mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/07/11 12:11:42
This commit is contained in:
parent
b4acdc4add
commit
6742ef3951
71 changed files with 3377 additions and 30 deletions
|
@ -275,6 +275,75 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104072875,
|
||||
"name": "CVE-2017-0199",
|
||||
"full_name": "viethdgit\/CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "viethdgit",
|
||||
"id": 24888568,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24888568?v=4",
|
||||
"html_url": "https:\/\/github.com\/viethdgit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/viethdgit\/CVE-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-19T12:38:47Z",
|
||||
"updated_at": "2017-09-19T12:38:47Z",
|
||||
"pushed_at": "2017-09-19T12:47:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 109420190,
|
||||
"name": "RTF-Cleaner",
|
||||
"full_name": "nicpenning\/RTF-Cleaner",
|
||||
"owner": {
|
||||
"login": "nicpenning",
|
||||
"id": 5582679,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5582679?v=4",
|
||||
"html_url": "https:\/\/github.com\/nicpenning"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner",
|
||||
"description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-03T16:47:16Z",
|
||||
"updated_at": "2019-06-29T16:49:45Z",
|
||||
"pushed_at": "2017-11-03T20:55:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111145351,
|
||||
"name": "2017-11-17-Maldoc-Using-CVE-2017-0199",
|
||||
"full_name": "bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
|
||||
"owner": {
|
||||
"login": "bloomer1016",
|
||||
"id": 12056770,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12056770?v=4",
|
||||
"html_url": "https:\/\/github.com\/bloomer1016"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-17T20:00:29Z",
|
||||
"updated_at": "2020-03-29T03:29:38Z",
|
||||
"pushed_at": "2017-11-17T20:00:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 113558617,
|
||||
"name": "RTF-Cleaner",
|
||||
|
|
|
@ -22,6 +22,52 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 95974378,
|
||||
"name": "CVE-2017-0213",
|
||||
"full_name": "zcgonvh\/CVE-2017-0213",
|
||||
"owner": {
|
||||
"login": "zcgonvh",
|
||||
"id": 25787677,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
|
||||
"html_url": "https:\/\/github.com\/zcgonvh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
|
||||
"description": "CVE-2017-0213 for command line",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-01T16:07:04Z",
|
||||
"updated_at": "2021-05-11T18:27:31Z",
|
||||
"pushed_at": "2017-07-01T16:19:12Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105444160,
|
||||
"name": "CVE-2017-0213",
|
||||
"full_name": "billa3283\/CVE-2017-0213",
|
||||
"owner": {
|
||||
"login": "billa3283",
|
||||
"id": 32428387,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32428387?v=4",
|
||||
"html_url": "https:\/\/github.com\/billa3283"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/billa3283\/CVE-2017-0213",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-01T13:29:59Z",
|
||||
"updated_at": "2017-10-01T13:29:59Z",
|
||||
"pushed_at": "2017-10-01T13:30:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 125799686,
|
||||
"name": "CVE-2017-0213",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 106299703,
|
||||
"name": "CVE-2017-0781",
|
||||
"full_name": "ojasookert\/CVE-2017-0781",
|
||||
"owner": {
|
||||
"login": "ojasookert",
|
||||
"id": 12931198,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4",
|
||||
"html_url": "https:\/\/github.com\/ojasookert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0781",
|
||||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2021-07-02T12:38:47Z",
|
||||
"pushed_at": "2017-10-09T15:20:11Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 125669064,
|
||||
"name": "android712-blueborne",
|
||||
|
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 104278164,
|
||||
"name": "CVE-2017-0785",
|
||||
"full_name": "ojasookert\/CVE-2017-0785",
|
||||
"owner": {
|
||||
"login": "ojasookert",
|
||||
"id": 12931198,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4",
|
||||
"html_url": "https:\/\/github.com\/ojasookert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0785",
|
||||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2021-07-02T21:31:02Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"watchers": 430,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104516404,
|
||||
"name": "CVE-2017-0785",
|
||||
"full_name": "aymankhalfatni\/CVE-2017-0785",
|
||||
"owner": {
|
||||
"login": "aymankhalfatni",
|
||||
"id": 19715320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19715320?v=4",
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni\/CVE-2017-0785",
|
||||
"description": "CVE-2017-0785: BlueBorne PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-22T20:33:12Z",
|
||||
"updated_at": "2017-09-22T20:34:33Z",
|
||||
"pushed_at": "2017-09-22T20:34:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104522460,
|
||||
"name": "-CVE-2017-0785-BlueBorne-PoC",
|
||||
"full_name": "Alfa100001\/-CVE-2017-0785-BlueBorne-PoC",
|
||||
"owner": {
|
||||
"login": "Alfa100001",
|
||||
"id": 29385626,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29385626?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alfa100001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alfa100001\/-CVE-2017-0785-BlueBorne-PoC",
|
||||
"description": "CVE-2017-0785 BlueBorne PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-22T22:03:40Z",
|
||||
"updated_at": "2021-07-07T07:47:50Z",
|
||||
"pushed_at": "2017-09-22T22:23:52Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105568835,
|
||||
"name": "BlueBorne-CVE-2017-0785",
|
||||
"full_name": "Hackerscript\/BlueBorne-CVE-2017-0785",
|
||||
"owner": {
|
||||
"login": "Hackerscript",
|
||||
"id": 29609985,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29609985?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hackerscript"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hackerscript\/BlueBorne-CVE-2017-0785",
|
||||
"description": "this script is used for hack bluetooth devices CVE 2017 0785 which was done by ARMIS This File is password protected for password contact atusha@gmail.comr",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-02T18:21:43Z",
|
||||
"updated_at": "2017-10-02T18:21:43Z",
|
||||
"pushed_at": "2017-10-02T18:21:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105816209,
|
||||
"name": "blueborne",
|
||||
|
|
|
@ -1,4 +1,441 @@
|
|||
[
|
||||
{
|
||||
"id": 100002532,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "timwr\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "timwr",
|
||||
"id": 684924,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4",
|
||||
"html_url": "https:\/\/github.com\/timwr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timwr\/CVE-2017-1000117",
|
||||
"description": "Proof of concept of CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T07:03:23Z",
|
||||
"updated_at": "2021-05-04T08:13:49Z",
|
||||
"pushed_at": "2017-08-11T08:27:04Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100058519,
|
||||
"name": "test-git-vuln_CVE-2017-1000117",
|
||||
"full_name": "GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "GrahamMThomas",
|
||||
"id": 14031456,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14031456?v=4",
|
||||
"html_url": "https:\/\/github.com\/GrahamMThomas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
|
||||
"description": "Repo to test the new git vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T18:05:01Z",
|
||||
"updated_at": "2017-09-26T17:09:13Z",
|
||||
"pushed_at": "2017-08-11T20:15:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100069051,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "Manouchehri\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "Manouchehri",
|
||||
"id": 7232674,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7232674?v=4",
|
||||
"html_url": "https:\/\/github.com\/Manouchehri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Manouchehri\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T20:47:53Z",
|
||||
"updated_at": "2018-04-19T04:23:54Z",
|
||||
"pushed_at": "2017-08-11T21:26:33Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100080640,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "thelastbyte\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "thelastbyte",
|
||||
"id": 7829097,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7829097?v=4",
|
||||
"html_url": "https:\/\/github.com\/thelastbyte"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thelastbyte\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T01:10:49Z",
|
||||
"updated_at": "2017-09-01T22:06:02Z",
|
||||
"pushed_at": "2017-09-01T22:08:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100116587,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "alilangtest\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "alilangtest",
|
||||
"id": 20162983,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20162983?v=4",
|
||||
"html_url": "https:\/\/github.com\/alilangtest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alilangtest\/CVE-2017-1000117",
|
||||
"description": "test",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T14:14:55Z",
|
||||
"updated_at": "2019-05-09T09:27:01Z",
|
||||
"pushed_at": "2017-08-12T14:25:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100130122,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "VulApps\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "VulApps",
|
||||
"id": 29811930,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29811930?v=4",
|
||||
"html_url": "https:\/\/github.com\/VulApps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VulApps\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T18:20:02Z",
|
||||
"updated_at": "2020-03-21T15:06:32Z",
|
||||
"pushed_at": "2017-08-12T18:22:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100280254,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "greymd\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "greymd",
|
||||
"id": 3874767,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4",
|
||||
"html_url": "https:\/\/github.com\/greymd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/greymd\/CVE-2017-1000117",
|
||||
"description": "Check Git's vulnerability CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-14T15:05:48Z",
|
||||
"updated_at": "2021-02-17T09:50:56Z",
|
||||
"pushed_at": "2017-08-16T15:39:15Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100325886,
|
||||
"name": "Fix-CVE-2017-1000117",
|
||||
"full_name": "shogo82148\/Fix-CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "shogo82148",
|
||||
"id": 1157344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1157344?v=4",
|
||||
"html_url": "https:\/\/github.com\/shogo82148"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shogo82148\/Fix-CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T01:40:18Z",
|
||||
"updated_at": "2017-08-17T03:44:20Z",
|
||||
"pushed_at": "2017-08-17T03:44:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100357293,
|
||||
"name": "CVE-2017-1000117_wasawasa",
|
||||
"full_name": "sasairc\/CVE-2017-1000117_wasawasa",
|
||||
"owner": {
|
||||
"login": "sasairc",
|
||||
"id": 9349287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9349287?v=4",
|
||||
"html_url": "https:\/\/github.com\/sasairc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sasairc\/CVE-2017-1000117_wasawasa",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T08:39:23Z",
|
||||
"updated_at": "2017-08-15T09:39:16Z",
|
||||
"pushed_at": "2017-08-15T08:43:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100374790,
|
||||
"name": "CVE-2017-1000117-test",
|
||||
"full_name": "Shadow5523\/CVE-2017-1000117-test",
|
||||
"owner": {
|
||||
"login": "Shadow5523",
|
||||
"id": 22784789,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22784789?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shadow5523"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shadow5523\/CVE-2017-1000117-test",
|
||||
"description": "CVE-2017-1000117の検証",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-15T12:24:57Z",
|
||||
"updated_at": "2017-08-17T14:54:39Z",
|
||||
"pushed_at": "2017-08-18T02:18:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100437085,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "bells17\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "bells17",
|
||||
"id": 2158863,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2158863?v=4",
|
||||
"html_url": "https:\/\/github.com\/bells17"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bells17\/CVE-2017-1000117",
|
||||
"description": "https:\/\/github.com\/greymd\/CVE-2017-1000117 の勉強用",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T02:04:02Z",
|
||||
"updated_at": "2017-10-13T17:48:19Z",
|
||||
"pushed_at": "2017-08-16T09:35:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100437171,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "ieee0824\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "ieee0824",
|
||||
"id": 5692475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4",
|
||||
"html_url": "https:\/\/github.com\/ieee0824"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T02:05:08Z",
|
||||
"updated_at": "2017-08-16T08:10:25Z",
|
||||
"pushed_at": "2017-08-16T10:03:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100445561,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "rootclay\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "rootclay",
|
||||
"id": 29671471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29671471?v=4",
|
||||
"html_url": "https:\/\/github.com\/rootclay"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rootclay\/CVE-2017-1000117",
|
||||
"description": "CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T03:52:27Z",
|
||||
"updated_at": "2017-08-16T04:00:53Z",
|
||||
"pushed_at": "2017-08-16T06:14:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100446125,
|
||||
"name": "CVE-2017-1000117-sl",
|
||||
"full_name": "ieee0824\/CVE-2017-1000117-sl",
|
||||
"owner": {
|
||||
"login": "ieee0824",
|
||||
"id": 5692475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4",
|
||||
"html_url": "https:\/\/github.com\/ieee0824"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117-sl",
|
||||
"description": "Experiment of CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T04:01:08Z",
|
||||
"updated_at": "2017-08-16T05:42:26Z",
|
||||
"pushed_at": "2017-08-16T09:54:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100498924,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "takehaya\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "takehaya",
|
||||
"id": 10973623,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10973623?v=4",
|
||||
"html_url": "https:\/\/github.com\/takehaya"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/takehaya\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T14:34:37Z",
|
||||
"updated_at": "2017-08-16T14:34:37Z",
|
||||
"pushed_at": "2017-08-17T18:45:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100544749,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "ikmski\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "ikmski",
|
||||
"id": 6622579,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6622579?v=4",
|
||||
"html_url": "https:\/\/github.com\/ikmski"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ikmski\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-17T00:37:47Z",
|
||||
"updated_at": "2017-08-17T00:37:47Z",
|
||||
"pushed_at": "2017-08-17T00:57:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100730507,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "nkoneko\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "nkoneko",
|
||||
"id": 1922341,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4",
|
||||
"html_url": "https:\/\/github.com\/nkoneko"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nkoneko\/CVE-2017-1000117",
|
||||
"description": "GitのCommand Injectionの脆弱性を利用してスクリプトを落として実行する例",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-18T16:23:53Z",
|
||||
"updated_at": "2018-06-27T07:59:10Z",
|
||||
"pushed_at": "2017-08-18T16:30:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100926724,
|
||||
"name": "test",
|
||||
"full_name": "chenzhuo0618\/test",
|
||||
"owner": {
|
||||
"login": "chenzhuo0618",
|
||||
"id": 5562130,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5562130?v=4",
|
||||
"html_url": "https:\/\/github.com\/chenzhuo0618"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chenzhuo0618\/test",
|
||||
"description": "test for CVE-2017-1000117",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-21T07:46:16Z",
|
||||
"updated_at": "2017-08-21T07:46:48Z",
|
||||
"pushed_at": "2017-08-21T08:51:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 102318198,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "siling2017\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "siling2017",
|
||||
"id": 27729343,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27729343?v=4",
|
||||
"html_url": "https:\/\/github.com\/siling2017"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/siling2017\/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-04T04:18:19Z",
|
||||
"updated_at": "2017-09-04T04:18:29Z",
|
||||
"pushed_at": "2017-09-04T04:18:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112913757,
|
||||
"name": "CVE-2017-1000117",
|
||||
|
|
25
2017/CVE-2017-1000250.json
Normal file
25
2017/CVE-2017-1000250.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 110457097,
|
||||
"name": "CVE-2017-1000250-PoC",
|
||||
"full_name": "olav-st\/CVE-2017-1000250-PoC",
|
||||
"owner": {
|
||||
"login": "olav-st",
|
||||
"id": 1856634,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1856634?v=4",
|
||||
"html_url": "https:\/\/github.com\/olav-st"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/olav-st\/CVE-2017-1000250-PoC",
|
||||
"description": "Proof of concept exploit script for CVE-2017-1000250. Written while researching for the essay in TTM4137 Wireless Security.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-12T18:18:52Z",
|
||||
"updated_at": "2019-03-20T07:23:31Z",
|
||||
"pushed_at": "2017-11-12T19:46:35Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 104546702,
|
||||
"name": "Blueborne-CVE-2017-1000251",
|
||||
"full_name": "hayzamjs\/Blueborne-CVE-2017-1000251",
|
||||
"owner": {
|
||||
"login": "hayzamjs",
|
||||
"id": 3922884,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3922884?v=4",
|
||||
"html_url": "https:\/\/github.com\/hayzamjs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hayzamjs\/Blueborne-CVE-2017-1000251",
|
||||
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-23T06:29:31Z",
|
||||
"updated_at": "2021-04-30T12:56:20Z",
|
||||
"pushed_at": "2017-10-11T17:46:21Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105091487,
|
||||
"name": "blueborne-CVE-2017-1000251",
|
||||
"full_name": "tlatkdgus1\/blueborne-CVE-2017-1000251",
|
||||
"owner": {
|
||||
"login": "tlatkdgus1",
|
||||
"id": 13446909,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13446909?v=4",
|
||||
"html_url": "https:\/\/github.com\/tlatkdgus1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tlatkdgus1\/blueborne-CVE-2017-1000251",
|
||||
"description": "clone",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-28T02:12:57Z",
|
||||
"updated_at": "2017-09-28T02:19:14Z",
|
||||
"pushed_at": "2017-09-28T02:19:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105433963,
|
||||
"name": "blueborne-CVE-2017-1000251-POC",
|
||||
"full_name": "own2pwn\/blueborne-CVE-2017-1000251-POC",
|
||||
"owner": {
|
||||
"login": "own2pwn",
|
||||
"id": 7850039,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7850039?v=4",
|
||||
"html_url": "https:\/\/github.com\/own2pwn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/own2pwn\/blueborne-CVE-2017-1000251-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-01T10:15:40Z",
|
||||
"updated_at": "2018-11-16T07:29:50Z",
|
||||
"pushed_at": "2017-10-01T10:23:36Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 110958300,
|
||||
"name": "blueborne-CVE-2017-1000251",
|
||||
|
|
25
2017/CVE-2017-1000253.json
Normal file
25
2017/CVE-2017-1000253.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 137769369,
|
||||
"name": "PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"owner": {
|
||||
"login": "RicterZ",
|
||||
"id": 5282759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
|
||||
"html_url": "https:\/\/github.com\/RicterZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"description": "Demo-ing CVE-2017-1000253 in a container",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-18T15:22:01Z",
|
||||
"updated_at": "2020-09-21T07:09:05Z",
|
||||
"pushed_at": "2017-11-01T07:59:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-1000405.json
Normal file
25
2017/CVE-2017-1000405.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 112534496,
|
||||
"name": "HugeDirtyCowPOC",
|
||||
"full_name": "bindecy\/HugeDirtyCowPOC",
|
||||
"owner": {
|
||||
"login": "bindecy",
|
||||
"id": 33990073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33990073?v=4",
|
||||
"html_url": "https:\/\/github.com\/bindecy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bindecy\/HugeDirtyCowPOC",
|
||||
"description": "A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-29T22:19:51Z",
|
||||
"updated_at": "2021-06-29T17:12:00Z",
|
||||
"pushed_at": "2017-11-30T00:24:14Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-10661.json
Normal file
25
2017/CVE-2017-10661.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100021936,
|
||||
"name": "CVE-2017-10661_POC",
|
||||
"full_name": "GeneBlue\/CVE-2017-10661_POC",
|
||||
"owner": {
|
||||
"login": "GeneBlue",
|
||||
"id": 10919709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10919709?v=4",
|
||||
"html_url": "https:\/\/github.com\/GeneBlue"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GeneBlue\/CVE-2017-10661_POC",
|
||||
"description": "poc for cve-2017-10661",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T10:45:10Z",
|
||||
"updated_at": "2020-12-17T10:26:55Z",
|
||||
"pushed_at": "2017-08-11T10:45:56Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-11611.json
Normal file
25
2017/CVE-2017-11611.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 101361478,
|
||||
"name": "Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"full_name": "faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"owner": {
|
||||
"login": "faizzaidi",
|
||||
"id": 12153050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12153050?v=4",
|
||||
"html_url": "https:\/\/github.com\/faizzaidi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
|
||||
"description": "WolfCMS-v0.8.3.1 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-11611",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-25T03:19:05Z",
|
||||
"updated_at": "2020-07-17T05:22:39Z",
|
||||
"pushed_at": "2017-08-25T03:19:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-11816.json
Normal file
25
2017/CVE-2017-11816.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 106789971,
|
||||
"name": "CVE-2017-11816",
|
||||
"full_name": "lr3800\/CVE-2017-11816",
|
||||
"owner": {
|
||||
"login": "lr3800",
|
||||
"id": 22863274,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22863274?v=4",
|
||||
"html_url": "https:\/\/github.com\/lr3800"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lr3800\/CVE-2017-11816",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-13T07:05:55Z",
|
||||
"updated_at": "2017-10-13T07:05:55Z",
|
||||
"pushed_at": "2017-10-13T14:25:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 111305094,
|
||||
"name": "cve-2017-11882",
|
||||
"full_name": "zhouat\/cve-2017-11882",
|
||||
"owner": {
|
||||
"login": "zhouat",
|
||||
"id": 8078184,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8078184?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhouat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhouat\/cve-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-19T14:57:41Z",
|
||||
"updated_at": "2017-11-21T09:11:26Z",
|
||||
"pushed_at": "2017-11-18T14:21:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111435936,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "embedi\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"description": "Proof-of-Concept exploits for CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-20T16:35:30Z",
|
||||
"updated_at": "2021-07-02T21:29:09Z",
|
||||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 486,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111505810,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "Ridter\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "Ridter",
|
||||
"id": 6007471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ridter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ridter\/CVE-2017-11882",
|
||||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2021-07-02T21:18:56Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 498,
|
||||
"watchers_count": 498,
|
||||
"forks_count": 250,
|
||||
"forks": 250,
|
||||
"watchers": 498,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111525857,
|
||||
"name": "2017-11882_Generator",
|
||||
"full_name": "BlackMathIT\/2017-11882_Generator",
|
||||
"owner": {
|
||||
"login": "BlackMathIT",
|
||||
"id": 26303870,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26303870?v=4",
|
||||
"html_url": "https:\/\/github.com\/BlackMathIT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BlackMathIT\/2017-11882_Generator",
|
||||
"description": "CVE-2017-11882 File Generator PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T09:15:28Z",
|
||||
"updated_at": "2021-07-07T03:49:01Z",
|
||||
"pushed_at": "2017-11-22T08:38:18Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111566147,
|
||||
"name": "CVE-2017-11882",
|
||||
|
@ -22,6 +114,167 @@
|
|||
"watchers": 286,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111585219,
|
||||
"name": "CVE-2017-11882-metasploit",
|
||||
"full_name": "0x09AL\/CVE-2017-11882-metasploit",
|
||||
"owner": {
|
||||
"login": "0x09AL",
|
||||
"id": 25826294,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25826294?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x09AL"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2017-11882-metasploit",
|
||||
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T18:17:28Z",
|
||||
"updated_at": "2021-06-28T15:35:54Z",
|
||||
"pushed_at": "2017-11-21T20:34:57Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111601525,
|
||||
"name": "ABC",
|
||||
"full_name": "HZachev\/ABC",
|
||||
"owner": {
|
||||
"login": "HZachev",
|
||||
"id": 33879843,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33879843?v=4",
|
||||
"html_url": "https:\/\/github.com\/HZachev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HZachev\/ABC",
|
||||
"description": "CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T21:07:57Z",
|
||||
"updated_at": "2017-11-21T21:07:57Z",
|
||||
"pushed_at": "2017-11-21T22:04:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111619944,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "starnightcyber\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "starnightcyber",
|
||||
"id": 19260696,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19260696?v=4",
|
||||
"html_url": "https:\/\/github.com\/starnightcyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/starnightcyber\/CVE-2017-11882",
|
||||
"description": "CVE-2017-11882 exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-22T01:11:39Z",
|
||||
"updated_at": "2021-05-28T07:05:33Z",
|
||||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111637919,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "Grey-Li\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "Grey-Li",
|
||||
"id": 33873392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33873392?v=4",
|
||||
"html_url": "https:\/\/github.com\/Grey-Li"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Grey-Li\/CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-22T04:53:44Z",
|
||||
"updated_at": "2017-11-22T04:54:38Z",
|
||||
"pushed_at": "2017-11-22T04:54:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111887551,
|
||||
"name": "CVE-2017-11882-for-Kali",
|
||||
"full_name": "legendsec\/CVE-2017-11882-for-Kali",
|
||||
"owner": {
|
||||
"login": "legendsec",
|
||||
"id": 13389492,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13389492?v=4",
|
||||
"html_url": "https:\/\/github.com\/legendsec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/legendsec\/CVE-2017-11882-for-Kali",
|
||||
"description": "# CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to \/usr\/share\/metasploit-framework\/modules\/exploits\/windows\/local\/ 2) Copy the cve-2017-11882.rtf to \/usr\/share\/metasploit-framework\/data\/exploits\/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-24T07:11:13Z",
|
||||
"updated_at": "2017-11-24T07:11:13Z",
|
||||
"pushed_at": "2017-11-24T07:11:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111904379,
|
||||
"name": "cve-2017-11882",
|
||||
"full_name": "CSC-pentest\/cve-2017-11882",
|
||||
"owner": {
|
||||
"login": "CSC-pentest",
|
||||
"id": 33954862,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33954862?v=4",
|
||||
"html_url": "https:\/\/github.com\/CSC-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CSC-pentest\/cve-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-24T10:09:49Z",
|
||||
"updated_at": "2017-11-24T10:09:49Z",
|
||||
"pushed_at": "2017-11-24T10:13:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112133932,
|
||||
"name": "CVE-2017-11882-",
|
||||
"full_name": "Shadowshusky\/CVE-2017-11882-",
|
||||
"owner": {
|
||||
"login": "Shadowshusky",
|
||||
"id": 31649758,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31649758?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shadowshusky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shadowshusky\/CVE-2017-11882-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-27T01:50:44Z",
|
||||
"updated_at": "2021-03-10T22:04:44Z",
|
||||
"pushed_at": "2017-11-27T01:50:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117080574,
|
||||
"name": "CVE-2018-0802",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 111536144,
|
||||
"name": "CVE-2017-12149",
|
||||
"full_name": "sevck\/CVE-2017-12149",
|
||||
"owner": {
|
||||
"login": "sevck",
|
||||
"id": 11308052,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11308052?v=4",
|
||||
"html_url": "https:\/\/github.com\/sevck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sevck\/CVE-2017-12149",
|
||||
"description": "CVE-2017-12149 JBOSS as 6.X反序列化(反弹shell版)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T10:48:24Z",
|
||||
"updated_at": "2021-01-28T01:58:11Z",
|
||||
"pushed_at": "2017-11-22T06:59:57Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112277258,
|
||||
"name": "jboss-_CVE-2017-12149",
|
||||
|
|
25
2017/CVE-2017-12426.json
Normal file
25
2017/CVE-2017-12426.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100264267,
|
||||
"name": "CVE-2017-12426",
|
||||
"full_name": "sm-paul-schuette\/CVE-2017-12426",
|
||||
"owner": {
|
||||
"login": "sm-paul-schuette",
|
||||
"id": 29304646,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29304646?v=4",
|
||||
"html_url": "https:\/\/github.com\/sm-paul-schuette"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sm-paul-schuette\/CVE-2017-12426",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-14T12:18:15Z",
|
||||
"updated_at": "2017-08-14T12:18:15Z",
|
||||
"pushed_at": "2017-08-14T12:19:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-12611.json
Normal file
25
2017/CVE-2017-12611.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 102809812,
|
||||
"name": "S2-053-CVE-2017-12611",
|
||||
"full_name": "brianwrf\/S2-053-CVE-2017-12611",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/S2-053-CVE-2017-12611",
|
||||
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T02:50:37Z",
|
||||
"updated_at": "2020-12-14T01:19:43Z",
|
||||
"pushed_at": "2017-09-08T11:59:20Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,98 @@
|
|||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104743685,
|
||||
"name": "cve-2017-12615",
|
||||
"full_name": "mefulton\/cve-2017-12615",
|
||||
"owner": {
|
||||
"login": "mefulton",
|
||||
"id": 27797094,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27797094?v=4",
|
||||
"html_url": "https:\/\/github.com\/mefulton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mefulton\/cve-2017-12615",
|
||||
"description": "just a python script for cve-2017-12615",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-25T11:53:02Z",
|
||||
"updated_at": "2021-04-15T09:29:09Z",
|
||||
"pushed_at": "2017-10-01T08:13:44Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 106053959,
|
||||
"name": "POC-CVE-2017-12615-or-CVE-2017-12717",
|
||||
"full_name": "zi0Black\/POC-CVE-2017-12615-or-CVE-2017-12717",
|
||||
"owner": {
|
||||
"login": "zi0Black",
|
||||
"id": 13380579,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13380579?v=4",
|
||||
"html_url": "https:\/\/github.com\/zi0Black"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zi0Black\/POC-CVE-2017-12615-or-CVE-2017-12717",
|
||||
"description": "CVE-2017-12617 and CVE-2017-12615 for tomcat server",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-06T22:04:23Z",
|
||||
"updated_at": "2019-03-06T16:07:08Z",
|
||||
"pushed_at": "2017-10-10T14:23:31Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 109152824,
|
||||
"name": "cve-2017-12615",
|
||||
"full_name": "wsg00d\/cve-2017-12615",
|
||||
"owner": {
|
||||
"login": "wsg00d",
|
||||
"id": 20575929,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20575929?v=4",
|
||||
"html_url": "https:\/\/github.com\/wsg00d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wsg00d\/cve-2017-12615",
|
||||
"description": "tomcat-put-cve-2017-12615",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-01T16:05:32Z",
|
||||
"updated_at": "2018-04-30T18:16:21Z",
|
||||
"pushed_at": "2017-11-01T16:12:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112277075,
|
||||
"name": "CVE-2017-12615",
|
||||
"full_name": "BeyondCy\/CVE-2017-12615",
|
||||
"owner": {
|
||||
"login": "BeyondCy",
|
||||
"id": 4694785,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4694785?v=4",
|
||||
"html_url": "https:\/\/github.com\/BeyondCy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BeyondCy\/CVE-2017-12615",
|
||||
"description": "Tomcat 远程代码执行漏洞 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-28T02:51:16Z",
|
||||
"updated_at": "2020-11-28T11:13:12Z",
|
||||
"pushed_at": "2017-10-18T13:15:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 115383252,
|
||||
"name": "CVE-2017-12615",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 105951164,
|
||||
"name": "CVE-2017-12617",
|
||||
"full_name": "cyberheartmi9\/CVE-2017-12617",
|
||||
"owner": {
|
||||
"login": "cyberheartmi9",
|
||||
"id": 12415756,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12415756?v=4",
|
||||
"html_url": "https:\/\/github.com\/cyberheartmi9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cyberheartmi9\/CVE-2017-12617",
|
||||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2021-07-10T15:47:27Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"forks_count": 136,
|
||||
"forks": 136,
|
||||
"watchers": 358,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120838002,
|
||||
"name": "CVE-2017-12617",
|
||||
|
|
25
2017/CVE-2017-12792.json
Normal file
25
2017/CVE-2017-12792.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 107090388,
|
||||
"name": "cve-2017-12792",
|
||||
"full_name": "ZZS2017\/cve-2017-12792",
|
||||
"owner": {
|
||||
"login": "ZZS2017",
|
||||
"id": 30464951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30464951?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZZS2017"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZZS2017\/cve-2017-12792",
|
||||
"description": "NexusPHP CSRF+XSS",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-16T07:06:19Z",
|
||||
"updated_at": "2019-11-21T10:28:20Z",
|
||||
"pushed_at": "2017-08-21T09:38:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-12852.json
Normal file
25
2017/CVE-2017-12852.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 105343958,
|
||||
"name": "numpy-1.13.1",
|
||||
"full_name": "BT123\/numpy-1.13.1",
|
||||
"owner": {
|
||||
"login": "BT123",
|
||||
"id": 9165608,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9165608?v=4",
|
||||
"html_url": "https:\/\/github.com\/BT123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BT123\/numpy-1.13.1",
|
||||
"description": "test the CVE-2017-12852 in numpy v1.13.1 and v1.13.3 has fixed the bug ",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-30T05:21:48Z",
|
||||
"updated_at": "2017-11-03T06:18:22Z",
|
||||
"pushed_at": "2017-10-20T03:34:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-12943.json
Normal file
25
2017/CVE-2017-12943.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 105268887,
|
||||
"name": "D-Link",
|
||||
"full_name": "aymankhalfatni\/D-Link",
|
||||
"owner": {
|
||||
"login": "aymankhalfatni",
|
||||
"id": 19715320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19715320?v=4",
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni\/D-Link",
|
||||
"description": "CVE-2017-12943",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-29T12:18:40Z",
|
||||
"updated_at": "2017-09-29T12:18:40Z",
|
||||
"pushed_at": "2017-09-29T12:22:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 21,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 110805304,
|
||||
"name": "CVE-2017-13089",
|
||||
"full_name": "mzeyong\/CVE-2017-13089",
|
||||
"owner": {
|
||||
"login": "mzeyong",
|
||||
"id": 20426501,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20426501?v=4",
|
||||
"html_url": "https:\/\/github.com\/mzeyong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mzeyong\/CVE-2017-13089",
|
||||
"description": "CVE-2017-13089",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-15T08:22:58Z",
|
||||
"updated_at": "2021-03-09T00:50:44Z",
|
||||
"pushed_at": "2017-11-15T08:36:12Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-13872.json
Normal file
25
2017/CVE-2017-13872.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 112584924,
|
||||
"name": "CVE-2017-13872-Patch",
|
||||
"full_name": "giovannidispoto\/CVE-2017-13872-Patch",
|
||||
"owner": {
|
||||
"login": "giovannidispoto",
|
||||
"id": 7195434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7195434?v=4",
|
||||
"html_url": "https:\/\/github.com\/giovannidispoto"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/giovannidispoto\/CVE-2017-13872-Patch",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-30T08:22:00Z",
|
||||
"updated_at": "2017-11-30T08:23:41Z",
|
||||
"pushed_at": "2017-11-30T15:26:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-14105.json
Normal file
25
2017/CVE-2017-14105.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 102123441,
|
||||
"name": "CVE-2017-14105",
|
||||
"full_name": "theguly\/CVE-2017-14105",
|
||||
"owner": {
|
||||
"login": "theguly",
|
||||
"id": 1745802,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1745802?v=4",
|
||||
"html_url": "https:\/\/github.com\/theguly"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/theguly\/CVE-2017-14105",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-01T14:51:31Z",
|
||||
"updated_at": "2019-01-08T00:25:52Z",
|
||||
"pushed_at": "2017-09-14T13:14:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-14262.json
Normal file
25
2017/CVE-2017-14262.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 102810621,
|
||||
"name": "CVE-2017-14262",
|
||||
"full_name": "zzz66686\/CVE-2017-14262",
|
||||
"owner": {
|
||||
"login": "zzz66686",
|
||||
"id": 14144972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzz66686"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14262",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T02:59:21Z",
|
||||
"updated_at": "2020-12-02T19:55:31Z",
|
||||
"pushed_at": "2017-09-13T14:39:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-14263.json
Normal file
25
2017/CVE-2017-14263.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 102832029,
|
||||
"name": "CVE-2017-14263",
|
||||
"full_name": "zzz66686\/CVE-2017-14263",
|
||||
"owner": {
|
||||
"login": "zzz66686",
|
||||
"id": 14144972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzz66686"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14263",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T07:27:13Z",
|
||||
"updated_at": "2020-05-18T10:42:14Z",
|
||||
"pushed_at": "2017-09-13T14:40:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-14491.json
Normal file
25
2017/CVE-2017-14491.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 108858920,
|
||||
"name": "dnsmasq-2.4.1-fix-CVE-2017-14491",
|
||||
"full_name": "skyformat99\/dnsmasq-2.4.1-fix-CVE-2017-14491",
|
||||
"owner": {
|
||||
"login": "skyformat99",
|
||||
"id": 10938976,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10938976?v=4",
|
||||
"html_url": "https:\/\/github.com\/skyformat99"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/skyformat99\/dnsmasq-2.4.1-fix-CVE-2017-14491",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-30T14:02:52Z",
|
||||
"updated_at": "2020-07-25T01:12:06Z",
|
||||
"pushed_at": "2017-10-30T01:43:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 107277248,
|
||||
"name": "Infineon-CVE-2017-15361",
|
||||
"full_name": "lva\/Infineon-CVE-2017-15361",
|
||||
"owner": {
|
||||
"login": "lva",
|
||||
"id": 1962037,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1962037?v=4",
|
||||
"html_url": "https:\/\/github.com\/lva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lva\/Infineon-CVE-2017-15361",
|
||||
"description": "Simple PowerShell script to check whether a computer is using an Infineon TPM chip that is vulnerable to CVE-2017-15361.",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-17T14:07:45Z",
|
||||
"updated_at": "2017-10-23T02:23:23Z",
|
||||
"pushed_at": "2017-10-19T11:24:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107299810,
|
||||
"name": "rocacheck",
|
||||
"full_name": "titanous\/rocacheck",
|
||||
"owner": {
|
||||
"login": "titanous",
|
||||
"id": 13026,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13026?v=4",
|
||||
"html_url": "https:\/\/github.com\/titanous"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/titanous\/rocacheck",
|
||||
"description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-17T17:08:22Z",
|
||||
"updated_at": "2021-02-06T07:54:35Z",
|
||||
"pushed_at": "2017-10-23T19:39:21Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107551756,
|
||||
"name": "RocaCmTest",
|
||||
"full_name": "jnpuskar\/RocaCmTest",
|
||||
"owner": {
|
||||
"login": "jnpuskar",
|
||||
"id": 8107471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8107471?v=4",
|
||||
"html_url": "https:\/\/github.com\/jnpuskar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jnpuskar\/RocaCmTest",
|
||||
"description": "Windows tool that analyzes your computer for Infineon TPM weak RSA keys (CVE-2017-15361) ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-19T13:42:52Z",
|
||||
"updated_at": "2017-10-19T17:24:19Z",
|
||||
"pushed_at": "2017-10-20T12:09:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107592667,
|
||||
"name": "Detect-CVE-2017-15361-TPM",
|
||||
|
@ -45,6 +114,29 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 108287639,
|
||||
"name": "roca",
|
||||
"full_name": "0xxon\/roca",
|
||||
"owner": {
|
||||
"login": "0xxon",
|
||||
"id": 1538460,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xxon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xxon\/roca",
|
||||
"description": "Reimplementation of CVE-2017-15361 checker in C",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-25T15:16:11Z",
|
||||
"updated_at": "2017-10-25T15:16:43Z",
|
||||
"pushed_at": "2017-10-25T15:16:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 309390412,
|
||||
"name": "Attacco-ROCA-sulla-vulnerabilita-CVE-2017-15361",
|
||||
|
|
25
2017/CVE-2017-15394.json
Normal file
25
2017/CVE-2017-15394.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 112094225,
|
||||
"name": "CVE-2017-15394",
|
||||
"full_name": "sudosammy\/CVE-2017-15394",
|
||||
"owner": {
|
||||
"login": "sudosammy",
|
||||
"id": 18524051,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18524051?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudosammy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudosammy\/CVE-2017-15394",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-11-26T15:32:04Z",
|
||||
"updated_at": "2017-11-26T15:32:04Z",
|
||||
"pushed_at": "2017-11-26T15:32:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-16524.json
Normal file
25
2017/CVE-2017-16524.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 109582148,
|
||||
"name": "CVE-2017-16524",
|
||||
"full_name": "realistic-security\/CVE-2017-16524",
|
||||
"owner": {
|
||||
"login": "realistic-security",
|
||||
"id": 33375077,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33375077?v=4",
|
||||
"html_url": "https:\/\/github.com\/realistic-security"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/realistic-security\/CVE-2017-16524",
|
||||
"description": "Unrestricted file upload vulnerability - Web Viewer 1.0.0.193 on Samsung SRN-1670D",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-05T13:32:43Z",
|
||||
"updated_at": "2019-11-18T19:42:37Z",
|
||||
"pushed_at": "2017-11-05T23:17:44Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-16806.json
Normal file
25
2017/CVE-2017-16806.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 110611562,
|
||||
"name": "ulteriusExploit",
|
||||
"full_name": "rickoooooo\/ulteriusExploit",
|
||||
"owner": {
|
||||
"login": "rickoooooo",
|
||||
"id": 33641230,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33641230?v=4",
|
||||
"html_url": "https:\/\/github.com\/rickoooooo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rickoooooo\/ulteriusExploit",
|
||||
"description": "Python exploit for CVE-2017-16806",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-13T22:48:46Z",
|
||||
"updated_at": "2017-11-13T22:52:09Z",
|
||||
"pushed_at": "2017-11-13T23:04:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-18486.json
Normal file
25
2017/CVE-2017-18486.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 104919233,
|
||||
"name": "JitBit_Helpdesk_Auth_Bypass",
|
||||
"full_name": "Kc57\/JitBit_Helpdesk_Auth_Bypass",
|
||||
"owner": {
|
||||
"login": "Kc57",
|
||||
"id": 16500627,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16500627?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kc57"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kc57\/JitBit_Helpdesk_Auth_Bypass",
|
||||
"description": "Utility to derive the shared secret on a JitBit Helpdesk install which can be used for authentication bypass (CVE-2017-18486)",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-26T17:51:01Z",
|
||||
"updated_at": "2019-08-09T18:35:26Z",
|
||||
"pushed_at": "2017-09-26T17:56:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-2368.json
Normal file
25
2017/CVE-2017-2368.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100696664,
|
||||
"name": "CVE-2017-2368",
|
||||
"full_name": "vincedes3\/CVE-2017-2368",
|
||||
"owner": {
|
||||
"login": "vincedes3",
|
||||
"id": 26314689,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314689?v=4",
|
||||
"html_url": "https:\/\/github.com\/vincedes3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vincedes3\/CVE-2017-2368",
|
||||
"description": "CVE-2017-2368 VCF Message App Crash Bug",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-18T09:33:57Z",
|
||||
"updated_at": "2017-08-18T09:33:57Z",
|
||||
"pushed_at": "2017-08-18T09:36:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-2388.json
Normal file
25
2017/CVE-2017-2388.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 99374230,
|
||||
"name": "IOFireWireFamily-null-deref",
|
||||
"full_name": "bazad\/IOFireWireFamily-null-deref",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/IOFireWireFamily-null-deref",
|
||||
"description": "CVE-2017-2388: Null-pointer dereference in IOFireWireFamily.",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-04T19:35:20Z",
|
||||
"updated_at": "2018-09-24T18:54:13Z",
|
||||
"pushed_at": "2017-08-16T20:16:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-3241.json
Normal file
25
2017/CVE-2017-3241.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 96219146,
|
||||
"name": "CVE-2017-3241-POC",
|
||||
"full_name": "xfei3\/CVE-2017-3241-POC",
|
||||
"owner": {
|
||||
"login": "xfei3",
|
||||
"id": 29874084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29874084?v=4",
|
||||
"html_url": "https:\/\/github.com\/xfei3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC",
|
||||
"description": "POC for java RMI deserialization vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-04T13:05:46Z",
|
||||
"updated_at": "2020-03-29T07:05:46Z",
|
||||
"pushed_at": "2017-07-19T23:55:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 96573883,
|
||||
"name": "CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T20:21:51Z",
|
||||
"updated_at": "2017-08-23T09:24:55Z",
|
||||
"pushed_at": "2017-07-11T15:36:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 108940978,
|
||||
"name": "CVE-2017-5123",
|
||||
"full_name": "FloatingGuy\/CVE-2017-5123",
|
||||
"owner": {
|
||||
"login": "FloatingGuy",
|
||||
"id": 6472909,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6472909?v=4",
|
||||
"html_url": "https:\/\/github.com\/FloatingGuy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FloatingGuy\/CVE-2017-5123",
|
||||
"description": "linux kernel exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-31T03:35:31Z",
|
||||
"updated_at": "2017-12-31T09:13:28Z",
|
||||
"pushed_at": "2017-10-31T03:39:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 109344615,
|
||||
"name": "CVE-2017-5123",
|
||||
"full_name": "0x5068656e6f6c\/CVE-2017-5123",
|
||||
"owner": {
|
||||
"login": "0x5068656e6f6c",
|
||||
"id": 22329435,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22329435?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x5068656e6f6c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x5068656e6f6c\/CVE-2017-5123",
|
||||
"description": "Exploit for the linux kernel vulnerability CVE-2017-5123",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-03T02:52:26Z",
|
||||
"updated_at": "2018-10-20T20:12:24Z",
|
||||
"pushed_at": "2017-11-03T02:58:39Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123423508,
|
||||
"name": "exploiting-cve-2017-5123",
|
||||
|
|
25
2017/CVE-2017-5124.json
Normal file
25
2017/CVE-2017-5124.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 110604918,
|
||||
"name": "CVE-2017-5124",
|
||||
"full_name": "Bo0oM\/CVE-2017-5124",
|
||||
"owner": {
|
||||
"login": "Bo0oM",
|
||||
"id": 3492361,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3492361?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bo0oM"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bo0oM\/CVE-2017-5124",
|
||||
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-13T21:33:55Z",
|
||||
"updated_at": "2021-07-03T12:25:46Z",
|
||||
"pushed_at": "2017-11-14T10:26:28Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 160,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 107852472,
|
||||
"name": "wpUsersScan",
|
||||
"full_name": "teambugsbunny\/wpUsersScan",
|
||||
"owner": {
|
||||
"login": "teambugsbunny",
|
||||
"id": 32997799,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32997799?v=4",
|
||||
"html_url": "https:\/\/github.com\/teambugsbunny"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan",
|
||||
"description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-22T09:22:28Z",
|
||||
"updated_at": "2020-04-06T12:23:41Z",
|
||||
"pushed_at": "2017-06-11T16:47:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121831599,
|
||||
"name": "wpUsersScan",
|
||||
|
|
|
@ -850,6 +850,98 @@
|
|||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 98150795,
|
||||
"name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"owner": {
|
||||
"login": "R4v3nBl4ck",
|
||||
"id": 30399308,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30399308?v=4",
|
||||
"html_url": "https:\/\/github.com\/R4v3nBl4ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"description": "Exploit created by: R4v3nBl4ck end Pacman",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-24T05:05:28Z",
|
||||
"updated_at": "2020-07-12T14:06:08Z",
|
||||
"pushed_at": "2017-07-24T23:55:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100141854,
|
||||
"name": "CVE-2017-5638",
|
||||
"full_name": "Xhendos\/CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "Xhendos",
|
||||
"id": 16403693,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16403693?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xhendos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xhendos\/CVE-2017-5638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-12T23:00:14Z",
|
||||
"updated_at": "2017-08-12T23:04:13Z",
|
||||
"pushed_at": "2017-08-26T17:32:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 101267457,
|
||||
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||||
"full_name": "TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||||
"owner": {
|
||||
"login": "TamiiLambrado",
|
||||
"id": 23249848,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23249848?v=4",
|
||||
"html_url": "https:\/\/github.com\/TamiiLambrado"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-08-24T07:36:14Z",
|
||||
"updated_at": "2017-08-24T07:36:14Z",
|
||||
"pushed_at": "2017-08-24T07:36:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104686879,
|
||||
"name": "strutser",
|
||||
"full_name": "invisiblethreat\/strutser",
|
||||
"owner": {
|
||||
"login": "invisiblethreat",
|
||||
"id": 2525006,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2525006?v=4",
|
||||
"html_url": "https:\/\/github.com\/invisiblethreat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/invisiblethreat\/strutser",
|
||||
"description": "Check for Struts Vulnerability CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-25T00:40:57Z",
|
||||
"updated_at": "2019-06-11T14:15:40Z",
|
||||
"pushed_at": "2017-09-28T21:10:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105124155,
|
||||
"name": "CVE-2017-5638",
|
||||
|
@ -873,6 +965,52 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107489354,
|
||||
"name": "Apache-Struts",
|
||||
"full_name": "c002\/Apache-Struts",
|
||||
"owner": {
|
||||
"login": "c002",
|
||||
"id": 26592580,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26592580?v=4",
|
||||
"html_url": "https:\/\/github.com\/c002"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c002\/Apache-Struts",
|
||||
"description": " An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-19T02:40:45Z",
|
||||
"updated_at": "2020-05-17T04:32:06Z",
|
||||
"pushed_at": "2017-05-28T14:03:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 108805305,
|
||||
"name": "Common-Vulnerability-and-Exploit",
|
||||
"full_name": "donaldashdown\/Common-Vulnerability-and-Exploit",
|
||||
"owner": {
|
||||
"login": "donaldashdown",
|
||||
"id": 24925373,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24925373?v=4",
|
||||
"html_url": "https:\/\/github.com\/donaldashdown"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/donaldashdown\/Common-Vulnerability-and-Exploit",
|
||||
"description": "This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-30T05:21:53Z",
|
||||
"updated_at": "2017-10-30T05:21:53Z",
|
||||
"pushed_at": "2017-11-11T23:32:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117999664,
|
||||
"name": "cybersecurity-struts2",
|
||||
|
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 8,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 98579784,
|
||||
"name": "amt_auth_bypass_poc",
|
||||
"full_name": "embedi\/amt_auth_bypass_poc",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
|
||||
"description": "CVE-2017-5689 Proof-of-Concept exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-27T21:06:08Z",
|
||||
"updated_at": "2021-05-06T04:25:05Z",
|
||||
"pushed_at": "2017-07-27T21:08:49Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-5721.json
Normal file
25
2017/CVE-2017-5721.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 107970036,
|
||||
"name": "smm_usbrt_poc",
|
||||
"full_name": "embedi\/smm_usbrt_poc",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/smm_usbrt_poc",
|
||||
"description": "CVE-2017-5721 Proof-of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-23T11:00:18Z",
|
||||
"updated_at": "2021-03-12T00:55:15Z",
|
||||
"pushed_at": "2017-10-23T12:41:22Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in ",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T09:43:04Z",
|
||||
"updated_at": "2021-07-08T22:46:46Z",
|
||||
"updated_at": "2021-07-11T01:23:44Z",
|
||||
"pushed_at": "2018-02-19T03:04:07Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
48
2017/CVE-2017-7047.json
Normal file
48
2017/CVE-2017-7047.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 99396176,
|
||||
"name": "Triple_Fetch-Kernel-Creds",
|
||||
"full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds",
|
||||
"owner": {
|
||||
"login": "JosephShenton",
|
||||
"id": 12966231,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12966231?v=4",
|
||||
"html_url": "https:\/\/github.com\/JosephShenton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds",
|
||||
"description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-05T03:23:13Z",
|
||||
"updated_at": "2020-08-25T15:10:04Z",
|
||||
"pushed_at": "2017-08-05T09:21:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 99915573,
|
||||
"name": "Triple_fetch",
|
||||
"full_name": "q1f3\/Triple_fetch",
|
||||
"owner": {
|
||||
"login": "q1f3",
|
||||
"id": 9603950,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9603950?v=4",
|
||||
"html_url": "https:\/\/github.com\/q1f3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/q1f3\/Triple_fetch",
|
||||
"description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-10T11:24:47Z",
|
||||
"updated_at": "2020-04-07T05:58:43Z",
|
||||
"pushed_at": "2017-08-03T23:47:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2017/CVE-2017-7089.json
Normal file
48
2017/CVE-2017-7089.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 105647741,
|
||||
"name": "CVE-2017-7089",
|
||||
"full_name": "Bo0oM\/CVE-2017-7089",
|
||||
"owner": {
|
||||
"login": "Bo0oM",
|
||||
"id": 3492361,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3492361?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bo0oM"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bo0oM\/CVE-2017-7089",
|
||||
"description": "Webkit uxss exploit (CVE-2017-7089)",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-03T12:13:43Z",
|
||||
"updated_at": "2021-04-30T17:31:14Z",
|
||||
"pushed_at": "2017-10-03T12:23:43Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 106570313,
|
||||
"name": "Safari_Mac",
|
||||
"full_name": "aymankhalfatni\/Safari_Mac",
|
||||
"owner": {
|
||||
"login": "aymankhalfatni",
|
||||
"id": 19715320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19715320?v=4",
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aymankhalfatni\/Safari_Mac",
|
||||
"description": "Exploit Safari CVE-2017-7089",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-11T15:09:45Z",
|
||||
"updated_at": "2020-04-07T05:36:45Z",
|
||||
"pushed_at": "2017-10-11T15:10:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 97701175,
|
||||
"name": "CVE-2017-7529",
|
||||
"full_name": "liusec\/CVE-2017-7529",
|
||||
"owner": {
|
||||
"login": "liusec",
|
||||
"id": 13982415,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4",
|
||||
"html_url": "https:\/\/github.com\/liusec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-07-19T09:55:42Z",
|
||||
"updated_at": "2021-04-14T04:33:27Z",
|
||||
"pushed_at": "2017-07-21T06:29:35Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 138050203,
|
||||
"name": "CVE-2017-7529_PoC",
|
||||
|
|
25
2017/CVE-2017-7912.json
Normal file
25
2017/CVE-2017-7912.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 103750394,
|
||||
"name": "CVE-2017-7912_Sneak",
|
||||
"full_name": "homjxi0e\/CVE-2017-7912_Sneak",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7912_Sneak",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-16T12:27:48Z",
|
||||
"updated_at": "2017-09-16T12:27:48Z",
|
||||
"pushed_at": "2017-09-16T12:27:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-7998.json
Normal file
25
2017/CVE-2017-7998.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 101155833,
|
||||
"name": "CVE-2017-7998",
|
||||
"full_name": "homjxi0e\/CVE-2017-7998",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7998",
|
||||
"description": " Denial of service by Exit in Terminal !! ",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-23T08:17:10Z",
|
||||
"updated_at": "2017-10-03T14:38:32Z",
|
||||
"pushed_at": "2017-10-11T16:52:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 105420015,
|
||||
"name": "CVE-2017-8046-DEMO",
|
||||
"full_name": "Soontao\/CVE-2017-8046-DEMO",
|
||||
"owner": {
|
||||
"login": "Soontao",
|
||||
"id": 10473459,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10473459?v=4",
|
||||
"html_url": "https:\/\/github.com\/Soontao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Soontao\/CVE-2017-8046-DEMO",
|
||||
"description": "SPRING DATA REST CVE-2017-8046 DEMO",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-01T04:52:24Z",
|
||||
"updated_at": "2017-10-09T09:05:05Z",
|
||||
"pushed_at": "2017-10-01T10:54:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 110002512,
|
||||
"name": "spring-data-rest-CVE-2017-8046",
|
||||
|
|
|
@ -45,6 +45,29 @@
|
|||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 99573027,
|
||||
"name": "CVE-2017-8464-exp-generator",
|
||||
"full_name": "Securitykid\/CVE-2017-8464-exp-generator",
|
||||
"owner": {
|
||||
"login": "Securitykid",
|
||||
"id": 30798606,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30798606?v=4",
|
||||
"html_url": "https:\/\/github.com\/Securitykid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8464-exp-generator",
|
||||
"description": "this tool can generate a exp for cve-2017-8486, it is developed by python",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-07T11:56:11Z",
|
||||
"updated_at": "2021-03-14T04:52:32Z",
|
||||
"pushed_at": "2017-08-07T12:42:33Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105686692,
|
||||
"name": "usbhijacking",
|
||||
|
|
25
2017/CVE-2017-8625.json
Normal file
25
2017/CVE-2017-8625.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100988934,
|
||||
"name": "CVE-2017-8625_Bypass_UMCI",
|
||||
"full_name": "homjxi0e\/CVE-2017-8625_Bypass_UMCI",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8625_Bypass_UMCI",
|
||||
"description": "Bypass Feature UMCI in Internet Explorer",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-21T20:14:07Z",
|
||||
"updated_at": "2020-11-18T13:22:34Z",
|
||||
"pushed_at": "2017-08-25T13:04:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-8641.json
Normal file
25
2017/CVE-2017-8641.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100988677,
|
||||
"name": "CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"full_name": "homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-21T20:11:11Z",
|
||||
"updated_at": "2017-08-23T09:18:42Z",
|
||||
"pushed_at": "2017-08-23T09:09:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,121 @@
|
|||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103416775,
|
||||
"name": "CVE-2017-8759",
|
||||
"full_name": "nccgroup\/CVE-2017-8759",
|
||||
"owner": {
|
||||
"login": "nccgroup",
|
||||
"id": 4067082,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4",
|
||||
"html_url": "https:\/\/github.com\/nccgroup"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nccgroup\/CVE-2017-8759",
|
||||
"description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T15:24:10Z",
|
||||
"updated_at": "2021-06-11T19:04:54Z",
|
||||
"pushed_at": "2017-09-19T18:06:41Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103428172,
|
||||
"name": "CVE-2017-8759",
|
||||
"full_name": "vysecurity\/CVE-2017-8759",
|
||||
"owner": {
|
||||
"login": "vysecurity",
|
||||
"id": 3596242,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
|
||||
"html_url": "https:\/\/github.com\/vysecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759",
|
||||
"description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T17:10:18Z",
|
||||
"updated_at": "2021-06-11T19:17:58Z",
|
||||
"pushed_at": "2017-09-14T10:18:40Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103447049,
|
||||
"name": "CVE-2017-8759",
|
||||
"full_name": "BasuCert\/CVE-2017-8759",
|
||||
"owner": {
|
||||
"login": "BasuCert",
|
||||
"id": 29852431,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
|
||||
"html_url": "https:\/\/github.com\/BasuCert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759",
|
||||
"description": "CVE-2017-8759 Research",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T20:27:29Z",
|
||||
"updated_at": "2020-05-18T10:42:14Z",
|
||||
"pushed_at": "2017-09-15T13:14:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103447404,
|
||||
"name": "CVE-2017-8759-Exploit-sample2",
|
||||
"full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2",
|
||||
"owner": {
|
||||
"login": "tahisaad6",
|
||||
"id": 21042116,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21042116?v=4",
|
||||
"html_url": "https:\/\/github.com\/tahisaad6"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T20:31:43Z",
|
||||
"updated_at": "2017-09-13T20:31:43Z",
|
||||
"pushed_at": "2017-09-13T20:31:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103493845,
|
||||
"name": "CVE-2017-8759_-SOAP_WSDL",
|
||||
"full_name": "homjxi0e\/CVE-2017-8759_-SOAP_WSDL",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8759_-SOAP_WSDL",
|
||||
"description": "CVE-2017-8759 Remote Code Execution Vulnerability On SOAP WDSL - Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.5",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-14T06:20:28Z",
|
||||
"updated_at": "2018-11-16T12:24:03Z",
|
||||
"pushed_at": "2017-09-21T16:41:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103517315,
|
||||
"name": "CVE-2017-8759",
|
||||
|
@ -68,6 +183,98 @@
|
|||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103865283,
|
||||
"name": "CVE-2017-8759",
|
||||
"full_name": "JonasUliana\/CVE-2017-8759",
|
||||
"owner": {
|
||||
"login": "JonasUliana",
|
||||
"id": 29503841,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29503841?v=4",
|
||||
"html_url": "https:\/\/github.com\/JonasUliana"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JonasUliana\/CVE-2017-8759",
|
||||
"description": "Simple C# implementation of CVE-2017-8759",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-17T22:05:56Z",
|
||||
"updated_at": "2018-11-16T12:24:03Z",
|
||||
"pushed_at": "2017-09-17T22:20:36Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103896322,
|
||||
"name": "CVE-2017-8759",
|
||||
"full_name": "Securitykid\/CVE-2017-8759",
|
||||
"owner": {
|
||||
"login": "Securitykid",
|
||||
"id": 30798606,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30798606?v=4",
|
||||
"html_url": "https:\/\/github.com\/Securitykid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8759",
|
||||
"description": "CVE-2017-8759",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-18T05:35:57Z",
|
||||
"updated_at": "2017-09-18T05:35:57Z",
|
||||
"pushed_at": "2017-09-18T05:35:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104033989,
|
||||
"name": "CVE-2017-8759-exploits",
|
||||
"full_name": "ashr\/CVE-2017-8759-exploits",
|
||||
"owner": {
|
||||
"login": "ashr",
|
||||
"id": 171286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171286?v=4",
|
||||
"html_url": "https:\/\/github.com\/ashr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ashr\/CVE-2017-8759-exploits",
|
||||
"description": "Two versions of CVE-2017-8759 exploits",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-19T06:12:10Z",
|
||||
"updated_at": "2020-04-07T05:43:28Z",
|
||||
"pushed_at": "2017-09-19T06:19:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104625403,
|
||||
"name": "CVE-2017-8759",
|
||||
"full_name": "l0n3rs\/CVE-2017-8759",
|
||||
"owner": {
|
||||
"login": "l0n3rs",
|
||||
"id": 31120718,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4",
|
||||
"html_url": "https:\/\/github.com\/l0n3rs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l0n3rs\/CVE-2017-8759",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-24T06:58:55Z",
|
||||
"updated_at": "2017-09-24T06:58:55Z",
|
||||
"pushed_at": "2017-09-24T06:59:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161397133,
|
||||
"name": "CVE-2017-8759",
|
||||
|
|
25
2017/CVE-2017-9097.json
Normal file
25
2017/CVE-2017-9097.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 116008243,
|
||||
"name": "AntiWeb_testing-Suite",
|
||||
"full_name": "MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"owner": {
|
||||
"login": "MDudek-ICS",
|
||||
"id": 31083304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4",
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T11:28:40Z",
|
||||
"updated_at": "2021-04-29T01:27:49Z",
|
||||
"pushed_at": "2017-11-21T20:19:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-9417.json
Normal file
25
2017/CVE-2017-9417.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 98761662,
|
||||
"name": "Broadpwn",
|
||||
"full_name": "mailinneberg\/Broadpwn",
|
||||
"owner": {
|
||||
"login": "mailinneberg",
|
||||
"id": 29992468,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29992468?v=4",
|
||||
"html_url": "https:\/\/github.com\/mailinneberg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mailinneberg\/Broadpwn",
|
||||
"description": "Broadpwn bug (CVE-2017-9417)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-29T22:23:34Z",
|
||||
"updated_at": "2021-06-27T23:43:43Z",
|
||||
"pushed_at": "2017-09-22T12:14:25Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111662357,
|
||||
"name": "Dnstracer-1.9-Fix",
|
||||
"full_name": "j0lama\/Dnstracer-1.9-Fix",
|
||||
"owner": {
|
||||
"login": "j0lama",
|
||||
"id": 17393029,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17393029?v=4",
|
||||
"html_url": "https:\/\/github.com\/j0lama"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/j0lama\/Dnstracer-1.9-Fix",
|
||||
"description": "CVE-2017-9430 Fix",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-22T09:19:53Z",
|
||||
"updated_at": "2017-11-22T09:23:55Z",
|
||||
"pushed_at": "2017-11-22T09:40:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-9476.json
Normal file
25
2017/CVE-2017-9476.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 106408008,
|
||||
"name": "CVE-2017-9476",
|
||||
"full_name": "wiire-a\/CVE-2017-9476",
|
||||
"owner": {
|
||||
"login": "wiire-a",
|
||||
"id": 11740772,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11740772?v=4",
|
||||
"html_url": "https:\/\/github.com\/wiire-a"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wiire-a\/CVE-2017-9476",
|
||||
"description": "Hidden AP with Deterministic Credentials",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-10T11:25:36Z",
|
||||
"updated_at": "2020-09-11T12:03:08Z",
|
||||
"pushed_at": "2017-10-10T11:26:40Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-9779.json
Normal file
25
2017/CVE-2017-9779.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 100739963,
|
||||
"name": "CVE-2017-9779",
|
||||
"full_name": "homjxi0e\/CVE-2017-9779",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9779",
|
||||
"description": "Automatic execution Payload From Windows By Path Users All Exploit Via File bashrc ",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-18T18:30:42Z",
|
||||
"updated_at": "2017-09-11T14:35:42Z",
|
||||
"pushed_at": "2017-09-11T23:28:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 96536969,
|
||||
"name": "s2-048",
|
||||
"full_name": "IanSmith123\/s2-048",
|
||||
"owner": {
|
||||
"login": "IanSmith123",
|
||||
"id": 19611084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19611084?v=4",
|
||||
"html_url": "https:\/\/github.com\/IanSmith123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/IanSmith123\/s2-048",
|
||||
"description": "Apache struts struts 2 048, CVE-2017-9791.",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T12:35:55Z",
|
||||
"updated_at": "2017-07-07T14:05:07Z",
|
||||
"pushed_at": "2017-07-07T17:10:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 96565902,
|
||||
"name": "Struts2-048",
|
||||
"full_name": "dragoneeg\/Struts2-048",
|
||||
"owner": {
|
||||
"login": "dragoneeg",
|
||||
"id": 4232461,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4232461?v=4",
|
||||
"html_url": "https:\/\/github.com\/dragoneeg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048",
|
||||
"description": "CVE-2017-9791",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T18:27:31Z",
|
||||
"updated_at": "2021-06-12T09:02:46Z",
|
||||
"pushed_at": "2017-07-08T02:08:36Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104592299,
|
||||
"name": "CVE-2017-9791",
|
||||
|
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 103955890,
|
||||
"name": "CVE-2017-9798",
|
||||
"full_name": "nitrado\/CVE-2017-9798",
|
||||
"owner": {
|
||||
"login": "nitrado",
|
||||
"id": 3217095,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3217095?v=4",
|
||||
"html_url": "https:\/\/github.com\/nitrado"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nitrado\/CVE-2017-9798",
|
||||
"description": "Checks a shared hosting environment for CVE-2017-9798",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-18T15:17:13Z",
|
||||
"updated_at": "2021-03-10T05:40:19Z",
|
||||
"pushed_at": "2017-09-18T15:38:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104254696,
|
||||
"name": "optionsbleed",
|
||||
"full_name": "pabloec20\/optionsbleed",
|
||||
"owner": {
|
||||
"login": "pabloec20",
|
||||
"id": 24191742,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4",
|
||||
"html_url": "https:\/\/github.com\/pabloec20"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pabloec20\/optionsbleed",
|
||||
"description": "CVE-2017-9798",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T18:44:17Z",
|
||||
"updated_at": "2020-11-23T17:31:10Z",
|
||||
"pushed_at": "2017-09-20T18:45:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104625015,
|
||||
"name": "CVE-2017-9798",
|
||||
"full_name": "l0n3rs\/CVE-2017-9798",
|
||||
"owner": {
|
||||
"login": "l0n3rs",
|
||||
"id": 31120718,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4",
|
||||
"html_url": "https:\/\/github.com\/l0n3rs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l0n3rs\/CVE-2017-9798",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-24T06:51:32Z",
|
||||
"updated_at": "2017-09-24T06:52:51Z",
|
||||
"pushed_at": "2017-09-24T06:54:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104967629,
|
||||
"name": "OptionsBleed-POC-Scanner",
|
||||
|
|
|
@ -22,6 +22,75 @@
|
|||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 102714061,
|
||||
"name": "struts2-rce-cve-2017-9805-ruby",
|
||||
"full_name": "hahwul\/struts2-rce-cve-2017-9805-ruby",
|
||||
"owner": {
|
||||
"login": "hahwul",
|
||||
"id": 13212227,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13212227?v=4",
|
||||
"html_url": "https:\/\/github.com\/hahwul"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hahwul\/struts2-rce-cve-2017-9805-ruby",
|
||||
"description": "cve -2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-07T08:49:14Z",
|
||||
"updated_at": "2021-03-15T22:42:28Z",
|
||||
"pushed_at": "2017-09-07T08:55:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 102917821,
|
||||
"name": "struts-pwn_CVE-2017-9805",
|
||||
"full_name": "mazen160\/struts-pwn_CVE-2017-9805",
|
||||
"owner": {
|
||||
"login": "mazen160",
|
||||
"id": 8996052,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4",
|
||||
"html_url": "https:\/\/github.com\/mazen160"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2017-9805",
|
||||
"description": "An exploit for Apache Struts CVE-2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-09T01:32:57Z",
|
||||
"updated_at": "2021-07-09T17:21:14Z",
|
||||
"pushed_at": "2017-11-07T19:24:00Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 103005989,
|
||||
"name": "apache-struts-pwn_CVE-2017-9805",
|
||||
"full_name": "Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
|
||||
"owner": {
|
||||
"login": "Lone-Ranger",
|
||||
"id": 15882470,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15882470?v=4",
|
||||
"html_url": "https:\/\/github.com\/Lone-Ranger"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
|
||||
"description": "An exploit for Apache Struts CVE-2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-10T05:26:03Z",
|
||||
"updated_at": "2020-11-24T23:21:26Z",
|
||||
"pushed_at": "2017-09-10T05:28:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 111928630,
|
||||
"name": "-CVE-2017-9805",
|
||||
|
@ -45,6 +114,29 @@
|
|||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 112276528,
|
||||
"name": "S2-052",
|
||||
"full_name": "BeyondCy\/S2-052",
|
||||
"owner": {
|
||||
"login": "BeyondCy",
|
||||
"id": 4694785,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4694785?v=4",
|
||||
"html_url": "https:\/\/github.com\/BeyondCy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BeyondCy\/S2-052",
|
||||
"description": "CVE-2017-9805 - Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-28T02:46:07Z",
|
||||
"updated_at": "2020-11-24T14:16:12Z",
|
||||
"pushed_at": "2017-10-20T21:04:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 113078841,
|
||||
"name": "cve-2017-9805.py",
|
||||
|
|
25
2017/CVE-2017-98505.json
Normal file
25
2017/CVE-2017-98505.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 103377643,
|
||||
"name": "Struts2Vuln",
|
||||
"full_name": "mike-williams\/Struts2Vuln",
|
||||
"owner": {
|
||||
"login": "mike-williams",
|
||||
"id": 3205476,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3205476?v=4",
|
||||
"html_url": "https:\/\/github.com\/mike-williams"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mike-williams\/Struts2Vuln",
|
||||
"description": "Struts 2 web app that is vulnerable to CVE-2017-98505 and CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T09:01:34Z",
|
||||
"updated_at": "2018-08-05T19:22:28Z",
|
||||
"pushed_at": "2017-09-15T14:39:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2017/CVE-2017-9999.json
Normal file
25
2017/CVE-2017-9999.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 106589531,
|
||||
"name": "CVE-2017-9999_bypassing_General_Firefox",
|
||||
"full_name": "homjxi0e\/CVE-2017-9999_bypassing_General_Firefox",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9999_bypassing_General_Firefox",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-10-11T17:54:50Z",
|
||||
"updated_at": "2017-10-11T17:54:50Z",
|
||||
"pushed_at": "2017-10-11T17:54:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "My first zero day.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-12T21:25:14Z",
|
||||
"updated_at": "2021-06-21T01:59:35Z",
|
||||
"pushed_at": "2021-06-21T01:59:33Z",
|
||||
"updated_at": "2021-07-10T22:54:20Z",
|
||||
"pushed_at": "2021-07-10T22:54:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T06:32:08Z",
|
||||
"updated_at": "2021-06-23T16:31:43Z",
|
||||
"updated_at": "2021-07-11T01:08:53Z",
|
||||
"pushed_at": "2019-11-12T03:58:00Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -841,13 +841,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-07-07T18:37:37Z",
|
||||
"updated_at": "2021-07-11T02:54:54Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1132,
|
||||
"watchers_count": 1132,
|
||||
"stargazers_count": 1133,
|
||||
"watchers_count": 1133,
|
||||
"forks_count": 357,
|
||||
"forks": 357,
|
||||
"watchers": 1132,
|
||||
"watchers": 1133,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Experimenting with the CVE-2020-14343 PyYAML vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-27T06:56:15Z",
|
||||
"updated_at": "2021-07-10T19:55:40Z",
|
||||
"pushed_at": "2021-07-10T19:55:38Z",
|
||||
"updated_at": "2021-07-11T03:14:50Z",
|
||||
"pushed_at": "2021-07-11T03:14:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-10T20:42:11Z",
|
||||
"updated_at": "2021-07-10T20:42:11Z",
|
||||
"pushed_at": "2021-07-10T20:42:12Z",
|
||||
"updated_at": "2021-07-10T21:43:57Z",
|
||||
"pushed_at": "2021-07-10T21:43:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -795,13 +795,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-07-10T17:06:07Z",
|
||||
"updated_at": "2021-07-11T01:21:24Z",
|
||||
"pushed_at": "2021-07-05T13:29:56Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 327,
|
||||
"watchers": 328,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-07-04T06:26:48Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2021-07-10T18:26:54Z",
|
||||
"updated_at": "2021-07-11T00:30:02Z",
|
||||
"pushed_at": "2021-07-09T15:49:23Z",
|
||||
"stargazers_count": 512,
|
||||
"watchers_count": 512,
|
||||
"stargazers_count": 514,
|
||||
"watchers_count": 514,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 512,
|
||||
"watchers": 514,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -335,8 +335,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T08:27:36Z",
|
||||
"updated_at": "2021-07-09T09:46:16Z",
|
||||
"pushed_at": "2021-07-09T09:46:13Z",
|
||||
"updated_at": "2021-07-11T00:23:22Z",
|
||||
"pushed_at": "2021-07-11T00:23:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
375
README.md
375
README.md
|
@ -12943,6 +12943,9 @@ Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1,
|
|||
- [joke998/Cve-2017-0199](https://github.com/joke998/Cve-2017-0199)
|
||||
- [joke998/Cve-2017-0199-](https://github.com/joke998/Cve-2017-0199-)
|
||||
- [sUbc0ol/Microsoft-Word-CVE-2017-0199-](https://github.com/sUbc0ol/Microsoft-Word-CVE-2017-0199-)
|
||||
- [viethdgit/CVE-2017-0199](https://github.com/viethdgit/CVE-2017-0199)
|
||||
- [nicpenning/RTF-Cleaner](https://github.com/nicpenning/RTF-Cleaner)
|
||||
- [bloomer1016/2017-11-17-Maldoc-Using-CVE-2017-0199](https://github.com/bloomer1016/2017-11-17-Maldoc-Using-CVE-2017-0199)
|
||||
- [jacobsoo/RTF-Cleaner](https://github.com/jacobsoo/RTF-Cleaner)
|
||||
- [likescam/CVE-2017-0199](https://github.com/likescam/CVE-2017-0199)
|
||||
- [stealth-ronin/CVE-2017-0199-PY-KIT](https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT)
|
||||
|
@ -12962,6 +12965,8 @@ Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1,
|
|||
</code>
|
||||
|
||||
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
|
||||
- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
|
||||
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
|
||||
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
|
||||
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)
|
||||
- [eonrickity/CVE-2017-0213](https://github.com/eonrickity/CVE-2017-0213)
|
||||
|
@ -13048,6 +13053,7 @@ An elevation of privilege vulnerability in the kernel ION subsystem could enable
|
|||
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
|
||||
</code>
|
||||
|
||||
- [ojasookert/CVE-2017-0781](https://github.com/ojasookert/CVE-2017-0781)
|
||||
- [marcinguy/android712-blueborne](https://github.com/marcinguy/android712-blueborne)
|
||||
- [mjancek/BlueborneDetection](https://github.com/mjancek/BlueborneDetection)
|
||||
- [CrackSoft900/Blue-Borne](https://github.com/CrackSoft900/Blue-Borne)
|
||||
|
@ -13058,6 +13064,10 @@ A remote code execution vulnerability in the Android system (bluetooth). Product
|
|||
A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146698.
|
||||
</code>
|
||||
|
||||
- [ojasookert/CVE-2017-0785](https://github.com/ojasookert/CVE-2017-0785)
|
||||
- [aymankhalfatni/CVE-2017-0785](https://github.com/aymankhalfatni/CVE-2017-0785)
|
||||
- [Alfa100001/-CVE-2017-0785-BlueBorne-PoC](https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC)
|
||||
- [Hackerscript/BlueBorne-CVE-2017-0785](https://github.com/Hackerscript/BlueBorne-CVE-2017-0785)
|
||||
- [pieterbork/blueborne](https://github.com/pieterbork/blueborne)
|
||||
- [sigbitsadmin/diff](https://github.com/sigbitsadmin/diff)
|
||||
- [SigBitsLabs/diff](https://github.com/SigBitsLabs/diff)
|
||||
|
@ -13088,6 +13098,14 @@ IBM Tivoli Monitoring V6 6.2.2.x could allow a remote attacker to execute arbitr
|
|||
- [emcalv/tivoli-poc](https://github.com/emcalv/tivoli-poc)
|
||||
- [bcdannyboy/cve-2017-1635-PoC](https://github.com/bcdannyboy/cve-2017-1635-PoC)
|
||||
|
||||
### CVE-2017-2368 (2017-02-20)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "Contacts" component. It allows remote attackers to cause a denial of service (application crash) via a crafted contact card.
|
||||
</code>
|
||||
|
||||
- [vincedes3/CVE-2017-2368](https://github.com/vincedes3/CVE-2017-2368)
|
||||
|
||||
### CVE-2017-2370 (2017-02-20)
|
||||
|
||||
<code>
|
||||
|
@ -13099,6 +13117,14 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
|
|||
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
|
||||
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
|
||||
|
||||
### CVE-2017-2388 (2017-04-01)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "IOFireWireFamily" component. It allows attackers to cause a denial of service (NULL pointer dereference) via a crafted app.
|
||||
</code>
|
||||
|
||||
- [bazad/IOFireWireFamily-null-deref](https://github.com/bazad/IOFireWireFamily-null-deref)
|
||||
|
||||
### CVE-2017-2636 (2017-03-07)
|
||||
|
||||
<code>
|
||||
|
@ -13172,6 +13198,14 @@ An attacker who is able to send and receive messages to an authoritative DNS ser
|
|||
|
||||
- [saaph/CVE-2017-3143](https://github.com/saaph/CVE-2017-3143)
|
||||
|
||||
### CVE-2017-3241 (2017-01-27)
|
||||
|
||||
<code>
|
||||
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
|
||||
</code>
|
||||
|
||||
- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC)
|
||||
|
||||
### CVE-2017-3248 (2017-01-27)
|
||||
|
||||
<code>
|
||||
|
@ -13220,6 +13254,7 @@ A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code i
|
|||
|
||||
### CVE-2017-4490
|
||||
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
|
||||
- [homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-](https://github.com/homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-)
|
||||
|
||||
### CVE-2017-4878
|
||||
- [brianwrf/CVE-2017-4878-Samples](https://github.com/brianwrf/CVE-2017-4878-Samples)
|
||||
|
@ -13249,10 +13284,20 @@ Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.
|
|||
- [Ang-YC/CVE-2017-5007](https://github.com/Ang-YC/CVE-2017-5007)
|
||||
|
||||
### CVE-2017-5123
|
||||
- [FloatingGuy/CVE-2017-5123](https://github.com/FloatingGuy/CVE-2017-5123)
|
||||
- [0x5068656e6f6c/CVE-2017-5123](https://github.com/0x5068656e6f6c/CVE-2017-5123)
|
||||
- [Synacktiv-contrib/exploiting-cve-2017-5123](https://github.com/Synacktiv-contrib/exploiting-cve-2017-5123)
|
||||
- [teawater/CVE-2017-5123](https://github.com/teawater/CVE-2017-5123)
|
||||
- [c3r34lk1ll3r/CVE-2017-5123](https://github.com/c3r34lk1ll3r/CVE-2017-5123)
|
||||
|
||||
### CVE-2017-5124 (2018-02-07)
|
||||
|
||||
<code>
|
||||
Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted MHTML page.
|
||||
</code>
|
||||
|
||||
- [Bo0oM/CVE-2017-5124](https://github.com/Bo0oM/CVE-2017-5124)
|
||||
|
||||
### CVE-2017-5223 (2017-01-16)
|
||||
|
||||
<code>
|
||||
|
@ -13275,6 +13320,7 @@ An attack can use a blob URL and script to spoof an arbitrary addressbar URL pre
|
|||
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
|
||||
</code>
|
||||
|
||||
- [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan)
|
||||
- [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan)
|
||||
- [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487)
|
||||
- [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit)
|
||||
|
@ -13330,7 +13376,13 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
|
|||
- [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638)
|
||||
- [sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
|
||||
- [sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638)
|
||||
- [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-)
|
||||
- [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638)
|
||||
- [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
|
||||
- [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser)
|
||||
- [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638)
|
||||
- [c002/Apache-Struts](https://github.com/c002/Apache-Struts)
|
||||
- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit)
|
||||
- [grant100/cybersecurity-struts2](https://github.com/grant100/cybersecurity-struts2)
|
||||
- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638)
|
||||
- [0x00-0x00/CVE-2017-5638](https://github.com/0x00-0x00/CVE-2017-5638)
|
||||
|
@ -13375,6 +13427,7 @@ An unprivileged network attacker could gain system privileges to provisioned Int
|
|||
- [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689)
|
||||
- [x1sec/amthoneypot](https://github.com/x1sec/amthoneypot)
|
||||
- [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass)
|
||||
- [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc)
|
||||
|
||||
### CVE-2017-5693 (2018-07-31)
|
||||
|
||||
|
@ -13395,6 +13448,14 @@ Systems with microprocessors utilizing speculative execution and indirect branch
|
|||
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
|
||||
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
|
||||
|
||||
### CVE-2017-5721 (2017-10-10)
|
||||
|
||||
<code>
|
||||
Insufficient input validation in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to execute arbitrary code via manipulation of memory.
|
||||
</code>
|
||||
|
||||
- [embedi/smm_usbrt_poc](https://github.com/embedi/smm_usbrt_poc)
|
||||
|
||||
### CVE-2017-5753 (2018-01-04)
|
||||
|
||||
<code>
|
||||
|
@ -13536,6 +13597,15 @@ A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.
|
|||
|
||||
- [ansjdnakjdnajkd/CVE-2017-7038](https://github.com/ansjdnakjdnajkd/CVE-2017-7038)
|
||||
|
||||
### CVE-2017-7047 (2017-07-20)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxpc" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
||||
</code>
|
||||
|
||||
- [JosephShenton/Triple_Fetch-Kernel-Creds](https://github.com/JosephShenton/Triple_Fetch-Kernel-Creds)
|
||||
- [q1f3/Triple_fetch](https://github.com/q1f3/Triple_fetch)
|
||||
|
||||
### CVE-2017-7061 (2017-07-20)
|
||||
|
||||
<code>
|
||||
|
@ -13544,6 +13614,15 @@ An issue was discovered in certain Apple products. iOS before 10.3.3 is affected
|
|||
|
||||
- [TheLoneHaxor/jailbreakme103](https://github.com/TheLoneHaxor/jailbreakme103)
|
||||
|
||||
### CVE-2017-7089 (2017-10-22)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.
|
||||
</code>
|
||||
|
||||
- [Bo0oM/CVE-2017-7089](https://github.com/Bo0oM/CVE-2017-7089)
|
||||
- [aymankhalfatni/Safari_Mac](https://github.com/aymankhalfatni/Safari_Mac)
|
||||
|
||||
### CVE-2017-7092 (2017-10-22)
|
||||
|
||||
<code>
|
||||
|
@ -13662,6 +13741,7 @@ A deserialization flaw was discovered in the jackson-databind, versions before 2
|
|||
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
|
||||
</code>
|
||||
|
||||
- [liusec/CVE-2017-7529](https://github.com/liusec/CVE-2017-7529)
|
||||
- [en0f/CVE-2017-7529_PoC](https://github.com/en0f/CVE-2017-7529_PoC)
|
||||
- [cved-sources/cve-2017-7529](https://github.com/cved-sources/cve-2017-7529)
|
||||
- [MaxSecurity/CVE-2017-7529-POC](https://github.com/MaxSecurity/CVE-2017-7529-POC)
|
||||
|
@ -13688,6 +13768,14 @@ In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read o
|
|||
|
||||
- [snknritr/CVE-2017-7679-in-python](https://github.com/snknritr/CVE-2017-7679-in-python)
|
||||
|
||||
### CVE-2017-7912 (2019-04-08)
|
||||
|
||||
<code>
|
||||
Hanwha Techwin SRN-4000, SRN-4000 firmware versions prior to SRN4000_v2.16_170401, A specially crafted http request and response could allow an attacker to gain access to the device management page with admin privileges without proper authentication.
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-7912_Sneak](https://github.com/homjxi0e/CVE-2017-7912_Sneak)
|
||||
|
||||
### CVE-2017-7921 (2017-05-05)
|
||||
|
||||
<code>
|
||||
|
@ -13699,12 +13787,21 @@ An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Serie
|
|||
- [MisakaMikato/cve-2017-7921-golang](https://github.com/MisakaMikato/cve-2017-7921-golang)
|
||||
- [chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
|
||||
|
||||
### CVE-2017-7998 (2018-01-08)
|
||||
|
||||
<code>
|
||||
Multiple cross-site scripting (XSS) vulnerabilities in Gespage before 7.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) printer name when adding a printer in the admin panel or (2) username parameter to webapp/users/user_reg.jsp.
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-7998](https://github.com/homjxi0e/CVE-2017-7998)
|
||||
|
||||
### CVE-2017-8046 (2018-01-04)
|
||||
|
||||
<code>
|
||||
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
|
||||
</code>
|
||||
|
||||
- [Soontao/CVE-2017-8046-DEMO](https://github.com/Soontao/CVE-2017-8046-DEMO)
|
||||
- [sj/spring-data-rest-CVE-2017-8046](https://github.com/sj/spring-data-rest-CVE-2017-8046)
|
||||
- [m3ssap0/SpringBreakVulnerableApp](https://github.com/m3ssap0/SpringBreakVulnerableApp)
|
||||
- [m3ssap0/spring-break_cve-2017-8046](https://github.com/m3ssap0/spring-break_cve-2017-8046)
|
||||
|
@ -13749,6 +13846,7 @@ Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Wi
|
|||
|
||||
- [Elm0D/CVE-2017-8464](https://github.com/Elm0D/CVE-2017-8464)
|
||||
- [3gstudent/CVE-2017-8464-EXP](https://github.com/3gstudent/CVE-2017-8464-EXP)
|
||||
- [Securitykid/CVE-2017-8464-exp-generator](https://github.com/Securitykid/CVE-2017-8464-exp-generator)
|
||||
- [X-Vector/usbhijacking](https://github.com/X-Vector/usbhijacking)
|
||||
- [xssfile/CVE-2017-8464-EXP](https://github.com/xssfile/CVE-2017-8464-EXP)
|
||||
|
||||
|
@ -13791,6 +13889,22 @@ Microsoft Office allows a remote code execution vulnerability due to the way tha
|
|||
- [sasqwatch/CVE-2017-8570](https://github.com/sasqwatch/CVE-2017-8570)
|
||||
- [erfze/CVE-2017-8570](https://github.com/erfze/CVE-2017-8570)
|
||||
|
||||
### CVE-2017-8625 (2017-08-08)
|
||||
|
||||
<code>
|
||||
Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to bypass Device Guard User Mode Code Integrity (UMCI) policies due to Internet Explorer failing to validate UMCI policies, aka "Internet Explorer Security Feature Bypass Vulnerability".
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-8625_Bypass_UMCI](https://github.com/homjxi0e/CVE-2017-8625_Bypass_UMCI)
|
||||
|
||||
### CVE-2017-8641 (2017-08-08)
|
||||
|
||||
<code>
|
||||
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject](https://github.com/homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject)
|
||||
|
||||
### CVE-2017-8759 (2017-09-12)
|
||||
|
||||
<code>
|
||||
|
@ -13798,8 +13912,17 @@ Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow
|
|||
</code>
|
||||
|
||||
- [Voulnet/CVE-2017-8759-Exploit-sample](https://github.com/Voulnet/CVE-2017-8759-Exploit-sample)
|
||||
- [nccgroup/CVE-2017-8759](https://github.com/nccgroup/CVE-2017-8759)
|
||||
- [vysecurity/CVE-2017-8759](https://github.com/vysecurity/CVE-2017-8759)
|
||||
- [BasuCert/CVE-2017-8759](https://github.com/BasuCert/CVE-2017-8759)
|
||||
- [tahisaad6/CVE-2017-8759-Exploit-sample2](https://github.com/tahisaad6/CVE-2017-8759-Exploit-sample2)
|
||||
- [homjxi0e/CVE-2017-8759_-SOAP_WSDL](https://github.com/homjxi0e/CVE-2017-8759_-SOAP_WSDL)
|
||||
- [bhdresh/CVE-2017-8759](https://github.com/bhdresh/CVE-2017-8759)
|
||||
- [Lz1y/CVE-2017-8759](https://github.com/Lz1y/CVE-2017-8759)
|
||||
- [JonasUliana/CVE-2017-8759](https://github.com/JonasUliana/CVE-2017-8759)
|
||||
- [Securitykid/CVE-2017-8759](https://github.com/Securitykid/CVE-2017-8759)
|
||||
- [ashr/CVE-2017-8759-exploits](https://github.com/ashr/CVE-2017-8759-exploits)
|
||||
- [l0n3rs/CVE-2017-8759](https://github.com/l0n3rs/CVE-2017-8759)
|
||||
- [ChaitanyaHaritash/CVE-2017-8759](https://github.com/ChaitanyaHaritash/CVE-2017-8759)
|
||||
- [smashinu/CVE-2017-8759Expoit](https://github.com/smashinu/CVE-2017-8759Expoit)
|
||||
- [adeljck/CVE-2017-8759](https://github.com/adeljck/CVE-2017-8759)
|
||||
|
@ -13860,6 +13983,14 @@ SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to ex
|
|||
- [cved-sources/cve-2017-8917](https://github.com/cved-sources/cve-2017-8917)
|
||||
- [SiopySh/CVE-2017-8917](https://github.com/SiopySh/CVE-2017-8917)
|
||||
|
||||
### CVE-2017-9097 (2017-06-15)
|
||||
|
||||
<code>
|
||||
In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file.
|
||||
</code>
|
||||
|
||||
- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite)
|
||||
|
||||
### CVE-2017-9101 (2017-05-21)
|
||||
|
||||
<code>
|
||||
|
@ -13880,6 +14011,14 @@ Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 an
|
|||
- [shacojx/dp](https://github.com/shacojx/dp)
|
||||
- [ZhenwarX/Telerik-CVE-2017-9248-PoC](https://github.com/ZhenwarX/Telerik-CVE-2017-9248-PoC)
|
||||
|
||||
### CVE-2017-9417 (2017-06-03)
|
||||
|
||||
<code>
|
||||
Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute arbitrary code via unspecified vectors, aka the "Broadpwn" issue.
|
||||
</code>
|
||||
|
||||
- [mailinneberg/Broadpwn](https://github.com/mailinneberg/Broadpwn)
|
||||
|
||||
### CVE-2017-9430 (2017-06-05)
|
||||
|
||||
<code>
|
||||
|
@ -13887,6 +14026,15 @@ Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a
|
|||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-9430](https://github.com/homjxi0e/CVE-2017-9430)
|
||||
- [j0lama/Dnstracer-1.9-Fix](https://github.com/j0lama/Dnstracer-1.9-Fix)
|
||||
|
||||
### CVE-2017-9476 (2017-07-30)
|
||||
|
||||
<code>
|
||||
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices makes it easy for remote attackers to determine the hidden SSID and passphrase for a Home Security Wi-Fi network.
|
||||
</code>
|
||||
|
||||
- [wiire-a/CVE-2017-9476](https://github.com/wiire-a/CVE-2017-9476)
|
||||
|
||||
### CVE-2017-9506 (2017-08-23)
|
||||
|
||||
|
@ -13946,12 +14094,22 @@ A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse
|
|||
|
||||
- [kkent030315/CVE-2017-9769](https://github.com/kkent030315/CVE-2017-9769)
|
||||
|
||||
### CVE-2017-9779 (2017-09-07)
|
||||
|
||||
<code>
|
||||
OCaml compiler allows attackers to have unspecified impact via unknown vectors, a similar issue to CVE-2017-9772 "but with much less impact."
|
||||
</code>
|
||||
|
||||
- [homjxi0e/CVE-2017-9779](https://github.com/homjxi0e/CVE-2017-9779)
|
||||
|
||||
### CVE-2017-9791 (2017-07-10)
|
||||
|
||||
<code>
|
||||
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
|
||||
</code>
|
||||
|
||||
- [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048)
|
||||
- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048)
|
||||
- [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791)
|
||||
|
||||
### CVE-2017-9798 (2017-09-18)
|
||||
|
@ -13960,6 +14118,9 @@ The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code exe
|
|||
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
|
||||
</code>
|
||||
|
||||
- [nitrado/CVE-2017-9798](https://github.com/nitrado/CVE-2017-9798)
|
||||
- [pabloec20/optionsbleed](https://github.com/pabloec20/optionsbleed)
|
||||
- [l0n3rs/CVE-2017-9798](https://github.com/l0n3rs/CVE-2017-9798)
|
||||
- [brokensound77/OptionsBleed-POC-Scanner](https://github.com/brokensound77/OptionsBleed-POC-Scanner)
|
||||
|
||||
### CVE-2017-9805 (2017-09-15)
|
||||
|
@ -13969,7 +14130,11 @@ The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x bef
|
|||
</code>
|
||||
|
||||
- [luc10/struts-rce-cve-2017-9805](https://github.com/luc10/struts-rce-cve-2017-9805)
|
||||
- [hahwul/struts2-rce-cve-2017-9805-ruby](https://github.com/hahwul/struts2-rce-cve-2017-9805-ruby)
|
||||
- [mazen160/struts-pwn_CVE-2017-9805](https://github.com/mazen160/struts-pwn_CVE-2017-9805)
|
||||
- [Lone-Ranger/apache-struts-pwn_CVE-2017-9805](https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805)
|
||||
- [0x00-0x00/-CVE-2017-9805](https://github.com/0x00-0x00/-CVE-2017-9805)
|
||||
- [BeyondCy/S2-052](https://github.com/BeyondCy/S2-052)
|
||||
- [chrisjd20/cve-2017-9805.py](https://github.com/chrisjd20/cve-2017-9805.py)
|
||||
- [UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-](https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-)
|
||||
- [UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit](https://github.com/UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit)
|
||||
|
@ -14016,6 +14181,9 @@ Missing CSRF token checks and improper input validation in Joomla! CMS 1.7.3 thr
|
|||
|
||||
- [xyringe/CVE-2017-9934](https://github.com/xyringe/CVE-2017-9934)
|
||||
|
||||
### CVE-2017-9999
|
||||
- [homjxi0e/CVE-2017-9999_bypassing_General_Firefox](https://github.com/homjxi0e/CVE-2017-9999_bypassing_General_Firefox)
|
||||
|
||||
### CVE-2017-10235 (2017-08-08)
|
||||
|
||||
<code>
|
||||
|
@ -14083,6 +14251,14 @@ The ifmap service that comes bundled with Contrail has an XML External Entity (X
|
|||
|
||||
- [gteissier/CVE-2017-10617](https://github.com/gteissier/CVE-2017-10617)
|
||||
|
||||
### CVE-2017-10661 (2017-08-19)
|
||||
|
||||
<code>
|
||||
Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
|
||||
</code>
|
||||
|
||||
- [GeneBlue/CVE-2017-10661_POC](https://github.com/GeneBlue/CVE-2017-10661_POC)
|
||||
|
||||
### CVE-2017-10797
|
||||
- [n4xh4ck5/CVE-2017-10797](https://github.com/n4xh4ck5/CVE-2017-10797)
|
||||
|
||||
|
@ -14148,6 +14324,14 @@ The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before
|
|||
- [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610)
|
||||
- [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610)
|
||||
|
||||
### CVE-2017-11611 (2017-09-08)
|
||||
|
||||
<code>
|
||||
Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of the file name in a "create-file-popup" action, and the directory name in a "create-directory-popup" action, in the HTTP POST method to the "/plugin/file_manager/" script (aka an /admin/plugin/file_manager/browse// URI).
|
||||
</code>
|
||||
|
||||
- [faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc](https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc)
|
||||
|
||||
### CVE-2017-11774 (2017-10-13)
|
||||
|
||||
<code>
|
||||
|
@ -14164,6 +14348,14 @@ Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold,
|
|||
|
||||
- [Sheisback/CVE-2017-11783](https://github.com/Sheisback/CVE-2017-11783)
|
||||
|
||||
### CVE-2017-11816 (2017-10-13)
|
||||
|
||||
<code>
|
||||
The Microsoft Windows Graphics Device Interface (GDI) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability in the way it handles objects in memory, aka "Windows GDI Information Disclosure Vulnerability".
|
||||
</code>
|
||||
|
||||
- [lr3800/CVE-2017-11816](https://github.com/lr3800/CVE-2017-11816)
|
||||
|
||||
### CVE-2017-11826 (2017-10-13)
|
||||
|
||||
<code>
|
||||
|
@ -14178,7 +14370,18 @@ Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010
|
|||
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
|
||||
</code>
|
||||
|
||||
- [zhouat/cve-2017-11882](https://github.com/zhouat/cve-2017-11882)
|
||||
- [embedi/CVE-2017-11882](https://github.com/embedi/CVE-2017-11882)
|
||||
- [Ridter/CVE-2017-11882](https://github.com/Ridter/CVE-2017-11882)
|
||||
- [BlackMathIT/2017-11882_Generator](https://github.com/BlackMathIT/2017-11882_Generator)
|
||||
- [unamer/CVE-2017-11882](https://github.com/unamer/CVE-2017-11882)
|
||||
- [0x09AL/CVE-2017-11882-metasploit](https://github.com/0x09AL/CVE-2017-11882-metasploit)
|
||||
- [HZachev/ABC](https://github.com/HZachev/ABC)
|
||||
- [starnightcyber/CVE-2017-11882](https://github.com/starnightcyber/CVE-2017-11882)
|
||||
- [Grey-Li/CVE-2017-11882](https://github.com/Grey-Li/CVE-2017-11882)
|
||||
- [legendsec/CVE-2017-11882-for-Kali](https://github.com/legendsec/CVE-2017-11882-for-Kali)
|
||||
- [CSC-pentest/cve-2017-11882](https://github.com/CSC-pentest/cve-2017-11882)
|
||||
- [Shadowshusky/CVE-2017-11882-](https://github.com/Shadowshusky/CVE-2017-11882-)
|
||||
- [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802)
|
||||
- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802)
|
||||
- [likescam/CVE-2017-11882](https://github.com/likescam/CVE-2017-11882)
|
||||
|
@ -14210,11 +14413,20 @@ Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Wi
|
|||
In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
|
||||
</code>
|
||||
|
||||
- [sevck/CVE-2017-12149](https://github.com/sevck/CVE-2017-12149)
|
||||
- [yunxu1/jboss-_CVE-2017-12149](https://github.com/yunxu1/jboss-_CVE-2017-12149)
|
||||
- [1337g/CVE-2017-12149](https://github.com/1337g/CVE-2017-12149)
|
||||
- [jreppiks/CVE-2017-12149](https://github.com/jreppiks/CVE-2017-12149)
|
||||
- [Xcatolin/jboss-deserialization](https://github.com/Xcatolin/jboss-deserialization)
|
||||
|
||||
### CVE-2017-12426 (2017-08-14)
|
||||
|
||||
<code>
|
||||
GitLab Community Edition (CE) and Enterprise Edition (EE) before 8.17.8, 9.0.x before 9.0.13, 9.1.x before 9.1.10, 9.2.x before 9.2.10, 9.3.x before 9.3.10, and 9.4.x before 9.4.4 might allow remote attackers to execute arbitrary code via a crafted SSH URL in a project import.
|
||||
</code>
|
||||
|
||||
- [sm-paul-schuette/CVE-2017-12426](https://github.com/sm-paul-schuette/CVE-2017-12426)
|
||||
|
||||
### CVE-2017-12542 (2018-02-15)
|
||||
|
||||
<code>
|
||||
|
@ -14224,6 +14436,14 @@ A authentication bypass and execution of code vulnerability in HPE Integrated Li
|
|||
- [skelsec/CVE-2017-12542](https://github.com/skelsec/CVE-2017-12542)
|
||||
- [sk1dish/ilo4-rce-vuln-scanner](https://github.com/sk1dish/ilo4-rce-vuln-scanner)
|
||||
|
||||
### CVE-2017-12611 (2017-09-20)
|
||||
|
||||
<code>
|
||||
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
|
||||
</code>
|
||||
|
||||
- [brianwrf/S2-053-CVE-2017-12611](https://github.com/brianwrf/S2-053-CVE-2017-12611)
|
||||
|
||||
### CVE-2017-12615 (2017-09-19)
|
||||
|
||||
<code>
|
||||
|
@ -14231,6 +14451,10 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
|
|||
</code>
|
||||
|
||||
- [breaktoprotect/CVE-2017-12615](https://github.com/breaktoprotect/CVE-2017-12615)
|
||||
- [mefulton/cve-2017-12615](https://github.com/mefulton/cve-2017-12615)
|
||||
- [zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717](https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717)
|
||||
- [wsg00d/cve-2017-12615](https://github.com/wsg00d/cve-2017-12615)
|
||||
- [BeyondCy/CVE-2017-12615](https://github.com/BeyondCy/CVE-2017-12615)
|
||||
- [1337g/CVE-2017-12615](https://github.com/1337g/CVE-2017-12615)
|
||||
- [Shellkeys/CVE-2017-12615](https://github.com/Shellkeys/CVE-2017-12615)
|
||||
- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615)
|
||||
|
@ -14244,6 +14468,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
|
|||
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
|
||||
</code>
|
||||
|
||||
- [cyberheartmi9/CVE-2017-12617](https://github.com/cyberheartmi9/CVE-2017-12617)
|
||||
- [devcoinfet/CVE-2017-12617](https://github.com/devcoinfet/CVE-2017-12617)
|
||||
- [qiantu88/CVE-2017-12617](https://github.com/qiantu88/CVE-2017-12617)
|
||||
- [ygouzerh/CVE-2017-12617](https://github.com/ygouzerh/CVE-2017-12617)
|
||||
|
@ -14275,6 +14500,14 @@ CouchDB administrative users can configure the database server via HTTP(S). Some
|
|||
- [moayadalmalat/CVE-2017-12636](https://github.com/moayadalmalat/CVE-2017-12636)
|
||||
- [RedTeamWing/CVE-2017-12636](https://github.com/RedTeamWing/CVE-2017-12636)
|
||||
|
||||
### CVE-2017-12792 (2017-10-02)
|
||||
|
||||
<code>
|
||||
Multiple cross-site request forgery (CSRF) vulnerabilities in NexusPHP 1.5 allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) linkname, (2) url, or (3) title parameter in an add action to linksmanage.php.
|
||||
</code>
|
||||
|
||||
- [ZZS2017/cve-2017-12792](https://github.com/ZZS2017/cve-2017-12792)
|
||||
|
||||
### CVE-2017-12842 (2020-03-16)
|
||||
|
||||
<code>
|
||||
|
@ -14283,6 +14516,22 @@ Bitcoin Core before 0.14 allows an attacker to create an ostensibly valid SPV pr
|
|||
|
||||
- [nondejus/CVE-2017-12842](https://github.com/nondejus/CVE-2017-12842)
|
||||
|
||||
### CVE-2017-12852 (2017-08-15)
|
||||
|
||||
<code>
|
||||
The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack.
|
||||
</code>
|
||||
|
||||
- [BT123/numpy-1.13.1](https://github.com/BT123/numpy-1.13.1)
|
||||
|
||||
### CVE-2017-12943 (2017-08-18)
|
||||
|
||||
<code>
|
||||
D-Link DIR-600 Rev Bx devices with v2.x firmware allow remote attackers to read passwords via a model/__show_info.php?REQUIRE_FILE= absolute path traversal attack, as demonstrated by discovering the admin password.
|
||||
</code>
|
||||
|
||||
- [aymankhalfatni/D-Link](https://github.com/aymankhalfatni/D-Link)
|
||||
|
||||
### CVE-2017-12945 (2019-11-27)
|
||||
|
||||
<code>
|
||||
|
@ -14298,6 +14547,7 @@ The http.c:skip_short_body() function is called in some circumstances, such as w
|
|||
</code>
|
||||
|
||||
- [r1b/CVE-2017-13089](https://github.com/r1b/CVE-2017-13089)
|
||||
- [mzeyong/CVE-2017-13089](https://github.com/mzeyong/CVE-2017-13089)
|
||||
|
||||
### CVE-2017-13156 (2017-12-06)
|
||||
|
||||
|
@ -14343,6 +14593,38 @@ An issue was discovered in certain Apple products. iOS before 11.2 is affected.
|
|||
|
||||
- [bazad/ctl_ctloutput-leak](https://github.com/bazad/ctl_ctloutput-leak)
|
||||
|
||||
### CVE-2017-13872 (2017-11-29)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. macOS High Sierra before Security Update 2017-001 is affected. The issue involves the "Directory Utility" component. It allows attackers to obtain administrator access without a password via certain interactions involving entry of the root user name.
|
||||
</code>
|
||||
|
||||
- [giovannidispoto/CVE-2017-13872-Patch](https://github.com/giovannidispoto/CVE-2017-13872-Patch)
|
||||
|
||||
### CVE-2017-14105 (2017-09-01)
|
||||
|
||||
<code>
|
||||
HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifying a backup archive before a restore, because the restore feature does not validate pathnames within the archive. An authenticated, local attacker - even restricted as a tenant - can add a jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will be exposed at the web interface).
|
||||
</code>
|
||||
|
||||
- [theguly/CVE-2017-14105](https://github.com/theguly/CVE-2017-14105)
|
||||
|
||||
### CVE-2017-14262 (2017-09-11)
|
||||
|
||||
<code>
|
||||
On Samsung NVR devices, remote attackers can read the MD5 password hash of the 'admin' account via certain szUserName JSON data to cgi-bin/main-cgi, and login to the device with that hash in the szUserPasswd parameter.
|
||||
</code>
|
||||
|
||||
- [zzz66686/CVE-2017-14262](https://github.com/zzz66686/CVE-2017-14262)
|
||||
|
||||
### CVE-2017-14263 (2017-09-11)
|
||||
|
||||
<code>
|
||||
Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.
|
||||
</code>
|
||||
|
||||
- [zzz66686/CVE-2017-14263](https://github.com/zzz66686/CVE-2017-14263)
|
||||
|
||||
### CVE-2017-14322 (2017-10-18)
|
||||
|
||||
<code>
|
||||
|
@ -14351,6 +14633,14 @@ The function in charge to check whether the user is already logged in init.php i
|
|||
|
||||
- [joesmithjaffa/CVE-2017-14322](https://github.com/joesmithjaffa/CVE-2017-14322)
|
||||
|
||||
### CVE-2017-14491 (2017-10-02)
|
||||
|
||||
<code>
|
||||
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
|
||||
</code>
|
||||
|
||||
- [skyformat99/dnsmasq-2.4.1-fix-CVE-2017-14491](https://github.com/skyformat99/dnsmasq-2.4.1-fix-CVE-2017-14491)
|
||||
|
||||
### CVE-2017-14493 (2017-10-02)
|
||||
|
||||
<code>
|
||||
|
@ -14405,10 +14695,22 @@ In CPUID CPU-Z before 1.43, there is an arbitrary memory write that results dire
|
|||
The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.
|
||||
</code>
|
||||
|
||||
- [lva/Infineon-CVE-2017-15361](https://github.com/lva/Infineon-CVE-2017-15361)
|
||||
- [titanous/rocacheck](https://github.com/titanous/rocacheck)
|
||||
- [jnpuskar/RocaCmTest](https://github.com/jnpuskar/RocaCmTest)
|
||||
- [nsacyber/Detect-CVE-2017-15361-TPM](https://github.com/nsacyber/Detect-CVE-2017-15361-TPM)
|
||||
- [0xxon/zeek-plugin-roca](https://github.com/0xxon/zeek-plugin-roca)
|
||||
- [0xxon/roca](https://github.com/0xxon/roca)
|
||||
- [Elbarbons/Attacco-ROCA-sulla-vulnerabilita-CVE-2017-15361](https://github.com/Elbarbons/Attacco-ROCA-sulla-vulnerabilita-CVE-2017-15361)
|
||||
|
||||
### CVE-2017-15394 (2018-02-07)
|
||||
|
||||
<code>
|
||||
Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension.
|
||||
</code>
|
||||
|
||||
- [sudosammy/CVE-2017-15394](https://github.com/sudosammy/CVE-2017-15394)
|
||||
|
||||
### CVE-2017-15708 (2017-12-11)
|
||||
|
||||
<code>
|
||||
|
@ -14462,6 +14764,14 @@ The safe-eval module describes itself as a safer version of eval. By accessing t
|
|||
### CVE-2017-16245
|
||||
- [AOCorsaire/CVE-2017-16245](https://github.com/AOCorsaire/CVE-2017-16245)
|
||||
|
||||
### CVE-2017-16524 (2017-11-06)
|
||||
|
||||
<code>
|
||||
Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted file upload vulnerability: 'network_ssl_upload.php' allows remote authenticated attackers to upload and execute arbitrary PHP code via a filename with a .php extension, which is then accessed via a direct request to the file in the upload/ directory. To authenticate for this attack, one can obtain web-interface credentials in cleartext by leveraging the existing Local File Read Vulnerability referenced as CVE-2015-8279, which allows remote attackers to read the web-interface credentials via a request for the cslog_export.php?path=/root/php_modules/lighttpd/sbin/userpw URI.
|
||||
</code>
|
||||
|
||||
- [realistic-security/CVE-2017-16524](https://github.com/realistic-security/CVE-2017-16524)
|
||||
|
||||
### CVE-2017-16541 (2017-11-04)
|
||||
|
||||
<code>
|
||||
|
@ -14510,6 +14820,14 @@ An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel all
|
|||
|
||||
- [breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection](https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection)
|
||||
|
||||
### CVE-2017-16806 (2017-11-13)
|
||||
|
||||
<code>
|
||||
The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal.
|
||||
</code>
|
||||
|
||||
- [rickoooooo/ulteriusExploit](https://github.com/rickoooooo/ulteriusExploit)
|
||||
|
||||
### CVE-2017-16894 (2017-11-19)
|
||||
|
||||
<code>
|
||||
|
@ -14619,6 +14937,14 @@ The Joomanager component through 2.0.0 for Joomla! has an arbitrary file downloa
|
|||
|
||||
- [Luth1er/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD](https://github.com/Luth1er/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD)
|
||||
|
||||
### CVE-2017-18486 (2019-08-09)
|
||||
|
||||
<code>
|
||||
Jitbit Helpdesk before 9.0.3 allows remote attackers to escalate privileges because of mishandling of the User/AutoLogin userHash parameter. By inspecting the token value provided in a password reset link, a user can leverage a weak PRNG to recover the shared secret used by the server for remote authentication. The shared secret can be used to escalate privileges by forging new tokens for any user. These tokens can be used to automatically log in as the affected user.
|
||||
</code>
|
||||
|
||||
- [Kc57/JitBit_Helpdesk_Auth_Bypass](https://github.com/Kc57/JitBit_Helpdesk_Auth_Bypass)
|
||||
|
||||
### CVE-2017-18635 (2019-09-25)
|
||||
|
||||
<code>
|
||||
|
@ -14627,6 +14953,9 @@ An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VN
|
|||
|
||||
- [ShielderSec/CVE-2017-18635](https://github.com/ShielderSec/CVE-2017-18635)
|
||||
|
||||
### CVE-2017-98505
|
||||
- [mike-williams/Struts2Vuln](https://github.com/mike-williams/Struts2Vuln)
|
||||
|
||||
### CVE-2017-1000000
|
||||
- [smythtech/DWF-CVE-2017-1000000](https://github.com/smythtech/DWF-CVE-2017-1000000)
|
||||
|
||||
|
@ -14655,6 +14984,25 @@ Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. W
|
|||
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
|
||||
</code>
|
||||
|
||||
- [timwr/CVE-2017-1000117](https://github.com/timwr/CVE-2017-1000117)
|
||||
- [GrahamMThomas/test-git-vuln_CVE-2017-1000117](https://github.com/GrahamMThomas/test-git-vuln_CVE-2017-1000117)
|
||||
- [Manouchehri/CVE-2017-1000117](https://github.com/Manouchehri/CVE-2017-1000117)
|
||||
- [thelastbyte/CVE-2017-1000117](https://github.com/thelastbyte/CVE-2017-1000117)
|
||||
- [alilangtest/CVE-2017-1000117](https://github.com/alilangtest/CVE-2017-1000117)
|
||||
- [VulApps/CVE-2017-1000117](https://github.com/VulApps/CVE-2017-1000117)
|
||||
- [greymd/CVE-2017-1000117](https://github.com/greymd/CVE-2017-1000117)
|
||||
- [shogo82148/Fix-CVE-2017-1000117](https://github.com/shogo82148/Fix-CVE-2017-1000117)
|
||||
- [sasairc/CVE-2017-1000117_wasawasa](https://github.com/sasairc/CVE-2017-1000117_wasawasa)
|
||||
- [Shadow5523/CVE-2017-1000117-test](https://github.com/Shadow5523/CVE-2017-1000117-test)
|
||||
- [bells17/CVE-2017-1000117](https://github.com/bells17/CVE-2017-1000117)
|
||||
- [ieee0824/CVE-2017-1000117](https://github.com/ieee0824/CVE-2017-1000117)
|
||||
- [rootclay/CVE-2017-1000117](https://github.com/rootclay/CVE-2017-1000117)
|
||||
- [ieee0824/CVE-2017-1000117-sl](https://github.com/ieee0824/CVE-2017-1000117-sl)
|
||||
- [takehaya/CVE-2017-1000117](https://github.com/takehaya/CVE-2017-1000117)
|
||||
- [ikmski/CVE-2017-1000117](https://github.com/ikmski/CVE-2017-1000117)
|
||||
- [nkoneko/CVE-2017-1000117](https://github.com/nkoneko/CVE-2017-1000117)
|
||||
- [chenzhuo0618/test](https://github.com/chenzhuo0618/test)
|
||||
- [siling2017/CVE-2017-1000117](https://github.com/siling2017/CVE-2017-1000117)
|
||||
- [Q2h1Cg/CVE-2017-1000117](https://github.com/Q2h1Cg/CVE-2017-1000117)
|
||||
- [cved-sources/cve-2017-1000117](https://github.com/cved-sources/cve-2017-1000117)
|
||||
- [leezp/CVE-2017-1000117](https://github.com/leezp/CVE-2017-1000117)
|
||||
|
@ -14668,14 +15016,33 @@ jqueryFileTree 2.1.5 and older Directory Traversal
|
|||
|
||||
- [Nickguitar/Jquery-File-Tree-1.6.6-Path-Traversal](https://github.com/Nickguitar/Jquery-File-Tree-1.6.6-Path-Traversal)
|
||||
|
||||
### CVE-2017-1000250 (2017-09-12)
|
||||
|
||||
<code>
|
||||
All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
|
||||
</code>
|
||||
|
||||
- [olav-st/CVE-2017-1000250-PoC](https://github.com/olav-st/CVE-2017-1000250-PoC)
|
||||
|
||||
### CVE-2017-1000251 (2017-09-12)
|
||||
|
||||
<code>
|
||||
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
|
||||
</code>
|
||||
|
||||
- [hayzamjs/Blueborne-CVE-2017-1000251](https://github.com/hayzamjs/Blueborne-CVE-2017-1000251)
|
||||
- [tlatkdgus1/blueborne-CVE-2017-1000251](https://github.com/tlatkdgus1/blueborne-CVE-2017-1000251)
|
||||
- [own2pwn/blueborne-CVE-2017-1000251-POC](https://github.com/own2pwn/blueborne-CVE-2017-1000251-POC)
|
||||
- [marcinguy/blueborne-CVE-2017-1000251](https://github.com/marcinguy/blueborne-CVE-2017-1000251)
|
||||
|
||||
### CVE-2017-1000253 (2017-10-03)
|
||||
|
||||
<code>
|
||||
Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
|
||||
</code>
|
||||
|
||||
- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253)
|
||||
|
||||
### CVE-2017-1000353 (2018-01-29)
|
||||
|
||||
<code>
|
||||
|
@ -14694,6 +15061,14 @@ Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validati
|
|||
- [homjxi0e/CVE-2017-1000367](https://github.com/homjxi0e/CVE-2017-1000367)
|
||||
- [pucerpocok/sudo_exploit](https://github.com/pucerpocok/sudo_exploit)
|
||||
|
||||
### CVE-2017-1000405 (2017-11-30)
|
||||
|
||||
<code>
|
||||
The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.
|
||||
</code>
|
||||
|
||||
- [bindecy/HugeDirtyCowPOC](https://github.com/bindecy/HugeDirtyCowPOC)
|
||||
|
||||
### CVE-2017-1000475 (2018-01-24)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue