mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/02/14 12:09:04
This commit is contained in:
parent
39764ec2b0
commit
5290f6fb25
245 changed files with 10256 additions and 3011 deletions
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2017-04-05T23:29:03Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
|
|
48
2018/CVE-2018-0101.json
Normal file
48
2018/CVE-2018-0101.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 120640426,
|
||||
"name": "CVE-2018-0101-DOS-POC",
|
||||
"full_name": "1337g\/CVE-2018-0101-DOS-POC",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2018-0101-DOS-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T16:25:59Z",
|
||||
"updated_at": "2020-04-06T12:17:46Z",
|
||||
"pushed_at": "2018-02-07T16:43:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120782386,
|
||||
"name": "ciscoasa_honeypot",
|
||||
"full_name": "Cymmetria\/ciscoasa_honeypot",
|
||||
"owner": {
|
||||
"login": "Cymmetria",
|
||||
"id": 19413345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19413345?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cymmetria"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cymmetria\/ciscoasa_honeypot",
|
||||
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-08T15:52:50Z",
|
||||
"updated_at": "2021-02-03T21:07:47Z",
|
||||
"pushed_at": "2018-11-23T11:47:10Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 138142987,
|
||||
"name": "CVE-2018-0296",
|
||||
"full_name": "milo2012\/CVE-2018-0296",
|
||||
"owner": {
|
||||
"login": "milo2012",
|
||||
"id": 905335,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
|
||||
"html_url": "https:\/\/github.com\/milo2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/milo2012\/CVE-2018-0296",
|
||||
"description": "Test CVE-2018-0296 and extract usernames",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T08:36:34Z",
|
||||
"updated_at": "2020-11-13T03:19:23Z",
|
||||
"pushed_at": "2018-12-09T11:57:20Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 138190891,
|
||||
"name": "CVE-2018-0296",
|
||||
|
@ -22,6 +45,29 @@
|
|||
"watchers": 180,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 138348696,
|
||||
"name": "CVE-2018-0296",
|
||||
"full_name": "bhenner1\/CVE-2018-0296",
|
||||
"owner": {
|
||||
"login": "bhenner1",
|
||||
"id": 24857952,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24857952?v=4",
|
||||
"html_url": "https:\/\/github.com\/bhenner1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bhenner1\/CVE-2018-0296",
|
||||
"description": "Cisco ASA - CVE-2018-0296 | Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-22T21:12:58Z",
|
||||
"updated_at": "2019-01-03T02:33:10Z",
|
||||
"pushed_at": "2018-06-26T13:44:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162431036,
|
||||
"name": "CVE-2018-0296",
|
||||
|
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 117077311,
|
||||
"name": "CVE-2018-0802_POC",
|
||||
"full_name": "zldww2011\/CVE-2018-0802_POC",
|
||||
"owner": {
|
||||
"login": "zldww2011",
|
||||
"id": 17902585,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17902585?v=4",
|
||||
"html_url": "https:\/\/github.com\/zldww2011"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zldww2011\/CVE-2018-0802_POC",
|
||||
"description": "Exploit the vulnerability to execute the calculator",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:16:32Z",
|
||||
"updated_at": "2020-12-16T10:25:11Z",
|
||||
"pushed_at": "2018-01-11T09:23:05Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117080574,
|
||||
"name": "CVE-2018-0802",
|
||||
"full_name": "rxwx\/CVE-2018-0802",
|
||||
"owner": {
|
||||
"login": "rxwx",
|
||||
"id": 2202542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
|
||||
"html_url": "https:\/\/github.com\/rxwx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rxwx\/CVE-2018-0802",
|
||||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2021-01-13T19:55:04Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 267,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117234193,
|
||||
"name": "RTF_11882_0802",
|
||||
"full_name": "Ridter\/RTF_11882_0802",
|
||||
"owner": {
|
||||
"login": "Ridter",
|
||||
"id": 6007471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ridter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802",
|
||||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2021-02-04T07:49:36Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117637270,
|
||||
"name": "CVE-2018-0802_CVE-2017-11882",
|
||||
"full_name": "likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T05:49:01Z",
|
||||
"updated_at": "2021-01-15T03:33:11Z",
|
||||
"pushed_at": "2018-01-16T05:49:10Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313441734,
|
||||
"name": "rtfkit",
|
||||
|
|
25
2018/CVE-2018-0824.json
Normal file
25
2018/CVE-2018-0824.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 137465316,
|
||||
"name": "UnmarshalPwn",
|
||||
"full_name": "codewhitesec\/UnmarshalPwn",
|
||||
"owner": {
|
||||
"login": "codewhitesec",
|
||||
"id": 8680262,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8680262?v=4",
|
||||
"html_url": "https:\/\/github.com\/codewhitesec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codewhitesec\/UnmarshalPwn",
|
||||
"description": "POC for CVE-2018-0824",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-15T08:59:37Z",
|
||||
"updated_at": "2020-12-11T07:20:35Z",
|
||||
"pushed_at": "2018-06-25T07:13:36Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-0952.json
Normal file
25
2018/CVE-2018-0952.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 145615979,
|
||||
"name": "CVE-2018-0952-SystemCollector",
|
||||
"full_name": "atredispartners\/CVE-2018-0952-SystemCollector",
|
||||
"owner": {
|
||||
"login": "atredispartners",
|
||||
"id": 7254370,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7254370?v=4",
|
||||
"html_url": "https:\/\/github.com\/atredispartners"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector",
|
||||
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T20:29:10Z",
|
||||
"updated_at": "2021-02-02T05:09:56Z",
|
||||
"pushed_at": "2018-08-21T20:30:24Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1000001.json
Normal file
25
2018/CVE-2018-1000001.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 120648393,
|
||||
"name": "CVE-2018-1000001",
|
||||
"full_name": "0x00-0x00\/CVE-2018-1000001",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-1000001",
|
||||
"description": "glibc getcwd() local privilege escalation compiled binaries",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T17:34:24Z",
|
||||
"updated_at": "2020-12-02T07:21:01Z",
|
||||
"pushed_at": "2018-02-09T22:35:06Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1000006.json
Normal file
25
2018/CVE-2018-1000006.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 118851943,
|
||||
"name": "CVE-2018-1000006-DEMO",
|
||||
"full_name": "CHYbeta\/CVE-2018-1000006-DEMO",
|
||||
"owner": {
|
||||
"login": "CHYbeta",
|
||||
"id": 18642224,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18642224?v=4",
|
||||
"html_url": "https:\/\/github.com\/CHYbeta"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CHYbeta\/CVE-2018-1000006-DEMO",
|
||||
"description": "The Demo for CVE-2018-1000006",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T02:38:44Z",
|
||||
"updated_at": "2020-07-13T15:22:09Z",
|
||||
"pushed_at": "2018-01-25T03:29:30Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1000117.json
Normal file
25
2018/CVE-2018-1000117.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 136231159,
|
||||
"name": "CVE-2018-1000117-Exploit",
|
||||
"full_name": "u0pattern\/CVE-2018-1000117-Exploit",
|
||||
"owner": {
|
||||
"login": "u0pattern",
|
||||
"id": 21009276,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21009276?v=4",
|
||||
"html_url": "https:\/\/github.com\/u0pattern"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/u0pattern\/CVE-2018-1000117-Exploit",
|
||||
"description": "Buffer Overflow Vulnerability that can result ACE",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-05T20:28:29Z",
|
||||
"updated_at": "2020-06-30T04:18:59Z",
|
||||
"pushed_at": "2018-06-05T20:45:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1000134.json
Normal file
25
2018/CVE-2018-1000134.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 156499957,
|
||||
"name": "cve-2018-1000134",
|
||||
"full_name": "dragotime\/cve-2018-1000134",
|
||||
"owner": {
|
||||
"login": "dragotime",
|
||||
"id": 43851975,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43851975?v=4",
|
||||
"html_url": "https:\/\/github.com\/dragotime"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dragotime\/cve-2018-1000134",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-07T06:22:47Z",
|
||||
"updated_at": "2018-11-07T06:22:47Z",
|
||||
"pushed_at": "2018-11-07T06:22:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1000199.json
Normal file
25
2018/CVE-2018-1000199.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 131973710,
|
||||
"name": "CVE-2018-1000199",
|
||||
"full_name": "dsfau\/CVE-2018-1000199",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/CVE-2018-1000199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T09:37:56Z",
|
||||
"updated_at": "2018-05-03T09:41:20Z",
|
||||
"pushed_at": "2018-05-03T09:41:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1000529.json
Normal file
25
2018/CVE-2018-1000529.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 134336529,
|
||||
"name": "CVE-2018-1000529",
|
||||
"full_name": "martinfrancois\/CVE-2018-1000529",
|
||||
"owner": {
|
||||
"login": "martinfrancois",
|
||||
"id": 14319020,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14319020?v=4",
|
||||
"html_url": "https:\/\/github.com\/martinfrancois"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/martinfrancois\/CVE-2018-1000529",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-21T23:43:18Z",
|
||||
"updated_at": "2018-06-28T20:43:19Z",
|
||||
"pushed_at": "2018-06-28T20:43:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1000802.json
Normal file
25
2018/CVE-2018-1000802.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 148814288,
|
||||
"name": "CVE-2018-1000802-PoC",
|
||||
"full_name": "tna0y\/CVE-2018-1000802-PoC",
|
||||
"owner": {
|
||||
"login": "tna0y",
|
||||
"id": 22504374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22504374?v=4",
|
||||
"html_url": "https:\/\/github.com\/tna0y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tna0y\/CVE-2018-1000802-PoC",
|
||||
"description": "Python CVE-2018-1000802 Proof-of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-14T16:22:12Z",
|
||||
"updated_at": "2020-05-29T07:36:51Z",
|
||||
"pushed_at": "2018-09-14T16:38:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1010.json
Normal file
25
2018/CVE-2018-1010.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 130343381,
|
||||
"name": "Detecting-the-patch-of-CVE-2018-1010",
|
||||
"full_name": "ymgh96\/Detecting-the-patch-of-CVE-2018-1010",
|
||||
"owner": {
|
||||
"login": "ymgh96",
|
||||
"id": 29282323,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29282323?v=4",
|
||||
"html_url": "https:\/\/github.com\/ymgh96"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ymgh96\/Detecting-the-patch-of-CVE-2018-1010",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-20T09:50:40Z",
|
||||
"updated_at": "2018-04-20T11:01:36Z",
|
||||
"pushed_at": "2018-04-20T11:01:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1026.json
Normal file
25
2018/CVE-2018-1026.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 131403764,
|
||||
"name": "Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"full_name": "ymgh96\/Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"owner": {
|
||||
"login": "ymgh96",
|
||||
"id": 29282323,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29282323?v=4",
|
||||
"html_url": "https:\/\/github.com\/ymgh96"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ymgh96\/Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:28:11Z",
|
||||
"updated_at": "2018-04-28T11:32:03Z",
|
||||
"pushed_at": "2018-04-28T11:32:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10299.json
Normal file
25
2018/CVE-2018-10299.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 133036448,
|
||||
"name": "batchOverflow",
|
||||
"full_name": "phzietsman\/batchOverflow",
|
||||
"owner": {
|
||||
"login": "phzietsman",
|
||||
"id": 11902058,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11902058?v=4",
|
||||
"html_url": "https:\/\/github.com\/phzietsman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/phzietsman\/batchOverflow",
|
||||
"description": "A fix for the batchOverflow bug https:\/\/medium.com\/@peckshield\/alert-new-batchoverflow-bug-in-multiple-erc20-smart-contracts-cve-2018-10299-511067db6536",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-11T12:23:08Z",
|
||||
"updated_at": "2018-07-03T19:26:14Z",
|
||||
"pushed_at": "2018-07-03T19:26:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10467.json
Normal file
25
2018/CVE-2018-10467.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 131241395,
|
||||
"name": "CVE-2018-10467",
|
||||
"full_name": "alt3kx\/CVE-2018-10467",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10467",
|
||||
"description": "CVE-2018-10467",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-27T03:35:47Z",
|
||||
"updated_at": "2018-05-04T02:07:18Z",
|
||||
"pushed_at": "2018-05-04T02:01:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10517.json
Normal file
25
2018/CVE-2018-10517.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 156886365,
|
||||
"name": "CVE-2018-10517",
|
||||
"full_name": "0x00-0x00\/CVE-2018-10517",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10517",
|
||||
"description": "CMS Made Simple 2.2.7 RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-09T16:09:39Z",
|
||||
"updated_at": "2020-06-07T11:21:05Z",
|
||||
"pushed_at": "2018-11-09T16:09:46Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10546.json
Normal file
25
2018/CVE-2018-10546.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 131973382,
|
||||
"name": "CVE-2018-10546",
|
||||
"full_name": "dsfau\/CVE-2018-10546",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/CVE-2018-10546",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T09:35:27Z",
|
||||
"updated_at": "2018-05-03T09:36:53Z",
|
||||
"pushed_at": "2018-05-03T09:36:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1056.json
Normal file
25
2018/CVE-2018-1056.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 132433462,
|
||||
"name": "Gpon-Routers",
|
||||
"full_name": "rotemkama\/Gpon-Routers",
|
||||
"owner": {
|
||||
"login": "rotemkama",
|
||||
"id": 7814256,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7814256?v=4",
|
||||
"html_url": "https:\/\/github.com\/rotemkama"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rotemkama\/Gpon-Routers",
|
||||
"description": "Authentication Bypass \/ Command Injection Exploit CVE-2018-1056",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T08:52:45Z",
|
||||
"updated_at": "2020-05-28T11:06:32Z",
|
||||
"pushed_at": "2018-05-04T06:52:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
117
2018/CVE-2018-10562.json
Normal file
117
2018/CVE-2018-10562.json
Normal file
|
@ -0,0 +1,117 @@
|
|||
[
|
||||
{
|
||||
"id": 132445475,
|
||||
"name": "GPON",
|
||||
"full_name": "f3d0x0\/GPON",
|
||||
"owner": {
|
||||
"login": "f3d0x0",
|
||||
"id": 6794063,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6794063?v=4",
|
||||
"html_url": "https:\/\/github.com\/f3d0x0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/f3d0x0\/GPON",
|
||||
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T10:34:10Z",
|
||||
"updated_at": "2020-12-30T22:27:48Z",
|
||||
"pushed_at": "2018-05-10T15:08:43Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133550928,
|
||||
"name": "Pingpon-Exploit",
|
||||
"full_name": "649\/Pingpon-Exploit",
|
||||
"owner": {
|
||||
"login": "649",
|
||||
"id": 23534047,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23534047?v=4",
|
||||
"html_url": "https:\/\/github.com\/649"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/649\/Pingpon-Exploit",
|
||||
"description": "Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-15T17:31:21Z",
|
||||
"updated_at": "2020-01-05T18:02:50Z",
|
||||
"pushed_at": "2018-05-26T06:44:44Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133872939,
|
||||
"name": "GPON-LOADER",
|
||||
"full_name": "Choudai\/GPON-LOADER",
|
||||
"owner": {
|
||||
"login": "Choudai",
|
||||
"id": 28324694,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28324694?v=4",
|
||||
"html_url": "https:\/\/github.com\/Choudai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Choudai\/GPON-LOADER",
|
||||
"description": "Exploit loader for Remote Code Execution w\/ Payload on GPON Home Gateway devices (CVE-2018-10562) written in Python.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T22:03:47Z",
|
||||
"updated_at": "2020-06-27T20:05:00Z",
|
||||
"pushed_at": "2018-05-17T22:15:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134941877,
|
||||
"name": "GPON_RCE",
|
||||
"full_name": "c0ld1\/GPON_RCE",
|
||||
"owner": {
|
||||
"login": "c0ld1",
|
||||
"id": 39249476,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39249476?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0ld1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0ld1\/GPON_RCE",
|
||||
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-26T08:05:22Z",
|
||||
"updated_at": "2019-07-30T02:41:47Z",
|
||||
"pushed_at": "2018-05-26T08:07:37Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136307543,
|
||||
"name": "CVE-2018-10562",
|
||||
"full_name": "ATpiu\/CVE-2018-10562",
|
||||
"owner": {
|
||||
"login": "ATpiu",
|
||||
"id": 26686336,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26686336?v=4",
|
||||
"html_url": "https:\/\/github.com\/ATpiu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ATpiu\/CVE-2018-10562",
|
||||
"description": "Exploit for CVE-2018-10562",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-06T09:43:40Z",
|
||||
"updated_at": "2018-11-16T22:46:24Z",
|
||||
"pushed_at": "2018-06-07T02:55:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10583.json
Normal file
25
2018/CVE-2018-10583.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 131920571,
|
||||
"name": "CVE-2018-10583",
|
||||
"full_name": "TaharAmine\/CVE-2018-10583",
|
||||
"owner": {
|
||||
"login": "TaharAmine",
|
||||
"id": 35707349,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35707349?v=4",
|
||||
"html_url": "https:\/\/github.com\/TaharAmine"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TaharAmine\/CVE-2018-10583",
|
||||
"description": "An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by \"xlink:href=file:\/\/192.168.0.2\/test.jpg\" within an \"office:document-content\" element in a \".odt XML document\".",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T00:34:08Z",
|
||||
"updated_at": "2021-01-05T12:18:31Z",
|
||||
"pushed_at": "2018-05-03T00:38:56Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10715.json
Normal file
25
2018/CVE-2018-10715.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 132069525,
|
||||
"name": "CVE-2018-10715",
|
||||
"full_name": "alt3kx\/CVE-2018-10715",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10715",
|
||||
"description": "CVE-2018-10715",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-04T01:33:22Z",
|
||||
"updated_at": "2018-05-04T02:17:30Z",
|
||||
"pushed_at": "2018-05-04T02:17:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10732.json
Normal file
25
2018/CVE-2018-10732.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 132435515,
|
||||
"name": "CVE-2018-10732",
|
||||
"full_name": "alt3kx\/CVE-2018-10732",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10732",
|
||||
"description": "Dataiku REST-API by default the software, allows anonymous access to functionality that allows an attacker to know valid users.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T09:07:58Z",
|
||||
"updated_at": "2018-06-05T11:51:00Z",
|
||||
"pushed_at": "2018-06-02T09:15:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10821.json
Normal file
25
2018/CVE-2018-10821.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 137230310,
|
||||
"name": "Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3",
|
||||
"full_name": "BalvinderSingh23\/Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3",
|
||||
"owner": {
|
||||
"login": "BalvinderSingh23",
|
||||
"id": 38315927,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38315927?v=4",
|
||||
"html_url": "https:\/\/github.com\/BalvinderSingh23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BalvinderSingh23\/Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3",
|
||||
"description": "BlackCat-CMS-Bundle-v1.3 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2018-10821",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-13T14:52:34Z",
|
||||
"updated_at": "2018-06-13T15:06:31Z",
|
||||
"pushed_at": "2018-06-13T15:06:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 153427159,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "SoledaD208\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "SoledaD208",
|
||||
"id": 8731578,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8731578?v=4",
|
||||
"html_url": "https:\/\/github.com\/SoledaD208"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SoledaD208\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933 very simple POC",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T09:01:44Z",
|
||||
"updated_at": "2020-12-18T03:51:25Z",
|
||||
"pushed_at": "2018-10-23T13:51:06Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153468806,
|
||||
"name": "CVE-2018-10933",
|
||||
|
@ -22,6 +45,328 @@
|
|||
"watchers": 467,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153477523,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "hook-s3c\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "hook-s3c",
|
||||
"id": 31825993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
|
||||
"html_url": "https:\/\/github.com\/hook-s3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T15:09:41Z",
|
||||
"updated_at": "2018-10-17T15:09:44Z",
|
||||
"pushed_at": "2018-10-17T15:09:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153506738,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "kn6869610\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "kn6869610",
|
||||
"id": 6917744,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
|
||||
"html_url": "https:\/\/github.com\/kn6869610"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
|
||||
"description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T18:44:05Z",
|
||||
"updated_at": "2018-10-22T03:02:27Z",
|
||||
"pushed_at": "2018-10-17T18:45:30Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153534574,
|
||||
"name": "libssh-scanner",
|
||||
"full_name": "leapsecurity\/libssh-scanner",
|
||||
"owner": {
|
||||
"login": "leapsecurity",
|
||||
"id": 40601062,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40601062?v=4",
|
||||
"html_url": "https:\/\/github.com\/leapsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/leapsecurity\/libssh-scanner",
|
||||
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T23:05:10Z",
|
||||
"updated_at": "2020-10-30T13:49:34Z",
|
||||
"pushed_at": "2018-11-04T17:29:33Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153562229,
|
||||
"name": "CVE-2018-10933_ssh",
|
||||
"full_name": "likescam\/CVE-2018-10933_ssh",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T04:10:25Z",
|
||||
"updated_at": "2018-10-18T04:10:39Z",
|
||||
"pushed_at": "2018-10-18T04:10:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153562319,
|
||||
"name": "bpnd-libssh",
|
||||
"full_name": "trbpnd\/bpnd-libssh",
|
||||
"owner": {
|
||||
"login": "trbpnd",
|
||||
"id": 39193403,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4",
|
||||
"html_url": "https:\/\/github.com\/trbpnd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trbpnd\/bpnd-libssh",
|
||||
"description": "Multi-threaded, reliable scanner for CVE-2018-10933.",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T04:11:33Z",
|
||||
"updated_at": "2018-10-23T03:13:35Z",
|
||||
"pushed_at": "2018-10-22T16:44:13Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153598283,
|
||||
"name": "CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T09:27:08Z",
|
||||
"updated_at": "2018-10-18T16:47:53Z",
|
||||
"pushed_at": "2018-10-18T09:27:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153643745,
|
||||
"name": "hunt-for-cve-2018-10933",
|
||||
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "marco-lancini",
|
||||
"id": 1472968,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
|
||||
"html_url": "https:\/\/github.com\/marco-lancini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T15:08:25Z",
|
||||
"updated_at": "2020-10-25T16:36:25Z",
|
||||
"pushed_at": "2018-10-18T15:11:35Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153675108,
|
||||
"name": "cve-2018-10933",
|
||||
"full_name": "hackerhouse-opensource\/cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "hackerhouse-opensource",
|
||||
"id": 43967630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackerhouse-opensource"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2018-10933",
|
||||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2021-01-30T23:27:20Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153681539,
|
||||
"name": "cve-2018-10933",
|
||||
"full_name": "cve-2018\/cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "cve-2018",
|
||||
"id": 44275695,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44275695?v=4",
|
||||
"html_url": "https:\/\/github.com\/cve-2018"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cve-2018\/cve-2018-10933",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T20:11:22Z",
|
||||
"updated_at": "2018-10-23T03:22:26Z",
|
||||
"pushed_at": "2018-10-23T03:22:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153855090,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "jas502n\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
|
||||
"description": "libssh CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T00:24:04Z",
|
||||
"updated_at": "2019-07-31T09:33:04Z",
|
||||
"pushed_at": "2018-10-20T00:29:04Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153856713,
|
||||
"name": "cve-2018-10933_poc",
|
||||
"full_name": "ninp0\/cve-2018-10933_poc",
|
||||
"owner": {
|
||||
"login": "ninp0",
|
||||
"id": 1008583,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4",
|
||||
"html_url": "https:\/\/github.com\/ninp0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
|
||||
"description": "Variant of hackerhouse-opensource\/cve-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T00:53:24Z",
|
||||
"updated_at": "2018-10-22T15:05:53Z",
|
||||
"pushed_at": "2018-10-20T01:53:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153878160,
|
||||
"name": "CVE-2018-10933_Scanner",
|
||||
"full_name": "pghook\/CVE-2018-10933_Scanner",
|
||||
"owner": {
|
||||
"login": "pghook",
|
||||
"id": 14160529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4",
|
||||
"html_url": "https:\/\/github.com\/pghook"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T06:53:59Z",
|
||||
"updated_at": "2020-05-15T17:20:56Z",
|
||||
"pushed_at": "2018-10-20T04:54:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153920395,
|
||||
"name": "POC-CVE-2018-10933",
|
||||
"full_name": "Virgula0\/POC-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "Virgula0",
|
||||
"id": 16546435,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16546435?v=4",
|
||||
"html_url": "https:\/\/github.com\/Virgula0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Virgula0\/POC-CVE-2018-10933",
|
||||
"description": "LibSSH Authentication Bypass Exploit using RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T15:34:26Z",
|
||||
"updated_at": "2021-01-19T19:49:11Z",
|
||||
"pushed_at": "2018-10-25T18:23:52Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153975086,
|
||||
"name": "pythonprojects-CVE-2018-10933",
|
||||
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "shifa123",
|
||||
"id": 18241082,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
|
||||
"html_url": "https:\/\/github.com\/shifa123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"description": "CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-21T05:01:12Z",
|
||||
"updated_at": "2021-01-15T03:06:17Z",
|
||||
"pushed_at": "2018-10-21T05:13:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154050332,
|
||||
"name": "CVE-2018-10933",
|
||||
|
@ -45,6 +390,167 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154390432,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "Bifrozt\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "Bifrozt",
|
||||
"id": 8437560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8437560?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bifrozt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bifrozt\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-23T20:11:35Z",
|
||||
"updated_at": "2018-10-23T20:14:53Z",
|
||||
"pushed_at": "2018-10-23T20:14:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154398082,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "r3dxpl0it\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "r3dxpl0it",
|
||||
"id": 43002597,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4",
|
||||
"html_url": "https:\/\/github.com\/r3dxpl0it"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933 POC (LIBSSH)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-23T21:17:52Z",
|
||||
"updated_at": "2020-04-06T19:25:11Z",
|
||||
"pushed_at": "2018-10-24T07:58:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154500673,
|
||||
"name": "libssh-scanner",
|
||||
"full_name": "ivanacostarubio\/libssh-scanner",
|
||||
"owner": {
|
||||
"login": "ivanacostarubio",
|
||||
"id": 16559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16559?v=4",
|
||||
"html_url": "https:\/\/github.com\/ivanacostarubio"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ivanacostarubio\/libssh-scanner",
|
||||
"description": "A libssh CVE-2018-10933 scanner written in rust",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T12:52:09Z",
|
||||
"updated_at": "2019-02-24T23:51:07Z",
|
||||
"pushed_at": "2018-10-24T12:52:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154520949,
|
||||
"name": "precompiled-CVE-2018-10933",
|
||||
"full_name": "throwawayaccount12312312\/precompiled-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "throwawayaccount12312312",
|
||||
"id": 44440605,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44440605?v=4",
|
||||
"html_url": "https:\/\/github.com\/throwawayaccount12312312"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/throwawayaccount12312312\/precompiled-CVE-2018-10933",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T15:02:51Z",
|
||||
"updated_at": "2018-10-24T15:04:19Z",
|
||||
"pushed_at": "2018-10-24T15:04:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154621353,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "ensimag-security\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "ensimag-security",
|
||||
"id": 44459067,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44459067?v=4",
|
||||
"html_url": "https:\/\/github.com\/ensimag-security"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ensimag-security\/CVE-2018-10933",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-25T06:32:06Z",
|
||||
"updated_at": "2018-11-28T14:11:24Z",
|
||||
"pushed_at": "2018-11-28T14:14:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 157908147,
|
||||
"name": "libSSH-bypass",
|
||||
"full_name": "Ad1bDaw\/libSSH-bypass",
|
||||
"owner": {
|
||||
"login": "Ad1bDaw",
|
||||
"id": 35436703,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35436703?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ad1bDaw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ad1bDaw\/libSSH-bypass",
|
||||
"description": "Implementation of CVE-2018-10933 with CIDR block scanner ",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-16T18:46:28Z",
|
||||
"updated_at": "2018-11-16T19:00:29Z",
|
||||
"pushed_at": "2018-11-16T19:00:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158524069,
|
||||
"name": "CVE-2018-10933-POC",
|
||||
"full_name": "sambiyal\/CVE-2018-10933-POC",
|
||||
"owner": {
|
||||
"login": "sambiyal",
|
||||
"id": 25122043,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25122043?v=4",
|
||||
"html_url": "https:\/\/github.com\/sambiyal"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sambiyal\/CVE-2018-10933-POC",
|
||||
"description": "libSSH bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-21T09:34:12Z",
|
||||
"updated_at": "2018-11-21T09:57:11Z",
|
||||
"pushed_at": "2018-11-21T09:43:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162456991,
|
||||
"name": "LibSSH-Authentication-Bypass",
|
||||
|
|
25
2018/CVE-2018-10936.json
Normal file
25
2018/CVE-2018-10936.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 158224861,
|
||||
"name": "CVE-2018-10936",
|
||||
"full_name": "tafamace\/CVE-2018-10936",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-10936",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T13:09:47Z",
|
||||
"updated_at": "2018-11-19T13:13:10Z",
|
||||
"pushed_at": "2018-11-19T13:13:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-10949.json
Normal file
25
2018/CVE-2018-10949.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 147528239,
|
||||
"name": "CVE-2018-10949",
|
||||
"full_name": "0x00-0x00\/CVE-2018-10949",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10949",
|
||||
"description": "Zimbra Collaboration Suite Username Enumeration ",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-05T14:09:13Z",
|
||||
"updated_at": "2020-10-20T18:45:33Z",
|
||||
"pushed_at": "2018-09-05T14:10:09Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 133791805,
|
||||
"name": "CVE-2018-1111",
|
||||
"full_name": "knqyf263\/CVE-2018-1111",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-1111",
|
||||
"description": "Environment for DynoRoot (CVE-2018-1111)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T09:37:19Z",
|
||||
"updated_at": "2020-11-27T01:55:02Z",
|
||||
"pushed_at": "2018-05-17T10:03:18Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133957885,
|
||||
"name": "CVE-2018-1111",
|
||||
"full_name": "kkirsche\/CVE-2018-1111",
|
||||
"owner": {
|
||||
"login": "kkirsche",
|
||||
"id": 947110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4",
|
||||
"html_url": "https:\/\/github.com\/kkirsche"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2018-1111",
|
||||
"description": "CVE-2018-1111 DynoRoot",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-18T13:27:43Z",
|
||||
"updated_at": "2021-01-16T21:54:13Z",
|
||||
"pushed_at": "2018-05-21T13:10:48Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313717464,
|
||||
"name": "FEP3370-advanced-ethical-hacking",
|
||||
|
|
|
@ -22,6 +22,144 @@
|
|||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135556339,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "vmotos\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "vmotos",
|
||||
"id": 22636953,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22636953?v=4",
|
||||
"html_url": "https:\/\/github.com\/vmotos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vmotos\/CVE-2018-11235",
|
||||
"description": "RCE vulnerability to exec \"git clone --recurse-submodule\" (CVE-2018-11235)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T08:38:17Z",
|
||||
"updated_at": "2018-05-31T09:11:10Z",
|
||||
"pushed_at": "2018-05-31T09:11:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135587582,
|
||||
"name": "cve-2018-11235",
|
||||
"full_name": "Choihosu\/cve-2018-11235",
|
||||
"owner": {
|
||||
"login": "Choihosu",
|
||||
"id": 18625744,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18625744?v=4",
|
||||
"html_url": "https:\/\/github.com\/Choihosu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Choihosu\/cve-2018-11235",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T13:29:06Z",
|
||||
"updated_at": "2018-05-31T13:29:06Z",
|
||||
"pushed_at": "2018-05-31T13:29:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135652327,
|
||||
"name": "CVE-2018-11235-DEMO",
|
||||
"full_name": "CHYbeta\/CVE-2018-11235-DEMO",
|
||||
"owner": {
|
||||
"login": "CHYbeta",
|
||||
"id": 18642224,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18642224?v=4",
|
||||
"html_url": "https:\/\/github.com\/CHYbeta"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CHYbeta\/CVE-2018-11235-DEMO",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-06-01T01:26:19Z",
|
||||
"updated_at": "2020-07-05T15:28:14Z",
|
||||
"pushed_at": "2018-06-07T03:34:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136300278,
|
||||
"name": "CVE-2018-11235-poc",
|
||||
"full_name": "Kiss-sh0t\/CVE-2018-11235-poc",
|
||||
"owner": {
|
||||
"login": "Kiss-sh0t",
|
||||
"id": 16567682,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16567682?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kiss-sh0t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kiss-sh0t\/CVE-2018-11235-poc",
|
||||
"description": "for git v2.7.4",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-06T08:48:57Z",
|
||||
"updated_at": "2018-06-06T08:56:02Z",
|
||||
"pushed_at": "2018-06-06T08:54:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136924699,
|
||||
"name": "clone_and_pwn",
|
||||
"full_name": "H0K5\/clone_and_pwn",
|
||||
"owner": {
|
||||
"login": "H0K5",
|
||||
"id": 8493152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8493152?v=4",
|
||||
"html_url": "https:\/\/github.com\/H0K5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H0K5\/clone_and_pwn",
|
||||
"description": "Exploits CVE-2018-11235",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-11T12:41:34Z",
|
||||
"updated_at": "2020-05-25T14:25:16Z",
|
||||
"pushed_at": "2018-06-06T17:24:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 143149359,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "knqyf263\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11235",
|
||||
"description": "CVE-2018-11235 (Git)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-01T11:52:54Z",
|
||||
"updated_at": "2019-04-24T05:32:20Z",
|
||||
"pushed_at": "2018-11-23T14:34:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160238249,
|
||||
"name": "CVE-2018-11235",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 135661128,
|
||||
"name": "CVE-2018-11236",
|
||||
"full_name": "evilmiracle\/CVE-2018-11236",
|
||||
"owner": {
|
||||
"login": "evilmiracle",
|
||||
"id": 17810331,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17810331?v=4",
|
||||
"html_url": "https:\/\/github.com\/evilmiracle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/evilmiracle\/CVE-2018-11236",
|
||||
"description": "Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-01T03:05:42Z",
|
||||
"updated_at": "2018-06-04T19:47:31Z",
|
||||
"pushed_at": "2018-05-31T07:32:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308481035,
|
||||
"name": "CVE-2018-11236",
|
||||
|
|
25
2018/CVE-2018-11311.json
Normal file
25
2018/CVE-2018-11311.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 134082464,
|
||||
"name": "mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password",
|
||||
"full_name": "EmreOvunc\/mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password",
|
||||
"description": "CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T17:14:49Z",
|
||||
"updated_at": "2020-05-16T12:46:32Z",
|
||||
"pushed_at": "2018-07-02T14:26:13Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-11450.json
Normal file
25
2018/CVE-2018-11450.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 138933947,
|
||||
"name": "Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability",
|
||||
"full_name": "LucvanDonk\/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability",
|
||||
"owner": {
|
||||
"login": "LucvanDonk",
|
||||
"id": 33685332,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33685332?v=4",
|
||||
"html_url": "https:\/\/github.com\/LucvanDonk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LucvanDonk\/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability",
|
||||
"description": "CVE-ID: CVE-2018-11450",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-27T21:16:57Z",
|
||||
"updated_at": "2019-02-10T04:58:12Z",
|
||||
"pushed_at": "2018-06-27T21:16:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-11510.json
Normal file
25
2018/CVE-2018-11510.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 137818504,
|
||||
"name": "CVE-2018-11510",
|
||||
"full_name": "mefulton\/CVE-2018-11510",
|
||||
"owner": {
|
||||
"login": "mefulton",
|
||||
"id": 27797094,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27797094?v=4",
|
||||
"html_url": "https:\/\/github.com\/mefulton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mefulton\/CVE-2018-11510",
|
||||
"description": "Just a couple exploits for CVE-2018-11510",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-18T23:49:41Z",
|
||||
"updated_at": "2018-06-19T10:57:30Z",
|
||||
"pushed_at": "2018-06-19T10:57:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-11517.json
Normal file
25
2018/CVE-2018-11517.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 134974554,
|
||||
"name": "mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"full_name": "EmreOvunc\/mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"description": "CVE-2018-11517 | mySCADA myPRO v7.0.46 has another vulnerability to discover all projects in the system.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-26T15:49:07Z",
|
||||
"updated_at": "2020-05-16T12:46:21Z",
|
||||
"pushed_at": "2018-05-28T21:51:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-11631.json
Normal file
25
2018/CVE-2018-11631.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 135617105,
|
||||
"name": "bandexploit",
|
||||
"full_name": "xMagass\/bandexploit",
|
||||
"owner": {
|
||||
"login": "xMagass",
|
||||
"id": 17924254,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17924254?v=4",
|
||||
"html_url": "https:\/\/github.com\/xMagass"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xMagass\/bandexploit",
|
||||
"description": "M1 Band Smart Watch Bluetooth Low Energy Exploit python script (CVE-2018-11631)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T17:46:59Z",
|
||||
"updated_at": "2020-08-13T15:01:07Z",
|
||||
"pushed_at": "2018-07-27T10:28:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 155689679,
|
||||
"name": "CVE-2018-11759",
|
||||
"full_name": "immunIT\/CVE-2018-11759",
|
||||
"owner": {
|
||||
"login": "immunIT",
|
||||
"id": 17569882,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17569882?v=4",
|
||||
"html_url": "https:\/\/github.com\/immunIT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/immunIT\/CVE-2018-11759",
|
||||
"description": "Proof of concept showing how to exploit the CVE-2018-11759",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-01T09:11:07Z",
|
||||
"updated_at": "2020-07-13T15:43:59Z",
|
||||
"pushed_at": "2018-12-11T12:59:26Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160896534,
|
||||
"name": "Identificador-CVE-2018-11759",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 145897861,
|
||||
"name": "CVE-2018-11776",
|
||||
"full_name": "trbpnd\/CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "trbpnd",
|
||||
"id": 39193403,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4",
|
||||
"html_url": "https:\/\/github.com\/trbpnd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trbpnd\/CVE-2018-11776",
|
||||
"description": "Docker image for a vulnerable struts app",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-23T19:25:26Z",
|
||||
"updated_at": "2018-08-23T19:28:53Z",
|
||||
"pushed_at": "2018-08-23T19:28:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145901668,
|
||||
"name": "CVE-2018-11776",
|
||||
|
@ -22,6 +45,236 @@
|
|||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145935231,
|
||||
"name": "CVE-2018-11776",
|
||||
"full_name": "jiguangin\/CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "jiguangin",
|
||||
"id": 22545712,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22545712?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiguangin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiguangin\/CVE-2018-11776",
|
||||
"description": "CVE-2018-11776(S2-057) EXPLOIT CODE",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-24T03:01:29Z",
|
||||
"updated_at": "2020-12-29T15:23:34Z",
|
||||
"pushed_at": "2018-08-24T03:27:02Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145985371,
|
||||
"name": "CVE-2018-11776-Python-PoC",
|
||||
"full_name": "hook-s3c\/CVE-2018-11776-Python-PoC",
|
||||
"owner": {
|
||||
"login": "hook-s3c",
|
||||
"id": 31825993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
|
||||
"html_url": "https:\/\/github.com\/hook-s3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-11776-Python-PoC",
|
||||
"description": "Working Python test and PoC for CVE-2018-11776, includes Docker lab",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-24T11:53:02Z",
|
||||
"updated_at": "2020-05-14T19:08:54Z",
|
||||
"pushed_at": "2018-08-25T02:14:49Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146056002,
|
||||
"name": "struts-pwn_CVE-2018-11776",
|
||||
"full_name": "mazen160\/struts-pwn_CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "mazen160",
|
||||
"id": 8996052,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4",
|
||||
"html_url": "https:\/\/github.com\/mazen160"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2018-11776",
|
||||
"description": " An exploit for Apache Struts CVE-2018-11776",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T01:53:30Z",
|
||||
"updated_at": "2021-02-04T06:38:49Z",
|
||||
"pushed_at": "2018-08-26T02:31:39Z",
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 299,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146060181,
|
||||
"name": "CVE-2018-11776",
|
||||
"full_name": "bhdresh\/CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "bhdresh",
|
||||
"id": 8931885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
|
||||
"html_url": "https:\/\/github.com\/bhdresh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2018-11776",
|
||||
"description": "Vulnerable docker container for CVE-2018-11776",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T03:06:30Z",
|
||||
"updated_at": "2020-01-06T22:41:00Z",
|
||||
"pushed_at": "2018-08-25T04:53:35Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146094544,
|
||||
"name": "CVE-2018-11776",
|
||||
"full_name": "knqyf263\/CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11776",
|
||||
"description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T12:45:15Z",
|
||||
"updated_at": "2021-01-19T03:50:38Z",
|
||||
"pushed_at": "2018-08-25T14:20:46Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146330536,
|
||||
"name": "Strutter",
|
||||
"full_name": "Ekultek\/Strutter",
|
||||
"owner": {
|
||||
"login": "Ekultek",
|
||||
"id": 14183473,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14183473?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ekultek"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ekultek\/Strutter",
|
||||
"description": "Proof of Concept for CVE-2018-11776",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-27T17:22:16Z",
|
||||
"updated_at": "2020-12-12T20:05:33Z",
|
||||
"pushed_at": "2018-09-12T14:28:35Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146373342,
|
||||
"name": "cve-2018-11776-docker",
|
||||
"full_name": "tuxotron\/cve-2018-11776-docker",
|
||||
"owner": {
|
||||
"login": "tuxotron",
|
||||
"id": 937637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/937637?v=4",
|
||||
"html_url": "https:\/\/github.com\/tuxotron"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tuxotron\/cve-2018-11776-docker",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T01:14:52Z",
|
||||
"updated_at": "2019-09-24T14:38:18Z",
|
||||
"pushed_at": "2018-08-29T17:58:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146519519,
|
||||
"name": "S2-057-CVE-2018-11776",
|
||||
"full_name": "brianwrf\/S2-057-CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/S2-057-CVE-2018-11776",
|
||||
"description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T23:48:14Z",
|
||||
"updated_at": "2018-12-23T03:47:07Z",
|
||||
"pushed_at": "2018-08-29T00:03:56Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146650579,
|
||||
"name": "Apache-Struts-Shodan-Exploit",
|
||||
"full_name": "649\/Apache-Struts-Shodan-Exploit",
|
||||
"owner": {
|
||||
"login": "649",
|
||||
"id": 23534047,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23534047?v=4",
|
||||
"html_url": "https:\/\/github.com\/649"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/649\/Apache-Struts-Shodan-Exploit",
|
||||
"description": "This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-29T19:50:26Z",
|
||||
"updated_at": "2020-10-30T15:35:06Z",
|
||||
"pushed_at": "2018-08-30T00:16:01Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 147746262,
|
||||
"name": "CVE-2018-11776-Python-PoC",
|
||||
"full_name": "jezzus\/CVE-2018-11776-Python-PoC",
|
||||
"owner": {
|
||||
"login": "jezzus",
|
||||
"id": 9899999,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9899999?v=4",
|
||||
"html_url": "https:\/\/github.com\/jezzus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jezzus\/CVE-2018-11776-Python-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-09-06T23:49:20Z",
|
||||
"updated_at": "2018-09-06T23:49:20Z",
|
||||
"pushed_at": "2018-09-06T23:49:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 164352202,
|
||||
"name": "cve-2018-11776",
|
||||
|
|
25
2018/CVE-2018-12018.json
Normal file
25
2018/CVE-2018-12018.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 153770795,
|
||||
"name": "CVE-2018-12018",
|
||||
"full_name": "k3v142\/CVE-2018-12018",
|
||||
"owner": {
|
||||
"login": "k3v142",
|
||||
"id": 12337759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12337759?v=4",
|
||||
"html_url": "https:\/\/github.com\/k3v142"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018",
|
||||
"description": "EPoD (Ethereum Packet of Death)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-19T11:11:01Z",
|
||||
"updated_at": "2019-12-14T15:32:33Z",
|
||||
"pushed_at": "2018-10-20T21:07:42Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12031.json
Normal file
25
2018/CVE-2018-12031.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 136349330,
|
||||
"name": "Eaton-Intelligent-Power-Manager-Local-File-Inclusion",
|
||||
"full_name": "EmreOvunc\/Eaton-Intelligent-Power-Manager-Local-File-Inclusion",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/Eaton-Intelligent-Power-Manager-Local-File-Inclusion",
|
||||
"description": "CVE-2018-12031 | LFI in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file, it can lead to sensitive information disclosure, denial of service and code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-06T15:31:29Z",
|
||||
"updated_at": "2020-05-16T12:46:43Z",
|
||||
"pushed_at": "2018-08-29T10:50:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12038.json
Normal file
25
2018/CVE-2018-12038.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 162155985,
|
||||
"name": "remote-bitlocker-encryption-report",
|
||||
"full_name": "gdraperi\/remote-bitlocker-encryption-report",
|
||||
"owner": {
|
||||
"login": "gdraperi",
|
||||
"id": 33750242,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33750242?v=4",
|
||||
"html_url": "https:\/\/github.com\/gdraperi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gdraperi\/remote-bitlocker-encryption-report",
|
||||
"description": "PowerShell script to mitigate CVE-2018-12038. The script takes a list of PC as input, gets their BitLocker encryption type remotely, and outputs a report as a CSV file",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-17T16:02:26Z",
|
||||
"updated_at": "2019-02-11T14:30:38Z",
|
||||
"pushed_at": "2018-12-07T20:11:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12418.json
Normal file
25
2018/CVE-2018-12418.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 158208279,
|
||||
"name": "CVE-2018-12418",
|
||||
"full_name": "tafamace\/CVE-2018-12418",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12418",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T11:12:00Z",
|
||||
"updated_at": "2018-11-19T11:15:44Z",
|
||||
"pushed_at": "2018-11-19T11:15:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12463.json
Normal file
25
2018/CVE-2018-12463.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 140411928,
|
||||
"name": "CVE-2018-12463",
|
||||
"full_name": "alt3kx\/CVE-2018-12463",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463",
|
||||
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-10T09:51:40Z",
|
||||
"updated_at": "2021-01-12T12:20:23Z",
|
||||
"pushed_at": "2018-07-17T08:13:34Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12537.json
Normal file
25
2018/CVE-2018-12537.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 158209208,
|
||||
"name": "CVE-2018-12537",
|
||||
"full_name": "tafamace\/CVE-2018-12537",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12537",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T11:18:35Z",
|
||||
"updated_at": "2018-11-19T11:32:44Z",
|
||||
"pushed_at": "2018-11-19T11:32:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12540.json
Normal file
25
2018/CVE-2018-12540.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 158212154,
|
||||
"name": "CVE-2018-12540",
|
||||
"full_name": "tafamace\/CVE-2018-12540",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12540",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T11:41:16Z",
|
||||
"updated_at": "2018-11-19T11:46:57Z",
|
||||
"pushed_at": "2018-11-19T11:46:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1259.json
Normal file
25
2018/CVE-2018-1259.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 158194793,
|
||||
"name": "CVE-2018-1259",
|
||||
"full_name": "tafamace\/CVE-2018-1259",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1259",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T09:25:32Z",
|
||||
"updated_at": "2018-11-19T09:32:46Z",
|
||||
"pushed_at": "2018-11-19T09:32:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12596.json
Normal file
25
2018/CVE-2018-12596.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 138130645,
|
||||
"name": "CVE-2018-12596",
|
||||
"full_name": "alt3kx\/CVE-2018-12596",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12596",
|
||||
"description": "Ektron Content Management System (CMS) 9.20 SP2, remote re-enabling users (CVE-2018–12596)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T06:47:05Z",
|
||||
"updated_at": "2018-10-11T00:25:47Z",
|
||||
"pushed_at": "2018-10-11T00:19:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12597.json
Normal file
25
2018/CVE-2018-12597.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 138131591,
|
||||
"name": "CVE-2018-12597",
|
||||
"full_name": "alt3kx\/CVE-2018-12597",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12597",
|
||||
"description": "CVE-2018-12597",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T06:55:39Z",
|
||||
"updated_at": "2018-06-21T07:03:41Z",
|
||||
"pushed_at": "2018-06-21T07:03:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12598.json
Normal file
25
2018/CVE-2018-12598.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 138132015,
|
||||
"name": "CVE-2018-12598",
|
||||
"full_name": "alt3kx\/CVE-2018-12598",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12598",
|
||||
"description": "CVE-2018-12598",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T06:59:46Z",
|
||||
"updated_at": "2018-06-21T07:05:17Z",
|
||||
"pushed_at": "2018-06-21T07:05:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 156870746,
|
||||
"name": "CVE-2018-12613",
|
||||
"full_name": "0x00-0x00\/CVE-2018-12613",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-12613",
|
||||
"description": "PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-09T14:10:20Z",
|
||||
"updated_at": "2020-03-11T07:23:14Z",
|
||||
"pushed_at": "2018-11-09T14:42:23Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 208791479,
|
||||
"name": "CVE-2018-12613",
|
||||
|
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 128482458,
|
||||
"name": "CVE-2018-1270",
|
||||
"full_name": "CaledoniaProject\/CVE-2018-1270",
|
||||
"owner": {
|
||||
"login": "CaledoniaProject",
|
||||
"id": 1357701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1357701?v=4",
|
||||
"html_url": "https:\/\/github.com\/CaledoniaProject"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CaledoniaProject\/CVE-2018-1270",
|
||||
"description": "Spring messaging STOMP protocol RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-07T00:14:33Z",
|
||||
"updated_at": "2020-10-12T06:35:37Z",
|
||||
"pushed_at": "2018-04-12T05:48:24Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129230393,
|
||||
"name": "CVE-2018-1270_EXP",
|
||||
"full_name": "genxor\/CVE-2018-1270_EXP",
|
||||
"owner": {
|
||||
"login": "genxor",
|
||||
"id": 3094713,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3094713?v=4",
|
||||
"html_url": "https:\/\/github.com\/genxor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/genxor\/CVE-2018-1270_EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T09:54:34Z",
|
||||
"updated_at": "2019-10-11T19:04:29Z",
|
||||
"pushed_at": "2018-04-12T10:00:45Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158213121,
|
||||
"name": "CVE-2018-1270",
|
||||
"full_name": "tafamace\/CVE-2018-1270",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1270",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T11:47:40Z",
|
||||
"updated_at": "2018-11-19T12:00:19Z",
|
||||
"pushed_at": "2018-11-19T12:00:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162062968,
|
||||
"name": "CVE-2018-1270",
|
||||
|
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 129407531,
|
||||
"name": "CVE-2018-1273",
|
||||
"full_name": "knqyf263\/CVE-2018-1273",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-1273",
|
||||
"description": "Environment for CVE-2018-1273 (Spring Data Commons)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-13T13:41:02Z",
|
||||
"updated_at": "2021-01-22T02:49:50Z",
|
||||
"pushed_at": "2018-08-15T05:26:45Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129910523,
|
||||
"name": "poc-cve-2018-1273",
|
||||
"full_name": "wearearima\/poc-cve-2018-1273",
|
||||
"owner": {
|
||||
"login": "wearearima",
|
||||
"id": 24791991,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24791991?v=4",
|
||||
"html_url": "https:\/\/github.com\/wearearima"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wearearima\/poc-cve-2018-1273",
|
||||
"description": "POC for CVE-2018-1273",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T13:41:00Z",
|
||||
"updated_at": "2020-09-29T16:06:24Z",
|
||||
"pushed_at": "2018-06-05T15:07:18Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 151734933,
|
||||
"name": "poc-cve-2018-1273",
|
||||
"full_name": "webr0ck\/poc-cve-2018-1273",
|
||||
"owner": {
|
||||
"login": "webr0ck",
|
||||
"id": 30629042,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30629042?v=4",
|
||||
"html_url": "https:\/\/github.com\/webr0ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/webr0ck\/poc-cve-2018-1273",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-05T14:42:07Z",
|
||||
"updated_at": "2018-10-09T09:26:39Z",
|
||||
"pushed_at": "2018-10-05T14:42:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 166271014,
|
||||
"name": "cve-2018-1273",
|
||||
|
|
25
2018/CVE-2018-12895.json
Normal file
25
2018/CVE-2018-12895.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 139890292,
|
||||
"name": "cve-2018-12895-hotfix",
|
||||
"full_name": "bloom-ux\/cve-2018-12895-hotfix",
|
||||
"owner": {
|
||||
"login": "bloom-ux",
|
||||
"id": 22582007,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22582007?v=4",
|
||||
"html_url": "https:\/\/github.com\/bloom-ux"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bloom-ux\/cve-2018-12895-hotfix",
|
||||
"description": "Hotfix for file deletion to to code execution vulnerability in WordPress",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-05T19:09:17Z",
|
||||
"updated_at": "2018-07-05T19:48:44Z",
|
||||
"pushed_at": "2018-07-05T19:48:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2018/CVE-2018-1304.json
Normal file
48
2018/CVE-2018-1304.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 122712148,
|
||||
"name": "CVE-2018-1304",
|
||||
"full_name": "knqyf263\/CVE-2018-1304",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-1304",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-24T06:45:21Z",
|
||||
"updated_at": "2018-05-07T09:36:43Z",
|
||||
"pushed_at": "2018-02-25T12:29:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 124373835,
|
||||
"name": "tomcat_CVE-2018-1304_testing",
|
||||
"full_name": "thariyarox\/tomcat_CVE-2018-1304_testing",
|
||||
"owner": {
|
||||
"login": "thariyarox",
|
||||
"id": 8102507,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8102507?v=4",
|
||||
"html_url": "https:\/\/github.com\/thariyarox"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thariyarox\/tomcat_CVE-2018-1304_testing",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-03-08T10:12:22Z",
|
||||
"updated_at": "2018-03-08T10:24:11Z",
|
||||
"pushed_at": "2018-03-08T10:30:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1305.json
Normal file
25
2018/CVE-2018-1305.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 129016985,
|
||||
"name": "CVE-2018-1305",
|
||||
"full_name": "Pa55w0rd\/CVE-2018-1305",
|
||||
"owner": {
|
||||
"login": "Pa55w0rd",
|
||||
"id": 16274549,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16274549?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pa55w0rd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pa55w0rd\/CVE-2018-1305",
|
||||
"description": "Apache Tomcat 安全绕过漏洞 Poc",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-11T01:37:58Z",
|
||||
"updated_at": "2020-12-14T07:06:56Z",
|
||||
"pushed_at": "2018-03-12T18:05:03Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1313.json
Normal file
25
2018/CVE-2018-1313.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 158220324,
|
||||
"name": "CVE-2018-1313",
|
||||
"full_name": "tafamace\/CVE-2018-1313",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1313",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T12:38:21Z",
|
||||
"updated_at": "2018-11-19T12:48:53Z",
|
||||
"pushed_at": "2018-11-19T12:48:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1324.json
Normal file
25
2018/CVE-2018-1324.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 158221452,
|
||||
"name": "CVE-2018-1324",
|
||||
"full_name": "tafamace\/CVE-2018-1324",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1324",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T12:46:37Z",
|
||||
"updated_at": "2018-11-19T13:04:11Z",
|
||||
"pushed_at": "2018-11-19T13:04:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-13784.json
Normal file
25
2018/CVE-2018-13784.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 141165293,
|
||||
"name": "prestashop-exploits",
|
||||
"full_name": "ambionics\/prestashop-exploits",
|
||||
"owner": {
|
||||
"login": "ambionics",
|
||||
"id": 29630660,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
|
||||
"html_url": "https:\/\/github.com\/ambionics"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ambionics\/prestashop-exploits",
|
||||
"description": "Collection of exploits\/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-16T16:33:41Z",
|
||||
"updated_at": "2020-11-23T07:28:24Z",
|
||||
"pushed_at": "2018-07-17T09:02:34Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-13864.json
Normal file
25
2018/CVE-2018-13864.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 158196795,
|
||||
"name": "CVE-2018-13864",
|
||||
"full_name": "tafamace\/CVE-2018-13864",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-13864",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T09:40:47Z",
|
||||
"updated_at": "2018-11-19T09:45:34Z",
|
||||
"pushed_at": "2018-11-19T09:45:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-14.json
Normal file
25
2018/CVE-2018-14.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 144012223,
|
||||
"name": "legacySymfony",
|
||||
"full_name": "lckJack\/legacySymfony",
|
||||
"owner": {
|
||||
"login": "lckJack",
|
||||
"id": 38405856,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38405856?v=4",
|
||||
"html_url": "https:\/\/github.com\/lckJack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lckJack\/legacySymfony",
|
||||
"description": "Easy script to check if drupal 8.x-8.5.6 is vulnerable to CVE-2018-14.773",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T12:42:56Z",
|
||||
"updated_at": "2018-08-08T17:28:27Z",
|
||||
"pushed_at": "2018-08-08T12:46:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-14083.json
Normal file
25
2018/CVE-2018-14083.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 142094467,
|
||||
"name": "CVE-2018-14083",
|
||||
"full_name": "pudding2\/CVE-2018-14083",
|
||||
"owner": {
|
||||
"login": "pudding2",
|
||||
"id": 28480779,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28480779?v=4",
|
||||
"html_url": "https:\/\/github.com\/pudding2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pudding2\/CVE-2018-14083",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-24T02:36:08Z",
|
||||
"updated_at": "2019-01-14T11:31:59Z",
|
||||
"pushed_at": "2018-07-24T02:56:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-14634.json
Normal file
25
2018/CVE-2018-14634.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 152124947,
|
||||
"name": "cve-2018-14634",
|
||||
"full_name": "luan0ap\/cve-2018-14634",
|
||||
"owner": {
|
||||
"login": "luan0ap",
|
||||
"id": 26953960,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26953960?v=4",
|
||||
"html_url": "https:\/\/github.com\/luan0ap"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/luan0ap\/cve-2018-14634",
|
||||
"description": "proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-08T18:12:03Z",
|
||||
"updated_at": "2020-03-29T03:02:36Z",
|
||||
"pushed_at": "2018-10-09T16:44:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 154950649,
|
||||
"name": "CVE-2018-14665",
|
||||
"full_name": "jas502n\/CVE-2018-14665",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14665",
|
||||
"description": "OpenBsd_CVE-2018-14665",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-27T10:12:05Z",
|
||||
"updated_at": "2020-10-26T10:10:05Z",
|
||||
"pushed_at": "2018-10-27T10:44:35Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155795794,
|
||||
"name": "CVE-2018-14665",
|
||||
|
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 158057391,
|
||||
"name": "cve-2018-14667",
|
||||
"full_name": "nareshmail\/cve-2018-14667",
|
||||
"owner": {
|
||||
"login": "nareshmail",
|
||||
"id": 6008091,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6008091?v=4",
|
||||
"html_url": "https:\/\/github.com\/nareshmail"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nareshmail\/cve-2018-14667",
|
||||
"description": "cve-2018-14667 demo",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-18T06:43:46Z",
|
||||
"updated_at": "2020-04-01T03:46:35Z",
|
||||
"pushed_at": "2018-11-17T04:13:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158791727,
|
||||
"name": "CVE-2018-14667",
|
||||
"full_name": "zeroto01\/CVE-2018-14667",
|
||||
"owner": {
|
||||
"login": "zeroto01",
|
||||
"id": 45281392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45281392?v=4",
|
||||
"html_url": "https:\/\/github.com\/zeroto01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zeroto01\/CVE-2018-14667",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-23T06:44:49Z",
|
||||
"updated_at": "2018-11-27T04:22:10Z",
|
||||
"pushed_at": "2018-11-23T06:50:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 159462372,
|
||||
"name": "CVE-2018-14667",
|
||||
"full_name": "r00t4dm\/CVE-2018-14667",
|
||||
"owner": {
|
||||
"login": "r00t4dm",
|
||||
"id": 36941976,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36941976?v=4",
|
||||
"html_url": "https:\/\/github.com\/r00t4dm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r00t4dm\/CVE-2018-14667",
|
||||
"description": "about CVE-2018-14667 from RichFaces Framework 3.3.4",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-28T07:35:28Z",
|
||||
"updated_at": "2018-11-29T02:48:19Z",
|
||||
"pushed_at": "2018-11-29T02:48:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 159766854,
|
||||
"name": "CVE-2018-14667",
|
||||
"full_name": "syriusbughunt\/CVE-2018-14667",
|
||||
"owner": {
|
||||
"login": "syriusbughunt",
|
||||
"id": 45476916,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45476916?v=4",
|
||||
"html_url": "https:\/\/github.com\/syriusbughunt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/syriusbughunt\/CVE-2018-14667",
|
||||
"description": "All about CVE-2018-14667; From what it is to how to successfully exploit it.",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-30T04:06:08Z",
|
||||
"updated_at": "2021-02-06T12:40:39Z",
|
||||
"pushed_at": "2018-11-30T07:10:44Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 199370771,
|
||||
"name": "cve-2018-14667",
|
||||
|
|
25
2018/CVE-2018-14772.json
Normal file
25
2018/CVE-2018-14772.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 148241935,
|
||||
"name": "CVE-2018-14772",
|
||||
"full_name": "spencerdodd\/CVE-2018-14772",
|
||||
"owner": {
|
||||
"login": "spencerdodd",
|
||||
"id": 9969454,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9969454?v=4",
|
||||
"html_url": "https:\/\/github.com\/spencerdodd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/spencerdodd\/CVE-2018-14772",
|
||||
"description": "RCE exploit for CVE-2018-14772",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-11T01:24:21Z",
|
||||
"updated_at": "2020-10-21T22:16:16Z",
|
||||
"pushed_at": "2018-11-01T01:47:17Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,52 @@
|
|||
"watchers": 407,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 148370201,
|
||||
"name": "WinboxExploit",
|
||||
"full_name": "msterusky\/WinboxExploit",
|
||||
"owner": {
|
||||
"login": "msterusky",
|
||||
"id": 29436829,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4",
|
||||
"html_url": "https:\/\/github.com\/msterusky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
|
||||
"description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-11T19:36:49Z",
|
||||
"updated_at": "2020-01-10T14:58:08Z",
|
||||
"pushed_at": "2018-09-11T20:12:25Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 152906288,
|
||||
"name": "MikroRoot",
|
||||
"full_name": "syrex1013\/MikroRoot",
|
||||
"owner": {
|
||||
"login": "syrex1013",
|
||||
"id": 31669127,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
|
||||
"html_url": "https:\/\/github.com\/syrex1013"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
|
||||
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-13T19:17:42Z",
|
||||
"updated_at": "2020-11-02T06:16:27Z",
|
||||
"pushed_at": "2018-10-14T08:39:24Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161894724,
|
||||
"name": "CVE-2018-14847",
|
||||
|
|
25
2018/CVE-2018-15131.json
Normal file
25
2018/CVE-2018-15131.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 147528539,
|
||||
"name": "CVE-2018-15131",
|
||||
"full_name": "0x00-0x00\/CVE-2018-15131",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-15131",
|
||||
"description": "Zimbra Collaboration Suite Username Enumeration ",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-05T14:11:16Z",
|
||||
"updated_at": "2018-10-28T04:05:13Z",
|
||||
"pushed_at": "2018-09-05T14:11:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 144760095,
|
||||
"name": "laravel-poc-CVE-2018-15133",
|
||||
"full_name": "kozmic\/laravel-poc-CVE-2018-15133",
|
||||
"owner": {
|
||||
"login": "kozmic",
|
||||
"id": 6666,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6666?v=4",
|
||||
"html_url": "https:\/\/github.com\/kozmic"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kozmic\/laravel-poc-CVE-2018-15133",
|
||||
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-14T18:51:50Z",
|
||||
"updated_at": "2021-02-06T06:08:29Z",
|
||||
"pushed_at": "2018-09-27T07:32:19Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 213,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 243072477,
|
||||
"name": "Laravel-CVE-2018-15133",
|
||||
|
|
25
2018/CVE-2018-15365.json
Normal file
25
2018/CVE-2018-15365.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 150475298,
|
||||
"name": "CVE-2018-15365",
|
||||
"full_name": "nixwizard\/CVE-2018-15365",
|
||||
"owner": {
|
||||
"login": "nixwizard",
|
||||
"id": 3982790,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3982790?v=4",
|
||||
"html_url": "https:\/\/github.com\/nixwizard"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nixwizard\/CVE-2018-15365",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-09-26T18:56:41Z",
|
||||
"updated_at": "2018-09-27T07:31:12Z",
|
||||
"pushed_at": "2018-09-27T07:31:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,29 @@
|
|||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145296891,
|
||||
"name": "opensshenum",
|
||||
"full_name": "gbonacini\/opensshenum",
|
||||
"owner": {
|
||||
"login": "gbonacini",
|
||||
"id": 5440458,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5440458?v=4",
|
||||
"html_url": "https:\/\/github.com\/gbonacini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gbonacini\/opensshenum",
|
||||
"description": "CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-19T11:23:54Z",
|
||||
"updated_at": "2019-09-15T11:44:34Z",
|
||||
"pushed_at": "2018-10-17T12:27:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145483388,
|
||||
"name": "CVE-2018-15473-Exploit",
|
||||
|
@ -114,6 +137,52 @@
|
|||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155426753,
|
||||
"name": "CrappyCode",
|
||||
"full_name": "JoeBlackSecurity\/CrappyCode",
|
||||
"owner": {
|
||||
"login": "JoeBlackSecurity",
|
||||
"id": 44617164,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44617164?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity\/CrappyCode",
|
||||
"description": "Functional script for brute forcing SSH and trying credentials - CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-30T17:17:09Z",
|
||||
"updated_at": "2018-11-06T19:03:05Z",
|
||||
"pushed_at": "2018-11-06T19:03:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155492594,
|
||||
"name": "SSHUsernameBruter-SSHUB",
|
||||
"full_name": "JoeBlackSecurity\/SSHUsernameBruter-SSHUB",
|
||||
"owner": {
|
||||
"login": "JoeBlackSecurity",
|
||||
"id": 44617164,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44617164?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity\/SSHUsernameBruter-SSHUB",
|
||||
"description": "Fully functional script for brute forcing SSH and trying credentials - CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-31T03:23:46Z",
|
||||
"updated_at": "2020-04-23T05:36:20Z",
|
||||
"pushed_at": "2018-12-05T12:04:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 165318682,
|
||||
"name": "cve-2018-15473",
|
||||
|
|
25
2018/CVE-2018-15499.json
Normal file
25
2018/CVE-2018-15499.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 145583266,
|
||||
"name": "CVE-2018-15499",
|
||||
"full_name": "DownWithUp\/CVE-2018-15499",
|
||||
"owner": {
|
||||
"login": "DownWithUp",
|
||||
"id": 16905064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
|
||||
"html_url": "https:\/\/github.com\/DownWithUp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-15499",
|
||||
"description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T15:26:35Z",
|
||||
"updated_at": "2020-06-19T06:54:55Z",
|
||||
"pushed_at": "2018-08-23T12:55:23Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-15727.json
Normal file
25
2018/CVE-2018-15727.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 146628899,
|
||||
"name": "grafana-CVE-2018-15727",
|
||||
"full_name": "u238\/grafana-CVE-2018-15727",
|
||||
"owner": {
|
||||
"login": "u238",
|
||||
"id": 2368573,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2368573?v=4",
|
||||
"html_url": "https:\/\/github.com\/u238"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/u238\/grafana-CVE-2018-15727",
|
||||
"description": "a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-29T16:35:22Z",
|
||||
"updated_at": "2020-07-29T06:48:10Z",
|
||||
"pushed_at": "2018-08-31T20:31:12Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-15832.json
Normal file
25
2018/CVE-2018-15832.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 148423840,
|
||||
"name": "Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
|
||||
"full_name": "JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
|
||||
"owner": {
|
||||
"login": "JacksonKuo",
|
||||
"id": 5520730,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5520730?v=4",
|
||||
"html_url": "https:\/\/github.com\/JacksonKuo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
|
||||
"description": "CVE-2018-15832",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-12T04:59:11Z",
|
||||
"updated_at": "2018-09-12T05:05:37Z",
|
||||
"pushed_at": "2018-09-12T05:00:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-15912.json
Normal file
25
2018/CVE-2018-15912.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 146484081,
|
||||
"name": "CVE-2018-15912-PoC",
|
||||
"full_name": "coderobe\/CVE-2018-15912-PoC",
|
||||
"owner": {
|
||||
"login": "coderobe",
|
||||
"id": 8442384,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8442384?v=4",
|
||||
"html_url": "https:\/\/github.com\/coderobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/coderobe\/CVE-2018-15912-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T17:40:52Z",
|
||||
"updated_at": "2018-08-30T10:59:24Z",
|
||||
"pushed_at": "2018-08-28T17:54:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 160696698,
|
||||
"name": "CVE-2018-15961",
|
||||
"full_name": "vah13\/CVE-2018-15961",
|
||||
"owner": {
|
||||
"login": "vah13",
|
||||
"id": 7976421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7976421?v=4",
|
||||
"html_url": "https:\/\/github.com\/vah13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vah13\/CVE-2018-15961",
|
||||
"description": "Unrestricted file upload in Adobe ColdFusion",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-06T15:47:57Z",
|
||||
"updated_at": "2019-10-21T04:12:24Z",
|
||||
"pushed_at": "2018-12-11T16:06:39Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 166859165,
|
||||
"name": "cve-2018-15961",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 160592463,
|
||||
"name": "CVE-2018-15982",
|
||||
"full_name": "FlatL1neAPT\/CVE-2018-15982",
|
||||
"owner": {
|
||||
"login": "FlatL1neAPT",
|
||||
"id": 33692082,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33692082?v=4",
|
||||
"html_url": "https:\/\/github.com\/FlatL1neAPT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FlatL1neAPT\/CVE-2018-15982",
|
||||
"description": "Flash sources for CVE-2018-15982 used by NK",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-05T23:41:37Z",
|
||||
"updated_at": "2020-03-30T04:44:32Z",
|
||||
"pushed_at": "2018-12-05T21:42:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160650543,
|
||||
"name": "CVE-2018-15982_PoC",
|
||||
|
@ -68,6 +91,29 @@
|
|||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161422909,
|
||||
"name": "CVE-2018-15982_EXP_IE",
|
||||
"full_name": "jas502n\/CVE-2018-15982_EXP_IE",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-15982_EXP_IE",
|
||||
"description": "CVE-2018-15982_EXP_IE",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-12T02:41:31Z",
|
||||
"updated_at": "2020-04-06T10:50:19Z",
|
||||
"pushed_at": "2018-12-12T02:54:01Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161431093,
|
||||
"name": "CVE-2018-15982",
|
||||
|
|
25
2018/CVE-2018-16156.json
Normal file
25
2018/CVE-2018-16156.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 161401564,
|
||||
"name": "CVE-2018-16156-Exploit",
|
||||
"full_name": "securifera\/CVE-2018-16156-Exploit",
|
||||
"owner": {
|
||||
"login": "securifera",
|
||||
"id": 12126525,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4",
|
||||
"html_url": "https:\/\/github.com\/securifera"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/securifera\/CVE-2018-16156-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-12-11T22:25:22Z",
|
||||
"updated_at": "2020-03-30T03:50:41Z",
|
||||
"pushed_at": "2018-12-11T22:29:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-16370.json
Normal file
25
2018/CVE-2018-16370.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 147602690,
|
||||
"name": "CVE-2018-16370",
|
||||
"full_name": "snappyJack\/CVE-2018-16370",
|
||||
"owner": {
|
||||
"login": "snappyJack",
|
||||
"id": 16055573,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4",
|
||||
"html_url": "https:\/\/github.com\/snappyJack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16370",
|
||||
"description": "In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through \/Public\/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-06T01:52:47Z",
|
||||
"updated_at": "2018-09-06T02:02:55Z",
|
||||
"pushed_at": "2018-09-06T02:02:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-16373.json
Normal file
25
2018/CVE-2018-16373.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 147603389,
|
||||
"name": "CVE-2018-16373",
|
||||
"full_name": "snappyJack\/CVE-2018-16373",
|
||||
"owner": {
|
||||
"login": "snappyJack",
|
||||
"id": 16055573,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4",
|
||||
"html_url": "https:\/\/github.com\/snappyJack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16373",
|
||||
"description": "Frog CMS 0.9.5 has an Upload > vulnerability that can create files via > \/admin\/?\/plugin\/file_manager\/save",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-06T02:00:24Z",
|
||||
"updated_at": "2018-09-06T02:01:33Z",
|
||||
"pushed_at": "2018-09-06T02:01:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 153072697,
|
||||
"name": "PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"full_name": "farisv\/PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"owner": {
|
||||
"login": "farisv",
|
||||
"id": 44131180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44131180?v=4",
|
||||
"html_url": "https:\/\/github.com\/farisv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/farisv\/PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-15T07:44:43Z",
|
||||
"updated_at": "2020-11-07T05:36:37Z",
|
||||
"pushed_at": "2021-01-06T01:11:32Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 157982249,
|
||||
"name": "CVE-2018-16509",
|
||||
|
|
25
2018/CVE-2018-16711.json
Normal file
25
2018/CVE-2018-16711.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 149358711,
|
||||
"name": "CVE-2018-16711",
|
||||
"full_name": "DownWithUp\/CVE-2018-16711",
|
||||
"owner": {
|
||||
"login": "DownWithUp",
|
||||
"id": 16905064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
|
||||
"html_url": "https:\/\/github.com\/DownWithUp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16711",
|
||||
"description": "PoC code for CVE-2018-16711 (exploit by wrmsr)",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-18T22:18:32Z",
|
||||
"updated_at": "2020-03-19T00:33:49Z",
|
||||
"pushed_at": "2018-09-25T12:15:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-16712.json
Normal file
25
2018/CVE-2018-16712.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 150000695,
|
||||
"name": "CVE-2018-16712",
|
||||
"full_name": "DownWithUp\/CVE-2018-16712",
|
||||
"owner": {
|
||||
"login": "DownWithUp",
|
||||
"id": 16905064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
|
||||
"html_url": "https:\/\/github.com\/DownWithUp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16712",
|
||||
"description": "PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-23T16:03:06Z",
|
||||
"updated_at": "2020-04-22T12:48:46Z",
|
||||
"pushed_at": "2018-12-01T23:02:46Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-16713.json
Normal file
25
2018/CVE-2018-16713.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 148797728,
|
||||
"name": "CVE-2018-16713",
|
||||
"full_name": "DownWithUp\/CVE-2018-16713",
|
||||
"owner": {
|
||||
"login": "DownWithUp",
|
||||
"id": 16905064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
|
||||
"html_url": "https:\/\/github.com\/DownWithUp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16713",
|
||||
"description": "PoC code for CVE-2018-16713 (exploit by rdmsr)",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-14T14:10:22Z",
|
||||
"updated_at": "2020-03-19T00:33:43Z",
|
||||
"pushed_at": "2018-09-25T12:15:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-16987.json
Normal file
25
2018/CVE-2018-16987.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 148659258,
|
||||
"name": "CVE-2018-16987",
|
||||
"full_name": "gquere\/CVE-2018-16987",
|
||||
"owner": {
|
||||
"login": "gquere",
|
||||
"id": 1585000,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1585000?v=4",
|
||||
"html_url": "https:\/\/github.com\/gquere"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gquere\/CVE-2018-16987",
|
||||
"description": "Details about CVE-2018-16987 - Cleartext storage of TA servers' passwords in Squash TM",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T15:32:48Z",
|
||||
"updated_at": "2018-09-14T06:17:55Z",
|
||||
"pushed_at": "2018-09-13T16:47:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2018/CVE-2018-17144.json
Normal file
48
2018/CVE-2018-17144.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 152480350,
|
||||
"name": "ban-exploitable-bitcoin-nodes",
|
||||
"full_name": "iioch\/ban-exploitable-bitcoin-nodes",
|
||||
"owner": {
|
||||
"login": "iioch",
|
||||
"id": 18705326,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18705326?v=4",
|
||||
"html_url": "https:\/\/github.com\/iioch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iioch\/ban-exploitable-bitcoin-nodes",
|
||||
"description": "Ban all denial-of-service vulnerability exploitable nodes from your node CVE-2018-17144 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-10T19:44:09Z",
|
||||
"updated_at": "2018-10-16T13:56:34Z",
|
||||
"pushed_at": "2018-10-10T20:08:45Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155528435,
|
||||
"name": "CVE-2018-17144_POC",
|
||||
"full_name": "hikame\/CVE-2018-17144_POC",
|
||||
"owner": {
|
||||
"login": "hikame",
|
||||
"id": 6397196,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6397196?v=4",
|
||||
"html_url": "https:\/\/github.com\/hikame"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hikame\/CVE-2018-17144_POC",
|
||||
"description": "Put the *.py files to test\/functional folder of bitcoin sourcecode (commit: 4901c00792c1dabae4bb01e6373c9b1ed9ef3008)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-31T09:07:35Z",
|
||||
"updated_at": "2020-12-05T14:05:15Z",
|
||||
"pushed_at": "2018-11-12T10:11:00Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
71
2018/CVE-2018-17182.json
Normal file
71
2018/CVE-2018-17182.json
Normal file
|
@ -0,0 +1,71 @@
|
|||
[
|
||||
{
|
||||
"id": 150880187,
|
||||
"name": "CVE-2018-17182",
|
||||
"full_name": "jas502n\/CVE-2018-17182",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-17182",
|
||||
"description": "Linux 内核VMA-UAF 提权漏洞(CVE-2018-17182),0day",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-29T15:58:55Z",
|
||||
"updated_at": "2021-01-28T07:53:27Z",
|
||||
"pushed_at": "2018-10-02T09:03:37Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 151031561,
|
||||
"name": "CVE-2018-17182",
|
||||
"full_name": "likescam\/CVE-2018-17182",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-17182",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-01T03:20:05Z",
|
||||
"updated_at": "2018-10-01T03:20:17Z",
|
||||
"pushed_at": "2018-10-01T03:20:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 151032211,
|
||||
"name": "vmacache_CVE-2018-17182",
|
||||
"full_name": "likescam\/vmacache_CVE-2018-17182",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/vmacache_CVE-2018-17182",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-01T03:29:04Z",
|
||||
"updated_at": "2018-10-01T16:07:20Z",
|
||||
"pushed_at": "2018-10-01T03:34:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-17418.json
Normal file
25
2018/CVE-2018-17418.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 149421281,
|
||||
"name": "monstra_cms-3.0.4--getshell",
|
||||
"full_name": "AlwaysHereFight\/monstra_cms-3.0.4--getshell",
|
||||
"owner": {
|
||||
"login": "AlwaysHereFight",
|
||||
"id": 21152658,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21152658?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlwaysHereFight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlwaysHereFight\/monstra_cms-3.0.4--getshell",
|
||||
"description": "monstra_cms-3.0.4-上传getshell CVE-2018-17418",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-19T08:54:45Z",
|
||||
"updated_at": "2018-10-09T06:40:44Z",
|
||||
"pushed_at": "2018-09-24T15:58:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 154035813,
|
||||
"name": "CVE-2018-17456",
|
||||
"full_name": "shpik-kr\/CVE-2018-17456",
|
||||
"owner": {
|
||||
"login": "shpik-kr",
|
||||
"id": 12602773,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12602773?v=4",
|
||||
"html_url": "https:\/\/github.com\/shpik-kr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shpik-kr\/CVE-2018-17456",
|
||||
"description": "1-day",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-21T17:46:10Z",
|
||||
"updated_at": "2018-10-23T11:22:27Z",
|
||||
"pushed_at": "2018-10-23T11:22:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 156715728,
|
||||
"name": "CVE-2018-17456",
|
||||
"full_name": "matlink\/CVE-2018-17456",
|
||||
"owner": {
|
||||
"login": "matlink",
|
||||
"id": 4450078,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4",
|
||||
"html_url": "https:\/\/github.com\/matlink"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/matlink\/CVE-2018-17456",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-08T14:03:52Z",
|
||||
"updated_at": "2018-11-08T14:21:16Z",
|
||||
"pushed_at": "2018-11-08T14:21:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 190417594,
|
||||
"name": "CVE-2018-17456",
|
||||
|
|
25
2018/CVE-2018-17961.json
Normal file
25
2018/CVE-2018-17961.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 155720048,
|
||||
"name": "CVE-2018-17961",
|
||||
"full_name": "matlink\/CVE-2018-17961",
|
||||
"owner": {
|
||||
"login": "matlink",
|
||||
"id": 4450078,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4",
|
||||
"html_url": "https:\/\/github.com\/matlink"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/matlink\/CVE-2018-17961",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-01T13:33:12Z",
|
||||
"updated_at": "2019-09-02T09:36:54Z",
|
||||
"pushed_at": "2018-11-01T13:33:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-18026.json
Normal file
25
2018/CVE-2018-18026.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 153657332,
|
||||
"name": "CVE-2018-18026",
|
||||
"full_name": "DownWithUp\/CVE-2018-18026",
|
||||
"owner": {
|
||||
"login": "DownWithUp",
|
||||
"id": 16905064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
|
||||
"html_url": "https:\/\/github.com\/DownWithUp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-18026",
|
||||
"description": "PoC Code for CVE-2018-18026 (exploit by stack overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T16:51:26Z",
|
||||
"updated_at": "2020-03-19T00:33:33Z",
|
||||
"pushed_at": "2018-11-07T04:00:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-18387.json
Normal file
25
2018/CVE-2018-18387.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 153663293,
|
||||
"name": "CVE-2018-18387",
|
||||
"full_name": "TheeBlind\/CVE-2018-18387",
|
||||
"owner": {
|
||||
"login": "TheeBlind",
|
||||
"id": 26583110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26583110?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheeBlind"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheeBlind\/CVE-2018-18387",
|
||||
"description": "playSMS < = 1.4.2 - Privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T17:40:42Z",
|
||||
"updated_at": "2019-03-08T13:11:49Z",
|
||||
"pushed_at": "2018-10-26T16:00:05Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-18714.json
Normal file
25
2018/CVE-2018-18714.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 155772208,
|
||||
"name": "CVE-2018-18714",
|
||||
"full_name": "DownWithUp\/CVE-2018-18714",
|
||||
"owner": {
|
||||
"login": "DownWithUp",
|
||||
"id": 16905064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
|
||||
"html_url": "https:\/\/github.com\/DownWithUp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-18714",
|
||||
"description": "PoC Code for CVE-2018-18714 (exploit by stack overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-01T20:31:50Z",
|
||||
"updated_at": "2020-03-19T00:33:27Z",
|
||||
"pushed_at": "2018-11-09T21:08:46Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-19126.json
Normal file
25
2018/CVE-2018-19126.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 159935158,
|
||||
"name": "PrestaShop-CVE-2018-19126",
|
||||
"full_name": "farisv\/PrestaShop-CVE-2018-19126",
|
||||
"owner": {
|
||||
"login": "farisv",
|
||||
"id": 44131180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44131180?v=4",
|
||||
"html_url": "https:\/\/github.com\/farisv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/farisv\/PrestaShop-CVE-2018-19126",
|
||||
"description": "PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-01T10:53:45Z",
|
||||
"updated_at": "2020-11-28T10:03:37Z",
|
||||
"pushed_at": "2018-12-12T22:11:45Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-19127.json
Normal file
25
2018/CVE-2018-19127.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 156842411,
|
||||
"name": "phpcms-2008-CVE-2018-19127",
|
||||
"full_name": "ab1gale\/phpcms-2008-CVE-2018-19127",
|
||||
"owner": {
|
||||
"login": "ab1gale",
|
||||
"id": 5143253,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5143253?v=4",
|
||||
"html_url": "https:\/\/github.com\/ab1gale"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ab1gale\/phpcms-2008-CVE-2018-19127",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-09T09:51:26Z",
|
||||
"updated_at": "2020-06-27T16:23:09Z",
|
||||
"pushed_at": "2018-11-09T09:55:35Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-19131.json
Normal file
25
2018/CVE-2018-19131.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 157386452,
|
||||
"name": "CVE-2018-19131",
|
||||
"full_name": "JonathanWilbur\/CVE-2018-19131",
|
||||
"owner": {
|
||||
"login": "JonathanWilbur",
|
||||
"id": 20342114,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20342114?v=4",
|
||||
"html_url": "https:\/\/github.com\/JonathanWilbur"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JonathanWilbur\/CVE-2018-19131",
|
||||
"description": "Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T13:40:10Z",
|
||||
"updated_at": "2020-09-12T08:28:34Z",
|
||||
"pushed_at": "2018-11-14T02:40:24Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 159347902,
|
||||
"name": "WP-GDPR-Compliance-Plugin-Exploit",
|
||||
"full_name": "aeroot\/WP-GDPR-Compliance-Plugin-Exploit",
|
||||
"owner": {
|
||||
"login": "aeroot",
|
||||
"id": 281911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/281911?v=4",
|
||||
"html_url": "https:\/\/github.com\/aeroot"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aeroot\/WP-GDPR-Compliance-Plugin-Exploit",
|
||||
"description": "Exploit of the privilege escalation vulnerability of the WordPress plugin \"WP GDPR Compliance\" by \"Van Ons\" (https:\/\/de.wordpress.org\/plugins\/wp-gdpr-compliance\/) CVE-2018-19207",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-27T14:27:06Z",
|
||||
"updated_at": "2019-05-02T21:05:50Z",
|
||||
"pushed_at": "2018-11-27T14:51:02Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 175869819,
|
||||
"name": "cve-2018-19207",
|
||||
|
|
25
2018/CVE-2018-19537.json
Normal file
25
2018/CVE-2018-19537.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 159082952,
|
||||
"name": "TP-Link-ArcherC5-RCE",
|
||||
"full_name": "JackDoan\/TP-Link-ArcherC5-RCE",
|
||||
"owner": {
|
||||
"login": "JackDoan",
|
||||
"id": 1024837,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1024837?v=4",
|
||||
"html_url": "https:\/\/github.com\/JackDoan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JackDoan\/TP-Link-ArcherC5-RCE",
|
||||
"description": "CVE-2018-19537",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-25T23:03:19Z",
|
||||
"updated_at": "2021-01-26T15:41:10Z",
|
||||
"pushed_at": "2018-11-26T22:39:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 160750436,
|
||||
"name": "CVE-2018-19788",
|
||||
"full_name": "AbsoZed\/CVE-2018-19788",
|
||||
"owner": {
|
||||
"login": "AbsoZed",
|
||||
"id": 17788335,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17788335?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbsoZed"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbsoZed\/CVE-2018-19788",
|
||||
"description": "Silly easy exploit for CVE-2018-19788",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-07T00:42:35Z",
|
||||
"updated_at": "2019-06-09T08:58:32Z",
|
||||
"pushed_at": "2018-12-07T00:56:25Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160872186,
|
||||
"name": "CVE-2018-19788",
|
||||
"full_name": "d4gh0s7\/CVE-2018-19788",
|
||||
"owner": {
|
||||
"login": "d4gh0s7",
|
||||
"id": 29960687,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29960687?v=4",
|
||||
"html_url": "https:\/\/github.com\/d4gh0s7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d4gh0s7\/CVE-2018-19788",
|
||||
"description": "Ansible role to check the vulnerability tracked as CVE-2018-19788, impacts PolicyKit version 0.115 which comes pre-installed on a wide range of Linux distributions",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-07T20:27:01Z",
|
||||
"updated_at": "2019-12-17T20:34:48Z",
|
||||
"pushed_at": "2018-12-10T15:57:47Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162179568,
|
||||
"name": "PoC",
|
||||
|
|
25
2018/CVE-2018-19911.json
Normal file
25
2018/CVE-2018-19911.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 160625335,
|
||||
"name": "freeswitch_rce",
|
||||
"full_name": "iSafeBlue\/freeswitch_rce",
|
||||
"owner": {
|
||||
"login": "iSafeBlue",
|
||||
"id": 25784279,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25784279?v=4",
|
||||
"html_url": "https:\/\/github.com\/iSafeBlue"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iSafeBlue\/freeswitch_rce",
|
||||
"description": "freeswitch all version remote command execute (cve-2018-19911)",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-06T05:48:02Z",
|
||||
"updated_at": "2019-06-30T16:07:31Z",
|
||||
"pushed_at": "2018-12-06T08:47:02Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-2380.json
Normal file
25
2018/CVE-2018-2380.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 125186745,
|
||||
"name": "CVE-2018-2380",
|
||||
"full_name": "erpscanteam\/CVE-2018-2380",
|
||||
"owner": {
|
||||
"login": "erpscanteam",
|
||||
"id": 35491827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35491827?v=4",
|
||||
"html_url": "https:\/\/github.com\/erpscanteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erpscanteam\/CVE-2018-2380",
|
||||
"description": "PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-14T09:20:21Z",
|
||||
"updated_at": "2020-08-09T21:12:29Z",
|
||||
"pushed_at": "2018-03-14T12:13:43Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue