Auto Update 2022/04/13 00:15:08

This commit is contained in:
motikan2010-bot 2022-04-13 09:15:08 +09:00
parent e5825ca873
commit 516579452e
50 changed files with 163 additions and 1682 deletions

View file

@ -40,7 +40,7 @@
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright stsc MP4 Atom Integer Overflow Remote Code Execution",
"fork": false,
"created_at": "2015-09-10T19:34:11Z",
"updated_at": "2016-02-13T02:14:24Z",
"updated_at": "2022-04-12T19:44:53Z",
"pushed_at": "2015-09-10T15:39:16Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -26,33 +26,6 @@
"watchers": 1,
"score": 0
},
{
"id": 95974378,
"name": "CVE-2017-0213",
"full_name": "zcgonvh\/CVE-2017-0213",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
"description": "CVE-2017-0213 for command line",
"fork": false,
"created_at": "2017-07-01T16:07:04Z",
"updated_at": "2022-02-19T23:23:03Z",
"pushed_at": "2017-07-01T16:19:12Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 58,
"score": 0
},
{
"id": 105444160,
"name": "CVE-2017-0213",

View file

@ -1,409 +1,4 @@
[
{
"id": 100002532,
"name": "CVE-2017-1000117",
"full_name": "timwr\/CVE-2017-1000117",
"owner": {
"login": "timwr",
"id": 684924,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4",
"html_url": "https:\/\/github.com\/timwr"
},
"html_url": "https:\/\/github.com\/timwr\/CVE-2017-1000117",
"description": "Proof of concept of CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-11T07:03:23Z",
"updated_at": "2021-05-04T08:13:49Z",
"pushed_at": "2017-08-11T08:27:04Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 7,
"score": 0
},
{
"id": 100058519,
"name": "test-git-vuln_CVE-2017-1000117",
"full_name": "GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
"owner": {
"login": "GrahamMThomas",
"id": 14031456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14031456?v=4",
"html_url": "https:\/\/github.com\/GrahamMThomas"
},
"html_url": "https:\/\/github.com\/GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
"description": "Repo to test the new git vulnerability",
"fork": false,
"created_at": "2017-08-11T18:05:01Z",
"updated_at": "2017-09-26T17:09:13Z",
"pushed_at": "2017-08-11T20:15:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 100069051,
"name": "CVE-2017-1000117",
"full_name": "Manouchehri\/CVE-2017-1000117",
"owner": {
"login": "Manouchehri",
"id": 7232674,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7232674?v=4",
"html_url": "https:\/\/github.com\/Manouchehri"
},
"html_url": "https:\/\/github.com\/Manouchehri\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-11T20:47:53Z",
"updated_at": "2018-04-19T04:23:54Z",
"pushed_at": "2017-08-11T21:26:33Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 16,
"score": 0
},
{
"id": 100080640,
"name": "CVE-2017-1000117",
"full_name": "thelastbyte\/CVE-2017-1000117",
"owner": {
"login": "thelastbyte",
"id": 7829097,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7829097?v=4",
"html_url": "https:\/\/github.com\/thelastbyte"
},
"html_url": "https:\/\/github.com\/thelastbyte\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-12T01:10:49Z",
"updated_at": "2017-09-01T22:06:02Z",
"pushed_at": "2017-09-01T22:08:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100116587,
"name": "CVE-2017-1000117",
"full_name": "alilangtest\/CVE-2017-1000117",
"owner": {
"login": "alilangtest",
"id": 20162983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20162983?v=4",
"html_url": "https:\/\/github.com\/alilangtest"
},
"html_url": "https:\/\/github.com\/alilangtest\/CVE-2017-1000117",
"description": "test",
"fork": false,
"created_at": "2017-08-12T14:14:55Z",
"updated_at": "2019-05-09T09:27:01Z",
"pushed_at": "2017-08-12T14:25:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100130122,
"name": "CVE-2017-1000117",
"full_name": "VulApps\/CVE-2017-1000117",
"owner": {
"login": "VulApps",
"id": 29811930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29811930?v=4",
"html_url": "https:\/\/github.com\/VulApps"
},
"html_url": "https:\/\/github.com\/VulApps\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-12T18:20:02Z",
"updated_at": "2020-03-21T15:06:32Z",
"pushed_at": "2017-08-12T18:22:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 4,
"score": 0
},
{
"id": 100280254,
"name": "CVE-2017-1000117",
"full_name": "greymd\/CVE-2017-1000117",
"owner": {
"login": "greymd",
"id": 3874767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4",
"html_url": "https:\/\/github.com\/greymd"
},
"html_url": "https:\/\/github.com\/greymd\/CVE-2017-1000117",
"description": "Check Git's vulnerability CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-14T15:05:48Z",
"updated_at": "2021-12-27T04:32:52Z",
"pushed_at": "2017-08-16T15:39:15Z",
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 136,
"score": 0
},
{
"id": 100325886,
"name": "Fix-CVE-2017-1000117",
"full_name": "shogo82148\/Fix-CVE-2017-1000117",
"owner": {
"login": "shogo82148",
"id": 1157344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1157344?v=4",
"html_url": "https:\/\/github.com\/shogo82148"
},
"html_url": "https:\/\/github.com\/shogo82148\/Fix-CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-15T01:40:18Z",
"updated_at": "2017-08-17T03:44:20Z",
"pushed_at": "2017-08-17T03:44:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100357293,
"name": "CVE-2017-1000117_wasawasa",
"full_name": "sasairc\/CVE-2017-1000117_wasawasa",
"owner": {
"login": "sasairc",
"id": 9349287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9349287?v=4",
"html_url": "https:\/\/github.com\/sasairc"
},
"html_url": "https:\/\/github.com\/sasairc\/CVE-2017-1000117_wasawasa",
"description": null,
"fork": false,
"created_at": "2017-08-15T08:39:23Z",
"updated_at": "2017-08-15T09:39:16Z",
"pushed_at": "2017-08-15T08:43:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 100374790,
"name": "CVE-2017-1000117-test",
"full_name": "Shadow5523\/CVE-2017-1000117-test",
"owner": {
"login": "Shadow5523",
"id": 22784789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22784789?v=4",
"html_url": "https:\/\/github.com\/Shadow5523"
},
"html_url": "https:\/\/github.com\/Shadow5523\/CVE-2017-1000117-test",
"description": "CVE-2017-1000117の検証",
"fork": false,
"created_at": "2017-08-15T12:24:57Z",
"updated_at": "2017-08-17T14:54:39Z",
"pushed_at": "2017-08-18T02:18:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100437171,
"name": "CVE-2017-1000117",
"full_name": "ieee0824\/CVE-2017-1000117",
"owner": {
"login": "ieee0824",
"id": 5692475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4",
"html_url": "https:\/\/github.com\/ieee0824"
},
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-16T02:05:08Z",
"updated_at": "2017-08-16T08:10:25Z",
"pushed_at": "2017-08-16T10:03:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 100445561,
"name": "CVE-2017-1000117",
"full_name": "rootclay\/CVE-2017-1000117",
"owner": {
"login": "rootclay",
"id": 29671471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29671471?v=4",
"html_url": "https:\/\/github.com\/rootclay"
},
"html_url": "https:\/\/github.com\/rootclay\/CVE-2017-1000117",
"description": "CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-16T03:52:27Z",
"updated_at": "2017-08-16T04:00:53Z",
"pushed_at": "2017-08-16T06:14:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 100446125,
"name": "CVE-2017-1000117-sl",
"full_name": "ieee0824\/CVE-2017-1000117-sl",
"owner": {
"login": "ieee0824",
"id": 5692475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4",
"html_url": "https:\/\/github.com\/ieee0824"
},
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117-sl",
"description": "Experiment of CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-16T04:01:08Z",
"updated_at": "2017-08-16T05:42:26Z",
"pushed_at": "2017-08-16T09:54:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100498924,
"name": "CVE-2017-1000117",
"full_name": "takehaya\/CVE-2017-1000117",
"owner": {
"login": "takehaya",
"id": 10973623,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10973623?v=4",
"html_url": "https:\/\/github.com\/takehaya"
},
"html_url": "https:\/\/github.com\/takehaya\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-16T14:34:37Z",
"updated_at": "2017-08-16T14:34:37Z",
"pushed_at": "2017-08-17T18:45:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 100544749,
"name": "CVE-2017-1000117",
"full_name": "ikmski\/CVE-2017-1000117",
"owner": {
"login": "ikmski",
"id": 6622579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6622579?v=4",
"html_url": "https:\/\/github.com\/ikmski"
},
"html_url": "https:\/\/github.com\/ikmski\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-17T00:37:47Z",
"updated_at": "2017-08-17T00:37:47Z",
"pushed_at": "2017-08-17T00:57:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100730507,
"name": "CVE-2017-1000117",
@ -431,60 +26,6 @@
"watchers": 2,
"score": 0
},
{
"id": 100926724,
"name": "test",
"full_name": "chenzhuo0618\/test",
"owner": {
"login": "chenzhuo0618",
"id": 5562130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5562130?v=4",
"html_url": "https:\/\/github.com\/chenzhuo0618"
},
"html_url": "https:\/\/github.com\/chenzhuo0618\/test",
"description": "test for CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-21T07:46:16Z",
"updated_at": "2017-08-21T07:46:48Z",
"pushed_at": "2017-08-21T08:51:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 102318198,
"name": "CVE-2017-1000117",
"full_name": "siling2017\/CVE-2017-1000117",
"owner": {
"login": "siling2017",
"id": 27729343,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27729343?v=4",
"html_url": "https:\/\/github.com\/siling2017"
},
"html_url": "https:\/\/github.com\/siling2017\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-09-04T04:18:19Z",
"updated_at": "2017-09-04T04:18:29Z",
"pushed_at": "2017-09-04T04:18:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 112913757,
"name": "CVE-2017-1000117",

View file

@ -1,29 +0,0 @@
[
{
"id": 100021936,
"name": "CVE-2017-10661_POC",
"full_name": "GeneBlue\/CVE-2017-10661_POC",
"owner": {
"login": "GeneBlue",
"id": 10919709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10919709?v=4",
"html_url": "https:\/\/github.com\/GeneBlue"
},
"html_url": "https:\/\/github.com\/GeneBlue\/CVE-2017-10661_POC",
"description": "poc for cve-2017-10661",
"fork": false,
"created_at": "2017-08-11T10:45:10Z",
"updated_at": "2020-12-17T10:26:55Z",
"pushed_at": "2017-08-11T10:45:56Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 101361478,
"name": "Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"full_name": "faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"owner": {
"login": "faizzaidi",
"id": 12153050,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12153050?v=4",
"html_url": "https:\/\/github.com\/faizzaidi"
},
"html_url": "https:\/\/github.com\/faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"description": "WolfCMS-v0.8.3.1 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-11611",
"fork": false,
"created_at": "2017-08-25T03:19:05Z",
"updated_at": "2020-07-17T05:22:39Z",
"pushed_at": "2017-08-25T03:19:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 100264267,
"name": "CVE-2017-12426",
"full_name": "sm-paul-schuette\/CVE-2017-12426",
"owner": {
"login": "sm-paul-schuette",
"id": 29304646,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29304646?v=4",
"html_url": "https:\/\/github.com\/sm-paul-schuette"
},
"html_url": "https:\/\/github.com\/sm-paul-schuette\/CVE-2017-12426",
"description": null,
"fork": false,
"created_at": "2017-08-14T12:18:15Z",
"updated_at": "2017-08-14T12:18:15Z",
"pushed_at": "2017-08-14T12:19:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 102809812,
"name": "S2-053-CVE-2017-12611",
"full_name": "brianwrf\/S2-053-CVE-2017-12611",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/S2-053-CVE-2017-12611",
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
"fork": false,
"created_at": "2017-09-08T02:50:37Z",
"updated_at": "2020-12-14T01:19:43Z",
"pushed_at": "2017-09-08T11:59:20Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 38,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 107090388,
"name": "cve-2017-12792",
"full_name": "ZZS2017\/cve-2017-12792",
"owner": {
"login": "ZZS2017",
"id": 30464951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30464951?v=4",
"html_url": "https:\/\/github.com\/ZZS2017"
},
"html_url": "https:\/\/github.com\/ZZS2017\/cve-2017-12792",
"description": "NexusPHP CSRF+XSS",
"fork": false,
"created_at": "2017-10-16T07:06:19Z",
"updated_at": "2019-11-21T10:28:20Z",
"pushed_at": "2017-08-21T09:38:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 102123441,
"name": "CVE-2017-14105",
"full_name": "theguly\/CVE-2017-14105",
"owner": {
"login": "theguly",
"id": 1745802,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1745802?v=4",
"html_url": "https:\/\/github.com\/theguly"
},
"html_url": "https:\/\/github.com\/theguly\/CVE-2017-14105",
"description": null,
"fork": false,
"created_at": "2017-09-01T14:51:31Z",
"updated_at": "2019-01-08T00:25:52Z",
"pushed_at": "2017-09-14T13:14:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 102810621,
"name": "CVE-2017-14262",
"full_name": "zzz66686\/CVE-2017-14262",
"owner": {
"login": "zzz66686",
"id": 14144972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4",
"html_url": "https:\/\/github.com\/zzz66686"
},
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14262",
"description": null,
"fork": false,
"created_at": "2017-09-08T02:59:21Z",
"updated_at": "2021-12-15T14:32:48Z",
"pushed_at": "2017-09-13T14:39:40Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 5,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 102832029,
"name": "CVE-2017-14263",
"full_name": "zzz66686\/CVE-2017-14263",
"owner": {
"login": "zzz66686",
"id": 14144972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4",
"html_url": "https:\/\/github.com\/zzz66686"
},
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14263",
"description": null,
"fork": false,
"created_at": "2017-09-08T07:27:13Z",
"updated_at": "2021-12-15T14:32:48Z",
"pushed_at": "2017-09-13T14:40:53Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 4,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 100696664,
"name": "CVE-2017-2368",
"full_name": "vincedes3\/CVE-2017-2368",
"owner": {
"login": "vincedes3",
"id": 26314689,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314689?v=4",
"html_url": "https:\/\/github.com\/vincedes3"
},
"html_url": "https:\/\/github.com\/vincedes3\/CVE-2017-2368",
"description": "CVE-2017-2368 VCF Message App Crash Bug",
"fork": false,
"created_at": "2017-08-18T09:33:57Z",
"updated_at": "2017-08-18T09:33:57Z",
"pushed_at": "2017-08-18T09:36:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 99374230,
"name": "IOFireWireFamily-null-deref",
"full_name": "bazad\/IOFireWireFamily-null-deref",
"owner": {
"login": "bazad",
"id": 3111637,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
"html_url": "https:\/\/github.com\/bazad"
},
"html_url": "https:\/\/github.com\/bazad\/IOFireWireFamily-null-deref",
"description": "CVE-2017-2388: Null-pointer dereference in IOFireWireFamily.",
"fork": false,
"created_at": "2017-08-04T19:35:20Z",
"updated_at": "2021-08-04T06:28:49Z",
"pushed_at": "2017-08-16T20:16:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -1,31 +1,4 @@
[
{
"id": 96219146,
"name": "CVE-2017-3241-POC",
"full_name": "xfei3\/CVE-2017-3241-POC",
"owner": {
"login": "xfei3",
"id": 29874084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29874084?v=4",
"html_url": "https:\/\/github.com\/xfei3"
},
"html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC",
"description": "POC for java RMI deserialization vulnerability",
"fork": false,
"created_at": "2017-07-04T13:05:46Z",
"updated_at": "2020-03-29T07:05:46Z",
"pushed_at": "2017-07-19T23:55:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 419955901,
"name": "CVE-2017-3241",

View file

@ -25,32 +25,5 @@
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 96573883,
"name": "CVE-2017-4490-install-Script-Python-in-Terminal-",
"full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
"description": null,
"fork": false,
"created_at": "2017-07-07T20:21:51Z",
"updated_at": "2017-08-23T09:24:55Z",
"pushed_at": "2017-07-11T15:36:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,31 +1,4 @@
[
{
"id": 107852472,
"name": "wpUsersScan",
"full_name": "teambugsbunny\/wpUsersScan",
"owner": {
"login": "teambugsbunny",
"id": 32997799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32997799?v=4",
"html_url": "https:\/\/github.com\/teambugsbunny"
},
"html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan",
"description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
"fork": false,
"created_at": "2017-10-22T09:22:28Z",
"updated_at": "2020-04-06T12:23:41Z",
"pushed_at": "2017-06-11T16:47:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 121831599,
"name": "wpUsersScan",

View file

@ -1001,87 +1001,6 @@
"watchers": 15,
"score": 0
},
{
"id": 98150795,
"name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
"full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
"owner": {
"login": "R4v3nBl4ck",
"id": 30399308,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30399308?v=4",
"html_url": "https:\/\/github.com\/R4v3nBl4ck"
},
"html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
"description": "Exploit created by: R4v3nBl4ck end Pacman",
"fork": false,
"created_at": "2017-07-24T05:05:28Z",
"updated_at": "2020-07-12T14:06:08Z",
"pushed_at": "2017-07-24T23:55:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 4,
"score": 0
},
{
"id": 100141854,
"name": "CVE-2017-5638",
"full_name": "Xhendos\/CVE-2017-5638",
"owner": {
"login": "Xhendos",
"id": 16403693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16403693?v=4",
"html_url": "https:\/\/github.com\/Xhendos"
},
"html_url": "https:\/\/github.com\/Xhendos\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-08-12T23:00:14Z",
"updated_at": "2017-08-12T23:04:13Z",
"pushed_at": "2017-08-26T17:32:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 101267457,
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"full_name": "TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"owner": {
"login": "TamiiLambrado",
"id": 23249848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23249848?v=4",
"html_url": "https:\/\/github.com\/TamiiLambrado"
},
"html_url": "https:\/\/github.com\/TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"description": null,
"fork": false,
"created_at": "2017-08-24T07:36:14Z",
"updated_at": "2017-08-24T07:36:14Z",
"pushed_at": "2017-08-24T07:36:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 104686879,
"name": "strutser",
@ -1139,33 +1058,6 @@
"watchers": 0,
"score": 0
},
{
"id": 107489354,
"name": "Apache-Struts",
"full_name": "c002\/Apache-Struts",
"owner": {
"login": "c002",
"id": 26592580,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26592580?v=4",
"html_url": "https:\/\/github.com\/c002"
},
"html_url": "https:\/\/github.com\/c002\/Apache-Struts",
"description": " An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-10-19T02:40:45Z",
"updated_at": "2020-05-17T04:32:06Z",
"pushed_at": "2017-05-28T14:03:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 108805305,
"name": "Common-Vulnerability-and-Exploit",

View file

@ -80,33 +80,6 @@
"watchers": 3,
"score": 0
},
{
"id": 98579784,
"name": "amt_auth_bypass_poc",
"full_name": "embedi\/amt_auth_bypass_poc",
"owner": {
"login": "embedi",
"id": 24190344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
"html_url": "https:\/\/github.com\/embedi"
},
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
"description": "CVE-2017-5689 Proof-of-Concept exploit",
"fork": false,
"created_at": "2017-07-27T21:06:08Z",
"updated_at": "2022-03-06T01:51:18Z",
"pushed_at": "2017-07-27T21:08:49Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 53,
"score": 0
},
{
"id": 385968702,
"name": "CVE-2017-5689-Checker",

View file

@ -1,56 +0,0 @@
[
{
"id": 99396176,
"name": "Triple_Fetch-Kernel-Creds",
"full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds",
"owner": {
"login": "JosephShenton",
"id": 12966231,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12966231?v=4",
"html_url": "https:\/\/github.com\/JosephShenton"
},
"html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds",
"description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)",
"fork": false,
"created_at": "2017-08-05T03:23:13Z",
"updated_at": "2020-08-25T15:10:04Z",
"pushed_at": "2017-08-05T09:21:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"score": 0
},
{
"id": 99915573,
"name": "Triple_fetch",
"full_name": "q1f3\/Triple_fetch",
"owner": {
"login": "q1f3",
"id": 9603950,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9603950?v=4",
"html_url": "https:\/\/github.com\/q1f3"
},
"html_url": "https:\/\/github.com\/q1f3\/Triple_fetch",
"description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.",
"fork": false,
"created_at": "2017-08-10T11:24:47Z",
"updated_at": "2020-04-07T05:58:43Z",
"pushed_at": "2017-08-03T23:47:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -1,31 +1,4 @@
[
{
"id": 97701175,
"name": "CVE-2017-7529",
"full_name": "liusec\/CVE-2017-7529",
"owner": {
"login": "liusec",
"id": 13982415,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4",
"html_url": "https:\/\/github.com\/liusec"
},
"html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529",
"description": null,
"fork": false,
"created_at": "2017-07-19T09:55:42Z",
"updated_at": "2021-11-01T14:01:50Z",
"pushed_at": "2017-07-21T06:29:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 13,
"score": 0
},
{
"id": 138050203,
"name": "CVE-2017-7529_PoC",

View file

@ -53,33 +53,6 @@
"watchers": 67,
"score": 0
},
{
"id": 99573027,
"name": "CVE-2017-8464-exp-generator",
"full_name": "Securitykid\/CVE-2017-8464-exp-generator",
"owner": {
"login": "Securitykid",
"id": 30798606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30798606?v=4",
"html_url": "https:\/\/github.com\/Securitykid"
},
"html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8464-exp-generator",
"description": "this tool can generate a exp for cve-2017-8486, it is developed by python",
"fork": false,
"created_at": "2017-08-07T11:56:11Z",
"updated_at": "2021-03-14T04:52:32Z",
"pushed_at": "2017-08-07T12:42:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 6,
"score": 0
},
{
"id": 105686692,
"name": "usbhijacking",

View file

@ -1,33 +0,0 @@
[
{
"id": 100988934,
"name": "CVE-2017-8625_Bypass_UMCI",
"full_name": "homjxi0e\/CVE-2017-8625_Bypass_UMCI",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8625_Bypass_UMCI",
"description": "Bypass Feature UMCI in Internet Explorer",
"fork": false,
"created_at": "2017-08-21T20:14:07Z",
"updated_at": "2020-11-18T13:22:34Z",
"pushed_at": "2017-08-25T13:04:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"bypass",
"cve-2017-8625",
"user-mode-code-integrity"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 100988677,
"name": "CVE-2017-8641_chakra_Js_GlobalObject",
"full_name": "homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
"description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ",
"fork": false,
"created_at": "2017-08-21T20:11:11Z",
"updated_at": "2017-08-23T09:18:42Z",
"pushed_at": "2017-08-23T09:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"chakra-js-global-object",
"cve-2017-8641"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -53,87 +53,6 @@
"watchers": 97,
"score": 0
},
{
"id": 103428172,
"name": "CVE-2017-8759",
"full_name": "vysecurity\/CVE-2017-8759",
"owner": {
"login": "vysecurity",
"id": 3596242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
"html_url": "https:\/\/github.com\/vysecurity"
},
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759",
"description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.",
"fork": false,
"created_at": "2017-09-13T17:10:18Z",
"updated_at": "2022-01-27T19:34:59Z",
"pushed_at": "2017-09-14T10:18:40Z",
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 173,
"score": 0
},
{
"id": 103447049,
"name": "CVE-2017-8759",
"full_name": "BasuCert\/CVE-2017-8759",
"owner": {
"login": "BasuCert",
"id": 29852431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
"html_url": "https:\/\/github.com\/BasuCert"
},
"html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759",
"description": "CVE-2017-8759 Research",
"fork": false,
"created_at": "2017-09-13T20:27:29Z",
"updated_at": "2021-12-15T14:32:51Z",
"pushed_at": "2017-09-15T13:14:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 103447404,
"name": "CVE-2017-8759-Exploit-sample2",
"full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2",
"owner": {
"login": "tahisaad6",
"id": 21042116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21042116?v=4",
"html_url": "https:\/\/github.com\/tahisaad6"
},
"html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2",
"description": null,
"fork": false,
"created_at": "2017-09-13T20:31:43Z",
"updated_at": "2017-09-13T20:31:43Z",
"pushed_at": "2017-09-13T20:31:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 103493845,
"name": "CVE-2017-8759_-SOAP_WSDL",

View file

@ -1,37 +0,0 @@
[
{
"id": 100739963,
"name": "CVE-2017-9779",
"full_name": "homjxi0e\/CVE-2017-9779",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9779",
"description": "Automatic execution Payload From Windows By Path Users All Exploit Via File bashrc ",
"fork": false,
"created_at": "2017-08-18T18:30:42Z",
"updated_at": "2017-09-11T14:35:42Z",
"pushed_at": "2017-09-11T23:28:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"automatic",
"bashrc",
"by",
"cmder",
"exploit",
"implementation",
"via"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,58 +1,4 @@
[
{
"id": 96536969,
"name": "s2-048",
"full_name": "IanSmith123\/s2-048",
"owner": {
"login": "IanSmith123",
"id": 19611084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19611084?v=4",
"html_url": "https:\/\/github.com\/IanSmith123"
},
"html_url": "https:\/\/github.com\/IanSmith123\/s2-048",
"description": "Apache struts struts 2 048, CVE-2017-9791.",
"fork": false,
"created_at": "2017-07-07T12:35:55Z",
"updated_at": "2017-07-07T14:05:07Z",
"pushed_at": "2017-07-07T17:10:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 96565902,
"name": "Struts2-048",
"full_name": "dragoneeg\/Struts2-048",
"owner": {
"login": "dragoneeg",
"id": 4232461,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4232461?v=4",
"html_url": "https:\/\/github.com\/dragoneeg"
},
"html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048",
"description": "CVE-2017-9791",
"fork": false,
"created_at": "2017-07-07T18:27:31Z",
"updated_at": "2022-01-19T14:16:05Z",
"pushed_at": "2017-07-08T02:08:36Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 28,
"score": 0
},
{
"id": 104592299,
"name": "CVE-2017-9791",

View file

@ -26,35 +26,6 @@
"watchers": 59,
"score": 0
},
{
"id": 102714061,
"name": "struts2-rce-cve-2017-9805-ruby",
"full_name": "hahwul\/struts2-rce-cve-2017-9805-ruby",
"owner": {
"login": "hahwul",
"id": 13212227,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13212227?v=4",
"html_url": "https:\/\/github.com\/hahwul"
},
"html_url": "https:\/\/github.com\/hahwul\/struts2-rce-cve-2017-9805-ruby",
"description": "cve -2017-9805",
"fork": false,
"created_at": "2017-09-07T08:49:14Z",
"updated_at": "2021-07-19T04:12:18Z",
"pushed_at": "2017-09-07T08:55:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [
"cve--2017-9805"
],
"visibility": "public",
"forks": 5,
"watchers": 3,
"score": 0
},
{
"id": 102917821,
"name": "struts-pwn_CVE-2017-9805",
@ -84,33 +55,6 @@
"watchers": 247,
"score": 0
},
{
"id": 103005989,
"name": "apache-struts-pwn_CVE-2017-9805",
"full_name": "Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"owner": {
"login": "Lone-Ranger",
"id": 15882470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15882470?v=4",
"html_url": "https:\/\/github.com\/Lone-Ranger"
},
"html_url": "https:\/\/github.com\/Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-10T05:26:03Z",
"updated_at": "2021-12-02T23:16:55Z",
"pushed_at": "2017-09-10T05:28:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 5,
"score": 0
},
{
"id": 111928630,
"name": "-CVE-2017-9805",

View file

@ -1,29 +0,0 @@
[
{
"id": 103377643,
"name": "Struts2Vuln",
"full_name": "mike-williams\/Struts2Vuln",
"owner": {
"login": "mike-williams",
"id": 3205476,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3205476?v=4",
"html_url": "https:\/\/github.com\/mike-williams"
},
"html_url": "https:\/\/github.com\/mike-williams\/Struts2Vuln",
"description": "Struts 2 web app that is vulnerable to CVE-2017-98505 and CVE-2017-5638",
"fork": false,
"created_at": "2017-09-13T09:01:34Z",
"updated_at": "2018-08-05T19:22:28Z",
"pushed_at": "2017-09-15T14:39:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-11-16T07:20:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,7 +28,7 @@
"wordpress"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0
}

View file

@ -1267,11 +1267,11 @@
"html_url": "https:\/\/github.com\/sho-luv"
},
"html_url": "https:\/\/github.com\/sho-luv\/zerologon",
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check and exploit bug as well as restore password to original state",
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check, exploit and restore password to original state",
"fork": false,
"created_at": "2021-01-20T21:38:47Z",
"updated_at": "2022-02-14T03:08:31Z",
"pushed_at": "2021-11-22T17:40:59Z",
"updated_at": "2022-04-12T22:46:23Z",
"pushed_at": "2022-04-12T23:27:40Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-07-18T05:15:05Z",
"updated_at": "2022-04-10T07:31:02Z",
"updated_at": "2022-04-12T22:13:52Z",
"pushed_at": "2021-03-17T11:29:58Z",
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 20,
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 110,
"forks": 21,
"watchers": 111,
"score": 0
},
{

View file

@ -235,7 +235,7 @@
"fork": false,
"created_at": "2022-02-07T10:59:36Z",
"updated_at": "2022-02-07T12:49:21Z",
"pushed_at": "2022-04-12T17:46:21Z",
"pushed_at": "2022-04-12T20:00:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -303,7 +303,7 @@
"pushed_at": "2022-03-02T15:41:29Z",
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [
@ -316,7 +316,7 @@
"ssrf"
],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 137,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CSP Playground for CVE-2021-30682",
"fork": false,
"created_at": "2021-10-15T08:10:02Z",
"updated_at": "2022-04-12T10:07:06Z",
"updated_at": "2022-04-12T19:19:14Z",
"pushed_at": "2022-03-24T07:38:41Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 204,
"watchers_count": 204,
"forks_count": 59,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"forks": 58,
"watchers": 204,
"score": 0
},

View file

@ -184,17 +184,17 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2022-04-08T06:08:01Z",
"updated_at": "2022-04-12T20:31:19Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 60,
"watchers": 61,
"score": 0
},
{

View file

@ -1788,17 +1788,17 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2022-04-12T17:54:17Z",
"updated_at": "2022-04-12T23:50:37Z",
"pushed_at": "2022-04-09T08:06:43Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 154,
"watchers": 160,
"score": 0
},
{

View file

@ -454,7 +454,7 @@
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [
@ -468,7 +468,7 @@
"thehackersbrain"
],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 51,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2022-04-12T06:15:05Z",
"updated_at": "2022-04-12T21:07:20Z",
"pushed_at": "2022-03-18T16:32:13Z",
"stargazers_count": 783,
"watchers_count": 783,
"stargazers_count": 784,
"watchers_count": 784,
"forks_count": 169,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 169,
"watchers": 783,
"watchers": 784,
"score": 0
},
{
@ -49,12 +49,12 @@
"pushed_at": "2022-03-16T13:59:31Z",
"stargazers_count": 298,
"watchers_count": 298,
"forks_count": 60,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 60,
"forks": 61,
"watchers": 298,
"score": 0
},

View file

@ -94,17 +94,17 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2022-04-12T11:27:47Z",
"updated_at": "2022-04-12T18:46:45Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 263,
"watchers_count": 263,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 262,
"watchers": 263,
"score": 0
},
{

View file

@ -3492,17 +3492,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-04-12T17:49:22Z",
"updated_at": "2022-04-12T20:03:09Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2829,
"watchers_count": 2829,
"stargazers_count": 2830,
"watchers_count": 2830,
"forks_count": 687,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 687,
"watchers": 2829,
"watchers": 2830,
"score": 0
},
{
@ -5158,10 +5158,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-04-12T15:39:21Z",
"updated_at": "2022-04-12T22:22:52Z",
"pushed_at": "2022-03-22T04:27:38Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
@ -5174,7 +5174,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 302,
"watchers": 304,
"score": 0
},
{

View file

@ -1105,12 +1105,12 @@
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 51,
"watchers": 227,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2022-04-11T14:52:02Z",
"updated_at": "2022-04-12T22:32:48Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 402,
"watchers_count": 402,
"stargazers_count": 403,
"watchers_count": 403,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 402,
"watchers": 403,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "CVE-2022-21882",
"fork": false,
"created_at": "2022-02-01T17:58:29Z",
"updated_at": "2022-04-08T19:16:33Z",
"updated_at": "2022-04-12T22:32:21Z",
"pushed_at": "2022-02-01T18:14:07Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2022-02-03T11:25:14Z",
"updated_at": "2022-04-08T19:16:19Z",
"updated_at": "2022-04-12T22:32:09Z",
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 41,
"stargazers_count": 150,
"watchers_count": 150,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 148,
"forks": 42,
"watchers": 150,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-04-12T14:24:18Z",
"updated_at": "2022-04-12T22:31:23Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 562,
"watchers_count": 562,
"stargazers_count": 563,
"watchers_count": 563,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 562,
"watchers": 563,
"score": 0
}
]

View file

@ -43,17 +43,17 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-04-12T16:56:23Z",
"updated_at": "2022-04-13T00:13:32Z",
"pushed_at": "2022-04-11T14:59:06Z",
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 25,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 106,
"forks": 28,
"watchers": 110,
"score": 0
},
{
@ -244,5 +244,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 480975254,
"name": "CVE-2022-22954_VMware_PoC",
"full_name": "DrorDvash\/CVE-2022-22954_VMware_PoC",
"owner": {
"login": "DrorDvash",
"id": 8413651,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8413651?v=4",
"html_url": "https:\/\/github.com\/DrorDvash"
},
"html_url": "https:\/\/github.com\/DrorDvash\/CVE-2022-22954_VMware_PoC",
"description": "PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection",
"fork": false,
"created_at": "2022-04-12T21:15:27Z",
"updated_at": "2022-04-12T22:29:14Z",
"pushed_at": "2022-04-12T23:19:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2022-04-12T13:17:16Z",
"updated_at": "2022-04-12T19:55:58Z",
"pushed_at": "2022-04-07T19:05:54Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 74,
"watchers": 236,
"watchers": 237,
"score": 0
},
{
@ -119,17 +119,17 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-04-12T07:47:34Z",
"updated_at": "2022-04-12T19:35:53Z",
"pushed_at": "2022-04-05T16:02:33Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 201,
"watchers_count": 201,
"forks_count": 178,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 178,
"watchers": 200,
"watchers": 201,
"score": 0
},
{
@ -697,17 +697,17 @@
"description": "Spring4Shell (CVE-2022-22965)",
"fork": false,
"created_at": "2022-04-01T12:37:32Z",
"updated_at": "2022-04-12T02:42:22Z",
"updated_at": "2022-04-12T20:39:40Z",
"pushed_at": "2022-04-07T11:46:54Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -1070,17 +1070,17 @@
"description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)",
"fork": false,
"created_at": "2022-04-04T21:01:26Z",
"updated_at": "2022-04-12T06:47:10Z",
"updated_at": "2022-04-12T18:26:27Z",
"pushed_at": "2022-04-07T16:04:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -1286,17 +1286,17 @@
"description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)",
"fork": false,
"created_at": "2022-04-07T00:08:16Z",
"updated_at": "2022-04-12T12:28:32Z",
"updated_at": "2022-04-12T23:32:56Z",
"pushed_at": "2022-04-07T23:00:29Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 77,
"watchers": 78,
"score": 0
},
{
@ -1487,5 +1487,32 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 481013803,
"name": "-Spring4Shell-CVE-2022-22965-",
"full_name": "Omaraitbenhaddi\/-Spring4Shell-CVE-2022-22965-",
"owner": {
"login": "Omaraitbenhaddi",
"id": 88466716,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88466716?v=4",
"html_url": "https:\/\/github.com\/Omaraitbenhaddi"
},
"html_url": "https:\/\/github.com\/Omaraitbenhaddi\/-Spring4Shell-CVE-2022-22965-",
"description": "exploitation script tryhackme ",
"fork": false,
"created_at": "2022-04-13T00:15:55Z",
"updated_at": "2022-04-13T00:15:56Z",
"pushed_at": "2022-04-13T00:15:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)",
"fork": false,
"created_at": "2021-12-26T04:29:09Z",
"updated_at": "2022-03-21T05:44:29Z",
"updated_at": "2022-04-12T21:28:51Z",
"pushed_at": "2022-03-19T16:24:28Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 37,
"watchers": 38,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-25943",
"fork": false,
"created_at": "2021-07-09T23:34:57Z",
"updated_at": "2022-04-12T14:14:18Z",
"updated_at": "2022-04-12T19:51:17Z",
"pushed_at": "2022-03-09T08:26:45Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.",
"fork": false,
"created_at": "2022-04-08T02:49:09Z",
"updated_at": "2022-04-12T14:16:25Z",
"updated_at": "2022-04-12T19:41:34Z",
"pushed_at": "2022-04-08T15:21:26Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 50,
"watchers": 51,
"score": 0
}
]

153
README.md
View file

@ -525,6 +525,7 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
- [lucksec/VMware-CVE-2022-22954](https://github.com/lucksec/VMware-CVE-2022-22954)
- [mumu2020629/-CVE-2022-22954-scanner](https://github.com/mumu2020629/-CVE-2022-22954-scanner)
- [MSeymenD/CVE-2022-22954-Testi](https://github.com/MSeymenD/CVE-2022-22954-Testi)
- [DrorDvash/CVE-2022-22954_VMware_PoC](https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC)
### CVE-2022-22963 (2022-04-01)
@ -604,6 +605,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
- [Will-Beninger/CVE-2022-22965_SpringShell](https://github.com/Will-Beninger/CVE-2022-22965_SpringShell)
- [fransvanbuul/CVE-2022-22965-susceptibility](https://github.com/fransvanbuul/CVE-2022-22965-susceptibility)
- [jrgdiaz/Spring4Shell-CVE-2022-22965.py](https://github.com/jrgdiaz/Spring4Shell-CVE-2022-22965.py)
- [Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-](https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-)
### CVE-2022-23046 (2022-01-19)
@ -17694,7 +17696,6 @@ Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1,
</code>
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)
@ -17844,14 +17845,6 @@ IBM Tivoli Monitoring V6 6.2.2.x could allow a remote attacker to execute arbitr
- [emcalv/tivoli-poc](https://github.com/emcalv/tivoli-poc)
- [bcdannyboy/cve-2017-1635-PoC](https://github.com/bcdannyboy/cve-2017-1635-PoC)
### CVE-2017-2368 (2017-02-20)
<code>
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the &quot;Contacts&quot; component. It allows remote attackers to cause a denial of service (application crash) via a crafted contact card.
</code>
- [vincedes3/CVE-2017-2368](https://github.com/vincedes3/CVE-2017-2368)
### CVE-2017-2370 (2017-02-20)
<code>
@ -17863,14 +17856,6 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
### CVE-2017-2388 (2017-04-01)
<code>
An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the &quot;IOFireWireFamily&quot; component. It allows attackers to cause a denial of service (NULL pointer dereference) via a crafted app.
</code>
- [bazad/IOFireWireFamily-null-deref](https://github.com/bazad/IOFireWireFamily-null-deref)
### CVE-2017-2636 (2017-03-07)
<code>
@ -17974,7 +17959,6 @@ An attacker who is able to send and receive messages to an authoritative DNS ser
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
</code>
- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC)
- [scopion/CVE-2017-3241](https://github.com/scopion/CVE-2017-3241)
### CVE-2017-3248 (2017-01-27)
@ -18027,7 +18011,6 @@ A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code i
### CVE-2017-4490
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
- [homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-](https://github.com/homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-)
### CVE-2017-4878
- [brianwrf/CVE-2017-4878-Samples](https://github.com/brianwrf/CVE-2017-4878-Samples)
@ -18098,7 +18081,6 @@ An attack can use a blob URL and script to spoof an arbitrary addressbar URL pre
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
</code>
- [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan)
- [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan)
- [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487)
- [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit)
@ -18155,12 +18137,8 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
- [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638)
- [sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
- [sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638)
- [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-)
- [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638)
- [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
- [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser)
- [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638)
- [c002/Apache-Struts](https://github.com/c002/Apache-Struts)
- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit)
- [pr0x1ma-byte/cybersecurity-struts2](https://github.com/pr0x1ma-byte/cybersecurity-struts2)
- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638)
@ -18209,7 +18187,6 @@ An unprivileged network attacker could gain system privileges to provisioned Int
- [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689)
- [x1sec/amthoneypot](https://github.com/x1sec/amthoneypot)
- [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass)
- [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc)
- [TheWay-hue/CVE-2017-5689-Checker](https://github.com/TheWay-hue/CVE-2017-5689-Checker)
### CVE-2017-5693 (2018-07-31)
@ -18379,15 +18356,6 @@ A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.
- [ansjdnakjdnajkd/CVE-2017-7038](https://github.com/ansjdnakjdnajkd/CVE-2017-7038)
### CVE-2017-7047 (2017-07-20)
<code>
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the &quot;libxpc&quot; component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
</code>
- [JosephShenton/Triple_Fetch-Kernel-Creds](https://github.com/JosephShenton/Triple_Fetch-Kernel-Creds)
- [q1f3/Triple_fetch](https://github.com/q1f3/Triple_fetch)
### CVE-2017-7061 (2017-07-20)
<code>
@ -18525,7 +18493,6 @@ A deserialization flaw was discovered in the jackson-databind, versions before 2
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
</code>
- [liusec/CVE-2017-7529](https://github.com/liusec/CVE-2017-7529)
- [en0f/CVE-2017-7529_PoC](https://github.com/en0f/CVE-2017-7529_PoC)
- [cved-sources/cve-2017-7529](https://github.com/cved-sources/cve-2017-7529)
- [MaxSecurity/CVE-2017-7529-POC](https://github.com/MaxSecurity/CVE-2017-7529-POC)
@ -18649,7 +18616,6 @@ Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Wi
- [Elm0D/CVE-2017-8464](https://github.com/Elm0D/CVE-2017-8464)
- [3gstudent/CVE-2017-8464-EXP](https://github.com/3gstudent/CVE-2017-8464-EXP)
- [Securitykid/CVE-2017-8464-exp-generator](https://github.com/Securitykid/CVE-2017-8464-exp-generator)
- [X-Vector/usbhijacking](https://github.com/X-Vector/usbhijacking)
- [xssfile/CVE-2017-8464-EXP](https://github.com/xssfile/CVE-2017-8464-EXP)
@ -18692,22 +18658,6 @@ Microsoft Office allows a remote code execution vulnerability due to the way tha
- [sasqwatch/CVE-2017-8570](https://github.com/sasqwatch/CVE-2017-8570)
- [erfze/CVE-2017-8570](https://github.com/erfze/CVE-2017-8570)
### CVE-2017-8625 (2017-08-08)
<code>
Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to bypass Device Guard User Mode Code Integrity (UMCI) policies due to Internet Explorer failing to validate UMCI policies, aka &quot;Internet Explorer Security Feature Bypass Vulnerability&quot;.
</code>
- [homjxi0e/CVE-2017-8625_Bypass_UMCI](https://github.com/homjxi0e/CVE-2017-8625_Bypass_UMCI)
### CVE-2017-8641 (2017-08-08)
<code>
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render when handling objects in memory, aka &quot;Scripting Engine Memory Corruption Vulnerability&quot;. This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
</code>
- [homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject](https://github.com/homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject)
### CVE-2017-8759 (2017-09-12)
<code>
@ -18716,9 +18666,6 @@ Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow
- [Voulnet/CVE-2017-8759-Exploit-sample](https://github.com/Voulnet/CVE-2017-8759-Exploit-sample)
- [nccgroup/CVE-2017-8759](https://github.com/nccgroup/CVE-2017-8759)
- [vysecurity/CVE-2017-8759](https://github.com/vysecurity/CVE-2017-8759)
- [BasuCert/CVE-2017-8759](https://github.com/BasuCert/CVE-2017-8759)
- [tahisaad6/CVE-2017-8759-Exploit-sample2](https://github.com/tahisaad6/CVE-2017-8759-Exploit-sample2)
- [homjxi0e/CVE-2017-8759_-SOAP_WSDL](https://github.com/homjxi0e/CVE-2017-8759_-SOAP_WSDL)
- [bhdresh/CVE-2017-8759](https://github.com/bhdresh/CVE-2017-8759)
- [Lz1y/CVE-2017-8759](https://github.com/Lz1y/CVE-2017-8759)
@ -18897,22 +18844,12 @@ A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse
- [kkent030315/CVE-2017-9769](https://github.com/kkent030315/CVE-2017-9769)
### CVE-2017-9779 (2017-09-07)
<code>
OCaml compiler allows attackers to have unspecified impact via unknown vectors, a similar issue to CVE-2017-9772 &quot;but with much less impact.&quot;
</code>
- [homjxi0e/CVE-2017-9779](https://github.com/homjxi0e/CVE-2017-9779)
### CVE-2017-9791 (2017-07-10)
<code>
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
</code>
- [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048)
- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048)
- [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791)
### CVE-2017-9798 (2017-09-18)
@ -18933,9 +18870,7 @@ The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x bef
</code>
- [luc10/struts-rce-cve-2017-9805](https://github.com/luc10/struts-rce-cve-2017-9805)
- [hahwul/struts2-rce-cve-2017-9805-ruby](https://github.com/hahwul/struts2-rce-cve-2017-9805-ruby)
- [mazen160/struts-pwn_CVE-2017-9805](https://github.com/mazen160/struts-pwn_CVE-2017-9805)
- [Lone-Ranger/apache-struts-pwn_CVE-2017-9805](https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805)
- [0x00-0x00/-CVE-2017-9805](https://github.com/0x00-0x00/-CVE-2017-9805)
- [BeyondCy/S2-052](https://github.com/BeyondCy/S2-052)
- [chrisjd20/cve-2017-9805.py](https://github.com/chrisjd20/cve-2017-9805.py)
@ -19056,14 +18991,6 @@ The ifmap service that comes bundled with Contrail has an XML External Entity (X
- [gteissier/CVE-2017-10617](https://github.com/gteissier/CVE-2017-10617)
### CVE-2017-10661 (2017-08-19)
<code>
Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
</code>
- [GeneBlue/CVE-2017-10661_POC](https://github.com/GeneBlue/CVE-2017-10661_POC)
### CVE-2017-10797
- [n4xh4ck5/CVE-2017-10797](https://github.com/n4xh4ck5/CVE-2017-10797)
@ -19136,14 +19063,6 @@ The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before
- [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610)
- [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610)
### CVE-2017-11611 (2017-09-08)
<code>
Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of the file name in a &quot;create-file-popup&quot; action, and the directory name in a &quot;create-directory-popup&quot; action, in the HTTP POST method to the &quot;/plugin/file_manager/&quot; script (aka an /admin/plugin/file_manager/browse// URI).
</code>
- [faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc](https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc)
### CVE-2017-11774 (2017-10-13)
<code>
@ -19224,14 +19143,6 @@ In Jboss Application Server as shipped with Red Hat Enterprise Application Platf
- [jreppiks/CVE-2017-12149](https://github.com/jreppiks/CVE-2017-12149)
- [Xcatolin/jboss-deserialization](https://github.com/Xcatolin/jboss-deserialization)
### CVE-2017-12426 (2017-08-14)
<code>
GitLab Community Edition (CE) and Enterprise Edition (EE) before 8.17.8, 9.0.x before 9.0.13, 9.1.x before 9.1.10, 9.2.x before 9.2.10, 9.3.x before 9.3.10, and 9.4.x before 9.4.4 might allow remote attackers to execute arbitrary code via a crafted SSH URL in a project import.
</code>
- [sm-paul-schuette/CVE-2017-12426](https://github.com/sm-paul-schuette/CVE-2017-12426)
### CVE-2017-12542 (2018-02-15)
<code>
@ -19241,14 +19152,6 @@ A authentication bypass and execution of code vulnerability in HPE Integrated Li
- [skelsec/CVE-2017-12542](https://github.com/skelsec/CVE-2017-12542)
- [sk1dish/ilo4-rce-vuln-scanner](https://github.com/sk1dish/ilo4-rce-vuln-scanner)
### CVE-2017-12611 (2017-09-20)
<code>
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
</code>
- [brianwrf/S2-053-CVE-2017-12611](https://github.com/brianwrf/S2-053-CVE-2017-12611)
### CVE-2017-12615 (2017-09-19)
<code>
@ -19308,14 +19211,6 @@ CouchDB administrative users can configure the database server via HTTP(S). Some
- [moayadalmalat/CVE-2017-12636](https://github.com/moayadalmalat/CVE-2017-12636)
- [XTeam-Wing/CVE-2017-12636](https://github.com/XTeam-Wing/CVE-2017-12636)
### CVE-2017-12792 (2017-10-02)
<code>
Multiple cross-site request forgery (CSRF) vulnerabilities in NexusPHP 1.5 allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) linkname, (2) url, or (3) title parameter in an add action to linksmanage.php.
</code>
- [ZZS2017/cve-2017-12792](https://github.com/ZZS2017/cve-2017-12792)
### CVE-2017-12842 (2020-03-16)
<code>
@ -19410,30 +19305,6 @@ An issue was discovered in certain Apple products. macOS High Sierra before Secu
- [giovannidispoto/CVE-2017-13872-Patch](https://github.com/giovannidispoto/CVE-2017-13872-Patch)
### CVE-2017-14105 (2017-09-01)
<code>
HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifying a backup archive before a restore, because the restore feature does not validate pathnames within the archive. An authenticated, local attacker - even restricted as a tenant - can add a jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will be exposed at the web interface).
</code>
- [theguly/CVE-2017-14105](https://github.com/theguly/CVE-2017-14105)
### CVE-2017-14262 (2017-09-11)
<code>
On Samsung NVR devices, remote attackers can read the MD5 password hash of the 'admin' account via certain szUserName JSON data to cgi-bin/main-cgi, and login to the device with that hash in the szUserPasswd parameter.
</code>
- [zzz66686/CVE-2017-14262](https://github.com/zzz66686/CVE-2017-14262)
### CVE-2017-14263 (2017-09-11)
<code>
Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.
</code>
- [zzz66686/CVE-2017-14263](https://github.com/zzz66686/CVE-2017-14263)
### CVE-2017-14322 (2017-10-18)
<code>
@ -19783,9 +19654,6 @@ An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VN
- [ShielderSec/CVE-2017-18635](https://github.com/ShielderSec/CVE-2017-18635)
### CVE-2017-98505
- [mike-williams/Struts2Vuln](https://github.com/mike-williams/Struts2Vuln)
### CVE-2017-1000000
- [smythtech/DWF-CVE-2017-1000000](https://github.com/smythtech/DWF-CVE-2017-1000000)
@ -19822,24 +19690,7 @@ Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. W
A malicious third-party can give a crafted &quot;ssh://...&quot; URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running &quot;git clone --recurse-submodules&quot; to trigger the vulnerability.
</code>
- [timwr/CVE-2017-1000117](https://github.com/timwr/CVE-2017-1000117)
- [GrahamMThomas/test-git-vuln_CVE-2017-1000117](https://github.com/GrahamMThomas/test-git-vuln_CVE-2017-1000117)
- [Manouchehri/CVE-2017-1000117](https://github.com/Manouchehri/CVE-2017-1000117)
- [thelastbyte/CVE-2017-1000117](https://github.com/thelastbyte/CVE-2017-1000117)
- [alilangtest/CVE-2017-1000117](https://github.com/alilangtest/CVE-2017-1000117)
- [VulApps/CVE-2017-1000117](https://github.com/VulApps/CVE-2017-1000117)
- [greymd/CVE-2017-1000117](https://github.com/greymd/CVE-2017-1000117)
- [shogo82148/Fix-CVE-2017-1000117](https://github.com/shogo82148/Fix-CVE-2017-1000117)
- [sasairc/CVE-2017-1000117_wasawasa](https://github.com/sasairc/CVE-2017-1000117_wasawasa)
- [Shadow5523/CVE-2017-1000117-test](https://github.com/Shadow5523/CVE-2017-1000117-test)
- [ieee0824/CVE-2017-1000117](https://github.com/ieee0824/CVE-2017-1000117)
- [rootclay/CVE-2017-1000117](https://github.com/rootclay/CVE-2017-1000117)
- [ieee0824/CVE-2017-1000117-sl](https://github.com/ieee0824/CVE-2017-1000117-sl)
- [takehaya/CVE-2017-1000117](https://github.com/takehaya/CVE-2017-1000117)
- [ikmski/CVE-2017-1000117](https://github.com/ikmski/CVE-2017-1000117)
- [nkoneko/CVE-2017-1000117](https://github.com/nkoneko/CVE-2017-1000117)
- [chenzhuo0618/test](https://github.com/chenzhuo0618/test)
- [siling2017/CVE-2017-1000117](https://github.com/siling2017/CVE-2017-1000117)
- [Q2h1Cg/CVE-2017-1000117](https://github.com/Q2h1Cg/CVE-2017-1000117)
- [cved-sources/cve-2017-1000117](https://github.com/cved-sources/cve-2017-1000117)
- [leezp/CVE-2017-1000117](https://github.com/leezp/CVE-2017-1000117)