Auto Update 2021/01/05 12:09:50

This commit is contained in:
motikan2010-bot 2021-01-05 12:09:50 +09:00
parent 97bf456916
commit 4ee68a4984
125 changed files with 7050 additions and 47 deletions

View file

@ -1,4 +1,27 @@
[
{
"id": 174814901,
"name": "CVE-2019-0192",
"full_name": "mpgn\/CVE-2019-0192",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-0192",
"description": "RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl",
"fork": false,
"created_at": "2019-03-10T11:35:26Z",
"updated_at": "2020-12-10T09:41:40Z",
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 210,
"watchers_count": 210,
"forks_count": 60,
"forks": 60,
"watchers": 210,
"score": 0
},
{
"id": 218993619,
"name": "Solr-RCE-CVE-2019-0192",

View file

@ -1,4 +1,27 @@
[
{
"id": 176290079,
"name": "CVE-2019-0193",
"full_name": "xConsoIe\/CVE-2019-0193",
"owner": {
"login": "xConsoIe",
"id": 48456709,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48456709?v=4",
"html_url": "https:\/\/github.com\/xConsoIe"
},
"html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193",
"description": null,
"fork": false,
"created_at": "2019-03-18T13:18:01Z",
"updated_at": "2020-11-29T10:18:07Z",
"pushed_at": "2019-03-18T13:22:48Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"forks": 7,
"watchers": 8,
"score": 0
},
{
"id": 201405406,
"name": "CVE-2019-0193",

25
2019/CVE-2019-0211.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 186238849,
"name": "Apache-Exploit-2019",
"full_name": "ozkanbilge\/Apache-Exploit-2019",
"owner": {
"login": "ozkanbilge",
"id": 39211596,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/39211596?v=4",
"html_url": "https:\/\/github.com\/ozkanbilge"
},
"html_url": "https:\/\/github.com\/ozkanbilge\/Apache-Exploit-2019",
"description": "CVE-2019-0211-apache & CVE-2019-6977-imagecolormatch",
"fork": false,
"created_at": "2019-05-12T10:08:57Z",
"updated_at": "2020-10-28T12:43:15Z",
"pushed_at": "2019-05-12T10:09:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"forks": 7,
"watchers": 11,
"score": 0
}
]

View file

@ -22,6 +22,52 @@
"watchers": 177,
"score": 0
},
{
"id": 181706868,
"name": "CVE-2019-0232",
"full_name": "jas502n\/CVE-2019-0232",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0232",
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
"fork": false,
"created_at": "2019-04-16T14:32:03Z",
"updated_at": "2020-12-23T03:59:42Z",
"pushed_at": "2019-04-17T02:42:03Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 25,
"forks": 25,
"watchers": 62,
"score": 0
},
{
"id": 188168912,
"name": "CVE-2019-0232-EXP",
"full_name": "CherishHair\/CVE-2019-0232-EXP",
"owner": {
"login": "CherishHair",
"id": 16273668,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/16273668?v=4",
"html_url": "https:\/\/github.com\/CherishHair"
},
"html_url": "https:\/\/github.com\/CherishHair\/CVE-2019-0232-EXP",
"description": null,
"fork": false,
"created_at": "2019-05-23T05:44:29Z",
"updated_at": "2019-11-27T11:05:38Z",
"pushed_at": "2019-05-23T13:13:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 223192188,
"name": "CVE-2019-0232",

25
2019/CVE-2019-0539.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 196580913,
"name": "CVE-2019-0539",
"full_name": "0x43434343\/CVE-2019-0539",
"owner": {
"login": "0x43434343",
"id": 28482599,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28482599?v=4",
"html_url": "https:\/\/github.com\/0x43434343"
},
"html_url": "https:\/\/github.com\/0x43434343\/CVE-2019-0539",
"description": "R\/W ",
"fork": false,
"created_at": "2019-07-12T13:06:17Z",
"updated_at": "2020-06-15T12:29:01Z",
"pushed_at": "2019-07-12T13:18:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 177246255,
"name": "CVE-2019-0604",
"full_name": "linhlhq\/CVE-2019-0604",
"owner": {
"login": "linhlhq",
"id": 28854132,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28854132?v=4",
"html_url": "https:\/\/github.com\/linhlhq"
},
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2020-11-27T05:27:48Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 78,
"forks": 78,
"watchers": 129,
"score": 0
},
{
"id": 179413290,
"name": "CVE-2019-0604_sharepoint_CVE",
"full_name": "likescam\/CVE-2019-0604_sharepoint_CVE",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-0604_sharepoint_CVE",
"description": null,
"fork": false,
"created_at": "2019-04-04T03:17:30Z",
"updated_at": "2019-04-04T03:17:59Z",
"pushed_at": "2019-04-04T03:17:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 193926769,
"name": "CVE-2019-0604",

25
2019/CVE-2019-0678.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 197764635,
"name": "CVE-2019-0678",
"full_name": "c0d3G33k\/CVE-2019-0678",
"owner": {
"login": "c0d3G33k",
"id": 16446505,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16446505?v=4",
"html_url": "https:\/\/github.com\/c0d3G33k"
},
"html_url": "https:\/\/github.com\/c0d3G33k\/CVE-2019-0678",
"description": "Microsoft Edge Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2019-07-19T11:55:32Z",
"updated_at": "2019-07-19T12:15:21Z",
"pushed_at": "2019-07-19T12:15:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

File diff suppressed because it is too large Load diff

48
2019/CVE-2019-0709.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 189502228,
"name": "CVE-2019-0709",
"full_name": "YHZX2013\/CVE-2019-0709",
"owner": {
"login": "YHZX2013",
"id": 17893549,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17893549?v=4",
"html_url": "https:\/\/github.com\/YHZX2013"
},
"html_url": "https:\/\/github.com\/YHZX2013\/CVE-2019-0709",
"description": "CVE-2019-0708 Exploit using Python",
"fork": false,
"created_at": "2019-05-31T00:48:49Z",
"updated_at": "2020-11-03T10:44:32Z",
"pushed_at": "2019-05-30T22:52:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 189527128,
"name": "CVE-2019-0709",
"full_name": "qq431169079\/CVE-2019-0709",
"owner": {
"login": "qq431169079",
"id": 42376039,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/42376039?v=4",
"html_url": "https:\/\/github.com\/qq431169079"
},
"html_url": "https:\/\/github.com\/qq431169079\/CVE-2019-0709",
"description": "Exploit In Progress",
"fork": false,
"created_at": "2019-05-31T04:23:39Z",
"updated_at": "2020-11-03T11:02:24Z",
"pushed_at": "2019-05-26T15:25:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2019/CVE-2019-0768.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 188212551,
"name": "ie11_vbscript_exploit",
"full_name": "ruthlezs\/ie11_vbscript_exploit",
"owner": {
"login": "ruthlezs",
"id": 15887791,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
"html_url": "https:\/\/github.com\/ruthlezs"
},
"html_url": "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit",
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
"fork": false,
"created_at": "2019-05-23T10:28:40Z",
"updated_at": "2020-09-18T13:59:25Z",
"pushed_at": "2019-05-23T11:26:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
}
]

25
2019/CVE-2019-0785.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 196208560,
"name": "CVE-2019-0785",
"full_name": "Jaky5155\/CVE-2019-0785",
"owner": {
"login": "Jaky5155",
"id": 47801640,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/47801640?v=4",
"html_url": "https:\/\/github.com\/Jaky5155"
},
"html_url": "https:\/\/github.com\/Jaky5155\/CVE-2019-0785",
"description": "CVE-2019-0785",
"fork": false,
"created_at": "2019-07-10T13:16:42Z",
"updated_at": "2020-04-05T09:53:47Z",
"pushed_at": "2019-07-10T13:18:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2019/CVE-2019-0803.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 187201710,
"name": "CVE-2019-0803",
"full_name": "ExpLife0011\/CVE-2019-0803",
"owner": {
"login": "ExpLife0011",
"id": 37372761,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37372761?v=4",
"html_url": "https:\/\/github.com\/ExpLife0011"
},
"html_url": "https:\/\/github.com\/ExpLife0011\/CVE-2019-0803",
"description": "Win32k Elevation of Privilege Poc",
"fork": false,
"created_at": "2019-05-17T11:05:22Z",
"updated_at": "2020-09-30T07:16:14Z",
"pushed_at": "2019-05-17T10:53:29Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 67,
"forks": 67,
"watchers": 75,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 177576776,
"name": "cve-2019-0808-poc",
"full_name": "ze0r\/cve-2019-0808-poc",
"owner": {
"login": "ze0r",
"id": 43227253,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43227253?v=4",
"html_url": "https:\/\/github.com\/ze0r"
},
"html_url": "https:\/\/github.com\/ze0r\/cve-2019-0808-poc",
"description": "cve-2019-0808-poc",
"fork": false,
"created_at": "2019-03-25T11:53:35Z",
"updated_at": "2020-12-23T12:17:23Z",
"pushed_at": "2019-03-25T12:10:40Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 19,
"forks": 19,
"watchers": 43,
"score": 0
},
{
"id": 182577297,
"name": "CVE-2019-0808",
"full_name": "rakesh143\/CVE-2019-0808",
"owner": {
"login": "rakesh143",
"id": 12870599,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12870599?v=4",
"html_url": "https:\/\/github.com\/rakesh143"
},
"html_url": "https:\/\/github.com\/rakesh143\/CVE-2019-0808",
"description": null,
"fork": false,
"created_at": "2019-04-21T20:04:34Z",
"updated_at": "2019-04-21T20:07:45Z",
"pushed_at": "2019-04-21T20:07:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 187227372,
"name": "CVE-2019-0808",
"full_name": "exodusintel\/CVE-2019-0808",
"owner": {
"login": "exodusintel",
"id": 16653014,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16653014?v=4",
"html_url": "https:\/\/github.com\/exodusintel"
},
"html_url": "https:\/\/github.com\/exodusintel\/CVE-2019-0808",
"description": "Win32k Exploit by Grant Willcox",
"fork": false,
"created_at": "2019-05-17T14:08:01Z",
"updated_at": "2020-12-22T16:25:47Z",
"pushed_at": "2019-05-17T14:17:00Z",
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 37,
"forks": 37,
"watchers": 79,
"score": 0
},
{
"id": 264669775,
"name": "CVE-2019-0808-32-64-exp",

71
2019/CVE-2019-0841.json Normal file
View file

@ -0,0 +1,71 @@
[
{
"id": 179680988,
"name": "CVE-2019-0841",
"full_name": "rogue-kdc\/CVE-2019-0841",
"owner": {
"login": "rogue-kdc",
"id": 49311295,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49311295?v=4",
"html_url": "https:\/\/github.com\/rogue-kdc"
},
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2019-0841",
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
"fork": false,
"created_at": "2019-04-05T12:53:52Z",
"updated_at": "2021-01-01T21:54:55Z",
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 223,
"watchers_count": 223,
"forks_count": 98,
"forks": 98,
"watchers": 223,
"score": 0
},
{
"id": 180605162,
"name": "CVE-2019-0841",
"full_name": "likescam\/CVE-2019-0841",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-0841",
"description": null,
"fork": false,
"created_at": "2019-04-10T14:58:22Z",
"updated_at": "2019-05-26T06:57:44Z",
"pushed_at": "2019-04-10T14:58:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 191441504,
"name": "CVE-2019-0841-BYPASS",
"full_name": "0x00-0x00\/CVE-2019-0841-BYPASS",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2019-0841-BYPASS",
"description": "A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.",
"fork": false,
"created_at": "2019-06-11T20:05:26Z",
"updated_at": "2020-12-21T21:53:48Z",
"pushed_at": "2019-06-11T20:49:42Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 28,
"forks": 28,
"watchers": 55,
"score": 0
}
]

25
2019/CVE-2019-0888.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 193166704,
"name": "CVE-2019-0888",
"full_name": "sophoslabs\/CVE-2019-0888",
"owner": {
"login": "sophoslabs",
"id": 40878494,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40878494?v=4",
"html_url": "https:\/\/github.com\/sophoslabs"
},
"html_url": "https:\/\/github.com\/sophoslabs\/CVE-2019-0888",
"description": "PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)",
"fork": false,
"created_at": "2019-06-21T22:26:52Z",
"updated_at": "2020-03-21T18:23:15Z",
"pushed_at": "2019-07-09T18:40:05Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 21,
"forks": 21,
"watchers": 41,
"score": 0
}
]

25
2019/CVE-2019-0986.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 176955881,
"name": "CVE-2019-0986",
"full_name": "padovah4ck\/CVE-2019-0986",
"owner": {
"login": "padovah4ck",
"id": 13963076,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13963076?v=4",
"html_url": "https:\/\/github.com\/padovah4ck"
},
"html_url": "https:\/\/github.com\/padovah4ck\/CVE-2019-0986",
"description": "Security Research",
"fork": false,
"created_at": "2019-03-21T13:58:25Z",
"updated_at": "2020-11-17T08:28:22Z",
"pushed_at": "2019-06-17T08:10:53Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 11,
"forks": 11,
"watchers": 34,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 179330253,
"name": "CVE-2019-1002101-Helpers",
"full_name": "brompwnie\/CVE-2019-1002101-Helpers",
"owner": {
"login": "brompwnie",
"id": 8638589,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8638589?v=4",
"html_url": "https:\/\/github.com\/brompwnie"
},
"html_url": "https:\/\/github.com\/brompwnie\/CVE-2019-1002101-Helpers",
"description": "PoC helper scripts and Dockerfile for CVE-2019-1002101",
"fork": false,
"created_at": "2019-04-03T16:36:58Z",
"updated_at": "2020-07-14T14:11:03Z",
"pushed_at": "2019-04-03T17:35:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"forks": 5,
"watchers": 5,
"score": 0
}
]

View file

@ -21,5 +21,74 @@
"forks": 30,
"watchers": 50,
"score": 0
},
{
"id": 170809838,
"name": "cve-2019-1003000-jenkins-rce-poc",
"full_name": "adamyordan\/cve-2019-1003000-jenkins-rce-poc",
"owner": {
"login": "adamyordan",
"id": 9531164,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9531164?v=4",
"html_url": "https:\/\/github.com\/adamyordan"
},
"html_url": "https:\/\/github.com\/adamyordan\/cve-2019-1003000-jenkins-rce-poc",
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2020-12-02T16:34:39Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 83,
"forks": 83,
"watchers": 268,
"score": 0
},
{
"id": 172198653,
"name": "CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"full_name": "0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"owner": {
"login": "0xtavian",
"id": 21030907,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21030907?v=4",
"html_url": "https:\/\/github.com\/0xtavian"
},
"html_url": "https:\/\/github.com\/0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-02-23T10:00:03Z",
"updated_at": "2020-04-20T00:16:50Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 183322760,
"name": "CVE-2019-1003000_RCE-DETECTION",
"full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"owner": {
"login": "1NTheKut",
"id": 26243759,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/26243759?v=4",
"html_url": "https:\/\/github.com\/1NTheKut"
},
"html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)",
"fork": false,
"created_at": "2019-04-24T23:52:42Z",
"updated_at": "2020-09-25T09:24:39Z",
"pushed_at": "2019-05-01T07:11:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,119 @@
[
{
"id": 191233980,
"name": "exim-rce-quickfix",
"full_name": "bananaphones\/exim-rce-quickfix",
"owner": {
"login": "bananaphones",
"id": 4877449,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4877449?v=4",
"html_url": "https:\/\/github.com\/bananaphones"
},
"html_url": "https:\/\/github.com\/bananaphones\/exim-rce-quickfix",
"description": "quick fix for CVE-2019-10149, works on Debian\\Ubuntu\\Centos",
"fork": false,
"created_at": "2019-06-10T19:37:05Z",
"updated_at": "2020-10-11T13:08:22Z",
"pushed_at": "2019-06-14T10:16:02Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 18,
"forks": 18,
"watchers": 23,
"score": 0
},
{
"id": 191493140,
"name": "eximrce-CVE-2019-10149",
"full_name": "cowbe0x004\/eximrce-CVE-2019-10149",
"owner": {
"login": "cowbe0x004",
"id": 3072913,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3072913?v=4",
"html_url": "https:\/\/github.com\/cowbe0x004"
},
"html_url": "https:\/\/github.com\/cowbe0x004\/eximrce-CVE-2019-10149",
"description": "simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in \/tmp\/eximrce.",
"fork": false,
"created_at": "2019-06-12T03:47:16Z",
"updated_at": "2020-09-06T02:39:13Z",
"pushed_at": "2019-07-08T18:25:12Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 13,
"forks": 13,
"watchers": 13,
"score": 0
},
{
"id": 191845568,
"name": "PoC--CVE-2019-10149_Exim",
"full_name": "MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
"owner": {
"login": "MNEMO-CERT",
"id": 51804856,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51804856?v=4",
"html_url": "https:\/\/github.com\/MNEMO-CERT"
},
"html_url": "https:\/\/github.com\/MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
"description": "PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.",
"fork": false,
"created_at": "2019-06-13T23:21:53Z",
"updated_at": "2020-06-28T05:23:37Z",
"pushed_at": "2019-06-18T14:57:22Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"score": 0
},
{
"id": 191952969,
"name": "CVE-2019-10149-quick",
"full_name": "aishee\/CVE-2019-10149-quick",
"owner": {
"login": "aishee",
"id": 8377283,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8377283?v=4",
"html_url": "https:\/\/github.com\/aishee"
},
"html_url": "https:\/\/github.com\/aishee\/CVE-2019-10149-quick",
"description": "Simple Bash shell quick fix CVE-2019-10149",
"fork": false,
"created_at": "2019-06-14T14:02:43Z",
"updated_at": "2019-06-14T14:03:33Z",
"pushed_at": "2019-06-14T14:03:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 194002154,
"name": "CVE-2019-10149-privilege-escalation",
"full_name": "AzizMea\/CVE-2019-10149-privilege-escalation",
"owner": {
"login": "AzizMea",
"id": 30970260,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/30970260?v=4",
"html_url": "https:\/\/github.com\/AzizMea"
},
"html_url": "https:\/\/github.com\/AzizMea\/CVE-2019-10149-privilege-escalation",
"description": "CVE-2019-10149 privilege escalation",
"fork": false,
"created_at": "2019-06-27T01:34:41Z",
"updated_at": "2020-05-30T20:35:51Z",
"pushed_at": "2019-06-27T17:46:25Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"score": 0
},
{
"id": 198729185,
"name": "StickyExim",

25
2019/CVE-2019-10207.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 199611138,
"name": "CVE-2019-10207",
"full_name": "butterflyhack\/CVE-2019-10207",
"owner": {
"login": "butterflyhack",
"id": 11525772,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11525772?v=4",
"html_url": "https:\/\/github.com\/butterflyhack"
},
"html_url": "https:\/\/github.com\/butterflyhack\/CVE-2019-10207",
"description": "PoC for CVE-2019-10207",
"fork": false,
"created_at": "2019-07-30T08:39:21Z",
"updated_at": "2020-10-26T08:01:10Z",
"pushed_at": "2019-07-30T08:50:32Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,
"forks": 7,
"watchers": 18,
"score": 0
}
]

View file

@ -36,13 +36,36 @@
"description": "CVE-2019-1040 with Kerberos delegation",
"fork": false,
"created_at": "2019-06-18T12:10:26Z",
"updated_at": "2021-01-04T03:02:23Z",
"updated_at": "2021-01-05T02:03:23Z",
"pushed_at": "2020-03-20T13:24:47Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 2,
"forks": 2,
"watchers": 19,
"watchers": 20,
"score": 0
},
{
"id": 192691928,
"name": "UltraRealy_with_CVE-2019-1040",
"full_name": "lazaars\/UltraRealy_with_CVE-2019-1040",
"owner": {
"login": "lazaars",
"id": 36127186,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/36127186?v=4",
"html_url": "https:\/\/github.com\/lazaars"
},
"html_url": "https:\/\/github.com\/lazaars\/UltraRealy_with_CVE-2019-1040",
"description": "Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit",
"fork": false,
"created_at": "2019-06-19T08:32:31Z",
"updated_at": "2020-10-21T22:17:03Z",
"pushed_at": "2019-06-19T09:15:16Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"score": 0
},
{
@ -105,13 +128,13 @@
"description": "an impacket-dependent script exploiting CVE-2019-1040",
"fork": false,
"created_at": "2021-01-01T05:59:06Z",
"updated_at": "2021-01-04T08:44:11Z",
"updated_at": "2021-01-05T03:05:48Z",
"pushed_at": "2021-01-01T06:10:58Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 3,
"forks": 3,
"watchers": 42,
"watchers": 44,
"score": 0
}
]

71
2019/CVE-2019-1064.json Normal file
View file

@ -0,0 +1,71 @@
[
{
"id": 191548642,
"name": "CVE-2019-1064",
"full_name": "RythmStick\/CVE-2019-1064",
"owner": {
"login": "RythmStick",
"id": 43847240,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43847240?v=4",
"html_url": "https:\/\/github.com\/RythmStick"
},
"html_url": "https:\/\/github.com\/RythmStick\/CVE-2019-1064",
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-06-12T10:21:35Z",
"updated_at": "2021-01-03T14:23:12Z",
"pushed_at": "2019-06-13T09:55:07Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"forks": 10,
"watchers": 15,
"score": 0
},
{
"id": 191602145,
"name": "CVE-2019-1064",
"full_name": "0x00-0x00\/CVE-2019-1064",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2019-1064",
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-06-12T15:54:55Z",
"updated_at": "2020-07-13T12:07:03Z",
"pushed_at": "2019-06-12T12:25:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 17,
"forks": 17,
"watchers": 11,
"score": 0
},
{
"id": 192173000,
"name": "CVE-2019-1064",
"full_name": "attackgithub\/CVE-2019-1064",
"owner": {
"login": "attackgithub",
"id": 45205753,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/45205753?v=4",
"html_url": "https:\/\/github.com\/attackgithub"
},
"html_url": "https:\/\/github.com\/attackgithub\/CVE-2019-1064",
"description": "CVE-2019-1064 - AppXSVC Local Privilege Escalation",
"fork": false,
"created_at": "2019-06-16T09:31:11Z",
"updated_at": "2019-06-18T21:49:16Z",
"pushed_at": "2019-06-14T07:47:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-10678.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 185265234,
"name": "cve-2019-10678",
"full_name": "cved-sources\/cve-2019-10678",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-10678",
"description": "cve-2019-10678",
"fork": false,
"created_at": "2019-05-06T20:15:47Z",
"updated_at": "2019-05-06T20:16:09Z",
"pushed_at": "2019-05-06T20:16:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-10685.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 179077030,
"name": "CVE-2019-10685",
"full_name": "alt3kx\/CVE-2019-10685",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2019-10685",
"description": "A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6",
"fork": false,
"created_at": "2019-04-02T12:50:46Z",
"updated_at": "2019-05-11T02:51:22Z",
"pushed_at": "2019-05-07T11:50:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2019/CVE-2019-1069.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 189962146,
"name": "SharpPolarBear",
"full_name": "S3cur3Th1sSh1t\/SharpPolarBear",
"owner": {
"login": "S3cur3Th1sSh1t",
"id": 27858067,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27858067?v=4",
"html_url": "https:\/\/github.com\/S3cur3Th1sSh1t"
},
"html_url": "https:\/\/github.com\/S3cur3Th1sSh1t\/SharpPolarBear",
"description": "Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069",
"fork": false,
"created_at": "2019-06-03T08:07:32Z",
"updated_at": "2021-01-04T09:18:07Z",
"pushed_at": "2019-06-26T11:53:08Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 14,
"forks": 14,
"watchers": 33,
"score": 0
}
]

25
2019/CVE-2019-10869.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 186229171,
"name": "CVE-2019-10869",
"full_name": "KTN1990\/CVE-2019-10869",
"owner": {
"login": "KTN1990",
"id": 33407405,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33407405?v=4",
"html_url": "https:\/\/github.com\/KTN1990"
},
"html_url": "https:\/\/github.com\/KTN1990\/CVE-2019-10869",
"description": "(Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2019-05-12T08:20:16Z",
"updated_at": "2020-09-06T05:31:01Z",
"pushed_at": "2019-05-17T10:41:43Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 6,
"forks": 6,
"watchers": 14,
"score": 0
}
]

25
2019/CVE-2019-10915.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 198133475,
"name": "CVE-2019-10915",
"full_name": "jiansiting\/CVE-2019-10915",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-10915",
"description": "Siemens TIA administrator Tool RCE",
"fork": false,
"created_at": "2019-07-22T02:38:54Z",
"updated_at": "2020-03-18T01:41:48Z",
"pushed_at": "2019-07-22T11:48:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

25
2019/CVE-2019-1096.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 198785536,
"name": "cve-2019-1096-poc",
"full_name": "CrackerCat\/cve-2019-1096-poc",
"owner": {
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat"
},
"html_url": "https:\/\/github.com\/CrackerCat\/cve-2019-1096-poc",
"description": null,
"fork": false,
"created_at": "2019-07-25T07:58:44Z",
"updated_at": "2020-08-17T10:36:33Z",
"pushed_at": "2019-07-25T07:24:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-11076.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 180679185,
"name": "poc-cribl-rce",
"full_name": "livehybrid\/poc-cribl-rce",
"owner": {
"login": "livehybrid",
"id": 5527349,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5527349?v=4",
"html_url": "https:\/\/github.com\/livehybrid"
},
"html_url": "https:\/\/github.com\/livehybrid\/poc-cribl-rce",
"description": "CVE-2019-11076 - Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthenticated web request",
"fork": false,
"created_at": "2019-04-10T23:31:39Z",
"updated_at": "2020-03-15T20:21:00Z",
"pushed_at": "2019-04-11T12:50:39Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

25
2019/CVE-2019-11223.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 181940820,
"name": "CVE-2019-11223",
"full_name": "AngelCtulhu\/CVE-2019-11223",
"owner": {
"login": "AngelCtulhu",
"id": 36587659,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36587659?v=4",
"html_url": "https:\/\/github.com\/AngelCtulhu"
},
"html_url": "https:\/\/github.com\/AngelCtulhu\/CVE-2019-11223",
"description": "CVE-2019-11223 - Arbitrary File Upload in Wordpress Support Candy Plugin Version 2.0 Below",
"fork": false,
"created_at": "2019-04-17T17:43:46Z",
"updated_at": "2019-04-19T16:43:54Z",
"pushed_at": "2019-04-19T04:32:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 5,
"forks": 5,
"watchers": 1,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 37,
"watchers": 60,
"score": 0
},
{
"id": 199763019,
"name": "CVE-2019-1132",
"full_name": "petercc\/CVE-2019-1132",
"owner": {
"login": "petercc",
"id": 1819628,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1819628?v=4",
"html_url": "https:\/\/github.com\/petercc"
},
"html_url": "https:\/\/github.com\/petercc\/CVE-2019-1132",
"description": "CVE-2019-1132",
"fork": false,
"created_at": "2019-07-31T02:30:28Z",
"updated_at": "2020-12-07T22:04:33Z",
"pushed_at": "2019-07-31T02:38:41Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -22,6 +22,29 @@
"watchers": 21,
"score": 0
},
{
"id": 197643691,
"name": "jquery-prototype-pollution-fix",
"full_name": "bitnesswise\/jquery-prototype-pollution-fix",
"owner": {
"login": "bitnesswise",
"id": 32780182,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/32780182?v=4",
"html_url": "https:\/\/github.com\/bitnesswise"
},
"html_url": "https:\/\/github.com\/bitnesswise\/jquery-prototype-pollution-fix",
"description": "A fix for CVE-2019-11358 (prototype pollution in jquery)",
"fork": false,
"created_at": "2019-07-18T19:15:33Z",
"updated_at": "2020-04-04T15:02:00Z",
"pushed_at": "2019-07-18T20:00:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 255702097,
"name": "snyk-js-jquery-565129",

25
2019/CVE-2019-11477.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 198296662,
"name": "cve-2019-11477-poc",
"full_name": "sasqwatch\/cve-2019-11477-poc",
"owner": {
"login": "sasqwatch",
"id": 22352904,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22352904?v=4",
"html_url": "https:\/\/github.com\/sasqwatch"
},
"html_url": "https:\/\/github.com\/sasqwatch\/cve-2019-11477-poc",
"description": null,
"fork": false,
"created_at": "2019-07-22T20:23:08Z",
"updated_at": "2020-06-28T07:56:08Z",
"pushed_at": "2019-07-21T15:56:43Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

25
2019/CVE-2019-11523.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 182799429,
"name": "anviz-m3-rfid-cve-2019-11523-poc",
"full_name": "wizlab-it\/anviz-m3-rfid-cve-2019-11523-poc",
"owner": {
"login": "wizlab-it",
"id": 19650583,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/19650583?v=4",
"html_url": "https:\/\/github.com\/wizlab-it"
},
"html_url": "https:\/\/github.com\/wizlab-it\/anviz-m3-rfid-cve-2019-11523-poc",
"description": "Anviz M3 RFID CVE-2019-11523 PoC",
"fork": false,
"created_at": "2019-04-22T14:00:50Z",
"updated_at": "2019-06-13T16:23:09Z",
"pushed_at": "2019-06-13T16:23:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 197342430,
"name": "CVE-2019-11580",
"full_name": "jas502n\/CVE-2019-11580",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11580",
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2020-12-11T10:06:47Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 19,
"forks": 19,
"watchers": 84,
"score": 0
},
{
"id": 245476096,
"name": "CVE-2019-11580",

View file

@ -1,4 +1,27 @@
[
{
"id": 197105656,
"name": "CVE-2019-11581",
"full_name": "jas502n\/CVE-2019-11581",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11581",
"description": "Atlassian JIRA Template injection vulnerability RCE",
"fork": false,
"created_at": "2019-07-16T02:27:00Z",
"updated_at": "2020-11-26T19:56:26Z",
"pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 27,
"forks": 27,
"watchers": 73,
"score": 0
},
{
"id": 198763431,
"name": "CVE-2019-11581",

25
2019/CVE-2019-11881.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 188323560,
"name": "VanCleef",
"full_name": "MauroEldritch\/VanCleef",
"owner": {
"login": "MauroEldritch",
"id": 1292978,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1292978?v=4",
"html_url": "https:\/\/github.com\/MauroEldritch"
},
"html_url": "https:\/\/github.com\/MauroEldritch\/VanCleef",
"description": "Exploit for CVE-2019-11881 (Rancher 2.1.4 Web Parameter Tampering)",
"fork": false,
"created_at": "2019-05-24T00:09:21Z",
"updated_at": "2020-09-22T13:43:27Z",
"pushed_at": "2019-06-10T22:10:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

25
2019/CVE-2019-12169.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 188356491,
"name": "ATutor-2.2.4-Language-Exploit",
"full_name": "fuzzlove\/ATutor-2.2.4-Language-Exploit",
"owner": {
"login": "fuzzlove",
"id": 44779781,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44779781?v=4",
"html_url": "https:\/\/github.com\/fuzzlove"
},
"html_url": "https:\/\/github.com\/fuzzlove\/ATutor-2.2.4-Language-Exploit",
"description": "ATutor 2.2.4 Arbitrary File Upload \/ RCE (CVE-2019-12169)",
"fork": false,
"created_at": "2019-05-24T05:15:17Z",
"updated_at": "2019-10-02T06:32:26Z",
"pushed_at": "2019-06-09T21:39:55Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

25
2019/CVE-2019-12170.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 186354983,
"name": "ATutor-Instructor-Backup-Arbitrary-File",
"full_name": "fuzzlove\/ATutor-Instructor-Backup-Arbitrary-File",
"owner": {
"login": "fuzzlove",
"id": 44779781,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44779781?v=4",
"html_url": "https:\/\/github.com\/fuzzlove"
},
"html_url": "https:\/\/github.com\/fuzzlove\/ATutor-Instructor-Backup-Arbitrary-File",
"description": "ATutor 2.2.4 'Backup' Remote Command Execution (CVE-2019-12170)",
"fork": false,
"created_at": "2019-05-13T06:01:47Z",
"updated_at": "2019-06-03T04:12:28Z",
"pushed_at": "2019-06-03T04:12:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

25
2019/CVE-2019-12185.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 187415847,
"name": "eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"full_name": "fuzzlove\/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"owner": {
"login": "fuzzlove",
"id": 44779781,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44779781?v=4",
"html_url": "https:\/\/github.com\/fuzzlove"
},
"html_url": "https:\/\/github.com\/fuzzlove\/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
"description": "eLabFTW 1.8.5 'EntityController' Arbitrary File Upload \/ RCE (CVE-2019-12185)",
"fork": false,
"created_at": "2019-05-18T23:56:52Z",
"updated_at": "2019-11-12T06:27:17Z",
"pushed_at": "2019-05-20T00:29:16Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
}
]

48
2019/CVE-2019-12189.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 187569819,
"name": "CVE-2019-12189",
"full_name": "falconz\/CVE-2019-12189",
"owner": {
"login": "falconz",
"id": 9218490,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9218490?v=4",
"html_url": "https:\/\/github.com\/falconz"
},
"html_url": "https:\/\/github.com\/falconz\/CVE-2019-12189",
"description": null,
"fork": false,
"created_at": "2019-05-20T04:52:38Z",
"updated_at": "2019-05-20T06:03:05Z",
"pushed_at": "2019-05-20T06:03:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 187589027,
"name": "CVE-2019-12189",
"full_name": "tuyenhva\/CVE-2019-12189",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12189",
"description": "CVE-2019-12189 - Zoho ManageEngine ServiceDesk Plus 9.3 XSS vulnerability",
"fork": false,
"created_at": "2019-05-20T07:23:51Z",
"updated_at": "2019-05-20T07:44:03Z",
"pushed_at": "2019-05-20T07:44:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-12190.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 187596474,
"name": "CVE-2019-12190",
"full_name": "tuyenhva\/CVE-2019-12190",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12190",
"description": "CVE-2019-12190 - CentOS-WebPanel XSS vulnerability",
"fork": false,
"created_at": "2019-05-20T08:09:49Z",
"updated_at": "2019-05-20T08:13:09Z",
"pushed_at": "2019-05-20T08:13:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-12252.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 187880000,
"name": "CVE-2019-12252",
"full_name": "tuyenhva\/CVE-2019-12252",
"owner": {
"login": "tuyenhva",
"id": 17802001,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
"html_url": "https:\/\/github.com\/tuyenhva"
},
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12252",
"description": "CVE-2019-12252 Zoho ManageEngine ServiceDesk Plus < 10.5 Incorrect Access Control",
"fork": false,
"created_at": "2019-05-21T16:59:23Z",
"updated_at": "2019-05-21T17:01:52Z",
"pushed_at": "2019-05-21T17:01:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 195171033,
"name": "LuCI_RCE_exp",
"full_name": "HACHp1\/LuCI_RCE_exp",
"owner": {
"login": "HACHp1",
"id": 25722416,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25722416?v=4",
"html_url": "https:\/\/github.com\/HACHp1"
},
"html_url": "https:\/\/github.com\/HACHp1\/LuCI_RCE_exp",
"description": "Exp of cve-2019-12272",
"fork": false,
"created_at": "2019-07-04T04:54:36Z",
"updated_at": "2020-04-22T15:44:21Z",
"pushed_at": "2019-07-10T04:33:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"score": 0
},
{
"id": 226418974,
"name": "lede-17.01.3",

View file

@ -1,4 +1,27 @@
[
{
"id": 198579428,
"name": "CVE-2019-12384",
"full_name": "jas502n\/CVE-2019-12384",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12384",
"description": "Jackson Rce For CVE-2019-12384 ",
"fork": false,
"created_at": "2019-07-24T07:12:14Z",
"updated_at": "2021-01-03T11:23:10Z",
"pushed_at": "2019-07-24T07:31:42Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 15,
"forks": 15,
"watchers": 77,
"score": 0
},
{
"id": 198939305,
"name": "Jackson_RCE-CVE-2019-12384",

25
2019/CVE-2019-12453.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 197012907,
"name": "CVE-2019-12453",
"full_name": "undefinedmode\/CVE-2019-12453",
"owner": {
"login": "undefinedmode",
"id": 4165481,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4165481?v=4",
"html_url": "https:\/\/github.com\/undefinedmode"
},
"html_url": "https:\/\/github.com\/undefinedmode\/CVE-2019-12453",
"description": "Authenticated XSS in Microstrategy Web - Versions prior to 10.1 patch 10",
"fork": false,
"created_at": "2019-07-15T14:17:10Z",
"updated_at": "2019-07-15T14:44:49Z",
"pushed_at": "2019-07-15T14:44:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-12460.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 188212424,
"name": "WebPort-v1.19.1-Reflected-XSS",
"full_name": "EmreOvunc\/WebPort-v1.19.1-Reflected-XSS",
"owner": {
"login": "EmreOvunc",
"id": 15659223,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
"html_url": "https:\/\/github.com\/EmreOvunc"
},
"html_url": "https:\/\/github.com\/EmreOvunc\/WebPort-v1.19.1-Reflected-XSS",
"description": "CVE-2019-12460|Reflected XSS in WebPort-v1.19.1 impacts users who open a maliciously crafted link or third-party web page.",
"fork": false,
"created_at": "2019-05-23T10:27:49Z",
"updated_at": "2020-05-16T12:47:54Z",
"pushed_at": "2019-05-30T16:21:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}
]

25
2019/CVE-2019-12475.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 197017455,
"name": "CVE-2019-12475",
"full_name": "undefinedmode\/CVE-2019-12475",
"owner": {
"login": "undefinedmode",
"id": 4165481,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4165481?v=4",
"html_url": "https:\/\/github.com\/undefinedmode"
},
"html_url": "https:\/\/github.com\/undefinedmode\/CVE-2019-12475",
"description": "Stored XSS in MicroStrategy Web prior to 10.4.6",
"fork": false,
"created_at": "2019-07-15T14:42:53Z",
"updated_at": "2019-07-15T14:47:02Z",
"pushed_at": "2019-07-15T14:47:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-12594.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 194123487,
"name": "CVE-2019-12594",
"full_name": "Alexandre-Bartel\/CVE-2019-12594",
"owner": {
"login": "Alexandre-Bartel",
"id": 655248,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/655248?v=4",
"html_url": "https:\/\/github.com\/Alexandre-Bartel"
},
"html_url": "https:\/\/github.com\/Alexandre-Bartel\/CVE-2019-12594",
"description": "This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.",
"fork": false,
"created_at": "2019-06-27T15:49:16Z",
"updated_at": "2020-12-09T18:01:25Z",
"pushed_at": "2019-07-01T17:36:42Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"score": 0
}
]

48
2019/CVE-2019-12735.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 190523226,
"name": "ace-vim-neovim",
"full_name": "pcy190\/ace-vim-neovim",
"owner": {
"login": "pcy190",
"id": 40729789,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40729789?v=4",
"html_url": "https:\/\/github.com\/pcy190"
},
"html_url": "https:\/\/github.com\/pcy190\/ace-vim-neovim",
"description": "Vim\/Neovim Arbitrary Code Execution via Modelines (CVE-2019-12735)",
"fork": false,
"created_at": "2019-06-06T06:00:06Z",
"updated_at": "2020-11-17T05:53:56Z",
"pushed_at": "2019-06-06T06:09:56Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"score": 0
},
{
"id": 192580764,
"name": "CVE-2019-12735-VIM-NEOVIM",
"full_name": "oldthree3\/CVE-2019-12735-VIM-NEOVIM",
"owner": {
"login": "oldthree3",
"id": 51964995,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/51964995?v=4",
"html_url": "https:\/\/github.com\/oldthree3"
},
"html_url": "https:\/\/github.com\/oldthree3\/CVE-2019-12735-VIM-NEOVIM",
"description": null,
"fork": false,
"created_at": "2019-06-18T16:59:39Z",
"updated_at": "2019-06-19T07:30:04Z",
"pushed_at": "2019-06-19T07:30:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2019/CVE-2019-12796.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 192375622,
"name": "CVE-2019-12796",
"full_name": "PeterUpfold\/CVE-2019-12796",
"owner": {
"login": "PeterUpfold",
"id": 1255375,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1255375?v=4",
"html_url": "https:\/\/github.com\/PeterUpfold"
},
"html_url": "https:\/\/github.com\/PeterUpfold\/CVE-2019-12796",
"description": "This repository will contain information regarding CVE-2019-12796 once it is made public.",
"fork": false,
"created_at": "2019-06-17T15:47:12Z",
"updated_at": "2019-06-17T17:02:01Z",
"pushed_at": "2019-06-17T15:49:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2019/CVE-2019-12949.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 193627360,
"name": "CVE-2019-12949",
"full_name": "tarantula-team\/CVE-2019-12949",
"owner": {
"login": "tarantula-team",
"id": 51333391,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51333391?v=4",
"html_url": "https:\/\/github.com\/tarantula-team"
},
"html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-12949",
"description": "CVE-2019-12949 ",
"fork": false,
"created_at": "2019-06-25T03:22:23Z",
"updated_at": "2020-05-04T07:57:28Z",
"pushed_at": "2019-06-28T04:19:38Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 9,
"forks": 9,
"watchers": 27,
"score": 0
}
]

25
2019/CVE-2019-13027.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 195768661,
"name": "CVE-2019-13027",
"full_name": "IckoGZ\/CVE-2019-13027",
"owner": {
"login": "IckoGZ",
"id": 52542268,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/52542268?v=4",
"html_url": "https:\/\/github.com\/IckoGZ"
},
"html_url": "https:\/\/github.com\/IckoGZ\/CVE-2019-13027",
"description": "Details for disclosing CVE-2019-13027",
"fork": false,
"created_at": "2019-07-08T08:25:07Z",
"updated_at": "2019-07-11T08:33:11Z",
"pushed_at": "2019-07-11T08:33:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-13063.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 196970646,
"name": "CVE-2019-13063-POC",
"full_name": "0x6b7966\/CVE-2019-13063-POC",
"owner": {
"login": "0x6b7966",
"id": 22814832,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22814832?v=4",
"html_url": "https:\/\/github.com\/0x6b7966"
},
"html_url": "https:\/\/github.com\/0x6b7966\/CVE-2019-13063-POC",
"description": "Proof of concept tool to exploit the directory traversal and local file inclusion vulnerability that resides in the Sahi-pro web application CVE-2019-13063",
"fork": false,
"created_at": "2019-07-15T09:45:36Z",
"updated_at": "2019-08-18T02:47:49Z",
"pushed_at": "2019-07-01T19:16:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 199781061,
"name": "CVE-2019-13272",
"full_name": "jas502n\/CVE-2019-13272",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272",
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2020-12-19T12:25:32Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 94,
"forks": 94,
"watchers": 244,
"score": 0
},
{
"id": 199794841,
"name": "CVE-2019-13272",
"full_name": "Cyc1eC\/CVE-2019-13272",
"owner": {
"login": "Cyc1eC",
"id": 26767829,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26767829?v=4",
"html_url": "https:\/\/github.com\/Cyc1eC"
},
"html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272",
"description": "The exploit for CVE-2019-13272",
"fork": false,
"created_at": "2019-07-31T06:36:21Z",
"updated_at": "2020-12-14T12:01:59Z",
"pushed_at": "2019-07-31T07:05:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 7,
"forks": 7,
"watchers": 4,
"score": 0
},
{
"id": 200459882,
"name": "cve-2019-13272",

25
2019/CVE-2019-13403.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 196799368,
"name": "CVE-2019-13403",
"full_name": "B3Bo1d\/CVE-2019-13403",
"owner": {
"login": "B3Bo1d",
"id": 19810607,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19810607?v=4",
"html_url": "https:\/\/github.com\/B3Bo1d"
},
"html_url": "https:\/\/github.com\/B3Bo1d\/CVE-2019-13403",
"description": "CVE-2019-13403",
"fork": false,
"created_at": "2019-07-14T05:52:01Z",
"updated_at": "2019-07-14T06:10:02Z",
"pushed_at": "2019-07-14T06:10:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-14439.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 199983488,
"name": "CVE-2019-14439",
"full_name": "jas502n\/CVE-2019-14439",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-14439",
"description": "Jackson-databind RCE",
"fork": false,
"created_at": "2019-08-01T05:33:06Z",
"updated_at": "2019-12-15T16:09:26Z",
"pushed_at": "2019-08-01T05:33:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}
]

25
2019/CVE-2019-1652.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 167347037,
"name": "CiscoRV320Dump",
"full_name": "0x27\/CiscoRV320Dump",
"owner": {
"login": "0x27",
"id": 9094330,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9094330?v=4",
"html_url": "https:\/\/github.com\/0x27"
},
"html_url": "https:\/\/github.com\/0x27\/CiscoRV320Dump",
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2020-12-24T03:48:24Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 195,
"watchers_count": 195,
"forks_count": 62,
"forks": 62,
"watchers": 195,
"score": 0
}
]

48
2019/CVE-2019-1653.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 168361115,
"name": "CVE-2019-1653",
"full_name": "dubfr33\/CVE-2019-1653",
"owner": {
"login": "dubfr33",
"id": 20056018,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20056018?v=4",
"html_url": "https:\/\/github.com\/dubfr33"
},
"html_url": "https:\/\/github.com\/dubfr33\/CVE-2019-1653",
"description": "NSE script to scan for Cisco routers vulnerable to CVE-2019-1653",
"fork": false,
"created_at": "2019-01-30T14:58:48Z",
"updated_at": "2020-04-21T04:04:11Z",
"pushed_at": "2019-01-30T15:01:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 178810790,
"name": "CiscoSpill",
"full_name": "shaheemirza\/CiscoSpill",
"owner": {
"login": "shaheemirza",
"id": 4853436,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4853436?v=4",
"html_url": "https:\/\/github.com\/shaheemirza"
},
"html_url": "https:\/\/github.com\/shaheemirza\/CiscoSpill",
"description": "Just a PoC tool to extract password using CVE-2019-1653.",
"fork": false,
"created_at": "2019-04-01T07:40:01Z",
"updated_at": "2020-11-25T23:13:59Z",
"pushed_at": "2019-04-01T07:50:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
}
]

25
2019/CVE-2019-1821.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 187835108,
"name": "CiscoExploit",
"full_name": "k8gege\/CiscoExploit",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/CiscoExploit",
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2020-12-21T01:20:21Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 41,
"forks": 41,
"watchers": 67,
"score": 0
}
]

25
2019/CVE-2019-1987.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171108223,
"name": "android-7-9-png-bug",
"full_name": "marcinguy\/android-7-9-png-bug",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/android-7-9-png-bug",
"description": "CVE-2019-1987",
"fork": false,
"created_at": "2019-02-17T10:22:01Z",
"updated_at": "2020-05-18T10:42:55Z",
"pushed_at": "2019-03-02T19:54:06Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 12,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 96,
"watchers": 309,
"score": 0
},
{
"id": 199203476,
"name": "CVE-2019-2107",
"full_name": "infiniteLoopers\/CVE-2019-2107",
"owner": {
"login": "infiniteLoopers",
"id": 27885817,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/27885817?v=4",
"html_url": "https:\/\/github.com\/infiniteLoopers"
},
"html_url": "https:\/\/github.com\/infiniteLoopers\/CVE-2019-2107",
"description": null,
"fork": false,
"created_at": "2019-07-27T19:03:27Z",
"updated_at": "2019-10-18T20:42:21Z",
"pushed_at": "2019-07-27T19:06:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
}
]

25
2019/CVE-2019-2615.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 186277891,
"name": "CVE-2019-2615",
"full_name": "chiaifan\/CVE-2019-2615",
"owner": {
"login": "chiaifan",
"id": 28030381,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28030381?v=4",
"html_url": "https:\/\/github.com\/chiaifan"
},
"html_url": "https:\/\/github.com\/chiaifan\/CVE-2019-2615",
"description": null,
"fork": false,
"created_at": "2019-05-12T16:25:28Z",
"updated_at": "2019-12-12T02:40:06Z",
"pushed_at": "2019-05-12T16:53:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 181875107,
"name": "CVE-2019-2618",
"full_name": "pyn3rd\/CVE-2019-2618",
"owner": {
"login": "pyn3rd",
"id": 41412951,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41412951?v=4",
"html_url": "https:\/\/github.com\/pyn3rd"
},
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2019-2618",
"description": "Weblogic Unrestricted File Upload",
"fork": false,
"created_at": "2019-04-17T11:12:32Z",
"updated_at": "2020-10-25T08:10:09Z",
"pushed_at": "2019-04-17T11:13:29Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 13,
"forks": 13,
"watchers": 50,
"score": 0
},
{
"id": 181885950,
"name": "cve-2019-2618",
"full_name": "jas502n\/cve-2019-2618",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/cve-2019-2618",
"description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618",
"fork": false,
"created_at": "2019-04-17T12:23:24Z",
"updated_at": "2020-12-01T08:45:17Z",
"pushed_at": "2019-04-17T15:05:09Z",
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 52,
"forks": 52,
"watchers": 155,
"score": 0
},
{
"id": 185175648,
"name": "CVE-2019-2618-",
"full_name": "wsfengfan\/CVE-2019-2618-",
"owner": {
"login": "wsfengfan",
"id": 33821840,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4",
"html_url": "https:\/\/github.com\/wsfengfan"
},
"html_url": "https:\/\/github.com\/wsfengfan\/CVE-2019-2618-",
"description": "CVE-2019-2618-自己编写",
"fork": false,
"created_at": "2019-05-06T10:33:26Z",
"updated_at": "2019-07-17T08:53:14Z",
"pushed_at": "2019-07-17T08:53:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 193069571,
"name": "WeblogicScan",
@ -13,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-12-31T09:29:12Z",
"updated_at": "2021-01-05T03:09:35Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 692,
"watchers_count": 692,
"stargazers_count": 694,
"watchers_count": 694,
"forks_count": 143,
"forks": 143,
"watchers": 692,
"watchers": 694,
"score": 0
},
{

View file

@ -22,6 +22,144 @@
"watchers": 255,
"score": 0
},
{
"id": 183346706,
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"owner": {
"login": "SkyBlueEternal",
"id": 46418185,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46418185?v=4",
"html_url": "https:\/\/github.com\/SkyBlueEternal"
},
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2020-12-15T07:25:50Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 37,
"forks": 37,
"watchers": 104,
"score": 0
},
{
"id": 183843413,
"name": "CNTA-2019-0014xCVE-2019-2725",
"full_name": "iceMatcha\/CNTA-2019-0014xCVE-2019-2725",
"owner": {
"login": "iceMatcha",
"id": 18480525,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/18480525?v=4",
"html_url": "https:\/\/github.com\/iceMatcha"
},
"html_url": "https:\/\/github.com\/iceMatcha\/CNTA-2019-0014xCVE-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-04-28T02:18:42Z",
"updated_at": "2020-08-27T07:53:35Z",
"pushed_at": "2019-05-13T10:14:01Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 8,
"forks": 8,
"watchers": 11,
"score": 0
},
{
"id": 184489534,
"name": "cve-2019-2725",
"full_name": "lasensio\/cve-2019-2725",
"owner": {
"login": "lasensio",
"id": 17970238,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17970238?v=4",
"html_url": "https:\/\/github.com\/lasensio"
},
"html_url": "https:\/\/github.com\/lasensio\/cve-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-01T22:25:14Z",
"updated_at": "2020-12-11T08:35:59Z",
"pushed_at": "2019-05-01T23:00:39Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 14,
"forks": 14,
"watchers": 19,
"score": 0
},
{
"id": 184651903,
"name": "CVE-2019-2725",
"full_name": "davidmthomsen\/CVE-2019-2725",
"owner": {
"login": "davidmthomsen",
"id": 22969004,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22969004?v=4",
"html_url": "https:\/\/github.com\/davidmthomsen"
},
"html_url": "https:\/\/github.com\/davidmthomsen\/CVE-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-02T21:09:36Z",
"updated_at": "2020-10-05T20:10:46Z",
"pushed_at": "2019-05-02T21:11:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 185003239,
"name": "CVE-2019-2725",
"full_name": "leerina\/CVE-2019-2725",
"owner": {
"login": "leerina",
"id": 12816285,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12816285?v=4",
"html_url": "https:\/\/github.com\/leerina"
},
"html_url": "https:\/\/github.com\/leerina\/CVE-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-05T08:34:20Z",
"updated_at": "2019-05-24T03:17:10Z",
"pushed_at": "2019-05-05T08:39:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 185956531,
"name": "cve-2019-2725",
"full_name": "zhusx110\/cve-2019-2725",
"owner": {
"login": "zhusx110",
"id": 40231749,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40231749?v=4",
"html_url": "https:\/\/github.com\/zhusx110"
},
"html_url": "https:\/\/github.com\/zhusx110\/cve-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-10T09:07:58Z",
"updated_at": "2019-06-17T03:26:56Z",
"pushed_at": "2019-05-10T09:09:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"score": 0
},
{
"id": 189132043,
"name": "CVE-2019-2725",
@ -45,6 +183,144 @@
"watchers": 374,
"score": 0
},
{
"id": 190637885,
"name": "cve-2019-2725",
"full_name": "CVCLabs\/cve-2019-2725",
"owner": {
"login": "CVCLabs",
"id": 40604527,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40604527?v=4",
"html_url": "https:\/\/github.com\/CVCLabs"
},
"html_url": "https:\/\/github.com\/CVCLabs\/cve-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-06-06T19:27:09Z",
"updated_at": "2019-06-06T19:27:29Z",
"pushed_at": "2019-06-06T19:27:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 191100816,
"name": "CVE-2019-2725",
"full_name": "TopScrew\/CVE-2019-2725",
"owner": {
"login": "TopScrew",
"id": 35072495,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/35072495?v=4",
"html_url": "https:\/\/github.com\/TopScrew"
},
"html_url": "https:\/\/github.com\/TopScrew\/CVE-2019-2725",
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2020-12-01T14:14:40Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 141,
"watchers_count": 141,
"forks_count": 61,
"forks": 61,
"watchers": 141,
"score": 0
},
{
"id": 191266797,
"name": "CVE-2019-2725",
"full_name": "welove88888\/CVE-2019-2725",
"owner": {
"login": "welove88888",
"id": 29443226,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29443226?v=4",
"html_url": "https:\/\/github.com\/welove88888"
},
"html_url": "https:\/\/github.com\/welove88888\/CVE-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-06-11T00:49:56Z",
"updated_at": "2021-01-02T15:56:01Z",
"pushed_at": "2019-06-11T00:50:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 192078128,
"name": "CVE-2019-2725",
"full_name": "jiansiting\/CVE-2019-2725",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-2725",
"description": "weblogic绕过和wls远程执行",
"fork": false,
"created_at": "2019-06-15T12:51:19Z",
"updated_at": "2020-09-05T21:04:26Z",
"pushed_at": "2019-06-15T12:53:21Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 35,
"forks": 35,
"watchers": 31,
"score": 0
},
{
"id": 192157128,
"name": "CVE-2019-2725",
"full_name": "kerlingcode\/CVE-2019-2725",
"owner": {
"login": "kerlingcode",
"id": 21171415,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/21171415?v=4",
"html_url": "https:\/\/github.com\/kerlingcode"
},
"html_url": "https:\/\/github.com\/kerlingcode\/CVE-2019-2725",
"description": "CVE-2019-2725 bypass pocscan and exp ",
"fork": false,
"created_at": "2019-06-16T06:17:09Z",
"updated_at": "2020-03-17T08:04:13Z",
"pushed_at": "2019-06-21T01:44:11Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks": 8,
"watchers": 10,
"score": 0
},
{
"id": 193466146,
"name": "Weblogic",
"full_name": "black-mirror\/Weblogic",
"owner": {
"login": "black-mirror",
"id": 42571043,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/42571043?v=4",
"html_url": "https:\/\/github.com\/black-mirror"
},
"html_url": "https:\/\/github.com\/black-mirror\/Weblogic",
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
"fork": false,
"created_at": "2019-06-24T08:33:07Z",
"updated_at": "2020-09-27T00:38:51Z",
"pushed_at": "2019-07-15T06:03:15Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 22,
"forks": 22,
"watchers": 61,
"score": 0
},
{
"id": 203902761,
"name": "CVE-2019-2725",

View file

@ -1,4 +1,27 @@
[
{
"id": 180277406,
"name": "CVE-2019-3396",
"full_name": "dothanthitiendiettiende\/CVE-2019-3396",
"owner": {
"login": "dothanthitiendiettiende",
"id": 29480786,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29480786?v=4",
"html_url": "https:\/\/github.com\/dothanthitiendiettiende"
},
"html_url": "https:\/\/github.com\/dothanthitiendiettiende\/CVE-2019-3396",
"description": "Confluence Widget Connector RCE",
"fork": false,
"created_at": "2019-04-09T03:26:06Z",
"updated_at": "2019-04-09T11:34:37Z",
"pushed_at": "2019-04-09T03:25:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"forks": 4,
"watchers": 0,
"score": 0
},
{
"id": 180298650,
"name": "CVE-2019-3396",
@ -22,6 +45,29 @@
"watchers": 22,
"score": 0
},
{
"id": 180347878,
"name": "CVE-2019-3396",
"full_name": "xiaoshuier\/CVE-2019-3396",
"owner": {
"login": "xiaoshuier",
"id": 28529214,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28529214?v=4",
"html_url": "https:\/\/github.com\/xiaoshuier"
},
"html_url": "https:\/\/github.com\/xiaoshuier\/CVE-2019-3396",
"description": null,
"fork": false,
"created_at": "2019-04-09T11:01:41Z",
"updated_at": "2020-07-11T12:06:45Z",
"pushed_at": "2019-04-09T10:59:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 180483984,
"name": "CVE-2019-3396_EXP",
@ -68,6 +114,121 @@
"watchers": 110,
"score": 0
},
{
"id": 180485239,
"name": "CVE-2019-3396",
"full_name": "pyn3rd\/CVE-2019-3396",
"owner": {
"login": "pyn3rd",
"id": 41412951,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41412951?v=4",
"html_url": "https:\/\/github.com\/pyn3rd"
},
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2019-3396",
"description": "Confluence Widget Connector RCE",
"fork": false,
"created_at": "2019-04-10T02:24:29Z",
"updated_at": "2020-10-24T17:33:04Z",
"pushed_at": "2019-04-10T02:26:45Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 16,
"forks": 16,
"watchers": 35,
"score": 0
},
{
"id": 180528467,
"name": "CVE-2019-3396",
"full_name": "s1xg0d\/CVE-2019-3396",
"owner": {
"login": "s1xg0d",
"id": 8321329,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8321329?v=4",
"html_url": "https:\/\/github.com\/s1xg0d"
},
"html_url": "https:\/\/github.com\/s1xg0d\/CVE-2019-3396",
"description": null,
"fork": false,
"created_at": "2019-04-10T07:39:42Z",
"updated_at": "2019-05-13T11:39:51Z",
"pushed_at": "2019-05-13T11:39:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 180627265,
"name": "CVE-2019-3396",
"full_name": "quanpt103\/CVE-2019-3396",
"owner": {
"login": "quanpt103",
"id": 45188297,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/45188297?v=4",
"html_url": "https:\/\/github.com\/quanpt103"
},
"html_url": "https:\/\/github.com\/quanpt103\/CVE-2019-3396",
"description": "Confluence Widget Connector RCE - ptquan",
"fork": false,
"created_at": "2019-04-10T17:05:10Z",
"updated_at": "2019-04-10T17:06:24Z",
"pushed_at": "2019-04-10T17:06:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 183862751,
"name": "confluence_CVE-2019-3396",
"full_name": "vntest11\/confluence_CVE-2019-3396",
"owner": {
"login": "vntest11",
"id": 46453327,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46453327?v=4",
"html_url": "https:\/\/github.com\/vntest11"
},
"html_url": "https:\/\/github.com\/vntest11\/confluence_CVE-2019-3396",
"description": " Confluence Widget Connector path traversal (CVE-2019-3396)",
"fork": false,
"created_at": "2019-04-28T05:59:21Z",
"updated_at": "2019-04-28T06:40:38Z",
"pushed_at": "2019-04-28T06:40:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 194643451,
"name": "test1",
"full_name": "tanw923\/test1",
"owner": {
"login": "tanw923",
"id": 49778932,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/49778932?v=4",
"html_url": "https:\/\/github.com\/tanw923"
},
"html_url": "https:\/\/github.com\/tanw923\/test1",
"description": "https:\/\/github.com\/Yt1g3r\/CVE-2019-3396_EXP.git",
"fork": false,
"created_at": "2019-07-01T09:35:17Z",
"updated_at": "2019-07-02T15:24:32Z",
"pushed_at": "2019-07-02T15:24:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 203499284,
"name": "CVE-2019-3396-confluence-poc",

25
2019/CVE-2019-3398.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 182378884,
"name": "cve-2019-3398",
"full_name": "superevr\/cve-2019-3398",
"owner": {
"login": "superevr",
"id": 2046483,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/2046483?v=4",
"html_url": "https:\/\/github.com\/superevr"
},
"html_url": "https:\/\/github.com\/superevr\/cve-2019-3398",
"description": "Python script to exploit confluence path traversal vulnerability cve-2019-3398",
"fork": false,
"created_at": "2019-04-20T08:07:49Z",
"updated_at": "2020-02-29T17:02:55Z",
"pushed_at": "2019-06-06T21:17:09Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"score": 0
}
]

48
2019/CVE-2019-3462.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 167275161,
"name": "check_CVE-2019-3462",
"full_name": "tonejito\/check_CVE-2019-3462",
"owner": {
"login": "tonejito",
"id": 618588,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/618588?v=4",
"html_url": "https:\/\/github.com\/tonejito"
},
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
"fork": false,
"created_at": "2019-01-24T00:30:15Z",
"updated_at": "2019-01-26T01:21:38Z",
"pushed_at": "2019-01-26T01:21:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 170573944,
"name": "update-apt-package",
"full_name": "atilacastro\/update-apt-package",
"owner": {
"login": "atilacastro",
"id": 5832809,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5832809?v=4",
"html_url": "https:\/\/github.com\/atilacastro"
},
"html_url": "https:\/\/github.com\/atilacastro\/update-apt-package",
"description": "Playbook update APT package because CVE-2019-3462",
"fork": false,
"created_at": "2019-02-13T20:22:33Z",
"updated_at": "2019-02-14T18:31:31Z",
"pushed_at": "2019-02-14T18:31:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-3719.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 184369823,
"name": "CVE-2019-3719",
"full_name": "jiansiting\/CVE-2019-3719",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-3719",
"description": null,
"fork": false,
"created_at": "2019-05-01T04:43:55Z",
"updated_at": "2019-06-02T04:14:24Z",
"pushed_at": "2019-05-01T04:50:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}
]

25
2019/CVE-2019-3799.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 181969843,
"name": "CVE-2019-3799",
"full_name": "mpgn\/CVE-2019-3799",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-3799",
"description": "CVE-2019-3799 - Spring Cloud Config Server: Directory Traversal < 2.1.2, 2.0.4, 1.4.6",
"fork": false,
"created_at": "2019-04-17T21:19:32Z",
"updated_at": "2020-12-31T02:00:01Z",
"pushed_at": "2019-04-18T10:08:12Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 5,
"forks": 5,
"watchers": 31,
"score": 0
}
]

25
2019/CVE-2019-3847.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 179544105,
"name": "moodle-login-csrf",
"full_name": "danielthatcher\/moodle-login-csrf",
"owner": {
"login": "danielthatcher",
"id": 11726509,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11726509?v=4",
"html_url": "https:\/\/github.com\/danielthatcher"
},
"html_url": "https:\/\/github.com\/danielthatcher\/moodle-login-csrf",
"description": "Scripts for exploiting MSA-18-0020 (CVE-2018-16854) and MSA-19-0004 (CVE-2019-3847)",
"fork": false,
"created_at": "2019-04-04T17:24:47Z",
"updated_at": "2019-09-29T23:50:29Z",
"pushed_at": "2019-07-21T15:52:46Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

25
2019/CVE-2019-48814.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 183850213,
"name": "cve-2019-48814",
"full_name": "wucj001\/cve-2019-48814",
"owner": {
"login": "wucj001",
"id": 29703092,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29703092?v=4",
"html_url": "https:\/\/github.com\/wucj001"
},
"html_url": "https:\/\/github.com\/wucj001\/cve-2019-48814",
"description": "漏洞利用工具",
"fork": false,
"created_at": "2019-04-28T03:24:47Z",
"updated_at": "2019-06-19T18:43:16Z",
"pushed_at": "2019-06-19T18:43:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 175966226,
"name": "CVE-2019-5418",
"full_name": "mpgn\/CVE-2019-5418",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-5418",
"description": "CVE-2019-5418 - File Content Disclosure on Ruby on Rails",
"fork": false,
"created_at": "2019-03-16T11:58:18Z",
"updated_at": "2021-01-01T07:53:06Z",
"pushed_at": "2019-03-25T07:19:58Z",
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 20,
"forks": 20,
"watchers": 165,
"score": 0
},
{
"id": 176323109,
"name": "CVE-2019-5418",
"full_name": "omarkurt\/CVE-2019-5418",
"owner": {
"login": "omarkurt",
"id": 1712468,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1712468?v=4",
"html_url": "https:\/\/github.com\/omarkurt"
},
"html_url": "https:\/\/github.com\/omarkurt\/CVE-2019-5418",
"description": "File Content Disclosure on Rails Test Case - CVE-2019-5418",
"fork": false,
"created_at": "2019-03-18T16:09:13Z",
"updated_at": "2020-04-17T21:45:45Z",
"pushed_at": "2019-03-18T16:15:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 176545257,
"name": "CVE-2019-5418-Scanner",
"full_name": "brompwnie\/CVE-2019-5418-Scanner",
"owner": {
"login": "brompwnie",
"id": 8638589,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8638589?v=4",
"html_url": "https:\/\/github.com\/brompwnie"
},
"html_url": "https:\/\/github.com\/brompwnie\/CVE-2019-5418-Scanner",
"description": "A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418",
"fork": false,
"created_at": "2019-03-19T15:38:01Z",
"updated_at": "2020-08-23T16:04:43Z",
"pushed_at": "2019-03-21T17:26:06Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 16,
"forks": 16,
"watchers": 32,
"score": 0
},
{
"id": 177236589,
"name": "Rails-doubletap-RCE",
@ -22,6 +91,52 @@
"watchers": 105,
"score": 0
},
{
"id": 178527770,
"name": "CVE-2019-5418",
"full_name": "takeokunn\/CVE-2019-5418",
"owner": {
"login": "takeokunn",
"id": 11222510,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11222510?v=4",
"html_url": "https:\/\/github.com\/takeokunn"
},
"html_url": "https:\/\/github.com\/takeokunn\/CVE-2019-5418",
"description": null,
"fork": false,
"created_at": "2019-03-30T07:40:11Z",
"updated_at": "2019-10-24T19:07:56Z",
"pushed_at": "2019-03-30T07:54:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 178909066,
"name": "RailroadBandit",
"full_name": "Bad3r\/RailroadBandit",
"owner": {
"login": "Bad3r",
"id": 25513724,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25513724?v=4",
"html_url": "https:\/\/github.com\/Bad3r"
},
"html_url": "https:\/\/github.com\/Bad3r\/RailroadBandit",
"description": "a demo for Ruby on Rails CVE-2019-5418",
"fork": false,
"created_at": "2019-04-01T17:02:57Z",
"updated_at": "2019-04-11T22:45:53Z",
"pushed_at": "2019-04-11T22:45:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 212888337,
"name": "CVE-2019-5418-Rails3",

48
2019/CVE-2019-5420.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 176976251,
"name": "CVE-2019-5420",
"full_name": "knqyf263\/CVE-2019-5420",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-5420",
"description": "CVE-2019-5420 (Ruby on Rails)",
"fork": false,
"created_at": "2019-03-21T15:42:54Z",
"updated_at": "2020-07-31T01:42:44Z",
"pushed_at": "2019-03-21T23:52:48Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"score": 0
},
{
"id": 178050921,
"name": "cve-2019-5420",
"full_name": "cved-sources\/cve-2019-5420",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-5420",
"description": "cve-2019-5420",
"fork": false,
"created_at": "2019-03-27T18:16:46Z",
"updated_at": "2019-03-27T18:17:07Z",
"pushed_at": "2019-03-27T18:17:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-5624.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 184600046,
"name": "CVE-2019-5624",
"full_name": "VoidSec\/CVE-2019-5624",
"owner": {
"login": "VoidSec",
"id": 5717603,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5717603?v=4",
"html_url": "https:\/\/github.com\/VoidSec"
},
"html_url": "https:\/\/github.com\/VoidSec\/CVE-2019-5624",
"description": "A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE) ",
"fork": false,
"created_at": "2019-05-02T14:54:08Z",
"updated_at": "2020-12-01T09:32:18Z",
"pushed_at": "2019-05-02T15:15:51Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,
"forks": 6,
"watchers": 13,
"score": 0
}
]

View file

@ -1,4 +1,188 @@
[
{
"id": 170398859,
"name": "cve-2019-5736-poc",
"full_name": "q3k\/cve-2019-5736-poc",
"owner": {
"login": "q3k",
"id": 315234,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/315234?v=4",
"html_url": "https:\/\/github.com\/q3k"
},
"html_url": "https:\/\/github.com\/q3k\/cve-2019-5736-poc",
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2020-12-08T07:56:17Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 63,
"forks": 63,
"watchers": 180,
"score": 0
},
{
"id": 170445833,
"name": "CVE-2019-5736-PoC",
"full_name": "Frichetten\/CVE-2019-5736-PoC",
"owner": {
"login": "Frichetten",
"id": 10386884,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10386884?v=4",
"html_url": "https:\/\/github.com\/Frichetten"
},
"html_url": "https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC",
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-01-03T13:04:49Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 444,
"watchers_count": 444,
"forks_count": 111,
"forks": 111,
"watchers": 444,
"score": 0
},
{
"id": 170454928,
"name": "cve-2019-5736",
"full_name": "jakubkrawczyk\/cve-2019-5736",
"owner": {
"login": "jakubkrawczyk",
"id": 22723539,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22723539?v=4",
"html_url": "https:\/\/github.com\/jakubkrawczyk"
},
"html_url": "https:\/\/github.com\/jakubkrawczyk\/cve-2019-5736",
"description": "My attempt to create PoC of CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-13T06:41:01Z",
"updated_at": "2020-08-06T13:05:54Z",
"pushed_at": "2019-02-13T06:46:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 170613828,
"name": "CVE-2019-5736",
"full_name": "jas502n\/CVE-2019-5736",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-5736",
"description": "runc容器逃逸漏洞预警",
"fork": false,
"created_at": "2019-02-14T02:30:12Z",
"updated_at": "2020-02-03T01:45:33Z",
"pushed_at": "2019-02-14T02:40:55Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"score": 0
},
{
"id": 170656576,
"name": "CVE-2019-5736",
"full_name": "likescam\/CVE-2019-5736",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-02-14T08:37:25Z",
"updated_at": "2019-02-14T08:37:36Z",
"pushed_at": "2019-02-14T08:37:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170656601,
"name": "cve-2019-5736-poc",
"full_name": "likescam\/cve-2019-5736-poc",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/cve-2019-5736-poc",
"description": null,
"fork": false,
"created_at": "2019-02-14T08:37:39Z",
"updated_at": "2019-02-14T08:37:49Z",
"pushed_at": "2019-02-14T08:37:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170836971,
"name": "cve-2019-5736-poc",
"full_name": "agppp\/cve-2019-5736-poc",
"owner": {
"login": "agppp",
"id": 10527860,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10527860?v=4",
"html_url": "https:\/\/github.com\/agppp"
},
"html_url": "https:\/\/github.com\/agppp\/cve-2019-5736-poc",
"description": "getshell test",
"fork": false,
"created_at": "2019-02-15T09:22:27Z",
"updated_at": "2019-02-15T09:49:47Z",
"pushed_at": "2019-02-15T09:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 171499608,
"name": "poc-cve-2019-5736",
"full_name": "b3d3c\/poc-cve-2019-5736",
"owner": {
"login": "b3d3c",
"id": 46558799,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46558799?v=4",
"html_url": "https:\/\/github.com\/b3d3c"
},
"html_url": "https:\/\/github.com\/b3d3c\/poc-cve-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-02-19T15:34:18Z",
"updated_at": "2019-06-04T10:53:26Z",
"pushed_at": "2019-02-19T15:37:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 171668415,
"name": "RunC-CVE-2019-5736",
@ -22,6 +206,144 @@
"watchers": 50,
"score": 0
},
{
"id": 173057459,
"name": "CVE-2019-5736-PoC-2",
"full_name": "yyqs2008\/CVE-2019-5736-PoC-2",
"owner": {
"login": "yyqs2008",
"id": 1332668,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1332668?v=4",
"html_url": "https:\/\/github.com\/yyqs2008"
},
"html_url": "https:\/\/github.com\/yyqs2008\/CVE-2019-5736-PoC-2",
"description": null,
"fork": false,
"created_at": "2019-02-28T06:48:13Z",
"updated_at": "2020-06-11T14:27:08Z",
"pushed_at": "2019-02-23T13:20:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 174545720,
"name": "CVE-2019-5736-PoC",
"full_name": "zyriuse75\/CVE-2019-5736-PoC",
"owner": {
"login": "zyriuse75",
"id": 225690,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/225690?v=4",
"html_url": "https:\/\/github.com\/zyriuse75"
},
"html_url": "https:\/\/github.com\/zyriuse75\/CVE-2019-5736-PoC",
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5736 poc of CVE-2019-5736 ",
"fork": false,
"created_at": "2019-03-08T13:50:57Z",
"updated_at": "2019-03-08T13:50:59Z",
"pushed_at": "2019-03-08T13:50:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 177891884,
"name": "CVE-2019-5736",
"full_name": "stillan00b\/CVE-2019-5736",
"owner": {
"login": "stillan00b",
"id": 48630837,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/48630837?v=4",
"html_url": "https:\/\/github.com\/stillan00b"
},
"html_url": "https:\/\/github.com\/stillan00b\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2019-03-27T00:52:49Z",
"updated_at": "2019-03-27T01:05:08Z",
"pushed_at": "2019-03-27T01:05:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 181238407,
"name": "cve-2019-5736-exp",
"full_name": "milloni\/cve-2019-5736-exp",
"owner": {
"login": "milloni",
"id": 2845035,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2845035?v=4",
"html_url": "https:\/\/github.com\/milloni"
},
"html_url": "https:\/\/github.com\/milloni\/cve-2019-5736-exp",
"description": "Exploit for CVE-2019-5736 runc vulnerability",
"fork": false,
"created_at": "2019-04-13T23:18:54Z",
"updated_at": "2019-04-16T18:18:42Z",
"pushed_at": "2019-04-14T21:39:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 185733954,
"name": "Docker-Runc-Exploit",
"full_name": "13paulmurith\/Docker-Runc-Exploit",
"owner": {
"login": "13paulmurith",
"id": 26403285,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26403285?v=4",
"html_url": "https:\/\/github.com\/13paulmurith"
},
"html_url": "https:\/\/github.com\/13paulmurith\/Docker-Runc-Exploit",
"description": "Docker runc CVE-2019-5736 exploit Dockerfile. Credits : https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC.git",
"fork": false,
"created_at": "2019-05-09T05:45:21Z",
"updated_at": "2019-05-09T05:47:46Z",
"pushed_at": "2019-05-09T05:47:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 194520468,
"name": "CVE-2019-5736-POC",
"full_name": "RyanNgWH\/CVE-2019-5736-POC",
"owner": {
"login": "RyanNgWH",
"id": 44436551,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44436551?v=4",
"html_url": "https:\/\/github.com\/RyanNgWH"
},
"html_url": "https:\/\/github.com\/RyanNgWH\/CVE-2019-5736-POC",
"description": "Proof of concept code for breaking out of docker via runC",
"fork": false,
"created_at": "2019-06-30T13:42:14Z",
"updated_at": "2019-06-30T16:33:39Z",
"pushed_at": "2019-06-30T16:33:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 200632359,
"name": "cve-2019-5736-study",

25
2019/CVE-2019-5737.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 172282648,
"name": "cve-2019-5737",
"full_name": "beelzebruh\/cve-2019-5737",
"owner": {
"login": "beelzebruh",
"id": 39379168,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39379168?v=4",
"html_url": "https:\/\/github.com\/beelzebruh"
},
"html_url": "https:\/\/github.com\/beelzebruh\/cve-2019-5737",
"description": null,
"fork": false,
"created_at": "2019-02-24T01:20:04Z",
"updated_at": "2020-05-12T03:29:52Z",
"pushed_at": "2019-02-24T03:43:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-5786.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 176796740,
"name": "CVE-2019-5786",
"full_name": "exodusintel\/CVE-2019-5786",
"owner": {
"login": "exodusintel",
"id": 16653014,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16653014?v=4",
"html_url": "https:\/\/github.com\/exodusintel"
},
"html_url": "https:\/\/github.com\/exodusintel\/CVE-2019-5786",
"description": "FileReader Exploit",
"fork": false,
"created_at": "2019-03-20T18:43:49Z",
"updated_at": "2020-12-31T02:54:21Z",
"pushed_at": "2019-03-20T18:47:25Z",
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 85,
"forks": 85,
"watchers": 253,
"score": 0
}
]

25
2019/CVE-2019-6203.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 185970201,
"name": "CVE-2019-6203-PoC",
"full_name": "qingxp9\/CVE-2019-6203-PoC",
"owner": {
"login": "qingxp9",
"id": 2822242,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2822242?v=4",
"html_url": "https:\/\/github.com\/qingxp9"
},
"html_url": "https:\/\/github.com\/qingxp9\/CVE-2019-6203-PoC",
"description": "PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4",
"fork": false,
"created_at": "2019-05-10T10:36:54Z",
"updated_at": "2020-12-29T01:02:40Z",
"pushed_at": "2019-05-17T03:10:30Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 12,
"forks": 12,
"watchers": 30,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 187157796,
"name": "CVE-2019-6207",
"full_name": "dothanthitiendiettiende\/CVE-2019-6207",
"owner": {
"login": "dothanthitiendiettiende",
"id": 29480786,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29480786?v=4",
"html_url": "https:\/\/github.com\/dothanthitiendiettiende"
},
"html_url": "https:\/\/github.com\/dothanthitiendiettiende\/CVE-2019-6207",
"description": "getdirentriesattr kernel heap inofo leak",
"fork": false,
"created_at": "2019-05-17T06:17:51Z",
"updated_at": "2019-05-17T06:29:13Z",
"pushed_at": "2019-05-17T06:17:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 187160556,
"name": "CVE-2019-6207",

71
2019/CVE-2019-6225.json Normal file
View file

@ -0,0 +1,71 @@
[
{
"id": 168440280,
"name": "OsirisJailbreak12",
"full_name": "fatgrass\/OsirisJailbreak12",
"owner": {
"login": "fatgrass",
"id": 19977419,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19977419?v=4",
"html_url": "https:\/\/github.com\/fatgrass"
},
"html_url": "https:\/\/github.com\/fatgrass\/OsirisJailbreak12",
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
"fork": false,
"created_at": "2019-01-31T01:03:43Z",
"updated_at": "2020-07-28T09:05:58Z",
"pushed_at": "2019-01-31T00:53:03Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 73,
"forks": 73,
"watchers": 10,
"score": 0
},
{
"id": 194542840,
"name": "CVE-2019-6225-macOS",
"full_name": "TrungNguyen1909\/CVE-2019-6225-macOS",
"owner": {
"login": "TrungNguyen1909",
"id": 22745058,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22745058?v=4",
"html_url": "https:\/\/github.com\/TrungNguyen1909"
},
"html_url": "https:\/\/github.com\/TrungNguyen1909\/CVE-2019-6225-macOS",
"description": null,
"fork": false,
"created_at": "2019-06-30T17:26:53Z",
"updated_at": "2020-04-01T13:37:24Z",
"pushed_at": "2019-06-30T17:28:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 201224192,
"name": "jailbreak-iOS12",
"full_name": "raystyle\/jailbreak-iOS12",
"owner": {
"login": "raystyle",
"id": 3284570,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3284570?v=4",
"html_url": "https:\/\/github.com\/raystyle"
},
"html_url": "https:\/\/github.com\/raystyle\/jailbreak-iOS12",
"description": "OS 12.0 & 12.1.2 - Jailbreak with CVE-2019-6225",
"fork": false,
"created_at": "2019-08-08T09:22:57Z",
"updated_at": "2019-09-28T04:38:14Z",
"pushed_at": "2019-02-27T12:57:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-6249.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171827364,
"name": "CVE-2019-6249_Hucart-cms",
"full_name": "NMTech0x90\/CVE-2019-6249_Hucart-cms",
"owner": {
"login": "NMTech0x90",
"id": 27001865,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/27001865?v=4",
"html_url": "https:\/\/github.com\/NMTech0x90"
},
"html_url": "https:\/\/github.com\/NMTech0x90\/CVE-2019-6249_Hucart-cms",
"description": "CVE-2019-6249 Hucart cms 复现环境",
"fork": false,
"created_at": "2019-02-21T08:03:43Z",
"updated_at": "2020-03-25T03:29:55Z",
"pushed_at": "2019-02-21T08:22:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,142 @@
[
{
"id": 172094613,
"name": "Drupal-SA-CORE-2019-003",
"full_name": "g0rx\/Drupal-SA-CORE-2019-003",
"owner": {
"login": "g0rx",
"id": 10961397,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10961397?v=4",
"html_url": "https:\/\/github.com\/g0rx"
},
"html_url": "https:\/\/github.com\/g0rx\/Drupal-SA-CORE-2019-003",
"description": "CVE-2019-6340-Drupal SA-CORE-2019-003",
"fork": false,
"created_at": "2019-02-22T16:03:40Z",
"updated_at": "2020-11-04T08:14:58Z",
"pushed_at": "2019-02-24T18:43:05Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 9,
"forks": 9,
"watchers": 32,
"score": 0
},
{
"id": 172217636,
"name": "CVE-2019-6340",
"full_name": "knqyf263\/CVE-2019-6340",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-6340",
"description": "Environment for CVE-2019-6340 (Drupal)",
"fork": false,
"created_at": "2019-02-23T13:28:58Z",
"updated_at": "2020-04-02T13:09:08Z",
"pushed_at": "2019-02-23T17:34:19Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 10,
"forks": 10,
"watchers": 41,
"score": 0
},
{
"id": 172429144,
"name": "CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"full_name": "DevDungeon\/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"owner": {
"login": "DevDungeon",
"id": 16630634,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16630634?v=4",
"html_url": "https:\/\/github.com\/DevDungeon"
},
"html_url": "https:\/\/github.com\/DevDungeon\/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
"description": "CVE-2019-6340 Drupal 8.6.9 REST Auth Bypass examples",
"fork": false,
"created_at": "2019-02-25T03:38:47Z",
"updated_at": "2020-05-30T04:32:25Z",
"pushed_at": "2019-02-25T03:47:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 6,
"forks": 6,
"watchers": 3,
"score": 0
},
{
"id": 172458734,
"name": "CVE-2019-6340",
"full_name": "oways\/CVE-2019-6340",
"owner": {
"login": "oways",
"id": 11142952,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11142952?v=4",
"html_url": "https:\/\/github.com\/oways"
},
"html_url": "https:\/\/github.com\/oways\/CVE-2019-6340",
"description": "CVE-2019-6340 POC Drupal rce",
"fork": false,
"created_at": "2019-02-25T07:47:16Z",
"updated_at": "2020-04-02T11:50:43Z",
"pushed_at": "2019-02-25T08:57:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 6,
"forks": 6,
"watchers": 12,
"score": 0
},
{
"id": 172766416,
"name": "cve-2019-6340",
"full_name": "cved-sources\/cve-2019-6340",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-6340",
"description": "cve-2019-6340",
"fork": false,
"created_at": "2019-02-26T18:26:50Z",
"updated_at": "2020-04-02T13:08:58Z",
"pushed_at": "2019-02-26T18:38:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 175109773,
"name": "cve-2019-6340-bits",
"full_name": "d1vious\/cve-2019-6340-bits",
"owner": {
"login": "d1vious",
"id": 1476868,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1476868?v=4",
"html_url": "https:\/\/github.com\/d1vious"
},
"html_url": "https:\/\/github.com\/d1vious\/cve-2019-6340-bits",
"description": "Bits generated while analyzing CVE-2019-6340 Drupal RESTful RCE",
"fork": false,
"created_at": "2019-03-12T01:13:56Z",
"updated_at": "2019-04-15T07:13:03Z",
"pushed_at": "2019-03-12T01:41:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 188896047,
"name": "CVE-2019-6340",

25
2019/CVE-2019-6440.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 170884262,
"name": "CVE-2019-6440",
"full_name": "hexnone\/CVE-2019-6440",
"owner": {
"login": "hexnone",
"id": 17256467,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17256467?v=4",
"html_url": "https:\/\/github.com\/hexnone"
},
"html_url": "https:\/\/github.com\/hexnone\/CVE-2019-6440",
"description": "CVE-2019-6440. Zemana RCE and privilege escalation.",
"fork": false,
"created_at": "2019-02-15T15:15:52Z",
"updated_at": "2019-03-22T18:53:26Z",
"pushed_at": "2019-03-22T18:53:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-6446.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 186728497,
"name": "CVE-2019-6446",
"full_name": "RayScri\/CVE-2019-6446",
"owner": {
"login": "RayScri",
"id": 49472130,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/49472130?v=4",
"html_url": "https:\/\/github.com\/RayScri"
},
"html_url": "https:\/\/github.com\/RayScri\/CVE-2019-6446",
"description": "Numpy deserialization command execution",
"fork": false,
"created_at": "2019-05-15T01:39:53Z",
"updated_at": "2020-05-08T12:12:22Z",
"pushed_at": "2019-05-15T02:22:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 164948400,
"name": "ESFileExplorerOpenPortVuln",
"full_name": "fs0c131y\/ESFileExplorerOpenPortVuln",
"owner": {
"login": "fs0c131y",
"id": 36547191,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36547191?v=4",
"html_url": "https:\/\/github.com\/fs0c131y"
},
"html_url": "https:\/\/github.com\/fs0c131y\/ESFileExplorerOpenPortVuln",
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2021-01-03T06:28:59Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 591,
"watchers_count": 591,
"forks_count": 131,
"forks": 131,
"watchers": 591,
"score": 0
},
{
"id": 263921419,
"name": "ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447",

View file

@ -1,4 +1,27 @@
[
{
"id": 171244957,
"name": "cve-2019-6453-poc",
"full_name": "proofofcalc\/cve-2019-6453-poc",
"owner": {
"login": "proofofcalc",
"id": 47607270,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/47607270?v=4",
"html_url": "https:\/\/github.com\/proofofcalc"
},
"html_url": "https:\/\/github.com\/proofofcalc\/cve-2019-6453-poc",
"description": "Proof of calc for CVE-2019-6453",
"fork": false,
"created_at": "2019-02-18T08:35:03Z",
"updated_at": "2020-11-03T21:48:56Z",
"pushed_at": "2019-02-18T13:10:38Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 14,
"forks": 14,
"watchers": 49,
"score": 0
},
{
"id": 197653851,
"name": "mIRC-CVE-2019-6453",

25
2019/CVE-2019-6467.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 183349186,
"name": "CVE-2019-6467",
"full_name": "knqyf263\/CVE-2019-6467",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-6467",
"description": "CVE-2019-6467 (BIND nxdomain-redirect)",
"fork": false,
"created_at": "2019-04-25T03:26:42Z",
"updated_at": "2020-06-24T02:18:49Z",
"pushed_at": "2019-04-25T04:06:48Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 6,
"forks": 6,
"watchers": 26,
"score": 0
}
]

25
2019/CVE-2019-6487.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 166241615,
"name": "TP-Link-WDR-Router-Command-injection_POC",
"full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"owner": {
"login": "afang5472",
"id": 18503100,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18503100?v=4",
"html_url": "https:\/\/github.com\/afang5472"
},
"html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.",
"fork": false,
"created_at": "2019-01-17T14:44:12Z",
"updated_at": "2021-01-03T15:06:26Z",
"pushed_at": "2019-01-19T10:49:21Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 14,
"forks": 14,
"watchers": 26,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 179225702,
"name": "CVE-2019-6690",
"full_name": "brianwrf\/CVE-2019-6690",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2019-6690",
"description": "It is a simple PoC of Improper Input Validation in python-gnupg 0.4.3 (CVE-2019-6690).",
"fork": false,
"created_at": "2019-04-03T06:34:48Z",
"updated_at": "2019-04-08T14:49:17Z",
"pushed_at": "2019-04-03T07:57:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
}
]

25
2019/CVE-2019-7216.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 168365175,
"name": "CVE-2019-7216",
"full_name": "Ekultek\/CVE-2019-7216",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/CVE-2019-7216",
"description": "Filechucker filter bypass Proof Of Concept",
"fork": false,
"created_at": "2019-01-30T15:23:40Z",
"updated_at": "2020-03-30T04:22:37Z",
"pushed_at": "2019-02-01T16:56:53Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"score": 0
}
]

25
2019/CVE-2019-7219.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 170672635,
"name": "CVE-2019-7219",
"full_name": "verifysecurity\/CVE-2019-7219",
"owner": {
"login": "verifysecurity",
"id": 17159314,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/17159314?v=4",
"html_url": "https:\/\/github.com\/verifysecurity"
},
"html_url": "https:\/\/github.com\/verifysecurity\/CVE-2019-7219",
"description": "CVE-2019-7219",
"fork": false,
"created_at": "2019-02-14T10:24:48Z",
"updated_at": "2019-04-12T19:30:42Z",
"pushed_at": "2019-04-12T19:30:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 172401532,
"name": "CVE-2019-7238",
"full_name": "mpgn\/CVE-2019-7238",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-7238",
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2020-12-30T11:55:07Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 44,
"forks": 44,
"watchers": 137,
"score": 0
},
{
"id": 187840869,
"name": "CVE-2019-7238",
@ -22,6 +45,29 @@
"watchers": 57,
"score": 0
},
{
"id": 199046172,
"name": "nexus_rce_CVE-2019-7238",
"full_name": "verctor\/nexus_rce_CVE-2019-7238",
"owner": {
"login": "verctor",
"id": 24811125,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24811125?v=4",
"html_url": "https:\/\/github.com\/verctor"
},
"html_url": "https:\/\/github.com\/verctor\/nexus_rce_CVE-2019-7238",
"description": "Some debug notes and exploit(not blind)",
"fork": false,
"created_at": "2019-07-26T16:08:40Z",
"updated_at": "2020-08-09T15:22:02Z",
"pushed_at": "2019-07-28T02:32:07Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 7,
"forks": 7,
"watchers": 35,
"score": 0
},
{
"id": 233010845,
"name": "CVE-2019-7238_Nexus_RCE_Tool",

48
2019/CVE-2019-7304.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 170261590,
"name": "dirty_sock",
"full_name": "initstring\/dirty_sock",
"owner": {
"login": "initstring",
"id": 26131150,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/26131150?v=4",
"html_url": "https:\/\/github.com\/initstring"
},
"html_url": "https:\/\/github.com\/initstring\/dirty_sock",
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-01-03T03:50:10Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 532,
"watchers_count": 532,
"forks_count": 111,
"forks": 111,
"watchers": 532,
"score": 0
},
{
"id": 170741210,
"name": "CVE-2019-7304_DirtySock",
"full_name": "SecuritySi\/CVE-2019-7304_DirtySock",
"owner": {
"login": "SecuritySi",
"id": 7517443,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7517443?v=4",
"html_url": "https:\/\/github.com\/SecuritySi"
},
"html_url": "https:\/\/github.com\/SecuritySi\/CVE-2019-7304_DirtySock",
"description": "Payload Generator",
"fork": false,
"created_at": "2019-02-14T18:48:56Z",
"updated_at": "2019-03-05T06:03:09Z",
"pushed_at": "2019-02-14T18:49:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
}
]

25
2019/CVE-2019-7642.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 173723117,
"name": "CVE-2019-7642",
"full_name": "xw77cve\/CVE-2019-7642",
"owner": {
"login": "xw77cve",
"id": 48202281,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48202281?v=4",
"html_url": "https:\/\/github.com\/xw77cve"
},
"html_url": "https:\/\/github.com\/xw77cve\/CVE-2019-7642",
"description": null,
"fork": false,
"created_at": "2019-03-04T10:24:04Z",
"updated_at": "2019-10-04T12:40:46Z",
"pushed_at": "2019-03-04T11:04:30Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 1,
"forks": 1,
"watchers": 15,
"score": 0
}
]

25
2019/CVE-2019-8389.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171097356,
"name": "CVE-2019-8389",
"full_name": "shawarkhanethicalhacker\/CVE-2019-8389",
"owner": {
"login": "shawarkhanethicalhacker",
"id": 41706151,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/41706151?v=4",
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker"
},
"html_url": "https:\/\/github.com\/shawarkhanethicalhacker\/CVE-2019-8389",
"description": " [CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application ",
"fork": false,
"created_at": "2019-02-17T08:10:50Z",
"updated_at": "2020-08-13T10:37:29Z",
"pushed_at": "2019-02-17T08:40:06Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"forks": 6,
"watchers": 7,
"score": 0
}
]

25
2019/CVE-2019-8513.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 184210054,
"name": "cve-2019-8513",
"full_name": "genknife\/cve-2019-8513",
"owner": {
"login": "genknife",
"id": 47594735,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/47594735?v=4",
"html_url": "https:\/\/github.com\/genknife"
},
"html_url": "https:\/\/github.com\/genknife\/cve-2019-8513",
"description": null,
"fork": false,
"created_at": "2019-04-30T07:06:23Z",
"updated_at": "2019-07-10T02:57:11Z",
"pushed_at": "2019-07-10T02:57:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-8540.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 187144564,
"name": "CVE-2019-8540",
"full_name": "maldiohead\/CVE-2019-8540",
"owner": {
"login": "maldiohead",
"id": 23315692,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23315692?v=4",
"html_url": "https:\/\/github.com\/maldiohead"
},
"html_url": "https:\/\/github.com\/maldiohead\/CVE-2019-8540",
"description": "Kernel Stack info leak at exportObjectToClient function",
"fork": false,
"created_at": "2019-05-17T04:07:14Z",
"updated_at": "2020-12-26T09:21:42Z",
"pushed_at": "2019-05-21T08:32:39Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 15,
"forks": 15,
"watchers": 35,
"score": 0
}
]

25
2019/CVE-2019-8565.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 184996067,
"name": "cve-2019-8565",
"full_name": "genknife\/cve-2019-8565",
"owner": {
"login": "genknife",
"id": 47594735,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/47594735?v=4",
"html_url": "https:\/\/github.com\/genknife"
},
"html_url": "https:\/\/github.com\/genknife\/cve-2019-8565",
"description": null,
"fork": false,
"created_at": "2019-05-05T07:34:05Z",
"updated_at": "2019-07-10T02:58:35Z",
"pushed_at": "2019-07-10T02:58:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2019/CVE-2019-8627.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 187134540,
"name": "CVE-2019-8627",
"full_name": "maldiohead\/CVE-2019-8627",
"owner": {
"login": "maldiohead",
"id": 23315692,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23315692?v=4",
"html_url": "https:\/\/github.com\/maldiohead"
},
"html_url": "https:\/\/github.com\/maldiohead\/CVE-2019-8627",
"description": "a kernel information leak on macOS<= 10.14.4",
"fork": false,
"created_at": "2019-05-17T02:40:39Z",
"updated_at": "2019-10-30T05:52:25Z",
"pushed_at": "2019-05-24T08:44:05Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"score": 0
}
]

Some files were not shown because too many files have changed in this diff Show more