Auto Update 2021/03/08 06:09:31

This commit is contained in:
motikan2010-bot 2021-03-08 06:09:31 +09:00
parent a57fada6d4
commit 6bfe3b1258
103 changed files with 3496 additions and 126 deletions

25
2007/CVE-2007-1858.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 325974459,
"name": "A2SV--SSL-VUL-Scan",
"full_name": "nyc-tophile\/A2SV--SSL-VUL-Scan",
"owner": {
"login": "nyc-tophile",
"id": 75995332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4",
"html_url": "https:\/\/github.com\/nyc-tophile"
},
"html_url": "https:\/\/github.com\/nyc-tophile\/A2SV--SSL-VUL-Scan",
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2021-01-22T20:27:11Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -228,5 +228,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 345190487,
"name": "CVE-2007-2447",
"full_name": "0xKn\/CVE-2007-2447",
"owner": {
"login": "0xKn",
"id": 80174242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80174242?v=4",
"html_url": "https:\/\/github.com\/0xKn"
},
"html_url": "https:\/\/github.com\/0xKn\/CVE-2007-2447",
"description": null,
"fork": false,
"created_at": "2021-03-06T20:39:21Z",
"updated_at": "2021-03-06T22:11:41Z",
"pushed_at": "2021-03-06T22:11:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-06T03:02:33Z",
"updated_at": "2021-03-07T19:37:23Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 940,
"watchers_count": 940,
"stargazers_count": 941,
"watchers_count": 941,
"forks_count": 220,
"forks": 220,
"watchers": 940,
"watchers": 941,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)",
"fork": false,
"created_at": "2017-08-03T22:28:54Z",
"updated_at": "2020-04-07T05:58:31Z",
"updated_at": "2021-03-07T18:15:55Z",
"pushed_at": "2018-06-07T17:12:24Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-06T03:02:33Z",
"updated_at": "2021-03-07T19:37:23Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 940,
"watchers_count": 940,
"stargazers_count": 941,
"watchers_count": 941,
"forks_count": 220,
"forks": 220,
"watchers": 940,
"watchers": 941,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2021-02-20T15:36:20Z",
"updated_at": "2021-03-07T20:10:25Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 860,
"watchers_count": 860,
"forks_count": 409,
"forks": 409,
"watchers": 860,
"stargazers_count": 861,
"watchers_count": 861,
"forks_count": 410,
"forks": 410,
"watchers": 861,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-06T03:02:33Z",
"updated_at": "2021-03-07T19:37:23Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 940,
"watchers_count": 940,
"stargazers_count": 941,
"watchers_count": 941,
"forks_count": 220,
"forks": 220,
"watchers": 940,
"watchers": 941,
"score": 0
}
]

25
2018/CVE-2018-0202.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158891873,
"name": "CVE-2018-0202",
"full_name": "jaychowjingjie\/CVE-2018-0202",
"owner": {
"login": "jaychowjingjie",
"id": 11684383,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684383?v=4",
"html_url": "https:\/\/github.com\/jaychowjingjie"
},
"html_url": "https:\/\/github.com\/jaychowjingjie\/CVE-2018-0202",
"description": "Security & Privacy in Computing(Fall 2018), Final Group Project at JHUISI, clamscan vulnerability in Cisco's ClamAV 0.99.3",
"fork": false,
"created_at": "2018-11-24T01:18:52Z",
"updated_at": "2019-03-26T05:00:47Z",
"pushed_at": "2019-03-26T05:00:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 69,
"watchers": 181,
"score": 0
},
{
"id": 162431036,
"name": "CVE-2018-0296",
"full_name": "qiantu88\/CVE-2018-0296",
"owner": {
"login": "qiantu88",
"id": 35452263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4",
"html_url": "https:\/\/github.com\/qiantu88"
},
"html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-0296",
"description": "https:\/\/github.com\/milo2012\/CVE-2018-0296.git",
"fork": false,
"created_at": "2018-12-19T11:57:43Z",
"updated_at": "2018-12-19T11:59:47Z",
"pushed_at": "2018-12-19T11:59:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 183322760,
"name": "CVE-2019-1003000_RCE-DETECTION",
"full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"owner": {
"login": "1NTheKut",
"id": 26243759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26243759?v=4",
"html_url": "https:\/\/github.com\/1NTheKut"
},
"html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)",
"fork": false,
"created_at": "2019-04-24T23:52:42Z",
"updated_at": "2020-09-25T09:24:39Z",
"pushed_at": "2019-05-01T07:11:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 291078833,
"name": "CVE-2018-1000861",

View file

@ -1,4 +1,73 @@
[
{
"id": 160665138,
"name": "poc_CVE-2018-1002105",
"full_name": "evict\/poc_CVE-2018-1002105",
"owner": {
"login": "evict",
"id": 7238650,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7238650?v=4",
"html_url": "https:\/\/github.com\/evict"
},
"html_url": "https:\/\/github.com\/evict\/poc_CVE-2018-1002105",
"description": "PoC for CVE-2018-1002105.",
"fork": false,
"created_at": "2018-12-06T11:28:02Z",
"updated_at": "2021-03-04T03:16:53Z",
"pushed_at": "2018-12-21T14:34:04Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 39,
"forks": 39,
"watchers": 216,
"score": 0
},
{
"id": 161109755,
"name": "Kubernetes-1.12.3-all-auto-install",
"full_name": "imlzw\/Kubernetes-1.12.3-all-auto-install",
"owner": {
"login": "imlzw",
"id": 7478692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7478692?v=4",
"html_url": "https:\/\/github.com\/imlzw"
},
"html_url": "https:\/\/github.com\/imlzw\/Kubernetes-1.12.3-all-auto-install",
"description": "个人整理的Centos7.x + Kubernetes-1.12.3 + Dashboard-1.8.3 无 CVE-2018-1002105 漏洞的master节点全自动快速一键安装部署文件适用于测试环境生产环境的快速安装部署",
"fork": false,
"created_at": "2018-12-10T03:14:55Z",
"updated_at": "2021-01-24T18:36:35Z",
"pushed_at": "2019-02-26T08:49:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 184282942,
"name": "cve-2018-1002105",
"full_name": "bgeesaman\/cve-2018-1002105",
"owner": {
"login": "bgeesaman",
"id": 3769609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3769609?v=4",
"html_url": "https:\/\/github.com\/bgeesaman"
},
"html_url": "https:\/\/github.com\/bgeesaman\/cve-2018-1002105",
"description": "PoC command injection example for cve-2018-1002105 based off https:\/\/github.com\/gravitational\/cve-2018-1002105",
"fork": false,
"created_at": "2019-04-30T15:01:23Z",
"updated_at": "2019-04-30T15:14:04Z",
"pushed_at": "2019-04-30T15:14:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 209629712,
"name": "cve-2018-1002105",

25
2018/CVE-2018-10920.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 167577440,
"name": "CVE-2018-10920_PoC",
"full_name": "shutingrz\/CVE-2018-10920_PoC",
"owner": {
"login": "shutingrz",
"id": 2587857,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2587857?v=4",
"html_url": "https:\/\/github.com\/shutingrz"
},
"html_url": "https:\/\/github.com\/shutingrz\/CVE-2018-10920_PoC",
"description": "Knot Resolver CVE-2018-10920 \/ DO NOT ABUSE",
"fork": false,
"created_at": "2019-01-25T16:24:49Z",
"updated_at": "2019-01-25T16:26:11Z",
"pushed_at": "2019-01-25T16:26:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -45,6 +45,52 @@
"watchers": 4,
"score": 0
},
{
"id": 162456991,
"name": "LibSSH-Authentication-Bypass",
"full_name": "nikhil1232\/LibSSH-Authentication-Bypass",
"owner": {
"login": "nikhil1232",
"id": 39535219,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39535219?v=4",
"html_url": "https:\/\/github.com\/nikhil1232"
},
"html_url": "https:\/\/github.com\/nikhil1232\/LibSSH-Authentication-Bypass",
"description": "LibSSH Authentication Bypass CVE-2018-10933",
"fork": false,
"created_at": "2018-12-19T15:33:00Z",
"updated_at": "2020-01-09T05:02:59Z",
"pushed_at": "2018-12-19T15:46:37Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 169983604,
"name": "LibSSH-exploit",
"full_name": "Kurlee\/LibSSH-exploit",
"owner": {
"login": "Kurlee",
"id": 44727604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44727604?v=4",
"html_url": "https:\/\/github.com\/Kurlee"
},
"html_url": "https:\/\/github.com\/Kurlee\/LibSSH-exploit",
"description": "Takes advantage of CVE-2018-10933",
"fork": false,
"created_at": "2019-02-10T13:55:06Z",
"updated_at": "2019-02-10T14:02:29Z",
"pushed_at": "2019-02-10T14:02:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 223548534,
"name": "Libssh-server-CVE-2018-10933",

View file

@ -45,6 +45,29 @@
"watchers": 1,
"score": 0
},
{
"id": 180293963,
"name": "CVE-2018-11235-Git-Submodule-CE",
"full_name": "qweraqq\/CVE-2018-11235-Git-Submodule-CE",
"owner": {
"login": "qweraqq",
"id": 5697699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5697699?v=4",
"html_url": "https:\/\/github.com\/qweraqq"
},
"html_url": "https:\/\/github.com\/qweraqq\/CVE-2018-11235-Git-Submodule-CE",
"description": "CVE-2018-11235-Git PoC",
"fork": false,
"created_at": "2019-04-09T05:48:22Z",
"updated_at": "2020-12-13T18:51:12Z",
"pushed_at": "2019-04-09T09:23:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 189964702,
"name": "CVE-2018-11235",

48
2018/CVE-2018-1133.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 175834951,
"name": "MoodleExploit",
"full_name": "darrynten\/MoodleExploit",
"owner": {
"login": "darrynten",
"id": 3657251,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3657251?v=4",
"html_url": "https:\/\/github.com\/darrynten"
},
"html_url": "https:\/\/github.com\/darrynten\/MoodleExploit",
"description": "Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133",
"fork": false,
"created_at": "2019-03-15T14:25:20Z",
"updated_at": "2021-02-20T18:14:31Z",
"pushed_at": "2019-03-15T14:48:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 324510428,
"name": "MOODLE-3.X-Remote-Code-Execution",
"full_name": "Feidao-fei\/MOODLE-3.X-Remote-Code-Execution",
"owner": {
"login": "Feidao-fei",
"id": 52765767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52765767?v=4",
"html_url": "https:\/\/github.com\/Feidao-fei"
},
"html_url": "https:\/\/github.com\/Feidao-fei\/MOODLE-3.X-Remote-Code-Execution",
"description": "cve-2018-1133 moodle athenticated as teacher remote code execution. ",
"fork": false,
"created_at": "2020-12-26T08:09:19Z",
"updated_at": "2021-01-22T18:16:32Z",
"pushed_at": "2019-03-16T15:19:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-11686.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 176804317,
"name": "CVE-2018-11686",
"full_name": "mpgn\/CVE-2018-11686",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2018-11686",
"description": "CVE-2018-11686 - FlexPaper PHP Publish Service RCE <= 2.3.6",
"fork": false,
"created_at": "2019-03-20T19:36:10Z",
"updated_at": "2020-05-27T12:15:17Z",
"pushed_at": "2019-03-20T20:56:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
}
]

25
2018/CVE-2018-11759.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 160896534,
"name": "Identificador-CVE-2018-11759",
"full_name": "Jul10l1r4\/Identificador-CVE-2018-11759",
"owner": {
"login": "Jul10l1r4",
"id": 32502168,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32502168?v=4",
"html_url": "https:\/\/github.com\/Jul10l1r4"
},
"html_url": "https:\/\/github.com\/Jul10l1r4\/Identificador-CVE-2018-11759",
"description": "This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer",
"fork": false,
"created_at": "2018-12-08T02:32:14Z",
"updated_at": "2020-07-27T00:22:55Z",
"pushed_at": "2019-01-21T20:03:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}
]

25
2018/CVE-2018-11761.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 167112093,
"name": "CVE-2018-11761",
"full_name": "brianwrf\/CVE-2018-11761",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11761",
"description": "Apache Tika Denial of Service Vulnerability (CVE-2018-11761)",
"fork": false,
"created_at": "2019-01-23T03:40:26Z",
"updated_at": "2020-03-29T03:51:16Z",
"pushed_at": "2019-01-23T03:44:46Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 8,
"score": 0
}
]

View file

@ -22,6 +22,29 @@
"watchers": 14,
"score": 0
},
{
"id": 164352202,
"name": "cve-2018-11776",
"full_name": "cved-sources\/cve-2018-11776",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-11776",
"description": "cve-2018-11776",
"fork": false,
"created_at": "2019-01-06T22:47:25Z",
"updated_at": "2019-09-12T19:52:44Z",
"pushed_at": "2019-02-01T21:29:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 193423029,
"name": "apche-struts-vuln-demo-cve-2018-11776",

25
2018/CVE-2018-11788.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 164298909,
"name": "CVE-2018-11788",
"full_name": "brianwrf\/CVE-2018-11788",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11788",
"description": "Apache Karaf XXE Vulnerability (CVE-2018-11788)",
"fork": false,
"created_at": "2019-01-06T11:01:39Z",
"updated_at": "2020-03-29T02:47:45Z",
"pushed_at": "2019-01-06T11:50:43Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 5,
"forks": 5,
"watchers": 36,
"score": 0
}
]

25
2018/CVE-2018-1235.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 181948503,
"name": "CVE-2018-1235",
"full_name": "AbsoZed\/CVE-2018-1235",
"owner": {
"login": "AbsoZed",
"id": 17788335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17788335?v=4",
"html_url": "https:\/\/github.com\/AbsoZed"
},
"html_url": "https:\/\/github.com\/AbsoZed\/CVE-2018-1235",
"description": "A python script that tests for an exploitable instance of CVE-2018-1235.",
"fork": false,
"created_at": "2019-04-17T18:37:00Z",
"updated_at": "2019-04-18T12:47:38Z",
"pushed_at": "2019-04-18T12:47:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 201420418,
"name": "cve-2018-12386",
"full_name": "Hydra3evil\/cve-2018-12386",
"owner": {
"login": "Hydra3evil",
"id": 53893501,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53893501?v=4",
"html_url": "https:\/\/github.com\/Hydra3evil"
},
"html_url": "https:\/\/github.com\/Hydra3evil\/cve-2018-12386",
"description": "CVE-2018-12386 - Firefox Sandboxed RCE Exploit for Linux (Firefox <v62.0.3)",
"fork": false,
"created_at": "2019-08-09T07:58:03Z",
"updated_at": "2020-04-11T17:00:30Z",
"pushed_at": "2019-05-08T18:00:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 254623660,
"name": "cve-2018-12386",

View file

@ -1,4 +1,27 @@
[
{
"id": 162062968,
"name": "CVE-2018-1270",
"full_name": "Venscor\/CVE-2018-1270",
"owner": {
"login": "Venscor",
"id": 13192497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13192497?v=4",
"html_url": "https:\/\/github.com\/Venscor"
},
"html_url": "https:\/\/github.com\/Venscor\/CVE-2018-1270",
"description": "CVE-2018-1270 表达式RCE环境",
"fork": false,
"created_at": "2018-12-17T02:22:53Z",
"updated_at": "2018-12-17T02:28:09Z",
"pushed_at": "2018-12-17T02:28:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 295839871,
"name": "owasp-formation-cve-2018-1270",

48
2018/CVE-2018-1273.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 166271014,
"name": "cve-2018-1273",
"full_name": "cved-sources\/cve-2018-1273",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-1273",
"description": "cve-2018-1273",
"fork": false,
"created_at": "2019-01-17T17:55:17Z",
"updated_at": "2019-02-01T21:30:32Z",
"pushed_at": "2019-02-01T21:30:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 183995263,
"name": "cve-2018-1273",
"full_name": "jas502n\/cve-2018-1273",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/cve-2018-1273",
"description": "Spring Data Commons RCE 远程命令执行漏洞",
"fork": false,
"created_at": "2019-04-29T03:43:15Z",
"updated_at": "2020-09-23T02:08:56Z",
"pushed_at": "2019-04-29T04:25:35Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 13,
"forks": 13,
"watchers": 51,
"score": 0
}
]

25
2018/CVE-2018-13257.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175997263,
"name": "CVE-2018-13257",
"full_name": "gluxon\/CVE-2018-13257",
"owner": {
"login": "gluxon",
"id": 906558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/906558?v=4",
"html_url": "https:\/\/github.com\/gluxon"
},
"html_url": "https:\/\/github.com\/gluxon\/CVE-2018-13257",
"description": null,
"fork": false,
"created_at": "2019-03-16T16:37:53Z",
"updated_at": "2020-03-25T21:03:44Z",
"pushed_at": "2019-03-16T16:38:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 176753685,
"name": "CVE-2018-1335-EXP-GUI",
"full_name": "SkyBlueEternal\/CVE-2018-1335-EXP-GUI",
"owner": {
"login": "SkyBlueEternal",
"id": 46418185,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46418185?v=4",
"html_url": "https:\/\/github.com\/SkyBlueEternal"
},
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CVE-2018-1335-EXP-GUI",
"description": "GUI版 EXP",
"fork": false,
"created_at": "2019-03-20T14:38:09Z",
"updated_at": "2021-01-11T09:47:34Z",
"pushed_at": "2019-03-20T14:50:05Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"watchers": 13,
"score": 0
},
{
"id": 239721705,
"name": "CVE-2018-1335-Python3",

25
2018/CVE-2018-13410.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171778059,
"name": "zip",
"full_name": "shinecome\/zip",
"owner": {
"login": "shinecome",
"id": 10205789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10205789?v=4",
"html_url": "https:\/\/github.com\/shinecome"
},
"html_url": "https:\/\/github.com\/shinecome\/zip",
"description": "patch to fix CVE-2018-13410 of zip-30",
"fork": false,
"created_at": "2019-02-21T01:29:00Z",
"updated_at": "2019-02-21T01:38:43Z",
"pushed_at": "2019-02-21T01:36:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 163386526,
"name": "CVE-2018-14442",
"full_name": "payatu\/CVE-2018-14442",
"owner": {
"login": "payatu",
"id": 16715624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16715624?v=4",
"html_url": "https:\/\/github.com\/payatu"
},
"html_url": "https:\/\/github.com\/payatu\/CVE-2018-14442",
"description": "PoC for Foxit Reader CVE-2018-14442",
"fork": false,
"created_at": "2018-12-28T08:29:28Z",
"updated_at": "2020-07-23T19:50:15Z",
"pushed_at": "2018-12-28T09:46:29Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 17,
"forks": 17,
"watchers": 55,
"score": 0
},
{
"id": 215229045,
"name": "PS-2018-002---CVE-2018-14442",

48
2018/CVE-2018-14665.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 155795794,
"name": "CVE-2018-14665",
"full_name": "bolonobolo\/CVE-2018-14665",
"owner": {
"login": "bolonobolo",
"id": 44464106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44464106?v=4",
"html_url": "https:\/\/github.com\/bolonobolo"
},
"html_url": "https:\/\/github.com\/bolonobolo\/CVE-2018-14665",
"description": null,
"fork": false,
"created_at": "2018-11-02T01:09:37Z",
"updated_at": "2019-03-22T10:12:21Z",
"pushed_at": "2019-03-22T10:12:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173618501,
"name": "cve-2018-14665",
"full_name": "samueldustin\/cve-2018-14665",
"owner": {
"login": "samueldustin",
"id": 46855517,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46855517?v=4",
"html_url": "https:\/\/github.com\/samueldustin"
},
"html_url": "https:\/\/github.com\/samueldustin\/cve-2018-14665",
"description": null,
"fork": false,
"created_at": "2019-03-03T19:12:56Z",
"updated_at": "2019-03-03T19:13:11Z",
"pushed_at": "2019-03-03T19:13:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -22,6 +22,29 @@
"watchers": 410,
"score": 0
},
{
"id": 178807607,
"name": "winboxPOC",
"full_name": "th3f3n1x87\/winboxPOC",
"owner": {
"login": "th3f3n1x87",
"id": 15888700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15888700?v=4",
"html_url": "https:\/\/github.com\/th3f3n1x87"
},
"html_url": "https:\/\/github.com\/th3f3n1x87\/winboxPOC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
"fork": false,
"created_at": "2019-04-01T07:20:23Z",
"updated_at": "2020-03-24T14:07:22Z",
"pushed_at": "2019-02-18T09:51:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 188679903,
"name": "mikrotik-beast",

View file

@ -45,6 +45,29 @@
"watchers": 435,
"score": 0
},
{
"id": 151394702,
"name": "cve-2018-15473",
"full_name": "epi052\/cve-2018-15473",
"owner": {
"login": "epi052",
"id": 43392618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43392618?v=4",
"html_url": "https:\/\/github.com\/epi052"
},
"html_url": "https:\/\/github.com\/epi052\/cve-2018-15473",
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2021-03-04T08:38:52Z",
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"forks": 5,
"watchers": 16,
"score": 0
},
{
"id": 152145946,
"name": "CVE-2018-15473_exploit",
@ -91,6 +114,52 @@
"watchers": 7,
"score": 0
},
{
"id": 165318682,
"name": "cve-2018-15473",
"full_name": "cved-sources\/cve-2018-15473",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-15473",
"description": "cve-2018-15473",
"fork": false,
"created_at": "2019-01-11T22:17:08Z",
"updated_at": "2019-02-01T21:35:54Z",
"pushed_at": "2019-02-01T21:35:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 167137381,
"name": "CVE-2018-15473-exp",
"full_name": "LINYIKAI\/CVE-2018-15473-exp",
"owner": {
"login": "LINYIKAI",
"id": 18764303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18764303?v=4",
"html_url": "https:\/\/github.com\/LINYIKAI"
},
"html_url": "https:\/\/github.com\/LINYIKAI\/CVE-2018-15473-exp",
"description": "This is a exp of CVE-2018-15473",
"fork": false,
"created_at": "2019-01-23T07:25:21Z",
"updated_at": "2019-09-06T06:03:44Z",
"pushed_at": "2019-01-23T07:30:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 183799054,
"name": "enumpossible",

25
2018/CVE-2018-15877.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 169778674,
"name": "cve-2018-15877",
"full_name": "cved-sources\/cve-2018-15877",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-15877",
"description": "cve-2018-15877",
"fork": false,
"created_at": "2019-02-08T18:15:37Z",
"updated_at": "2019-02-08T18:16:19Z",
"pushed_at": "2019-02-08T18:16:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-15961.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 166859165,
"name": "cve-2018-15961",
"full_name": "cved-sources\/cve-2018-15961",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-15961",
"description": "cve-2018-15961",
"fork": false,
"created_at": "2019-01-21T18:15:17Z",
"updated_at": "2019-01-21T18:15:36Z",
"pushed_at": "2019-01-21T18:15:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -22,6 +22,29 @@
"watchers": 14,
"score": 0
},
{
"id": 161118743,
"name": "CVE-2018-15982_EXP",
"full_name": "Ridter\/CVE-2018-15982_EXP",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter"
},
"html_url": "https:\/\/github.com\/Ridter\/CVE-2018-15982_EXP",
"description": "exp of CVE-2018-15982",
"fork": false,
"created_at": "2018-12-10T04:53:31Z",
"updated_at": "2021-01-13T19:57:16Z",
"pushed_at": "2019-01-04T09:29:01Z",
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 65,
"forks": 65,
"watchers": 180,
"score": 0
},
{
"id": 161362902,
"name": "adobe-flash-cve2018-15982",
@ -68,6 +91,29 @@
"watchers": 25,
"score": 0
},
{
"id": 162516879,
"name": "CVE-2018-15982",
"full_name": "SyFi\/CVE-2018-15982",
"owner": {
"login": "SyFi",
"id": 26314806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4",
"html_url": "https:\/\/github.com\/SyFi"
},
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-15982",
"description": "Flash 2018-15982 UAF ",
"fork": false,
"created_at": "2018-12-20T02:40:22Z",
"updated_at": "2020-02-13T14:33:56Z",
"pushed_at": "2018-12-20T11:14:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 219955315,
"name": "CVE-2018-15982",

25
2018/CVE-2018-16119.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 153753890,
"name": "CVE-2018-16119",
"full_name": "hdbreaker\/CVE-2018-16119",
"owner": {
"login": "hdbreaker",
"id": 5799585,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5799585?v=4",
"html_url": "https:\/\/github.com\/hdbreaker"
},
"html_url": "https:\/\/github.com\/hdbreaker\/CVE-2018-16119",
"description": "TP-Link TL-WR1043ND - Authenticated Remote Code Execution",
"fork": false,
"created_at": "2018-10-19T08:50:52Z",
"updated_at": "2021-01-27T09:25:57Z",
"pushed_at": "2019-04-29T15:26:28Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 2,
"forks": 2,
"watchers": 12,
"score": 0
}
]

25
2018/CVE-2018-16283.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175869476,
"name": "cve-2018-16283",
"full_name": "cved-sources\/cve-2018-16283",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-16283",
"description": "cve-2018-16283",
"fork": false,
"created_at": "2019-03-15T18:07:13Z",
"updated_at": "2019-03-15T18:08:12Z",
"pushed_at": "2019-03-15T18:08:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-16323.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158098266,
"name": "XBadManners",
"full_name": "ttffdd\/XBadManners",
"owner": {
"login": "ttffdd",
"id": 5412272,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5412272?v=4",
"html_url": "https:\/\/github.com\/ttffdd"
},
"html_url": "https:\/\/github.com\/ttffdd\/XBadManners",
"description": "Tool for CVE-2018-16323",
"fork": false,
"created_at": "2018-11-18T15:30:46Z",
"updated_at": "2021-02-23T11:06:19Z",
"pushed_at": "2019-01-17T21:01:56Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 9,
"forks": 9,
"watchers": 77,
"score": 0
}
]

View file

@ -22,6 +22,52 @@
"watchers": 20,
"score": 0
},
{
"id": 157982249,
"name": "CVE-2018-16509",
"full_name": "knqyf263\/CVE-2018-16509",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-16509",
"description": "CVE-2018-16509 (Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities)",
"fork": false,
"created_at": "2018-11-17T12:26:38Z",
"updated_at": "2020-05-07T13:31:56Z",
"pushed_at": "2019-02-01T05:14:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 165319040,
"name": "cve-2018-16509",
"full_name": "cved-sources\/cve-2018-16509",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-16509",
"description": "cve-2018-16509",
"fork": false,
"created_at": "2019-01-11T22:19:46Z",
"updated_at": "2019-01-11T22:20:11Z",
"pushed_at": "2019-01-11T22:20:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 200477390,
"name": "CVE-2018-16509",

25
2018/CVE-2018-16706.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 179937571,
"name": "CVE-2018-16706",
"full_name": "Nurdilin\/CVE-2018-16706",
"owner": {
"login": "Nurdilin",
"id": 17847627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17847627?v=4",
"html_url": "https:\/\/github.com\/Nurdilin"
},
"html_url": "https:\/\/github.com\/Nurdilin\/CVE-2018-16706",
"description": "Or how I turn off my TV via a cronjob",
"fork": false,
"created_at": "2019-04-07T08:30:12Z",
"updated_at": "2019-04-07T09:14:50Z",
"pushed_at": "2019-04-07T09:14:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 181296970,
"name": "libreofficeExploit1",
"full_name": "4nimanegra\/libreofficeExploit1",
"owner": {
"login": "4nimanegra",
"id": 18334322,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18334322?v=4",
"html_url": "https:\/\/github.com\/4nimanegra"
},
"html_url": "https:\/\/github.com\/4nimanegra\/libreofficeExploit1",
"description": "CVE-2018-16858 exploit implementation",
"fork": false,
"created_at": "2019-04-14T11:10:18Z",
"updated_at": "2019-04-19T14:43:20Z",
"pushed_at": "2019-04-14T19:20:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 220178785,
"name": "detect-cve-2018-16858",

25
2018/CVE-2018-16890.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 176428672,
"name": "CVE-2018-16890",
"full_name": "zjw88282740\/CVE-2018-16890",
"owner": {
"login": "zjw88282740",
"id": 10476132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10476132?v=4",
"html_url": "https:\/\/github.com\/zjw88282740"
},
"html_url": "https:\/\/github.com\/zjw88282740\/CVE-2018-16890",
"description": "CVE-2018-16890",
"fork": false,
"created_at": "2019-03-19T05:10:48Z",
"updated_at": "2019-03-19T05:26:25Z",
"pushed_at": "2019-03-19T05:22:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-17207.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 168757000,
"name": "cve-2018-17207",
"full_name": "cved-sources\/cve-2018-17207",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-17207",
"description": "cve-2018-17207",
"fork": false,
"created_at": "2019-02-01T20:36:08Z",
"updated_at": "2019-02-01T20:46:34Z",
"pushed_at": "2019-02-01T20:46:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-18500.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 181987935,
"name": "CVE-2018-18500",
"full_name": "sophoslabs\/CVE-2018-18500",
"owner": {
"login": "sophoslabs",
"id": 40878494,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40878494?v=4",
"html_url": "https:\/\/github.com\/sophoslabs"
},
"html_url": "https:\/\/github.com\/sophoslabs\/CVE-2018-18500",
"description": "PoC for CVE-2018-18500 - Firefox Use-After-Free",
"fork": false,
"created_at": "2019-04-18T00:26:10Z",
"updated_at": "2021-02-20T09:48:23Z",
"pushed_at": "2019-04-18T20:32:46Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 15,
"forks": 15,
"watchers": 55,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 167646347,
"name": "CVE-2018-18852",
"full_name": "hook-s3c\/CVE-2018-18852",
"owner": {
"login": "hook-s3c",
"id": 31825993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
"html_url": "https:\/\/github.com\/hook-s3c"
},
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-18852",
"description": "CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.",
"fork": false,
"created_at": "2019-01-26T03:41:24Z",
"updated_at": "2021-02-07T12:15:05Z",
"pushed_at": "2019-01-26T03:49:09Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 15,
"forks": 15,
"watchers": 42,
"score": 0
},
{
"id": 197655822,
"name": "CVE-2018-18852",

25
2018/CVE-2018-19207.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175869819,
"name": "cve-2018-19207",
"full_name": "cved-sources\/cve-2018-19207",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-19207",
"description": "cve-2018-19207",
"fork": false,
"created_at": "2019-03-15T18:09:58Z",
"updated_at": "2019-03-15T18:10:33Z",
"pushed_at": "2019-03-15T18:10:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-19276.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175086551,
"name": "CVE-2018-19276",
"full_name": "mpgn\/CVE-2018-19276",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2018-19276",
"description": "CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE",
"fork": false,
"created_at": "2019-03-11T21:28:55Z",
"updated_at": "2020-04-05T17:19:09Z",
"pushed_at": "2019-03-11T21:35:31Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 9,
"forks": 9,
"watchers": 16,
"score": 0
}
]

25
2018/CVE-2018-19487.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 160362808,
"name": "wp-jobhunt-exploit",
"full_name": "Antho59\/wp-jobhunt-exploit",
"owner": {
"login": "Antho59",
"id": 11887598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11887598?v=4",
"html_url": "https:\/\/github.com\/Antho59"
},
"html_url": "https:\/\/github.com\/Antho59\/wp-jobhunt-exploit",
"description": "CVE-2018-19487, CVE-2018-19488, exploit for WordPress wp-jobhunt plugin",
"fork": false,
"created_at": "2018-12-04T13:36:13Z",
"updated_at": "2020-03-29T04:25:25Z",
"pushed_at": "2019-03-29T09:15:08Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 9,
"forks": 9,
"watchers": 7,
"score": 0
}
]

25
2018/CVE-2018-19518.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 163683497,
"name": "CVE-2018-19518",
"full_name": "ensimag-security\/CVE-2018-19518",
"owner": {
"login": "ensimag-security",
"id": 44459067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44459067?v=4",
"html_url": "https:\/\/github.com\/ensimag-security"
},
"html_url": "https:\/\/github.com\/ensimag-security\/CVE-2018-19518",
"description": "some works on CVE-2018-19518 ",
"fork": false,
"created_at": "2018-12-31T16:36:49Z",
"updated_at": "2020-09-10T01:55:49Z",
"pushed_at": "2019-01-14T09:48:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

48
2018/CVE-2018-19788.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 162179568,
"name": "PoC",
"full_name": "Ekultek\/PoC",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/PoC",
"description": "Leveraging CVE-2018-19788 without root shells",
"fork": false,
"created_at": "2018-12-17T19:26:22Z",
"updated_at": "2020-11-10T06:38:31Z",
"pushed_at": "2018-12-18T19:11:25Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 3,
"forks": 3,
"watchers": 16,
"score": 0
},
{
"id": 163684618,
"name": "CVE-2018-19788",
"full_name": "jhlongjr\/CVE-2018-19788",
"owner": {
"login": "jhlongjr",
"id": 39674727,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39674727?v=4",
"html_url": "https:\/\/github.com\/jhlongjr"
},
"html_url": "https:\/\/github.com\/jhlongjr\/CVE-2018-19788",
"description": "Exploiting The CVE-2018-19788 PolicyKit Bug",
"fork": false,
"created_at": "2018-12-31T16:54:58Z",
"updated_at": "2020-08-27T02:29:39Z",
"pushed_at": "2018-12-31T17:12:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -22,6 +22,29 @@
"watchers": 51,
"score": 0
},
{
"id": 172198653,
"name": "CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"full_name": "0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"owner": {
"login": "0xtavian",
"id": 21030907,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21030907?v=4",
"html_url": "https:\/\/github.com\/0xtavian"
},
"html_url": "https:\/\/github.com\/0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
"fork": false,
"created_at": "2019-02-23T10:00:03Z",
"updated_at": "2020-04-20T00:16:50Z",
"pushed_at": "2019-02-23T10:01:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 207471889,
"name": "CVE-2018-1999002",

25
2018/CVE-2018-20062.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 176056254,
"name": "thinkphp5.XRce",
"full_name": "NS-Sp4ce\/thinkphp5.XRce",
"owner": {
"login": "NS-Sp4ce",
"id": 33349032,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4",
"html_url": "https:\/\/github.com\/NS-Sp4ce"
},
"html_url": "https:\/\/github.com\/NS-Sp4ce\/thinkphp5.XRce",
"description": "thinkphp5.*Rce CVE-2018-20062",
"fork": false,
"created_at": "2019-03-17T04:31:13Z",
"updated_at": "2020-07-19T13:09:58Z",
"pushed_at": "2019-03-17T04:50:49Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

25
2018/CVE-2018-20162.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 170612541,
"name": "CVE-2018-20162-digi-lr54-restricted-shell-escape",
"full_name": "stigtsp\/CVE-2018-20162-digi-lr54-restricted-shell-escape",
"owner": {
"login": "stigtsp",
"id": 75371,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75371?v=4",
"html_url": "https:\/\/github.com\/stigtsp"
},
"html_url": "https:\/\/github.com\/stigtsp\/CVE-2018-20162-digi-lr54-restricted-shell-escape",
"description": null,
"fork": false,
"created_at": "2019-02-14T02:20:13Z",
"updated_at": "2019-02-17T14:14:20Z",
"pushed_at": "2019-02-17T13:56:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-20165.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 167376412,
"name": "Reflected-XSS-on-Opentext-Portal-v7.4.4",
"full_name": "hect0rS\/Reflected-XSS-on-Opentext-Portal-v7.4.4",
"owner": {
"login": "hect0rS",
"id": 47000097,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47000097?v=4",
"html_url": "https:\/\/github.com\/hect0rS"
},
"html_url": "https:\/\/github.com\/hect0rS\/Reflected-XSS-on-Opentext-Portal-v7.4.4",
"description": "Reflected XSS on Opentext Portal v7.4.4: CVE-2018-20165",
"fork": false,
"created_at": "2019-01-24T13:59:14Z",
"updated_at": "2019-01-24T14:17:24Z",
"pushed_at": "2019-01-24T14:17:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -22,6 +22,305 @@
"watchers": 431,
"score": 0
},
{
"id": 172009558,
"name": "CVE-2018-20250",
"full_name": "QAX-A-Team\/CVE-2018-20250",
"owner": {
"login": "QAX-A-Team",
"id": 35417332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35417332?v=4",
"html_url": "https:\/\/github.com\/QAX-A-Team"
},
"html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250",
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
"fork": false,
"created_at": "2019-02-22T06:47:01Z",
"updated_at": "2020-10-01T19:49:19Z",
"pushed_at": "2019-02-22T07:47:26Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 12,
"forks": 12,
"watchers": 25,
"score": 0
},
{
"id": 172069488,
"name": "CVE-2018-20250-poc-winrar",
"full_name": "nmweizi\/CVE-2018-20250-poc-winrar",
"owner": {
"login": "nmweizi",
"id": 1232444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1232444?v=4",
"html_url": "https:\/\/github.com\/nmweizi"
},
"html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar",
"description": null,
"fork": false,
"created_at": "2019-02-22T13:18:14Z",
"updated_at": "2019-02-22T13:20:31Z",
"pushed_at": "2019-02-22T13:20:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 172078598,
"name": "UNACEV2.DLL-CVE-2018-20250",
"full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250",
"owner": {
"login": "blunden",
"id": 249915,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/249915?v=4",
"html_url": "https:\/\/github.com\/blunden"
},
"html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250",
"description": "A version of the binary patched to address CVE-2018-20250",
"fork": false,
"created_at": "2019-02-22T14:19:20Z",
"updated_at": "2019-02-22T14:29:30Z",
"pushed_at": "2019-02-22T14:29:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 172156568,
"name": "CVE-2018-20250-WinRAR-ACE",
"full_name": "easis\/CVE-2018-20250-WinRAR-ACE",
"owner": {
"login": "easis",
"id": 50383201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50383201?v=4",
"html_url": "https:\/\/github.com\/easis"
},
"html_url": "https:\/\/github.com\/easis\/CVE-2018-20250-WinRAR-ACE",
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
"fork": false,
"created_at": "2019-02-23T01:20:34Z",
"updated_at": "2021-02-15T07:34:22Z",
"pushed_at": "2019-03-01T13:35:59Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 17,
"forks": 17,
"watchers": 19,
"score": 0
},
{
"id": 173153306,
"name": "CVE-2018-20250",
"full_name": "STP5940\/CVE-2018-20250",
"owner": {
"login": "STP5940",
"id": 21144303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21144303?v=4",
"html_url": "https:\/\/github.com\/STP5940"
},
"html_url": "https:\/\/github.com\/STP5940\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-02-28T17:07:52Z",
"updated_at": "2019-10-30T09:58:35Z",
"pushed_at": "2019-02-28T17:10:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 6,
"forks": 6,
"watchers": 2,
"score": 0
},
{
"id": 173733018,
"name": "WinAce-POC",
"full_name": "n4r1b\/WinAce-POC",
"owner": {
"login": "n4r1b",
"id": 7025964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7025964?v=4",
"html_url": "https:\/\/github.com\/n4r1b"
},
"html_url": "https:\/\/github.com\/n4r1b\/WinAce-POC",
"description": "Simple POC to leverage CVE-2018-20250 from inside an EXE",
"fork": false,
"created_at": "2019-03-04T11:34:17Z",
"updated_at": "2019-03-04T14:32:05Z",
"pushed_at": "2019-03-04T14:42:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173733367,
"name": "hack-winrar",
"full_name": "technicaldada\/hack-winrar",
"owner": {
"login": "technicaldada",
"id": 32122182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32122182?v=4",
"html_url": "https:\/\/github.com\/technicaldada"
},
"html_url": "https:\/\/github.com\/technicaldada\/hack-winrar",
"description": "WinRar is a very widely known software for windows. Previous version of WinRaR was a vulnerability which has been patched in Feb-2019. Most of the people didn't update winrar so they are vulnerable in this Absolute Path Traversal bug [CVE-2018-20250]",
"fork": false,
"created_at": "2019-03-04T11:36:43Z",
"updated_at": "2019-03-25T16:54:05Z",
"pushed_at": "2019-03-04T11:39:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173947919,
"name": "ezwinrar",
"full_name": "Ektoplasma\/ezwinrar",
"owner": {
"login": "Ektoplasma",
"id": 15208659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15208659?v=4",
"html_url": "https:\/\/github.com\/Ektoplasma"
},
"html_url": "https:\/\/github.com\/Ektoplasma\/ezwinrar",
"description": "Python tool exploiting CVE-2018-20250 found by CheckPoint folks",
"fork": false,
"created_at": "2019-03-05T13:05:03Z",
"updated_at": "2019-10-19T08:36:59Z",
"pushed_at": "2019-03-05T15:51:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 174533873,
"name": "CVE-2018-20250-WINRAR-ACE-GUI",
"full_name": "arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
"owner": {
"login": "arkangel-dev",
"id": 31138457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31138457?v=4",
"html_url": "https:\/\/github.com\/arkangel-dev"
},
"html_url": "https:\/\/github.com\/arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
"description": "CVE-2018-20250-WINRAR-ACE Exploit with a UI",
"fork": false,
"created_at": "2019-03-08T12:27:12Z",
"updated_at": "2020-06-06T06:38:59Z",
"pushed_at": "2019-05-10T05:37:10Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"forks": 3,
"watchers": 10,
"score": 0
},
{
"id": 174948316,
"name": "CVE-2018-20250",
"full_name": "AeolusTF\/CVE-2018-20250",
"owner": {
"login": "AeolusTF",
"id": 29159416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29159416?v=4",
"html_url": "https:\/\/github.com\/AeolusTF"
},
"html_url": "https:\/\/github.com\/AeolusTF\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-03-11T07:33:45Z",
"updated_at": "2019-03-11T07:37:51Z",
"pushed_at": "2019-03-11T07:37:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 176534636,
"name": "Detect-CVE-2018-20250",
"full_name": "joydragon\/Detect-CVE-2018-20250",
"owner": {
"login": "joydragon",
"id": 4154219,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4154219?v=4",
"html_url": "https:\/\/github.com\/joydragon"
},
"html_url": "https:\/\/github.com\/joydragon\/Detect-CVE-2018-20250",
"description": "Herramienta para revisar si es que un payload tiene componente malicioso de acuerdo a CVE-2018-20250",
"fork": false,
"created_at": "2019-03-19T14:51:52Z",
"updated_at": "2019-03-19T15:03:27Z",
"pushed_at": "2019-03-19T15:03:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 177513614,
"name": "WinRar_ACE_exploit_CVE-2018-20250",
"full_name": "DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250",
"owner": {
"login": "DANIELVISPOBLOG",
"id": 26053534,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26053534?v=4",
"html_url": "https:\/\/github.com\/DANIELVISPOBLOG"
},
"html_url": "https:\/\/github.com\/DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250",
"description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250",
"fork": false,
"created_at": "2019-03-25T04:22:14Z",
"updated_at": "2020-11-16T03:30:09Z",
"pushed_at": "2019-03-26T04:54:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 183341455,
"name": "CVE-2018-20250",
"full_name": "likescam\/CVE-2018-20250",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-04-25T02:30:50Z",
"updated_at": "2019-04-25T02:31:01Z",
"pushed_at": "2019-04-25T02:30:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 241136874,
"name": "CVE-2018-20250-WinRAR",

25
2018/CVE-2018-20343.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 163399664,
"name": "CVE-2018-20343",
"full_name": "Alexandre-Bartel\/CVE-2018-20343",
"owner": {
"login": "Alexandre-Bartel",
"id": 655248,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/655248?v=4",
"html_url": "https:\/\/github.com\/Alexandre-Bartel"
},
"html_url": "https:\/\/github.com\/Alexandre-Bartel\/CVE-2018-20343",
"description": "PoC for CVE-2018-20343",
"fork": false,
"created_at": "2018-12-28T10:49:51Z",
"updated_at": "2020-12-09T18:02:09Z",
"pushed_at": "2019-02-08T15:55:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

25
2018/CVE-2018-20434.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 183417425,
"name": "CVE-2018-20434",
"full_name": "mhaskar\/CVE-2018-20434",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2018-20434",
"description": "The official exploit code for LibreNMS v1.46 Remote Code Execution CVE-2018-20434",
"fork": false,
"created_at": "2019-04-25T11:06:48Z",
"updated_at": "2020-05-08T13:26:18Z",
"pushed_at": "2019-04-25T11:07:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -22,6 +22,29 @@
"watchers": 79,
"score": 0
},
{
"id": 164424976,
"name": "CVE-2018-2628",
"full_name": "0xMJ\/CVE-2018-2628",
"owner": {
"login": "0xMJ",
"id": 31585175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31585175?v=4",
"html_url": "https:\/\/github.com\/0xMJ"
},
"html_url": "https:\/\/github.com\/0xMJ\/CVE-2018-2628",
"description": "漏洞利用工具",
"fork": false,
"created_at": "2019-01-07T11:47:59Z",
"updated_at": "2020-04-04T06:55:15Z",
"pushed_at": "2019-01-07T12:13:37Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"forks": 7,
"watchers": 8,
"score": 0
},
{
"id": 233997916,
"name": "weblogicScanner",
@ -36,13 +59,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-06T03:02:33Z",
"updated_at": "2021-03-07T19:37:23Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 940,
"watchers_count": 940,
"stargazers_count": 941,
"watchers_count": 941,
"forks_count": 220,
"forks": 220,
"watchers": 940,
"watchers": 941,
"score": 0
},
{

View file

@ -1,4 +1,27 @@
[
{
"id": 142787515,
"name": "oracle-oam-authentication-bypas-exploit",
"full_name": "AymanElSherif\/oracle-oam-authentication-bypas-exploit",
"owner": {
"login": "AymanElSherif",
"id": 41875662,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41875662?v=4",
"html_url": "https:\/\/github.com\/AymanElSherif"
},
"html_url": "https:\/\/github.com\/AymanElSherif\/oracle-oam-authentication-bypas-exploit",
"description": "Exploit for Oracle Access Manager padding oracle vulnerability (CVE-2018-2879)",
"fork": false,
"created_at": "2018-07-29T18:56:25Z",
"updated_at": "2021-02-26T01:10:09Z",
"pushed_at": "2019-03-04T12:29:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"score": 0
},
{
"id": 181337856,
"name": "OAMBuster",

View file

@ -1,4 +1,27 @@
[
{
"id": 170207286,
"name": "e1000_vulnerability_exploit",
"full_name": "ndureiss\/e1000_vulnerability_exploit",
"owner": {
"login": "ndureiss",
"id": 38342872,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38342872?v=4",
"html_url": "https:\/\/github.com\/ndureiss"
},
"html_url": "https:\/\/github.com\/ndureiss\/e1000_vulnerability_exploit",
"description": "Exploitation of VirtualBox vulnerability (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-3295)",
"fork": false,
"created_at": "2019-02-11T21:44:47Z",
"updated_at": "2019-04-28T14:26:42Z",
"pushed_at": "2019-03-06T14:12:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 307046811,
"name": "cve-2018-3295",

View file

@ -1,4 +1,27 @@
[
{
"id": 186128549,
"name": "CVE-2018-3639",
"full_name": "mmxsrup\/CVE-2018-3639",
"owner": {
"login": "mmxsrup",
"id": 19609323,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19609323?v=4",
"html_url": "https:\/\/github.com\/mmxsrup"
},
"html_url": "https:\/\/github.com\/mmxsrup\/CVE-2018-3639",
"description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
"fork": false,
"created_at": "2019-05-11T12:11:05Z",
"updated_at": "2020-07-10T08:10:11Z",
"pushed_at": "2019-05-13T22:21:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 193920426,
"name": "CVE-2018-3639-specter-v4-",

25
2018/CVE-2018-3810.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 168879431,
"name": "cve-2018-3810",
"full_name": "cved-sources\/cve-2018-3810",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-3810",
"description": "cve-2018-3810",
"fork": false,
"created_at": "2019-02-02T21:19:32Z",
"updated_at": "2019-02-02T21:19:57Z",
"pushed_at": "2019-02-02T21:19:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-3811.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 168879761,
"name": "cve-2018-3811",
"full_name": "cved-sources\/cve-2018-3811",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-3811",
"description": "cve-2018-3811",
"fork": false,
"created_at": "2019-02-02T21:22:49Z",
"updated_at": "2019-02-02T21:23:13Z",
"pushed_at": "2019-02-02T21:23:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-4087.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 122336305,
"name": "bluetoothdPoC",
"full_name": "rani-i\/bluetoothdPoC",
"owner": {
"login": "rani-i",
"id": 25133607,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25133607?v=4",
"html_url": "https:\/\/github.com\/rani-i"
},
"html_url": "https:\/\/github.com\/rani-i\/bluetoothdPoC",
"description": "CVE-2018-4087 PoC",
"fork": false,
"created_at": "2018-02-21T12:55:37Z",
"updated_at": "2020-07-22T14:19:39Z",
"pushed_at": "2019-02-18T14:43:08Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 22,
"forks": 22,
"watchers": 56,
"score": 0
}
]

25
2018/CVE-2018-4124.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 179321381,
"name": "TELUGU_CVE-2018-4124_POC",
"full_name": "ZecOps\/TELUGU_CVE-2018-4124_POC",
"owner": {
"login": "ZecOps",
"id": 31035096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31035096?v=4",
"html_url": "https:\/\/github.com\/ZecOps"
},
"html_url": "https:\/\/github.com\/ZecOps\/TELUGU_CVE-2018-4124_POC",
"description": null,
"fork": false,
"created_at": "2019-04-03T15:44:43Z",
"updated_at": "2020-03-30T07:21:35Z",
"pushed_at": "2019-04-03T15:46:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
}
]

25
2018/CVE-2018-4193.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 170509373,
"name": "CVE-2018-4193",
"full_name": "Synacktiv-contrib\/CVE-2018-4193",
"owner": {
"login": "Synacktiv-contrib",
"id": 28860793,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28860793?v=4",
"html_url": "https:\/\/github.com\/Synacktiv-contrib"
},
"html_url": "https:\/\/github.com\/Synacktiv-contrib\/CVE-2018-4193",
"description": "exploit for CVE-2018-4193",
"fork": false,
"created_at": "2019-02-13T13:06:11Z",
"updated_at": "2020-09-11T07:58:23Z",
"pushed_at": "2019-02-13T13:07:25Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 21,
"forks": 21,
"watchers": 69,
"score": 0
}
]

View file

@ -1,4 +1,96 @@
[
{
"id": 155837722,
"name": "CVE-2018-4407",
"full_name": "WyAtu\/CVE-2018-4407",
"owner": {
"login": "WyAtu",
"id": 23521935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23521935?v=4",
"html_url": "https:\/\/github.com\/WyAtu"
},
"html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-4407",
"description": "CVE-2018-4407 IOS\/macOS kernel crash",
"fork": false,
"created_at": "2018-11-02T08:40:33Z",
"updated_at": "2020-03-23T03:48:34Z",
"pushed_at": "2019-02-23T07:41:06Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 9,
"forks": 9,
"watchers": 13,
"score": 0
},
{
"id": 156611823,
"name": "Apple-Remote-Crash-Tool-CVE-2018-4407",
"full_name": "anonymouz4\/Apple-Remote-Crash-Tool-CVE-2018-4407",
"owner": {
"login": "anonymouz4",
"id": 32394757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32394757?v=4",
"html_url": "https:\/\/github.com\/anonymouz4"
},
"html_url": "https:\/\/github.com\/anonymouz4\/Apple-Remote-Crash-Tool-CVE-2018-4407",
"description": "Crashes any macOS High Sierra or iOS 11 device that is on the same WiFi network",
"fork": false,
"created_at": "2018-11-07T21:41:39Z",
"updated_at": "2019-12-10T23:32:18Z",
"pushed_at": "2019-01-17T18:55:25Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 163652093,
"name": "CVE-2018-4407-iOS-exploit",
"full_name": "zeng9t\/CVE-2018-4407-iOS-exploit",
"owner": {
"login": "zeng9t",
"id": 10195620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10195620?v=4",
"html_url": "https:\/\/github.com\/zeng9t"
},
"html_url": "https:\/\/github.com\/zeng9t\/CVE-2018-4407-iOS-exploit",
"description": "CVE-2018-4407,iOS exploit",
"fork": false,
"created_at": "2018-12-31T08:24:06Z",
"updated_at": "2019-12-06T03:03:03Z",
"pushed_at": "2018-12-31T08:48:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 183878561,
"name": "CVE-2018-4407",
"full_name": "5431\/CVE-2018-4407",
"owner": {
"login": "5431",
"id": 28725174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28725174?v=4",
"html_url": "https:\/\/github.com\/5431"
},
"html_url": "https:\/\/github.com\/5431\/CVE-2018-4407",
"description": "ios 缓冲区溢出exp",
"fork": false,
"created_at": "2019-04-28T08:19:48Z",
"updated_at": "2019-04-28T08:21:21Z",
"pushed_at": "2019-04-28T08:21:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 221190337,
"name": "iOS-Kernel-Crash",

25
2018/CVE-2018-4411.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 180542343,
"name": "POC-CVE-2018-4411",
"full_name": "lilang-wu\/POC-CVE-2018-4411",
"owner": {
"login": "lilang-wu",
"id": 16700065,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16700065?v=4",
"html_url": "https:\/\/github.com\/lilang-wu"
},
"html_url": "https:\/\/github.com\/lilang-wu\/POC-CVE-2018-4411",
"description": null,
"fork": false,
"created_at": "2019-04-10T08:55:55Z",
"updated_at": "2019-04-10T08:58:17Z",
"pushed_at": "2019-04-10T08:58:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-4431.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 163434196,
"name": "PoC_iOS12",
"full_name": "ktiOSz\/PoC_iOS12",
"owner": {
"login": "ktiOSz",
"id": 37155945,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37155945?v=4",
"html_url": "https:\/\/github.com\/ktiOSz"
},
"html_url": "https:\/\/github.com\/ktiOSz\/PoC_iOS12",
"description": "PoC Exploit iOS 12 to iOS 12.1 (CVE-2018-4431)",
"fork": false,
"created_at": "2018-12-28T17:26:35Z",
"updated_at": "2019-03-17T10:28:32Z",
"pushed_at": "2018-12-28T17:31:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
}
]

25
2018/CVE-2018-4441.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 174585423,
"name": "PS4-6.20-WebKit-Code-Execution-Exploit",
"full_name": "Cryptogenic\/PS4-6.20-WebKit-Code-Execution-Exploit",
"owner": {
"login": "Cryptogenic",
"id": 9409828,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9409828?v=4",
"html_url": "https:\/\/github.com\/Cryptogenic"
},
"html_url": "https:\/\/github.com\/Cryptogenic\/PS4-6.20-WebKit-Code-Execution-Exploit",
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2021-02-15T05:44:20Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 55,
"forks": 55,
"watchers": 199,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 162440583,
"name": "CVE-2018-4878",
"full_name": "Yable\/CVE-2018-4878",
"owner": {
"login": "Yable",
"id": 33931550,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33931550?v=4",
"html_url": "https:\/\/github.com\/Yable"
},
"html_url": "https:\/\/github.com\/Yable\/CVE-2018-4878",
"description": null,
"fork": false,
"created_at": "2018-12-19T13:22:03Z",
"updated_at": "2018-12-20T08:11:04Z",
"pushed_at": "2018-12-20T08:11:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 197427494,
"name": "SoftwareSystemSecurity-2019",

View file

@ -1,4 +1,27 @@
[
{
"id": 123245165,
"name": "PoC---CVE-2018-6389",
"full_name": "alessiogilardi\/PoC---CVE-2018-6389",
"owner": {
"login": "alessiogilardi",
"id": 36900296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36900296?v=4",
"html_url": "https:\/\/github.com\/alessiogilardi"
},
"html_url": "https:\/\/github.com\/alessiogilardi\/PoC---CVE-2018-6389",
"description": null,
"fork": false,
"created_at": "2018-02-28T07:14:54Z",
"updated_at": "2019-03-09T17:58:52Z",
"pushed_at": "2019-03-04T21:30:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 123796262,
"name": "Shiva",
@ -22,6 +45,29 @@
"watchers": 82,
"score": 0
},
{
"id": 164352797,
"name": "tvsz",
"full_name": "fakedob\/tvsz",
"owner": {
"login": "fakedob",
"id": 8687970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8687970?v=4",
"html_url": "https:\/\/github.com\/fakedob"
},
"html_url": "https:\/\/github.com\/fakedob\/tvsz",
"description": "CVE-2018-6389 PoC node js multisite with proxy",
"fork": false,
"created_at": "2019-01-06T22:57:48Z",
"updated_at": "2019-07-08T20:41:54Z",
"pushed_at": "2019-01-06T23:37:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 220969745,
"name": "Wordpress-DOS-Attack-CVE-2018-6389",

View file

@ -1,4 +1,211 @@
[
{
"id": 162044535,
"name": "CVE-2018-6574-POC",
"full_name": "20matan\/CVE-2018-6574-POC",
"owner": {
"login": "20matan",
"id": 10909504,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10909504?v=4",
"html_url": "https:\/\/github.com\/20matan"
},
"html_url": "https:\/\/github.com\/20matan\/CVE-2018-6574-POC",
"description": null,
"fork": false,
"created_at": "2018-12-16T21:55:27Z",
"updated_at": "2018-12-16T22:02:50Z",
"pushed_at": "2018-12-16T22:02:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 163056409,
"name": "Zur-Go-GET-RCE-Solution",
"full_name": "zur250\/Zur-Go-GET-RCE-Solution",
"owner": {
"login": "zur250",
"id": 14151749,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14151749?v=4",
"html_url": "https:\/\/github.com\/zur250"
},
"html_url": "https:\/\/github.com\/zur250\/Zur-Go-GET-RCE-Solution",
"description": "CVE-2018-6574",
"fork": false,
"created_at": "2018-12-25T07:08:55Z",
"updated_at": "2018-12-25T07:48:09Z",
"pushed_at": "2020-05-05T05:28:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 163621881,
"name": "cve-2018-6574",
"full_name": "mekhalleh\/cve-2018-6574",
"owner": {
"login": "mekhalleh",
"id": 5225129,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5225129?v=4",
"html_url": "https:\/\/github.com\/mekhalleh"
},
"html_url": "https:\/\/github.com\/mekhalleh\/cve-2018-6574",
"description": null,
"fork": false,
"created_at": "2018-12-30T22:30:01Z",
"updated_at": "2020-04-05T04:23:35Z",
"pushed_at": "2019-04-29T13:24:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 165045501,
"name": "go-get-rce",
"full_name": "veter069\/go-get-rce",
"owner": {
"login": "veter069",
"id": 4894034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4894034?v=4",
"html_url": "https:\/\/github.com\/veter069"
},
"html_url": "https:\/\/github.com\/veter069\/go-get-rce",
"description": "CVE-2018-6574",
"fork": false,
"created_at": "2019-01-10T11:09:06Z",
"updated_at": "2019-01-11T05:02:16Z",
"pushed_at": "2019-01-11T05:02:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 166348598,
"name": "CVE-2018-6574-POC",
"full_name": "duckzsc2\/CVE-2018-6574-POC",
"owner": {
"login": "duckzsc2",
"id": 6966941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6966941?v=4",
"html_url": "https:\/\/github.com\/duckzsc2"
},
"html_url": "https:\/\/github.com\/duckzsc2\/CVE-2018-6574-POC",
"description": null,
"fork": false,
"created_at": "2019-01-18T05:22:25Z",
"updated_at": "2019-01-21T00:16:50Z",
"pushed_at": "2019-01-21T00:16:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173063738,
"name": "CVE-2018-6574",
"full_name": "ivnnn1\/CVE-2018-6574",
"owner": {
"login": "ivnnn1",
"id": 48083150,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48083150?v=4",
"html_url": "https:\/\/github.com\/ivnnn1"
},
"html_url": "https:\/\/github.com\/ivnnn1\/CVE-2018-6574",
"description": null,
"fork": false,
"created_at": "2019-02-28T07:31:17Z",
"updated_at": "2019-02-28T07:34:17Z",
"pushed_at": "2019-02-28T07:34:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 176511633,
"name": "cve-2018-6574",
"full_name": "dollyptm\/cve-2018-6574",
"owner": {
"login": "dollyptm",
"id": 11349615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11349615?v=4",
"html_url": "https:\/\/github.com\/dollyptm"
},
"html_url": "https:\/\/github.com\/dollyptm\/cve-2018-6574",
"description": null,
"fork": false,
"created_at": "2019-03-19T12:54:23Z",
"updated_at": "2019-03-19T12:54:23Z",
"pushed_at": "2019-03-19T12:54:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 180108074,
"name": "CVE-2018-6574",
"full_name": "qweraqq\/CVE-2018-6574",
"owner": {
"login": "qweraqq",
"id": 5697699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5697699?v=4",
"html_url": "https:\/\/github.com\/qweraqq"
},
"html_url": "https:\/\/github.com\/qweraqq\/CVE-2018-6574",
"description": "A simple POC for CVE-2018-6574",
"fork": false,
"created_at": "2019-04-08T08:49:44Z",
"updated_at": "2019-04-08T08:58:44Z",
"pushed_at": "2019-04-08T08:58:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 182260633,
"name": "go-get-rce",
"full_name": "d4rkshell\/go-get-rce",
"owner": {
"login": "d4rkshell",
"id": 22564423,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22564423?v=4",
"html_url": "https:\/\/github.com\/d4rkshell"
},
"html_url": "https:\/\/github.com\/d4rkshell\/go-get-rce",
"description": "CVE-2018-6574",
"fork": false,
"created_at": "2019-04-19T12:21:41Z",
"updated_at": "2019-04-19T12:23:14Z",
"pushed_at": "2019-04-19T12:22:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 187050013,
"name": "CVE-2018-6574",

48
2018/CVE-2018-6961.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 148533057,
"name": "CVE-2018-6961",
"full_name": "bokanrb\/CVE-2018-6961",
"owner": {
"login": "bokanrb",
"id": 25235094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25235094?v=4",
"html_url": "https:\/\/github.com\/bokanrb"
},
"html_url": "https:\/\/github.com\/bokanrb\/CVE-2018-6961",
"description": "veloCloud VMWare - Vulnerability",
"fork": false,
"created_at": "2018-09-12T19:44:15Z",
"updated_at": "2019-06-30T13:01:22Z",
"pushed_at": "2019-01-28T22:42:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 169735606,
"name": "CVE-2018-6961",
"full_name": "r3dxpl0it\/CVE-2018-6961",
"owner": {
"login": "r3dxpl0it",
"id": 43002597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4",
"html_url": "https:\/\/github.com\/r3dxpl0it"
},
"html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-6961",
"description": "VMware NSX SD-WAN command injection vulnerability ",
"fork": false,
"created_at": "2019-02-08T13:00:35Z",
"updated_at": "2020-04-06T19:22:25Z",
"pushed_at": "2019-02-08T13:05:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 127436541,
"name": "CVE-2018-7600",
"full_name": "a2u\/CVE-2018-7600",
"owner": {
"login": "a2u",
"id": 1529979,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1529979?v=4",
"html_url": "https:\/\/github.com\/a2u"
},
"html_url": "https:\/\/github.com\/a2u\/CVE-2018-7600",
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2021-02-22T02:00:17Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 116,
"forks": 116,
"watchers": 330,
"score": 0
},
{
"id": 129319611,
"name": "Drupalgeddon2",
@ -68,6 +91,29 @@
"watchers": 4,
"score": 0
},
{
"id": 164355216,
"name": "cve-2018-7600",
"full_name": "cved-sources\/cve-2018-7600",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-7600",
"description": "cve-2018-7600",
"fork": false,
"created_at": "2019-01-06T23:41:33Z",
"updated_at": "2019-01-06T23:42:37Z",
"pushed_at": "2019-01-06T23:42:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 175778651,
"name": "codeql-scanner",
@ -91,6 +137,29 @@
"watchers": 0,
"score": 0
},
{
"id": 177401018,
"name": "drupal-exploit",
"full_name": "drugeddon\/drupal-exploit",
"owner": {
"login": "drugeddon",
"id": 48880451,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48880451?v=4",
"html_url": "https:\/\/github.com\/drugeddon"
},
"html_url": "https:\/\/github.com\/drugeddon\/drupal-exploit",
"description": "CVE-2018-7600",
"fork": false,
"created_at": "2019-03-24T10:44:06Z",
"updated_at": "2020-10-09T12:51:14Z",
"pushed_at": "2019-03-24T12:14:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 214170556,
"name": "Drupalgeddon-Mass-Exploiter",

View file

@ -1,4 +1,27 @@
[
{
"id": 155205612,
"name": "CVE-2018-7602",
"full_name": "kastellanos\/CVE-2018-7602",
"owner": {
"login": "kastellanos",
"id": 4370845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4370845?v=4",
"html_url": "https:\/\/github.com\/kastellanos"
},
"html_url": "https:\/\/github.com\/kastellanos\/CVE-2018-7602",
"description": null,
"fork": false,
"created_at": "2018-10-29T12:08:53Z",
"updated_at": "2019-01-14T19:29:10Z",
"pushed_at": "2019-01-14T19:29:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 274906170,
"name": "DrupalCVE-2018-7602",

View file

@ -1,4 +1,27 @@
[
{
"id": 162424739,
"name": "CVE-2018-8120",
"full_name": "qiantu88\/CVE-2018-8120",
"owner": {
"login": "qiantu88",
"id": 35452263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4",
"html_url": "https:\/\/github.com\/qiantu88"
},
"html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-8120",
"description": null,
"fork": false,
"created_at": "2018-12-19T10:58:55Z",
"updated_at": "2018-12-19T10:59:30Z",
"pushed_at": "2018-12-19T10:59:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 197940307,
"name": "cve-2018-8120-exp",

25
2018/CVE-2018-8284.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 180750768,
"name": "CVE-2018-8284-Sharepoint-RCE",
"full_name": "quantiti\/CVE-2018-8284-Sharepoint-RCE",
"owner": {
"login": "quantiti",
"id": 23648688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23648688?v=4",
"html_url": "https:\/\/github.com\/quantiti"
},
"html_url": "https:\/\/github.com\/quantiti\/CVE-2018-8284-Sharepoint-RCE",
"description": null,
"fork": false,
"created_at": "2019-04-11T08:41:41Z",
"updated_at": "2020-08-21T05:27:05Z",
"pushed_at": "2019-04-11T08:44:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 3,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 166348798,
"name": "cve-2018-8453-exp",
"full_name": "Mkv4\/cve-2018-8453-exp",
"owner": {
"login": "Mkv4",
"id": 28436576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28436576?v=4",
"html_url": "https:\/\/github.com\/Mkv4"
},
"html_url": "https:\/\/github.com\/Mkv4\/cve-2018-8453-exp",
"description": "cve-2018-8453 exp",
"fork": false,
"created_at": "2019-01-18T05:24:22Z",
"updated_at": "2020-02-26T06:25:56Z",
"pushed_at": "2019-01-18T05:23:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 9,
"forks": 9,
"watchers": 1,
"score": 0
},
{
"id": 166389170,
"name": "cve-2018-8453-exp",

View file

@ -1,4 +1,50 @@
[
{
"id": 163256409,
"name": "CVE-2018-8581",
"full_name": "WyAtu\/CVE-2018-8581",
"owner": {
"login": "WyAtu",
"id": 23521935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23521935?v=4",
"html_url": "https:\/\/github.com\/WyAtu"
},
"html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-8581",
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2018-12-27T06:30:32Z",
"updated_at": "2021-03-06T09:05:20Z",
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 319,
"watchers_count": 319,
"forks_count": 113,
"forks": 113,
"watchers": 319,
"score": 0
},
{
"id": 163425981,
"name": "CVE-2018-8581",
"full_name": "qiantu88\/CVE-2018-8581",
"owner": {
"login": "qiantu88",
"id": 35452263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4",
"html_url": "https:\/\/github.com\/qiantu88"
},
"html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-8581",
"description": "CVE-2018-8581",
"fork": false,
"created_at": "2018-12-28T15:47:32Z",
"updated_at": "2019-02-07T04:37:49Z",
"pushed_at": "2018-12-28T15:47:53Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 167313064,
"name": "Exchange2domain",

View file

@ -1,4 +1,27 @@
[
{
"id": 173959963,
"name": "CVE-2018-8639-exp",
"full_name": "ze0r\/CVE-2018-8639-exp",
"owner": {
"login": "ze0r",
"id": 43227253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4",
"html_url": "https:\/\/github.com\/ze0r"
},
"html_url": "https:\/\/github.com\/ze0r\/CVE-2018-8639-exp",
"description": null,
"fork": false,
"created_at": "2019-03-05T14:18:07Z",
"updated_at": "2021-01-03T13:52:15Z",
"pushed_at": "2019-04-08T08:26:26Z",
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 51,
"forks": 51,
"watchers": 128,
"score": 0
},
{
"id": 230396639,
"name": "CVE-2018-8639-EXP",

25
2018/CVE-2018-8943.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 174491515,
"name": "CVE-2018-8943",
"full_name": "coolboy0816\/CVE-2018-8943",
"owner": {
"login": "coolboy0816",
"id": 30894096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30894096?v=4",
"html_url": "https:\/\/github.com\/coolboy0816"
},
"html_url": "https:\/\/github.com\/coolboy0816\/CVE-2018-8943",
"description": null,
"fork": false,
"created_at": "2019-03-08T07:42:32Z",
"updated_at": "2019-04-04T07:19:53Z",
"pushed_at": "2019-03-08T08:06:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-9206.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 165319420,
"name": "cve-2018-9206",
"full_name": "cved-sources\/cve-2018-9206",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-9206",
"description": "cve-2018-9206",
"fork": false,
"created_at": "2019-01-11T22:23:06Z",
"updated_at": "2019-02-01T21:33:23Z",
"pushed_at": "2019-02-01T21:33:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-9207.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 165325751,
"name": "cve-2018-9207",
"full_name": "cved-sources\/cve-2018-9207",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-9207",
"description": "cve-2018-9207",
"fork": false,
"created_at": "2019-01-11T23:34:00Z",
"updated_at": "2019-02-01T21:34:00Z",
"pushed_at": "2019-02-01T21:33:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-9208.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 165319911,
"name": "cve-2018-9208",
"full_name": "cved-sources\/cve-2018-9208",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-9208",
"description": "cve-2018-9208",
"fork": false,
"created_at": "2019-01-11T22:28:36Z",
"updated_at": "2019-02-01T21:34:49Z",
"pushed_at": "2019-02-01T21:34:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-9375.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 142890302,
"name": "AOSP-ExploitUserDictionary",
"full_name": "IOActive\/AOSP-ExploitUserDictionary",
"owner": {
"login": "IOActive",
"id": 2120351,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2120351?v=4",
"html_url": "https:\/\/github.com\/IOActive"
},
"html_url": "https:\/\/github.com\/IOActive\/AOSP-ExploitUserDictionary",
"description": "PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)",
"fork": false,
"created_at": "2018-07-30T14:54:34Z",
"updated_at": "2020-11-29T15:09:26Z",
"pushed_at": "2019-03-02T19:49:22Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 6,
"forks": 6,
"watchers": 20,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 131525463,
"name": "CVE-2018-9995_dvr_credentials",
"full_name": "ezelf\/CVE-2018-9995_dvr_credentials",
"owner": {
"login": "ezelf",
"id": 15113645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15113645?v=4",
"html_url": "https:\/\/github.com\/ezelf"
},
"html_url": "https:\/\/github.com\/ezelf\/CVE-2018-9995_dvr_credentials",
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2021-02-10T09:24:04Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 443,
"watchers_count": 443,
"forks_count": 183,
"forks": 183,
"watchers": 443,
"score": 0
},
{
"id": 167874136,
"name": "CVE-2018-9995",
"full_name": "codeholic2k18\/CVE-2018-9995",
"owner": {
"login": "codeholic2k18",
"id": 47091820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47091820?v=4",
"html_url": "https:\/\/github.com\/codeholic2k18"
},
"html_url": "https:\/\/github.com\/codeholic2k18\/CVE-2018-9995",
"description": "DVR username password recovery.",
"fork": false,
"created_at": "2019-01-28T00:16:48Z",
"updated_at": "2019-01-28T00:26:11Z",
"pushed_at": "2019-01-28T00:26:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 182380838,
"name": "CVE-2018-9995-ModifiedByGwolfs",
"full_name": "TateYdq\/CVE-2018-9995-ModifiedByGwolfs",
"owner": {
"login": "TateYdq",
"id": 23353269,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23353269?v=4",
"html_url": "https:\/\/github.com\/TateYdq"
},
"html_url": "https:\/\/github.com\/TateYdq\/CVE-2018-9995-ModifiedByGwolfs",
"description": null,
"fork": false,
"created_at": "2019-04-20T08:28:47Z",
"updated_at": "2019-04-20T08:29:04Z",
"pushed_at": "2019-04-20T08:29:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 188929132,
"name": "CVE-2018-9995_dvr_credentials",

View file

@ -1,27 +1,4 @@
[
{
"id": 174814901,
"name": "CVE-2019-0192",
"full_name": "mpgn\/CVE-2019-0192",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-0192",
"description": "RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl",
"fork": false,
"created_at": "2019-03-10T11:35:26Z",
"updated_at": "2021-01-19T21:06:07Z",
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 209,
"watchers_count": 209,
"forks_count": 60,
"forks": 60,
"watchers": 209,
"score": 0
},
{
"id": 218993619,
"name": "Solr-RCE-CVE-2019-0192",

View file

@ -1416,13 +1416,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-03-06T02:15:48Z",
"updated_at": "2021-03-07T15:16:07Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1062,
"watchers_count": 1062,
"forks_count": 353,
"forks": 353,
"watchers": 1062,
"stargazers_count": 1063,
"watchers_count": 1063,
"forks_count": 354,
"forks": 354,
"watchers": 1063,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1639,
"watchers_count": 1639,
"forks_count": 247,
"forks": 247,
"forks_count": 248,
"forks": 248,
"watchers": 1639,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2021-02-18T09:45:41Z",
"updated_at": "2021-03-07T18:16:16Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 267,
"watchers_count": 267,
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 65,
"forks": 65,
"watchers": 267,
"watchers": 268,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-06T03:02:33Z",
"updated_at": "2021-03-07T19:37:23Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 940,
"watchers_count": 940,
"stargazers_count": 941,
"watchers_count": 941,
"forks_count": 220,
"forks": 220,
"watchers": 940,
"watchers": 941,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-12-12T03:41:43Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"forks": 7,
"forks_count": 6,
"forks": 6,
"watchers": 15,
"score": 0
}

View file

@ -67,5 +67,28 @@
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 345425457,
"name": "Kinesys-CVE-2019-6340",
"full_name": "Kinesys\/Kinesys-CVE-2019-6340",
"owner": {
"login": "Kinesys",
"id": 67867993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
"html_url": "https:\/\/github.com\/Kinesys"
},
"html_url": "https:\/\/github.com\/Kinesys\/Kinesys-CVE-2019-6340",
"description": "Drupal RCE CVE Python Exploit",
"fork": false,
"created_at": "2021-03-07T18:44:49Z",
"updated_at": "2021-03-07T18:45:01Z",
"pushed_at": "2021-03-07T18:44:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 214392452,
"name": "SysTracingPoc",
"full_name": "itm4n\/SysTracingPoc",
"owner": {
"login": "itm4n",
"id": 30777390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30777390?v=4",
"html_url": "https:\/\/github.com\/itm4n"
},
"html_url": "https:\/\/github.com\/itm4n\/SysTracingPoc",
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2021-02-20T14:37:21Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 20,
"forks": 20,
"watchers": 55,
"score": 0
},
{
"id": 243248025,
"name": "CVE-2020-0668",

View file

@ -1562,5 +1562,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 345408388,
"name": "Kinesys-CVE-2020-0796",
"full_name": "Kinesys\/Kinesys-CVE-2020-0796",
"owner": {
"login": "Kinesys",
"id": 67867993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
"html_url": "https:\/\/github.com\/Kinesys"
},
"html_url": "https:\/\/github.com\/Kinesys\/Kinesys-CVE-2020-0796",
"description": "MS CVE 2020-0796 SMB",
"fork": false,
"created_at": "2021-03-07T17:24:42Z",
"updated_at": "2021-03-07T18:02:38Z",
"pushed_at": "2021-03-07T17:24:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-06T03:02:33Z",
"updated_at": "2021-03-07T19:37:23Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 940,
"watchers_count": 940,
"stargazers_count": 941,
"watchers_count": 941,
"forks_count": 220,
"forks": 220,
"watchers": 940,
"watchers": 941,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "CVE-20207961 Mass exploit for Script Kiddies",
"fork": false,
"created_at": "2021-01-02T13:57:59Z",
"updated_at": "2021-01-17T18:11:25Z",
"updated_at": "2021-03-07T16:46:53Z",
"pushed_at": "2021-01-03T10:54:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -435,5 +435,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 345396191,
"name": "CVE-2021-21972",
"full_name": "TaroballzChen\/CVE-2021-21972",
"owner": {
"login": "TaroballzChen",
"id": 27862593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
"html_url": "https:\/\/github.com\/TaroballzChen"
},
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-21972",
"description": "CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script",
"fork": false,
"created_at": "2021-03-07T16:30:36Z",
"updated_at": "2021-03-07T20:18:47Z",
"pushed_at": "2021-03-07T17:12:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "带回显版本的漏洞利用脚本",
"fork": false,
"created_at": "2021-03-05T08:15:27Z",
"updated_at": "2021-03-07T12:08:45Z",
"updated_at": "2021-03-07T16:59:31Z",
"pushed_at": "2021-03-05T11:09:06Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
"fork": false,
"created_at": "2021-03-05T08:22:07Z",
"updated_at": "2021-03-07T11:31:37Z",
"updated_at": "2021-03-07T20:27:13Z",
"pushed_at": "2021-03-06T04:41:39Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 5,
"forks": 5,
"watchers": 26,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 7,
"forks": 7,
"watchers": 35,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)",
"fork": false,
"created_at": "2021-03-06T09:15:55Z",
"updated_at": "2021-03-07T11:32:38Z",
"updated_at": "2021-03-07T18:36:35Z",
"pushed_at": "2021-03-06T10:34:49Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"forks": 1,
"watchers": 13,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 2,
"forks": 2,
"watchers": 15,
"score": 0
},
{
@ -151,8 +151,8 @@
"description": "PoC for CVE-2021-26855 -Just a checker-",
"fork": false,
"created_at": "2021-03-06T23:12:22Z",
"updated_at": "2021-03-06T23:14:32Z",
"pushed_at": "2021-03-06T23:14:30Z",
"updated_at": "2021-03-07T20:27:47Z",
"pushed_at": "2021-03-07T20:27:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

Some files were not shown because too many files have changed in this diff Show more