From 67d8520694fe5bf2b09c4ec073924630ea293bed Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 12 Jan 2025 15:31:49 +0900 Subject: [PATCH] Auto Update 2025/01/12 06:31:49 --- 1999/CVE-1999-0532.json | 4 +- 2015/CVE-2015-0006.json | 33 + 2015/CVE-2015-0235.json | 279 ++++++ 2015/CVE-2015-1157.json | 33 + 2015/CVE-2015-1528.json | 64 ++ 2015/CVE-2015-1538.json | 93 ++ 2015/CVE-2015-1560.json | 33 + 2015/CVE-2015-1635.json | 31 + 2015/CVE-2015-1641.json | 33 + 2015/CVE-2015-2153.json | 33 + 2015/CVE-2015-2231.json | 33 + 2015/CVE-2015-3073.json | 33 + 2015/CVE-2015-3636.json | 155 +++ 2015/CVE-2015-3864.json | 62 ++ 2015/CVE-2015-4495.json | 33 + 2015/CVE-2015-5119.json | 62 ++ 2015/CVE-2015-5477.json | 155 +++ 2015/CVE-2015-5932.json | 33 + 2015/CVE-2015-6357.json | 33 + 2015/CVE-2015-6576.json | 33 + 2015/CVE-2015-6612.json | 64 ++ 2015/CVE-2015-6620.json | 31 + 2015/CVE-2015-6835.json | 33 + 2015/CVE-2015-7297.json | 31 + 2015/CVE-2015-7545.json | 33 + 2015/CVE-2015-7755.json | 31 + 2015/CVE-2015-7808.json | 33 + 2015/CVE-2015-8088.json | 33 + 2016/CVE-2016-0040.json | 31 + 2016/CVE-2016-0049.json | 33 + 2016/CVE-2016-0051.json | 95 ++ 2016/CVE-2016-0189.json | 64 ++ 2016/CVE-2016-0701.json | 33 + 2016/CVE-2016-0728.json | 186 ++++ 2016/CVE-2016-0752.json | 64 ++ 2016/CVE-2016-0801.json | 64 ++ 2016/CVE-2016-0805.json | 33 + 2016/CVE-2016-0846.json | 64 ++ 2016/CVE-2016-1287.json | 31 + 2016/CVE-2016-1734.json | 33 + 2016/CVE-2016-1757.json | 33 + 2016/CVE-2016-1764.json | 40 + 2016/CVE-2016-1828.json | 31 + 2016/CVE-2016-2098.json | 66 ++ 2016/CVE-2016-2107.json | 64 ++ 2016/CVE-2016-2118.json | 33 + 2016/CVE-2016-2402.json | 64 ++ 2016/CVE-2016-2431.json | 64 ++ 2016/CVE-2016-3141.json | 33 + 2016/CVE-2016-3714.json | 155 +++ 2016/CVE-2016-3959.json | 33 + 2016/CVE-2016-4010.json | 31 + 2016/CVE-2016-4438.json | 31 + 2016/CVE-2016-5636.json | 33 + 2016/CVE-2016-5699.json | 31 + 2017/CVE-2017-12542.json | 4 +- 2017/CVE-2017-9248.json | 8 +- 2018/CVE-2018-0114.json | 124 +++ 2018/CVE-2018-0208.json | 33 + 2018/CVE-2018-0708.json | 33 + 2018/CVE-2018-0802.json | 31 + 2018/CVE-2018-0886.json | 8 +- 2018/CVE-2018-1000030.json | 33 + 2018/CVE-2018-1000082.json | 33 + 2018/CVE-2018-1000140.json | 64 ++ 2018/CVE-2018-1000224.json | 33 + 2018/CVE-2018-1000542.json | 33 + 2018/CVE-2018-1000861.json | 35 + 2018/CVE-2018-1002105.json | 31 + 2018/CVE-2018-10118.json | 33 + 2018/CVE-2018-10388.json | 33 + 2018/CVE-2018-10920.json | 33 + 2018/CVE-2018-10933.json | 220 +++++ 2018/CVE-2018-1111.json | 35 + 2018/CVE-2018-11235.json | 217 +++++ 2018/CVE-2018-1133.json | 62 ++ 2018/CVE-2018-11564.json | 33 + 2018/CVE-2018-1160.json | 33 + 2018/CVE-2018-11631.json | 33 + 2018/CVE-2018-11686.json | 36 + 2018/CVE-2018-11761.json | 33 + 2018/CVE-2018-11770.json | 33 + 2018/CVE-2018-11776.json | 124 +++ 2018/CVE-2018-11788.json | 33 + 2018/CVE-2018-12086.json | 33 + 2018/CVE-2018-1235.json | 33 + 2018/CVE-2018-12386.json | 64 ++ 2018/CVE-2018-12421.json | 33 + 2018/CVE-2018-12613.json | 62 ++ 2018/CVE-2018-1270.json | 31 + 2018/CVE-2018-1273.json | 62 ++ 2018/CVE-2018-12798.json | 33 + 2018/CVE-2018-1288.json | 33 + 2018/CVE-2018-1297.json | 31 + 2018/CVE-2018-1306.json | 33 + 2018/CVE-2018-13257.json | 33 + 2018/CVE-2018-13341.json | 31 + 2018/CVE-2018-1335.json | 124 +++ 2018/CVE-2018-13379.json | 248 +++++ 2018/CVE-2018-13382.json | 64 ++ 2018/CVE-2018-13410.json | 33 + 2018/CVE-2018-13797.json | 33 + 2018/CVE-2018-14442.json | 31 + 2018/CVE-2018-14667.json | 62 ++ 2018/CVE-2018-14847.json | 160 +++ 2018/CVE-2018-15133.json | 186 ++++ 2018/CVE-2018-15473.json | 312 ++++++ 2018/CVE-2018-15686.json | 33 + 2018/CVE-2018-15835.json | 33 + 2018/CVE-2018-15877.json | 31 + 2018/CVE-2018-15961.json | 31 + 2018/CVE-2018-15968.json | 33 + 2018/CVE-2018-15982.json | 31 + 2018/CVE-2018-16283.json | 33 + 2018/CVE-2018-16341.json | 34 + 2018/CVE-2018-16492.json | 33 + 2018/CVE-2018-16509.json | 31 + 2018/CVE-2018-16706.json | 33 + 2018/CVE-2018-16763.json | 124 +++ 2018/CVE-2018-16843.json | 33 + 2018/CVE-2018-16854.json | 33 + 2018/CVE-2018-16858.json | 62 ++ 2018/CVE-2018-17207.json | 33 + 2018/CVE-2018-17246.json | 33 + 2018/CVE-2018-17254.json | 37 + 2018/CVE-2018-17456.json | 62 ++ 2018/CVE-2018-17463.json | 31 + 2018/CVE-2018-17873.json | 33 + 2018/CVE-2018-18368.json | 33 + 2018/CVE-2018-18500.json | 33 + 2018/CVE-2018-18649.json | 33 + 2018/CVE-2018-18778.json | 31 + 2018/CVE-2018-18852.json | 71 ++ 2018/CVE-2018-19207.json | 31 + 2018/CVE-2018-19276.json | 36 + 2018/CVE-2018-19320.json | 31 + 2018/CVE-2018-19571.json | 72 ++ 2018/CVE-2018-19859.json | 33 + 2018/CVE-2018-19987.json | 33 + 2018/CVE-2018-1999002.json | 62 ++ 2018/CVE-2018-20062.json | 31 + 2018/CVE-2018-20162.json | 33 + 2018/CVE-2018-20165.json | 33 + 2018/CVE-2018-20250.json | 471 +++++++++ 2018/CVE-2018-20433.json | 33 + 2018/CVE-2018-20434.json | 33 + 2018/CVE-2018-20555.json | 40 + 2018/CVE-2018-20718.json | 33 + 2018/CVE-2018-20966.json | 33 + 2018/CVE-2018-2392.json | 33 + 2018/CVE-2018-2628.json | 62 ++ 2018/CVE-2018-2879.json | 31 + 2018/CVE-2018-2893.json | 31 + 2018/CVE-2018-2894.json | 31 + 2018/CVE-2018-3245.json | 31 + 2018/CVE-2018-3295.json | 64 ++ 2018/CVE-2018-3639.json | 31 + 2018/CVE-2018-3760.json | 62 ++ 2018/CVE-2018-3786.json | 33 + 2018/CVE-2018-3810.json | 31 + 2018/CVE-2018-3811.json | 33 + 2018/CVE-2018-4124.json | 33 + 2018/CVE-2018-4193.json | 33 + 2018/CVE-2018-4407.json | 93 ++ 2018/CVE-2018-4411.json | 33 + 2018/CVE-2018-4441.json | 37 + 2018/CVE-2018-4878.json | 62 ++ 2018/CVE-2018-5234.json | 37 + 2018/CVE-2018-5353.json | 33 + 2018/CVE-2018-5354.json | 33 + 2018/CVE-2018-5955.json | 44 + 2018/CVE-2018-6065.json | 35 + 2018/CVE-2018-6389.json | 93 ++ 2018/CVE-2018-6574.json | 1178 ++++++++++++++++++++++ 2018/CVE-2018-6789.json | 31 + 2018/CVE-2018-6892.json | 31 + 2018/CVE-2018-6961.json | 31 + 2018/CVE-2018-7284.json | 33 + 2018/CVE-2018-7600.json | 286 ++++++ 2018/CVE-2018-7602.json | 31 + 2018/CVE-2018-7669.json | 33 + 2018/CVE-2018-8004.json | 33 + 2018/CVE-2018-8120.json | 93 ++ 2018/CVE-2018-8174.json | 186 ++++ 2018/CVE-2018-8284.json | 33 + 2018/CVE-2018-8389.json | 33 + 2018/CVE-2018-8453.json | 95 ++ 2018/CVE-2018-8611.json | 33 + 2018/CVE-2018-8639.json | 64 ++ 2018/CVE-2018-8718.json | 33 + 2018/CVE-2018-9206.json | 62 ++ 2018/CVE-2018-9207.json | 33 + 2018/CVE-2018-9208.json | 33 + 2018/CVE-2018-9276.json | 62 ++ 2018/CVE-2018-9468.json | 33 + 2018/CVE-2018-9493.json | 33 + 2018/CVE-2018-9546.json | 33 + 2018/CVE-2018-9950.json | 33 + 2018/CVE-2018-9951.json | 33 + 2018/CVE-2018-9995.json | 248 +++++ 2021/CVE-2021-25374.json | 8 +- 2021/CVE-2021-44228.json | 8 +- 2022/CVE-2022-21999.json | 4 +- 2023/CVE-2023-1177.json | 31 + 2023/CVE-2023-20073.json | 33 + 2023/CVE-2023-20110.json | 33 + 2023/CVE-2023-2023.json | 31 + 2023/CVE-2023-2033.json | 62 ++ 2023/CVE-2023-20562.json | 64 ++ 2023/CVE-2023-20593.json | 37 + 2023/CVE-2023-21554.json | 31 + 2023/CVE-2023-21746.json | 33 + 2023/CVE-2023-21752.json | 31 + 2023/CVE-2023-21939.json | 33 + 2023/CVE-2023-2255.json | 31 + 2023/CVE-2023-22809.json | 39 +- 2023/CVE-2023-23333.json | 31 + 2023/CVE-2023-23397.json | 31 + 2023/CVE-2023-23752.json | 31 + 2023/CVE-2023-24329.json | 62 ++ 2023/CVE-2023-24488.json | 128 +++ 2023/CVE-2023-24489.json | 64 ++ 2023/CVE-2023-25157.json | 31 + 2023/CVE-2023-2523.json | 31 + 2023/CVE-2023-25725.json | 33 + 2023/CVE-2023-26067.json | 33 + 2023/CVE-2023-26255.json | 64 ++ 2023/CVE-2023-26256.json | 126 +++ 2023/CVE-2023-2640.json | 31 + 2023/CVE-2023-26469.json | 33 + 2023/CVE-2023-27163.json | 325 +++++++ 2023/CVE-2023-2732.json | 35 + 2023/CVE-2023-27372.json | 97 ++ 2023/CVE-2023-27524.json | 31 + 2023/CVE-2023-27997.json | 31 + 2023/CVE-2023-28121.json | 101 ++ 2023/CVE-2023-28252.json | 31 + 2023/CVE-2023-28343.json | 31 + 2023/CVE-2023-28432.json | 31 + 2023/CVE-2023-28467.json | 33 + 2023/CVE-2023-2868.json | 62 ++ 2023/CVE-2023-29017.json | 31 + 2023/CVE-2023-2916.json | 33 + 2023/CVE-2023-29409.json | 33 + 2023/CVE-2023-29439.json | 33 + 2023/CVE-2023-29489.json | 31 + 2023/CVE-2023-2982.json | 31 + 2023/CVE-2023-30226.json | 33 + 2023/CVE-2023-30383.json | 33 + 2023/CVE-2023-30533.json | 33 + 2023/CVE-2023-30765.json | 33 + 2023/CVE-2023-3079.json | 33 + 2023/CVE-2023-31704.json | 33 + 2023/CVE-2023-31705.json | 33 + 2023/CVE-2023-31753.json | 33 + 2023/CVE-2023-32117.json | 33 + 2023/CVE-2023-32235.json | 33 + 2023/CVE-2023-32243.json | 31 + 2023/CVE-2023-32315.json | 97 ++ 2023/CVE-2023-32681.json | 33 + 2023/CVE-2023-32784.json | 31 + 2023/CVE-2023-32961.json | 33 + 2023/CVE-2023-33242.json | 33 + 2023/CVE-2023-33246.json | 31 + 2023/CVE-2023-33592.json | 33 + 2023/CVE-2023-33668.json | 33 + 2023/CVE-2023-33768.json | 31 + 2023/CVE-2023-34035.json | 31 + 2023/CVE-2023-34039.json | 31 + 2023/CVE-2023-34040.json | 31 + 2023/CVE-2023-34312.json | 31 + 2023/CVE-2023-34362.json | 110 +++ 2023/CVE-2023-3450.json | 31 + 2023/CVE-2023-3460.json | 189 ++++ 2023/CVE-2023-34634.json | 33 + 2023/CVE-2023-34853.json | 33 + 2023/CVE-2023-34960.json | 97 ++ 2023/CVE-2023-35078.json | 188 ++++ 2023/CVE-2023-35082.json | 33 + 2023/CVE-2023-35086.json | 33 + 2023/CVE-2023-3519.json | 381 ++++++++ 2023/CVE-2023-35744.json | 33 + 2023/CVE-2023-35801.json | 33 + 2023/CVE-2023-35803.json | 33 + 2023/CVE-2023-35828.json | 33 + 2023/CVE-2023-35843.json | 31 + 2023/CVE-2023-35885.json | 31 + 2023/CVE-2023-36158.json | 33 + 2023/CVE-2023-36159.json | 33 + 2023/CVE-2023-36163.json | 33 + 2023/CVE-2023-36164.json | 33 + 2023/CVE-2023-36165.json | 33 + 2023/CVE-2023-36168.json | 33 + 2023/CVE-2023-36169.json | 33 + 2023/CVE-2023-36281.json | 31 + 2023/CVE-2023-36531.json | 33 + 2023/CVE-2023-36664.json | 31 + 2023/CVE-2023-36844.json | 31 + 2023/CVE-2023-36846.json | 33 + 2023/CVE-2023-36874.json | 93 ++ 2023/CVE-2023-36884.json | 256 +++++ 2023/CVE-2023-36899.json | 64 ++ 2023/CVE-2023-37164.json | 33 + 2023/CVE-2023-37189.json | 33 + 2023/CVE-2023-37190.json | 33 + 2023/CVE-2023-37191.json | 33 + 2023/CVE-2023-37474.json | 33 + 2023/CVE-2023-37582.json | 33 + 2023/CVE-2023-37596.json | 33 + 2023/CVE-2023-37597.json | 33 + 2023/CVE-2023-37598.json | 33 + 2023/CVE-2023-37599.json | 33 + 2023/CVE-2023-37625.json | 33 + 2023/CVE-2023-37771.json | 33 + 2023/CVE-2023-37772.json | 33 + 2023/CVE-2023-37778.json | 33 + 2023/CVE-2023-37779.json | 33 + 2023/CVE-2023-37786.json | 33 + 2023/CVE-2023-37800.json | 33 + 2023/CVE-2023-37979.json | 64 ++ 2023/CVE-2023-38035.json | 62 ++ 2023/CVE-2023-3824.json | 2 +- 2023/CVE-2023-3836.json | 33 + 2023/CVE-2023-38434.json | 33 + 2023/CVE-2023-38490.json | 40 + 2023/CVE-2023-38632.json | 33 + 2023/CVE-2023-38646.json | 376 ++++++++ 2023/CVE-2023-38820.json | 33 + 2023/CVE-2023-38821.json | 33 + 2023/CVE-2023-38822.json | 33 + 2023/CVE-2023-38831.json | 521 ++++++++++ 2023/CVE-2023-38890.json | 33 + 2023/CVE-2023-39062.json | 33 + 2023/CVE-2023-39063.json | 39 + 2023/CVE-2023-39115.json | 33 + 2023/CVE-2023-39144.json | 33 + 2023/CVE-2023-39526.json | 33 + 2023/CVE-2023-39707.json | 33 + 2023/CVE-2023-39708.json | 33 + 2023/CVE-2023-39709.json | 33 + 2023/CVE-2023-39710.json | 33 + 2023/CVE-2023-39711.json | 33 + 2023/CVE-2023-39712.json | 33 + 2023/CVE-2023-39714.json | 33 + 2023/CVE-2023-40294.json | 33 + 2023/CVE-2023-40296.json | 33 + 2023/CVE-2023-40477.json | 64 ++ 2023/CVE-2023-41080.json | 33 + 2023/CVE-2023-41265.json | 33 + 2023/CVE-2023-41646.json | 33 + 2023/CVE-2023-4165.json | 33 + 2023/CVE-2023-4166.json | 33 + 2023/CVE-2023-41717.json | 33 + 2023/CVE-2023-4174.json | 33 + 2023/CVE-2023-4460.json | 35 + 2023/CVE-2023-4696.json | 33 + 2023/CVE-2023-5546.json | 33 + 2024/CVE-2024-10586.json | 31 + 2024/CVE-2024-1086.json | 8 +- 2024/CVE-2024-21338.json | 31 + 2024/CVE-2024-25641.json | 8 +- 2024/CVE-2024-30088.json | 4 +- 2024/CVE-2024-35250.json | 8 +- 2024/CVE-2024-38063.json | 20 +- 2024/CVE-2024-38200.json | 8 +- 2024/CVE-2024-46538.json | 8 +- 2024/CVE-2024-47177.json | 8 +- 2024/CVE-2024-47575.json | 8 +- 2024/CVE-2024-48990.json | 8 +- 2024/CVE-2024-49113.json | 12 +- 2024/CVE-2024-50379.json | 8 +- 2024/CVE-2024-56145.json | 8 +- 2024/CVE-2024-6387.json | 8 +- 2025/CVE-2025-0282.json | 8 +- README.md | 1877 ++++++++++++++++++++++++++++++++++++ 375 files changed, 22166 insertions(+), 93 deletions(-) create mode 100644 2015/CVE-2015-0006.json create mode 100644 2015/CVE-2015-1157.json create mode 100644 2015/CVE-2015-1528.json create mode 100644 2015/CVE-2015-1560.json create mode 100644 2015/CVE-2015-1641.json create mode 100644 2015/CVE-2015-2153.json create mode 100644 2015/CVE-2015-2231.json create mode 100644 2015/CVE-2015-3073.json create mode 100644 2015/CVE-2015-4495.json create mode 100644 2015/CVE-2015-5932.json create mode 100644 2015/CVE-2015-6357.json create mode 100644 2015/CVE-2015-6576.json create mode 100644 2015/CVE-2015-6612.json create mode 100644 2015/CVE-2015-6835.json create mode 100644 2015/CVE-2015-7545.json create mode 100644 2015/CVE-2015-7808.json create mode 100644 2015/CVE-2015-8088.json create mode 100644 2016/CVE-2016-0049.json create mode 100644 2016/CVE-2016-0051.json create mode 100644 2016/CVE-2016-0189.json create mode 100644 2016/CVE-2016-0701.json create mode 100644 2016/CVE-2016-0752.json create mode 100644 2016/CVE-2016-0801.json create mode 100644 2016/CVE-2016-0805.json create mode 100644 2016/CVE-2016-0846.json create mode 100644 2016/CVE-2016-1734.json create mode 100644 2016/CVE-2016-1757.json create mode 100644 2016/CVE-2016-1764.json create mode 100644 2016/CVE-2016-2107.json create mode 100644 2016/CVE-2016-2118.json create mode 100644 2016/CVE-2016-2402.json create mode 100644 2016/CVE-2016-2431.json create mode 100644 2016/CVE-2016-3141.json create mode 100644 2016/CVE-2016-3959.json create mode 100644 2016/CVE-2016-5636.json create mode 100644 2018/CVE-2018-0208.json create mode 100644 2018/CVE-2018-0708.json create mode 100644 2018/CVE-2018-1000030.json create mode 100644 2018/CVE-2018-1000082.json create mode 100644 2018/CVE-2018-1000140.json create mode 100644 2018/CVE-2018-1000224.json create mode 100644 2018/CVE-2018-1000542.json create mode 100644 2018/CVE-2018-10118.json create mode 100644 2018/CVE-2018-10388.json create mode 100644 2018/CVE-2018-10920.json create mode 100644 2018/CVE-2018-11564.json create mode 100644 2018/CVE-2018-1160.json create mode 100644 2018/CVE-2018-11631.json create mode 100644 2018/CVE-2018-11686.json create mode 100644 2018/CVE-2018-11761.json create mode 100644 2018/CVE-2018-11770.json create mode 100644 2018/CVE-2018-11788.json create mode 100644 2018/CVE-2018-12086.json create mode 100644 2018/CVE-2018-1235.json create mode 100644 2018/CVE-2018-12386.json create mode 100644 2018/CVE-2018-12421.json create mode 100644 2018/CVE-2018-12798.json create mode 100644 2018/CVE-2018-1288.json create mode 100644 2018/CVE-2018-1306.json create mode 100644 2018/CVE-2018-13257.json create mode 100644 2018/CVE-2018-13382.json create mode 100644 2018/CVE-2018-13410.json create mode 100644 2018/CVE-2018-13797.json create mode 100644 2018/CVE-2018-15686.json create mode 100644 2018/CVE-2018-15835.json create mode 100644 2018/CVE-2018-15968.json create mode 100644 2018/CVE-2018-16283.json create mode 100644 2018/CVE-2018-16492.json create mode 100644 2018/CVE-2018-16706.json create mode 100644 2018/CVE-2018-16843.json create mode 100644 2018/CVE-2018-16854.json create mode 100644 2018/CVE-2018-17207.json create mode 100644 2018/CVE-2018-17246.json create mode 100644 2018/CVE-2018-17873.json create mode 100644 2018/CVE-2018-18368.json create mode 100644 2018/CVE-2018-18500.json create mode 100644 2018/CVE-2018-18649.json create mode 100644 2018/CVE-2018-18852.json create mode 100644 2018/CVE-2018-19276.json create mode 100644 2018/CVE-2018-19859.json create mode 100644 2018/CVE-2018-19987.json create mode 100644 2018/CVE-2018-20162.json create mode 100644 2018/CVE-2018-20165.json create mode 100644 2018/CVE-2018-20433.json create mode 100644 2018/CVE-2018-20434.json create mode 100644 2018/CVE-2018-20555.json create mode 100644 2018/CVE-2018-20718.json create mode 100644 2018/CVE-2018-20966.json create mode 100644 2018/CVE-2018-2392.json create mode 100644 2018/CVE-2018-3295.json create mode 100644 2018/CVE-2018-3786.json create mode 100644 2018/CVE-2018-3811.json create mode 100644 2018/CVE-2018-4124.json create mode 100644 2018/CVE-2018-4193.json create mode 100644 2018/CVE-2018-4411.json create mode 100644 2018/CVE-2018-4441.json create mode 100644 2018/CVE-2018-5353.json create mode 100644 2018/CVE-2018-5354.json create mode 100644 2018/CVE-2018-6065.json create mode 100644 2018/CVE-2018-7284.json create mode 100644 2018/CVE-2018-7669.json create mode 100644 2018/CVE-2018-8004.json create mode 100644 2018/CVE-2018-8284.json create mode 100644 2018/CVE-2018-8389.json create mode 100644 2018/CVE-2018-8453.json create mode 100644 2018/CVE-2018-8611.json create mode 100644 2018/CVE-2018-8639.json create mode 100644 2018/CVE-2018-8718.json create mode 100644 2018/CVE-2018-9207.json create mode 100644 2018/CVE-2018-9208.json create mode 100644 2018/CVE-2018-9468.json create mode 100644 2018/CVE-2018-9493.json create mode 100644 2018/CVE-2018-9546.json create mode 100644 2018/CVE-2018-9950.json create mode 100644 2018/CVE-2018-9951.json create mode 100644 2023/CVE-2023-20073.json create mode 100644 2023/CVE-2023-20110.json create mode 100644 2023/CVE-2023-20562.json create mode 100644 2023/CVE-2023-20593.json create mode 100644 2023/CVE-2023-21746.json create mode 100644 2023/CVE-2023-21939.json create mode 100644 2023/CVE-2023-24488.json create mode 100644 2023/CVE-2023-24489.json create mode 100644 2023/CVE-2023-25725.json create mode 100644 2023/CVE-2023-26067.json create mode 100644 2023/CVE-2023-26255.json create mode 100644 2023/CVE-2023-26256.json create mode 100644 2023/CVE-2023-26469.json create mode 100644 2023/CVE-2023-28467.json create mode 100644 2023/CVE-2023-2916.json create mode 100644 2023/CVE-2023-29409.json create mode 100644 2023/CVE-2023-29439.json create mode 100644 2023/CVE-2023-30226.json create mode 100644 2023/CVE-2023-30383.json create mode 100644 2023/CVE-2023-30533.json create mode 100644 2023/CVE-2023-30765.json create mode 100644 2023/CVE-2023-3079.json create mode 100644 2023/CVE-2023-31704.json create mode 100644 2023/CVE-2023-31705.json create mode 100644 2023/CVE-2023-31753.json create mode 100644 2023/CVE-2023-32117.json create mode 100644 2023/CVE-2023-32235.json create mode 100644 2023/CVE-2023-32681.json create mode 100644 2023/CVE-2023-32961.json create mode 100644 2023/CVE-2023-33242.json create mode 100644 2023/CVE-2023-33592.json create mode 100644 2023/CVE-2023-33668.json create mode 100644 2023/CVE-2023-34634.json create mode 100644 2023/CVE-2023-34853.json create mode 100644 2023/CVE-2023-35082.json create mode 100644 2023/CVE-2023-35086.json create mode 100644 2023/CVE-2023-35744.json create mode 100644 2023/CVE-2023-35801.json create mode 100644 2023/CVE-2023-35803.json create mode 100644 2023/CVE-2023-35828.json create mode 100644 2023/CVE-2023-36158.json create mode 100644 2023/CVE-2023-36159.json create mode 100644 2023/CVE-2023-36163.json create mode 100644 2023/CVE-2023-36164.json create mode 100644 2023/CVE-2023-36165.json create mode 100644 2023/CVE-2023-36168.json create mode 100644 2023/CVE-2023-36169.json create mode 100644 2023/CVE-2023-36531.json create mode 100644 2023/CVE-2023-36846.json create mode 100644 2023/CVE-2023-36899.json create mode 100644 2023/CVE-2023-37164.json create mode 100644 2023/CVE-2023-37189.json create mode 100644 2023/CVE-2023-37190.json create mode 100644 2023/CVE-2023-37191.json create mode 100644 2023/CVE-2023-37474.json create mode 100644 2023/CVE-2023-37582.json create mode 100644 2023/CVE-2023-37596.json create mode 100644 2023/CVE-2023-37597.json create mode 100644 2023/CVE-2023-37598.json create mode 100644 2023/CVE-2023-37599.json create mode 100644 2023/CVE-2023-37625.json create mode 100644 2023/CVE-2023-37771.json create mode 100644 2023/CVE-2023-37772.json create mode 100644 2023/CVE-2023-37778.json create mode 100644 2023/CVE-2023-37779.json create mode 100644 2023/CVE-2023-37786.json create mode 100644 2023/CVE-2023-37800.json create mode 100644 2023/CVE-2023-37979.json create mode 100644 2023/CVE-2023-3836.json create mode 100644 2023/CVE-2023-38434.json create mode 100644 2023/CVE-2023-38490.json create mode 100644 2023/CVE-2023-38632.json create mode 100644 2023/CVE-2023-38820.json create mode 100644 2023/CVE-2023-38821.json create mode 100644 2023/CVE-2023-38822.json create mode 100644 2023/CVE-2023-38890.json create mode 100644 2023/CVE-2023-39062.json create mode 100644 2023/CVE-2023-39063.json create mode 100644 2023/CVE-2023-39115.json create mode 100644 2023/CVE-2023-39144.json create mode 100644 2023/CVE-2023-39526.json create mode 100644 2023/CVE-2023-39707.json create mode 100644 2023/CVE-2023-39708.json create mode 100644 2023/CVE-2023-39709.json create mode 100644 2023/CVE-2023-39710.json create mode 100644 2023/CVE-2023-39711.json create mode 100644 2023/CVE-2023-39712.json create mode 100644 2023/CVE-2023-39714.json create mode 100644 2023/CVE-2023-40294.json create mode 100644 2023/CVE-2023-40296.json create mode 100644 2023/CVE-2023-40477.json create mode 100644 2023/CVE-2023-41080.json create mode 100644 2023/CVE-2023-41265.json create mode 100644 2023/CVE-2023-41646.json create mode 100644 2023/CVE-2023-4165.json create mode 100644 2023/CVE-2023-4166.json create mode 100644 2023/CVE-2023-41717.json create mode 100644 2023/CVE-2023-4174.json create mode 100644 2023/CVE-2023-4460.json create mode 100644 2023/CVE-2023-4696.json create mode 100644 2023/CVE-2023-5546.json diff --git a/1999/CVE-1999-0532.json b/1999/CVE-1999-0532.json index 27a31c2680..01335f7b01 100644 --- a/1999/CVE-1999-0532.json +++ b/1999/CVE-1999-0532.json @@ -45,8 +45,8 @@ "description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.", "fork": false, "created_at": "2021-02-11T17:25:24Z", - "updated_at": "2023-03-27T20:49:20Z", - "pushed_at": "2022-05-02T13:11:16Z", + "updated_at": "2025-01-12T01:34:52Z", + "pushed_at": "2025-01-12T01:34:48Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": true, diff --git a/2015/CVE-2015-0006.json b/2015/CVE-2015-0006.json new file mode 100644 index 0000000000..3a8f9cfb5d --- /dev/null +++ b/2015/CVE-2015-0006.json @@ -0,0 +1,33 @@ +[ + { + "id": 19259219, + "name": "imposter", + "full_name": "bugch3ck\/imposter", + "owner": { + "login": "bugch3ck", + "id": 4165895, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4165895?v=4", + "html_url": "https:\/\/github.com\/bugch3ck", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/bugch3ck\/imposter", + "description": "Proof of concept for CVE-2015-0006. Fixed in MS15-005 https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2015\/ms15-005 .", + "fork": false, + "created_at": "2014-04-29T01:05:57Z", + "updated_at": "2024-08-12T19:23:42Z", + "pushed_at": "2014-06-07T23:45:44Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-0235.json b/2015/CVE-2015-0235.json index b2f17c9817..f0653ecf25 100644 --- a/2015/CVE-2015-0235.json +++ b/2015/CVE-2015-0235.json @@ -1,4 +1,252 @@ [ + { + "id": 29925728, + "name": "ghost-checker", + "full_name": "fser\/ghost-checker", + "owner": { + "login": "fser", + "id": 774138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/774138?v=4", + "html_url": "https:\/\/github.com\/fser", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/fser\/ghost-checker", + "description": "Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security", + "fork": false, + "created_at": "2015-01-27T17:31:33Z", + "updated_at": "2018-05-15T04:55:01Z", + "pushed_at": "2015-01-27T17:35:16Z", + "stargazers_count": 5, + "watchers_count": 5, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 5, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 29933656, + "name": "CVE-2015-0235-cookbook", + "full_name": "mikesplain\/CVE-2015-0235-cookbook", + "owner": { + "login": "mikesplain", + "id": 881965, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/881965?v=4", + "html_url": "https:\/\/github.com\/mikesplain", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook", + "description": "A chef cookbook to test the GHOST vulnerability", + "fork": false, + "created_at": "2015-01-27T20:34:42Z", + "updated_at": "2017-09-29T11:32:54Z", + "pushed_at": "2015-01-27T21:41:24Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 29941036, + "name": "CVE-2015-0235-test", + "full_name": "aaronfay\/CVE-2015-0235-test", + "owner": { + "login": "aaronfay", + "id": 1033941, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1033941?v=4", + "html_url": "https:\/\/github.com\/aaronfay", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test", + "description": "Ansible playbook to check vulnerability for CVE-2015-0235", + "fork": false, + "created_at": "2015-01-27T23:45:22Z", + "updated_at": "2023-03-07T20:55:14Z", + "pushed_at": "2015-01-29T03:33:29Z", + "stargazers_count": 15, + "watchers_count": 15, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 15, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 29950345, + "name": "CVE-2015-0235_GHOST", + "full_name": "mholzinger\/CVE-2015-0235_GHOST", + "owner": { + "login": "mholzinger", + "id": 235958, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/235958?v=4", + "html_url": "https:\/\/github.com\/mholzinger", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/mholzinger\/CVE-2015-0235_GHOST", + "description": null, + "fork": false, + "created_at": "2015-01-28T04:22:05Z", + "updated_at": "2016-02-26T05:46:40Z", + "pushed_at": "2015-01-28T05:26:34Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 29988916, + "name": "ansible-CVE-2015-0235-GHOST", + "full_name": "adherzog\/ansible-CVE-2015-0235-GHOST", + "owner": { + "login": "adherzog", + "id": 1744181, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1744181?v=4", + "html_url": "https:\/\/github.com\/adherzog", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST", + "description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability", + "fork": false, + "created_at": "2015-01-28T21:22:33Z", + "updated_at": "2022-05-26T22:13:34Z", + "pushed_at": "2015-01-28T21:23:34Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 29993101, + "name": "lenny-libc6", + "full_name": "favoretti\/lenny-libc6", + "owner": { + "login": "favoretti", + "id": 805046, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/805046?v=4", + "html_url": "https:\/\/github.com\/favoretti", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/favoretti\/lenny-libc6", + "description": "CVE-2015-0235 patches lenny libc6 packages for amd64", + "fork": false, + "created_at": "2015-01-28T23:09:13Z", + "updated_at": "2015-01-28T23:09:13Z", + "pushed_at": "2015-01-28T23:11:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 30004399, + "name": "cfengine-CVE_2015_0235", + "full_name": "nickanderson\/cfengine-CVE_2015_0235", + "owner": { + "login": "nickanderson", + "id": 202896, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4", + "html_url": "https:\/\/github.com\/nickanderson", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235", + "description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability", + "fork": false, + "created_at": "2015-01-29T04:58:54Z", + "updated_at": "2016-02-13T01:41:47Z", + "pushed_at": "2015-01-29T21:23:45Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 30008427, + "name": "cookbook-update-glibc", + "full_name": "koudaiii-archives\/cookbook-update-glibc", + "owner": { + "login": "koudaiii-archives", + "id": 51727289, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51727289?v=4", + "html_url": "https:\/\/github.com\/koudaiii-archives", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc", + "description": "cookbook for update glibc. CVE-2015-0235(GHOST)", + "fork": false, + "created_at": "2015-01-29T07:14:17Z", + "updated_at": "2023-01-28T20:14:16Z", + "pushed_at": "2015-01-29T07:38:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 30019912, "name": "ghostbusters15", @@ -30,6 +278,37 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 30066365, + "name": "CVE-2015-0235", + "full_name": "tobyzxj\/CVE-2015-0235", + "owner": { + "login": "tobyzxj", + "id": 4661855, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4661855?v=4", + "html_url": "https:\/\/github.com\/tobyzxj", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235", + "description": "glibc gethostbyname bug", + "fork": false, + "created_at": "2015-01-30T09:58:09Z", + "updated_at": "2024-08-12T19:16:06Z", + "pushed_at": "2015-01-30T10:02:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, { "id": 30183649, "name": "CVE-2015-0235-workaround", diff --git a/2015/CVE-2015-1157.json b/2015/CVE-2015-1157.json new file mode 100644 index 0000000000..2b4c7bebfa --- /dev/null +++ b/2015/CVE-2015-1157.json @@ -0,0 +1,33 @@ +[ + { + "id": 44224386, + "name": "CVE-2015-1157", + "full_name": "perillamint\/CVE-2015-1157", + "owner": { + "login": "perillamint", + "id": 1622360, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1622360?v=4", + "html_url": "https:\/\/github.com\/perillamint", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/perillamint\/CVE-2015-1157", + "description": "CVE-2015-1157 telnet server", + "fork": false, + "created_at": "2015-10-14T04:43:29Z", + "updated_at": "2023-10-21T04:07:05Z", + "pushed_at": "2015-10-28T04:49:08Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-1528.json b/2015/CVE-2015-1528.json new file mode 100644 index 0000000000..7b5c3569f4 --- /dev/null +++ b/2015/CVE-2015-1528.json @@ -0,0 +1,64 @@ +[ + { + "id": 39237925, + "name": "PoCForCVE-2015-1528", + "full_name": "secmob\/PoCForCVE-2015-1528", + "owner": { + "login": "secmob", + "id": 8598783, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8598783?v=4", + "html_url": "https:\/\/github.com\/secmob", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/secmob\/PoCForCVE-2015-1528", + "description": "I'll submit the poc after blackhat", + "fork": false, + "created_at": "2015-07-17T06:09:41Z", + "updated_at": "2024-08-12T19:18:23Z", + "pushed_at": "2015-08-30T19:24:32Z", + "stargazers_count": 116, + "watchers_count": 116, + "has_discussions": false, + "forks_count": 78, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 78, + "watchers": 116, + "score": 0, + "subscribers_count": 19 + }, + { + "id": 46163914, + "name": "PoCForCVE-2015-1528", + "full_name": "kanpol\/PoCForCVE-2015-1528", + "owner": { + "login": "kanpol", + "id": 6534560, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6534560?v=4", + "html_url": "https:\/\/github.com\/kanpol", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/kanpol\/PoCForCVE-2015-1528", + "description": null, + "fork": false, + "created_at": "2015-11-14T06:11:53Z", + "updated_at": "2016-02-13T02:15:38Z", + "pushed_at": "2015-11-14T06:12:30Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-1538.json b/2015/CVE-2015-1538.json index f1a37498aa..4a6e62e146 100644 --- a/2015/CVE-2015-1538.json +++ b/2015/CVE-2015-1538.json @@ -1,4 +1,97 @@ [ + { + "id": 42190635, + "name": "cve-2015-1538-1", + "full_name": "oguzhantopgul\/cve-2015-1538-1", + "owner": { + "login": "oguzhantopgul", + "id": 1797457, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1797457?v=4", + "html_url": "https:\/\/github.com\/oguzhantopgul", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/oguzhantopgul\/cve-2015-1538-1", + "description": "An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution", + "fork": false, + "created_at": "2015-09-09T16:28:30Z", + "updated_at": "2024-07-21T19:22:06Z", + "pushed_at": "2015-09-02T10:29:18Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 12, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 12, + "watchers": 3, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 42266289, + "name": "cve-2015-1538-1", + "full_name": "renjithsasidharan\/cve-2015-1538-1", + "owner": { + "login": "renjithsasidharan", + "id": 4523060, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523060?v=4", + "html_url": "https:\/\/github.com\/renjithsasidharan", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/renjithsasidharan\/cve-2015-1538-1", + "description": "An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution", + "fork": false, + "created_at": "2015-09-10T19:34:11Z", + "updated_at": "2022-04-12T19:44:53Z", + "pushed_at": "2015-09-10T15:39:16Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 42275186, + "name": "cve-2015-1538-1", + "full_name": "jduck\/cve-2015-1538-1", + "owner": { + "login": "jduck", + "id": 479840, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/479840?v=4", + "html_url": "https:\/\/github.com\/jduck", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jduck\/cve-2015-1538-1", + "description": "An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution", + "fork": false, + "created_at": "2015-09-10T23:00:59Z", + "updated_at": "2024-12-06T23:51:33Z", + "pushed_at": "2015-09-10T23:01:09Z", + "stargazers_count": 204, + "watchers_count": 204, + "has_discussions": false, + "forks_count": 118, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 118, + "watchers": 204, + "score": 0, + "subscribers_count": 18 + }, { "id": 54338368, "name": "Stagefright-cve-2015-1538-1", diff --git a/2015/CVE-2015-1560.json b/2015/CVE-2015-1560.json new file mode 100644 index 0000000000..864d78f66a --- /dev/null +++ b/2015/CVE-2015-1560.json @@ -0,0 +1,33 @@ +[ + { + "id": 40009554, + "name": "Centreon-CVE-2015-1560_1561", + "full_name": "Iansus\/Centreon-CVE-2015-1560_1561", + "owner": { + "login": "Iansus", + "id": 1913897, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1913897?v=4", + "html_url": "https:\/\/github.com\/Iansus", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Iansus\/Centreon-CVE-2015-1560_1561", + "description": "A little Python tool for exploiting CVE-2015-1560 and CVE-2015-1561. Quick'n'dirty. Real dirty.", + "fork": false, + "created_at": "2015-07-31T14:37:50Z", + "updated_at": "2016-06-25T07:30:20Z", + "pushed_at": "2015-07-31T14:43:20Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-1635.json b/2015/CVE-2015-1635.json index 2b8e5c5604..c14445a050 100644 --- a/2015/CVE-2015-1635.json +++ b/2015/CVE-2015-1635.json @@ -94,6 +94,37 @@ "score": 0, "subscribers_count": 3 }, + { + "id": 44228074, + "name": "chk-ms15-034", + "full_name": "wiredaem0n\/chk-ms15-034", + "owner": { + "login": "wiredaem0n", + "id": 8174099, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8174099?v=4", + "html_url": "https:\/\/github.com\/wiredaem0n", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/wiredaem0n\/chk-ms15-034", + "description": "Quick and dirty .py for checking (CVE-2015-1635) MS15-034 + DoS attack option", + "fork": false, + "created_at": "2015-10-14T06:21:21Z", + "updated_at": "2015-10-14T06:43:24Z", + "pushed_at": "2015-10-14T07:01:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, { "id": 80295112, "name": "Remove-IIS-RIIS", diff --git a/2015/CVE-2015-1641.json b/2015/CVE-2015-1641.json new file mode 100644 index 0000000000..17a86fc0e9 --- /dev/null +++ b/2015/CVE-2015-1641.json @@ -0,0 +1,33 @@ +[ + { + "id": 45006502, + "name": "rtf_exploit_extractor", + "full_name": "Cyberclues\/rtf_exploit_extractor", + "owner": { + "login": "Cyberclues", + "id": 10933249, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10933249?v=4", + "html_url": "https:\/\/github.com\/Cyberclues", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Cyberclues\/rtf_exploit_extractor", + "description": "Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents", + "fork": false, + "created_at": "2015-10-27T00:23:36Z", + "updated_at": "2024-08-12T19:19:50Z", + "pushed_at": "2017-01-10T02:25:55Z", + "stargazers_count": 23, + "watchers_count": 23, + "has_discussions": false, + "forks_count": 11, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 11, + "watchers": 23, + "score": 0, + "subscribers_count": 8 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-2153.json b/2015/CVE-2015-2153.json new file mode 100644 index 0000000000..79d0bf3883 --- /dev/null +++ b/2015/CVE-2015-2153.json @@ -0,0 +1,33 @@ +[ + { + "id": 41500990, + "name": "CVE-2015-2153", + "full_name": "arntsonl\/CVE-2015-2153", + "owner": { + "login": "arntsonl", + "id": 7754729, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7754729?v=4", + "html_url": "https:\/\/github.com\/arntsonl", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/arntsonl\/CVE-2015-2153", + "description": "An implementation of the CVE-2015-2153 exploit.", + "fork": false, + "created_at": "2015-08-27T17:21:36Z", + "updated_at": "2024-08-12T19:19:01Z", + "pushed_at": "2015-08-27T17:22:53Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-2231.json b/2015/CVE-2015-2231.json new file mode 100644 index 0000000000..24c08405e0 --- /dev/null +++ b/2015/CVE-2015-2231.json @@ -0,0 +1,33 @@ +[ + { + "id": 42131769, + "name": "adups-get-super-serial", + "full_name": "rednaga\/adups-get-super-serial", + "owner": { + "login": "rednaga", + "id": 10507639, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10507639?v=4", + "html_url": "https:\/\/github.com\/rednaga", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/rednaga\/adups-get-super-serial", + "description": "CVE-2015-2231 POC", + "fork": false, + "created_at": "2015-09-08T18:39:14Z", + "updated_at": "2017-02-19T16:22:19Z", + "pushed_at": "2015-09-08T21:07:30Z", + "stargazers_count": 10, + "watchers_count": 10, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 10, + "score": 0, + "subscribers_count": 5 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-3073.json b/2015/CVE-2015-3073.json new file mode 100644 index 0000000000..168db81f79 --- /dev/null +++ b/2015/CVE-2015-3073.json @@ -0,0 +1,33 @@ +[ + { + "id": 43228109, + "name": "CVE-2015-3073", + "full_name": "reigningshells\/CVE-2015-3073", + "owner": { + "login": "reigningshells", + "id": 14855322, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14855322?v=4", + "html_url": "https:\/\/github.com\/reigningshells", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/reigningshells\/CVE-2015-3073", + "description": "CVE-2015-3073 PoC", + "fork": false, + "created_at": "2015-09-27T00:19:23Z", + "updated_at": "2022-07-23T07:41:59Z", + "pushed_at": "2015-10-23T23:31:57Z", + "stargazers_count": 11, + "watchers_count": 11, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 11, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-3636.json b/2015/CVE-2015-3636.json index b881f05d33..628edbf40c 100644 --- a/2015/CVE-2015-3636.json +++ b/2015/CVE-2015-3636.json @@ -1,4 +1,159 @@ [ + { + "id": 39679436, + "name": "cve-2015-3636_crash", + "full_name": "betalphafai\/cve-2015-3636_crash", + "owner": { + "login": "betalphafai", + "id": 2919697, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2919697?v=4", + "html_url": "https:\/\/github.com\/betalphafai", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/betalphafai\/cve-2015-3636_crash", + "description": null, + "fork": false, + "created_at": "2015-07-25T09:29:27Z", + "updated_at": "2017-05-17T17:57:48Z", + "pushed_at": "2015-07-25T09:56:46Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 4, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 41139678, + "name": "libping_unhash_exploit_POC", + "full_name": "askk\/libping_unhash_exploit_POC", + "owner": { + "login": "askk", + "id": 4988461, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4988461?v=4", + "html_url": "https:\/\/github.com\/askk", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/askk\/libping_unhash_exploit_POC", + "description": "CVE-2015-3636 exploit", + "fork": false, + "created_at": "2015-08-21T06:39:30Z", + "updated_at": "2024-08-12T19:18:54Z", + "pushed_at": "2015-08-20T14:36:09Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 21, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 21, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 41653791, + "name": "cve-2015-3636", + "full_name": "ludongxu\/cve-2015-3636", + "owner": { + "login": "ludongxu", + "id": 6722799, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6722799?v=4", + "html_url": "https:\/\/github.com\/ludongxu", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ludongxu\/cve-2015-3636", + "description": null, + "fork": false, + "created_at": "2015-08-31T03:28:51Z", + "updated_at": "2015-08-31T03:28:51Z", + "pushed_at": "2015-08-31T03:28:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 42340022, + "name": "CVE-2015-3636", + "full_name": "fi01\/CVE-2015-3636", + "owner": { + "login": "fi01", + "id": 3073214, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3073214?v=4", + "html_url": "https:\/\/github.com\/fi01", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/fi01\/CVE-2015-3636", + "description": "PoC code for 32 bit Android OS", + "fork": false, + "created_at": "2015-09-12T01:31:36Z", + "updated_at": "2023-08-04T13:41:05Z", + "pushed_at": "2015-12-15T05:42:02Z", + "stargazers_count": 131, + "watchers_count": 131, + "has_discussions": false, + "forks_count": 88, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 88, + "watchers": 131, + "score": 0, + "subscribers_count": 17 + }, + { + "id": 43815628, + "name": "libpingpong_exploit", + "full_name": "android-rooting-tools\/libpingpong_exploit", + "owner": { + "login": "android-rooting-tools", + "id": 4747069, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4747069?v=4", + "html_url": "https:\/\/github.com\/android-rooting-tools", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/android-rooting-tools\/libpingpong_exploit", + "description": "CVE-2015-3636 exploit ", + "fork": false, + "created_at": "2015-10-07T12:54:57Z", + "updated_at": "2023-06-30T06:36:02Z", + "pushed_at": "2015-11-22T06:20:42Z", + "stargazers_count": 43, + "watchers_count": 43, + "has_discussions": false, + "forks_count": 32, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 32, + "watchers": 43, + "score": 0, + "subscribers_count": 15 + }, { "id": 63220214, "name": "rattle_root", diff --git a/2015/CVE-2015-3864.json b/2015/CVE-2015-3864.json index 53f3a794e1..17a8869b06 100644 --- a/2015/CVE-2015-3864.json +++ b/2015/CVE-2015-3864.json @@ -1,4 +1,66 @@ [ + { + "id": 40954672, + "name": "stagefright-cve-2015-3864", + "full_name": "pwnaccelerator\/stagefright-cve-2015-3864", + "owner": { + "login": "pwnaccelerator", + "id": 13664810, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13664810?v=4", + "html_url": "https:\/\/github.com\/pwnaccelerator", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/pwnaccelerator\/stagefright-cve-2015-3864", + "description": "PoC - Binary patches for CVE-2015-3864 (NOT for production, use at your own risk)", + "fork": false, + "created_at": "2015-08-18T06:24:25Z", + "updated_at": "2016-11-01T10:13:47Z", + "pushed_at": "2015-08-18T06:52:59Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 47641153, + "name": "scaredycat", + "full_name": "eudemonics\/scaredycat", + "owner": { + "login": "eudemonics", + "id": 6373917, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6373917?v=4", + "html_url": "https:\/\/github.com\/eudemonics", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/eudemonics\/scaredycat", + "description": "Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploits another Stagefright vulnerability, the integer overflow (CVE-2015-3864).", + "fork": false, + "created_at": "2015-12-08T18:27:52Z", + "updated_at": "2024-08-12T19:20:28Z", + "pushed_at": "2015-12-08T18:35:47Z", + "stargazers_count": 17, + "watchers_count": 17, + "has_discussions": false, + "forks_count": 15, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 15, + "watchers": 17, + "score": 0, + "subscribers_count": 4 + }, { "id": 69631119, "name": "CVE-2015-3864", diff --git a/2015/CVE-2015-4495.json b/2015/CVE-2015-4495.json new file mode 100644 index 0000000000..ac62ff6cda --- /dev/null +++ b/2015/CVE-2015-4495.json @@ -0,0 +1,33 @@ +[ + { + "id": 40509764, + "name": "CVE-2015-4495", + "full_name": "vincd\/CVE-2015-4495", + "owner": { + "login": "vincd", + "id": 2360696, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2360696?v=4", + "html_url": "https:\/\/github.com\/vincd", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/vincd\/CVE-2015-4495", + "description": "Exploit for CVE-2015-4495 \/ mfsa2015-78", + "fork": false, + "created_at": "2015-08-10T22:46:46Z", + "updated_at": "2023-09-29T09:05:00Z", + "pushed_at": "2015-08-10T22:48:09Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-5119.json b/2015/CVE-2015-5119.json index db7a3e087f..5ca2415f70 100644 --- a/2015/CVE-2015-5119.json +++ b/2015/CVE-2015-5119.json @@ -1,4 +1,66 @@ [ + { + "id": 39914357, + "name": "CVE-2015-5119", + "full_name": "jvazquez-r7\/CVE-2015-5119", + "owner": { + "login": "jvazquez-r7", + "id": 1742838, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1742838?v=4", + "html_url": "https:\/\/github.com\/jvazquez-r7", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jvazquez-r7\/CVE-2015-5119", + "description": null, + "fork": false, + "created_at": "2015-07-29T20:21:20Z", + "updated_at": "2019-10-01T05:16:46Z", + "pushed_at": "2015-08-04T16:11:45Z", + "stargazers_count": 12, + "watchers_count": 12, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 12, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 42237262, + "name": "CVE-2015-5119_walkthrough", + "full_name": "CiscoCXSecurity\/CVE-2015-5119_walkthrough", + "owner": { + "login": "CiscoCXSecurity", + "id": 66816759, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66816759?v=4", + "html_url": "https:\/\/github.com\/CiscoCXSecurity", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/CiscoCXSecurity\/CVE-2015-5119_walkthrough", + "description": "Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough", + "fork": false, + "created_at": "2015-09-10T10:10:36Z", + "updated_at": "2024-08-12T19:19:12Z", + "pushed_at": "2015-09-10T10:14:57Z", + "stargazers_count": 13, + "watchers_count": 13, + "has_discussions": false, + "forks_count": 9, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 9, + "watchers": 13, + "score": 0, + "subscribers_count": 13 + }, { "id": 145561363, "name": "CVE-2015-5119", diff --git a/2015/CVE-2015-5477.json b/2015/CVE-2015-5477.json index a77253cb70..0211630798 100644 --- a/2015/CVE-2015-5477.json +++ b/2015/CVE-2015-5477.json @@ -1,4 +1,159 @@ [ + { + "id": 40028774, + "name": "cve-2015-5477", + "full_name": "robertdavidgraham\/cve-2015-5477", + "owner": { + "login": "robertdavidgraham", + "id": 3814757, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3814757?v=4", + "html_url": "https:\/\/github.com\/robertdavidgraham", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/robertdavidgraham\/cve-2015-5477", + "description": "PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure", + "fork": false, + "created_at": "2015-07-31T23:29:43Z", + "updated_at": "2025-01-06T02:39:01Z", + "pushed_at": "2015-08-01T21:32:51Z", + "stargazers_count": 63, + "watchers_count": 63, + "has_discussions": false, + "forks_count": 43, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 43, + "watchers": 63, + "score": 0, + "subscribers_count": 8 + }, + { + "id": 40041859, + "name": "tkeypoc", + "full_name": "elceef\/tkeypoc", + "owner": { + "login": "elceef", + "id": 8627380, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8627380?v=4", + "html_url": "https:\/\/github.com\/elceef", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/elceef\/tkeypoc", + "description": "PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability", + "fork": false, + "created_at": "2015-08-01T09:27:23Z", + "updated_at": "2024-08-12T19:18:35Z", + "pushed_at": "2015-08-01T09:34:50Z", + "stargazers_count": 14, + "watchers_count": 14, + "has_discussions": false, + "forks_count": 9, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 9, + "watchers": 14, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 40209347, + "name": "vaas-cve-2015-5477", + "full_name": "hmlio\/vaas-cve-2015-5477", + "owner": { + "login": "hmlio", + "id": 11684719, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684719?v=4", + "html_url": "https:\/\/github.com\/hmlio", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/hmlio\/vaas-cve-2015-5477", + "description": "Vulnerability as a service: showcasing CVS-2015-5447, a DDoS condition in the bind9 software", + "fork": false, + "created_at": "2015-08-04T21:11:45Z", + "updated_at": "2018-08-19T14:42:59Z", + "pushed_at": "2015-08-04T21:48:47Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 40442145, + "name": "cve-2015-5477", + "full_name": "knqyf263\/cve-2015-5477", + "owner": { + "login": "knqyf263", + "id": 2253692, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", + "html_url": "https:\/\/github.com\/knqyf263", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/knqyf263\/cve-2015-5477", + "description": "PoC for BIND9 TKEY assert DoS (CVE-2015-5477)", + "fork": false, + "created_at": "2015-08-09T16:09:52Z", + "updated_at": "2015-10-24T13:23:01Z", + "pushed_at": "2015-08-17T02:00:07Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 41009052, + "name": "cve-2015-5477", + "full_name": "ilanyu\/cve-2015-5477", + "owner": { + "login": "ilanyu", + "id": 9317609, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9317609?v=4", + "html_url": "https:\/\/github.com\/ilanyu", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ilanyu\/cve-2015-5477", + "description": "PoC exploit for CVE-2015-5477 in php", + "fork": false, + "created_at": "2015-08-19T02:35:36Z", + "updated_at": "2024-08-12T19:18:52Z", + "pushed_at": "2015-08-19T16:22:50Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 1, + "score": 0, + "subscribers_count": 3 + }, { "id": 141312152, "name": "ShareDoc_cve-2015-5477", diff --git a/2015/CVE-2015-5932.json b/2015/CVE-2015-5932.json new file mode 100644 index 0000000000..d0426d4e88 --- /dev/null +++ b/2015/CVE-2015-5932.json @@ -0,0 +1,33 @@ +[ + { + "id": 46079318, + "name": "tpwn-bis", + "full_name": "jndok\/tpwn-bis", + "owner": { + "login": "jndok", + "id": 2174072, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2174072?v=4", + "html_url": "https:\/\/github.com\/jndok", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jndok\/tpwn-bis", + "description": "simple poc for cve-2015-5932 \/ cve-2015-5847 \/ cve-2015-5864", + "fork": false, + "created_at": "2015-11-12T20:36:26Z", + "updated_at": "2016-02-13T01:40:33Z", + "pushed_at": "2015-11-23T19:33:12Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 4, + "score": 0, + "subscribers_count": 5 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-6357.json b/2015/CVE-2015-6357.json new file mode 100644 index 0000000000..4769d50b21 --- /dev/null +++ b/2015/CVE-2015-6357.json @@ -0,0 +1,33 @@ +[ + { + "id": 46267200, + "name": "firepwner", + "full_name": "mattimustang\/firepwner", + "owner": { + "login": "mattimustang", + "id": 188046, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188046?v=4", + "html_url": "https:\/\/github.com\/mattimustang", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/mattimustang\/firepwner", + "description": "Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability", + "fork": false, + "created_at": "2015-11-16T10:15:47Z", + "updated_at": "2024-08-12T19:20:10Z", + "pushed_at": "2015-11-16T10:20:09Z", + "stargazers_count": 6, + "watchers_count": 6, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 6, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-6576.json b/2015/CVE-2015-6576.json new file mode 100644 index 0000000000..089d7fa6de --- /dev/null +++ b/2015/CVE-2015-6576.json @@ -0,0 +1,33 @@ +[ + { + "id": 46565878, + "name": "CVE-2015-6576", + "full_name": "CallMeJonas\/CVE-2015-6576", + "owner": { + "login": "CallMeJonas", + "id": 14266586, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14266586?v=4", + "html_url": "https:\/\/github.com\/CallMeJonas", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/CallMeJonas\/CVE-2015-6576", + "description": "A PoC for the Bamboo deserialization exploit", + "fork": false, + "created_at": "2015-11-20T14:16:18Z", + "updated_at": "2016-02-13T02:16:34Z", + "pushed_at": "2015-11-20T14:33:20Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-6612.json b/2015/CVE-2015-6612.json new file mode 100644 index 0000000000..30fa3dd54e --- /dev/null +++ b/2015/CVE-2015-6612.json @@ -0,0 +1,64 @@ +[ + { + "id": 46257751, + "name": "CVE-2015-6612", + "full_name": "secmob\/CVE-2015-6612", + "owner": { + "login": "secmob", + "id": 8598783, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8598783?v=4", + "html_url": "https:\/\/github.com\/secmob", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/secmob\/CVE-2015-6612", + "description": null, + "fork": false, + "created_at": "2015-11-16T07:04:02Z", + "updated_at": "2024-07-27T20:22:39Z", + "pushed_at": "2015-11-16T07:53:51Z", + "stargazers_count": 23, + "watchers_count": 23, + "has_discussions": false, + "forks_count": 21, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 21, + "watchers": 23, + "score": 0, + "subscribers_count": 6 + }, + { + "id": 46268863, + "name": "cve-2015-6612poc-forM", + "full_name": "flankerhqd\/cve-2015-6612poc-forM", + "owner": { + "login": "flankerhqd", + "id": 2270027, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2270027?v=4", + "html_url": "https:\/\/github.com\/flankerhqd", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/flankerhqd\/cve-2015-6612poc-forM", + "description": null, + "fork": false, + "created_at": "2015-11-16T10:50:42Z", + "updated_at": "2018-07-11T03:41:11Z", + "pushed_at": "2015-11-16T13:25:55Z", + "stargazers_count": 16, + "watchers_count": 16, + "has_discussions": false, + "forks_count": 15, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 15, + "watchers": 16, + "score": 0, + "subscribers_count": 4 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-6620.json b/2015/CVE-2015-6620.json index 0aa3a87265..317fc289cc 100644 --- a/2015/CVE-2015-6620.json +++ b/2015/CVE-2015-6620.json @@ -1,4 +1,35 @@ [ + { + "id": 48084181, + "name": "CVE-2015-6620-POC", + "full_name": "flankerhqd\/CVE-2015-6620-POC", + "owner": { + "login": "flankerhqd", + "id": 2270027, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2270027?v=4", + "html_url": "https:\/\/github.com\/flankerhqd", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/flankerhqd\/CVE-2015-6620-POC", + "description": "POC for CVE-2015-6620, AMessage unmarshal arbitrary write", + "fork": false, + "created_at": "2015-12-16T03:09:30Z", + "updated_at": "2023-09-07T17:08:30Z", + "pushed_at": "2015-12-16T03:48:31Z", + "stargazers_count": 39, + "watchers_count": 39, + "has_discussions": false, + "forks_count": 16, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 16, + "watchers": 39, + "score": 0, + "subscribers_count": 5 + }, { "id": 54961298, "name": "mediacodecoob", diff --git a/2015/CVE-2015-6835.json b/2015/CVE-2015-6835.json new file mode 100644 index 0000000000..6288b9e3fe --- /dev/null +++ b/2015/CVE-2015-6835.json @@ -0,0 +1,33 @@ +[ + { + "id": 48273621, + "name": "CVE-2015-6835-checker", + "full_name": "ockeghem\/CVE-2015-6835-checker", + "owner": { + "login": "ockeghem", + "id": 1064075, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1064075?v=4", + "html_url": "https:\/\/github.com\/ockeghem", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ockeghem\/CVE-2015-6835-checker", + "description": null, + "fork": false, + "created_at": "2015-12-19T07:55:53Z", + "updated_at": "2023-06-05T13:53:54Z", + "pushed_at": "2017-07-24T12:26:43Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-7297.json b/2015/CVE-2015-7297.json index 365b7f83e3..396e90eabd 100644 --- a/2015/CVE-2015-7297.json +++ b/2015/CVE-2015-7297.json @@ -1,4 +1,35 @@ [ + { + "id": 45369224, + "name": "ContentHistory", + "full_name": "CCrashBandicot\/ContentHistory", + "owner": { + "login": "CCrashBandicot", + "id": 8810334, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8810334?v=4", + "html_url": "https:\/\/github.com\/CCrashBandicot", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/CCrashBandicot\/ContentHistory", + "description": "Joomla! 3.2 to 3.4.4 - SQL Injection (CVE-2015-7297, CVE-2015-7857, and CVE-2015-7858)", + "fork": false, + "created_at": "2015-11-02T03:03:35Z", + "updated_at": "2019-08-18T16:54:56Z", + "pushed_at": "2015-11-02T03:18:18Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, { "id": 308175941, "name": "exploit-joomla", diff --git a/2015/CVE-2015-7545.json b/2015/CVE-2015-7545.json new file mode 100644 index 0000000000..11c68b21e4 --- /dev/null +++ b/2015/CVE-2015-7545.json @@ -0,0 +1,33 @@ +[ + { + "id": 48136935, + "name": "bug-free-chainsaw", + "full_name": "avuserow\/bug-free-chainsaw", + "owner": { + "login": "avuserow", + "id": 82250, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82250?v=4", + "html_url": "https:\/\/github.com\/avuserow", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/avuserow\/bug-free-chainsaw", + "description": "CVE-2015-7545 proof of concept", + "fork": false, + "created_at": "2015-12-16T21:44:48Z", + "updated_at": "2021-05-20T03:22:17Z", + "pushed_at": "2015-12-16T22:08:43Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-7755.json b/2015/CVE-2015-7755.json index 12c8bcde5c..e0fe258257 100644 --- a/2015/CVE-2015-7755.json +++ b/2015/CVE-2015-7755.json @@ -1,4 +1,35 @@ [ + { + "id": 48254682, + "name": "juniper-cve-2015-7755", + "full_name": "hdm\/juniper-cve-2015-7755", + "owner": { + "login": "hdm", + "id": 1171392, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1171392?v=4", + "html_url": "https:\/\/github.com\/hdm", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/hdm\/juniper-cve-2015-7755", + "description": "Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS", + "fork": false, + "created_at": "2015-12-18T20:20:01Z", + "updated_at": "2025-01-06T02:39:00Z", + "pushed_at": "2021-01-25T21:45:52Z", + "stargazers_count": 102, + "watchers_count": 102, + "has_discussions": false, + "forks_count": 34, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 34, + "watchers": 102, + "score": 0, + "subscribers_count": 19 + }, { "id": 49344660, "name": "CVE-2015-7755-POC", diff --git a/2015/CVE-2015-7808.json b/2015/CVE-2015-7808.json new file mode 100644 index 0000000000..fa17fa1ff3 --- /dev/null +++ b/2015/CVE-2015-7808.json @@ -0,0 +1,33 @@ +[ + { + "id": 45703710, + "name": "CVE-2015-7808", + "full_name": "Prajithp\/CVE-2015-7808", + "owner": { + "login": "Prajithp", + "id": 3598263, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3598263?v=4", + "html_url": "https:\/\/github.com\/Prajithp", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Prajithp\/CVE-2015-7808", + "description": "PoC code for vBulletin PreAuth vulnerability", + "fork": false, + "created_at": "2015-11-06T19:47:46Z", + "updated_at": "2016-02-13T02:14:46Z", + "pushed_at": "2015-11-06T19:51:55Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-8088.json b/2015/CVE-2015-8088.json new file mode 100644 index 0000000000..531de38706 --- /dev/null +++ b/2015/CVE-2015-8088.json @@ -0,0 +1,33 @@ +[ + { + "id": 47675309, + "name": "CVE-2015-8088", + "full_name": "Pray3r\/CVE-2015-8088", + "owner": { + "login": "Pray3r", + "id": 16086935, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16086935?v=4", + "html_url": "https:\/\/github.com\/Pray3r", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Pray3r\/CVE-2015-8088", + "description": "Crash PoC", + "fork": false, + "created_at": "2015-12-09T07:18:41Z", + "updated_at": "2019-10-07T05:56:10Z", + "pushed_at": "2016-08-11T03:35:03Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0040.json b/2016/CVE-2016-0040.json index 674b57e00d..1f9d53a5a5 100644 --- a/2016/CVE-2016-0040.json +++ b/2016/CVE-2016-0040.json @@ -1,4 +1,35 @@ [ + { + "id": 52622711, + "name": "cve-2016-0040", + "full_name": "Rootkitsmm-zz\/cve-2016-0040", + "owner": { + "login": "Rootkitsmm-zz", + "id": 5567904, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5567904?v=4", + "html_url": "https:\/\/github.com\/Rootkitsmm-zz", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Rootkitsmm-zz\/cve-2016-0040", + "description": "Exploiting CVE-2016-0040 uninitialized pointer", + "fork": false, + "created_at": "2016-02-26T18:00:30Z", + "updated_at": "2024-08-12T19:21:36Z", + "pushed_at": "2016-07-17T07:59:10Z", + "stargazers_count": 45, + "watchers_count": 45, + "has_discussions": false, + "forks_count": 22, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 22, + "watchers": 45, + "score": 0, + "subscribers_count": 5 + }, { "id": 99280066, "name": "CVE-2016-0040", diff --git a/2016/CVE-2016-0049.json b/2016/CVE-2016-0049.json new file mode 100644 index 0000000000..0cea34e5f8 --- /dev/null +++ b/2016/CVE-2016-0049.json @@ -0,0 +1,33 @@ +[ + { + "id": 52044090, + "name": "bluebox", + "full_name": "JackOfMostTrades\/bluebox", + "owner": { + "login": "JackOfMostTrades", + "id": 1009310, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1009310?v=4", + "html_url": "https:\/\/github.com\/JackOfMostTrades", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/JackOfMostTrades\/bluebox", + "description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049", + "fork": false, + "created_at": "2016-02-18T22:38:51Z", + "updated_at": "2024-08-12T19:21:28Z", + "pushed_at": "2017-07-22T19:22:55Z", + "stargazers_count": 50, + "watchers_count": 50, + "has_discussions": false, + "forks_count": 21, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 21, + "watchers": 50, + "score": 0, + "subscribers_count": 7 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0051.json b/2016/CVE-2016-0051.json new file mode 100644 index 0000000000..489170d5e3 --- /dev/null +++ b/2016/CVE-2016-0051.json @@ -0,0 +1,95 @@ +[ + { + "id": 51401477, + "name": "CVE-2016-0051", + "full_name": "koczkatamas\/CVE-2016-0051", + "owner": { + "login": "koczkatamas", + "id": 2608082, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2608082?v=4", + "html_url": "https:\/\/github.com\/koczkatamas", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/koczkatamas\/CVE-2016-0051", + "description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)", + "fork": false, + "created_at": "2016-02-09T21:30:34Z", + "updated_at": "2024-12-17T08:57:56Z", + "pushed_at": "2016-05-09T17:53:48Z", + "stargazers_count": 327, + "watchers_count": 327, + "has_discussions": false, + "forks_count": 131, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 131, + "watchers": 327, + "score": 0, + "subscribers_count": 25 + }, + { + "id": 58299464, + "name": "CVE-2016-0051", + "full_name": "hexx0r\/CVE-2016-0051", + "owner": { + "login": "hexx0r", + "id": 13381998, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13381998?v=4", + "html_url": "https:\/\/github.com\/hexx0r", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/hexx0r\/CVE-2016-0051", + "description": null, + "fork": false, + "created_at": "2016-05-08T06:22:07Z", + "updated_at": "2024-07-05T21:39:59Z", + "pushed_at": "2016-05-10T22:41:12Z", + "stargazers_count": 42, + "watchers_count": 42, + "has_discussions": false, + "forks_count": 14, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 14, + "watchers": 42, + "score": 0, + "subscribers_count": 4 + }, + { + "id": 61298858, + "name": "CVE-2016-0051", + "full_name": "ganrann\/CVE-2016-0051", + "owner": { + "login": "ganrann", + "id": 245381, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/245381?v=4", + "html_url": "https:\/\/github.com\/ganrann", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ganrann\/CVE-2016-0051", + "description": "CVE-2016-0051 样本库", + "fork": false, + "created_at": "2016-06-16T14:08:43Z", + "updated_at": "2016-06-16T14:12:08Z", + "pushed_at": "2016-06-16T14:10:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0189.json b/2016/CVE-2016-0189.json new file mode 100644 index 0000000000..2d94a40d96 --- /dev/null +++ b/2016/CVE-2016-0189.json @@ -0,0 +1,64 @@ +[ + { + "id": 61757233, + "name": "cve-2016-0189", + "full_name": "theori-io\/cve-2016-0189", + "owner": { + "login": "theori-io", + "id": 18063559, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18063559?v=4", + "html_url": "https:\/\/github.com\/theori-io", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/theori-io\/cve-2016-0189", + "description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)", + "fork": false, + "created_at": "2016-06-22T23:03:30Z", + "updated_at": "2025-01-05T00:58:38Z", + "pushed_at": "2016-06-23T00:47:50Z", + "stargazers_count": 115, + "watchers_count": 115, + "has_discussions": false, + "forks_count": 54, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 54, + "watchers": 115, + "score": 0, + "subscribers_count": 13 + }, + { + "id": 61921909, + "name": "MS16-051-poc", + "full_name": "deamwork\/MS16-051-poc", + "owner": { + "login": "deamwork", + "id": 7680724, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7680724?v=4", + "html_url": "https:\/\/github.com\/deamwork", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/deamwork\/MS16-051-poc", + "description": "对CVE-2016-0189漏洞补丁的分析", + "fork": false, + "created_at": "2016-06-25T01:48:38Z", + "updated_at": "2023-01-10T03:17:05Z", + "pushed_at": "2016-06-25T01:49:30Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 11, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 11, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0701.json b/2016/CVE-2016-0701.json new file mode 100644 index 0000000000..942e40063b --- /dev/null +++ b/2016/CVE-2016-0701.json @@ -0,0 +1,33 @@ +[ + { + "id": 50957830, + "name": "cve-2016-0701", + "full_name": "luanjampa\/cve-2016-0701", + "owner": { + "login": "luanjampa", + "id": 4728927, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4728927?v=4", + "html_url": "https:\/\/github.com\/luanjampa", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/luanjampa\/cve-2016-0701", + "description": null, + "fork": false, + "created_at": "2016-02-02T22:53:34Z", + "updated_at": "2016-02-15T06:03:46Z", + "pushed_at": "2016-02-24T17:32:15Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 4 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0728.json b/2016/CVE-2016-0728.json index 9bf714ae3e..e09094a171 100644 --- a/2016/CVE-2016-0728.json +++ b/2016/CVE-2016-0728.json @@ -1,4 +1,190 @@ [ + { + "id": 49952630, + "name": "cve-2016-0728", + "full_name": "idl3r\/cve-2016-0728", + "owner": { + "login": "idl3r", + "id": 11041719, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11041719?v=4", + "html_url": "https:\/\/github.com\/idl3r", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/idl3r\/cve-2016-0728", + "description": null, + "fork": false, + "created_at": "2016-01-19T12:55:49Z", + "updated_at": "2023-03-29T09:35:06Z", + "pushed_at": "2016-01-19T12:55:49Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 50038843, + "name": "cve_2016_0728", + "full_name": "kennetham\/cve_2016_0728", + "owner": { + "login": "kennetham", + "id": 507492, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/507492?v=4", + "html_url": "https:\/\/github.com\/kennetham", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/kennetham\/cve_2016_0728", + "description": "CVE-2016-0728 Linux Kernel Vulnerability", + "fork": false, + "created_at": "2016-01-20T15:23:52Z", + "updated_at": "2018-01-04T10:37:03Z", + "pushed_at": "2016-01-20T15:26:58Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 50156146, + "name": "cve-2016-0728", + "full_name": "nardholio\/cve-2016-0728", + "owner": { + "login": "nardholio", + "id": 2659687, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2659687?v=4", + "html_url": "https:\/\/github.com\/nardholio", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/nardholio\/cve-2016-0728", + "description": null, + "fork": false, + "created_at": "2016-01-22T03:52:11Z", + "updated_at": "2024-07-27T20:22:39Z", + "pushed_at": "2018-12-31T16:52:32Z", + "stargazers_count": 22, + "watchers_count": 22, + "has_discussions": false, + "forks_count": 13, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 13, + "watchers": 22, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 50231808, + "name": "CVE-2016-0728", + "full_name": "googleweb\/CVE-2016-0728", + "owner": { + "login": "googleweb", + "id": 11829793, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11829793?v=4", + "html_url": "https:\/\/github.com\/googleweb", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/googleweb\/CVE-2016-0728", + "description": null, + "fork": false, + "created_at": "2016-01-23T09:17:21Z", + "updated_at": "2019-01-06T01:51:44Z", + "pushed_at": "2016-01-20T21:31:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 50619014, + "name": "cve-2016-0728-testbed", + "full_name": "neuschaefer\/cve-2016-0728-testbed", + "owner": { + "login": "neuschaefer", + "id": 1021512, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1021512?v=4", + "html_url": "https:\/\/github.com\/neuschaefer", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/neuschaefer\/cve-2016-0728-testbed", + "description": "A testbed for CVE-2016-0728, a refcount leak\/overflow bug in Linux", + "fork": false, + "created_at": "2016-01-28T22:38:13Z", + "updated_at": "2023-02-16T19:24:26Z", + "pushed_at": "2016-01-29T00:48:38Z", + "stargazers_count": 5, + "watchers_count": 5, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 5, + "score": 0, + "subscribers_count": 4 + }, + { + "id": 53915696, + "name": "cve-2016-0728", + "full_name": "bittorrent3389\/cve-2016-0728", + "owner": { + "login": "bittorrent3389", + "id": 5295462, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5295462?v=4", + "html_url": "https:\/\/github.com\/bittorrent3389", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/bittorrent3389\/cve-2016-0728", + "description": "a exploit for cve-2016-0728", + "fork": false, + "created_at": "2016-03-15T04:52:40Z", + "updated_at": "2023-01-10T03:16:51Z", + "pushed_at": "2016-03-16T10:15:47Z", + "stargazers_count": 7, + "watchers_count": 7, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 7, + "score": 0, + "subscribers_count": 2 + }, { "id": 80220505, "name": "exploit_cve-2016-0728", diff --git a/2016/CVE-2016-0752.json b/2016/CVE-2016-0752.json new file mode 100644 index 0000000000..690c0e6eb7 --- /dev/null +++ b/2016/CVE-2016-0752.json @@ -0,0 +1,64 @@ +[ + { + "id": 50437751, + "name": "rails-rce-cve-2016-0752", + "full_name": "forced-request\/rails-rce-cve-2016-0752", + "owner": { + "login": "forced-request", + "id": 961246, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/961246?v=4", + "html_url": "https:\/\/github.com\/forced-request", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/forced-request\/rails-rce-cve-2016-0752", + "description": null, + "fork": false, + "created_at": "2016-01-26T15:25:34Z", + "updated_at": "2017-03-22T01:11:06Z", + "pushed_at": "2016-01-26T15:30:22Z", + "stargazers_count": 11, + "watchers_count": 11, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 11, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 54231678, + "name": "CVE-2016-0752", + "full_name": "dachidahu\/CVE-2016-0752", + "owner": { + "login": "dachidahu", + "id": 1536032, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1536032?v=4", + "html_url": "https:\/\/github.com\/dachidahu", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/dachidahu\/CVE-2016-0752", + "description": null, + "fork": false, + "created_at": "2016-03-18T21:10:18Z", + "updated_at": "2016-03-18T21:45:54Z", + "pushed_at": "2016-03-21T05:02:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0801.json b/2016/CVE-2016-0801.json new file mode 100644 index 0000000000..f90b74805d --- /dev/null +++ b/2016/CVE-2016-0801.json @@ -0,0 +1,64 @@ +[ + { + "id": 58514622, + "name": "CVE-2016-0801", + "full_name": "abdsec\/CVE-2016-0801", + "owner": { + "login": "abdsec", + "id": 19299068, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19299068?v=4", + "html_url": "https:\/\/github.com\/abdsec", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/abdsec\/CVE-2016-0801", + "description": null, + "fork": false, + "created_at": "2016-05-11T04:36:45Z", + "updated_at": "2024-08-12T19:22:45Z", + "pushed_at": "2016-05-13T11:36:17Z", + "stargazers_count": 79, + "watchers_count": 79, + "has_discussions": false, + "forks_count": 32, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 32, + "watchers": 79, + "score": 0, + "subscribers_count": 14 + }, + { + "id": 58843093, + "name": "CVE-2016-0801-test", + "full_name": "zsaurus\/CVE-2016-0801-test", + "owner": { + "login": "zsaurus", + "id": 18712335, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18712335?v=4", + "html_url": "https:\/\/github.com\/zsaurus", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/zsaurus\/CVE-2016-0801-test", + "description": "Test modified buggy poc", + "fork": false, + "created_at": "2016-05-15T03:55:27Z", + "updated_at": "2016-05-15T04:16:15Z", + "pushed_at": "2016-05-15T04:16:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0805.json b/2016/CVE-2016-0805.json new file mode 100644 index 0000000000..957afa2cd8 --- /dev/null +++ b/2016/CVE-2016-0805.json @@ -0,0 +1,33 @@ +[ + { + "id": 55565130, + "name": "cve-2016-0805", + "full_name": "hulovebin\/cve-2016-0805", + "owner": { + "login": "hulovebin", + "id": 9494192, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9494192?v=4", + "html_url": "https:\/\/github.com\/hulovebin", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/hulovebin\/cve-2016-0805", + "description": null, + "fork": false, + "created_at": "2016-04-06T00:59:43Z", + "updated_at": "2016-04-06T00:59:43Z", + "pushed_at": "2016-04-06T00:59:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0846.json b/2016/CVE-2016-0846.json new file mode 100644 index 0000000000..8ac1299112 --- /dev/null +++ b/2016/CVE-2016-0846.json @@ -0,0 +1,64 @@ +[ + { + "id": 55751787, + "name": "CVE-2016-0846", + "full_name": "secmob\/CVE-2016-0846", + "owner": { + "login": "secmob", + "id": 8598783, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8598783?v=4", + "html_url": "https:\/\/github.com\/secmob", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/secmob\/CVE-2016-0846", + "description": "arbitrary memory read\/write by IMemroy OOB", + "fork": false, + "created_at": "2016-04-08T05:09:15Z", + "updated_at": "2024-08-12T19:22:15Z", + "pushed_at": "2016-04-08T05:34:58Z", + "stargazers_count": 36, + "watchers_count": 36, + "has_discussions": false, + "forks_count": 16, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 16, + "watchers": 36, + "score": 0, + "subscribers_count": 5 + }, + { + "id": 56596683, + "name": "CVE-2016-0846-PoC", + "full_name": "b0b0505\/CVE-2016-0846-PoC", + "owner": { + "login": "b0b0505", + "id": 6748041, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6748041?v=4", + "html_url": "https:\/\/github.com\/b0b0505", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/b0b0505\/CVE-2016-0846-PoC", + "description": null, + "fork": false, + "created_at": "2016-04-19T12:56:44Z", + "updated_at": "2016-04-27T18:05:22Z", + "pushed_at": "2016-04-19T13:01:24Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 1, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-1287.json b/2016/CVE-2016-1287.json index 1c2e011453..b55e16532b 100644 --- a/2016/CVE-2016-1287.json +++ b/2016/CVE-2016-1287.json @@ -1,4 +1,35 @@ [ + { + "id": 51731718, + "name": "killasa", + "full_name": "jgajek\/killasa", + "owner": { + "login": "jgajek", + "id": 7495374, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7495374?v=4", + "html_url": "https:\/\/github.com\/jgajek", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jgajek\/killasa", + "description": "CVE-2016-1287 vulnerability test", + "fork": false, + "created_at": "2016-02-15T04:56:15Z", + "updated_at": "2022-04-06T08:19:36Z", + "pushed_at": "2016-02-15T04:59:43Z", + "stargazers_count": 16, + "watchers_count": 16, + "has_discussions": false, + "forks_count": 7, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 7, + "watchers": 16, + "score": 0, + "subscribers_count": 2 + }, { "id": 67734857, "name": "asa_tools", diff --git a/2016/CVE-2016-1734.json b/2016/CVE-2016-1734.json new file mode 100644 index 0000000000..073de32dd6 --- /dev/null +++ b/2016/CVE-2016-1734.json @@ -0,0 +1,33 @@ +[ + { + "id": 60321010, + "name": "CVE-2016-1734", + "full_name": "Manouchehri\/CVE-2016-1734", + "owner": { + "login": "Manouchehri", + "id": 7232674, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7232674?v=4", + "html_url": "https:\/\/github.com\/Manouchehri", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Manouchehri\/CVE-2016-1734", + "description": null, + "fork": false, + "created_at": "2016-06-03T05:37:06Z", + "updated_at": "2016-06-03T05:46:01Z", + "pushed_at": "2016-06-03T05:54:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-1757.json b/2016/CVE-2016-1757.json new file mode 100644 index 0000000000..9590a838b6 --- /dev/null +++ b/2016/CVE-2016-1757.json @@ -0,0 +1,33 @@ +[ + { + "id": 57211701, + "name": "mach_race", + "full_name": "gdbinit\/mach_race", + "owner": { + "login": "gdbinit", + "id": 859134, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/859134?v=4", + "html_url": "https:\/\/github.com\/gdbinit", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/gdbinit\/mach_race", + "description": "Exploit code for CVE-2016-1757", + "fork": false, + "created_at": "2016-04-27T12:29:28Z", + "updated_at": "2024-04-12T16:03:01Z", + "pushed_at": "2016-04-27T14:07:43Z", + "stargazers_count": 83, + "watchers_count": 83, + "has_discussions": false, + "forks_count": 20, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 20, + "watchers": 83, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-1764.json b/2016/CVE-2016-1764.json new file mode 100644 index 0000000000..e2af433268 --- /dev/null +++ b/2016/CVE-2016-1764.json @@ -0,0 +1,40 @@ +[ + { + "id": 55790687, + "name": "cve-2016-1764", + "full_name": "moloch--\/cve-2016-1764", + "owner": { + "login": "moloch--", + "id": 875022, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/875022?v=4", + "html_url": "https:\/\/github.com\/moloch--", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/moloch--\/cve-2016-1764", + "description": "Extraction of iMessage Data via XSS", + "fork": false, + "created_at": "2016-04-08T15:45:44Z", + "updated_at": "2024-10-03T05:12:17Z", + "pushed_at": "2016-04-08T23:00:58Z", + "stargazers_count": 52, + "watchers_count": 52, + "has_discussions": false, + "forks_count": 37, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve", + "exploit", + "imessage", + "security", + "vulnerability", + "xss" + ], + "visibility": "public", + "forks": 37, + "watchers": 52, + "score": 0, + "subscribers_count": 4 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-1828.json b/2016/CVE-2016-1828.json index 30c39b9869..b4b304e29e 100644 --- a/2016/CVE-2016-1828.json +++ b/2016/CVE-2016-1828.json @@ -1,4 +1,35 @@ [ + { + "id": 59079925, + "name": "rootsh", + "full_name": "bazad\/rootsh", + "owner": { + "login": "bazad", + "id": 3111637, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4", + "html_url": "https:\/\/github.com\/bazad", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/bazad\/rootsh", + "description": "Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.", + "fork": false, + "created_at": "2016-05-18T03:49:02Z", + "updated_at": "2024-09-28T16:53:47Z", + "pushed_at": "2016-05-18T03:53:42Z", + "stargazers_count": 84, + "watchers_count": 84, + "has_discussions": false, + "forks_count": 28, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 28, + "watchers": 84, + "score": 0, + "subscribers_count": 11 + }, { "id": 471266483, "name": "bazad5", diff --git a/2016/CVE-2016-2098.json b/2016/CVE-2016-2098.json index be7746a39a..68df0a46e1 100644 --- a/2016/CVE-2016-2098.json +++ b/2016/CVE-2016-2098.json @@ -1,4 +1,70 @@ [ + { + "id": 52896981, + "name": "dh-CVE_2016_2098", + "full_name": "hderms\/dh-CVE_2016_2098", + "owner": { + "login": "hderms", + "id": 833575, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/833575?v=4", + "html_url": "https:\/\/github.com\/hderms", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/hderms\/dh-CVE_2016_2098", + "description": "Proof of concept showing how CVE-2016-2098 leads to remote code execution", + "fork": false, + "created_at": "2016-03-01T17:45:29Z", + "updated_at": "2020-06-06T02:45:09Z", + "pushed_at": "2016-03-01T17:45:55Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 60613259, + "name": "PoC_CVE-2016-2098_Rails42", + "full_name": "CyberDefenseInstitute\/PoC_CVE-2016-2098_Rails42", + "owner": { + "login": "CyberDefenseInstitute", + "id": 13356356, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13356356?v=4", + "html_url": "https:\/\/github.com\/CyberDefenseInstitute", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/CyberDefenseInstitute\/PoC_CVE-2016-2098_Rails42", + "description": "A PoC of CVE-2016-2098 (rails4.2.5.1 \/ view render)", + "fork": false, + "created_at": "2016-06-07T12:59:31Z", + "updated_at": "2019-08-26T16:39:44Z", + "pushed_at": "2016-06-07T13:15:24Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "poc", + "rails", + "vulnerability" + ], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 6 + }, { "id": 80069309, "name": "rails-PoC-CVE-2016-2098", diff --git a/2016/CVE-2016-2107.json b/2016/CVE-2016-2107.json new file mode 100644 index 0000000000..5c7453c93a --- /dev/null +++ b/2016/CVE-2016-2107.json @@ -0,0 +1,64 @@ +[ + { + "id": 57985369, + "name": "CVE-2016-2107", + "full_name": "FiloSottile\/CVE-2016-2107", + "owner": { + "login": "FiloSottile", + "id": 1225294, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1225294?v=4", + "html_url": "https:\/\/github.com\/FiloSottile", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/FiloSottile\/CVE-2016-2107", + "description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)", + "fork": false, + "created_at": "2016-05-03T16:47:32Z", + "updated_at": "2024-10-09T09:51:06Z", + "pushed_at": "2019-03-10T02:18:00Z", + "stargazers_count": 186, + "watchers_count": 186, + "has_discussions": false, + "forks_count": 54, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 54, + "watchers": 186, + "score": 0, + "subscribers_count": 14 + }, + { + "id": 60787819, + "name": "docker-cve-2016-2107", + "full_name": "tmiklas\/docker-cve-2016-2107", + "owner": { + "login": "tmiklas", + "id": 230130, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/230130?v=4", + "html_url": "https:\/\/github.com\/tmiklas", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/tmiklas\/docker-cve-2016-2107", + "description": "Docker container implementing tests for CVE-2016-2107 - LuckyNegative20", + "fork": false, + "created_at": "2016-06-09T16:01:03Z", + "updated_at": "2022-07-01T09:02:25Z", + "pushed_at": "2016-06-10T20:18:33Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-2118.json b/2016/CVE-2016-2118.json new file mode 100644 index 0000000000..383a45efab --- /dev/null +++ b/2016/CVE-2016-2118.json @@ -0,0 +1,33 @@ +[ + { + "id": 56461631, + "name": "cfengine-CVE-2016-2118", + "full_name": "nickanderson\/cfengine-CVE-2016-2118", + "owner": { + "login": "nickanderson", + "id": 202896, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4", + "html_url": "https:\/\/github.com\/nickanderson", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118", + "description": "An example detection and remediation policy.", + "fork": false, + "created_at": "2016-04-17T22:22:04Z", + "updated_at": "2016-04-18T02:57:44Z", + "pushed_at": "2016-04-19T14:24:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-2402.json b/2016/CVE-2016-2402.json new file mode 100644 index 0000000000..9c64133376 --- /dev/null +++ b/2016/CVE-2016-2402.json @@ -0,0 +1,64 @@ +[ + { + "id": 54332427, + "name": "cert-pinning-flaw-poc", + "full_name": "ikoz\/cert-pinning-flaw-poc", + "owner": { + "login": "ikoz", + "id": 9115937, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9115937?v=4", + "html_url": "https:\/\/github.com\/ikoz", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ikoz\/cert-pinning-flaw-poc", + "description": "Simple script for testing CVE-2016-2402 and similar flaws", + "fork": false, + "created_at": "2016-03-20T18:04:40Z", + "updated_at": "2019-05-15T08:00:43Z", + "pushed_at": "2016-03-30T23:37:07Z", + "stargazers_count": 13, + "watchers_count": 13, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 13, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 55105611, + "name": "certPinningVulnerableOkHttp", + "full_name": "ikoz\/certPinningVulnerableOkHttp", + "owner": { + "login": "ikoz", + "id": 9115937, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9115937?v=4", + "html_url": "https:\/\/github.com\/ikoz", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ikoz\/certPinningVulnerableOkHttp", + "description": "OkHttp sample app vulnerable to CVE-2016-2402", + "fork": false, + "created_at": "2016-03-30T23:45:06Z", + "updated_at": "2018-11-30T02:52:33Z", + "pushed_at": "2016-03-31T00:15:36Z", + "stargazers_count": 10, + "watchers_count": 10, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 10, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json new file mode 100644 index 0000000000..5d3dd3c99b --- /dev/null +++ b/2016/CVE-2016-2431.json @@ -0,0 +1,64 @@ +[ + { + "id": 61202493, + "name": "cve-2016-2431", + "full_name": "laginimaineb\/cve-2016-2431", + "owner": { + "login": "laginimaineb", + "id": 11378334, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11378334?v=4", + "html_url": "https:\/\/github.com\/laginimaineb", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/laginimaineb\/cve-2016-2431", + "description": "Qualcomm TrustZone kernel privilege escalation", + "fork": false, + "created_at": "2016-06-15T11:21:24Z", + "updated_at": "2024-11-27T14:27:51Z", + "pushed_at": "2016-06-15T11:27:42Z", + "stargazers_count": 61, + "watchers_count": 61, + "has_discussions": false, + "forks_count": 21, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 21, + "watchers": 61, + "score": 0, + "subscribers_count": 9 + }, + { + "id": 62306972, + "name": "ExtractKeyMaster", + "full_name": "laginimaineb\/ExtractKeyMaster", + "owner": { + "login": "laginimaineb", + "id": 11378334, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11378334?v=4", + "html_url": "https:\/\/github.com\/laginimaineb", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/laginimaineb\/ExtractKeyMaster", + "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", + "fork": false, + "created_at": "2016-06-30T11:56:44Z", + "updated_at": "2025-01-08T19:47:51Z", + "pushed_at": "2016-06-30T15:32:42Z", + "stargazers_count": 342, + "watchers_count": 342, + "has_discussions": false, + "forks_count": 110, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 110, + "watchers": 342, + "score": 0, + "subscribers_count": 48 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-3141.json b/2016/CVE-2016-3141.json new file mode 100644 index 0000000000..d0f3f544b8 --- /dev/null +++ b/2016/CVE-2016-3141.json @@ -0,0 +1,33 @@ +[ + { + "id": 56758577, + "name": "CVE-2016-3141", + "full_name": "peternguyen93\/CVE-2016-3141", + "owner": { + "login": "peternguyen93", + "id": 1802870, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4", + "html_url": "https:\/\/github.com\/peternguyen93", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141", + "description": "CVE-2016-3141", + "fork": false, + "created_at": "2016-04-21T08:59:05Z", + "updated_at": "2023-03-11T18:41:15Z", + "pushed_at": "2016-04-23T15:55:01Z", + "stargazers_count": 15, + "watchers_count": 15, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 15, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-3714.json b/2016/CVE-2016-3714.json index de34295ce2..1c400c1f21 100644 --- a/2016/CVE-2016-3714.json +++ b/2016/CVE-2016-3714.json @@ -1,4 +1,159 @@ [ + { + "id": 58022817, + "name": "imagick_secure_puppet", + "full_name": "jackdpeterson\/imagick_secure_puppet", + "owner": { + "login": "jackdpeterson", + "id": 938961, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/938961?v=4", + "html_url": "https:\/\/github.com\/jackdpeterson", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jackdpeterson\/imagick_secure_puppet", + "description": "a puppet module in response to CVE-2016-3714", + "fork": false, + "created_at": "2016-05-04T04:30:25Z", + "updated_at": "2016-05-04T04:32:03Z", + "pushed_at": "2016-05-04T04:42:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 58041137, + "name": "CVE-2016-3714", + "full_name": "tommiionfire\/CVE-2016-3714", + "owner": { + "login": "tommiionfire", + "id": 12810700, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12810700?v=4", + "html_url": "https:\/\/github.com\/tommiionfire", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/tommiionfire\/CVE-2016-3714", + "description": null, + "fork": false, + "created_at": "2016-05-04T09:47:42Z", + "updated_at": "2016-05-04T09:52:14Z", + "pushed_at": "2016-05-04T10:32:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 58125094, + "name": "CVE-2016-3714.ansible.role", + "full_name": "chusiang\/CVE-2016-3714.ansible.role", + "owner": { + "login": "chusiang", + "id": 219066, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/219066?v=4", + "html_url": "https:\/\/github.com\/chusiang", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/chusiang\/CVE-2016-3714.ansible.role", + "description": "Fix ImageMagick Command Injection (CVE-2016-3714) with Ansible.", + "fork": false, + "created_at": "2016-05-05T11:05:20Z", + "updated_at": "2017-06-09T22:21:33Z", + "pushed_at": "2016-05-11T11:02:57Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 1, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 58151390, + "name": "ImageTragick-CVE-2016-3714-RShell", + "full_name": "jpeanut\/ImageTragick-CVE-2016-3714-RShell", + "owner": { + "login": "jpeanut", + "id": 11488668, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11488668?v=4", + "html_url": "https:\/\/github.com\/jpeanut", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jpeanut\/ImageTragick-CVE-2016-3714-RShell", + "description": null, + "fork": false, + "created_at": "2016-05-05T18:16:52Z", + "updated_at": "2024-10-20T20:45:21Z", + "pushed_at": "2016-05-29T17:27:10Z", + "stargazers_count": 19, + "watchers_count": 19, + "has_discussions": false, + "forks_count": 15, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 15, + "watchers": 19, + "score": 0, + "subscribers_count": 5 + }, + { + "id": 58256737, + "name": "CVE-2016-3714", + "full_name": "Hood3dRob1n\/CVE-2016-3714", + "owner": { + "login": "Hood3dRob1n", + "id": 1881344, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881344?v=4", + "html_url": "https:\/\/github.com\/Hood3dRob1n", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Hood3dRob1n\/CVE-2016-3714", + "description": "ImaegMagick Code Execution (CVE-2016-3714)", + "fork": false, + "created_at": "2016-05-07T08:21:27Z", + "updated_at": "2024-08-12T19:22:42Z", + "pushed_at": "2016-05-07T17:26:47Z", + "stargazers_count": 68, + "watchers_count": 68, + "has_discussions": false, + "forks_count": 33, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 33, + "watchers": 68, + "score": 0, + "subscribers_count": 7 + }, { "id": 573581894, "name": "CVE-2016-3714", diff --git a/2016/CVE-2016-3959.json b/2016/CVE-2016-3959.json new file mode 100644 index 0000000000..5d154913a0 --- /dev/null +++ b/2016/CVE-2016-3959.json @@ -0,0 +1,33 @@ +[ + { + "id": 55875332, + "name": "dsa", + "full_name": "alexmullins\/dsa", + "owner": { + "login": "alexmullins", + "id": 174546, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174546?v=4", + "html_url": "https:\/\/github.com\/alexmullins", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/alexmullins\/dsa", + "description": "Analysis of CVE-2016-3959 and a Proof of Concept Attack Against a Go SSH Server. ", + "fork": false, + "created_at": "2016-04-10T01:35:27Z", + "updated_at": "2017-04-14T00:56:30Z", + "pushed_at": "2016-05-13T23:18:10Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4010.json b/2016/CVE-2016-4010.json index 09a5b328de..159afd607a 100644 --- a/2016/CVE-2016-4010.json +++ b/2016/CVE-2016-4010.json @@ -1,4 +1,35 @@ [ + { + "id": 59642424, + "name": "Magento-CVE-2016-4010", + "full_name": "brianwrf\/Magento-CVE-2016-4010", + "owner": { + "login": "brianwrf", + "id": 8141813, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", + "html_url": "https:\/\/github.com\/brianwrf", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/brianwrf\/Magento-CVE-2016-4010", + "description": "Magento Unauthorized Remote Code Execution (CVE-2016-4010)", + "fork": false, + "created_at": "2016-05-25T07:52:28Z", + "updated_at": "2023-08-10T18:39:40Z", + "pushed_at": "2016-05-25T08:03:20Z", + "stargazers_count": 6, + "watchers_count": 6, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 6, + "score": 0, + "subscribers_count": 2 + }, { "id": 286494930, "name": "CVE-2016-4010", diff --git a/2016/CVE-2016-4438.json b/2016/CVE-2016-4438.json index 0964409cfd..a7aff2d6e8 100644 --- a/2016/CVE-2016-4438.json +++ b/2016/CVE-2016-4438.json @@ -1,4 +1,35 @@ [ + { + "id": 61267937, + "name": "CVE-2016-4438", + "full_name": "jason3e7\/CVE-2016-4438", + "owner": { + "login": "jason3e7", + "id": 3059297, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3059297?v=4", + "html_url": "https:\/\/github.com\/jason3e7", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jason3e7\/CVE-2016-4438", + "description": null, + "fork": false, + "created_at": "2016-06-16T06:28:55Z", + "updated_at": "2020-06-29T01:15:05Z", + "pushed_at": "2016-06-16T06:55:03Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, { "id": 158189798, "name": "CVE-2016-4438", diff --git a/2016/CVE-2016-5636.json b/2016/CVE-2016-5636.json new file mode 100644 index 0000000000..2c242254fc --- /dev/null +++ b/2016/CVE-2016-5636.json @@ -0,0 +1,33 @@ +[ + { + "id": 54915339, + "name": "CVE-2016-5636", + "full_name": "insuyun\/CVE-2016-5636", + "owner": { + "login": "insuyun", + "id": 960652, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/960652?v=4", + "html_url": "https:\/\/github.com\/insuyun", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/insuyun\/CVE-2016-5636", + "description": "CVE-2016-5636", + "fork": false, + "created_at": "2016-03-28T18:47:03Z", + "updated_at": "2024-06-11T00:58:25Z", + "pushed_at": "2020-08-10T07:27:53Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-5699.json b/2016/CVE-2016-5699.json index 0049b3498b..16722926f3 100644 --- a/2016/CVE-2016-5699.json +++ b/2016/CVE-2016-5699.json @@ -1,4 +1,35 @@ [ + { + "id": 61809606, + "name": "CVE-2016-5699-poc", + "full_name": "bunseokbot\/CVE-2016-5699-poc", + "owner": { + "login": "bunseokbot", + "id": 5586218, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5586218?v=4", + "html_url": "https:\/\/github.com\/bunseokbot", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/bunseokbot\/CVE-2016-5699-poc", + "description": "PoC code of CVE-2016-5699 Vulnerability", + "fork": false, + "created_at": "2016-06-23T14:01:20Z", + "updated_at": "2023-06-06T04:33:13Z", + "pushed_at": "2016-06-28T05:22:55Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 7, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 7, + "watchers": 4, + "score": 0, + "subscribers_count": 2 + }, { "id": 66328457, "name": "cve-2016-5699-jinzheng-sha", diff --git a/2017/CVE-2017-12542.json b/2017/CVE-2017-12542.json index ce0b10cfd1..1d1f301d6f 100644 --- a/2017/CVE-2017-12542.json +++ b/2017/CVE-2017-12542.json @@ -19,13 +19,13 @@ "stargazers_count": 86, "watchers_count": 86, "has_discussions": false, - "forks_count": 36, + "forks_count": 34, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 36, + "forks": 34, "watchers": 86, "score": 0, "subscribers_count": 7 diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index bf647e9a47..d39f5ec561 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -45,10 +45,10 @@ "description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.", "fork": false, "created_at": "2018-08-03T04:36:23Z", - "updated_at": "2024-08-12T19:40:32Z", + "updated_at": "2025-01-12T00:52:05Z", "pushed_at": "2018-08-14T07:47:02Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 97, + "watchers": 98, "score": 0, "subscribers_count": 7 }, diff --git a/2018/CVE-2018-0114.json b/2018/CVE-2018-0114.json index 28169cf908..ddc8d25473 100644 --- a/2018/CVE-2018-0114.json +++ b/2018/CVE-2018-0114.json @@ -30,6 +30,130 @@ "score": 0, "subscribers_count": 4 }, + { + "id": 288319334, + "name": "CVE-2018-0114", + "full_name": "Logeirs\/CVE-2018-0114", + "owner": { + "login": "Logeirs", + "id": 1607594, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1607594?v=4", + "html_url": "https:\/\/github.com\/Logeirs", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Logeirs\/CVE-2018-0114", + "description": null, + "fork": false, + "created_at": "2020-08-18T00:52:39Z", + "updated_at": "2020-08-18T00:53:25Z", + "pushed_at": "2020-08-18T00:53:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 323036144, + "name": "POC-CVE-2018-0114", + "full_name": "adityathebe\/POC-CVE-2018-0114", + "owner": { + "login": "adityathebe", + "id": 13419481, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13419481?v=4", + "html_url": "https:\/\/github.com\/adityathebe", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/adityathebe\/POC-CVE-2018-0114", + "description": "POC for CVE-2018-0114 written in Go", + "fork": false, + "created_at": "2020-12-20T09:29:35Z", + "updated_at": "2021-02-21T04:42:08Z", + "pushed_at": "2021-02-21T04:42:06Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 326501568, + "name": "CVE-2018-0114", + "full_name": "Eremiel\/CVE-2018-0114", + "owner": { + "login": "Eremiel", + "id": 32537197, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32537197?v=4", + "html_url": "https:\/\/github.com\/Eremiel", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Eremiel\/CVE-2018-0114", + "description": "python2.7 script for JWT generation", + "fork": false, + "created_at": "2021-01-03T21:12:10Z", + "updated_at": "2022-07-02T15:00:49Z", + "pushed_at": "2021-01-03T21:14:35Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0, + "subscribers_count": 3 + }, + { + "id": 329385640, + "name": "CVE-2018-0114", + "full_name": "Starry-lord\/CVE-2018-0114", + "owner": { + "login": "Starry-lord", + "id": 66038734, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66038734?v=4", + "html_url": "https:\/\/github.com\/Starry-lord", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Starry-lord\/CVE-2018-0114", + "description": null, + "fork": false, + "created_at": "2021-01-13T17:40:08Z", + "updated_at": "2021-01-13T20:05:46Z", + "pushed_at": "2021-01-13T17:46:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 366358015, "name": "CVE-2018-0114", diff --git a/2018/CVE-2018-0208.json b/2018/CVE-2018-0208.json new file mode 100644 index 0000000000..3ae3536a56 --- /dev/null +++ b/2018/CVE-2018-0208.json @@ -0,0 +1,33 @@ +[ + { + "id": 303096743, + "name": "Cve-2018-0208", + "full_name": "dima5455\/Cve-2018-0208", + "owner": { + "login": "dima5455", + "id": 70570484, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70570484?v=4", + "html_url": "https:\/\/github.com\/dima5455", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/dima5455\/Cve-2018-0208", + "description": "Cve 2018-0208", + "fork": false, + "created_at": "2020-10-11T10:38:41Z", + "updated_at": "2020-10-11T10:46:51Z", + "pushed_at": "2020-10-11T10:46:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-0708.json b/2018/CVE-2018-0708.json new file mode 100644 index 0000000000..49ad54bb3d --- /dev/null +++ b/2018/CVE-2018-0708.json @@ -0,0 +1,33 @@ +[ + { + "id": 198731225, + "name": "CVE-2019-0708", + "full_name": "ntkernel0\/CVE-2019-0708", + "owner": { + "login": "ntkernel0", + "id": 46866847, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46866847?v=4", + "html_url": "https:\/\/github.com\/ntkernel0", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ntkernel0\/CVE-2019-0708", + "description": "收集网上CVE-2018-0708的poc和exp(目前没有找到exp)", + "fork": false, + "created_at": "2019-07-25T01:05:21Z", + "updated_at": "2024-08-12T19:51:22Z", + "pushed_at": "2019-07-25T01:03:47Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-0802.json b/2018/CVE-2018-0802.json index 19dee883f7..7ae803f2ff 100644 --- a/2018/CVE-2018-0802.json +++ b/2018/CVE-2018-0802.json @@ -123,6 +123,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 340543198, + "name": "CVE-2018-0802", + "full_name": "roninAPT\/CVE-2018-0802", + "owner": { + "login": "roninAPT", + "id": 77648833, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77648833?v=4", + "html_url": "https:\/\/github.com\/roninAPT", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/roninAPT\/CVE-2018-0802", + "description": null, + "fork": false, + "created_at": "2021-02-20T02:34:16Z", + "updated_at": "2021-02-20T02:34:27Z", + "pushed_at": "2021-02-20T02:34:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 610075894, "name": "Maldoc-Analysis", diff --git a/2018/CVE-2018-0886.json b/2018/CVE-2018-0886.json index 1bd2b89007..58ebe24024 100644 --- a/2018/CVE-2018-0886.json +++ b/2018/CVE-2018-0886.json @@ -14,10 +14,10 @@ "description": "A code demonstrating CVE-2018-0886", "fork": false, "created_at": "2018-04-02T12:52:07Z", - "updated_at": "2024-11-14T03:16:11Z", + "updated_at": "2025-01-12T03:27:37Z", "pushed_at": "2020-08-14T16:33:44Z", - "stargazers_count": 262, - "watchers_count": 262, + "stargazers_count": 263, + "watchers_count": 263, "has_discussions": false, "forks_count": 68, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 68, - "watchers": 262, + "watchers": 263, "score": 0, "subscribers_count": 18 } diff --git a/2018/CVE-2018-1000030.json b/2018/CVE-2018-1000030.json new file mode 100644 index 0000000000..8f0091ead8 --- /dev/null +++ b/2018/CVE-2018-1000030.json @@ -0,0 +1,33 @@ +[ + { + "id": 239510363, + "name": "CVE-2018-1000030", + "full_name": "tylepr96\/CVE-2018-1000030", + "owner": { + "login": "tylepr96", + "id": 60882012, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60882012?v=4", + "html_url": "https:\/\/github.com\/tylepr96", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/tylepr96\/CVE-2018-1000030", + "description": "Python 2.7.14 race condition UAF proof-of-concept", + "fork": false, + "created_at": "2020-02-10T12:48:31Z", + "updated_at": "2023-03-08T13:04:32Z", + "pushed_at": "2020-02-10T13:47:23Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000082.json b/2018/CVE-2018-1000082.json new file mode 100644 index 0000000000..44dcd7e91a --- /dev/null +++ b/2018/CVE-2018-1000082.json @@ -0,0 +1,33 @@ +[ + { + "id": 216815203, + "name": "CVE-2018-1000082-exploit", + "full_name": "SECFORCE\/CVE-2018-1000082-exploit", + "owner": { + "login": "SECFORCE", + "id": 8157384, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", + "html_url": "https:\/\/github.com\/SECFORCE", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2018-1000082-exploit", + "description": null, + "fork": false, + "created_at": "2019-10-22T13:02:02Z", + "updated_at": "2020-04-22T03:28:35Z", + "pushed_at": "2019-10-22T13:02:03Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000140.json b/2018/CVE-2018-1000140.json new file mode 100644 index 0000000000..6c0887e25c --- /dev/null +++ b/2018/CVE-2018-1000140.json @@ -0,0 +1,64 @@ +[ + { + "id": 186699953, + "name": "rsyslog-librelp-CVE-2018-1000140", + "full_name": "s0\/rsyslog-librelp-CVE-2018-1000140", + "owner": { + "login": "s0", + "id": 3319932, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3319932?v=4", + "html_url": "https:\/\/github.com\/s0", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/s0\/rsyslog-librelp-CVE-2018-1000140", + "description": "Pinned version of rsyslov vulnerable to CVE-2018-1000140", + "fork": false, + "created_at": "2019-05-14T21:02:07Z", + "updated_at": "2019-05-14T21:08:19Z", + "pushed_at": "2019-05-14T21:07:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 186706555, + "name": "rsyslog-librelp-CVE-2018-1000140-fixed", + "full_name": "s0\/rsyslog-librelp-CVE-2018-1000140-fixed", + "owner": { + "login": "s0", + "id": 3319932, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3319932?v=4", + "html_url": "https:\/\/github.com\/s0", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/s0\/rsyslog-librelp-CVE-2018-1000140-fixed", + "description": null, + "fork": false, + "created_at": "2019-05-14T21:58:54Z", + "updated_at": "2019-05-14T21:59:39Z", + "pushed_at": "2019-05-14T21:59:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000224.json b/2018/CVE-2018-1000224.json new file mode 100644 index 0000000000..6f515e2ed5 --- /dev/null +++ b/2018/CVE-2018-1000224.json @@ -0,0 +1,33 @@ +[ + { + "id": 183944666, + "name": "ITS", + "full_name": "zann1x\/ITS", + "owner": { + "login": "zann1x", + "id": 19776837, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19776837?v=4", + "html_url": "https:\/\/github.com\/zann1x", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/zann1x\/ITS", + "description": "Repo for a uni project to give a detailed explanation of CVE-2018-1000224", + "fork": false, + "created_at": "2019-04-28T18:31:03Z", + "updated_at": "2021-12-07T21:13:59Z", + "pushed_at": "2019-06-21T13:14:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000542.json b/2018/CVE-2018-1000542.json new file mode 100644 index 0000000000..ba20235793 --- /dev/null +++ b/2018/CVE-2018-1000542.json @@ -0,0 +1,33 @@ +[ + { + "id": 335788673, + "name": "CVE-2018-1000542-NetBeans", + "full_name": "forse01\/CVE-2018-1000542-NetBeans", + "owner": { + "login": "forse01", + "id": 76189258, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76189258?v=4", + "html_url": "https:\/\/github.com\/forse01", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/forse01\/CVE-2018-1000542-NetBeans", + "description": null, + "fork": false, + "created_at": "2021-02-04T00:01:33Z", + "updated_at": "2021-02-09T03:15:26Z", + "pushed_at": "2021-02-09T03:15:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000861.json b/2018/CVE-2018-1000861.json index 896aaa9b1f..25eebdb5dc 100644 --- a/2018/CVE-2018-1000861.json +++ b/2018/CVE-2018-1000861.json @@ -1,4 +1,39 @@ [ + { + "id": 183322760, + "name": "CVE-2019-1003000_RCE-DETECTION", + "full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION", + "owner": { + "login": "1NTheKut", + "id": 26243759, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26243759?v=4", + "html_url": "https:\/\/github.com\/1NTheKut", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION", + "description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)", + "fork": false, + "created_at": "2019-04-24T23:52:42Z", + "updated_at": "2024-08-12T19:48:14Z", + "pushed_at": "2019-05-01T07:11:28Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "csharp", + "cve", + "jenkins" + ], + "visibility": "public", + "forks": 2, + "watchers": 4, + "score": 0, + "subscribers_count": 0 + }, { "id": 691229408, "name": "CVE-2018-1000861", diff --git a/2018/CVE-2018-1002105.json b/2018/CVE-2018-1002105.json index 3301cb8a2a..a44f57ded6 100644 --- a/2018/CVE-2018-1002105.json +++ b/2018/CVE-2018-1002105.json @@ -92,6 +92,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 184282942, + "name": "cve-2018-1002105", + "full_name": "bgeesaman\/cve-2018-1002105", + "owner": { + "login": "bgeesaman", + "id": 3769609, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3769609?v=4", + "html_url": "https:\/\/github.com\/bgeesaman", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/bgeesaman\/cve-2018-1002105", + "description": "PoC command injection example for cve-2018-1002105 based off https:\/\/github.com\/gravitational\/cve-2018-1002105", + "fork": false, + "created_at": "2019-04-30T15:01:23Z", + "updated_at": "2023-05-21T17:25:09Z", + "pushed_at": "2019-04-30T15:14:03Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, { "id": 478746696, "name": "CVE-2018-1002105", diff --git a/2018/CVE-2018-10118.json b/2018/CVE-2018-10118.json new file mode 100644 index 0000000000..b6061b0719 --- /dev/null +++ b/2018/CVE-2018-10118.json @@ -0,0 +1,33 @@ +[ + { + "id": 191191957, + "name": "CVE-2018-10118", + "full_name": "GeunSam2\/CVE-2018-10118", + "owner": { + "login": "GeunSam2", + "id": 41275199, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41275199?v=4", + "html_url": "https:\/\/github.com\/GeunSam2", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/GeunSam2\/CVE-2018-10118", + "description": "exploit tool of CVE-2018-10118", + "fork": false, + "created_at": "2019-06-10T15:13:25Z", + "updated_at": "2019-06-10T15:13:58Z", + "pushed_at": "2019-06-10T15:13:56Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-10388.json b/2018/CVE-2018-10388.json new file mode 100644 index 0000000000..788c4a13ec --- /dev/null +++ b/2018/CVE-2018-10388.json @@ -0,0 +1,33 @@ +[ + { + "id": 263660192, + "name": "CVE-2018-10388", + "full_name": "0xddaa\/CVE-2018-10388", + "owner": { + "login": "0xddaa", + "id": 5286233, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5286233?v=4", + "html_url": "https:\/\/github.com\/0xddaa", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/0xddaa\/CVE-2018-10388", + "description": "practice", + "fork": false, + "created_at": "2020-05-13T14:52:43Z", + "updated_at": "2024-06-03T04:24:39Z", + "pushed_at": "2020-05-15T16:36:46Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 4, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-10920.json b/2018/CVE-2018-10920.json new file mode 100644 index 0000000000..9db87c0b7d --- /dev/null +++ b/2018/CVE-2018-10920.json @@ -0,0 +1,33 @@ +[ + { + "id": 167577440, + "name": "CVE-2018-10920_PoC", + "full_name": "shutingrz\/CVE-2018-10920_PoC", + "owner": { + "login": "shutingrz", + "id": 2587857, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2587857?v=4", + "html_url": "https:\/\/github.com\/shutingrz", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/shutingrz\/CVE-2018-10920_PoC", + "description": "Knot Resolver CVE-2018-10920 \/ DO NOT ABUSE", + "fork": false, + "created_at": "2019-01-25T16:24:49Z", + "updated_at": "2024-08-12T19:45:12Z", + "pushed_at": "2019-01-25T16:26:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 3 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 4ba919173d..c1af674203 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -783,6 +783,226 @@ "score": 0, "subscribers_count": 0 }, + { + "id": 169983604, + "name": "LibSSH-exploit", + "full_name": "Kurlee\/LibSSH-exploit", + "owner": { + "login": "Kurlee", + "id": 44727604, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44727604?v=4", + "html_url": "https:\/\/github.com\/Kurlee", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Kurlee\/LibSSH-exploit", + "description": "Takes advantage of CVE-2018-10933", + "fork": false, + "created_at": "2019-02-10T13:55:06Z", + "updated_at": "2019-02-10T14:02:29Z", + "pushed_at": "2019-02-10T14:02:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 223548534, + "name": "Libssh-server-CVE-2018-10933", + "full_name": "crispy-peppers\/Libssh-server-CVE-2018-10933", + "owner": { + "login": "crispy-peppers", + "id": 23626307, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23626307?v=4", + "html_url": "https:\/\/github.com\/crispy-peppers", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/crispy-peppers\/Libssh-server-CVE-2018-10933", + "description": null, + "fork": false, + "created_at": "2019-11-23T07:22:25Z", + "updated_at": "2019-11-23T07:23:28Z", + "pushed_at": "2019-11-23T07:23:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 246461801, + "name": "CVE-2018-10933", + "full_name": "youkergav\/CVE-2018-10933", + "owner": { + "login": "youkergav", + "id": 10110422, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10110422?v=4", + "html_url": "https:\/\/github.com\/youkergav", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/youkergav\/CVE-2018-10933", + "description": "Authentication Bypass in Server Code for LibSSH", + "fork": false, + "created_at": "2020-03-11T03:04:45Z", + "updated_at": "2020-03-31T00:12:00Z", + "pushed_at": "2020-03-31T00:11:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2018-10933", + "vulnerability" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 257045918, + "name": "CVE-2018-10933", + "full_name": "kristyna-mlcakova\/CVE-2018-10933", + "owner": { + "login": "kristyna-mlcakova", + "id": 63969072, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63969072?v=4", + "html_url": "https:\/\/github.com\/kristyna-mlcakova", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/kristyna-mlcakova\/CVE-2018-10933", + "description": null, + "fork": false, + "created_at": "2020-04-19T16:20:19Z", + "updated_at": "2020-04-19T16:35:53Z", + "pushed_at": "2020-04-19T16:24:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 263377940, + "name": "CVE-2018-10933", + "full_name": "lalishasanduwara\/CVE-2018-10933", + "owner": { + "login": "lalishasanduwara", + "id": 65178315, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65178315?v=4", + "html_url": "https:\/\/github.com\/lalishasanduwara", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/lalishasanduwara\/CVE-2018-10933", + "description": null, + "fork": false, + "created_at": "2020-05-12T15:34:48Z", + "updated_at": "2020-05-12T15:36:07Z", + "pushed_at": "2020-05-12T15:36:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 264254588, + "name": "CVE-2018-10933_Scanner", + "full_name": "JoSecMx\/CVE-2018-10933_Scanner", + "owner": { + "login": "JoSecMx", + "id": 65414655, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65414655?v=4", + "html_url": "https:\/\/github.com\/JoSecMx", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/JoSecMx\/CVE-2018-10933_Scanner", + "description": "CVE-2018-10933_Scanner", + "fork": false, + "created_at": "2020-05-15T17:18:31Z", + "updated_at": "2020-05-15T17:20:25Z", + "pushed_at": "2020-05-15T17:20:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 273584617, + "name": "Libssh-server-CVE-2018-10933", + "full_name": "cyberharsh\/Libssh-server-CVE-2018-10933", + "owner": { + "login": "cyberharsh", + "id": 57433814, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57433814?v=4", + "html_url": "https:\/\/github.com\/cyberharsh", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/cyberharsh\/Libssh-server-CVE-2018-10933", + "description": null, + "fork": false, + "created_at": "2020-06-19T20:53:39Z", + "updated_at": "2020-06-20T09:46:14Z", + "pushed_at": "2020-06-20T09:46:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 518865051, "name": "CVE-2018-10933", diff --git a/2018/CVE-2018-1111.json b/2018/CVE-2018-1111.json index 7bb2081438..2e2a565ffc 100644 --- a/2018/CVE-2018-1111.json +++ b/2018/CVE-2018-1111.json @@ -60,5 +60,40 @@ "watchers": 12, "score": 0, "subscribers_count": 3 + }, + { + "id": 313717464, + "name": "FEP3370-advanced-ethical-hacking", + "full_name": "baldassarreFe\/FEP3370-advanced-ethical-hacking", + "owner": { + "login": "baldassarreFe", + "id": 13353649, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13353649?v=4", + "html_url": "https:\/\/github.com\/baldassarreFe", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/baldassarreFe\/FEP3370-advanced-ethical-hacking", + "description": "DHCP exploitation with DynoRoot (CVE-2018-1111)", + "fork": false, + "created_at": "2020-11-17T19:10:29Z", + "updated_at": "2020-11-20T01:59:40Z", + "pushed_at": "2020-11-20T01:54:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2018-1111", + "dhcp", + "ethical-hacking" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2018/CVE-2018-11235.json b/2018/CVE-2018-11235.json index 0b7690ece5..b8e515fed5 100644 --- a/2018/CVE-2018-11235.json +++ b/2018/CVE-2018-11235.json @@ -284,6 +284,223 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 193244232, + "name": "CVE-2018-11235", + "full_name": "AnonymKing\/CVE-2018-11235", + "owner": { + "login": "AnonymKing", + "id": 26847177, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26847177?v=4", + "html_url": "https:\/\/github.com\/AnonymKing", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/AnonymKing\/CVE-2018-11235", + "description": "CVE-2018-11235(PoC && Exp)", + "fork": false, + "created_at": "2019-06-22T14:39:08Z", + "updated_at": "2019-06-24T09:04:10Z", + "pushed_at": "2019-06-22T14:42:08Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 195966434, + "name": "CVE-2018-11235", + "full_name": "0rx1\/CVE-2018-11235", + "owner": { + "login": "0rx1", + "id": 12779060, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4", + "html_url": "https:\/\/github.com\/0rx1", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/0rx1\/CVE-2018-11235", + "description": null, + "fork": false, + "created_at": "2019-07-09T08:28:49Z", + "updated_at": "2019-07-09T08:28:49Z", + "pushed_at": "2019-07-09T08:28:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 218206529, + "name": "CVE-2018-11235-test", + "full_name": "cchang27\/CVE-2018-11235-test", + "owner": { + "login": "cchang27", + "id": 54129952, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54129952?v=4", + "html_url": "https:\/\/github.com\/cchang27", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/cchang27\/CVE-2018-11235-test", + "description": null, + "fork": false, + "created_at": "2019-10-29T04:49:45Z", + "updated_at": "2019-10-29T04:49:45Z", + "pushed_at": "2019-10-29T04:49:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 245079097, + "name": "CVE-2018-11235", + "full_name": "nthuong95\/CVE-2018-11235", + "owner": { + "login": "nthuong95", + "id": 26857031, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26857031?v=4", + "html_url": "https:\/\/github.com\/nthuong95", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/nthuong95\/CVE-2018-11235", + "description": null, + "fork": false, + "created_at": "2020-03-05T05:43:00Z", + "updated_at": "2020-03-05T06:04:39Z", + "pushed_at": "2020-03-05T06:04:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 279086119, + "name": "CVE-2018-11235", + "full_name": "xElkomy\/CVE-2018-11235", + "owner": { + "login": "xElkomy", + "id": 46958133, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46958133?v=4", + "html_url": "https:\/\/github.com\/xElkomy", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/xElkomy\/CVE-2018-11235", + "description": null, + "fork": false, + "created_at": "2020-07-12T14:52:51Z", + "updated_at": "2020-07-12T14:54:39Z", + "pushed_at": "2020-07-12T14:54:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 307135452, + "name": "CVE-2018-11235-PoC", + "full_name": "jongmartinez\/CVE-2018-11235-PoC", + "owner": { + "login": "jongmartinez", + "id": 11743460, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11743460?v=4", + "html_url": "https:\/\/github.com\/jongmartinez", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jongmartinez\/CVE-2018-11235-PoC", + "description": "PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules ", + "fork": false, + "created_at": "2020-10-25T15:58:40Z", + "updated_at": "2020-10-25T16:51:33Z", + "pushed_at": "2020-10-25T16:51:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 358421932, + "name": "test-CVE-2018-11235", + "full_name": "MohamedTarekq\/test-CVE-2018-11235", + "owner": { + "login": "MohamedTarekq", + "id": 54548283, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54548283?v=4", + "html_url": "https:\/\/github.com\/MohamedTarekq", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/MohamedTarekq\/test-CVE-2018-11235", + "description": null, + "fork": false, + "created_at": "2021-04-15T23:45:18Z", + "updated_at": "2021-04-15T23:45:18Z", + "pushed_at": "2021-04-15T23:45:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 409358521, "name": "CVE-2018-11235", diff --git a/2018/CVE-2018-1133.json b/2018/CVE-2018-1133.json index edaf3eaf08..9963d9054a 100644 --- a/2018/CVE-2018-1133.json +++ b/2018/CVE-2018-1133.json @@ -1,4 +1,66 @@ [ + { + "id": 175834951, + "name": "MoodleExploit", + "full_name": "darrynten\/MoodleExploit", + "owner": { + "login": "darrynten", + "id": 3657251, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3657251?v=4", + "html_url": "https:\/\/github.com\/darrynten", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/darrynten\/MoodleExploit", + "description": "Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133", + "fork": false, + "created_at": "2019-03-15T14:25:20Z", + "updated_at": "2024-08-12T19:46:46Z", + "pushed_at": "2019-03-15T14:48:18Z", + "stargazers_count": 10, + "watchers_count": 10, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 10, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 324510428, + "name": "MOODLE-3.X-Remote-Code-Execution", + "full_name": "Feidao-fei\/MOODLE-3.X-Remote-Code-Execution", + "owner": { + "login": "Feidao-fei", + "id": 52765767, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52765767?v=4", + "html_url": "https:\/\/github.com\/Feidao-fei", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Feidao-fei\/MOODLE-3.X-Remote-Code-Execution", + "description": "cve-2018-1133 moodle athenticated as teacher remote code execution. ", + "fork": false, + "created_at": "2020-12-26T08:09:19Z", + "updated_at": "2022-11-30T19:19:19Z", + "pushed_at": "2019-03-16T15:19:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 734028586, "name": "CVE-2018-1133-Exploit", diff --git a/2018/CVE-2018-11564.json b/2018/CVE-2018-11564.json new file mode 100644 index 0000000000..a9f6bcce4e --- /dev/null +++ b/2018/CVE-2018-11564.json @@ -0,0 +1,33 @@ +[ + { + "id": 191192237, + "name": "CVE-2018-11564", + "full_name": "GeunSam2\/CVE-2018-11564", + "owner": { + "login": "GeunSam2", + "id": 41275199, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41275199?v=4", + "html_url": "https:\/\/github.com\/GeunSam2", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/GeunSam2\/CVE-2018-11564", + "description": "exploit tool of CVE-2018-11564", + "fork": false, + "created_at": "2019-06-10T15:15:07Z", + "updated_at": "2019-06-10T15:15:33Z", + "pushed_at": "2019-06-10T15:15:22Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1160.json b/2018/CVE-2018-1160.json new file mode 100644 index 0000000000..f2de341339 --- /dev/null +++ b/2018/CVE-2018-1160.json @@ -0,0 +1,33 @@ +[ + { + "id": 263378580, + "name": "CVE-2018-1160", + "full_name": "SachinThanushka\/CVE-2018-1160", + "owner": { + "login": "SachinThanushka", + "id": 65237811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65237811?v=4", + "html_url": "https:\/\/github.com\/SachinThanushka", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/SachinThanushka\/CVE-2018-1160", + "description": null, + "fork": false, + "created_at": "2020-05-12T15:37:20Z", + "updated_at": "2020-05-12T15:44:22Z", + "pushed_at": "2020-05-12T15:44:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11631.json b/2018/CVE-2018-11631.json new file mode 100644 index 0000000000..a4127bc704 --- /dev/null +++ b/2018/CVE-2018-11631.json @@ -0,0 +1,33 @@ +[ + { + "id": 256695460, + "name": "bandexploit", + "full_name": "ColeShelly\/bandexploit", + "owner": { + "login": "ColeShelly", + "id": 30240453, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30240453?v=4", + "html_url": "https:\/\/github.com\/ColeShelly", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ColeShelly\/bandexploit", + "description": "M1 Band Smart Watch Bluetooth Low Energy Exploit python script (CVE-2018-11631)", + "fork": false, + "created_at": "2020-04-18T07:34:43Z", + "updated_at": "2024-02-27T21:09:20Z", + "pushed_at": "2020-08-12T04:06:12Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11686.json b/2018/CVE-2018-11686.json new file mode 100644 index 0000000000..3a3eb6b793 --- /dev/null +++ b/2018/CVE-2018-11686.json @@ -0,0 +1,36 @@ +[ + { + "id": 176804317, + "name": "CVE-2018-11686", + "full_name": "mpgn\/CVE-2018-11686", + "owner": { + "login": "mpgn", + "id": 5891788, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4", + "html_url": "https:\/\/github.com\/mpgn", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/mpgn\/CVE-2018-11686", + "description": "CVE-2018-11686 - FlexPaper PHP Publish Service RCE <= 2.3.6", + "fork": false, + "created_at": "2019-03-20T19:36:10Z", + "updated_at": "2024-08-12T19:47:00Z", + "pushed_at": "2019-03-20T20:56:02Z", + "stargazers_count": 6, + "watchers_count": 6, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "flexpaper", + "rce" + ], + "visibility": "public", + "forks": 2, + "watchers": 6, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11761.json b/2018/CVE-2018-11761.json new file mode 100644 index 0000000000..d3fc111eac --- /dev/null +++ b/2018/CVE-2018-11761.json @@ -0,0 +1,33 @@ +[ + { + "id": 167112093, + "name": "CVE-2018-11761", + "full_name": "brianwrf\/CVE-2018-11761", + "owner": { + "login": "brianwrf", + "id": 8141813, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", + "html_url": "https:\/\/github.com\/brianwrf", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11761", + "description": "Apache Tika Denial of Service Vulnerability (CVE-2018-11761)", + "fork": false, + "created_at": "2019-01-23T03:40:26Z", + "updated_at": "2021-06-22T12:32:25Z", + "pushed_at": "2019-01-23T03:44:46Z", + "stargazers_count": 9, + "watchers_count": 9, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 9, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11770.json b/2018/CVE-2018-11770.json new file mode 100644 index 0000000000..f2019fdef2 --- /dev/null +++ b/2018/CVE-2018-11770.json @@ -0,0 +1,33 @@ +[ + { + "id": 213971110, + "name": "CVE-2018-11770", + "full_name": "ivanitlearning\/CVE-2018-11770", + "owner": { + "login": "ivanitlearning", + "id": 52420671, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4", + "html_url": "https:\/\/github.com\/ivanitlearning", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2018-11770", + "description": "Python RCE exploit for Apache Spark rewritten from Metasploit module", + "fork": false, + "created_at": "2019-10-09T16:41:39Z", + "updated_at": "2021-06-09T08:58:46Z", + "pushed_at": "2019-10-15T16:01:57Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11776.json b/2018/CVE-2018-11776.json index acf810bb8e..c9fa695e2d 100644 --- a/2018/CVE-2018-11776.json +++ b/2018/CVE-2018-11776.json @@ -367,6 +367,37 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 164352202, + "name": "cve-2018-11776", + "full_name": "cved-sources\/cve-2018-11776", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2018-11776", + "description": "cve-2018-11776", + "fork": false, + "created_at": "2019-01-06T22:47:25Z", + "updated_at": "2021-04-15T21:30:12Z", + "pushed_at": "2021-04-15T21:30:10Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + }, { "id": 193423029, "name": "apche-struts-vuln-demo-cve-2018-11776", @@ -398,6 +429,99 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 213772542, + "name": "CVE-2018-11776", + "full_name": "cucadili\/CVE-2018-11776", + "owner": { + "login": "cucadili", + "id": 48569185, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48569185?v=4", + "html_url": "https:\/\/github.com\/cucadili", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/cucadili\/CVE-2018-11776", + "description": "Investigation of CVE-2018-11776 vulnerability that allows attackers to remotely execute code and gain control over Apache Struts-based applications.", + "fork": false, + "created_at": "2019-10-08T23:01:49Z", + "updated_at": "2019-10-08T23:46:28Z", + "pushed_at": "2019-10-08T23:46:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 214186123, + "name": "Apache-Struts-0Day-Exploit", + "full_name": "ArunBhandarii\/Apache-Struts-0Day-Exploit", + "owner": { + "login": "ArunBhandarii", + "id": 24475929, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24475929?v=4", + "html_url": "https:\/\/github.com\/ArunBhandarii", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ArunBhandarii\/Apache-Struts-0Day-Exploit", + "description": "Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.", + "fork": false, + "created_at": "2019-10-10T13:09:50Z", + "updated_at": "2024-08-12T19:53:47Z", + "pushed_at": "2020-07-30T21:35:38Z", + "stargazers_count": 14, + "watchers_count": 14, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 14, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 271868190, + "name": "ApacheStruts-CVE-2018-11776", + "full_name": "freshdemo\/ApacheStruts-CVE-2018-11776", + "owner": { + "login": "freshdemo", + "id": 25557118, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25557118?v=4", + "html_url": "https:\/\/github.com\/freshdemo", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/freshdemo\/ApacheStruts-CVE-2018-11776", + "description": null, + "fork": false, + "created_at": "2020-06-12T18:46:29Z", + "updated_at": "2023-09-04T14:39:51Z", + "pushed_at": "2020-06-12T20:41:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 656753963, "name": "CVE-2018-11776-FIS", diff --git a/2018/CVE-2018-11788.json b/2018/CVE-2018-11788.json new file mode 100644 index 0000000000..9cd2be5e1e --- /dev/null +++ b/2018/CVE-2018-11788.json @@ -0,0 +1,33 @@ +[ + { + "id": 164298909, + "name": "CVE-2018-11788", + "full_name": "brianwrf\/CVE-2018-11788", + "owner": { + "login": "brianwrf", + "id": 8141813, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", + "html_url": "https:\/\/github.com\/brianwrf", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11788", + "description": "Apache Karaf XXE Vulnerability (CVE-2018-11788)", + "fork": false, + "created_at": "2019-01-06T11:01:39Z", + "updated_at": "2024-08-12T19:44:36Z", + "pushed_at": "2019-01-06T11:50:43Z", + "stargazers_count": 38, + "watchers_count": 38, + "has_discussions": false, + "forks_count": 6, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 6, + "watchers": 38, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-12086.json b/2018/CVE-2018-12086.json new file mode 100644 index 0000000000..bf30e30883 --- /dev/null +++ b/2018/CVE-2018-12086.json @@ -0,0 +1,33 @@ +[ + { + "id": 171705705, + "name": "stack-overflow-poc", + "full_name": "kevinherron\/stack-overflow-poc", + "owner": { + "login": "kevinherron", + "id": 340273, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/340273?v=4", + "html_url": "https:\/\/github.com\/kevinherron", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/kevinherron\/stack-overflow-poc", + "description": "PoC for CVE-2018-12086 affecting various OPC UA stacks", + "fork": false, + "created_at": "2019-02-20T16:11:26Z", + "updated_at": "2019-10-31T13:35:21Z", + "pushed_at": "2019-10-31T13:35:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1235.json b/2018/CVE-2018-1235.json new file mode 100644 index 0000000000..6cd45f43b4 --- /dev/null +++ b/2018/CVE-2018-1235.json @@ -0,0 +1,33 @@ +[ + { + "id": 181948503, + "name": "CVE-2018-1235", + "full_name": "AbsoZed\/CVE-2018-1235", + "owner": { + "login": "AbsoZed", + "id": 17788335, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17788335?v=4", + "html_url": "https:\/\/github.com\/AbsoZed", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/AbsoZed\/CVE-2018-1235", + "description": "A python script that tests for an exploitable instance of CVE-2018-1235.", + "fork": false, + "created_at": "2019-04-17T18:37:00Z", + "updated_at": "2019-04-18T12:47:38Z", + "pushed_at": "2019-04-18T12:47:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-12386.json b/2018/CVE-2018-12386.json new file mode 100644 index 0000000000..d9a72fb035 --- /dev/null +++ b/2018/CVE-2018-12386.json @@ -0,0 +1,64 @@ +[ + { + "id": 201420418, + "name": "cve-2018-12386", + "full_name": "Hydra3evil\/cve-2018-12386", + "owner": { + "login": "Hydra3evil", + "id": 53893501, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53893501?v=4", + "html_url": "https:\/\/github.com\/Hydra3evil", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Hydra3evil\/cve-2018-12386", + "description": "CVE-2018-12386 - Firefox Sandboxed RCE Exploit for Linux (Firefox