Auto Update 2021/08/22 12:12:04

This commit is contained in:
motikan2010-bot 2021-08-22 12:12:04 +09:00
parent 0171737ecc
commit 61efc65ea0
96 changed files with 471 additions and 3688 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行反弹shell的脚本",
"fork": false,
"created_at": "2020-05-27T05:02:04Z",
"updated_at": "2021-08-17T02:53:04Z",
"updated_at": "2021-08-22T02:05:45Z",
"pushed_at": "2020-06-27T10:17:43Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 15,
"forks": 15,
"watchers": 38,
"watchers": 39,
"score": 0
},
{

View file

@ -1,25 +0,0 @@
[
{
"id": 145615979,
"name": "CVE-2018-0952-SystemCollector",
"full_name": "atredispartners\/CVE-2018-0952-SystemCollector",
"owner": {
"login": "atredispartners",
"id": 7254370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7254370?v=4",
"html_url": "https:\/\/github.com\/atredispartners"
},
"html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector",
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
"fork": false,
"created_at": "2018-08-21T20:29:10Z",
"updated_at": "2021-07-19T14:35:50Z",
"pushed_at": "2018-08-21T20:30:24Z",
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 36,
"forks": 36,
"watchers": 110,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 156499957,
"name": "cve-2018-1000134",
"full_name": "dragotime\/cve-2018-1000134",
"owner": {
"login": "dragotime",
"id": 43851975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43851975?v=4",
"html_url": "https:\/\/github.com\/dragotime"
},
"html_url": "https:\/\/github.com\/dragotime\/cve-2018-1000134",
"description": null,
"fork": false,
"created_at": "2018-11-07T06:22:47Z",
"updated_at": "2018-11-07T06:22:47Z",
"pushed_at": "2018-11-07T06:22:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 148814288,
"name": "CVE-2018-1000802-PoC",
"full_name": "tna0y\/CVE-2018-1000802-PoC",
"owner": {
"login": "tna0y",
"id": 22504374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22504374?v=4",
"html_url": "https:\/\/github.com\/tna0y"
},
"html_url": "https:\/\/github.com\/tna0y\/CVE-2018-1000802-PoC",
"description": "Python CVE-2018-1000802 Proof-of-Concept",
"fork": false,
"created_at": "2018-09-14T16:22:12Z",
"updated_at": "2020-05-29T07:36:51Z",
"pushed_at": "2018-09-14T16:38:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 156886365,
"name": "CVE-2018-10517",
"full_name": "0x00-0x00\/CVE-2018-10517",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10517",
"description": "CMS Made Simple 2.2.7 RCE exploit",
"fork": false,
"created_at": "2018-11-09T16:09:39Z",
"updated_at": "2020-06-07T11:21:05Z",
"pushed_at": "2018-11-09T16:09:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 153427159,
"name": "CVE-2018-10933",
"full_name": "SoledaD208\/CVE-2018-10933",
"owner": {
"login": "SoledaD208",
"id": 8731578,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8731578?v=4",
"html_url": "https:\/\/github.com\/SoledaD208"
},
"html_url": "https:\/\/github.com\/SoledaD208\/CVE-2018-10933",
"description": "CVE-2018-10933 very simple POC",
"fork": false,
"created_at": "2018-10-17T09:01:44Z",
"updated_at": "2020-12-18T03:51:25Z",
"pushed_at": "2018-10-23T13:51:06Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 40,
"forks": 40,
"watchers": 131,
"score": 0
},
{
"id": 153468806,
"name": "CVE-2018-10933",
@ -45,328 +22,6 @@
"watchers": 469,
"score": 0
},
{
"id": 153477523,
"name": "CVE-2018-10933",
"full_name": "hook-s3c\/CVE-2018-10933",
"owner": {
"login": "hook-s3c",
"id": 31825993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
"html_url": "https:\/\/github.com\/hook-s3c"
},
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
"description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
"fork": false,
"created_at": "2018-10-17T15:09:41Z",
"updated_at": "2018-10-17T15:09:44Z",
"pushed_at": "2018-10-17T15:09:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 153506738,
"name": "CVE-2018-10933",
"full_name": "kn6869610\/CVE-2018-10933",
"owner": {
"login": "kn6869610",
"id": 6917744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
"html_url": "https:\/\/github.com\/kn6869610"
},
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
"description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
"fork": false,
"created_at": "2018-10-17T18:44:05Z",
"updated_at": "2018-10-22T03:02:27Z",
"pushed_at": "2018-10-17T18:45:30Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"watchers": 13,
"score": 0
},
{
"id": 153534574,
"name": "libssh-scanner",
"full_name": "leapsecurity\/libssh-scanner",
"owner": {
"login": "leapsecurity",
"id": 40601062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40601062?v=4",
"html_url": "https:\/\/github.com\/leapsecurity"
},
"html_url": "https:\/\/github.com\/leapsecurity\/libssh-scanner",
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
"fork": false,
"created_at": "2018-10-17T23:05:10Z",
"updated_at": "2021-08-18T14:18:06Z",
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 54,
"forks": 54,
"watchers": 232,
"score": 0
},
{
"id": 153562229,
"name": "CVE-2018-10933_ssh",
"full_name": "likescam\/CVE-2018-10933_ssh",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh",
"description": null,
"fork": false,
"created_at": "2018-10-18T04:10:25Z",
"updated_at": "2018-10-18T04:10:39Z",
"pushed_at": "2018-10-18T04:10:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 153562319,
"name": "bpnd-libssh",
"full_name": "trbpnd\/bpnd-libssh",
"owner": {
"login": "trbpnd",
"id": 39193403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4",
"html_url": "https:\/\/github.com\/trbpnd"
},
"html_url": "https:\/\/github.com\/trbpnd\/bpnd-libssh",
"description": "Multi-threaded, reliable scanner for CVE-2018-10933.",
"fork": false,
"created_at": "2018-10-18T04:11:33Z",
"updated_at": "2018-10-23T03:13:35Z",
"pushed_at": "2018-10-22T16:44:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
},
{
"id": 153598283,
"name": "CVE-2018-10933-libSSH-Authentication-Bypass",
"full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
"description": null,
"fork": false,
"created_at": "2018-10-18T09:27:08Z",
"updated_at": "2018-10-18T16:47:53Z",
"pushed_at": "2018-10-18T09:27:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 153643745,
"name": "hunt-for-cve-2018-10933",
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
"owner": {
"login": "marco-lancini",
"id": 1472968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
"html_url": "https:\/\/github.com\/marco-lancini"
},
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
"fork": false,
"created_at": "2018-10-18T15:08:25Z",
"updated_at": "2020-10-25T16:36:25Z",
"pushed_at": "2018-10-18T15:11:35Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
},
{
"id": 153675108,
"name": "cve-2018-10933",
"full_name": "hackerhouse-opensource\/cve-2018-10933",
"owner": {
"login": "hackerhouse-opensource",
"id": 43967630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4",
"html_url": "https:\/\/github.com\/hackerhouse-opensource"
},
"html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2018-10933",
"description": "cve-2018-10933 libssh authentication bypass",
"fork": false,
"created_at": "2018-10-18T19:13:45Z",
"updated_at": "2021-08-02T11:39:18Z",
"pushed_at": "2018-10-21T21:24:29Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 32,
"forks": 32,
"watchers": 98,
"score": 0
},
{
"id": 153681539,
"name": "cve-2018-10933",
"full_name": "cve-2018\/cve-2018-10933",
"owner": {
"login": "cve-2018",
"id": 44275695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44275695?v=4",
"html_url": "https:\/\/github.com\/cve-2018"
},
"html_url": "https:\/\/github.com\/cve-2018\/cve-2018-10933",
"description": null,
"fork": false,
"created_at": "2018-10-18T20:11:22Z",
"updated_at": "2018-10-23T03:22:26Z",
"pushed_at": "2018-10-23T03:22:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 153855090,
"name": "CVE-2018-10933",
"full_name": "jas502n\/CVE-2018-10933",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
"description": "libssh CVE-2018-10933",
"fork": false,
"created_at": "2018-10-20T00:24:04Z",
"updated_at": "2019-07-31T09:33:04Z",
"pushed_at": "2018-10-20T00:29:04Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"forks": 5,
"watchers": 19,
"score": 0
},
{
"id": 153856713,
"name": "cve-2018-10933_poc",
"full_name": "ninp0\/cve-2018-10933_poc",
"owner": {
"login": "ninp0",
"id": 1008583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4",
"html_url": "https:\/\/github.com\/ninp0"
},
"html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
"description": "Variant of hackerhouse-opensource\/cve-2018-10933",
"fork": false,
"created_at": "2018-10-20T00:53:24Z",
"updated_at": "2018-10-22T15:05:53Z",
"pushed_at": "2018-10-20T01:53:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 153878160,
"name": "CVE-2018-10933_Scanner",
"full_name": "pghook\/CVE-2018-10933_Scanner",
"owner": {
"login": "pghook",
"id": 14160529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4",
"html_url": "https:\/\/github.com\/pghook"
},
"html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
"description": null,
"fork": false,
"created_at": "2018-10-20T06:53:59Z",
"updated_at": "2020-05-15T17:20:56Z",
"pushed_at": "2018-10-20T04:54:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 153920395,
"name": "POC-CVE-2018-10933",
"full_name": "Virgula0\/POC-CVE-2018-10933",
"owner": {
"login": "Virgula0",
"id": 16546435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16546435?v=4",
"html_url": "https:\/\/github.com\/Virgula0"
},
"html_url": "https:\/\/github.com\/Virgula0\/POC-CVE-2018-10933",
"description": "LibSSH Authentication Bypass Exploit using RCE",
"fork": false,
"created_at": "2018-10-20T15:34:26Z",
"updated_at": "2021-03-03T11:40:37Z",
"pushed_at": "2018-10-25T18:23:52Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 8,
"forks": 8,
"watchers": 12,
"score": 0
},
{
"id": 153975086,
"name": "pythonprojects-CVE-2018-10933",
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
"owner": {
"login": "shifa123",
"id": 18241082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
"html_url": "https:\/\/github.com\/shifa123"
},
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-21T05:01:12Z",
"updated_at": "2021-07-21T02:40:18Z",
"pushed_at": "2018-10-21T05:13:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 154050332,
"name": "CVE-2018-10933",
@ -390,98 +45,6 @@
"watchers": 5,
"score": 0
},
{
"id": 154390432,
"name": "CVE-2018-10933",
"full_name": "Bifrozt\/CVE-2018-10933",
"owner": {
"login": "Bifrozt",
"id": 8437560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8437560?v=4",
"html_url": "https:\/\/github.com\/Bifrozt"
},
"html_url": "https:\/\/github.com\/Bifrozt\/CVE-2018-10933",
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-23T20:11:35Z",
"updated_at": "2018-10-23T20:14:53Z",
"pushed_at": "2018-10-23T20:14:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 154398082,
"name": "CVE-2018-10933",
"full_name": "r3dxpl0it\/CVE-2018-10933",
"owner": {
"login": "r3dxpl0it",
"id": 43002597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4",
"html_url": "https:\/\/github.com\/r3dxpl0it"
},
"html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-10933",
"description": "CVE-2018-10933 POC (LIBSSH)",
"fork": false,
"created_at": "2018-10-23T21:17:52Z",
"updated_at": "2021-03-03T11:40:35Z",
"pushed_at": "2018-10-24T07:58:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 154500673,
"name": "libssh-scanner",
"full_name": "ivanacostarubio\/libssh-scanner",
"owner": {
"login": "ivanacostarubio",
"id": 16559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16559?v=4",
"html_url": "https:\/\/github.com\/ivanacostarubio"
},
"html_url": "https:\/\/github.com\/ivanacostarubio\/libssh-scanner",
"description": "A libssh CVE-2018-10933 scanner written in rust",
"fork": false,
"created_at": "2018-10-24T12:52:09Z",
"updated_at": "2019-02-24T23:51:07Z",
"pushed_at": "2018-10-24T12:52:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 154520949,
"name": "precompiled-CVE-2018-10933",
"full_name": "throwawayaccount12312312\/precompiled-CVE-2018-10933",
"owner": {
"login": "throwawayaccount12312312",
"id": 44440605,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44440605?v=4",
"html_url": "https:\/\/github.com\/throwawayaccount12312312"
},
"html_url": "https:\/\/github.com\/throwawayaccount12312312\/precompiled-CVE-2018-10933",
"description": null,
"fork": false,
"created_at": "2018-10-24T15:02:51Z",
"updated_at": "2018-10-24T15:04:19Z",
"pushed_at": "2018-10-24T15:04:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 154621353,
"name": "CVE-2018-10933",

View file

@ -1,25 +0,0 @@
[
{
"id": 147528239,
"name": "CVE-2018-10949",
"full_name": "0x00-0x00\/CVE-2018-10949",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10949",
"description": "Zimbra Collaboration Suite Username Enumeration ",
"fork": false,
"created_at": "2018-09-05T14:09:13Z",
"updated_at": "2020-10-20T18:45:33Z",
"pushed_at": "2018-09-05T14:10:09Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 145897861,
"name": "CVE-2018-11776",
"full_name": "trbpnd\/CVE-2018-11776",
"owner": {
"login": "trbpnd",
"id": 39193403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4",
"html_url": "https:\/\/github.com\/trbpnd"
},
"html_url": "https:\/\/github.com\/trbpnd\/CVE-2018-11776",
"description": "Docker image for a vulnerable struts app",
"fork": false,
"created_at": "2018-08-23T19:25:26Z",
"updated_at": "2018-08-23T19:28:53Z",
"pushed_at": "2018-08-23T19:28:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 145901668,
"name": "CVE-2018-11776",
@ -45,236 +22,6 @@
"watchers": 14,
"score": 0
},
{
"id": 145935231,
"name": "CVE-2018-11776",
"full_name": "jiguangin\/CVE-2018-11776",
"owner": {
"login": "jiguangin",
"id": 22545712,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22545712?v=4",
"html_url": "https:\/\/github.com\/jiguangin"
},
"html_url": "https:\/\/github.com\/jiguangin\/CVE-2018-11776",
"description": "CVE-2018-11776(S2-057) EXPLOIT CODE",
"fork": false,
"created_at": "2018-08-24T03:01:29Z",
"updated_at": "2020-12-29T15:23:34Z",
"pushed_at": "2018-08-24T03:27:02Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"forks": 5,
"watchers": 10,
"score": 0
},
{
"id": 145985371,
"name": "CVE-2018-11776-Python-PoC",
"full_name": "hook-s3c\/CVE-2018-11776-Python-PoC",
"owner": {
"login": "hook-s3c",
"id": 31825993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
"html_url": "https:\/\/github.com\/hook-s3c"
},
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-11776-Python-PoC",
"description": "Working Python test and PoC for CVE-2018-11776, includes Docker lab",
"fork": false,
"created_at": "2018-08-24T11:53:02Z",
"updated_at": "2021-06-11T18:27:28Z",
"pushed_at": "2018-08-25T02:14:49Z",
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 50,
"forks": 50,
"watchers": 120,
"score": 0
},
{
"id": 146056002,
"name": "struts-pwn_CVE-2018-11776",
"full_name": "mazen160\/struts-pwn_CVE-2018-11776",
"owner": {
"login": "mazen160",
"id": 8996052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4",
"html_url": "https:\/\/github.com\/mazen160"
},
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2018-11776",
"description": " An exploit for Apache Struts CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T01:53:30Z",
"updated_at": "2021-06-17T05:30:58Z",
"pushed_at": "2018-08-26T02:31:39Z",
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 102,
"forks": 102,
"watchers": 301,
"score": 0
},
{
"id": 146060181,
"name": "CVE-2018-11776",
"full_name": "bhdresh\/CVE-2018-11776",
"owner": {
"login": "bhdresh",
"id": 8931885,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
"html_url": "https:\/\/github.com\/bhdresh"
},
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2018-11776",
"description": "Vulnerable docker container for CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T03:06:30Z",
"updated_at": "2021-08-02T14:42:23Z",
"pushed_at": "2018-08-25T04:53:35Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"score": 0
},
{
"id": 146094544,
"name": "CVE-2018-11776",
"full_name": "knqyf263\/CVE-2018-11776",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11776",
"description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)",
"fork": false,
"created_at": "2018-08-25T12:45:15Z",
"updated_at": "2021-01-19T03:50:38Z",
"pushed_at": "2018-08-25T14:20:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 146330536,
"name": "Strutter",
"full_name": "Ekultek\/Strutter",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/Strutter",
"description": "Proof of Concept for CVE-2018-11776",
"fork": false,
"created_at": "2018-08-27T17:22:16Z",
"updated_at": "2021-06-11T18:08:56Z",
"pushed_at": "2018-09-12T14:28:35Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 4,
"forks": 4,
"watchers": 21,
"score": 0
},
{
"id": 146373342,
"name": "cve-2018-11776-docker",
"full_name": "tuxotron\/cve-2018-11776-docker",
"owner": {
"login": "tuxotron",
"id": 937637,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/937637?v=4",
"html_url": "https:\/\/github.com\/tuxotron"
},
"html_url": "https:\/\/github.com\/tuxotron\/cve-2018-11776-docker",
"description": null,
"fork": false,
"created_at": "2018-08-28T01:14:52Z",
"updated_at": "2019-09-24T14:38:18Z",
"pushed_at": "2018-08-29T17:58:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 146519519,
"name": "S2-057-CVE-2018-11776",
"full_name": "brianwrf\/S2-057-CVE-2018-11776",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/S2-057-CVE-2018-11776",
"description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)",
"fork": false,
"created_at": "2018-08-28T23:48:14Z",
"updated_at": "2018-12-23T03:47:07Z",
"pushed_at": "2018-08-29T00:03:56Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"score": 0
},
{
"id": 146650579,
"name": "Apache-Struts-Shodan-Exploit",
"full_name": "649\/Apache-Struts-Shodan-Exploit",
"owner": {
"login": "649",
"id": 23534047,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23534047?v=4",
"html_url": "https:\/\/github.com\/649"
},
"html_url": "https:\/\/github.com\/649\/Apache-Struts-Shodan-Exploit",
"description": "This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.",
"fork": false,
"created_at": "2018-08-29T19:50:26Z",
"updated_at": "2021-05-29T14:21:00Z",
"pushed_at": "2018-08-30T00:16:01Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 18,
"forks": 18,
"watchers": 53,
"score": 0
},
{
"id": 147746262,
"name": "CVE-2018-11776-Python-PoC",
"full_name": "jezzus\/CVE-2018-11776-Python-PoC",
"owner": {
"login": "jezzus",
"id": 9899999,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9899999?v=4",
"html_url": "https:\/\/github.com\/jezzus"
},
"html_url": "https:\/\/github.com\/jezzus\/CVE-2018-11776-Python-PoC",
"description": null,
"fork": false,
"created_at": "2018-09-06T23:49:20Z",
"updated_at": "2018-09-06T23:49:20Z",
"pushed_at": "2018-09-06T23:49:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 164352202,
"name": "cve-2018-11776",

View file

@ -1,25 +0,0 @@
[
{
"id": 153770795,
"name": "CVE-2018-12018",
"full_name": "k3v142\/CVE-2018-12018",
"owner": {
"login": "k3v142",
"id": 12337759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12337759?v=4",
"html_url": "https:\/\/github.com\/k3v142"
},
"html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018",
"description": "EPoD (Ethereum Packet of Death)",
"fork": false,
"created_at": "2018-10-19T11:11:01Z",
"updated_at": "2021-05-18T05:11:22Z",
"pushed_at": "2018-10-20T21:07:42Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 140411928,
"name": "CVE-2018-12463",
"full_name": "alt3kx\/CVE-2018-12463",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463",
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
"fork": false,
"created_at": "2018-07-10T09:51:40Z",
"updated_at": "2021-07-01T06:37:33Z",
"pushed_at": "2018-07-17T08:13:34Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 156870746,
"name": "CVE-2018-12613",
"full_name": "0x00-0x00\/CVE-2018-12613",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-12613",
"description": "PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit",
"fork": false,
"created_at": "2018-11-09T14:10:20Z",
"updated_at": "2021-08-05T03:48:22Z",
"pushed_at": "2018-11-09T14:42:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,
"forks": 4,
"watchers": 8,
"score": 0
},
{
"id": 208791479,
"name": "CVE-2018-12613",

View file

@ -45,29 +45,6 @@
"watchers": 22,
"score": 0
},
{
"id": 151734933,
"name": "poc-cve-2018-1273",
"full_name": "webr0ck\/poc-cve-2018-1273",
"owner": {
"login": "webr0ck",
"id": 30629042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30629042?v=4",
"html_url": "https:\/\/github.com\/webr0ck"
},
"html_url": "https:\/\/github.com\/webr0ck\/poc-cve-2018-1273",
"description": null,
"fork": false,
"created_at": "2018-10-05T14:42:07Z",
"updated_at": "2018-10-09T09:26:39Z",
"pushed_at": "2018-10-05T14:42:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 166271014,
"name": "cve-2018-1273",

View file

@ -1,25 +0,0 @@
[
{
"id": 139890292,
"name": "cve-2018-12895-hotfix",
"full_name": "bloom-ux\/cve-2018-12895-hotfix",
"owner": {
"login": "bloom-ux",
"id": 22582007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22582007?v=4",
"html_url": "https:\/\/github.com\/bloom-ux"
},
"html_url": "https:\/\/github.com\/bloom-ux\/cve-2018-12895-hotfix",
"description": "Hotfix for file deletion to to code execution vulnerability in WordPress",
"fork": false,
"created_at": "2018-07-05T19:09:17Z",
"updated_at": "2018-07-05T19:48:44Z",
"pushed_at": "2018-07-05T19:48:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 141165293,
"name": "prestashop-exploits",
"full_name": "ambionics\/prestashop-exploits",
"owner": {
"login": "ambionics",
"id": 29630660,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
"html_url": "https:\/\/github.com\/ambionics"
},
"html_url": "https:\/\/github.com\/ambionics\/prestashop-exploits",
"description": "Collection of exploits\/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)",
"fork": false,
"created_at": "2018-07-16T16:33:41Z",
"updated_at": "2021-08-17T18:25:36Z",
"pushed_at": "2018-07-17T09:02:34Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 12,
"forks": 12,
"watchers": 48,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 144012223,
"name": "legacySymfony",
"full_name": "lckJack\/legacySymfony",
"owner": {
"login": "lckJack",
"id": 38405856,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38405856?v=4",
"html_url": "https:\/\/github.com\/lckJack"
},
"html_url": "https:\/\/github.com\/lckJack\/legacySymfony",
"description": "Easy script to check if drupal 8.x-8.5.6 is vulnerable to CVE-2018-14.773",
"fork": false,
"created_at": "2018-08-08T12:42:56Z",
"updated_at": "2018-08-08T17:28:27Z",
"pushed_at": "2018-08-08T12:46:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 142094467,
"name": "CVE-2018-14083",
"full_name": "pudding2\/CVE-2018-14083",
"owner": {
"login": "pudding2",
"id": 28480779,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28480779?v=4",
"html_url": "https:\/\/github.com\/pudding2"
},
"html_url": "https:\/\/github.com\/pudding2\/CVE-2018-14083",
"description": null,
"fork": false,
"created_at": "2018-07-24T02:36:08Z",
"updated_at": "2019-01-14T11:31:59Z",
"pushed_at": "2018-07-24T02:56:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 152124947,
"name": "cve-2018-14634",
"full_name": "luan0ap\/cve-2018-14634",
"owner": {
"login": "luan0ap",
"id": 26953960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26953960?v=4",
"html_url": "https:\/\/github.com\/luan0ap"
},
"html_url": "https:\/\/github.com\/luan0ap\/cve-2018-14634",
"description": "proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1",
"fork": false,
"created_at": "2018-10-08T18:12:03Z",
"updated_at": "2021-04-21T18:38:36Z",
"pushed_at": "2018-10-09T16:44:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 11,
"forks": 11,
"watchers": 5,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 154950649,
"name": "CVE-2018-14665",
"full_name": "jas502n\/CVE-2018-14665",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14665",
"description": "OpenBsd_CVE-2018-14665",
"fork": false,
"created_at": "2018-10-27T10:12:05Z",
"updated_at": "2020-10-26T10:10:05Z",
"pushed_at": "2018-10-27T10:44:35Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 9,
"forks": 9,
"watchers": 14,
"score": 0
},
{
"id": 155795794,
"name": "CVE-2018-14665",

View file

@ -1,25 +0,0 @@
[
{
"id": 148241935,
"name": "CVE-2018-14772",
"full_name": "spencerdodd\/CVE-2018-14772",
"owner": {
"login": "spencerdodd",
"id": 9969454,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9969454?v=4",
"html_url": "https:\/\/github.com\/spencerdodd"
},
"html_url": "https:\/\/github.com\/spencerdodd\/CVE-2018-14772",
"description": "RCE exploit for CVE-2018-14772",
"fork": false,
"created_at": "2018-09-11T01:24:21Z",
"updated_at": "2020-10-21T22:16:16Z",
"pushed_at": "2018-11-01T01:47:17Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"score": 0
}
]

View file

@ -22,52 +22,6 @@
"watchers": 438,
"score": 0
},
{
"id": 148370201,
"name": "WinboxExploit",
"full_name": "msterusky\/WinboxExploit",
"owner": {
"login": "msterusky",
"id": 29436829,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4",
"html_url": "https:\/\/github.com\/msterusky"
},
"html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
"description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
"fork": false,
"created_at": "2018-09-11T19:36:49Z",
"updated_at": "2021-03-13T16:56:42Z",
"pushed_at": "2018-09-11T20:12:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 152906288,
"name": "MikroRoot",
"full_name": "syrex1013\/MikroRoot",
"owner": {
"login": "syrex1013",
"id": 31669127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
"html_url": "https:\/\/github.com\/syrex1013"
},
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
"fork": false,
"created_at": "2018-10-13T19:17:42Z",
"updated_at": "2020-11-02T06:16:27Z",
"pushed_at": "2018-10-14T08:39:24Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"watchers": 13,
"score": 0
},
{
"id": 161894724,
"name": "CVE-2018-14847",

View file

@ -1,25 +0,0 @@
[
{
"id": 147528539,
"name": "CVE-2018-15131",
"full_name": "0x00-0x00\/CVE-2018-15131",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-15131",
"description": "Zimbra Collaboration Suite Username Enumeration ",
"fork": false,
"created_at": "2018-09-05T14:11:16Z",
"updated_at": "2018-10-28T04:05:13Z",
"pushed_at": "2018-09-05T14:11:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 144760095,
"name": "laravel-poc-CVE-2018-15133",
"full_name": "kozmic\/laravel-poc-CVE-2018-15133",
"owner": {
"login": "kozmic",
"id": 6666,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6666?v=4",
"html_url": "https:\/\/github.com\/kozmic"
},
"html_url": "https:\/\/github.com\/kozmic\/laravel-poc-CVE-2018-15133",
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2021-08-13T21:34:13Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 43,
"forks": 43,
"watchers": 228,
"score": 0
},
{
"id": 243072477,
"name": "Laravel-CVE-2018-15133",

View file

@ -1,25 +0,0 @@
[
{
"id": 150475298,
"name": "CVE-2018-15365",
"full_name": "nixwizard\/CVE-2018-15365",
"owner": {
"login": "nixwizard",
"id": 3982790,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3982790?v=4",
"html_url": "https:\/\/github.com\/nixwizard"
},
"html_url": "https:\/\/github.com\/nixwizard\/CVE-2018-15365",
"description": null,
"fork": false,
"created_at": "2018-09-26T18:56:41Z",
"updated_at": "2018-09-27T07:31:12Z",
"pushed_at": "2018-09-27T07:31:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -22,29 +22,6 @@
"watchers": 128,
"score": 0
},
{
"id": 145296891,
"name": "opensshenum",
"full_name": "gbonacini\/opensshenum",
"owner": {
"login": "gbonacini",
"id": 5440458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5440458?v=4",
"html_url": "https:\/\/github.com\/gbonacini"
},
"html_url": "https:\/\/github.com\/gbonacini\/opensshenum",
"description": "CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug",
"fork": false,
"created_at": "2018-08-19T11:23:54Z",
"updated_at": "2019-09-15T11:44:34Z",
"pushed_at": "2018-10-17T12:27:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 145483388,
"name": "CVE-2018-15473-Exploit",

View file

@ -1,25 +0,0 @@
[
{
"id": 145583266,
"name": "CVE-2018-15499",
"full_name": "DownWithUp\/CVE-2018-15499",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-15499",
"description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)",
"fork": false,
"created_at": "2018-08-21T15:26:35Z",
"updated_at": "2021-07-20T21:00:37Z",
"pushed_at": "2018-08-23T12:55:23Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 146628899,
"name": "grafana-CVE-2018-15727",
"full_name": "u238\/grafana-CVE-2018-15727",
"owner": {
"login": "u238",
"id": 2368573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2368573?v=4",
"html_url": "https:\/\/github.com\/u238"
},
"html_url": "https:\/\/github.com\/u238\/grafana-CVE-2018-15727",
"description": "a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)",
"fork": false,
"created_at": "2018-08-29T16:35:22Z",
"updated_at": "2021-08-02T15:39:55Z",
"pushed_at": "2018-08-31T20:31:12Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 8,
"forks": 8,
"watchers": 22,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 148423840,
"name": "Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
"full_name": "JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
"owner": {
"login": "JacksonKuo",
"id": 5520730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5520730?v=4",
"html_url": "https:\/\/github.com\/JacksonKuo"
},
"html_url": "https:\/\/github.com\/JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
"description": "CVE-2018-15832",
"fork": false,
"created_at": "2018-09-12T04:59:11Z",
"updated_at": "2018-09-12T05:05:37Z",
"pushed_at": "2018-09-12T05:00:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 146484081,
"name": "CVE-2018-15912-PoC",
"full_name": "coderobe\/CVE-2018-15912-PoC",
"owner": {
"login": "coderobe",
"id": 8442384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8442384?v=4",
"html_url": "https:\/\/github.com\/coderobe"
},
"html_url": "https:\/\/github.com\/coderobe\/CVE-2018-15912-PoC",
"description": null,
"fork": false,
"created_at": "2018-08-28T17:40:52Z",
"updated_at": "2018-08-30T10:59:24Z",
"pushed_at": "2018-08-28T17:54:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 147602690,
"name": "CVE-2018-16370",
"full_name": "snappyJack\/CVE-2018-16370",
"owner": {
"login": "snappyJack",
"id": 16055573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4",
"html_url": "https:\/\/github.com\/snappyJack"
},
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16370",
"description": "In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through \/Public\/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.",
"fork": false,
"created_at": "2018-09-06T01:52:47Z",
"updated_at": "2018-09-06T02:02:55Z",
"pushed_at": "2018-09-06T02:02:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 147603389,
"name": "CVE-2018-16373",
"full_name": "snappyJack\/CVE-2018-16373",
"owner": {
"login": "snappyJack",
"id": 16055573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4",
"html_url": "https:\/\/github.com\/snappyJack"
},
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16373",
"description": "Frog CMS 0.9.5 has an Upload > vulnerability that can create files via > \/admin\/?\/plugin\/file_manager\/save",
"fork": false,
"created_at": "2018-09-06T02:00:24Z",
"updated_at": "2018-09-06T02:01:33Z",
"pushed_at": "2018-09-06T02:01:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 149358711,
"name": "CVE-2018-16711",
"full_name": "DownWithUp\/CVE-2018-16711",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16711",
"description": "PoC code for CVE-2018-16711 (exploit by wrmsr)",
"fork": false,
"created_at": "2018-09-18T22:18:32Z",
"updated_at": "2021-07-20T21:00:48Z",
"pushed_at": "2018-09-25T12:15:50Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 148797728,
"name": "CVE-2018-16713",
"full_name": "DownWithUp\/CVE-2018-16713",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16713",
"description": "PoC code for CVE-2018-16713 (exploit by rdmsr)",
"fork": false,
"created_at": "2018-09-14T14:10:22Z",
"updated_at": "2021-07-20T21:00:49Z",
"pushed_at": "2018-09-25T12:15:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 148659258,
"name": "CVE-2018-16987",
"full_name": "gquere\/CVE-2018-16987",
"owner": {
"login": "gquere",
"id": 1585000,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1585000?v=4",
"html_url": "https:\/\/github.com\/gquere"
},
"html_url": "https:\/\/github.com\/gquere\/CVE-2018-16987",
"description": "Details about CVE-2018-16987 - Cleartext storage of TA servers' passwords in Squash TM",
"fork": false,
"created_at": "2018-09-13T15:32:48Z",
"updated_at": "2018-09-14T06:17:55Z",
"pushed_at": "2018-09-13T16:47:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 152480350,
"name": "ban-exploitable-bitcoin-nodes",
"full_name": "iioch\/ban-exploitable-bitcoin-nodes",
"owner": {
"login": "iioch",
"id": 18705326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18705326?v=4",
"html_url": "https:\/\/github.com\/iioch"
},
"html_url": "https:\/\/github.com\/iioch\/ban-exploitable-bitcoin-nodes",
"description": "Ban all denial-of-service vulnerability exploitable nodes from your node CVE-2018-17144 ",
"fork": false,
"created_at": "2018-10-10T19:44:09Z",
"updated_at": "2018-10-16T13:56:34Z",
"pushed_at": "2018-10-10T20:08:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 155528435,
"name": "CVE-2018-17144_POC",

View file

@ -1,71 +0,0 @@
[
{
"id": 150880187,
"name": "CVE-2018-17182",
"full_name": "jas502n\/CVE-2018-17182",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-17182",
"description": "Linux 内核VMA-UAF 提权漏洞CVE-2018-17182,0day",
"fork": false,
"created_at": "2018-09-29T15:58:55Z",
"updated_at": "2021-06-24T13:19:35Z",
"pushed_at": "2018-10-02T09:03:37Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 50,
"forks": 50,
"watchers": 119,
"score": 0
},
{
"id": 151031561,
"name": "CVE-2018-17182",
"full_name": "likescam\/CVE-2018-17182",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-17182",
"description": null,
"fork": false,
"created_at": "2018-10-01T03:20:05Z",
"updated_at": "2018-10-01T03:20:17Z",
"pushed_at": "2018-10-01T03:20:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 151032211,
"name": "vmacache_CVE-2018-17182",
"full_name": "likescam\/vmacache_CVE-2018-17182",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/vmacache_CVE-2018-17182",
"description": null,
"fork": false,
"created_at": "2018-10-01T03:29:04Z",
"updated_at": "2018-10-01T16:07:20Z",
"pushed_at": "2018-10-01T03:34:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 149421281,
"name": "monstra_cms-3.0.4--getshell",
"full_name": "Jx0n0\/monstra_cms-3.0.4--getshell",
"owner": {
"login": "Jx0n0",
"id": 21152658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21152658?v=4",
"html_url": "https:\/\/github.com\/Jx0n0"
},
"html_url": "https:\/\/github.com\/Jx0n0\/monstra_cms-3.0.4--getshell",
"description": "monstra_cms-3.0.4-上传getshell CVE-2018-17418",
"fork": false,
"created_at": "2018-09-19T08:54:45Z",
"updated_at": "2018-10-09T06:40:44Z",
"pushed_at": "2018-09-24T15:58:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,50 +1,4 @@
[
{
"id": 154035813,
"name": "CVE-2018-17456",
"full_name": "shpik-kr\/CVE-2018-17456",
"owner": {
"login": "shpik-kr",
"id": 12602773,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12602773?v=4",
"html_url": "https:\/\/github.com\/shpik-kr"
},
"html_url": "https:\/\/github.com\/shpik-kr\/CVE-2018-17456",
"description": "1-day",
"fork": false,
"created_at": "2018-10-21T17:46:10Z",
"updated_at": "2018-10-23T11:22:27Z",
"pushed_at": "2018-10-23T11:22:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 156715728,
"name": "CVE-2018-17456",
"full_name": "matlink\/CVE-2018-17456",
"owner": {
"login": "matlink",
"id": 4450078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4",
"html_url": "https:\/\/github.com\/matlink"
},
"html_url": "https:\/\/github.com\/matlink\/CVE-2018-17456",
"description": null,
"fork": false,
"created_at": "2018-11-08T14:03:52Z",
"updated_at": "2018-11-08T14:21:16Z",
"pushed_at": "2018-11-08T14:21:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 190417594,
"name": "CVE-2018-17456",

View file

@ -1,25 +0,0 @@
[
{
"id": 155720048,
"name": "CVE-2018-17961",
"full_name": "matlink\/CVE-2018-17961",
"owner": {
"login": "matlink",
"id": 4450078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4",
"html_url": "https:\/\/github.com\/matlink"
},
"html_url": "https:\/\/github.com\/matlink\/CVE-2018-17961",
"description": null,
"fork": false,
"created_at": "2018-11-01T13:33:12Z",
"updated_at": "2019-09-02T09:36:54Z",
"pushed_at": "2018-11-01T13:33:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 153657332,
"name": "CVE-2018-18026",
"full_name": "DownWithUp\/CVE-2018-18026",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-18026",
"description": "PoC Code for CVE-2018-18026 (exploit by stack overflow)",
"fork": false,
"created_at": "2018-10-18T16:51:26Z",
"updated_at": "2021-07-20T21:00:53Z",
"pushed_at": "2018-11-07T04:00:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 153663293,
"name": "CVE-2018-18387",
"full_name": "TheeBlind\/CVE-2018-18387",
"owner": {
"login": "TheeBlind",
"id": 26583110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26583110?v=4",
"html_url": "https:\/\/github.com\/TheeBlind"
},
"html_url": "https:\/\/github.com\/TheeBlind\/CVE-2018-18387",
"description": "playSMS < = 1.4.2 - Privilege escalation",
"fork": false,
"created_at": "2018-10-18T17:40:42Z",
"updated_at": "2021-03-03T11:40:30Z",
"pushed_at": "2018-10-26T16:00:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 155772208,
"name": "CVE-2018-18714",
"full_name": "DownWithUp\/CVE-2018-18714",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-18714",
"description": "PoC Code for CVE-2018-18714 (exploit by stack overflow)",
"fork": false,
"created_at": "2018-11-01T20:31:50Z",
"updated_at": "2021-07-20T21:00:56Z",
"pushed_at": "2018-11-09T21:08:46Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 156842411,
"name": "phpcms-2008-CVE-2018-19127",
"full_name": "ab1gale\/phpcms-2008-CVE-2018-19127",
"owner": {
"login": "ab1gale",
"id": 5143253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5143253?v=4",
"html_url": "https:\/\/github.com\/ab1gale"
},
"html_url": "https:\/\/github.com\/ab1gale\/phpcms-2008-CVE-2018-19127",
"description": null,
"fork": false,
"created_at": "2018-11-09T09:51:26Z",
"updated_at": "2021-04-07T12:21:15Z",
"pushed_at": "2018-11-09T09:55:35Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 7,
"forks": 7,
"watchers": 42,
"score": 0
}
]

View file

@ -344,75 +344,6 @@
"watchers": 0,
"score": 0
},
{
"id": 139417715,
"name": "CVE-2018-2628",
"full_name": "likescam\/CVE-2018-2628",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-2628",
"description": null,
"fork": false,
"created_at": "2018-07-02T09:00:34Z",
"updated_at": "2019-05-26T06:58:12Z",
"pushed_at": "2018-07-02T09:00:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 147341225,
"name": "WebLogic-RCE-exploit",
"full_name": "Nervous\/WebLogic-RCE-exploit",
"owner": {
"login": "Nervous",
"id": 172442,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172442?v=4",
"html_url": "https:\/\/github.com\/Nervous"
},
"html_url": "https:\/\/github.com\/Nervous\/WebLogic-RCE-exploit",
"description": "A remote code execution exploit for WebLogic based on CVE-2018-2628",
"fork": false,
"created_at": "2018-09-04T12:17:21Z",
"updated_at": "2021-08-18T20:03:08Z",
"pushed_at": "2018-09-04T12:21:21Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 155318699,
"name": "CVE-2018-2628",
"full_name": "Lighird\/CVE-2018-2628",
"owner": {
"login": "Lighird",
"id": 28284964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28284964?v=4",
"html_url": "https:\/\/github.com\/Lighird"
},
"html_url": "https:\/\/github.com\/Lighird\/CVE-2018-2628",
"description": "CVE-2018-2628漏洞工具包",
"fork": false,
"created_at": "2018-10-30T03:26:16Z",
"updated_at": "2020-07-13T02:21:36Z",
"pushed_at": "2018-10-30T03:35:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 7,
"forks": 7,
"watchers": 4,
"score": 0
},
{
"id": 164424976,
"name": "CVE-2018-2628",

View file

@ -1,25 +0,0 @@
[
{
"id": 146413224,
"name": "virtualbox-cve-2018-2844",
"full_name": "renorobert\/virtualbox-cve-2018-2844",
"owner": {
"login": "renorobert",
"id": 4233909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4233909?v=4",
"html_url": "https:\/\/github.com\/renorobert"
},
"html_url": "https:\/\/github.com\/renorobert\/virtualbox-cve-2018-2844",
"description": null,
"fork": false,
"created_at": "2018-08-28T08:04:19Z",
"updated_at": "2021-08-11T23:31:48Z",
"pushed_at": "2018-08-28T08:06:21Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 31,
"forks": 31,
"watchers": 98,
"score": 0
}
]

View file

@ -1,142 +1,4 @@
[
{
"id": 141531715,
"name": "CVE-2018-2893",
"full_name": "sry309\/CVE-2018-2893",
"owner": {
"login": "sry309",
"id": 15671013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15671013?v=4",
"html_url": "https:\/\/github.com\/sry309"
},
"html_url": "https:\/\/github.com\/sry309\/CVE-2018-2893",
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-07-19T06:06:10Z",
"updated_at": "2020-12-10T06:55:01Z",
"pushed_at": "2018-07-19T05:59:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 42,
"forks": 42,
"watchers": 0,
"score": 0
},
{
"id": 141534186,
"name": "CVE-2018-2893",
"full_name": "ryanInf\/CVE-2018-2893",
"owner": {
"login": "ryanInf",
"id": 19621374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19621374?v=4",
"html_url": "https:\/\/github.com\/ryanInf"
},
"html_url": "https:\/\/github.com\/ryanInf\/CVE-2018-2893",
"description": "CVE-2018-2893 PoC",
"fork": false,
"created_at": "2018-07-19T06:28:12Z",
"updated_at": "2020-12-16T09:58:12Z",
"pushed_at": "2018-07-19T06:12:51Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 37,
"forks": 37,
"watchers": 28,
"score": 0
},
{
"id": 141678694,
"name": "CVE-2018-2893",
"full_name": "bigsizeme\/CVE-2018-2893",
"owner": {
"login": "bigsizeme",
"id": 17845094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
"html_url": "https:\/\/github.com\/bigsizeme"
},
"html_url": "https:\/\/github.com\/bigsizeme\/CVE-2018-2893",
"description": "反弹shell生成器",
"fork": false,
"created_at": "2018-07-20T07:26:43Z",
"updated_at": "2019-04-22T04:46:36Z",
"pushed_at": "2018-07-23T04:31:27Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"score": 0
},
{
"id": 141856470,
"name": "CVE-2018-2893",
"full_name": "pyn3rd\/CVE-2018-2893",
"owner": {
"login": "pyn3rd",
"id": 41412951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41412951?v=4",
"html_url": "https:\/\/github.com\/pyn3rd"
},
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2018-2893",
"description": "CVE-2018-2893-PoC",
"fork": false,
"created_at": "2018-07-22T01:15:58Z",
"updated_at": "2021-07-26T02:15:11Z",
"pushed_at": "2018-10-27T01:42:20Z",
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 38,
"forks": 38,
"watchers": 93,
"score": 0
},
{
"id": 142403659,
"name": "CVE-2018-2893",
"full_name": "qianl0ng\/CVE-2018-2893",
"owner": {
"login": "qianl0ng",
"id": 26949233,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26949233?v=4",
"html_url": "https:\/\/github.com\/qianl0ng"
},
"html_url": "https:\/\/github.com\/qianl0ng\/CVE-2018-2893",
"description": "可以直接反弹shell",
"fork": false,
"created_at": "2018-07-26T07:16:38Z",
"updated_at": "2021-06-18T23:11:26Z",
"pushed_at": "2018-07-26T07:50:15Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 14,
"forks": 14,
"watchers": 45,
"score": 0
},
{
"id": 151921677,
"name": "CVE-2018-2893",
"full_name": "jas502n\/CVE-2018-2893",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-2893",
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-10-07T08:41:14Z",
"updated_at": "2020-12-16T08:25:44Z",
"pushed_at": "2018-10-07T09:53:54Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 9,
"forks": 9,
"watchers": 10,
"score": 0
},
{
"id": 219763712,
"name": "CVE-2018-2893",

View file

@ -1,50 +1,4 @@
[
{
"id": 141601079,
"name": "cve-2018-2894",
"full_name": "111ddea\/cve-2018-2894",
"owner": {
"login": "111ddea",
"id": 41444127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41444127?v=4",
"html_url": "https:\/\/github.com\/111ddea"
},
"html_url": "https:\/\/github.com\/111ddea\/cve-2018-2894",
"description": "cve-2018-2894 不同别人的利用方法。",
"fork": false,
"created_at": "2018-07-19T15:50:35Z",
"updated_at": "2021-07-27T02:55:07Z",
"pushed_at": "2018-07-22T08:34:27Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,
"forks": 7,
"watchers": 14,
"score": 0
},
{
"id": 141661586,
"name": "CVE-2018-2894",
"full_name": "LandGrey\/CVE-2018-2894",
"owner": {
"login": "LandGrey",
"id": 16769779,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16769779?v=4",
"html_url": "https:\/\/github.com\/LandGrey"
},
"html_url": "https:\/\/github.com\/LandGrey\/CVE-2018-2894",
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
"fork": false,
"created_at": "2018-07-20T03:59:18Z",
"updated_at": "2021-06-30T12:57:51Z",
"pushed_at": "2018-07-20T12:46:50Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 52,
"forks": 52,
"watchers": 131,
"score": 0
},
{
"id": 151928392,
"name": "CVE-2018-2894",

View file

@ -1,117 +0,0 @@
[
{
"id": 154076972,
"name": "CVE-2018-3191",
"full_name": "arongmh\/CVE-2018-3191",
"owner": {
"login": "arongmh",
"id": 30547070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30547070?v=4",
"html_url": "https:\/\/github.com\/arongmh"
},
"html_url": "https:\/\/github.com\/arongmh\/CVE-2018-3191",
"description": "CVE-2018-3191 payload generator",
"fork": false,
"created_at": "2018-10-22T02:29:12Z",
"updated_at": "2020-04-06T11:03:47Z",
"pushed_at": "2018-10-21T17:28:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 52,
"forks": 52,
"watchers": 1,
"score": 0
},
{
"id": 154250933,
"name": "CVE-2018-3191",
"full_name": "pyn3rd\/CVE-2018-3191",
"owner": {
"login": "pyn3rd",
"id": 41412951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41412951?v=4",
"html_url": "https:\/\/github.com\/pyn3rd"
},
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2018-3191",
"description": "CVE-2018-3191-PoC",
"fork": false,
"created_at": "2018-10-23T02:43:39Z",
"updated_at": "2021-08-15T01:20:27Z",
"pushed_at": "2018-10-26T17:54:54Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 43,
"forks": 43,
"watchers": 104,
"score": 0
},
{
"id": 154368972,
"name": "CVE-2018-3191",
"full_name": "Libraggbond\/CVE-2018-3191",
"owner": {
"login": "Libraggbond",
"id": 37012218,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37012218?v=4",
"html_url": "https:\/\/github.com\/Libraggbond"
},
"html_url": "https:\/\/github.com\/Libraggbond\/CVE-2018-3191",
"description": "CVE-2018-3191 反弹shell",
"fork": false,
"created_at": "2018-10-23T17:24:43Z",
"updated_at": "2021-03-22T07:47:56Z",
"pushed_at": "2018-10-23T17:28:05Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 31,
"forks": 31,
"watchers": 56,
"score": 0
},
{
"id": 154426418,
"name": "CVE-2018-3191",
"full_name": "jas502n\/CVE-2018-3191",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-3191",
"description": "Weblogic-CVE-2018-3191远程代码命令执行漏洞",
"fork": false,
"created_at": "2018-10-24T02:26:53Z",
"updated_at": "2020-12-22T15:35:45Z",
"pushed_at": "2018-10-24T17:42:47Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 23,
"forks": 23,
"watchers": 62,
"score": 0
},
{
"id": 154477893,
"name": "CVE-2018-3191-Rce-Exploit",
"full_name": "mackleadmire\/CVE-2018-3191-Rce-Exploit",
"owner": {
"login": "mackleadmire",
"id": 10216868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10216868?v=4",
"html_url": "https:\/\/github.com\/mackleadmire"
},
"html_url": "https:\/\/github.com\/mackleadmire\/CVE-2018-3191-Rce-Exploit",
"description": null,
"fork": false,
"created_at": "2018-10-24T09:54:00Z",
"updated_at": "2020-11-19T04:08:52Z",
"pushed_at": "2018-10-25T08:12:46Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 19,
"score": 0
}
]

View file

@ -22,29 +22,6 @@
"watchers": 156,
"score": 0
},
{
"id": 154593773,
"name": "CVE-2018-3245",
"full_name": "jas502n\/CVE-2018-3245",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-3245",
"description": "CVE-2018-3245",
"fork": false,
"created_at": "2018-10-25T01:46:56Z",
"updated_at": "2019-08-23T03:53:49Z",
"pushed_at": "2018-10-25T02:01:39Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 9,
"forks": 9,
"watchers": 12,
"score": 0
},
{
"id": 219765536,
"name": "CVE-2018-3245",

View file

@ -1,27 +1,4 @@
[
{
"id": 154596948,
"name": "CVE-2018-3252",
"full_name": "jas502n\/CVE-2018-3252",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-3252",
"description": "Weblogic-CVE-2018-3252",
"fork": false,
"created_at": "2018-10-25T02:16:49Z",
"updated_at": "2019-03-12T05:44:19Z",
"pushed_at": "2018-10-25T02:16:50Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 160289379,
"name": "CVE-2018-3252",

View file

@ -21,51 +21,5 @@
"forks": 35,
"watchers": 117,
"score": 0
},
{
"id": 141314432,
"name": "CVE-2018-4121",
"full_name": "likescam\/CVE-2018-4121",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-4121",
"description": null,
"fork": false,
"created_at": "2018-07-17T16:15:29Z",
"updated_at": "2018-07-17T16:15:44Z",
"pushed_at": "2018-07-17T16:15:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 147746670,
"name": "CVE-2018-4121",
"full_name": "jezzus\/CVE-2018-4121",
"owner": {
"login": "jezzus",
"id": 9899999,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9899999?v=4",
"html_url": "https:\/\/github.com\/jezzus"
},
"html_url": "https:\/\/github.com\/jezzus\/CVE-2018-4121",
"description": null,
"fork": false,
"created_at": "2018-09-06T23:55:43Z",
"updated_at": "2018-09-06T23:55:53Z",
"pushed_at": "2018-09-06T23:55:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 144027153,
"name": "cve-2018-4233",
"full_name": "saelo\/cve-2018-4233",
"owner": {
"login": "saelo",
"id": 2453290,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2453290?v=4",
"html_url": "https:\/\/github.com\/saelo"
},
"html_url": "https:\/\/github.com\/saelo\/cve-2018-4233",
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
"fork": false,
"created_at": "2018-08-08T14:41:20Z",
"updated_at": "2021-08-05T05:07:58Z",
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 33,
"forks": 33,
"watchers": 160,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 148367467,
"name": "brokentooth",
"full_name": "omerporze\/brokentooth",
"owner": {
"login": "omerporze",
"id": 6332303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6332303?v=4",
"html_url": "https:\/\/github.com\/omerporze"
},
"html_url": "https:\/\/github.com\/omerporze\/brokentooth",
"description": " POC for CVE-2018-4327",
"fork": false,
"created_at": "2018-09-11T19:15:09Z",
"updated_at": "2021-05-06T00:36:57Z",
"pushed_at": "2018-09-13T15:59:05Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 8,
"forks": 8,
"watchers": 42,
"score": 0
},
{
"id": 148547298,
"name": "POC-CVE-2018-4327-and-CVE-2018-4330",
"full_name": "harryanon\/POC-CVE-2018-4327-and-CVE-2018-4330",
"owner": {
"login": "harryanon",
"id": 37672417,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37672417?v=4",
"html_url": "https:\/\/github.com\/harryanon"
},
"html_url": "https:\/\/github.com\/harryanon\/POC-CVE-2018-4327-and-CVE-2018-4330",
"description": null,
"fork": false,
"created_at": "2018-09-12T22:00:58Z",
"updated_at": "2018-09-30T09:47:45Z",
"pushed_at": "2018-09-12T22:01:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 148663645,
"name": "toothfairy",
"full_name": "omerporze\/toothfairy",
"owner": {
"login": "omerporze",
"id": 6332303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6332303?v=4",
"html_url": "https:\/\/github.com\/omerporze"
},
"html_url": "https:\/\/github.com\/omerporze\/toothfairy",
"description": "CVE-2018-4330 POC for iOS",
"fork": false,
"created_at": "2018-09-13T16:05:20Z",
"updated_at": "2021-02-05T15:44:05Z",
"pushed_at": "2018-09-13T18:34:20Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 2,
"forks": 2,
"watchers": 14,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 155684007,
"name": "check_icmp_dos",
"full_name": "Pa55w0rd\/check_icmp_dos",
"owner": {
"login": "Pa55w0rd",
"id": 16274549,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16274549?v=4",
"html_url": "https:\/\/github.com\/Pa55w0rd"
},
"html_url": "https:\/\/github.com\/Pa55w0rd\/check_icmp_dos",
"description": "iOS 12 \/ OS X Remote Kernel Heap Overflow (CVE-2018-4407) POC",
"fork": false,
"created_at": "2018-11-01T08:21:59Z",
"updated_at": "2021-07-06T12:33:58Z",
"pushed_at": "2018-11-01T08:53:23Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 14,
"forks": 14,
"watchers": 59,
"score": 0
},
{
"id": 155748281,
"name": "cve-2018-4407",
@ -45,29 +22,6 @@
"watchers": 50,
"score": 0
},
{
"id": 155810193,
"name": "check_icmp_dos-CVE-2018-4407-",
"full_name": "s2339956\/check_icmp_dos-CVE-2018-4407-",
"owner": {
"login": "s2339956",
"id": 17181670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17181670?v=4",
"html_url": "https:\/\/github.com\/s2339956"
},
"html_url": "https:\/\/github.com\/s2339956\/check_icmp_dos-CVE-2018-4407-",
"description": "CVE-2018-4407 概述與實現",
"fork": false,
"created_at": "2018-11-02T03:38:41Z",
"updated_at": "2018-11-02T03:48:36Z",
"pushed_at": "2018-11-02T03:48:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 155836421,
"name": "AppleDOS",
@ -137,75 +91,6 @@
"watchers": 12,
"score": 0
},
{
"id": 155925880,
"name": "node-cve-2018-4407",
"full_name": "SamDecrock\/node-cve-2018-4407",
"owner": {
"login": "SamDecrock",
"id": 550487,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/550487?v=4",
"html_url": "https:\/\/github.com\/SamDecrock"
},
"html_url": "https:\/\/github.com\/SamDecrock\/node-cve-2018-4407",
"description": "Node.js PoC exploit code for CVE-2018-4407",
"fork": false,
"created_at": "2018-11-02T22:00:17Z",
"updated_at": "2020-06-19T07:48:32Z",
"pushed_at": "2018-11-02T22:13:40Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"watchers": 11,
"score": 0
},
{
"id": 156039963,
"name": "CVE-2018-4407",
"full_name": "r3dxpl0it\/CVE-2018-4407",
"owner": {
"login": "r3dxpl0it",
"id": 43002597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4",
"html_url": "https:\/\/github.com\/r3dxpl0it"
},
"html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-4407",
"description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]",
"fork": false,
"created_at": "2018-11-04T01:47:05Z",
"updated_at": "2021-06-21T22:43:49Z",
"pushed_at": "2018-11-04T02:25:08Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 9,
"forks": 9,
"watchers": 23,
"score": 0
},
{
"id": 156051346,
"name": "CVE-2018-4407",
"full_name": "lucagiovagnoli\/CVE-2018-4407",
"owner": {
"login": "lucagiovagnoli",
"id": 4341034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4341034?v=4",
"html_url": "https:\/\/github.com\/lucagiovagnoli"
},
"html_url": "https:\/\/github.com\/lucagiovagnoli\/CVE-2018-4407",
"description": "A buffer overflow vulnerability in the XNU kernel's ICMP error code causes IOS devices to crash (laptops and mobiles).",
"fork": false,
"created_at": "2018-11-04T05:10:38Z",
"updated_at": "2019-12-06T13:15:13Z",
"pushed_at": "2018-11-04T19:00:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 156611823,
"name": "Apple-Remote-Crash-Tool-CVE-2018-4407",

View file

@ -160,29 +160,6 @@
"watchers": 0,
"score": 0
},
{
"id": 153381902,
"name": "CVE-2018-4878",
"full_name": "B0fH\/CVE-2018-4878",
"owner": {
"login": "B0fH",
"id": 1335037,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1335037?v=4",
"html_url": "https:\/\/github.com\/B0fH"
},
"html_url": "https:\/\/github.com\/B0fH\/CVE-2018-4878",
"description": "Metasploit module for CVE-2018-4878",
"fork": false,
"created_at": "2018-10-17T02:11:24Z",
"updated_at": "2018-12-26T09:33:54Z",
"pushed_at": "2018-10-24T02:18:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 162440583,
"name": "CVE-2018-4878",

View file

@ -1,25 +0,0 @@
[
{
"id": 144792218,
"name": "cve-2018-5740",
"full_name": "sischkg\/cve-2018-5740",
"owner": {
"login": "sischkg",
"id": 3468384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3468384?v=4",
"html_url": "https:\/\/github.com\/sischkg"
},
"html_url": "https:\/\/github.com\/sischkg\/cve-2018-5740",
"description": null,
"fork": false,
"created_at": "2018-08-15T01:50:41Z",
"updated_at": "2019-02-25T15:06:06Z",
"pushed_at": "2018-08-15T06:25:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 148261072,
"name": "GitStackRCE",
"full_name": "cisp\/GitStackRCE",
"owner": {
"login": "cisp",
"id": 11972644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11972644?v=4",
"html_url": "https:\/\/github.com\/cisp"
},
"html_url": "https:\/\/github.com\/cisp\/GitStackRCE",
"description": "GitStackRCE漏洞(CVE-2018-5955)EXP",
"fork": false,
"created_at": "2018-09-11T04:39:43Z",
"updated_at": "2018-09-21T15:13:18Z",
"pushed_at": "2018-09-11T04:40:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 229491909,
"name": "Cerberus",

View file

@ -344,52 +344,6 @@
"watchers": 0,
"score": 0
},
{
"id": 146678844,
"name": "trellis-cve-2018-6389",
"full_name": "ItinerisLtd\/trellis-cve-2018-6389",
"owner": {
"login": "ItinerisLtd",
"id": 32365928,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32365928?v=4",
"html_url": "https:\/\/github.com\/ItinerisLtd"
},
"html_url": "https:\/\/github.com\/ItinerisLtd\/trellis-cve-2018-6389",
"description": "Mitigate CVE-2018-6389 WordPress load-scripts \/ load-styles attacks",
"fork": false,
"created_at": "2018-08-30T01:25:20Z",
"updated_at": "2020-08-11T04:43:27Z",
"pushed_at": "2018-08-30T01:47:48Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"score": 0
},
{
"id": 155115549,
"name": "Wordpress-DOS",
"full_name": "Zazzzles\/Wordpress-DOS",
"owner": {
"login": "Zazzzles",
"id": 16189557,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16189557?v=4",
"html_url": "https:\/\/github.com\/Zazzzles"
},
"html_url": "https:\/\/github.com\/Zazzzles\/Wordpress-DOS",
"description": "Exploit for vulnerability CVE-2018-6389 on wordpress sites",
"fork": false,
"created_at": "2018-10-28T21:05:04Z",
"updated_at": "2020-06-17T01:53:45Z",
"pushed_at": "2018-11-01T06:45:17Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 164352797,
"name": "tvsz",

View file

@ -114,52 +114,6 @@
"watchers": 0,
"score": 0
},
{
"id": 150020637,
"name": "cve-2018-6574",
"full_name": "kenprice\/cve-2018-6574",
"owner": {
"login": "kenprice",
"id": 8813522,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8813522?v=4",
"html_url": "https:\/\/github.com\/kenprice"
},
"html_url": "https:\/\/github.com\/kenprice\/cve-2018-6574",
"description": null,
"fork": false,
"created_at": "2018-09-23T20:00:38Z",
"updated_at": "2018-09-23T20:17:54Z",
"pushed_at": "2018-09-23T20:16:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 155760240,
"name": "cve-2018-6574",
"full_name": "redirected\/cve-2018-6574",
"owner": {
"login": "redirected",
"id": 11227335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11227335?v=4",
"html_url": "https:\/\/github.com\/redirected"
},
"html_url": "https:\/\/github.com\/redirected\/cve-2018-6574",
"description": null,
"fork": false,
"created_at": "2018-11-01T18:44:35Z",
"updated_at": "2018-11-01T18:57:35Z",
"pushed_at": "2018-11-01T18:57:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 162044535,
"name": "CVE-2018-6574-POC",

View file

@ -1,25 +0,0 @@
[
{
"id": 146195248,
"name": "CVE-2018-6643",
"full_name": "undefinedmode\/CVE-2018-6643",
"owner": {
"login": "undefinedmode",
"id": 4165481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4165481?v=4",
"html_url": "https:\/\/github.com\/undefinedmode"
},
"html_url": "https:\/\/github.com\/undefinedmode\/CVE-2018-6643",
"description": "CVE-2018-6643",
"fork": false,
"created_at": "2018-08-26T16:03:08Z",
"updated_at": "2018-08-27T13:36:10Z",
"pushed_at": "2018-08-28T23:03:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 156874990,
"name": "CVE-2018-7422",
"full_name": "0x00-0x00\/CVE-2018-7422",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-7422",
"description": "Wordpress plugin Site-Editor v1.1.1 LFI exploit",
"fork": false,
"created_at": "2018-11-09T14:42:57Z",
"updated_at": "2019-09-27T14:14:03Z",
"pushed_at": "2018-11-09T14:43:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -390,29 +390,6 @@
"watchers": 0,
"score": 0
},
{
"id": 140643631,
"name": "CVE-2018-7600",
"full_name": "happynote3966\/CVE-2018-7600",
"owner": {
"login": "happynote3966",
"id": 19719330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
"html_url": "https:\/\/github.com\/happynote3966"
},
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7600",
"description": null,
"fork": false,
"created_at": "2018-07-12T01:12:44Z",
"updated_at": "2018-07-17T03:24:11Z",
"pushed_at": "2018-07-17T03:24:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 151199861,
"name": "CVE-2018-7600-Drupal-RCE",

View file

@ -22,29 +22,6 @@
"watchers": 5,
"score": 0
},
{
"id": 140663638,
"name": "CVE-2018-7602",
"full_name": "happynote3966\/CVE-2018-7602",
"owner": {
"login": "happynote3966",
"id": 19719330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
"html_url": "https:\/\/github.com\/happynote3966"
},
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7602",
"description": null,
"fork": false,
"created_at": "2018-07-12T05:08:14Z",
"updated_at": "2018-07-17T02:57:18Z",
"pushed_at": "2018-07-17T02:57:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 155205612,
"name": "CVE-2018-7602",

View file

@ -1,25 +0,0 @@
[
{
"id": 156363089,
"name": "CVE-2018-7750",
"full_name": "jm33-m0\/CVE-2018-7750",
"owner": {
"login": "jm33-m0",
"id": 10167884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10167884?v=4",
"html_url": "https:\/\/github.com\/jm33-m0"
},
"html_url": "https:\/\/github.com\/jm33-m0\/CVE-2018-7750",
"description": "an RCE (remote command execution) approach of CVE-2018-7750",
"fork": false,
"created_at": "2018-11-06T10:01:13Z",
"updated_at": "2020-04-06T10:57:16Z",
"pushed_at": "2018-11-06T10:10:31Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 8,
"forks": 8,
"watchers": 17,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 141976453,
"name": "CVE-2018-8090",
"full_name": "kernelm0de\/CVE-2018-8090",
"owner": {
"login": "kernelm0de",
"id": 30472260,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30472260?v=4",
"html_url": "https:\/\/github.com\/kernelm0de"
},
"html_url": "https:\/\/github.com\/kernelm0de\/CVE-2018-8090",
"description": "DLL Hijacking in Quickheal Total Security\/ Internet Security\/ Antivirus Pro (Installers)",
"fork": false,
"created_at": "2018-07-23T07:17:07Z",
"updated_at": "2019-01-22T12:46:02Z",
"pushed_at": "2018-07-26T13:39:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -114,52 +114,6 @@
"watchers": 2,
"score": 0
},
{
"id": 140512208,
"name": "CVE-2018-8120",
"full_name": "EVOL4\/CVE-2018-8120",
"owner": {
"login": "EVOL4",
"id": 26862344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26862344?v=4",
"html_url": "https:\/\/github.com\/EVOL4"
},
"html_url": "https:\/\/github.com\/EVOL4\/CVE-2018-8120",
"description": "dd",
"fork": false,
"created_at": "2018-07-11T02:41:16Z",
"updated_at": "2018-11-16T12:24:05Z",
"pushed_at": "2018-08-10T13:06:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 144975276,
"name": "CVE-2018-8120",
"full_name": "ozkanbilge\/CVE-2018-8120",
"owner": {
"login": "ozkanbilge",
"id": 39211596,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39211596?v=4",
"html_url": "https:\/\/github.com\/ozkanbilge"
},
"html_url": "https:\/\/github.com\/ozkanbilge\/CVE-2018-8120",
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-08-16T10:51:00Z",
"updated_at": "2020-10-20T17:21:43Z",
"pushed_at": "2018-08-16T10:53:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 162424739,
"name": "CVE-2018-8120",

View file

@ -1,25 +0,0 @@
[
{
"id": 145187210,
"name": "CVE-2018-8172",
"full_name": "SyFi\/CVE-2018-8172",
"owner": {
"login": "SyFi",
"id": 26314806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4",
"html_url": "https:\/\/github.com\/SyFi"
},
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-8172",
"description": "Microsoft Visual Studio CVE-2018-8172 Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2018-08-18T03:37:15Z",
"updated_at": "2020-10-21T22:16:11Z",
"pushed_at": "2018-08-18T03:56:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
}
]

View file

@ -91,52 +91,6 @@
"watchers": 1,
"score": 0
},
{
"id": 140478620,
"name": "cve-2018-8174_analysis",
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
"owner": {
"login": "piotrflorczyk",
"id": 7830144,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4",
"html_url": "https:\/\/github.com\/piotrflorczyk"
},
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
"description": "Analysis of VBS exploit CVE-2018-8174",
"fork": false,
"created_at": "2018-07-10T19:31:25Z",
"updated_at": "2021-07-20T22:33:04Z",
"pushed_at": "2018-07-12T08:35:13Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 16,
"forks": 16,
"watchers": 17,
"score": 0
},
{
"id": 147615569,
"name": "CVE-2018-8174-msf",
"full_name": "likescam\/CVE-2018-8174-msf",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-8174-msf",
"description": null,
"fork": false,
"created_at": "2018-09-06T04:03:25Z",
"updated_at": "2018-09-06T04:03:37Z",
"pushed_at": "2018-09-06T04:03:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 188212551,
"name": "ie11_vbscript_exploit",

View file

@ -1,25 +0,0 @@
[
{
"id": 144541015,
"name": "CVE-2018-8208",
"full_name": "kaisaryousuf\/CVE-2018-8208",
"owner": {
"login": "kaisaryousuf",
"id": 27071719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27071719?v=4",
"html_url": "https:\/\/github.com\/kaisaryousuf"
},
"html_url": "https:\/\/github.com\/kaisaryousuf\/CVE-2018-8208",
"description": null,
"fork": false,
"created_at": "2018-08-13T06:56:11Z",
"updated_at": "2018-11-12T16:22:38Z",
"pushed_at": "2018-06-21T15:06:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 148192905,
"name": "CVE-2018-8353-POC",
"full_name": "whereisr0da\/CVE-2018-8353-POC",
"owner": {
"login": "whereisr0da",
"id": 37551872,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37551872?v=4",
"html_url": "https:\/\/github.com\/whereisr0da"
},
"html_url": "https:\/\/github.com\/whereisr0da\/CVE-2018-8353-POC",
"description": "Simple poc of CVE-2018-8353 Microsoft Scripting Engine Use After Free",
"fork": false,
"created_at": "2018-09-10T17:28:05Z",
"updated_at": "2018-10-15T01:07:56Z",
"pushed_at": "2018-09-10T17:32:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 148446677,
"name": "CVE-2018-8420",
"full_name": "idkwim\/CVE-2018-8420",
"owner": {
"login": "idkwim",
"id": 4337087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4337087?v=4",
"html_url": "https:\/\/github.com\/idkwim"
},
"html_url": "https:\/\/github.com\/idkwim\/CVE-2018-8420",
"description": null,
"fork": false,
"created_at": "2018-09-12T08:22:54Z",
"updated_at": "2021-06-12T09:43:43Z",
"pushed_at": "2018-09-12T03:50:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 53,
"forks": 53,
"watchers": 4,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 155593957,
"name": "CVE-2018-8440",
"full_name": "sourceincite\/CVE-2018-8440",
"owner": {
"login": "sourceincite",
"id": 13770985,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13770985?v=4",
"html_url": "https:\/\/github.com\/sourceincite"
},
"html_url": "https:\/\/github.com\/sourceincite\/CVE-2018-8440",
"description": "CVE-2018-8440 standalone exploit",
"fork": false,
"created_at": "2018-10-31T17:00:43Z",
"updated_at": "2021-03-01T08:16:12Z",
"pushed_at": "2018-10-31T19:05:17Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 25,
"forks": 25,
"watchers": 72,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 152781400,
"name": "CVE-2018-8495-POC",
"full_name": "whereisr0da\/CVE-2018-8495-POC",
"owner": {
"login": "whereisr0da",
"id": 37551872,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37551872?v=4",
"html_url": "https:\/\/github.com\/whereisr0da"
},
"html_url": "https:\/\/github.com\/whereisr0da\/CVE-2018-8495-POC",
"description": "Simple poc of CVE-2018-8495 Microsoft Edge Remote Code Execution",
"fork": false,
"created_at": "2018-10-12T16:49:57Z",
"updated_at": "2021-07-20T20:36:50Z",
"pushed_at": "2018-10-12T16:52:34Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks": 8,
"watchers": 10,
"score": 0
}
]

View file

@ -67,28 +67,5 @@
"forks": 111,
"watchers": 394,
"score": 0
},
{
"id": 144062105,
"name": "syscall_exploit_CVE-2018-8897",
"full_name": "nmulasmajic\/syscall_exploit_CVE-2018-8897",
"owner": {
"login": "nmulasmajic",
"id": 30013958,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30013958?v=4",
"html_url": "https:\/\/github.com\/nmulasmajic"
},
"html_url": "https:\/\/github.com\/nmulasmajic\/syscall_exploit_CVE-2018-8897",
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
"fork": false,
"created_at": "2018-08-08T20:04:56Z",
"updated_at": "2021-08-17T03:13:33Z",
"pushed_at": "2018-08-08T20:12:20Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 25,
"forks": 25,
"watchers": 112,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 150627369,
"name": "cve-2018-9075",
"full_name": "beverlymiller818\/cve-2018-9075",
"owner": {
"login": "beverlymiller818",
"id": 43651541,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43651541?v=4",
"html_url": "https:\/\/github.com\/beverlymiller818"
},
"html_url": "https:\/\/github.com\/beverlymiller818\/cve-2018-9075",
"description": null,
"fork": false,
"created_at": "2018-09-27T17:58:00Z",
"updated_at": "2018-09-27T19:26:57Z",
"pushed_at": "2018-09-27T19:27:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,50 +1,4 @@
[
{
"id": 154178141,
"name": "CVE-2018-9206",
"full_name": "Den1al\/CVE-2018-9206",
"owner": {
"login": "Den1al",
"id": 7230603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7230603?v=4",
"html_url": "https:\/\/github.com\/Den1al"
},
"html_url": "https:\/\/github.com\/Den1al\/CVE-2018-9206",
"description": "A Python PoC for CVE-2018-9206",
"fork": false,
"created_at": "2018-10-22T16:33:22Z",
"updated_at": "2021-02-20T07:43:16Z",
"pushed_at": "2018-10-22T16:49:08Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 12,
"forks": 12,
"watchers": 14,
"score": 0
},
{
"id": 154564555,
"name": "JQShell",
"full_name": "Stahlz\/JQShell",
"owner": {
"login": "Stahlz",
"id": 4689086,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4689086?v=4",
"html_url": "https:\/\/github.com\/Stahlz"
},
"html_url": "https:\/\/github.com\/Stahlz\/JQShell",
"description": "A weaponized version of CVE-2018-9206",
"fork": false,
"created_at": "2018-10-24T20:24:20Z",
"updated_at": "2021-06-21T01:58:12Z",
"pushed_at": "2018-10-30T01:48:42Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 16,
"forks": 16,
"watchers": 62,
"score": 0
},
{
"id": 165319420,
"name": "cve-2018-9206",

View file

@ -1,25 +0,0 @@
[
{
"id": 155439217,
"name": "CVE-2018-9411",
"full_name": "tamirzb\/CVE-2018-9411",
"owner": {
"login": "tamirzb",
"id": 1054209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1054209?v=4",
"html_url": "https:\/\/github.com\/tamirzb"
},
"html_url": "https:\/\/github.com\/tamirzb\/CVE-2018-9411",
"description": "Exploit code for CVE-2018-9411 for MediaCasService",
"fork": false,
"created_at": "2018-10-30T18:48:20Z",
"updated_at": "2021-07-06T12:33:42Z",
"pushed_at": "2018-10-30T21:51:16Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 15,
"forks": 15,
"watchers": 49,
"score": 0
}
]

View file

@ -1,48 +0,0 @@
[
{
"id": 143491453,
"name": "Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958",
"full_name": "manojcode\/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958",
"owner": {
"login": "manojcode",
"id": 17510282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17510282?v=4",
"html_url": "https:\/\/github.com\/manojcode"
},
"html_url": "https:\/\/github.com\/manojcode\/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958",
"description": "Foxit Reader version 9.0.1.1049 Use After Free with ASLR and DEP bypass on heap",
"fork": false,
"created_at": "2018-08-04T02:32:28Z",
"updated_at": "2021-03-26T07:34:59Z",
"pushed_at": "2018-09-11T14:19:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 145526091,
"name": "cve-2018-9948-9958-exp",
"full_name": "orangepirate\/cve-2018-9948-9958-exp",
"owner": {
"login": "orangepirate",
"id": 40813235,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40813235?v=4",
"html_url": "https:\/\/github.com\/orangepirate"
},
"html_url": "https:\/\/github.com\/orangepirate\/cve-2018-9948-9958-exp",
"description": "a exp for cve-2018-9948\/9958 , current shellcode called win-calc ",
"fork": false,
"created_at": "2018-08-21T07:43:38Z",
"updated_at": "2018-08-24T00:18:07Z",
"pushed_at": "2018-08-24T00:18:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -114,29 +114,6 @@
"watchers": 4,
"score": 0
},
{
"id": 150025071,
"name": "DVR-Exploiter",
"full_name": "Cyb0r9\/DVR-Exploiter",
"owner": {
"login": "Cyb0r9",
"id": 43474676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43474676?v=4",
"html_url": "https:\/\/github.com\/Cyb0r9"
},
"html_url": "https:\/\/github.com\/Cyb0r9\/DVR-Exploiter",
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
"fork": false,
"created_at": "2018-09-23T20:58:40Z",
"updated_at": "2021-08-05T18:21:55Z",
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 41,
"forks": 41,
"watchers": 85,
"score": 0
},
{
"id": 167874136,
"name": "CVE-2018-9995",

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-15T14:23:11Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 14,
"forks": 14,
"forks_count": 15,
"forks": 15,
"watchers": 43,
"score": 0
},
@ -1416,13 +1416,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-08-16T07:45:27Z",
"updated_at": "2021-08-21T21:54:06Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1078,
"watchers_count": 1078,
"stargazers_count": 1079,
"watchers_count": 1079,
"forks_count": 357,
"forks": 357,
"watchers": 1078,
"watchers": 1079,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-06-26T08:28:02Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 13,
"score": 0
},

25
2020/CVE-2020-10205.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 300210711,
"name": "CVE-2020-10205",
"full_name": "5l1v3r1\/CVE-2020-10205",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-10205",
"description": null,
"fork": false,
"created_at": "2020-10-01T08:49:47Z",
"updated_at": "2021-01-30T16:15:20Z",
"pushed_at": "2020-04-17T04:00:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,51 @@
"forks": 44,
"watchers": 138,
"score": 0
},
{
"id": 277048370,
"name": "CVE-2020-1206-Exploit",
"full_name": "Info-Security-Solution-Kolkata\/CVE-2020-1206-Exploit",
"owner": {
"login": "Info-Security-Solution-Kolkata",
"id": 67817658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67817658?v=4",
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata"
},
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata\/CVE-2020-1206-Exploit",
"description": null,
"fork": false,
"created_at": "2020-07-04T05:54:58Z",
"updated_at": "2020-07-04T05:54:58Z",
"pushed_at": "2020-07-04T05:54:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 277049855,
"name": "Smbleed-CVE-2020-1206-Exploit",
"full_name": "Info-Security-Solution-Kolkata\/Smbleed-CVE-2020-1206-Exploit",
"owner": {
"login": "Info-Security-Solution-Kolkata",
"id": 67817658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67817658?v=4",
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata"
},
"html_url": "https:\/\/github.com\/Info-Security-Solution-Kolkata\/Smbleed-CVE-2020-1206-Exploit",
"description": null,
"fork": false,
"created_at": "2020-07-04T06:06:52Z",
"updated_at": "2020-07-04T06:06:52Z",
"pushed_at": "2020-07-04T06:06:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-13640.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 277377386,
"name": "CVE-2020-13640",
"full_name": "asterite3\/CVE-2020-13640",
"owner": {
"login": "asterite3",
"id": 5569241,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5569241?v=4",
"html_url": "https:\/\/github.com\/asterite3"
},
"html_url": "https:\/\/github.com\/asterite3\/CVE-2020-13640",
"description": "CVE-2020-13640 - SQL injection in wpDiscuz WordPress plugin <= 5.3.5",
"fork": false,
"created_at": "2020-07-05T20:22:16Z",
"updated_at": "2020-07-29T06:32:34Z",
"pushed_at": "2020-07-05T20:24:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-08-20T21:03:00Z",
"updated_at": "2021-08-22T02:00:06Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 252,
"watchers_count": 252,
"forks_count": 45,
"forks": 45,
"watchers": 252,
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 46,
"forks": 46,
"watchers": 253,
"score": 0
},
{

25
2020/CVE-2020-14947.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 276697965,
"name": "CVE-2020-14947",
"full_name": "mhaskar\/CVE-2020-14947",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2020-14947",
"description": "The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947",
"fork": false,
"created_at": "2020-07-02T16:40:52Z",
"updated_at": "2021-07-25T16:31:56Z",
"pushed_at": "2020-07-02T16:46:10Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 7,
"forks": 7,
"watchers": 19,
"score": 0
}
]

View file

@ -22,6 +22,52 @@
"watchers": 11,
"score": 0
},
{
"id": 277021315,
"name": "Dubbo-CVE-2020-1948",
"full_name": "txrw\/Dubbo-CVE-2020-1948",
"owner": {
"login": "txrw",
"id": 32354358,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32354358?v=4",
"html_url": "https:\/\/github.com\/txrw"
},
"html_url": "https:\/\/github.com\/txrw\/Dubbo-CVE-2020-1948",
"description": "Apache Dubbo CVE-2020-1948 漏洞测试环境,亲测可用。",
"fork": false,
"created_at": "2020-07-04T02:06:28Z",
"updated_at": "2021-01-10T06:10:22Z",
"pushed_at": "2020-07-03T02:46:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 278242568,
"name": "cve-2020-1948-poc",
"full_name": "M3g4Byt3\/cve-2020-1948-poc",
"owner": {
"login": "M3g4Byt3",
"id": 25048908,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25048908?v=4",
"html_url": "https:\/\/github.com\/M3g4Byt3"
},
"html_url": "https:\/\/github.com\/M3g4Byt3\/cve-2020-1948-poc",
"description": null,
"fork": false,
"created_at": "2020-07-09T02:27:54Z",
"updated_at": "2020-09-02T09:32:18Z",
"pushed_at": "2020-07-02T10:03:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 279463521,
"name": "Dubbo-deserialization",

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 319340829,
"name": "CVE-2020-5509",
"full_name": "5l1v3r1\/CVE-2020-5509",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-5509",
"description": "Car Rental Project v.1.0 Remote Code Execution",
"fork": false,
"created_at": "2020-12-07T14:13:15Z",
"updated_at": "2021-08-06T01:59:53Z",
"pushed_at": "2020-01-05T22:23:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 277122836,
"name": "CVE-2020-5902",
"full_name": "dwisiswant0\/CVE-2020-5902",
"owner": {
"login": "dwisiswant0",
"id": 25837540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
"html_url": "https:\/\/github.com\/dwisiswant0"
},
"html_url": "https:\/\/github.com\/dwisiswant0\/CVE-2020-5902",
"description": "CVE-2020-5902",
"fork": false,
"created_at": "2020-07-04T14:12:57Z",
"updated_at": "2021-05-10T22:58:02Z",
"pushed_at": "2020-07-04T14:21:27Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"score": 0
},
{
"id": 277243283,
"name": "CVE-2020-5902-Scanner",
@ -45,6 +68,29 @@
"watchers": 353,
"score": 0
},
{
"id": 277342677,
"name": "CVE-2020-5902",
"full_name": "ar0dd\/CVE-2020-5902",
"owner": {
"login": "ar0dd",
"id": 42455358,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42455358?v=4",
"html_url": "https:\/\/github.com\/ar0dd"
},
"html_url": "https:\/\/github.com\/ar0dd\/CVE-2020-5902",
"description": "POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!",
"fork": false,
"created_at": "2020-07-05T16:38:36Z",
"updated_at": "2021-03-05T14:05:58Z",
"pushed_at": "2020-07-05T16:44:03Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 2,
"forks": 2,
"watchers": 14,
"score": 0
},
{
"id": 277346592,
"name": "CVE-2020-5902",
@ -114,6 +160,75 @@
"watchers": 2,
"score": 0
},
{
"id": 277376523,
"name": "CVE-2020-5902",
"full_name": "nsflabs\/CVE-2020-5902",
"owner": {
"login": "nsflabs",
"id": 64648766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64648766?v=4",
"html_url": "https:\/\/github.com\/nsflabs"
},
"html_url": "https:\/\/github.com\/nsflabs\/CVE-2020-5902",
"description": null,
"fork": false,
"created_at": "2020-07-05T20:16:07Z",
"updated_at": "2021-02-15T19:00:42Z",
"pushed_at": "2020-07-05T20:32:18Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 10,
"forks": 10,
"watchers": 10,
"score": 0
},
{
"id": 277412358,
"name": "CVE-2020-5902",
"full_name": "yasserjanah\/CVE-2020-5902",
"owner": {
"login": "yasserjanah",
"id": 20858378,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20858378?v=4",
"html_url": "https:\/\/github.com\/yasserjanah"
},
"html_url": "https:\/\/github.com\/yasserjanah\/CVE-2020-5902",
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
"fork": false,
"created_at": "2020-07-06T01:12:23Z",
"updated_at": "2021-06-01T06:34:22Z",
"pushed_at": "2021-06-02T02:22:19Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 13,
"forks": 13,
"watchers": 26,
"score": 0
},
{
"id": 277422712,
"name": "RCE-CVE-2020-5902",
"full_name": "JSec1337\/RCE-CVE-2020-5902",
"owner": {
"login": "JSec1337",
"id": 62246378,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62246378?v=4",
"html_url": "https:\/\/github.com\/JSec1337"
},
"html_url": "https:\/\/github.com\/JSec1337\/RCE-CVE-2020-5902",
"description": "BIG-IP F5 Remote Code Execution",
"fork": false,
"created_at": "2020-07-06T02:21:18Z",
"updated_at": "2020-07-06T02:53:43Z",
"pushed_at": "2020-07-06T02:53:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 277438754,
"name": "CVE-2020-5902",
@ -183,6 +298,29 @@
"watchers": 8,
"score": 0
},
{
"id": 277466351,
"name": "scanner-CVE-2020-5902",
"full_name": "cybersecurityworks553\/scanner-CVE-2020-5902",
"owner": {
"login": "cybersecurityworks553",
"id": 63910792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
"html_url": "https:\/\/github.com\/cybersecurityworks553"
},
"html_url": "https:\/\/github.com\/cybersecurityworks553\/scanner-CVE-2020-5902",
"description": "CVE-2020-5902 scanner",
"fork": false,
"created_at": "2020-07-06T06:58:29Z",
"updated_at": "2021-07-31T00:54:58Z",
"pushed_at": "2020-07-06T07:16:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 277496316,
"name": "CVE-2020-5902-POC-EXP",

View file

@ -22,6 +22,29 @@
"watchers": 0,
"score": 0
},
{
"id": 277140244,
"name": "Rick_write_exp_CVE-2020-8835",
"full_name": "snappyJack\/Rick_write_exp_CVE-2020-8835",
"owner": {
"login": "snappyJack",
"id": 16055573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4",
"html_url": "https:\/\/github.com\/snappyJack"
},
"html_url": "https:\/\/github.com\/snappyJack\/Rick_write_exp_CVE-2020-8835",
"description": null,
"fork": false,
"created_at": "2020-07-04T15:51:14Z",
"updated_at": "2020-07-14T09:45:02Z",
"pushed_at": "2020-07-04T16:40:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 296130768,
"name": "CVE-2020-8835",

25
2020/CVE-2020-9768.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 298576538,
"name": "CVE-2020-9768",
"full_name": "XorgX304\/CVE-2020-9768",
"owner": {
"login": "XorgX304",
"id": 46254011,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46254011?v=4",
"html_url": "https:\/\/github.com\/XorgX304"
},
"html_url": "https:\/\/github.com\/XorgX304\/CVE-2020-9768",
"description": "AppleJPEGDriverUserClient : mach port use-after-free\/type-confusion via race condition",
"fork": false,
"created_at": "2020-09-25T13:12:04Z",
"updated_at": "2021-02-09T09:03:25Z",
"pushed_at": "2020-03-26T22:29:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1327,
"watchers_count": 1327,
"forks_count": 474,
"forks": 474,
"forks_count": 475,
"forks": 475,
"watchers": 1327,
"score": 0
},
@ -220,13 +220,13 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-08-21T01:19:20Z",
"updated_at": "2021-08-21T21:56:29Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 571,
"watchers_count": 571,
"stargazers_count": 572,
"watchers_count": 572,
"forks_count": 152,
"forks": 152,
"watchers": 571,
"watchers": 572,
"score": 0
},
{

View file

@ -726,13 +726,13 @@
"description": "ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)",
"fork": false,
"created_at": "2021-03-17T03:56:54Z",
"updated_at": "2021-08-13T02:22:38Z",
"updated_at": "2021-08-22T02:39:12Z",
"pushed_at": "2021-03-17T05:06:18Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 22,
"forks": 22,
"watchers": 76,
"watchers": 77,
"score": 0
},
{

View file

@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-08-21T20:40:44Z",
"updated_at": "2021-08-22T02:26:31Z",
"pushed_at": "2021-07-23T15:46:37Z",
"stargazers_count": 358,
"watchers_count": 358,
"stargazers_count": 359,
"watchers_count": 359,
"forks_count": 75,
"forks": 75,
"watchers": 358,
"watchers": 359,
"score": 0
},
{

View file

@ -21,5 +21,28 @@
"forks": 11,
"watchers": 85,
"score": 0
},
{
"id": 398670596,
"name": "CVE-2021-35464",
"full_name": "rood8008\/CVE-2021-35464",
"owner": {
"login": "rood8008",
"id": 49926338,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49926338?v=4",
"html_url": "https:\/\/github.com\/rood8008"
},
"html_url": "https:\/\/github.com\/rood8008\/CVE-2021-35464",
"description": null,
"fork": false,
"created_at": "2021-08-21T22:53:39Z",
"updated_at": "2021-08-21T22:58:42Z",
"pushed_at": "2021-08-21T22:58:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

514
README.md

File diff suppressed because it is too large Load diff