +9919,6 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app. -- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe) -- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe) -- [Rootkitsmm/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm/extra_recipe-iOS-10.2) - [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370) ### CVE-2017-2388 (2017-04-01) @@ -9996,14 +9929,6 @@ An issue was discovered in certain Apple products. macOS before 10.12.4 is affec - [bazad/IOFireWireFamily-null-deref](https://github.com/bazad/IOFireWireFamily-null-deref) -### CVE-2017-2636 (2017-03-07) - - -Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline. - - -- [alexzorin/cve-2017-2636-el](https://github.com/alexzorin/cve-2017-2636-el) - ### CVE-2017-2666 (2018-07-27) @@ -10012,14 +9937,6 @@ It was discovered in Undertow that the code that parsed the HTTP request line pe - [tafamace/CVE-2017-2666](https://github.com/tafamace/CVE-2017-2666) -### CVE-2017-2671 (2017-04-05) - - -The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call. - - -- [homjxi0e/CVE-2017-2671](https://github.com/homjxi0e/CVE-2017-2671) - ### CVE-2017-2751 (2018-10-03) @@ -10028,14 +9945,6 @@ A BIOS password extraction vulnerability has been reported on certain consumer n - [BaderSZ/CVE-2017-2751](https://github.com/BaderSZ/CVE-2017-2751) -### CVE-2017-2793 (2017-05-23) - - -An exploitable heap corruption vulnerability exists in the UnCompressUnicode functionality of Antenna House DMC HTMLFilter used by MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious XLS file to trigger this vulnerability. - - -- [sUbc0ol/Detection-for-CVE-2017-2793](https://github.com/sUbc0ol/Detection-for-CVE-2017-2793) - ### CVE-2017-3000 (2017-03-14) @@ -10053,14 +9962,6 @@ Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, - [codewhitesec/ColdFusionPwn](https://github.com/codewhitesec/ColdFusionPwn) - [cucadili/CVE-2017-3066](https://github.com/cucadili/CVE-2017-3066) -### CVE-2017-3078 (2017-06-20) - - -Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution. - - -- [homjxi0e/CVE-2017-3078](https://github.com/homjxi0e/CVE-2017-3078) - ### CVE-2017-3143 (2019-01-16) @@ -10094,21 +9995,12 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [ianxtianxt/CVE-2017-3506](https://github.com/ianxtianxt/CVE-2017-3506) -### CVE-2017-3599 (2017-04-24) - - -Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet. - - -- [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599) - ### CVE-2017-3730 (2017-05-04) In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack. -- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730) - [ymmah/OpenSSL-CVE-2017-3730](https://github.com/ymmah/OpenSSL-CVE-2017-3730) ### CVE-2017-3881 (2017-03-17) @@ -10117,10 +10009,6 @@ In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters fo A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893. -- [artkond/cisco-rce](https://github.com/artkond/cisco-rce) -- [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-) -- [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco) -- [zakybstrd21215/PoC-CVE-2017-3881](https://github.com/zakybstrd21215/PoC-CVE-2017-3881) - [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881) ### CVE-2017-4490 @@ -10138,14 +10026,6 @@ An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications t - [cved-sources/cve-2017-4971](https://github.com/cved-sources/cve-2017-4971) -### CVE-2017-5005 (2017-01-02) - - -Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earlier, Total Security 10.1.0.316 and earlier, and AntiVirus Pro 10.1.0.316 and earlier on OS X allows remote attackers to execute arbitrary code via a crafted LC_UNIXTHREAD.cmdsize field in a Mach-O file that is mishandled during a Security Scan (aka Custom Scan) operation. - - -- [payatu/QuickHeal](https://github.com/payatu/QuickHeal) - ### CVE-2017-5007 (2017-02-17) @@ -10177,82 +10057,32 @@ An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method a - [cscli/CVE-2017-5223](https://github.com/cscli/CVE-2017-5223) -### CVE-2017-5415 (2018-06-11) - - -An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and further spoofing attacks. This vulnerability affects Firefox < 52. - - -- [649/CVE-2017-5415](https://github.com/649/CVE-2017-5415) - ### CVE-2017-5487 (2017-01-14) wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. -- [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan) - [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan) - [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487) - [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit) -### CVE-2017-5633 (2017-03-06) - - -Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs. - - -- [cardangi/Exploit-CVE-2017-5633](https://github.com/cardangi/Exploit-CVE-2017-5633) - ### CVE-2017-5638 (2017-03-10) The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. -- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045) -- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp) -- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638) -- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS) -- [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro) -- [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638) -- [immunio/apache-struts2-CVE-2017-5638](https://github.com/immunio/apache-struts2-CVE-2017-5638) -- [Masahiro-Yamada/OgnlContentTypeRejectorValve](https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValve) -- [aljazceru/CVE-2017-5638-Apache-Struts2](https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2) -- [sjitech/test_struts2_vulnerability_CVE-2017-5638](https://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638) -- [jrrombaldo/CVE-2017-5638](https://github.com/jrrombaldo/CVE-2017-5638) -- [random-robbie/CVE-2017-5638](https://github.com/random-robbie/CVE-2017-5638) - [initconf/CVE-2017-5638_struts](https://github.com/initconf/CVE-2017-5638_struts) - [mazen160/struts-pwn](https://github.com/mazen160/struts-pwn) -- [ret2jazzy/Struts-Apache-ExploitPack](https://github.com/ret2jazzy/Struts-Apache-ExploitPack) -- [lolwaleet/ExpStruts](https://github.com/lolwaleet/ExpStruts) -- [oktavianto/CVE-2017-5638-Apache-Struts2](https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2) -- [jrrdev/cve-2017-5638](https://github.com/jrrdev/cve-2017-5638) -- [opt9/Strutshock](https://github.com/opt9/Strutshock) -- [falcon-lnhg/StrutsShell](https://github.com/falcon-lnhg/StrutsShell) -- [bhagdave/CVE-2017-5638](https://github.com/bhagdave/CVE-2017-5638) - [jas502n/st2-046-poc](https://github.com/jas502n/st2-046-poc) -- [KarzsGHR/S2-046_S2-045_POC](https://github.com/KarzsGHR/S2-046_S2-045_POC) -- [gsfish/S2-Reaper](https://github.com/gsfish/S2-Reaper) -- [mcassano/cve-2017-5638](https://github.com/mcassano/cve-2017-5638) -- [opt9/Strutscli](https://github.com/opt9/Strutscli) - [tahmed11/strutsy](https://github.com/tahmed11/strutsy) -- [payatu/CVE-2017-5638](https://github.com/payatu/CVE-2017-5638) -- [Aasron/Struts2-045-Exp](https://github.com/Aasron/Struts2-045-Exp) - [SpiderMate/Stutsfi](https://github.com/SpiderMate/Stutsfi) -- [jpacora/Struts2Shell](https://github.com/jpacora/Struts2Shell) -- [AndreasKl/CVE-2017-5638](https://github.com/AndreasKl/CVE-2017-5638) -- [riyazwalikar/struts-rce-cve-2017-5638](https://github.com/riyazwalikar/struts-rce-cve-2017-5638) -- [homjxi0e/CVE-2017-5638](https://github.com/homjxi0e/CVE-2017-5638) -- [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638) -- [sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner) -- [sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638) - [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-) - [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638) - [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner) - [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser) - [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638) -- [c002/Apache-Struts](https://github.com/c002/Apache-Struts) - [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit) - [grant100/cybersecurity-struts2](https://github.com/grant100/cybersecurity-struts2) - [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638) @@ -10284,9 +10114,7 @@ In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT). -- [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689) - [x1sec/amthoneypot](https://github.com/x1sec/amthoneypot) -- [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass) - [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc) ### CVE-2017-5693 (2018-07-31) @@ -10399,14 +10227,6 @@ D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DG - [varangamin/CVE-2017-6206](https://github.com/varangamin/CVE-2017-6206) -### CVE-2017-6370 (2017-03-17) - - -TYPO3 7.6.15 sends an http request to an index.php?loginProvider URI in cases with an https Referer, which allows remote attackers to obtain sensitive cleartext information by sniffing the network and reading the userident and username fields. - - -- [faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request](https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request) - ### CVE-2017-6558 (2017-03-09) @@ -10446,7 +10266,6 @@ Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6. AlienVault USM and OSSIM before 5.3.7 and NfSen before 1.3.8 allow remote authenticated users to execute arbitrary commands in a privileged context, or launch a reverse shell, via vectors involving the PHP session ID and the NfSen PHP code, aka AlienVault ID ENG-104862. -- [patrickfreed/nfsen-exploit](https://github.com/patrickfreed/nfsen-exploit) - [KeyStrOke95/nfsen_1.3.7_CVE-2017-6971](https://github.com/KeyStrOke95/nfsen_1.3.7_CVE-2017-6971) ### CVE-2017-7038 (2017-07-20) @@ -10508,32 +10327,13 @@ The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel - [rockl/cve-2017-7184](https://github.com/rockl/cve-2017-7184) - [rockl/cve-2017-7184-bak](https://github.com/rockl/cve-2017-7184-bak) -### CVE-2017-7188 (2017-04-14) - - -Zurmo 3.1.1 Stable allows a Cross-Site Scripting (XSS) attack with a base64-encoded SCRIPT element within a data: URL in the returnUrl parameter to default/toggleCollapse. - - -- [faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC](https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC) - ### CVE-2017-7269 (2017-03-26) Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016. -- [eliuha/webdav_exploit](https://github.com/eliuha/webdav_exploit) - [lcatro/CVE-2017-7269-Echo-PoC](https://github.com/lcatro/CVE-2017-7269-Echo-PoC) -- [caicai1355/CVE-2017-7269-exploit](https://github.com/caicai1355/CVE-2017-7269-exploit) -- [M1a0rz/CVE-2017-7269](https://github.com/M1a0rz/CVE-2017-7269) -- [whiteHat001/cve-2017-7269picture](https://github.com/whiteHat001/cve-2017-7269picture) -- [zcgonvh/cve-2017-7269](https://github.com/zcgonvh/cve-2017-7269) -- [jrrombaldo/CVE-2017-7269](https://github.com/jrrombaldo/CVE-2017-7269) -- [g0rx/iis6-exploit-2017-CVE-2017-7269](https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269) -- [slimpagey/IIS_6.0_WebDAV_Ruby](https://github.com/slimpagey/IIS_6.0_WebDAV_Ruby) -- [homjxi0e/cve-2017-7269](https://github.com/homjxi0e/cve-2017-7269) -- [xiaovpn/CVE-2017-7269](https://github.com/xiaovpn/CVE-2017-7269) -- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool) - [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269) - [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269) @@ -10553,14 +10353,6 @@ Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by - [brahmstaedt/libxml2-exploit](https://github.com/brahmstaedt/libxml2-exploit) -### CVE-2017-7472 (2017-05-11) - - -The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls. - - -- [homjxi0e/CVE-2017-7472](https://github.com/homjxi0e/CVE-2017-7472) - ### CVE-2017-7494 (2017-05-30) @@ -10568,10 +10360,7 @@ Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to r - [betab0t/cve-2017-7494](https://github.com/betab0t/cve-2017-7494) -- [homjxi0e/CVE-2017-7494](https://github.com/homjxi0e/CVE-2017-7494) - [opsxcq/exploit-CVE-2017-7494](https://github.com/opsxcq/exploit-CVE-2017-7494) -- [Waffles-2/SambaCry](https://github.com/Waffles-2/SambaCry) -- [brianwrf/SambaHunter](https://github.com/brianwrf/SambaHunter) - [joxeankoret/CVE-2017-7494](https://github.com/joxeankoret/CVE-2017-7494) - [Zer0d0y/Samba-CVE-2017-7494](https://github.com/Zer0d0y/Samba-CVE-2017-7494) - [incredible1yu/CVE-2017-7494](https://github.com/incredible1yu/CVE-2017-7494) @@ -10608,14 +10397,6 @@ Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer - [cyberharsh/nginx-CVE-2017-7529](https://github.com/cyberharsh/nginx-CVE-2017-7529) - [daehee/nginx-overflow](https://github.com/daehee/nginx-overflow) -### CVE-2017-7648 (2017-04-10) - - -Foscam networked devices use the same hardcoded SSL private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation. - - -- [notmot/CVE-2017-7648.](https://github.com/notmot/CVE-2017-7648.) - ### CVE-2017-7679 (2017-06-19) @@ -10673,18 +10454,8 @@ Malicious PATCH requests submitted to servers using Spring Data REST versions pr WordPress through 4.7.4 relies on the Host HTTP header for a password-reset e-mail message, which makes it easier for remote attackers to reset arbitrary passwords by making a crafted wp-login.php?action=lostpassword request and then arranging for this message to bounce or be resent, leading to transmission of the reset key to a mailbox on an attacker-controlled SMTP server. This is related to problematic use of the SERVER_NAME variable in wp-includes/pluggable.php in conjunction with the PHP mail function. Exploitation is not achievable in all cases because it requires at least one of the following: (1) the attacker can prevent the victim from receiving any e-mail messages for an extended period of time (such as 5 days), (2) the victim's e-mail system sends an autoresponse containing the original message, or (3) the victim manually composes a reply containing the original message. -- [homjxi0e/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset](https://github.com/homjxi0e/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset) -- [alash3al/wp-allowed-hosts](https://github.com/alash3al/wp-allowed-hosts) - [cyberheartmi9/CVE-2017-8295](https://github.com/cyberheartmi9/CVE-2017-8295) -### CVE-2017-8382 (2017-05-16) - - -admidio 3.2.8 has CSRF in adm_program/modules/members/members_function.php with an impact of deleting arbitrary user accounts. - - -- [faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc](https://github.com/faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc) - ### CVE-2017-8464 (2017-06-14) @@ -10714,14 +10485,6 @@ Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Window - [Lynggaard91/windows2016fixCVE-2017-8529](https://github.com/Lynggaard91/windows2016fixCVE-2017-8529) - [sfitpro/cve-2017-8529](https://github.com/sfitpro/cve-2017-8529) -### CVE-2017-8543 (2017-06-14) - - -Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to take control of the affected system when Windows Search fails to handle objects in memory, aka "Windows Search Remote Code Execution Vulnerability". - - -- [americanhanko/windows-security-cve-2017-8543](https://github.com/americanhanko/windows-security-cve-2017-8543) - ### CVE-2017-8570 (2017-07-11) @@ -10785,14 +10548,6 @@ An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is X - [Voraka/cve-2017-8760](https://github.com/Voraka/cve-2017-8760) -### CVE-2017-8779 (2017-05-04) - - -rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. - - -- [drbothen/GO-RPCBOMB](https://github.com/drbothen/GO-RPCBOMB) - ### CVE-2017-8802 (2018-01-16) @@ -10825,7 +10580,6 @@ The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary SQL commands via unspecified vectors. -- [brianwrf/Joomla3.7-SQLi-CVE-2017-8917](https://github.com/brianwrf/Joomla3.7-SQLi-CVE-2017-8917) - [stefanlucas/Exploit-Joomla](https://github.com/stefanlucas/Exploit-Joomla) - [cved-sources/cve-2017-8917](https://github.com/cved-sources/cve-2017-8917) @@ -10870,7 +10624,6 @@ Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute arbitrary code vi Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string. -- [homjxi0e/CVE-2017-9430](https://github.com/homjxi0e/CVE-2017-9430) - [j0lama/Dnstracer-1.9-Fix](https://github.com/j0lama/Dnstracer-1.9-Fix) ### CVE-2017-9476 (2017-07-30) @@ -10906,22 +10659,6 @@ An information exposure vulnerability in forget_passwd.cgi in Synology DiskStati - [rfcl/Synology-DiskStation-User-Enumeration-CVE-2017-9554-](https://github.com/rfcl/Synology-DiskStation-User-Enumeration-CVE-2017-9554-) -### CVE-2017-9606 (2017-06-14) - - -Infotecs ViPNet Client and Coordinator before 4.3.2-42442 allow local users to gain privileges by placing a Trojan horse ViPNet update file in the update folder. The attack succeeds because of incorrect folder permissions in conjunction with a lack of integrity and authenticity checks. - - -- [Houl777/CVE-2017-9606](https://github.com/Houl777/CVE-2017-9606) - -### CVE-2017-9609 (2017-07-17) - - -Cross-site scripting (XSS) vulnerability in Blackcat CMS 1.2 allows remote authenticated users to inject arbitrary web script or HTML via the map_language parameter to backend/pages/lang_settings.php. - - -- [faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc](https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc) - ### CVE-2017-9769 (2017-08-02) @@ -10945,8 +10682,6 @@ OCaml compiler allows attackers to have unspecified impact via unknown vectors, The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. -- [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048) -- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048) - [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791) ### CVE-2017-9798 (2017-09-18) @@ -11754,9 +11489,6 @@ An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VN ### CVE-2017-98505 - [mike-williams/Struts2Vuln](https://github.com/mike-williams/Struts2Vuln) -### CVE-2017-1000000 -- [smythtech/DWF-CVE-2017-1000000](https://github.com/smythtech/DWF-CVE-2017-1000000) - ### CVE-2017-1000083 (2017-09-05) @@ -11841,16 +11573,6 @@ Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerab - [vulhub/CVE-2017-1000353](https://github.com/vulhub/CVE-2017-1000353) -### CVE-2017-1000367 (2017-06-05) - - -Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution. - - -- [c0d3z3r0/sudo-CVE-2017-1000367](https://github.com/c0d3z3r0/sudo-CVE-2017-1000367) -- [homjxi0e/CVE-2017-1000367](https://github.com/homjxi0e/CVE-2017-1000367) -- [pucerpocok/sudo_exploit](https://github.com/pucerpocok/sudo_exploit) - ### CVE-2017-1000405 (2017-11-30) @@ -15893,6 +15615,22 @@ March Networks DVR 3204 stores sensitive information under the web root with ins ## 2006 +### CVE-2006-0187 (2006-01-12) + + +By design, Microsoft Visual Studio 2005 automatically executes code in the Load event of a user-defined control (UserControl1_Load function), which allows user-assisted attackers to execute arbitrary code by tricking the user into opening a malicious Visual Studio project file. + + +- [j0ndoe/CVE-2006-0187](https://github.com/j0ndoe/CVE-2006-0187) + +### CVE-2006-0450 (2006-01-26) + + +phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database. + + +- [Parcer0/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities](https://github.com/Parcer0/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities) + ### CVE-2006-1236 (2006-03-14) @@ -15901,6 +15639,15 @@ Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 all - [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236) +### CVE-2006-3392 (2006-07-06) + + +Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274. + + +- [Ziani52/CVE-2006-3392](https://github.com/Ziani52/CVE-2006-3392) +- [notclement/cve-2006-3392](https://github.com/notclement/cve-2006-3392) + ### CVE-2006-3592 (2006-07-14) @@ -15933,6 +15680,15 @@ The mincore function in the Linux kernel before 2.4.33.6 does not properly lock - [tagatac/linux-CVE-2006-4814](https://github.com/tagatac/linux-CVE-2006-4814) +### CVE-2006-6184 (2006-11-30) + + +Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command. + + +- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184) +- [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184) + ## 2005 ### CVE-2005-0603 (2005-03-01)