mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/04/13 00:15:08
This commit is contained in:
parent
e5825ca873
commit
516579452e
50 changed files with 163 additions and 1682 deletions
|
@ -40,7 +40,7 @@
|
|||
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-10T19:34:11Z",
|
||||
"updated_at": "2016-02-13T02:14:24Z",
|
||||
"updated_at": "2022-04-12T19:44:53Z",
|
||||
"pushed_at": "2015-09-10T15:39:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -26,33 +26,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 95974378,
|
||||
"name": "CVE-2017-0213",
|
||||
"full_name": "zcgonvh\/CVE-2017-0213",
|
||||
"owner": {
|
||||
"login": "zcgonvh",
|
||||
"id": 25787677,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
|
||||
"html_url": "https:\/\/github.com\/zcgonvh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
|
||||
"description": "CVE-2017-0213 for command line",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-01T16:07:04Z",
|
||||
"updated_at": "2022-02-19T23:23:03Z",
|
||||
"pushed_at": "2017-07-01T16:19:12Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105444160,
|
||||
"name": "CVE-2017-0213",
|
||||
|
|
|
@ -1,409 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 100002532,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "timwr\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "timwr",
|
||||
"id": 684924,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4",
|
||||
"html_url": "https:\/\/github.com\/timwr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timwr\/CVE-2017-1000117",
|
||||
"description": "Proof of concept of CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T07:03:23Z",
|
||||
"updated_at": "2021-05-04T08:13:49Z",
|
||||
"pushed_at": "2017-08-11T08:27:04Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100058519,
|
||||
"name": "test-git-vuln_CVE-2017-1000117",
|
||||
"full_name": "GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "GrahamMThomas",
|
||||
"id": 14031456,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14031456?v=4",
|
||||
"html_url": "https:\/\/github.com\/GrahamMThomas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
|
||||
"description": "Repo to test the new git vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T18:05:01Z",
|
||||
"updated_at": "2017-09-26T17:09:13Z",
|
||||
"pushed_at": "2017-08-11T20:15:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100069051,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "Manouchehri\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "Manouchehri",
|
||||
"id": 7232674,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7232674?v=4",
|
||||
"html_url": "https:\/\/github.com\/Manouchehri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Manouchehri\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T20:47:53Z",
|
||||
"updated_at": "2018-04-19T04:23:54Z",
|
||||
"pushed_at": "2017-08-11T21:26:33Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100080640,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "thelastbyte\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "thelastbyte",
|
||||
"id": 7829097,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7829097?v=4",
|
||||
"html_url": "https:\/\/github.com\/thelastbyte"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thelastbyte\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T01:10:49Z",
|
||||
"updated_at": "2017-09-01T22:06:02Z",
|
||||
"pushed_at": "2017-09-01T22:08:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100116587,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "alilangtest\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "alilangtest",
|
||||
"id": 20162983,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20162983?v=4",
|
||||
"html_url": "https:\/\/github.com\/alilangtest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alilangtest\/CVE-2017-1000117",
|
||||
"description": "test",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T14:14:55Z",
|
||||
"updated_at": "2019-05-09T09:27:01Z",
|
||||
"pushed_at": "2017-08-12T14:25:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100130122,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "VulApps\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "VulApps",
|
||||
"id": 29811930,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29811930?v=4",
|
||||
"html_url": "https:\/\/github.com\/VulApps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VulApps\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T18:20:02Z",
|
||||
"updated_at": "2020-03-21T15:06:32Z",
|
||||
"pushed_at": "2017-08-12T18:22:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100280254,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "greymd\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "greymd",
|
||||
"id": 3874767,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4",
|
||||
"html_url": "https:\/\/github.com\/greymd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/greymd\/CVE-2017-1000117",
|
||||
"description": "Check Git's vulnerability CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-14T15:05:48Z",
|
||||
"updated_at": "2021-12-27T04:32:52Z",
|
||||
"pushed_at": "2017-08-16T15:39:15Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100325886,
|
||||
"name": "Fix-CVE-2017-1000117",
|
||||
"full_name": "shogo82148\/Fix-CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "shogo82148",
|
||||
"id": 1157344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1157344?v=4",
|
||||
"html_url": "https:\/\/github.com\/shogo82148"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shogo82148\/Fix-CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T01:40:18Z",
|
||||
"updated_at": "2017-08-17T03:44:20Z",
|
||||
"pushed_at": "2017-08-17T03:44:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100357293,
|
||||
"name": "CVE-2017-1000117_wasawasa",
|
||||
"full_name": "sasairc\/CVE-2017-1000117_wasawasa",
|
||||
"owner": {
|
||||
"login": "sasairc",
|
||||
"id": 9349287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9349287?v=4",
|
||||
"html_url": "https:\/\/github.com\/sasairc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sasairc\/CVE-2017-1000117_wasawasa",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T08:39:23Z",
|
||||
"updated_at": "2017-08-15T09:39:16Z",
|
||||
"pushed_at": "2017-08-15T08:43:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100374790,
|
||||
"name": "CVE-2017-1000117-test",
|
||||
"full_name": "Shadow5523\/CVE-2017-1000117-test",
|
||||
"owner": {
|
||||
"login": "Shadow5523",
|
||||
"id": 22784789,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22784789?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shadow5523"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shadow5523\/CVE-2017-1000117-test",
|
||||
"description": "CVE-2017-1000117の検証",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T12:24:57Z",
|
||||
"updated_at": "2017-08-17T14:54:39Z",
|
||||
"pushed_at": "2017-08-18T02:18:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100437171,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "ieee0824\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "ieee0824",
|
||||
"id": 5692475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4",
|
||||
"html_url": "https:\/\/github.com\/ieee0824"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T02:05:08Z",
|
||||
"updated_at": "2017-08-16T08:10:25Z",
|
||||
"pushed_at": "2017-08-16T10:03:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100445561,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "rootclay\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "rootclay",
|
||||
"id": 29671471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29671471?v=4",
|
||||
"html_url": "https:\/\/github.com\/rootclay"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rootclay\/CVE-2017-1000117",
|
||||
"description": "CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T03:52:27Z",
|
||||
"updated_at": "2017-08-16T04:00:53Z",
|
||||
"pushed_at": "2017-08-16T06:14:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100446125,
|
||||
"name": "CVE-2017-1000117-sl",
|
||||
"full_name": "ieee0824\/CVE-2017-1000117-sl",
|
||||
"owner": {
|
||||
"login": "ieee0824",
|
||||
"id": 5692475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4",
|
||||
"html_url": "https:\/\/github.com\/ieee0824"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117-sl",
|
||||
"description": "Experiment of CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T04:01:08Z",
|
||||
"updated_at": "2017-08-16T05:42:26Z",
|
||||
"pushed_at": "2017-08-16T09:54:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100498924,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "takehaya\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "takehaya",
|
||||
"id": 10973623,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10973623?v=4",
|
||||
"html_url": "https:\/\/github.com\/takehaya"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/takehaya\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T14:34:37Z",
|
||||
"updated_at": "2017-08-16T14:34:37Z",
|
||||
"pushed_at": "2017-08-17T18:45:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100544749,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "ikmski\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "ikmski",
|
||||
"id": 6622579,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6622579?v=4",
|
||||
"html_url": "https:\/\/github.com\/ikmski"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ikmski\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-17T00:37:47Z",
|
||||
"updated_at": "2017-08-17T00:37:47Z",
|
||||
"pushed_at": "2017-08-17T00:57:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100730507,
|
||||
"name": "CVE-2017-1000117",
|
||||
|
@ -431,60 +26,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100926724,
|
||||
"name": "test",
|
||||
"full_name": "chenzhuo0618\/test",
|
||||
"owner": {
|
||||
"login": "chenzhuo0618",
|
||||
"id": 5562130,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5562130?v=4",
|
||||
"html_url": "https:\/\/github.com\/chenzhuo0618"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chenzhuo0618\/test",
|
||||
"description": "test for CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-21T07:46:16Z",
|
||||
"updated_at": "2017-08-21T07:46:48Z",
|
||||
"pushed_at": "2017-08-21T08:51:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 102318198,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "siling2017\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "siling2017",
|
||||
"id": 27729343,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27729343?v=4",
|
||||
"html_url": "https:\/\/github.com\/siling2017"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/siling2017\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-04T04:18:19Z",
|
||||
"updated_at": "2017-09-04T04:18:29Z",
|
||||
"pushed_at": "2017-09-04T04:18:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112913757,
|
||||
"name": "CVE-2017-1000117",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 100021936,
|
||||
"name": "CVE-2017-10661_POC",
|
||||
"full_name": "GeneBlue\/CVE-2017-10661_POC",
|
||||
"owner": {
|
||||
"login": "GeneBlue",
|
||||
"id": 10919709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10919709?v=4",
|
||||
"html_url": "https:\/\/github.com\/GeneBlue"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GeneBlue\/CVE-2017-10661_POC",
|
||||
"description": "poc for cve-2017-10661",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T10:45:10Z",
|
||||
"updated_at": "2020-12-17T10:26:55Z",
|
||||
"pushed_at": "2017-08-11T10:45:56Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 101361478,
|
||||
"name": "Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"full_name": "faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"owner": {
|
||||
"login": "faizzaidi",
|
||||
"id": 12153050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12153050?v=4",
|
||||
"html_url": "https:\/\/github.com\/faizzaidi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"description": "WolfCMS-v0.8.3.1 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-11611",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-25T03:19:05Z",
|
||||
"updated_at": "2020-07-17T05:22:39Z",
|
||||
"pushed_at": "2017-08-25T03:19:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 100264267,
|
||||
"name": "CVE-2017-12426",
|
||||
"full_name": "sm-paul-schuette\/CVE-2017-12426",
|
||||
"owner": {
|
||||
"login": "sm-paul-schuette",
|
||||
"id": 29304646,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29304646?v=4",
|
||||
"html_url": "https:\/\/github.com\/sm-paul-schuette"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sm-paul-schuette\/CVE-2017-12426",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-14T12:18:15Z",
|
||||
"updated_at": "2017-08-14T12:18:15Z",
|
||||
"pushed_at": "2017-08-14T12:19:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 102809812,
|
||||
"name": "S2-053-CVE-2017-12611",
|
||||
"full_name": "brianwrf\/S2-053-CVE-2017-12611",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/S2-053-CVE-2017-12611",
|
||||
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T02:50:37Z",
|
||||
"updated_at": "2020-12-14T01:19:43Z",
|
||||
"pushed_at": "2017-09-08T11:59:20Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 107090388,
|
||||
"name": "cve-2017-12792",
|
||||
"full_name": "ZZS2017\/cve-2017-12792",
|
||||
"owner": {
|
||||
"login": "ZZS2017",
|
||||
"id": 30464951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30464951?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZZS2017"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZZS2017\/cve-2017-12792",
|
||||
"description": "NexusPHP CSRF+XSS",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-16T07:06:19Z",
|
||||
"updated_at": "2019-11-21T10:28:20Z",
|
||||
"pushed_at": "2017-08-21T09:38:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 102123441,
|
||||
"name": "CVE-2017-14105",
|
||||
"full_name": "theguly\/CVE-2017-14105",
|
||||
"owner": {
|
||||
"login": "theguly",
|
||||
"id": 1745802,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1745802?v=4",
|
||||
"html_url": "https:\/\/github.com\/theguly"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/theguly\/CVE-2017-14105",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-01T14:51:31Z",
|
||||
"updated_at": "2019-01-08T00:25:52Z",
|
||||
"pushed_at": "2017-09-14T13:14:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 102810621,
|
||||
"name": "CVE-2017-14262",
|
||||
"full_name": "zzz66686\/CVE-2017-14262",
|
||||
"owner": {
|
||||
"login": "zzz66686",
|
||||
"id": 14144972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzz66686"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14262",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T02:59:21Z",
|
||||
"updated_at": "2021-12-15T14:32:48Z",
|
||||
"pushed_at": "2017-09-13T14:39:40Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 102832029,
|
||||
"name": "CVE-2017-14263",
|
||||
"full_name": "zzz66686\/CVE-2017-14263",
|
||||
"owner": {
|
||||
"login": "zzz66686",
|
||||
"id": 14144972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzz66686"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14263",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T07:27:13Z",
|
||||
"updated_at": "2021-12-15T14:32:48Z",
|
||||
"pushed_at": "2017-09-13T14:40:53Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 100696664,
|
||||
"name": "CVE-2017-2368",
|
||||
"full_name": "vincedes3\/CVE-2017-2368",
|
||||
"owner": {
|
||||
"login": "vincedes3",
|
||||
"id": 26314689,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314689?v=4",
|
||||
"html_url": "https:\/\/github.com\/vincedes3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vincedes3\/CVE-2017-2368",
|
||||
"description": "CVE-2017-2368 VCF Message App Crash Bug",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-18T09:33:57Z",
|
||||
"updated_at": "2017-08-18T09:33:57Z",
|
||||
"pushed_at": "2017-08-18T09:36:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 99374230,
|
||||
"name": "IOFireWireFamily-null-deref",
|
||||
"full_name": "bazad\/IOFireWireFamily-null-deref",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/IOFireWireFamily-null-deref",
|
||||
"description": "CVE-2017-2388: Null-pointer dereference in IOFireWireFamily.",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-04T19:35:20Z",
|
||||
"updated_at": "2021-08-04T06:28:49Z",
|
||||
"pushed_at": "2017-08-16T20:16:12Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 96219146,
|
||||
"name": "CVE-2017-3241-POC",
|
||||
"full_name": "xfei3\/CVE-2017-3241-POC",
|
||||
"owner": {
|
||||
"login": "xfei3",
|
||||
"id": 29874084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29874084?v=4",
|
||||
"html_url": "https:\/\/github.com\/xfei3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC",
|
||||
"description": "POC for java RMI deserialization vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-04T13:05:46Z",
|
||||
"updated_at": "2020-03-29T07:05:46Z",
|
||||
"pushed_at": "2017-07-19T23:55:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 419955901,
|
||||
"name": "CVE-2017-3241",
|
||||
|
|
|
@ -25,32 +25,5 @@
|
|||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 96573883,
|
||||
"name": "CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T20:21:51Z",
|
||||
"updated_at": "2017-08-23T09:24:55Z",
|
||||
"pushed_at": "2017-07-11T15:36:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 107852472,
|
||||
"name": "wpUsersScan",
|
||||
"full_name": "teambugsbunny\/wpUsersScan",
|
||||
"owner": {
|
||||
"login": "teambugsbunny",
|
||||
"id": 32997799,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32997799?v=4",
|
||||
"html_url": "https:\/\/github.com\/teambugsbunny"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan",
|
||||
"description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-22T09:22:28Z",
|
||||
"updated_at": "2020-04-06T12:23:41Z",
|
||||
"pushed_at": "2017-06-11T16:47:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121831599,
|
||||
"name": "wpUsersScan",
|
||||
|
|
|
@ -1001,87 +1001,6 @@
|
|||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 98150795,
|
||||
"name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"owner": {
|
||||
"login": "R4v3nBl4ck",
|
||||
"id": 30399308,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30399308?v=4",
|
||||
"html_url": "https:\/\/github.com\/R4v3nBl4ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"description": "Exploit created by: R4v3nBl4ck end Pacman",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-24T05:05:28Z",
|
||||
"updated_at": "2020-07-12T14:06:08Z",
|
||||
"pushed_at": "2017-07-24T23:55:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100141854,
|
||||
"name": "CVE-2017-5638",
|
||||
"full_name": "Xhendos\/CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "Xhendos",
|
||||
"id": 16403693,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16403693?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xhendos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xhendos\/CVE-2017-5638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T23:00:14Z",
|
||||
"updated_at": "2017-08-12T23:04:13Z",
|
||||
"pushed_at": "2017-08-26T17:32:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 101267457,
|
||||
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||||
"full_name": "TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||||
"owner": {
|
||||
"login": "TamiiLambrado",
|
||||
"id": 23249848,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23249848?v=4",
|
||||
"html_url": "https:\/\/github.com\/TamiiLambrado"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-24T07:36:14Z",
|
||||
"updated_at": "2017-08-24T07:36:14Z",
|
||||
"pushed_at": "2017-08-24T07:36:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104686879,
|
||||
"name": "strutser",
|
||||
|
@ -1139,33 +1058,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107489354,
|
||||
"name": "Apache-Struts",
|
||||
"full_name": "c002\/Apache-Struts",
|
||||
"owner": {
|
||||
"login": "c002",
|
||||
"id": 26592580,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26592580?v=4",
|
||||
"html_url": "https:\/\/github.com\/c002"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c002\/Apache-Struts",
|
||||
"description": " An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-19T02:40:45Z",
|
||||
"updated_at": "2020-05-17T04:32:06Z",
|
||||
"pushed_at": "2017-05-28T14:03:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 108805305,
|
||||
"name": "Common-Vulnerability-and-Exploit",
|
||||
|
|
|
@ -80,33 +80,6 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 98579784,
|
||||
"name": "amt_auth_bypass_poc",
|
||||
"full_name": "embedi\/amt_auth_bypass_poc",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
|
||||
"description": "CVE-2017-5689 Proof-of-Concept exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-27T21:06:08Z",
|
||||
"updated_at": "2022-03-06T01:51:18Z",
|
||||
"pushed_at": "2017-07-27T21:08:49Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 385968702,
|
||||
"name": "CVE-2017-5689-Checker",
|
||||
|
|
|
@ -1,56 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 99396176,
|
||||
"name": "Triple_Fetch-Kernel-Creds",
|
||||
"full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds",
|
||||
"owner": {
|
||||
"login": "JosephShenton",
|
||||
"id": 12966231,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12966231?v=4",
|
||||
"html_url": "https:\/\/github.com\/JosephShenton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds",
|
||||
"description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-05T03:23:13Z",
|
||||
"updated_at": "2020-08-25T15:10:04Z",
|
||||
"pushed_at": "2017-08-05T09:21:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 99915573,
|
||||
"name": "Triple_fetch",
|
||||
"full_name": "q1f3\/Triple_fetch",
|
||||
"owner": {
|
||||
"login": "q1f3",
|
||||
"id": 9603950,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9603950?v=4",
|
||||
"html_url": "https:\/\/github.com\/q1f3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/q1f3\/Triple_fetch",
|
||||
"description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-10T11:24:47Z",
|
||||
"updated_at": "2020-04-07T05:58:43Z",
|
||||
"pushed_at": "2017-08-03T23:47:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 97701175,
|
||||
"name": "CVE-2017-7529",
|
||||
"full_name": "liusec\/CVE-2017-7529",
|
||||
"owner": {
|
||||
"login": "liusec",
|
||||
"id": 13982415,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4",
|
||||
"html_url": "https:\/\/github.com\/liusec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-07-19T09:55:42Z",
|
||||
"updated_at": "2021-11-01T14:01:50Z",
|
||||
"pushed_at": "2017-07-21T06:29:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 138050203,
|
||||
"name": "CVE-2017-7529_PoC",
|
||||
|
|
|
@ -53,33 +53,6 @@
|
|||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 99573027,
|
||||
"name": "CVE-2017-8464-exp-generator",
|
||||
"full_name": "Securitykid\/CVE-2017-8464-exp-generator",
|
||||
"owner": {
|
||||
"login": "Securitykid",
|
||||
"id": 30798606,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30798606?v=4",
|
||||
"html_url": "https:\/\/github.com\/Securitykid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8464-exp-generator",
|
||||
"description": "this tool can generate a exp for cve-2017-8486, it is developed by python",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-07T11:56:11Z",
|
||||
"updated_at": "2021-03-14T04:52:32Z",
|
||||
"pushed_at": "2017-08-07T12:42:33Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105686692,
|
||||
"name": "usbhijacking",
|
||||
|
|
|
@ -1,33 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 100988934,
|
||||
"name": "CVE-2017-8625_Bypass_UMCI",
|
||||
"full_name": "homjxi0e\/CVE-2017-8625_Bypass_UMCI",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8625_Bypass_UMCI",
|
||||
"description": "Bypass Feature UMCI in Internet Explorer",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-21T20:14:07Z",
|
||||
"updated_at": "2020-11-18T13:22:34Z",
|
||||
"pushed_at": "2017-08-25T13:04:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"bypass",
|
||||
"cve-2017-8625",
|
||||
"user-mode-code-integrity"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 100988677,
|
||||
"name": "CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"full_name": "homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-21T20:11:11Z",
|
||||
"updated_at": "2017-08-23T09:18:42Z",
|
||||
"pushed_at": "2017-08-23T09:09:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"chakra-js-global-object",
|
||||
"cve-2017-8641"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -53,87 +53,6 @@
|
|||
"watchers": 97,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103428172,
|
||||
"name": "CVE-2017-8759",
|
||||
"full_name": "vysecurity\/CVE-2017-8759",
|
||||
"owner": {
|
||||
"login": "vysecurity",
|
||||
"id": 3596242,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
|
||||
"html_url": "https:\/\/github.com\/vysecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759",
|
||||
"description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T17:10:18Z",
|
||||
"updated_at": "2022-01-27T19:34:59Z",
|
||||
"pushed_at": "2017-09-14T10:18:40Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103447049,
|
||||
"name": "CVE-2017-8759",
|
||||
"full_name": "BasuCert\/CVE-2017-8759",
|
||||
"owner": {
|
||||
"login": "BasuCert",
|
||||
"id": 29852431,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
|
||||
"html_url": "https:\/\/github.com\/BasuCert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759",
|
||||
"description": "CVE-2017-8759 Research",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T20:27:29Z",
|
||||
"updated_at": "2021-12-15T14:32:51Z",
|
||||
"pushed_at": "2017-09-15T13:14:38Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103447404,
|
||||
"name": "CVE-2017-8759-Exploit-sample2",
|
||||
"full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2",
|
||||
"owner": {
|
||||
"login": "tahisaad6",
|
||||
"id": 21042116,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21042116?v=4",
|
||||
"html_url": "https:\/\/github.com\/tahisaad6"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T20:31:43Z",
|
||||
"updated_at": "2017-09-13T20:31:43Z",
|
||||
"pushed_at": "2017-09-13T20:31:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103493845,
|
||||
"name": "CVE-2017-8759_-SOAP_WSDL",
|
||||
|
|
|
@ -1,37 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 100739963,
|
||||
"name": "CVE-2017-9779",
|
||||
"full_name": "homjxi0e\/CVE-2017-9779",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9779",
|
||||
"description": "Automatic execution Payload From Windows By Path Users All Exploit Via File bashrc ",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-18T18:30:42Z",
|
||||
"updated_at": "2017-09-11T14:35:42Z",
|
||||
"pushed_at": "2017-09-11T23:28:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"automatic",
|
||||
"bashrc",
|
||||
"by",
|
||||
"cmder",
|
||||
"exploit",
|
||||
"implementation",
|
||||
"via"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,58 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 96536969,
|
||||
"name": "s2-048",
|
||||
"full_name": "IanSmith123\/s2-048",
|
||||
"owner": {
|
||||
"login": "IanSmith123",
|
||||
"id": 19611084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19611084?v=4",
|
||||
"html_url": "https:\/\/github.com\/IanSmith123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/IanSmith123\/s2-048",
|
||||
"description": "Apache struts struts 2 048, CVE-2017-9791.",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T12:35:55Z",
|
||||
"updated_at": "2017-07-07T14:05:07Z",
|
||||
"pushed_at": "2017-07-07T17:10:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 96565902,
|
||||
"name": "Struts2-048",
|
||||
"full_name": "dragoneeg\/Struts2-048",
|
||||
"owner": {
|
||||
"login": "dragoneeg",
|
||||
"id": 4232461,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4232461?v=4",
|
||||
"html_url": "https:\/\/github.com\/dragoneeg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048",
|
||||
"description": "CVE-2017-9791",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T18:27:31Z",
|
||||
"updated_at": "2022-01-19T14:16:05Z",
|
||||
"pushed_at": "2017-07-08T02:08:36Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104592299,
|
||||
"name": "CVE-2017-9791",
|
||||
|
|
|
@ -26,35 +26,6 @@
|
|||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 102714061,
|
||||
"name": "struts2-rce-cve-2017-9805-ruby",
|
||||
"full_name": "hahwul\/struts2-rce-cve-2017-9805-ruby",
|
||||
"owner": {
|
||||
"login": "hahwul",
|
||||
"id": 13212227,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13212227?v=4",
|
||||
"html_url": "https:\/\/github.com\/hahwul"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hahwul\/struts2-rce-cve-2017-9805-ruby",
|
||||
"description": "cve -2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-07T08:49:14Z",
|
||||
"updated_at": "2021-07-19T04:12:18Z",
|
||||
"pushed_at": "2017-09-07T08:55:23Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve--2017-9805"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 102917821,
|
||||
"name": "struts-pwn_CVE-2017-9805",
|
||||
|
@ -84,33 +55,6 @@
|
|||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103005989,
|
||||
"name": "apache-struts-pwn_CVE-2017-9805",
|
||||
"full_name": "Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
|
||||
"owner": {
|
||||
"login": "Lone-Ranger",
|
||||
"id": 15882470,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15882470?v=4",
|
||||
"html_url": "https:\/\/github.com\/Lone-Ranger"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
|
||||
"description": "An exploit for Apache Struts CVE-2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-10T05:26:03Z",
|
||||
"updated_at": "2021-12-02T23:16:55Z",
|
||||
"pushed_at": "2017-09-10T05:28:03Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111928630,
|
||||
"name": "-CVE-2017-9805",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 103377643,
|
||||
"name": "Struts2Vuln",
|
||||
"full_name": "mike-williams\/Struts2Vuln",
|
||||
"owner": {
|
||||
"login": "mike-williams",
|
||||
"id": 3205476,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3205476?v=4",
|
||||
"html_url": "https:\/\/github.com\/mike-williams"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mike-williams\/Struts2Vuln",
|
||||
"description": "Struts 2 web app that is vulnerable to CVE-2017-98505 and CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T09:01:34Z",
|
||||
"updated_at": "2018-08-05T19:22:28Z",
|
||||
"pushed_at": "2017-09-15T14:39:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-11-16T07:20:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -28,7 +28,7 @@
|
|||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1267,11 +1267,11 @@
|
|||
"html_url": "https:\/\/github.com\/sho-luv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sho-luv\/zerologon",
|
||||
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check and exploit bug as well as restore password to original state",
|
||||
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check, exploit and restore password to original state",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-20T21:38:47Z",
|
||||
"updated_at": "2022-02-14T03:08:31Z",
|
||||
"pushed_at": "2021-11-22T17:40:59Z",
|
||||
"updated_at": "2022-04-12T22:46:23Z",
|
||||
"pushed_at": "2022-04-12T23:27:40Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T05:15:05Z",
|
||||
"updated_at": "2022-04-10T07:31:02Z",
|
||||
"updated_at": "2022-04-12T22:13:52Z",
|
||||
"pushed_at": "2021-03-17T11:29:58Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 20,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 110,
|
||||
"forks": 21,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -235,7 +235,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-07T10:59:36Z",
|
||||
"updated_at": "2022-02-07T12:49:21Z",
|
||||
"pushed_at": "2022-04-12T17:46:21Z",
|
||||
"pushed_at": "2022-04-12T20:00:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -303,7 +303,7 @@
|
|||
"pushed_at": "2022-03-02T15:41:29Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 22,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -316,7 +316,7 @@
|
|||
"ssrf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 23,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CSP Playground for CVE-2021-30682",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-15T08:10:02Z",
|
||||
"updated_at": "2022-04-12T10:07:06Z",
|
||||
"updated_at": "2022-04-12T19:19:14Z",
|
||||
"pushed_at": "2022-03-24T07:38:41Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"forks_count": 59,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"forks": 58,
|
||||
"watchers": 204,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -184,17 +184,17 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2022-04-08T06:08:01Z",
|
||||
"updated_at": "2022-04-12T20:31:19Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1788,17 +1788,17 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2022-04-12T17:54:17Z",
|
||||
"updated_at": "2022-04-12T23:50:37Z",
|
||||
"pushed_at": "2022-04-09T08:06:43Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 154,
|
||||
"watchers": 160,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -454,7 +454,7 @@
|
|||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -468,7 +468,7 @@
|
|||
"thehackersbrain"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2022-04-12T06:15:05Z",
|
||||
"updated_at": "2022-04-12T21:07:20Z",
|
||||
"pushed_at": "2022-03-18T16:32:13Z",
|
||||
"stargazers_count": 783,
|
||||
"watchers_count": 783,
|
||||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"forks_count": 169,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 169,
|
||||
"watchers": 783,
|
||||
"watchers": 784,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -49,12 +49,12 @@
|
|||
"pushed_at": "2022-03-16T13:59:31Z",
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"forks_count": 60,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"forks": 61,
|
||||
"watchers": 298,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2022-04-12T11:27:47Z",
|
||||
"updated_at": "2022-04-12T18:46:45Z",
|
||||
"pushed_at": "2021-12-09T03:16:21Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 262,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -3492,17 +3492,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-04-12T17:49:22Z",
|
||||
"updated_at": "2022-04-12T20:03:09Z",
|
||||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2829,
|
||||
"watchers_count": 2829,
|
||||
"stargazers_count": 2830,
|
||||
"watchers_count": 2830,
|
||||
"forks_count": 687,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 687,
|
||||
"watchers": 2829,
|
||||
"watchers": 2830,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5158,10 +5158,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2022-04-12T15:39:21Z",
|
||||
"updated_at": "2022-04-12T22:22:52Z",
|
||||
"pushed_at": "2022-03-22T04:27:38Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -5174,7 +5174,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 302,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1105,12 +1105,12 @@
|
|||
"pushed_at": "2022-03-15T00:26:45Z",
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 50,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"forks": 51,
|
||||
"watchers": 227,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2022-04-11T14:52:02Z",
|
||||
"updated_at": "2022-04-12T22:32:48Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 402,
|
||||
"watchers_count": 402,
|
||||
"stargazers_count": 403,
|
||||
"watchers_count": 403,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 402,
|
||||
"watchers": 403,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2022-21882",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-01T17:58:29Z",
|
||||
"updated_at": "2022-04-08T19:16:33Z",
|
||||
"updated_at": "2022-04-12T22:32:21Z",
|
||||
"pushed_at": "2022-02-01T18:14:07Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-03T11:25:14Z",
|
||||
"updated_at": "2022-04-08T19:16:19Z",
|
||||
"updated_at": "2022-04-12T22:32:09Z",
|
||||
"pushed_at": "2022-02-04T02:20:47Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 41,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 148,
|
||||
"forks": 42,
|
||||
"watchers": 150,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-04-12T14:24:18Z",
|
||||
"updated_at": "2022-04-12T22:31:23Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 562,
|
||||
"watchers_count": 562,
|
||||
"stargazers_count": 563,
|
||||
"watchers_count": 563,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 562,
|
||||
"watchers": 563,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -43,17 +43,17 @@
|
|||
"description": "POC for VMWARE CVE-2022-22954",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-11T13:59:23Z",
|
||||
"updated_at": "2022-04-12T16:56:23Z",
|
||||
"updated_at": "2022-04-13T00:13:32Z",
|
||||
"pushed_at": "2022-04-11T14:59:06Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 25,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 106,
|
||||
"forks": 28,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -244,5 +244,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 480975254,
|
||||
"name": "CVE-2022-22954_VMware_PoC",
|
||||
"full_name": "DrorDvash\/CVE-2022-22954_VMware_PoC",
|
||||
"owner": {
|
||||
"login": "DrorDvash",
|
||||
"id": 8413651,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8413651?v=4",
|
||||
"html_url": "https:\/\/github.com\/DrorDvash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DrorDvash\/CVE-2022-22954_VMware_PoC",
|
||||
"description": "PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-12T21:15:27Z",
|
||||
"updated_at": "2022-04-12T22:29:14Z",
|
||||
"pushed_at": "2022-04-12T23:19:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2022-04-12T13:17:16Z",
|
||||
"updated_at": "2022-04-12T19:55:58Z",
|
||||
"pushed_at": "2022-04-07T19:05:54Z",
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 236,
|
||||
"watchers": 237,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -119,17 +119,17 @@
|
|||
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T00:24:28Z",
|
||||
"updated_at": "2022-04-12T07:47:34Z",
|
||||
"updated_at": "2022-04-12T19:35:53Z",
|
||||
"pushed_at": "2022-04-05T16:02:33Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -697,17 +697,17 @@
|
|||
"description": "Spring4Shell (CVE-2022-22965)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T12:37:32Z",
|
||||
"updated_at": "2022-04-12T02:42:22Z",
|
||||
"updated_at": "2022-04-12T20:39:40Z",
|
||||
"pushed_at": "2022-04-07T11:46:54Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1070,17 +1070,17 @@
|
|||
"description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T21:01:26Z",
|
||||
"updated_at": "2022-04-12T06:47:10Z",
|
||||
"updated_at": "2022-04-12T18:26:27Z",
|
||||
"pushed_at": "2022-04-07T16:04:53Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1286,17 +1286,17 @@
|
|||
"description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-07T00:08:16Z",
|
||||
"updated_at": "2022-04-12T12:28:32Z",
|
||||
"updated_at": "2022-04-12T23:32:56Z",
|
||||
"pushed_at": "2022-04-07T23:00:29Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1487,5 +1487,32 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 481013803,
|
||||
"name": "-Spring4Shell-CVE-2022-22965-",
|
||||
"full_name": "Omaraitbenhaddi\/-Spring4Shell-CVE-2022-22965-",
|
||||
"owner": {
|
||||
"login": "Omaraitbenhaddi",
|
||||
"id": 88466716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88466716?v=4",
|
||||
"html_url": "https:\/\/github.com\/Omaraitbenhaddi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Omaraitbenhaddi\/-Spring4Shell-CVE-2022-22965-",
|
||||
"description": "exploitation script tryhackme ",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-13T00:15:55Z",
|
||||
"updated_at": "2022-04-13T00:15:56Z",
|
||||
"pushed_at": "2022-04-13T00:15:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-26T04:29:09Z",
|
||||
"updated_at": "2022-03-21T05:44:29Z",
|
||||
"updated_at": "2022-04-12T21:28:51Z",
|
||||
"pushed_at": "2022-03-19T16:24:28Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-25943",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T23:34:57Z",
|
||||
"updated_at": "2022-04-12T14:14:18Z",
|
||||
"updated_at": "2022-04-12T19:51:17Z",
|
||||
"pushed_at": "2022-03-09T08:26:45Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-08T02:49:09Z",
|
||||
"updated_at": "2022-04-12T14:16:25Z",
|
||||
"updated_at": "2022-04-12T19:41:34Z",
|
||||
"pushed_at": "2022-04-08T15:21:26Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
153
README.md
153
README.md
|
@ -525,6 +525,7 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
|
|||
- [lucksec/VMware-CVE-2022-22954](https://github.com/lucksec/VMware-CVE-2022-22954)
|
||||
- [mumu2020629/-CVE-2022-22954-scanner](https://github.com/mumu2020629/-CVE-2022-22954-scanner)
|
||||
- [MSeymenD/CVE-2022-22954-Testi](https://github.com/MSeymenD/CVE-2022-22954-Testi)
|
||||
- [DrorDvash/CVE-2022-22954_VMware_PoC](https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC)
|
||||
|
||||
### CVE-2022-22963 (2022-04-01)
|
||||
|
||||
|
@ -604,6 +605,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
|
|||
- [Will-Beninger/CVE-2022-22965_SpringShell](https://github.com/Will-Beninger/CVE-2022-22965_SpringShell)
|
||||
- [fransvanbuul/CVE-2022-22965-susceptibility](https://github.com/fransvanbuul/CVE-2022-22965-susceptibility)
|
||||
- [jrgdiaz/Spring4Shell-CVE-2022-22965.py](https://github.com/jrgdiaz/Spring4Shell-CVE-2022-22965.py)
|
||||
- [Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-](https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-)
|
||||
|
||||
### CVE-2022-23046 (2022-01-19)
|
||||
|
||||
|
@ -17694,7 +17696,6 @@ Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1,
|
|||
</code>
|
||||
|
||||
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
|
||||
- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
|
||||
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
|
||||
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
|
||||
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)
|
||||
|
@ -17844,14 +17845,6 @@ IBM Tivoli Monitoring V6 6.2.2.x could allow a remote attacker to execute arbitr
|
|||
- [emcalv/tivoli-poc](https://github.com/emcalv/tivoli-poc)
|
||||
- [bcdannyboy/cve-2017-1635-PoC](https://github.com/bcdannyboy/cve-2017-1635-PoC)
|
||||
|
||||
### CVE-2017-2368 (2017-02-20)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "Contacts" component. It allows remote attackers to cause a denial of service (application crash) via a crafted contact card.
|
||||
</code>
|
||||
|
||||
- [vincedes3/CVE-2017-2368](https://github.com/vincedes3/CVE-2017-2368)
|
||||
|
||||
### CVE-2017-2370 (2017-02-20)
|
||||
|
||||
<code>
|
||||
|
@ -17863,14 +17856,6 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
|
|||
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
|
||||
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
|
||||
|
||||
### CVE-2017-2388 (2017-04-01)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "IOFireWireFamily" component. It allows attackers to cause a denial of service (NULL pointer dereference) via a crafted app.
|
||||
</code>
|
||||
|
||||
- [bazad/IOFireWireFamily-null-deref](https://github.com/bazad/IOFireWireFamily-null-deref)
|
||||
|
||||
### CVE-2017-2636 (2017-03-07)
|
||||
|
||||
<code>
|
||||
|
@ -17974,7 +17959,6 @@ An attacker who is able to send and receive messages to an authoritative DNS ser
|
|||
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
|
||||
</code>
|
||||
|
||||
- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC)
|
||||
- [scopion/CVE-2017-3241](https://github.com/scopion/CVE-2017-3241)
|
||||
|
||||
### CVE-2017-3248 (2017-01-27)
|
||||
|
@ -18027,7 +18011,6 @@ A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code i
|
|||
|
||||
### CVE-2017-4490
|
||||
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
|
||||
- [homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-](https://github.com/homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-)
|
||||
|
||||
### CVE-2017-4878
|
||||
- [brianwrf/CVE-2017-4878-Samples](https://github.com/brianwrf/CVE-2017-4878-Samples)
|
||||
|
@ -18098,7 +18081,6 @@ An attack can use a blob URL and script to spoof an arbitrary addressbar URL pre
|
|||
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
|
||||
</code>
|
||||
|
||||
- [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan)
|
||||
- [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan)
|
||||
- [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487)
|
||||
- [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit)
|
||||
|
@ -18155,12 +18137,8 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
|
|||
- [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638)
|
||||
- [sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
|
||||
- [sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638)
|
||||
- [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-)
|
||||
- [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638)
|
||||
- [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
|
||||
- [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser)
|
||||
- [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638)
|
||||
- [c002/Apache-Struts](https://github.com/c002/Apache-Struts)
|
||||
- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit)
|
||||
- [pr0x1ma-byte/cybersecurity-struts2](https://github.com/pr0x1ma-byte/cybersecurity-struts2)
|
||||
- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638)
|
||||
|
@ -18209,7 +18187,6 @@ An unprivileged network attacker could gain system privileges to provisioned Int
|
|||
- [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689)
|
||||
- [x1sec/amthoneypot](https://github.com/x1sec/amthoneypot)
|
||||
- [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass)
|
||||
- [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc)
|
||||
- [TheWay-hue/CVE-2017-5689-Checker](https://github.com/TheWay-hue/CVE-2017-5689-Checker)
|
||||
|
||||
### CVE-2017-5693 (2018-07-31)
|
||||
|
@ -18379,15 +18356,6 @@ A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.
|
|||
|
||||
- [ansjdnakjdnajkd/CVE-2017-7038](https://github.com/ansjdnakjdnajkd/CVE-2017-7038)
|
||||
|
||||
### CVE-2017-7047 (2017-07-20)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxpc" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
||||
</code>
|
||||
|
||||
- [JosephShenton/Triple_Fetch-Kernel-Creds](https://github.com/JosephShenton/Triple_Fetch-Kernel-Creds)
|
||||
- [q1f3/Triple_fetch](https://github.com/q1f3/Triple_fetch)
|
||||
|
||||
### CVE-2017-7061 (2017-07-20)
|
||||
|
||||
<code>
|
||||
|
@ -18525,7 +18493,6 @@ A deserialization flaw was discovered in the jackson-databind, versions before 2
|
|||
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
|
||||
</code>
|
||||
|
||||
- [liusec/CVE-2017-7529](https://github.com/liusec/CVE-2017-7529)
|
||||
- [en0f/CVE-2017-7529_PoC](https://github.com/en0f/CVE-2017-7529_PoC)
|
||||
- [cved-sources/cve-2017-7529](https://github.com/cved-sources/cve-2017-7529)
|
||||
- [MaxSecurity/CVE-2017-7529-POC](https://github.com/MaxSecurity/CVE-2017-7529-POC)
|
||||
|
@ -18649,7 +18616,6 @@ Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Wi
|
|||
|
||||
- [Elm0D/CVE-2017-8464](https://github.com/Elm0D/CVE-2017-8464)
|
||||
- [3gstudent/CVE-2017-8464-EXP](https://github.com/3gstudent/CVE-2017-8464-EXP)
|
||||
- [Securitykid/CVE-2017-8464-exp-generator](https://github.com/Securitykid/CVE-2017-8464-exp-generator)
|
||||
- [X-Vector/usbhijacking](https://github.com/X-Vector/usbhijacking)
|
||||
- [xssfile/CVE-2017-8464-EXP](https://github.com/xssfile/CVE-2017-8464-EXP)
|
||||
|
||||
|
@ -18692,22 +18658,6 @@ Microsoft Office allows a remote code execution vulnerability due to the way tha
|
|||
- [sasqwatch/CVE-2017-8570](https://github.com/sasqwatch/CVE-2017-8570)
|
||||
- [erfze/CVE-2017-8570](https://github.com/erfze/CVE-2017-8570)
|
||||
|
||||
### CVE-2017-8625 (2017-08-08)
|
||||
|
||||
<code>
|
||||
Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to bypass Device Guard User Mode Code Integrity (UMCI) policies due to Internet Explorer failing to validate UMCI policies, aka "Internet Explorer Security Feature Bypass Vulnerability".
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-8625_Bypass_UMCI](https://github.com/homjxi0e/CVE-2017-8625_Bypass_UMCI)
|
||||
|
||||
### CVE-2017-8641 (2017-08-08)
|
||||
|
||||
<code>
|
||||
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject](https://github.com/homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject)
|
||||
|
||||
### CVE-2017-8759 (2017-09-12)
|
||||
|
||||
<code>
|
||||
|
@ -18716,9 +18666,6 @@ Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow
|
|||
|
||||
- [Voulnet/CVE-2017-8759-Exploit-sample](https://github.com/Voulnet/CVE-2017-8759-Exploit-sample)
|
||||
- [nccgroup/CVE-2017-8759](https://github.com/nccgroup/CVE-2017-8759)
|
||||
- [vysecurity/CVE-2017-8759](https://github.com/vysecurity/CVE-2017-8759)
|
||||
- [BasuCert/CVE-2017-8759](https://github.com/BasuCert/CVE-2017-8759)
|
||||
- [tahisaad6/CVE-2017-8759-Exploit-sample2](https://github.com/tahisaad6/CVE-2017-8759-Exploit-sample2)
|
||||
- [homjxi0e/CVE-2017-8759_-SOAP_WSDL](https://github.com/homjxi0e/CVE-2017-8759_-SOAP_WSDL)
|
||||
- [bhdresh/CVE-2017-8759](https://github.com/bhdresh/CVE-2017-8759)
|
||||
- [Lz1y/CVE-2017-8759](https://github.com/Lz1y/CVE-2017-8759)
|
||||
|
@ -18897,22 +18844,12 @@ A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse
|
|||
|
||||
- [kkent030315/CVE-2017-9769](https://github.com/kkent030315/CVE-2017-9769)
|
||||
|
||||
### CVE-2017-9779 (2017-09-07)
|
||||
|
||||
<code>
|
||||
OCaml compiler allows attackers to have unspecified impact via unknown vectors, a similar issue to CVE-2017-9772 "but with much less impact."
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-9779](https://github.com/homjxi0e/CVE-2017-9779)
|
||||
|
||||
### CVE-2017-9791 (2017-07-10)
|
||||
|
||||
<code>
|
||||
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
|
||||
</code>
|
||||
|
||||
- [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048)
|
||||
- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048)
|
||||
- [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791)
|
||||
|
||||
### CVE-2017-9798 (2017-09-18)
|
||||
|
@ -18933,9 +18870,7 @@ The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x bef
|
|||
</code>
|
||||
|
||||
- [luc10/struts-rce-cve-2017-9805](https://github.com/luc10/struts-rce-cve-2017-9805)
|
||||
- [hahwul/struts2-rce-cve-2017-9805-ruby](https://github.com/hahwul/struts2-rce-cve-2017-9805-ruby)
|
||||
- [mazen160/struts-pwn_CVE-2017-9805](https://github.com/mazen160/struts-pwn_CVE-2017-9805)
|
||||
- [Lone-Ranger/apache-struts-pwn_CVE-2017-9805](https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805)
|
||||
- [0x00-0x00/-CVE-2017-9805](https://github.com/0x00-0x00/-CVE-2017-9805)
|
||||
- [BeyondCy/S2-052](https://github.com/BeyondCy/S2-052)
|
||||
- [chrisjd20/cve-2017-9805.py](https://github.com/chrisjd20/cve-2017-9805.py)
|
||||
|
@ -19056,14 +18991,6 @@ The ifmap service that comes bundled with Contrail has an XML External Entity (X
|
|||
|
||||
- [gteissier/CVE-2017-10617](https://github.com/gteissier/CVE-2017-10617)
|
||||
|
||||
### CVE-2017-10661 (2017-08-19)
|
||||
|
||||
<code>
|
||||
Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
|
||||
</code>
|
||||
|
||||
- [GeneBlue/CVE-2017-10661_POC](https://github.com/GeneBlue/CVE-2017-10661_POC)
|
||||
|
||||
### CVE-2017-10797
|
||||
- [n4xh4ck5/CVE-2017-10797](https://github.com/n4xh4ck5/CVE-2017-10797)
|
||||
|
||||
|
@ -19136,14 +19063,6 @@ The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before
|
|||
- [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610)
|
||||
- [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610)
|
||||
|
||||
### CVE-2017-11611 (2017-09-08)
|
||||
|
||||
<code>
|
||||
Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of the file name in a "create-file-popup" action, and the directory name in a "create-directory-popup" action, in the HTTP POST method to the "/plugin/file_manager/" script (aka an /admin/plugin/file_manager/browse// URI).
|
||||
</code>
|
||||
|
||||
- [faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc](https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc)
|
||||
|
||||
### CVE-2017-11774 (2017-10-13)
|
||||
|
||||
<code>
|
||||
|
@ -19224,14 +19143,6 @@ In Jboss Application Server as shipped with Red Hat Enterprise Application Platf
|
|||
- [jreppiks/CVE-2017-12149](https://github.com/jreppiks/CVE-2017-12149)
|
||||
- [Xcatolin/jboss-deserialization](https://github.com/Xcatolin/jboss-deserialization)
|
||||
|
||||
### CVE-2017-12426 (2017-08-14)
|
||||
|
||||
<code>
|
||||
GitLab Community Edition (CE) and Enterprise Edition (EE) before 8.17.8, 9.0.x before 9.0.13, 9.1.x before 9.1.10, 9.2.x before 9.2.10, 9.3.x before 9.3.10, and 9.4.x before 9.4.4 might allow remote attackers to execute arbitrary code via a crafted SSH URL in a project import.
|
||||
</code>
|
||||
|
||||
- [sm-paul-schuette/CVE-2017-12426](https://github.com/sm-paul-schuette/CVE-2017-12426)
|
||||
|
||||
### CVE-2017-12542 (2018-02-15)
|
||||
|
||||
<code>
|
||||
|
@ -19241,14 +19152,6 @@ A authentication bypass and execution of code vulnerability in HPE Integrated Li
|
|||
- [skelsec/CVE-2017-12542](https://github.com/skelsec/CVE-2017-12542)
|
||||
- [sk1dish/ilo4-rce-vuln-scanner](https://github.com/sk1dish/ilo4-rce-vuln-scanner)
|
||||
|
||||
### CVE-2017-12611 (2017-09-20)
|
||||
|
||||
<code>
|
||||
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
|
||||
</code>
|
||||
|
||||
- [brianwrf/S2-053-CVE-2017-12611](https://github.com/brianwrf/S2-053-CVE-2017-12611)
|
||||
|
||||
### CVE-2017-12615 (2017-09-19)
|
||||
|
||||
<code>
|
||||
|
@ -19308,14 +19211,6 @@ CouchDB administrative users can configure the database server via HTTP(S). Some
|
|||
- [moayadalmalat/CVE-2017-12636](https://github.com/moayadalmalat/CVE-2017-12636)
|
||||
- [XTeam-Wing/CVE-2017-12636](https://github.com/XTeam-Wing/CVE-2017-12636)
|
||||
|
||||
### CVE-2017-12792 (2017-10-02)
|
||||
|
||||
<code>
|
||||
Multiple cross-site request forgery (CSRF) vulnerabilities in NexusPHP 1.5 allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) linkname, (2) url, or (3) title parameter in an add action to linksmanage.php.
|
||||
</code>
|
||||
|
||||
- [ZZS2017/cve-2017-12792](https://github.com/ZZS2017/cve-2017-12792)
|
||||
|
||||
### CVE-2017-12842 (2020-03-16)
|
||||
|
||||
<code>
|
||||
|
@ -19410,30 +19305,6 @@ An issue was discovered in certain Apple products. macOS High Sierra before Secu
|
|||
|
||||
- [giovannidispoto/CVE-2017-13872-Patch](https://github.com/giovannidispoto/CVE-2017-13872-Patch)
|
||||
|
||||
### CVE-2017-14105 (2017-09-01)
|
||||
|
||||
<code>
|
||||
HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifying a backup archive before a restore, because the restore feature does not validate pathnames within the archive. An authenticated, local attacker - even restricted as a tenant - can add a jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will be exposed at the web interface).
|
||||
</code>
|
||||
|
||||
- [theguly/CVE-2017-14105](https://github.com/theguly/CVE-2017-14105)
|
||||
|
||||
### CVE-2017-14262 (2017-09-11)
|
||||
|
||||
<code>
|
||||
On Samsung NVR devices, remote attackers can read the MD5 password hash of the 'admin' account via certain szUserName JSON data to cgi-bin/main-cgi, and login to the device with that hash in the szUserPasswd parameter.
|
||||
</code>
|
||||
|
||||
- [zzz66686/CVE-2017-14262](https://github.com/zzz66686/CVE-2017-14262)
|
||||
|
||||
### CVE-2017-14263 (2017-09-11)
|
||||
|
||||
<code>
|
||||
Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.
|
||||
</code>
|
||||
|
||||
- [zzz66686/CVE-2017-14263](https://github.com/zzz66686/CVE-2017-14263)
|
||||
|
||||
### CVE-2017-14322 (2017-10-18)
|
||||
|
||||
<code>
|
||||
|
@ -19783,9 +19654,6 @@ An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VN
|
|||
|
||||
- [ShielderSec/CVE-2017-18635](https://github.com/ShielderSec/CVE-2017-18635)
|
||||
|
||||
### CVE-2017-98505
|
||||
- [mike-williams/Struts2Vuln](https://github.com/mike-williams/Struts2Vuln)
|
||||
|
||||
### CVE-2017-1000000
|
||||
- [smythtech/DWF-CVE-2017-1000000](https://github.com/smythtech/DWF-CVE-2017-1000000)
|
||||
|
||||
|
@ -19822,24 +19690,7 @@ Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. W
|
|||
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
|
||||
</code>
|
||||
|
||||
- [timwr/CVE-2017-1000117](https://github.com/timwr/CVE-2017-1000117)
|
||||
- [GrahamMThomas/test-git-vuln_CVE-2017-1000117](https://github.com/GrahamMThomas/test-git-vuln_CVE-2017-1000117)
|
||||
- [Manouchehri/CVE-2017-1000117](https://github.com/Manouchehri/CVE-2017-1000117)
|
||||
- [thelastbyte/CVE-2017-1000117](https://github.com/thelastbyte/CVE-2017-1000117)
|
||||
- [alilangtest/CVE-2017-1000117](https://github.com/alilangtest/CVE-2017-1000117)
|
||||
- [VulApps/CVE-2017-1000117](https://github.com/VulApps/CVE-2017-1000117)
|
||||
- [greymd/CVE-2017-1000117](https://github.com/greymd/CVE-2017-1000117)
|
||||
- [shogo82148/Fix-CVE-2017-1000117](https://github.com/shogo82148/Fix-CVE-2017-1000117)
|
||||
- [sasairc/CVE-2017-1000117_wasawasa](https://github.com/sasairc/CVE-2017-1000117_wasawasa)
|
||||
- [Shadow5523/CVE-2017-1000117-test](https://github.com/Shadow5523/CVE-2017-1000117-test)
|
||||
- [ieee0824/CVE-2017-1000117](https://github.com/ieee0824/CVE-2017-1000117)
|
||||
- [rootclay/CVE-2017-1000117](https://github.com/rootclay/CVE-2017-1000117)
|
||||
- [ieee0824/CVE-2017-1000117-sl](https://github.com/ieee0824/CVE-2017-1000117-sl)
|
||||
- [takehaya/CVE-2017-1000117](https://github.com/takehaya/CVE-2017-1000117)
|
||||
- [ikmski/CVE-2017-1000117](https://github.com/ikmski/CVE-2017-1000117)
|
||||
- [nkoneko/CVE-2017-1000117](https://github.com/nkoneko/CVE-2017-1000117)
|
||||
- [chenzhuo0618/test](https://github.com/chenzhuo0618/test)
|
||||
- [siling2017/CVE-2017-1000117](https://github.com/siling2017/CVE-2017-1000117)
|
||||
- [Q2h1Cg/CVE-2017-1000117](https://github.com/Q2h1Cg/CVE-2017-1000117)
|
||||
- [cved-sources/cve-2017-1000117](https://github.com/cved-sources/cve-2017-1000117)
|
||||
- [leezp/CVE-2017-1000117](https://github.com/leezp/CVE-2017-1000117)
|
||||
|
|
Loading…
Add table
Reference in a new issue