Auto Update 2021/04/11 18:10:26

This commit is contained in:
motikan2010-bot 2021-04-11 18:10:26 +09:00
parent 13c863781e
commit 6ec427b172
307 changed files with 10217 additions and 5825 deletions

25
2005/CVE-2005-0603.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 291075050,
"name": "CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
"full_name": "Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
"owner": {
"login": "Parcer0",
"id": 70012338,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4",
"html_url": "https:\/\/github.com\/Parcer0"
},
"html_url": "https:\/\/github.com\/Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
"description": null,
"fork": false,
"created_at": "2020-08-28T15:01:49Z",
"updated_at": "2020-08-28T15:04:23Z",
"pushed_at": "2020-08-28T15:04:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -274,5 +274,28 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 356803395,
"name": "CVE-2007-2447",
"full_name": "Un4gi\/CVE-2007-2447",
"owner": {
"login": "Un4gi",
"id": 47873286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47873286?v=4",
"html_url": "https:\/\/github.com\/Un4gi"
},
"html_url": "https:\/\/github.com\/Un4gi\/CVE-2007-2447",
"description": "Samba 3.0.20 username map script exploit",
"fork": false,
"created_at": "2021-04-11T07:53:20Z",
"updated_at": "2021-04-11T07:57:36Z",
"pushed_at": "2021-04-11T07:57:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2021-01-13T01:04:57Z",
"updated_at": "2021-04-11T05:02:43Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 27,
"forks": 27,
"watchers": 43,
"watchers": 44,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2021-03-04T03:13:53Z",
"updated_at": "2021-04-11T06:59:43Z",
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 356,
"watchers_count": 356,
"stargazers_count": 357,
"watchers_count": 357,
"forks_count": 143,
"forks": 143,
"watchers": 356,
"watchers": 357,
"score": 0
},
{

25
2017/CVE-2017-0005.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 219656365,
"name": "0005poc",
"full_name": "sheri31\/0005poc",
"owner": {
"login": "sheri31",
"id": 22992048,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22992048?v=4",
"html_url": "https:\/\/github.com\/sheri31"
},
"html_url": "https:\/\/github.com\/sheri31\/0005poc",
"description": "CVE-2017-0005 POC",
"fork": false,
"created_at": "2019-11-05T04:18:08Z",
"updated_at": "2020-06-30T07:30:09Z",
"pushed_at": "2019-11-05T04:21:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-0075.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 207950188,
"name": "HyperV",
"full_name": "4B5F5F4B\/HyperV",
"owner": {
"login": "4B5F5F4B",
"id": 19218802,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19218802?v=4",
"html_url": "https:\/\/github.com\/4B5F5F4B"
},
"html_url": "https:\/\/github.com\/4B5F5F4B\/HyperV",
"description": "PoC for CVE-2017-0075",
"fork": false,
"created_at": "2019-09-12T02:45:07Z",
"updated_at": "2020-10-23T13:19:09Z",
"pushed_at": "2019-09-12T03:02:13Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 15,
"forks": 15,
"watchers": 34,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 97406900,
"name": "eternal_scanner",
"full_name": "peterpt\/eternal_scanner",
"owner": {
"login": "peterpt",
"id": 7487321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7487321?v=4",
"html_url": "https:\/\/github.com\/peterpt"
},
"html_url": "https:\/\/github.com\/peterpt\/eternal_scanner",
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2021-04-08T07:30:06Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 110,
"forks": 110,
"watchers": 277,
"score": 0
},
{
"id": 189801410,
"name": "eternalblue",
"full_name": "kimocoder\/eternalblue",
"owner": {
"login": "kimocoder",
"id": 4252297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4252297?v=4",
"html_url": "https:\/\/github.com\/kimocoder"
},
"html_url": "https:\/\/github.com\/kimocoder\/eternalblue",
"description": "CVE-2017-0144",
"fork": false,
"created_at": "2019-06-02T03:41:47Z",
"updated_at": "2021-03-17T09:29:07Z",
"pushed_at": "2019-06-02T03:51:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 350284554,
"name": "CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution",

View file

@ -275,6 +275,121 @@
"watchers": 1,
"score": 0
},
{
"id": 104072875,
"name": "CVE-2017-0199",
"full_name": "viethdgit\/CVE-2017-0199",
"owner": {
"login": "viethdgit",
"id": 24888568,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24888568?v=4",
"html_url": "https:\/\/github.com\/viethdgit"
},
"html_url": "https:\/\/github.com\/viethdgit\/CVE-2017-0199",
"description": null,
"fork": false,
"created_at": "2017-09-19T12:38:47Z",
"updated_at": "2017-09-19T12:38:47Z",
"pushed_at": "2017-09-19T12:47:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 109420190,
"name": "RTF-Cleaner",
"full_name": "nicpenning\/RTF-Cleaner",
"owner": {
"login": "nicpenning",
"id": 5582679,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5582679?v=4",
"html_url": "https:\/\/github.com\/nicpenning"
},
"html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner",
"description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.",
"fork": false,
"created_at": "2017-11-03T16:47:16Z",
"updated_at": "2019-06-29T16:49:45Z",
"pushed_at": "2017-11-03T20:55:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 111145351,
"name": "2017-11-17-Maldoc-Using-CVE-2017-0199",
"full_name": "bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
"owner": {
"login": "bloomer1016",
"id": 12056770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12056770?v=4",
"html_url": "https:\/\/github.com\/bloomer1016"
},
"html_url": "https:\/\/github.com\/bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
"description": null,
"fork": false,
"created_at": "2017-11-17T20:00:29Z",
"updated_at": "2020-03-29T03:29:38Z",
"pushed_at": "2017-11-17T20:00:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 113558617,
"name": "RTF-Cleaner",
"full_name": "jacobsoo\/RTF-Cleaner",
"owner": {
"login": "jacobsoo",
"id": 3516693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3516693?v=4",
"html_url": "https:\/\/github.com\/jacobsoo"
},
"html_url": "https:\/\/github.com\/jacobsoo\/RTF-Cleaner",
"description": "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759",
"fork": false,
"created_at": "2017-12-08T09:45:25Z",
"updated_at": "2018-02-21T04:37:47Z",
"pushed_at": "2017-12-08T09:46:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 126305253,
"name": "CVE-2017-0199",
"full_name": "likescam\/CVE-2017-0199",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-0199",
"description": null,
"fork": false,
"created_at": "2018-03-22T08:40:55Z",
"updated_at": "2018-03-22T08:41:14Z",
"pushed_at": "2018-03-22T08:41:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 305189722,
"name": "CVE-2017-0199-PY-KIT",

View file

@ -21,5 +21,143 @@
"forks": 6,
"watchers": 1,
"score": 0
},
{
"id": 95974378,
"name": "CVE-2017-0213",
"full_name": "zcgonvh\/CVE-2017-0213",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
"description": "CVE-2017-0213 for command line",
"fork": false,
"created_at": "2017-07-01T16:07:04Z",
"updated_at": "2020-10-21T22:15:15Z",
"pushed_at": "2017-07-01T16:19:12Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 25,
"forks": 25,
"watchers": 55,
"score": 0
},
{
"id": 105444160,
"name": "CVE-2017-0213",
"full_name": "billa3283\/CVE-2017-0213",
"owner": {
"login": "billa3283",
"id": 32428387,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32428387?v=4",
"html_url": "https:\/\/github.com\/billa3283"
},
"html_url": "https:\/\/github.com\/billa3283\/CVE-2017-0213",
"description": null,
"fork": false,
"created_at": "2017-10-01T13:29:59Z",
"updated_at": "2017-10-01T13:29:59Z",
"pushed_at": "2017-10-01T13:30:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 125799686,
"name": "CVE-2017-0213",
"full_name": "likescam\/CVE-2017-0213",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-0213",
"description": null,
"fork": false,
"created_at": "2018-03-19T04:04:05Z",
"updated_at": "2018-03-19T04:04:05Z",
"pushed_at": "2018-03-19T04:04:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 126122153,
"name": "CVE-2017-0213",
"full_name": "jbooz1\/CVE-2017-0213",
"owner": {
"login": "jbooz1",
"id": 19398243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19398243?v=4",
"html_url": "https:\/\/github.com\/jbooz1"
},
"html_url": "https:\/\/github.com\/jbooz1\/CVE-2017-0213",
"description": "A version of CVE-2017-0213 that I plan to use with an Empire stager",
"fork": false,
"created_at": "2018-03-21T04:13:29Z",
"updated_at": "2020-11-25T23:04:06Z",
"pushed_at": "2018-03-21T04:20:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 128978997,
"name": "CVE-2017-0213",
"full_name": "eonrickity\/CVE-2017-0213",
"owner": {
"login": "eonrickity",
"id": 33985450,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33985450?v=4",
"html_url": "https:\/\/github.com\/eonrickity"
},
"html_url": "https:\/\/github.com\/eonrickity\/CVE-2017-0213",
"description": "Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.",
"fork": false,
"created_at": "2018-04-10T18:34:17Z",
"updated_at": "2020-11-25T23:03:02Z",
"pushed_at": "2018-04-17T23:14:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 7,
"forks": 7,
"watchers": 2,
"score": 0
},
{
"id": 194031587,
"name": "CVE-2017-0213-Exploit",
"full_name": "Jos675\/CVE-2017-0213-Exploit",
"owner": {
"login": "Jos675",
"id": 35967664,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35967664?v=4",
"html_url": "https:\/\/github.com\/Jos675"
},
"html_url": "https:\/\/github.com\/Jos675\/CVE-2017-0213-Exploit",
"description": "Binary",
"fork": false,
"created_at": "2019-06-27T05:56:35Z",
"updated_at": "2020-11-25T23:11:22Z",
"pushed_at": "2019-07-04T04:25:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-0248.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 168158477,
"name": "CVE-2017-0248-Test",
"full_name": "rubenmamo\/CVE-2017-0248-Test",
"owner": {
"login": "rubenmamo",
"id": 7700562,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7700562?v=4",
"html_url": "https:\/\/github.com\/rubenmamo"
},
"html_url": "https:\/\/github.com\/rubenmamo\/CVE-2017-0248-Test",
"description": "Sample project to test using Microsoft.CodeDom.Providers.DotNetCompilerPlatform 2.0.1 causing CVE-2017-0248",
"fork": false,
"created_at": "2019-01-29T13:23:24Z",
"updated_at": "2019-01-29T13:33:26Z",
"pushed_at": "2019-01-29T13:33:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 178656447,
"name": "eps-CVE-2017-0261",
"full_name": "kcufId\/eps-CVE-2017-0261",
"owner": {
"login": "kcufId",
"id": 10615265,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10615265?v=4",
"html_url": "https:\/\/github.com\/kcufId"
},
"html_url": "https:\/\/github.com\/kcufId\/eps-CVE-2017-0261",
"description": "eps漏洞(CVE-2017-0261)漏洞分析",
"fork": false,
"created_at": "2019-03-31T07:29:48Z",
"updated_at": "2020-09-25T03:29:33Z",
"pushed_at": "2019-03-31T07:39:37Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 6,
"forks": 6,
"watchers": 5,
"score": 0
},
{
"id": 289408689,
"name": "CVE-2017-0261",

25
2017/CVE-2017-0263.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 164377700,
"name": "cve-2017-0263-poc",
"full_name": "R06otMD5\/cve-2017-0263-poc",
"owner": {
"login": "R06otMD5",
"id": 25081496,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25081496?v=4",
"html_url": "https:\/\/github.com\/R06otMD5"
},
"html_url": "https:\/\/github.com\/R06otMD5\/cve-2017-0263-poc",
"description": "poc for 0263",
"fork": false,
"created_at": "2019-01-07T04:21:25Z",
"updated_at": "2019-01-07T04:21:28Z",
"pushed_at": "2019-01-07T04:21:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-0411.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 132620665,
"name": "PoC",
"full_name": "lulusudoku\/PoC",
"owner": {
"login": "lulusudoku",
"id": 11342842,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11342842?v=4",
"html_url": "https:\/\/github.com\/lulusudoku"
},
"html_url": "https:\/\/github.com\/lulusudoku\/PoC",
"description": "CVE-2017-0411 PoC refered p0",
"fork": false,
"created_at": "2018-05-08T14:25:29Z",
"updated_at": "2018-05-09T06:10:02Z",
"pushed_at": "2018-05-09T06:10:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 5,
"watchers": 7,
"score": 0
},
{
"id": 141312944,
"name": "CVE-2017-0478",
"full_name": "likescam\/CVE-2017-0478",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-0478",
"description": null,
"fork": false,
"created_at": "2018-07-17T16:01:13Z",
"updated_at": "2018-07-17T16:01:28Z",
"pushed_at": "2018-07-17T16:01:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 11,
"watchers": 19,
"score": 0
},
{
"id": 141312906,
"name": "CVE-2017-0541",
"full_name": "likescam\/CVE-2017-0541",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-0541",
"description": null,
"fork": false,
"created_at": "2018-07-17T16:00:57Z",
"updated_at": "2018-07-17T16:01:14Z",
"pushed_at": "2018-07-17T16:01:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-0554.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 115291853,
"name": "tethr",
"full_name": "lanrat\/tethr",
"owner": {
"login": "lanrat",
"id": 164192,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164192?v=4",
"html_url": "https:\/\/github.com\/lanrat"
},
"html_url": "https:\/\/github.com\/lanrat\/tethr",
"description": "Android Tethering Provisioning Check Bypass (CVE-2017-0554)",
"fork": false,
"created_at": "2017-12-24T23:18:28Z",
"updated_at": "2020-09-10T21:28:07Z",
"pushed_at": "2020-09-11T04:45:20Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"forks": 3,
"watchers": 10,
"score": 0
}
]

25
2017/CVE-2017-0564.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 117041381,
"name": "CVE-2017-0564-ION-PoC",
"full_name": "guoygang\/CVE-2017-0564-ION-PoC",
"owner": {
"login": "guoygang",
"id": 16954452,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16954452?v=4",
"html_url": "https:\/\/github.com\/guoygang"
},
"html_url": "https:\/\/github.com\/guoygang\/CVE-2017-0564-ION-PoC",
"description": "ION通用提权漏洞PoC以及分析",
"fork": false,
"created_at": "2018-01-11T02:50:26Z",
"updated_at": "2019-07-16T01:41:58Z",
"pushed_at": "2018-01-11T02:53:43Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 106299703,
"name": "CVE-2017-0781",
"full_name": "ojasookert\/CVE-2017-0781",
"owner": {
"login": "ojasookert",
"id": 12931198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4",
"html_url": "https:\/\/github.com\/ojasookert"
},
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0781",
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false,
"created_at": "2017-10-09T15:13:25Z",
"updated_at": "2021-02-13T17:52:38Z",
"pushed_at": "2017-10-09T15:20:11Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 37,
"forks": 37,
"watchers": 74,
"score": 0
},
{
"id": 125669064,
"name": "android712-blueborne",
"full_name": "marcinguy\/android712-blueborne",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/android712-blueborne",
"description": "Android Blueborne RCE CVE-2017-0781",
"fork": false,
"created_at": "2018-03-17T21:07:24Z",
"updated_at": "2020-12-14T00:02:06Z",
"pushed_at": "2018-04-04T12:59:18Z",
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 23,
"forks": 23,
"watchers": 68,
"score": 0
},
{
"id": 283876725,
"name": "BlueborneDetection",

186
2017/CVE-2017-0785.json Normal file
View file

@ -0,0 +1,186 @@
[
{
"id": 104278164,
"name": "CVE-2017-0785",
"full_name": "ojasookert\/CVE-2017-0785",
"owner": {
"login": "ojasookert",
"id": 12931198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4",
"html_url": "https:\/\/github.com\/ojasookert"
},
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0785",
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2021-03-24T04:29:31Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 427,
"watchers_count": 427,
"forks_count": 188,
"forks": 188,
"watchers": 427,
"score": 0
},
{
"id": 104516404,
"name": "CVE-2017-0785",
"full_name": "aymankhalfatni\/CVE-2017-0785",
"owner": {
"login": "aymankhalfatni",
"id": 19715320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19715320?v=4",
"html_url": "https:\/\/github.com\/aymankhalfatni"
},
"html_url": "https:\/\/github.com\/aymankhalfatni\/CVE-2017-0785",
"description": "CVE-2017-0785: BlueBorne PoC",
"fork": false,
"created_at": "2017-09-22T20:33:12Z",
"updated_at": "2017-09-22T20:34:33Z",
"pushed_at": "2017-09-22T20:34:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 104522460,
"name": "-CVE-2017-0785-BlueBorne-PoC",
"full_name": "Alfa100001\/-CVE-2017-0785-BlueBorne-PoC",
"owner": {
"login": "Alfa100001",
"id": 29385626,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29385626?v=4",
"html_url": "https:\/\/github.com\/Alfa100001"
},
"html_url": "https:\/\/github.com\/Alfa100001\/-CVE-2017-0785-BlueBorne-PoC",
"description": "CVE-2017-0785 BlueBorne PoC",
"fork": false,
"created_at": "2017-09-22T22:03:40Z",
"updated_at": "2020-09-10T09:52:50Z",
"pushed_at": "2017-09-22T22:23:52Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 14,
"forks": 14,
"watchers": 27,
"score": 0
},
{
"id": 105568835,
"name": "BlueBorne-CVE-2017-0785",
"full_name": "Hackerscript\/BlueBorne-CVE-2017-0785",
"owner": {
"login": "Hackerscript",
"id": 29609985,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29609985?v=4",
"html_url": "https:\/\/github.com\/Hackerscript"
},
"html_url": "https:\/\/github.com\/Hackerscript\/BlueBorne-CVE-2017-0785",
"description": "this script is used for hack bluetooth devices CVE 2017 0785 which was done by ARMIS This File is password protected for password contact atusha@gmail.comr",
"fork": false,
"created_at": "2017-10-02T18:21:43Z",
"updated_at": "2017-10-02T18:21:43Z",
"pushed_at": "2017-10-02T18:21:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 105816209,
"name": "blueborne",
"full_name": "pieterbork\/blueborne",
"owner": {
"login": "pieterbork",
"id": 31708728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31708728?v=4",
"html_url": "https:\/\/github.com\/pieterbork"
},
"html_url": "https:\/\/github.com\/pieterbork\/blueborne",
"description": "Scan\/Exploit Blueborne CVE-2017-0785",
"fork": false,
"created_at": "2017-10-04T20:41:12Z",
"updated_at": "2021-01-23T04:49:59Z",
"pushed_at": "2018-02-28T07:04:05Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 23,
"forks": 23,
"watchers": 31,
"score": 0
},
{
"id": 116589306,
"name": "diff",
"full_name": "sigbitsadmin\/diff",
"owner": {
"login": "sigbitsadmin",
"id": 33204560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33204560?v=4",
"html_url": "https:\/\/github.com\/sigbitsadmin"
},
"html_url": "https:\/\/github.com\/sigbitsadmin\/diff",
"description": "Simply diff for CVE-2017-0785",
"fork": false,
"created_at": "2018-01-07T18:30:42Z",
"updated_at": "2018-01-07T18:31:03Z",
"pushed_at": "2018-01-07T18:31:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 117460479,
"name": "diff",
"full_name": "SigBitsLabs\/diff",
"owner": {
"login": "SigBitsLabs",
"id": 33204577,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33204577?v=4",
"html_url": "https:\/\/github.com\/SigBitsLabs"
},
"html_url": "https:\/\/github.com\/SigBitsLabs\/diff",
"description": "diff for CVE-2017-0785 (Blueborne)",
"fork": false,
"created_at": "2018-01-14T19:36:03Z",
"updated_at": "2018-01-14T19:36:27Z",
"pushed_at": "2018-01-14T19:36:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 122293991,
"name": "Bluetooth-Crash-CVE-2017-0785",
"full_name": "RavSS\/Bluetooth-Crash-CVE-2017-0785",
"owner": {
"login": "RavSS",
"id": 31635233,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31635233?v=4",
"html_url": "https:\/\/github.com\/RavSS"
},
"html_url": "https:\/\/github.com\/RavSS\/Bluetooth-Crash-CVE-2017-0785",
"description": null,
"fork": false,
"created_at": "2018-02-21T04:53:41Z",
"updated_at": "2019-07-28T03:26:34Z",
"pushed_at": "2018-04-20T16:12:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-0806.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 135889098,
"name": "ReparcelBug",
"full_name": "michalbednarski\/ReparcelBug",
"owner": {
"login": "michalbednarski",
"id": 1826899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1826899?v=4",
"html_url": "https:\/\/github.com\/michalbednarski"
},
"html_url": "https:\/\/github.com\/michalbednarski\/ReparcelBug",
"description": "CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel\/createFromParcel mismatch)",
"fork": false,
"created_at": "2018-06-03T09:04:50Z",
"updated_at": "2021-01-10T22:51:51Z",
"pushed_at": "2018-06-03T09:06:00Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 8,
"forks": 8,
"watchers": 9,
"score": 0
}
]

25
2017/CVE-2017-0807.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 117631583,
"name": "PoC_CVE-2017-0807",
"full_name": "kpatsakis\/PoC_CVE-2017-0807",
"owner": {
"login": "kpatsakis",
"id": 9294190,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9294190?v=4",
"html_url": "https:\/\/github.com\/kpatsakis"
},
"html_url": "https:\/\/github.com\/kpatsakis\/PoC_CVE-2017-0807",
"description": "Proof of concept of CVE-2017-0807",
"fork": false,
"created_at": "2018-01-16T04:34:06Z",
"updated_at": "2018-11-26T05:17:02Z",
"pushed_at": "2018-01-16T04:55:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -0,0 +1,48 @@
[
{
"id": 155380204,
"name": "evince-cve-2017-1000083",
"full_name": "matlink\/evince-cve-2017-1000083",
"owner": {
"login": "matlink",
"id": 4450078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4",
"html_url": "https:\/\/github.com\/matlink"
},
"html_url": "https:\/\/github.com\/matlink\/evince-cve-2017-1000083",
"description": null,
"fork": false,
"created_at": "2018-10-30T12:18:11Z",
"updated_at": "2018-11-15T16:16:21Z",
"pushed_at": "2018-11-15T16:16:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 155380798,
"name": "cve-2017-1000083-atril-nautilus",
"full_name": "matlink\/cve-2017-1000083-atril-nautilus",
"owner": {
"login": "matlink",
"id": 4450078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4",
"html_url": "https:\/\/github.com\/matlink"
},
"html_url": "https:\/\/github.com\/matlink\/cve-2017-1000083-atril-nautilus",
"description": null,
"fork": false,
"created_at": "2018-10-30T12:22:41Z",
"updated_at": "2018-10-30T12:24:39Z",
"pushed_at": "2018-10-30T12:24:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 208989601,
"name": "docker_escape_pwn",
"full_name": "hikame\/docker_escape_pwn",
"owner": {
"login": "hikame",
"id": 6397196,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6397196?v=4",
"html_url": "https:\/\/github.com\/hikame"
},
"html_url": "https:\/\/github.com\/hikame\/docker_escape_pwn",
"description": "Escape from Docker using CVE-2017-1000112 and CVE-2017-18344, including gaining root privilage, get all capbilities, namespace recovery, filesystem recovery, cgroup limitation bypass and seccomp bypass.",
"fork": false,
"created_at": "2019-09-17T07:38:47Z",
"updated_at": "2019-09-29T10:14:51Z",
"pushed_at": "2019-09-29T10:14:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 240509756,
"name": "CVE-2017-1000112-Adpated",

531
2017/CVE-2017-1000117.json Normal file
View file

@ -0,0 +1,531 @@
[
{
"id": 100002532,
"name": "CVE-2017-1000117",
"full_name": "timwr\/CVE-2017-1000117",
"owner": {
"login": "timwr",
"id": 684924,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4",
"html_url": "https:\/\/github.com\/timwr"
},
"html_url": "https:\/\/github.com\/timwr\/CVE-2017-1000117",
"description": "Proof of concept of CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-11T07:03:23Z",
"updated_at": "2019-01-23T02:32:39Z",
"pushed_at": "2017-08-11T08:27:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 16,
"forks": 16,
"watchers": 6,
"score": 0
},
{
"id": 100058519,
"name": "test-git-vuln_CVE-2017-1000117",
"full_name": "GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
"owner": {
"login": "GrahamMThomas",
"id": 14031456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14031456?v=4",
"html_url": "https:\/\/github.com\/GrahamMThomas"
},
"html_url": "https:\/\/github.com\/GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
"description": "Repo to test the new git vulnerability",
"fork": false,
"created_at": "2017-08-11T18:05:01Z",
"updated_at": "2017-09-26T17:09:13Z",
"pushed_at": "2017-08-11T20:15:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 100069051,
"name": "CVE-2017-1000117",
"full_name": "Manouchehri\/CVE-2017-1000117",
"owner": {
"login": "Manouchehri",
"id": 7232674,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7232674?v=4",
"html_url": "https:\/\/github.com\/Manouchehri"
},
"html_url": "https:\/\/github.com\/Manouchehri\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-11T20:47:53Z",
"updated_at": "2018-04-19T04:23:54Z",
"pushed_at": "2017-08-11T21:26:33Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 14,
"forks": 14,
"watchers": 16,
"score": 0
},
{
"id": 100080640,
"name": "CVE-2017-1000117",
"full_name": "thelastbyte\/CVE-2017-1000117",
"owner": {
"login": "thelastbyte",
"id": 7829097,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7829097?v=4",
"html_url": "https:\/\/github.com\/thelastbyte"
},
"html_url": "https:\/\/github.com\/thelastbyte\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-12T01:10:49Z",
"updated_at": "2017-09-01T22:06:02Z",
"pushed_at": "2017-09-01T22:08:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100116587,
"name": "CVE-2017-1000117",
"full_name": "alilangtest\/CVE-2017-1000117",
"owner": {
"login": "alilangtest",
"id": 20162983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20162983?v=4",
"html_url": "https:\/\/github.com\/alilangtest"
},
"html_url": "https:\/\/github.com\/alilangtest\/CVE-2017-1000117",
"description": "test",
"fork": false,
"created_at": "2017-08-12T14:14:55Z",
"updated_at": "2019-05-09T09:27:01Z",
"pushed_at": "2017-08-12T14:25:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100130122,
"name": "CVE-2017-1000117",
"full_name": "VulApps\/CVE-2017-1000117",
"owner": {
"login": "VulApps",
"id": 29811930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29811930?v=4",
"html_url": "https:\/\/github.com\/VulApps"
},
"html_url": "https:\/\/github.com\/VulApps\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-12T18:20:02Z",
"updated_at": "2020-03-21T15:06:32Z",
"pushed_at": "2017-08-12T18:22:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 22,
"forks": 22,
"watchers": 4,
"score": 0
},
{
"id": 100280254,
"name": "CVE-2017-1000117",
"full_name": "greymd\/CVE-2017-1000117",
"owner": {
"login": "greymd",
"id": 3874767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4",
"html_url": "https:\/\/github.com\/greymd"
},
"html_url": "https:\/\/github.com\/greymd\/CVE-2017-1000117",
"description": "Check Git's vulnerability CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-14T15:05:48Z",
"updated_at": "2021-02-17T09:50:56Z",
"pushed_at": "2017-08-16T15:39:15Z",
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 25,
"forks": 25,
"watchers": 136,
"score": 0
},
{
"id": 100325886,
"name": "Fix-CVE-2017-1000117",
"full_name": "shogo82148\/Fix-CVE-2017-1000117",
"owner": {
"login": "shogo82148",
"id": 1157344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1157344?v=4",
"html_url": "https:\/\/github.com\/shogo82148"
},
"html_url": "https:\/\/github.com\/shogo82148\/Fix-CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-15T01:40:18Z",
"updated_at": "2017-08-17T03:44:20Z",
"pushed_at": "2017-08-17T03:44:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100357293,
"name": "CVE-2017-1000117_wasawasa",
"full_name": "sasairc\/CVE-2017-1000117_wasawasa",
"owner": {
"login": "sasairc",
"id": 9349287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9349287?v=4",
"html_url": "https:\/\/github.com\/sasairc"
},
"html_url": "https:\/\/github.com\/sasairc\/CVE-2017-1000117_wasawasa",
"description": null,
"fork": false,
"created_at": "2017-08-15T08:39:23Z",
"updated_at": "2017-08-15T09:39:16Z",
"pushed_at": "2017-08-15T08:43:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 100374790,
"name": "CVE-2017-1000117-test",
"full_name": "Shadow5523\/CVE-2017-1000117-test",
"owner": {
"login": "Shadow5523",
"id": 22784789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22784789?v=4",
"html_url": "https:\/\/github.com\/Shadow5523"
},
"html_url": "https:\/\/github.com\/Shadow5523\/CVE-2017-1000117-test",
"description": "CVE-2017-1000117の検証",
"fork": false,
"created_at": "2017-08-15T12:24:57Z",
"updated_at": "2017-08-17T14:54:39Z",
"pushed_at": "2017-08-18T02:18:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100437085,
"name": "CVE-2017-1000117",
"full_name": "bells17\/CVE-2017-1000117",
"owner": {
"login": "bells17",
"id": 2158863,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2158863?v=4",
"html_url": "https:\/\/github.com\/bells17"
},
"html_url": "https:\/\/github.com\/bells17\/CVE-2017-1000117",
"description": "https:\/\/github.com\/greymd\/CVE-2017-1000117 の勉強用",
"fork": false,
"created_at": "2017-08-16T02:04:02Z",
"updated_at": "2017-10-13T17:48:19Z",
"pushed_at": "2017-08-16T09:35:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100437171,
"name": "CVE-2017-1000117",
"full_name": "ieee0824\/CVE-2017-1000117",
"owner": {
"login": "ieee0824",
"id": 5692475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4",
"html_url": "https:\/\/github.com\/ieee0824"
},
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-16T02:05:08Z",
"updated_at": "2017-08-16T08:10:25Z",
"pushed_at": "2017-08-16T10:03:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 100445561,
"name": "CVE-2017-1000117",
"full_name": "rootclay\/CVE-2017-1000117",
"owner": {
"login": "rootclay",
"id": 29671471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29671471?v=4",
"html_url": "https:\/\/github.com\/rootclay"
},
"html_url": "https:\/\/github.com\/rootclay\/CVE-2017-1000117",
"description": "CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-16T03:52:27Z",
"updated_at": "2017-08-16T04:00:53Z",
"pushed_at": "2017-08-16T06:14:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 100446125,
"name": "CVE-2017-1000117-sl",
"full_name": "ieee0824\/CVE-2017-1000117-sl",
"owner": {
"login": "ieee0824",
"id": 5692475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4",
"html_url": "https:\/\/github.com\/ieee0824"
},
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117-sl",
"description": "Experiment of CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-16T04:01:08Z",
"updated_at": "2017-08-16T05:42:26Z",
"pushed_at": "2017-08-16T09:54:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100498924,
"name": "CVE-2017-1000117",
"full_name": "takehaya\/CVE-2017-1000117",
"owner": {
"login": "takehaya",
"id": 10973623,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10973623?v=4",
"html_url": "https:\/\/github.com\/takehaya"
},
"html_url": "https:\/\/github.com\/takehaya\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-16T14:34:37Z",
"updated_at": "2017-08-16T14:34:37Z",
"pushed_at": "2017-08-17T18:45:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 100544749,
"name": "CVE-2017-1000117",
"full_name": "ikmski\/CVE-2017-1000117",
"owner": {
"login": "ikmski",
"id": 6622579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6622579?v=4",
"html_url": "https:\/\/github.com\/ikmski"
},
"html_url": "https:\/\/github.com\/ikmski\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-17T00:37:47Z",
"updated_at": "2017-08-17T00:37:47Z",
"pushed_at": "2017-08-17T00:57:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100730507,
"name": "CVE-2017-1000117",
"full_name": "nkoneko\/CVE-2017-1000117",
"owner": {
"login": "nkoneko",
"id": 1922341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4",
"html_url": "https:\/\/github.com\/nkoneko"
},
"html_url": "https:\/\/github.com\/nkoneko\/CVE-2017-1000117",
"description": "GitのCommand Injectionの脆弱性を利用してスクリプトを落として実行する例",
"fork": false,
"created_at": "2017-08-18T16:23:53Z",
"updated_at": "2018-06-27T07:59:10Z",
"pushed_at": "2017-08-18T16:30:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 100926724,
"name": "test",
"full_name": "chenzhuo0618\/test",
"owner": {
"login": "chenzhuo0618",
"id": 5562130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5562130?v=4",
"html_url": "https:\/\/github.com\/chenzhuo0618"
},
"html_url": "https:\/\/github.com\/chenzhuo0618\/test",
"description": "test for CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-21T07:46:16Z",
"updated_at": "2017-08-21T07:46:48Z",
"pushed_at": "2017-08-21T08:51:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 102318198,
"name": "CVE-2017-1000117",
"full_name": "siling2017\/CVE-2017-1000117",
"owner": {
"login": "siling2017",
"id": 27729343,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27729343?v=4",
"html_url": "https:\/\/github.com\/siling2017"
},
"html_url": "https:\/\/github.com\/siling2017\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-09-04T04:18:19Z",
"updated_at": "2017-09-04T04:18:29Z",
"pushed_at": "2017-09-04T04:18:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 112913757,
"name": "CVE-2017-1000117",
"full_name": "Q2h1Cg\/CVE-2017-1000117",
"owner": {
"login": "Q2h1Cg",
"id": 3953030,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3953030?v=4",
"html_url": "https:\/\/github.com\/Q2h1Cg"
},
"html_url": "https:\/\/github.com\/Q2h1Cg\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-12-03T08:58:18Z",
"updated_at": "2017-12-03T08:58:33Z",
"pushed_at": "2017-12-03T08:59:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 166267328,
"name": "cve-2017-1000117",
"full_name": "cved-sources\/cve-2017-1000117",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-1000117",
"description": "cve-2017-1000117",
"fork": false,
"created_at": "2019-01-17T17:28:01Z",
"updated_at": "2019-02-01T21:15:29Z",
"pushed_at": "2019-02-01T21:15:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 187589348,
"name": "CVE-2017-1000117",
"full_name": "leezp\/CVE-2017-1000117",
"owner": {
"login": "leezp",
"id": 16287528,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16287528?v=4",
"html_url": "https:\/\/github.com\/leezp"
},
"html_url": "https:\/\/github.com\/leezp\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2019-05-20T07:25:58Z",
"updated_at": "2019-05-20T07:55:33Z",
"pushed_at": "2019-05-20T07:55:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 192838091,
"name": "CVE-2017-1000117",
"full_name": "AnonymKing\/CVE-2017-1000117",
"owner": {
"login": "AnonymKing",
"id": 26847177,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26847177?v=4",
"html_url": "https:\/\/github.com\/AnonymKing"
},
"html_url": "https:\/\/github.com\/AnonymKing\/CVE-2017-1000117",
"description": "CVE-2017-1000117漏洞复现PoC+Exp",
"fork": false,
"created_at": "2019-06-20T02:55:19Z",
"updated_at": "2019-06-21T11:44:09Z",
"pushed_at": "2019-06-21T11:44:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 110457097,
"name": "CVE-2017-1000250-PoC",
"full_name": "olav-st\/CVE-2017-1000250-PoC",
"owner": {
"login": "olav-st",
"id": 1856634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1856634?v=4",
"html_url": "https:\/\/github.com\/olav-st"
},
"html_url": "https:\/\/github.com\/olav-st\/CVE-2017-1000250-PoC",
"description": "Proof of concept exploit script for CVE-2017-1000250. Written while researching for the essay in TTM4137 Wireless Security.",
"fork": false,
"created_at": "2017-11-12T18:18:52Z",
"updated_at": "2019-03-20T07:23:31Z",
"pushed_at": "2017-11-12T19:46:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -0,0 +1,94 @@
[
{
"id": 104546702,
"name": "Blueborne-CVE-2017-1000251",
"full_name": "hayzamjs\/Blueborne-CVE-2017-1000251",
"owner": {
"login": "hayzamjs",
"id": 3922884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3922884?v=4",
"html_url": "https:\/\/github.com\/hayzamjs"
},
"html_url": "https:\/\/github.com\/hayzamjs\/Blueborne-CVE-2017-1000251",
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
"fork": false,
"created_at": "2017-09-23T06:29:31Z",
"updated_at": "2020-11-04T16:52:04Z",
"pushed_at": "2017-10-11T17:46:21Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 13,
"forks": 13,
"watchers": 16,
"score": 0
},
{
"id": 105091487,
"name": "blueborne-CVE-2017-1000251",
"full_name": "tlatkdgus1\/blueborne-CVE-2017-1000251",
"owner": {
"login": "tlatkdgus1",
"id": 13446909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13446909?v=4",
"html_url": "https:\/\/github.com\/tlatkdgus1"
},
"html_url": "https:\/\/github.com\/tlatkdgus1\/blueborne-CVE-2017-1000251",
"description": "clone",
"fork": false,
"created_at": "2017-09-28T02:12:57Z",
"updated_at": "2017-09-28T02:19:14Z",
"pushed_at": "2017-09-28T02:19:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 105433963,
"name": "blueborne-CVE-2017-1000251-POC",
"full_name": "own2pwn\/blueborne-CVE-2017-1000251-POC",
"owner": {
"login": "own2pwn",
"id": 7850039,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7850039?v=4",
"html_url": "https:\/\/github.com\/own2pwn"
},
"html_url": "https:\/\/github.com\/own2pwn\/blueborne-CVE-2017-1000251-POC",
"description": null,
"fork": false,
"created_at": "2017-10-01T10:15:40Z",
"updated_at": "2018-11-16T07:29:50Z",
"pushed_at": "2017-10-01T10:23:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 110958300,
"name": "blueborne-CVE-2017-1000251",
"full_name": "marcinguy\/blueborne-CVE-2017-1000251",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/blueborne-CVE-2017-1000251",
"description": "Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC) BlueBorne - Proof of Concept - Unarmed\/Unweaponized - DoS (Crash) only",
"fork": false,
"created_at": "2017-11-16T10:35:05Z",
"updated_at": "2019-11-23T05:24:53Z",
"pushed_at": "2018-02-11T18:25:40Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 137769369,
"name": "PIE-Stack-Clash-CVE-2017-1000253",
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
"owner": {
"login": "RicterZ",
"id": 5282759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
"html_url": "https:\/\/github.com\/RicterZ"
},
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
"description": "Demo-ing CVE-2017-1000253 in a container",
"fork": false,
"created_at": "2018-06-18T15:22:01Z",
"updated_at": "2020-09-21T07:09:05Z",
"pushed_at": "2017-11-01T07:59:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 5,
"forks": 5,
"watchers": 0,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 112534496,
"name": "HugeDirtyCowPOC",
"full_name": "bindecy\/HugeDirtyCowPOC",
"owner": {
"login": "bindecy",
"id": 33990073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33990073?v=4",
"html_url": "https:\/\/github.com\/bindecy"
},
"html_url": "https:\/\/github.com\/bindecy\/HugeDirtyCowPOC",
"description": "A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)",
"fork": false,
"created_at": "2017-11-29T22:19:51Z",
"updated_at": "2021-01-20T12:50:48Z",
"pushed_at": "2017-11-30T00:24:14Z",
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 64,
"forks": 64,
"watchers": 200,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 118515767,
"name": "CVE-2017-1000475",
"full_name": "lajarajorge\/CVE-2017-1000475",
"owner": {
"login": "lajarajorge",
"id": 35707370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35707370?v=4",
"html_url": "https:\/\/github.com\/lajarajorge"
},
"html_url": "https:\/\/github.com\/lajarajorge\/CVE-2017-1000475",
"description": "Unquoted Path Service",
"fork": false,
"created_at": "2018-01-22T21:10:22Z",
"updated_at": "2018-01-22T21:10:22Z",
"pushed_at": "2018-01-22T21:34:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,51 @@
"forks": 20,
"watchers": 51,
"score": 0
},
{
"id": 153533103,
"name": "CVE-2017-1000486",
"full_name": "mogwailabs\/CVE-2017-1000486",
"owner": {
"login": "mogwailabs",
"id": 40667088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40667088?v=4",
"html_url": "https:\/\/github.com\/mogwailabs"
},
"html_url": "https:\/\/github.com\/mogwailabs\/CVE-2017-1000486",
"description": "Proof of Concept Exploit for PrimeFaces 5.x EL Injection (CVE-2017-1000486)",
"fork": false,
"created_at": "2018-10-17T22:47:30Z",
"updated_at": "2020-10-06T13:22:45Z",
"pushed_at": "2019-06-04T17:41:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 165310451,
"name": "cve-2017-1000486",
"full_name": "cved-sources\/cve-2017-1000486",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-1000486",
"description": "cve-2017-1000486",
"fork": false,
"created_at": "2019-01-11T21:11:14Z",
"updated_at": "2019-02-01T21:26:08Z",
"pushed_at": "2019-02-01T21:26:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 164232365,
"name": "5MMISSI-CVE-2017-1000499",
"full_name": "Villaquiranm\/5MMISSI-CVE-2017-1000499",
"owner": {
"login": "Villaquiranm",
"id": 22179290,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22179290?v=4",
"html_url": "https:\/\/github.com\/Villaquiranm"
},
"html_url": "https:\/\/github.com\/Villaquiranm\/5MMISSI-CVE-2017-1000499",
"description": null,
"fork": false,
"created_at": "2019-01-05T16:33:08Z",
"updated_at": "2019-01-13T11:38:09Z",
"pushed_at": "2019-01-13T11:38:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 126385112,
"name": "subpath-exploit",
"full_name": "bgeesaman\/subpath-exploit",
"owner": {
"login": "bgeesaman",
"id": 3769609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3769609?v=4",
"html_url": "https:\/\/github.com\/bgeesaman"
},
"html_url": "https:\/\/github.com\/bgeesaman\/subpath-exploit",
"description": "Writeup of CVE-2017-1002101 with sample \"exploit\"\/escape",
"fork": false,
"created_at": "2018-03-22T19:26:12Z",
"updated_at": "2020-07-16T15:36:01Z",
"pushed_at": "2018-03-23T13:41:20Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 0,
"forks": 0,
"watchers": 30,
"score": 0
}
]

25
2017/CVE-2017-10235.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 104800054,
"name": "vbox_cve_2017_10235",
"full_name": "fundacion-sadosky\/vbox_cve_2017_10235",
"owner": {
"login": "fundacion-sadosky",
"id": 30127931,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30127931?v=4",
"html_url": "https:\/\/github.com\/fundacion-sadosky"
},
"html_url": "https:\/\/github.com\/fundacion-sadosky\/vbox_cve_2017_10235",
"description": "[CVE-2017-10235] Description and PoC of VirtualBox E1000 device Buffer Overflow",
"fork": false,
"created_at": "2017-09-25T20:42:47Z",
"updated_at": "2021-03-02T03:08:34Z",
"pushed_at": "2018-01-15T19:26:45Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 5,
"forks": 5,
"watchers": 29,
"score": 0
}
]

View file

@ -1,4 +1,165 @@
[
{
"id": 115195951,
"name": "CVE-2017-10271",
"full_name": "1337g\/CVE-2017-10271",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-10271",
"description": "CVE-2017-10271 WEBLOGIC RCE (TESTED)",
"fork": false,
"created_at": "2017-12-23T13:04:23Z",
"updated_at": "2020-09-01T16:02:59Z",
"pushed_at": "2017-12-23T13:12:06Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 27,
"forks": 27,
"watchers": 38,
"score": 0
},
{
"id": 115311346,
"name": "CVE-2017-10271",
"full_name": "s3xy\/CVE-2017-10271",
"owner": {
"login": "s3xy",
"id": 34327996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34327996?v=4",
"html_url": "https:\/\/github.com\/s3xy"
},
"html_url": "https:\/\/github.com\/s3xy\/CVE-2017-10271",
"description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.",
"fork": false,
"created_at": "2017-12-25T06:11:54Z",
"updated_at": "2020-12-11T01:36:14Z",
"pushed_at": "2017-12-25T06:21:23Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 9,
"forks": 9,
"watchers": 24,
"score": 0
},
{
"id": 115339400,
"name": "PoCs-Weblogic_2017_10271",
"full_name": "ZH3FENG\/PoCs-Weblogic_2017_10271",
"owner": {
"login": "ZH3FENG",
"id": 20502660,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20502660?v=4",
"html_url": "https:\/\/github.com\/ZH3FENG"
},
"html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271",
"description": "Simplified PoC for Weblogic-CVE-2017-10271",
"fork": false,
"created_at": "2017-12-25T13:18:45Z",
"updated_at": "2019-03-19T07:31:45Z",
"pushed_at": "2017-12-25T13:23:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 115571903,
"name": "CVE-2017-10271",
"full_name": "c0mmand3rOpSec\/CVE-2017-10271",
"owner": {
"login": "c0mmand3rOpSec",
"id": 17217255,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17217255?v=4",
"html_url": "https:\/\/github.com\/c0mmand3rOpSec"
},
"html_url": "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271",
"description": "WebLogic Exploit",
"fork": false,
"created_at": "2017-12-28T01:30:50Z",
"updated_at": "2021-03-27T20:08:07Z",
"pushed_at": "2018-07-13T18:56:53Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 50,
"forks": 50,
"watchers": 131,
"score": 0
},
{
"id": 115596796,
"name": "CVE-2017-10271",
"full_name": "Luffin\/CVE-2017-10271",
"owner": {
"login": "Luffin",
"id": 13807870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13807870?v=4",
"html_url": "https:\/\/github.com\/Luffin"
},
"html_url": "https:\/\/github.com\/Luffin\/CVE-2017-10271",
"description": "CVE-2017-10271 POC",
"fork": false,
"created_at": "2017-12-28T07:19:13Z",
"updated_at": "2020-08-10T02:31:05Z",
"pushed_at": "2018-01-10T02:34:56Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 15,
"forks": 15,
"watchers": 29,
"score": 0
},
{
"id": 116099094,
"name": "weblogic_wls_wsat_rce",
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
"owner": {
"login": "cjjduck",
"id": 23519154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
"html_url": "https:\/\/github.com\/cjjduck"
},
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
"fork": false,
"created_at": "2018-01-03T06:14:28Z",
"updated_at": "2020-10-09T02:33:00Z",
"pushed_at": "2018-01-03T00:42:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 39,
"forks": 39,
"watchers": 3,
"score": 0
},
{
"id": 116430643,
"name": "CVE-2017-10271",
"full_name": "kkirsche\/CVE-2017-10271",
"owner": {
"login": "kkirsche",
"id": 947110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4",
"html_url": "https:\/\/github.com\/kkirsche"
},
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2017-10271",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-01-05T21:57:03Z",
"updated_at": "2021-02-16T11:16:05Z",
"pushed_at": "2018-01-26T14:28:58Z",
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 41,
"forks": 41,
"watchers": 120,
"score": 0
},
{
"id": 117624791,
"name": "CVE-2017-10271",
@ -22,6 +183,75 @@
"watchers": 4,
"score": 0
},
{
"id": 117926261,
"name": "cve-2017-10271-poc",
"full_name": "SuperHacker-liuan\/cve-2017-10271-poc",
"owner": {
"login": "SuperHacker-liuan",
"id": 30787037,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30787037?v=4",
"html_url": "https:\/\/github.com\/SuperHacker-liuan"
},
"html_url": "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc",
"description": "cve-2017-10271 POC",
"fork": false,
"created_at": "2018-01-18T03:21:15Z",
"updated_at": "2020-01-06T03:15:27Z",
"pushed_at": "2018-02-02T07:47:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 118044092,
"name": "CVE-2017-10271",
"full_name": "bmcculley\/CVE-2017-10271",
"owner": {
"login": "bmcculley",
"id": 6238704,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6238704?v=4",
"html_url": "https:\/\/github.com\/bmcculley"
},
"html_url": "https:\/\/github.com\/bmcculley\/CVE-2017-10271",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-01-18T22:07:33Z",
"updated_at": "2020-12-11T01:14:53Z",
"pushed_at": "2019-10-26T15:31:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 118144871,
"name": "Oracle-WebLogic-CVE-2017-10271",
"full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
"owner": {
"login": "peterpeter228",
"id": 22089258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22089258?v=4",
"html_url": "https:\/\/github.com\/peterpeter228"
},
"html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
"fork": false,
"created_at": "2018-01-19T15:50:08Z",
"updated_at": "2020-09-24T10:47:12Z",
"pushed_at": "2018-01-19T11:29:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 120571410,
"name": "weblogic_honeypot",
@ -45,6 +275,75 @@
"watchers": 22,
"score": 0
},
{
"id": 123384221,
"name": "weblogic_wls_rce_poc-exp",
"full_name": "JackyTsuuuy\/weblogic_wls_rce_poc-exp",
"owner": {
"login": "JackyTsuuuy",
"id": 9449527,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9449527?v=4",
"html_url": "https:\/\/github.com\/JackyTsuuuy"
},
"html_url": "https:\/\/github.com\/JackyTsuuuy\/weblogic_wls_rce_poc-exp",
"description": "cve-2017-10271",
"fork": false,
"created_at": "2018-03-01T04:57:09Z",
"updated_at": "2020-07-31T16:12:20Z",
"pushed_at": "2018-03-01T05:08:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 125456636,
"name": "Oracle-WebLogic-WLS-WSAT",
"full_name": "s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT",
"owner": {
"login": "s0wr0b1ndef",
"id": 37288034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37288034?v=4",
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
},
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-03-16T03:09:29Z",
"updated_at": "2021-01-20T09:27:18Z",
"pushed_at": "2018-03-16T03:14:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 139956588,
"name": "Oracle-WebLogic-CVE-2017-10271-master",
"full_name": "lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
"owner": {
"login": "lonehand",
"id": 20275278,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20275278?v=4",
"html_url": "https:\/\/github.com\/lonehand"
},
"html_url": "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
"description": null,
"fork": false,
"created_at": "2018-07-06T08:32:28Z",
"updated_at": "2019-06-27T03:08:05Z",
"pushed_at": "2018-07-06T08:42:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 148616806,
"name": "javaserializetools",
@ -68,6 +367,190 @@
"watchers": 271,
"score": 0
},
{
"id": 160370962,
"name": "CVE-2017-10271",
"full_name": "nhwuxiaojun\/CVE-2017-10271",
"owner": {
"login": "nhwuxiaojun",
"id": 15905850,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15905850?v=4",
"html_url": "https:\/\/github.com\/nhwuxiaojun"
},
"html_url": "https:\/\/github.com\/nhwuxiaojun\/CVE-2017-10271",
"description": "Weblogic(CVE-2017-10271)",
"fork": false,
"created_at": "2018-12-04T14:34:10Z",
"updated_at": "2020-06-10T02:53:11Z",
"pushed_at": "2018-12-04T14:45:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 161570094,
"name": "JavaDeserialization",
"full_name": "ETOCheney\/JavaDeserialization",
"owner": {
"login": "ETOCheney",
"id": 28469578,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28469578?v=4",
"html_url": "https:\/\/github.com\/ETOCheney"
},
"html_url": "https:\/\/github.com\/ETOCheney\/JavaDeserialization",
"description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器",
"fork": false,
"created_at": "2018-12-13T02:00:23Z",
"updated_at": "2020-10-28T10:00:45Z",
"pushed_at": "2018-12-13T14:05:28Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 165317811,
"name": "cve-2017-10271",
"full_name": "cved-sources\/cve-2017-10271",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-10271",
"description": "cve-2017-10271",
"fork": false,
"created_at": "2019-01-11T22:11:16Z",
"updated_at": "2019-01-11T22:11:38Z",
"pushed_at": "2019-01-11T22:11:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 175729381,
"name": "Oracle-WebLogic-CVE-2017-10271",
"full_name": "XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
"owner": {
"login": "XHSecurity",
"id": 48574583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48574583?v=4",
"html_url": "https:\/\/github.com\/XHSecurity"
},
"html_url": "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
"description": "Oracle-WebLogic-CVE-2017-10271",
"fork": false,
"created_at": "2019-03-15T01:50:01Z",
"updated_at": "2020-12-11T01:36:32Z",
"pushed_at": "2019-03-15T01:51:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 176763123,
"name": "Weblogic_Wsat_RCE",
"full_name": "kbsec\/Weblogic_Wsat_RCE",
"owner": {
"login": "kbsec",
"id": 11823496,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11823496?v=4",
"html_url": "https:\/\/github.com\/kbsec"
},
"html_url": "https:\/\/github.com\/kbsec\/Weblogic_Wsat_RCE",
"description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ",
"fork": false,
"created_at": "2019-03-20T15:26:55Z",
"updated_at": "2019-12-19T13:44:39Z",
"pushed_at": "2019-03-27T17:47:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 183346706,
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"owner": {
"login": "SkyBlueEternal",
"id": 46418185,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46418185?v=4",
"html_url": "https:\/\/github.com\/SkyBlueEternal"
},
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2020-12-15T07:25:50Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 37,
"forks": 37,
"watchers": 104,
"score": 0
},
{
"id": 183428186,
"name": "WebLogic_CNVD_C_2019_48814",
"full_name": "Yuusuke4\/WebLogic_CNVD_C_2019_48814",
"owner": {
"login": "Yuusuke4",
"id": 26989867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26989867?v=4",
"html_url": "https:\/\/github.com\/Yuusuke4"
},
"html_url": "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814",
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271",
"fork": false,
"created_at": "2019-04-25T12:18:16Z",
"updated_at": "2019-04-25T12:33:00Z",
"pushed_at": "2019-04-25T12:10:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 183430704,
"name": "WebLogic_CNVD_C2019_48814",
"full_name": "7kbstorm\/WebLogic_CNVD_C2019_48814",
"owner": {
"login": "7kbstorm",
"id": 38887063,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38887063?v=4",
"html_url": "https:\/\/github.com\/7kbstorm"
},
"html_url": "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814",
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm",
"fork": false,
"created_at": "2019-04-25T12:33:31Z",
"updated_at": "2021-01-21T00:29:17Z",
"pushed_at": "2019-04-25T12:44:02Z",
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 53,
"forks": 53,
"watchers": 114,
"score": 0
},
{
"id": 219752851,
"name": "-CVE-2017-10271-",

25
2017/CVE-2017-10352.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 121908591,
"name": "weblogic-XMLDecoder",
"full_name": "bigsizeme\/weblogic-XMLDecoder",
"owner": {
"login": "bigsizeme",
"id": 17845094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
"html_url": "https:\/\/github.com\/bigsizeme"
},
"html_url": "https:\/\/github.com\/bigsizeme\/weblogic-XMLDecoder",
"description": "CVE-2017-10352 CVE-2017-10271 weblogic-XMLDecoder",
"fork": false,
"created_at": "2018-02-18T01:40:33Z",
"updated_at": "2020-01-30T15:24:26Z",
"pushed_at": "2018-02-25T02:01:19Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"forks": 7,
"watchers": 8,
"score": 0
}
]

25
2017/CVE-2017-10366.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 147225109,
"name": "CVE-2017-10366_peoplesoft",
"full_name": "blazeinfosec\/CVE-2017-10366_peoplesoft",
"owner": {
"login": "blazeinfosec",
"id": 16681975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16681975?v=4",
"html_url": "https:\/\/github.com\/blazeinfosec"
},
"html_url": "https:\/\/github.com\/blazeinfosec\/CVE-2017-10366_peoplesoft",
"description": "CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit",
"fork": false,
"created_at": "2018-09-03T15:46:39Z",
"updated_at": "2020-12-15T08:00:30Z",
"pushed_at": "2018-09-04T10:07:06Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 5,
"forks": 5,
"watchers": 26,
"score": 0
}
]

25
2017/CVE-2017-10617.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 106521526,
"name": "CVE-2017-10617",
"full_name": "gteissier\/CVE-2017-10617",
"owner": {
"login": "gteissier",
"id": 201614,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/201614?v=4",
"html_url": "https:\/\/github.com\/gteissier"
},
"html_url": "https:\/\/github.com\/gteissier\/CVE-2017-10617",
"description": "Contrail: hard coded credentials (CVE-2017-10616) and XML External Entity (XXE) vulnerability (CVE-2017-10617)",
"fork": false,
"created_at": "2017-10-11T07:38:18Z",
"updated_at": "2019-07-30T17:47:51Z",
"pushed_at": "2019-02-22T06:03:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-10661.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100021936,
"name": "CVE-2017-10661_POC",
"full_name": "GeneBlue\/CVE-2017-10661_POC",
"owner": {
"login": "GeneBlue",
"id": 10919709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10919709?v=4",
"html_url": "https:\/\/github.com\/GeneBlue"
},
"html_url": "https:\/\/github.com\/GeneBlue\/CVE-2017-10661_POC",
"description": "poc for cve-2017-10661",
"fork": false,
"created_at": "2017-08-11T10:45:10Z",
"updated_at": "2020-12-17T10:26:55Z",
"pushed_at": "2017-08-11T10:45:56Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"score": 0
}
]

25
2017/CVE-2017-10797.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 119376202,
"name": "CVE-2017-10797",
"full_name": "n4xh4ck5\/CVE-2017-10797",
"owner": {
"login": "n4xh4ck5",
"id": 26029224,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26029224?v=4",
"html_url": "https:\/\/github.com\/n4xh4ck5"
},
"html_url": "https:\/\/github.com\/n4xh4ck5\/CVE-2017-10797",
"description": "CVE-2017-10797- User Enumeration in OwnCloud Server 8.1-10.0",
"fork": false,
"created_at": "2018-01-29T11:53:14Z",
"updated_at": "2020-03-26T17:06:19Z",
"pushed_at": "2018-01-29T11:56:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 151221014,
"name": "cve-2017-11176",
"full_name": "lexfo\/cve-2017-11176",
"owner": {
"login": "lexfo",
"id": 23701097,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23701097?v=4",
"html_url": "https:\/\/github.com\/lexfo"
},
"html_url": "https:\/\/github.com\/lexfo\/cve-2017-11176",
"description": null,
"fork": false,
"created_at": "2018-10-02T08:06:04Z",
"updated_at": "2020-11-28T22:25:57Z",
"pushed_at": "2018-10-02T10:27:06Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 8,
"forks": 8,
"watchers": 20,
"score": 0
},
{
"id": 157327850,
"name": "cve-2017-11176",
"full_name": "DoubleMice\/cve-2017-11176",
"owner": {
"login": "DoubleMice",
"id": 22325256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22325256?v=4",
"html_url": "https:\/\/github.com\/DoubleMice"
},
"html_url": "https:\/\/github.com\/DoubleMice\/cve-2017-11176",
"description": "My first try to code my own LPE exploit.",
"fork": false,
"created_at": "2018-11-13T05:55:03Z",
"updated_at": "2018-11-22T03:50:39Z",
"pushed_at": "2018-11-22T03:50:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 201151172,
"name": "CVE-2017-11176",
"full_name": "HckEX\/CVE-2017-11176",
"owner": {
"login": "HckEX",
"id": 33862757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33862757?v=4",
"html_url": "https:\/\/github.com\/HckEX"
},
"html_url": "https:\/\/github.com\/HckEX\/CVE-2017-11176",
"description": null,
"fork": false,
"created_at": "2019-08-08T01:02:52Z",
"updated_at": "2019-08-08T01:03:36Z",
"pushed_at": "2019-08-08T01:03:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 216932661,
"name": "cve-2017-11176",

25
2017/CVE-2017-11427.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 123645081,
"name": "CVE-2017-11427-DEMO",
"full_name": "CHYbeta\/CVE-2017-11427-DEMO",
"owner": {
"login": "CHYbeta",
"id": 18642224,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18642224?v=4",
"html_url": "https:\/\/github.com\/CHYbeta"
},
"html_url": "https:\/\/github.com\/CHYbeta\/CVE-2017-11427-DEMO",
"description": "The Demo for CVE-2017-11427",
"fork": false,
"created_at": "2018-03-03T00:29:22Z",
"updated_at": "2020-02-12T13:05:42Z",
"pushed_at": "2018-03-03T04:40:10Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 2,
"forks": 2,
"watchers": 12,
"score": 0
}
]

25
2017/CVE-2017-11503.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 126858445,
"name": "download",
"full_name": "wizardafric\/download",
"owner": {
"login": "wizardafric",
"id": 37772539,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37772539?v=4",
"html_url": "https:\/\/github.com\/wizardafric"
},
"html_url": "https:\/\/github.com\/wizardafric\/download",
"description": "(https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2017-11503",
"fork": false,
"created_at": "2018-03-26T16:35:17Z",
"updated_at": "2018-03-27T13:50:20Z",
"pushed_at": "2018-03-27T13:50:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-11519.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 137827933,
"name": "tplink-CVE-2017-11519",
"full_name": "vakzz\/tplink-CVE-2017-11519",
"owner": {
"login": "vakzz",
"id": 26542189,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26542189?v=4",
"html_url": "https:\/\/github.com\/vakzz"
},
"html_url": "https:\/\/github.com\/vakzz\/tplink-CVE-2017-11519",
"description": "POC for TP-Link Archer C9 - Admin Password Reset and RCE (CVE-2017-11519)",
"fork": false,
"created_at": "2018-06-19T02:04:38Z",
"updated_at": "2020-03-26T01:19:54Z",
"pushed_at": "2018-06-19T02:12:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-11611.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 101361478,
"name": "Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"full_name": "faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"owner": {
"login": "faizzaidi",
"id": 12153050,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12153050?v=4",
"html_url": "https:\/\/github.com\/faizzaidi"
},
"html_url": "https:\/\/github.com\/faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"description": "WolfCMS-v0.8.3.1 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-11611",
"fork": false,
"created_at": "2017-08-25T03:19:05Z",
"updated_at": "2020-07-17T05:22:39Z",
"pushed_at": "2017-08-25T03:19:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-11774.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 202635955,
"name": "SniperRoost",
"full_name": "devcoinfet\/SniperRoost",
"owner": {
"login": "devcoinfet",
"id": 34756993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34756993?v=4",
"html_url": "https:\/\/github.com\/devcoinfet"
},
"html_url": "https:\/\/github.com\/devcoinfet\/SniperRoost",
"description": "used to generate a valid attack chain to exploit CVE-2017-11774 tied to iranian apt only reasearch poc dont use for harm please",
"fork": false,
"created_at": "2019-08-16T01:25:13Z",
"updated_at": "2020-02-12T10:05:32Z",
"pushed_at": "2019-08-16T01:28:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-11816.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 106789971,
"name": "CVE-2017-11816",
"full_name": "lr3800\/CVE-2017-11816",
"owner": {
"login": "lr3800",
"id": 22863274,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22863274?v=4",
"html_url": "https:\/\/github.com\/lr3800"
},
"html_url": "https:\/\/github.com\/lr3800\/CVE-2017-11816",
"description": null,
"fork": false,
"created_at": "2017-10-13T07:05:55Z",
"updated_at": "2017-10-13T07:05:55Z",
"pushed_at": "2017-10-13T14:25:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,510 @@
[
{
"id": 111305094,
"name": "cve-2017-11882",
"full_name": "zhouat\/cve-2017-11882",
"owner": {
"login": "zhouat",
"id": 8078184,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8078184?v=4",
"html_url": "https:\/\/github.com\/zhouat"
},
"html_url": "https:\/\/github.com\/zhouat\/cve-2017-11882",
"description": null,
"fork": false,
"created_at": "2017-11-19T14:57:41Z",
"updated_at": "2017-11-21T09:11:26Z",
"pushed_at": "2017-11-18T14:21:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 111435936,
"name": "CVE-2017-11882",
"full_name": "embedi\/CVE-2017-11882",
"owner": {
"login": "embedi",
"id": 24190344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
"html_url": "https:\/\/github.com\/embedi"
},
"html_url": "https:\/\/github.com\/embedi\/CVE-2017-11882",
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2021-03-31T01:08:18Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 481,
"watchers_count": 481,
"forks_count": 199,
"forks": 199,
"watchers": 481,
"score": 0
},
{
"id": 111505810,
"name": "CVE-2017-11882",
"full_name": "Ridter\/CVE-2017-11882",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter"
},
"html_url": "https:\/\/github.com\/Ridter\/CVE-2017-11882",
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2021-03-31T02:07:32Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 486,
"watchers_count": 486,
"forks_count": 243,
"forks": 243,
"watchers": 486,
"score": 0
},
{
"id": 111525857,
"name": "2017-11882_Generator",
"full_name": "BlackMathIT\/2017-11882_Generator",
"owner": {
"login": "BlackMathIT",
"id": 26303870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26303870?v=4",
"html_url": "https:\/\/github.com\/BlackMathIT"
},
"html_url": "https:\/\/github.com\/BlackMathIT\/2017-11882_Generator",
"description": "CVE-2017-11882 File Generator PoC",
"fork": false,
"created_at": "2017-11-21T09:15:28Z",
"updated_at": "2021-02-24T12:48:33Z",
"pushed_at": "2017-11-22T08:38:18Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 25,
"forks": 25,
"watchers": 32,
"score": 0
},
{
"id": 111566147,
"name": "CVE-2017-11882",
"full_name": "unamer\/CVE-2017-11882",
"owner": {
"login": "unamer",
"id": 12728984,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12728984?v=4",
"html_url": "https:\/\/github.com\/unamer"
},
"html_url": "https:\/\/github.com\/unamer\/CVE-2017-11882",
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2021-04-09T13:41:23Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 280,
"watchers_count": 280,
"forks_count": 83,
"forks": 83,
"watchers": 280,
"score": 0
},
{
"id": 111585219,
"name": "CVE-2017-11882-metasploit",
"full_name": "0x09AL\/CVE-2017-11882-metasploit",
"owner": {
"login": "0x09AL",
"id": 25826294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25826294?v=4",
"html_url": "https:\/\/github.com\/0x09AL"
},
"html_url": "https:\/\/github.com\/0x09AL\/CVE-2017-11882-metasploit",
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
"fork": false,
"created_at": "2017-11-21T18:17:28Z",
"updated_at": "2020-09-30T09:12:42Z",
"pushed_at": "2017-11-21T20:34:57Z",
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 50,
"forks": 50,
"watchers": 94,
"score": 0
},
{
"id": 111601525,
"name": "ABC",
"full_name": "HZachev\/ABC",
"owner": {
"login": "HZachev",
"id": 33879843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33879843?v=4",
"html_url": "https:\/\/github.com\/HZachev"
},
"html_url": "https:\/\/github.com\/HZachev\/ABC",
"description": "CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T21:07:57Z",
"updated_at": "2017-11-21T21:07:57Z",
"pushed_at": "2017-11-21T22:04:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 111619944,
"name": "CVE-2017-11882",
"full_name": "starnightcyber\/CVE-2017-11882",
"owner": {
"login": "starnightcyber",
"id": 19260696,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19260696?v=4",
"html_url": "https:\/\/github.com\/starnightcyber"
},
"html_url": "https:\/\/github.com\/starnightcyber\/CVE-2017-11882",
"description": "CVE-2017-11882 exploitation",
"fork": false,
"created_at": "2017-11-22T01:11:39Z",
"updated_at": "2021-03-10T22:29:20Z",
"pushed_at": "2017-11-28T03:06:32Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 53,
"forks": 53,
"watchers": 39,
"score": 0
},
{
"id": 111637919,
"name": "CVE-2017-11882",
"full_name": "Grey-Li\/CVE-2017-11882",
"owner": {
"login": "Grey-Li",
"id": 33873392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33873392?v=4",
"html_url": "https:\/\/github.com\/Grey-Li"
},
"html_url": "https:\/\/github.com\/Grey-Li\/CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2017-11-22T04:53:44Z",
"updated_at": "2017-11-22T04:54:38Z",
"pushed_at": "2017-11-22T04:54:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 111887551,
"name": "CVE-2017-11882-for-Kali",
"full_name": "legendsec\/CVE-2017-11882-for-Kali",
"owner": {
"login": "legendsec",
"id": 13389492,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13389492?v=4",
"html_url": "https:\/\/github.com\/legendsec"
},
"html_url": "https:\/\/github.com\/legendsec\/CVE-2017-11882-for-Kali",
"description": "# CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to \/usr\/share\/metasploit-framework\/modules\/exploits\/windows\/local\/ 2) Copy the cve-2017-11882.rtf to \/usr\/share\/metasploit-framework\/data\/exploits\/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time.",
"fork": false,
"created_at": "2017-11-24T07:11:13Z",
"updated_at": "2017-11-24T07:11:13Z",
"pushed_at": "2017-11-24T07:11:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 111904379,
"name": "cve-2017-11882",
"full_name": "CSC-pentest\/cve-2017-11882",
"owner": {
"login": "CSC-pentest",
"id": 33954862,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33954862?v=4",
"html_url": "https:\/\/github.com\/CSC-pentest"
},
"html_url": "https:\/\/github.com\/CSC-pentest\/cve-2017-11882",
"description": null,
"fork": false,
"created_at": "2017-11-24T10:09:49Z",
"updated_at": "2017-11-24T10:09:49Z",
"pushed_at": "2017-11-24T10:13:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 112133932,
"name": "CVE-2017-11882-",
"full_name": "Shadowshusky\/CVE-2017-11882-",
"owner": {
"login": "Shadowshusky",
"id": 31649758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31649758?v=4",
"html_url": "https:\/\/github.com\/Shadowshusky"
},
"html_url": "https:\/\/github.com\/Shadowshusky\/CVE-2017-11882-",
"description": null,
"fork": false,
"created_at": "2017-11-27T01:50:44Z",
"updated_at": "2021-03-10T22:04:44Z",
"pushed_at": "2017-11-27T01:50:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 117080574,
"name": "CVE-2018-0802",
"full_name": "rxwx\/CVE-2018-0802",
"owner": {
"login": "rxwx",
"id": 2202542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
"html_url": "https:\/\/github.com\/rxwx"
},
"html_url": "https:\/\/github.com\/rxwx\/CVE-2018-0802",
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2021-03-30T10:12:35Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 266,
"watchers_count": 266,
"forks_count": 135,
"forks": 135,
"watchers": 266,
"score": 0
},
{
"id": 117234193,
"name": "RTF_11882_0802",
"full_name": "Ridter\/RTF_11882_0802",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter"
},
"html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802",
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2021-03-11T01:08:36Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 64,
"forks": 64,
"watchers": 157,
"score": 0
},
{
"id": 117637164,
"name": "CVE-2017-11882",
"full_name": "likescam\/CVE-2017-11882",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2018-01-16T05:47:47Z",
"updated_at": "2018-01-16T05:47:59Z",
"pushed_at": "2018-01-16T05:47:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 117637270,
"name": "CVE-2018-0802_CVE-2017-11882",
"full_name": "likescam\/CVE-2018-0802_CVE-2017-11882",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2018-01-16T05:49:01Z",
"updated_at": "2021-03-11T01:10:37Z",
"pushed_at": "2018-01-16T05:49:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"forks": 4,
"watchers": 9,
"score": 0
},
{
"id": 130633082,
"name": "CVE-2017-11882-Possible-Remcos-Malspam",
"full_name": "bloomer1016\/CVE-2017-11882-Possible-Remcos-Malspam",
"owner": {
"login": "bloomer1016",
"id": 12056770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12056770?v=4",
"html_url": "https:\/\/github.com\/bloomer1016"
},
"html_url": "https:\/\/github.com\/bloomer1016\/CVE-2017-11882-Possible-Remcos-Malspam",
"description": null,
"fork": false,
"created_at": "2018-04-23T03:07:25Z",
"updated_at": "2020-03-29T03:28:55Z",
"pushed_at": "2018-04-23T03:08:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 132171985,
"name": "CVE-2017-11882",
"full_name": "ChaitanyaHaritash\/CVE-2017-11882",
"owner": {
"login": "ChaitanyaHaritash",
"id": 16261173,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16261173?v=4",
"html_url": "https:\/\/github.com\/ChaitanyaHaritash"
},
"html_url": "https:\/\/github.com\/ChaitanyaHaritash\/CVE-2017-11882",
"description": "Empire Port of CVE-2017-11882",
"fork": false,
"created_at": "2018-05-04T17:50:57Z",
"updated_at": "2020-10-27T03:32:18Z",
"pushed_at": "2018-05-04T17:53:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 139015885,
"name": "https-github.com-Ridter-CVE-2017-11882-",
"full_name": "qy1202\/https-github.com-Ridter-CVE-2017-11882-",
"owner": {
"login": "qy1202",
"id": 40664300,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40664300?v=4",
"html_url": "https:\/\/github.com\/qy1202"
},
"html_url": "https:\/\/github.com\/qy1202\/https-github.com-Ridter-CVE-2017-11882-",
"description": null,
"fork": false,
"created_at": "2018-06-28T12:35:53Z",
"updated_at": "2018-06-28T12:35:53Z",
"pushed_at": "2018-06-28T12:35:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 154284917,
"name": "CVE-2017-11882",
"full_name": "j0lama\/CVE-2017-11882",
"owner": {
"login": "j0lama",
"id": 17393029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17393029?v=4",
"html_url": "https:\/\/github.com\/j0lama"
},
"html_url": "https:\/\/github.com\/j0lama\/CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2018-10-23T07:44:39Z",
"updated_at": "2018-11-05T22:36:38Z",
"pushed_at": "2018-10-23T07:46:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 156669000,
"name": "IDB_Share",
"full_name": "R0fM1a\/IDB_Share",
"owner": {
"login": "R0fM1a",
"id": 44599121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44599121?v=4",
"html_url": "https:\/\/github.com\/R0fM1a"
},
"html_url": "https:\/\/github.com\/R0fM1a\/IDB_Share",
"description": "CVE-2017-11882 analyse notebook",
"fork": false,
"created_at": "2018-11-08T07:44:32Z",
"updated_at": "2018-11-08T10:27:41Z",
"pushed_at": "2018-11-08T10:27:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 161162866,
"name": "CVE-2017-11882",
"full_name": "chanbin\/CVE-2017-11882",
"owner": {
"login": "chanbin",
"id": 24631331,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24631331?v=4",
"html_url": "https:\/\/github.com\/chanbin"
},
"html_url": "https:\/\/github.com\/chanbin\/CVE-2017-11882",
"description": "Microsoft Equation 3.0\/Convert python2 to python3",
"fork": false,
"created_at": "2018-12-10T11:15:15Z",
"updated_at": "2018-12-10T13:19:33Z",
"pushed_at": "2018-12-10T11:18:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 202340795,
"name": "CVE-2017-11882",

25
2017/CVE-2017-11907.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 133616005,
"name": "CVE-2017-11907",
"full_name": "AV1080p\/CVE-2017-11907",
"owner": {
"login": "AV1080p",
"id": 21303759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21303759?v=4",
"html_url": "https:\/\/github.com\/AV1080p"
},
"html_url": "https:\/\/github.com\/AV1080p\/CVE-2017-11907",
"description": "Windows: heap overflow in jscript.dll in Array.sort",
"fork": false,
"created_at": "2018-05-16T05:42:39Z",
"updated_at": "2019-08-26T16:40:29Z",
"pushed_at": "2018-05-16T05:51:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"score": 0
}
]

94
2017/CVE-2017-12149.json Normal file
View file

@ -0,0 +1,94 @@
[
{
"id": 111536144,
"name": "CVE-2017-12149",
"full_name": "sevck\/CVE-2017-12149",
"owner": {
"login": "sevck",
"id": 11308052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11308052?v=4",
"html_url": "https:\/\/github.com\/sevck"
},
"html_url": "https:\/\/github.com\/sevck\/CVE-2017-12149",
"description": "CVE-2017-12149 JBOSS as 6.X反序列化(反弹shell版)",
"fork": false,
"created_at": "2017-11-21T10:48:24Z",
"updated_at": "2021-01-28T01:58:11Z",
"pushed_at": "2017-11-22T06:59:57Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 11,
"forks": 11,
"watchers": 20,
"score": 0
},
{
"id": 112277258,
"name": "jboss-_CVE-2017-12149",
"full_name": "yunxu1\/jboss-_CVE-2017-12149",
"owner": {
"login": "yunxu1",
"id": 9799921,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9799921?v=4",
"html_url": "https:\/\/github.com\/yunxu1"
},
"html_url": "https:\/\/github.com\/yunxu1\/jboss-_CVE-2017-12149",
"description": "CVE-2017-12149 jboss反序列化 可回显",
"fork": false,
"created_at": "2017-11-28T02:52:47Z",
"updated_at": "2021-04-10T11:17:26Z",
"pushed_at": "2019-03-13T08:57:50Z",
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 40,
"forks": 40,
"watchers": 109,
"score": 0
},
{
"id": 115089440,
"name": "CVE-2017-12149",
"full_name": "1337g\/CVE-2017-12149",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-12149",
"description": "CVE-2017-12149 JBOSS RCE (TESTED) ",
"fork": false,
"created_at": "2017-12-22T07:30:29Z",
"updated_at": "2020-03-10T20:03:04Z",
"pushed_at": "2017-12-23T06:43:16Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 10,
"forks": 10,
"watchers": 10,
"score": 0
},
{
"id": 203873391,
"name": "CVE-2017-12149",
"full_name": "jreppiks\/CVE-2017-12149",
"owner": {
"login": "jreppiks",
"id": 31517228,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31517228?v=4",
"html_url": "https:\/\/github.com\/jreppiks"
},
"html_url": "https:\/\/github.com\/jreppiks\/CVE-2017-12149",
"description": "Jboss Java Deserialization RCE (CVE-2017-12149)",
"fork": false,
"created_at": "2019-08-22T21:06:09Z",
"updated_at": "2021-03-11T03:14:36Z",
"pushed_at": "2019-08-22T21:08:14Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"score": 0
}
]

25
2017/CVE-2017-12426.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100264267,
"name": "CVE-2017-12426",
"full_name": "sm-paul-schuette\/CVE-2017-12426",
"owner": {
"login": "sm-paul-schuette",
"id": 29304646,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29304646?v=4",
"html_url": "https:\/\/github.com\/sm-paul-schuette"
},
"html_url": "https:\/\/github.com\/sm-paul-schuette\/CVE-2017-12426",
"description": null,
"fork": false,
"created_at": "2017-08-14T12:18:15Z",
"updated_at": "2017-08-14T12:18:15Z",
"pushed_at": "2017-08-14T12:19:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

48
2017/CVE-2017-12542.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 120347425,
"name": "CVE-2017-12542",
"full_name": "skelsec\/CVE-2017-12542",
"owner": {
"login": "skelsec",
"id": 19204702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19204702?v=4",
"html_url": "https:\/\/github.com\/skelsec"
},
"html_url": "https:\/\/github.com\/skelsec\/CVE-2017-12542",
"description": "Test and exploit for CVE-2017-12542",
"fork": false,
"created_at": "2018-02-05T18:55:56Z",
"updated_at": "2021-03-03T00:00:24Z",
"pushed_at": "2018-04-15T12:01:38Z",
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 30,
"forks": 30,
"watchers": 78,
"score": 0
},
{
"id": 202627780,
"name": "ilo4-rce-vuln-scanner",
"full_name": "sk1dish\/ilo4-rce-vuln-scanner",
"owner": {
"login": "sk1dish",
"id": 46909212,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46909212?v=4",
"html_url": "https:\/\/github.com\/sk1dish"
},
"html_url": "https:\/\/github.com\/sk1dish\/ilo4-rce-vuln-scanner",
"description": "Scan a list of given IP's for CVE-2017-12542",
"fork": false,
"created_at": "2019-08-16T00:03:29Z",
"updated_at": "2019-08-23T17:40:31Z",
"pushed_at": "2019-08-22T23:27:41Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

25
2017/CVE-2017-12611.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 102809812,
"name": "S2-053-CVE-2017-12611",
"full_name": "brianwrf\/S2-053-CVE-2017-12611",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/S2-053-CVE-2017-12611",
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
"fork": false,
"created_at": "2017-09-08T02:50:37Z",
"updated_at": "2020-12-14T01:19:43Z",
"pushed_at": "2017-09-08T11:59:20Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 24,
"forks": 24,
"watchers": 38,
"score": 0
}
]

View file

@ -22,6 +22,167 @@
"watchers": 81,
"score": 0
},
{
"id": 104743685,
"name": "cve-2017-12615",
"full_name": "mefulton\/cve-2017-12615",
"owner": {
"login": "mefulton",
"id": 27797094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27797094?v=4",
"html_url": "https:\/\/github.com\/mefulton"
},
"html_url": "https:\/\/github.com\/mefulton\/cve-2017-12615",
"description": "just a python script for cve-2017-12615",
"fork": false,
"created_at": "2017-09-25T11:53:02Z",
"updated_at": "2019-04-28T08:33:21Z",
"pushed_at": "2017-10-01T08:13:44Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"score": 0
},
{
"id": 106053959,
"name": "POC-CVE-2017-12615-or-CVE-2017-12717",
"full_name": "zi0Black\/POC-CVE-2017-12615-or-CVE-2017-12717",
"owner": {
"login": "zi0Black",
"id": 13380579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13380579?v=4",
"html_url": "https:\/\/github.com\/zi0Black"
},
"html_url": "https:\/\/github.com\/zi0Black\/POC-CVE-2017-12615-or-CVE-2017-12717",
"description": "CVE-2017-12617 and CVE-2017-12615 for tomcat server",
"fork": false,
"created_at": "2017-10-06T22:04:23Z",
"updated_at": "2019-03-06T16:07:08Z",
"pushed_at": "2017-10-10T14:23:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 109152824,
"name": "cve-2017-12615",
"full_name": "wsg00d\/cve-2017-12615",
"owner": {
"login": "wsg00d",
"id": 20575929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20575929?v=4",
"html_url": "https:\/\/github.com\/wsg00d"
},
"html_url": "https:\/\/github.com\/wsg00d\/cve-2017-12615",
"description": "tomcat-put-cve-2017-12615",
"fork": false,
"created_at": "2017-11-01T16:05:32Z",
"updated_at": "2018-04-30T18:16:21Z",
"pushed_at": "2017-11-01T16:12:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 112277075,
"name": "CVE-2017-12615",
"full_name": "BeyondCy\/CVE-2017-12615",
"owner": {
"login": "BeyondCy",
"id": 4694785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4694785?v=4",
"html_url": "https:\/\/github.com\/BeyondCy"
},
"html_url": "https:\/\/github.com\/BeyondCy\/CVE-2017-12615",
"description": "Tomcat 远程代码执行漏洞 Exploit",
"fork": false,
"created_at": "2017-11-28T02:51:16Z",
"updated_at": "2020-11-28T11:13:12Z",
"pushed_at": "2017-10-18T13:15:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 115383252,
"name": "CVE-2017-12615",
"full_name": "1337g\/CVE-2017-12615",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-12615",
"description": "CVE-2017-12615 Tomcat RCE (TESTED)",
"fork": false,
"created_at": "2017-12-26T03:48:14Z",
"updated_at": "2018-04-30T18:15:17Z",
"pushed_at": "2017-12-26T12:38:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 127641351,
"name": "CVE-2017-12615",
"full_name": "Shellkeys\/CVE-2017-12615",
"owner": {
"login": "Shellkeys",
"id": 33480760,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33480760?v=4",
"html_url": "https:\/\/github.com\/Shellkeys"
},
"html_url": "https:\/\/github.com\/Shellkeys\/CVE-2017-12615",
"description": "tomcat7.x远程命令执行",
"fork": false,
"created_at": "2018-04-01T15:22:51Z",
"updated_at": "2018-04-01T15:22:51Z",
"pushed_at": "2018-04-01T15:22:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 166267639,
"name": "cve-2017-12615",
"full_name": "cved-sources\/cve-2017-12615",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-12615",
"description": "cve-2017-12615",
"fork": false,
"created_at": "2019-01-17T17:30:03Z",
"updated_at": "2019-02-01T21:26:56Z",
"pushed_at": "2019-02-01T21:26:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 235126563,
"name": "CVE-2017-12615",

View file

@ -1,4 +1,96 @@
[
{
"id": 105951164,
"name": "CVE-2017-12617",
"full_name": "cyberheartmi9\/CVE-2017-12617",
"owner": {
"login": "cyberheartmi9",
"id": 12415756,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12415756?v=4",
"html_url": "https:\/\/github.com\/cyberheartmi9"
},
"html_url": "https:\/\/github.com\/cyberheartmi9\/CVE-2017-12617",
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2021-04-03T09:31:19Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 354,
"watchers_count": 354,
"forks_count": 133,
"forks": 133,
"watchers": 354,
"score": 0
},
{
"id": 120838002,
"name": "CVE-2017-12617",
"full_name": "devcoinfet\/CVE-2017-12617",
"owner": {
"login": "devcoinfet",
"id": 34756993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34756993?v=4",
"html_url": "https:\/\/github.com\/devcoinfet"
},
"html_url": "https:\/\/github.com\/devcoinfet\/CVE-2017-12617",
"description": "Code put together from a few peoples ideas credit given don't use maliciously please",
"fork": false,
"created_at": "2018-02-09T01:02:32Z",
"updated_at": "2018-02-09T01:04:38Z",
"pushed_at": "2018-02-09T01:04:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 162421259,
"name": "CVE-2017-12617",
"full_name": "qiantu88\/CVE-2017-12617",
"owner": {
"login": "qiantu88",
"id": 35452263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4",
"html_url": "https:\/\/github.com\/qiantu88"
},
"html_url": "https:\/\/github.com\/qiantu88\/CVE-2017-12617",
"description": null,
"fork": false,
"created_at": "2018-12-19T10:26:33Z",
"updated_at": "2018-12-19T10:27:18Z",
"pushed_at": "2018-12-19T10:27:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 165734023,
"name": "CVE-2017-12617",
"full_name": "ygouzerh\/CVE-2017-12617",
"owner": {
"login": "ygouzerh",
"id": 33725211,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33725211?v=4",
"html_url": "https:\/\/github.com\/ygouzerh"
},
"html_url": "https:\/\/github.com\/ygouzerh\/CVE-2017-12617",
"description": "Proof of Concept - RCE Exploitation : Web Shell on Apache Tomcat - Ensimag January 2018",
"fork": false,
"created_at": "2019-01-14T20:58:29Z",
"updated_at": "2020-05-30T11:09:08Z",
"pushed_at": "2019-01-14T21:57:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 335837615,
"name": "tomcat-cve-2017-12617",

View file

@ -1,20 +1,20 @@
[
{
"id": 158224861,
"name": "CVE-2018-10936",
"full_name": "tafamace\/CVE-2018-10936",
"id": 158200351,
"name": "CVE-2017-12624",
"full_name": "tafamace\/CVE-2017-12624",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-10936",
"html_url": "https:\/\/github.com\/tafamace\/CVE-2017-12624",
"description": null,
"fork": false,
"created_at": "2018-11-19T13:09:47Z",
"updated_at": "2018-11-19T13:13:10Z",
"pushed_at": "2018-11-19T13:13:09Z",
"created_at": "2018-11-19T10:07:55Z",
"updated_at": "2018-11-19T10:20:47Z",
"pushed_at": "2018-11-19T10:20:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -1,4 +1,27 @@
[
{
"id": 146091131,
"name": "CVE-2017-12636",
"full_name": "moayadalmalat\/CVE-2017-12636",
"owner": {
"login": "moayadalmalat",
"id": 42471675,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42471675?v=4",
"html_url": "https:\/\/github.com\/moayadalmalat"
},
"html_url": "https:\/\/github.com\/moayadalmalat\/CVE-2017-12636",
"description": null,
"fork": false,
"created_at": "2018-08-25T11:50:22Z",
"updated_at": "2018-08-25T12:01:25Z",
"pushed_at": "2018-08-25T12:01:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 249396383,
"name": "CVE-2017-12636",

25
2017/CVE-2017-12792.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 107090388,
"name": "cve-2017-12792",
"full_name": "ZZS2017\/cve-2017-12792",
"owner": {
"login": "ZZS2017",
"id": 30464951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30464951?v=4",
"html_url": "https:\/\/github.com\/ZZS2017"
},
"html_url": "https:\/\/github.com\/ZZS2017\/cve-2017-12792",
"description": "NexusPHP CSRF+XSS",
"fork": false,
"created_at": "2017-10-16T07:06:19Z",
"updated_at": "2019-11-21T10:28:20Z",
"pushed_at": "2017-08-21T09:38:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-12852.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 105343958,
"name": "numpy-1.13.1",
"full_name": "BT123\/numpy-1.13.1",
"owner": {
"login": "BT123",
"id": 9165608,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9165608?v=4",
"html_url": "https:\/\/github.com\/BT123"
},
"html_url": "https:\/\/github.com\/BT123\/numpy-1.13.1",
"description": "test the CVE-2017-12852 in numpy v1.13.1 and v1.13.3 has fixed the bug ",
"fork": false,
"created_at": "2017-09-30T05:21:48Z",
"updated_at": "2017-11-03T06:18:22Z",
"pushed_at": "2017-10-20T03:34:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-12943.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 105268887,
"name": "D-Link",
"full_name": "aymankhalfatni\/D-Link",
"owner": {
"login": "aymankhalfatni",
"id": 19715320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19715320?v=4",
"html_url": "https:\/\/github.com\/aymankhalfatni"
},
"html_url": "https:\/\/github.com\/aymankhalfatni\/D-Link",
"description": "CVE-2017-12943",
"fork": false,
"created_at": "2017-09-29T12:18:40Z",
"updated_at": "2017-09-29T12:18:40Z",
"pushed_at": "2017-09-29T12:22:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

48
2017/CVE-2017-13089.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 108590896,
"name": "CVE-2017-13089",
"full_name": "r1b\/CVE-2017-13089",
"owner": {
"login": "r1b",
"id": 5550520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5550520?v=4",
"html_url": "https:\/\/github.com\/r1b"
},
"html_url": "https:\/\/github.com\/r1b\/CVE-2017-13089",
"description": "PoC for wget v1.19.1",
"fork": false,
"created_at": "2017-10-27T20:06:11Z",
"updated_at": "2020-12-26T09:31:18Z",
"pushed_at": "2018-02-02T11:30:04Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 21,
"forks": 21,
"watchers": 52,
"score": 0
},
{
"id": 110805304,
"name": "CVE-2017-13089",
"full_name": "mzeyong\/CVE-2017-13089",
"owner": {
"login": "mzeyong",
"id": 20426501,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20426501?v=4",
"html_url": "https:\/\/github.com\/mzeyong"
},
"html_url": "https:\/\/github.com\/mzeyong\/CVE-2017-13089",
"description": "CVE-2017-13089",
"fork": false,
"created_at": "2017-11-15T08:22:58Z",
"updated_at": "2021-03-09T00:50:44Z",
"pushed_at": "2017-11-15T08:36:12Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 18,
"forks": 18,
"watchers": 55,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 115697431,
"name": "Janus-CVE-2017-13156",
"full_name": "xyzAsian\/Janus-CVE-2017-13156",
"owner": {
"login": "xyzAsian",
"id": 34933799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34933799?v=4",
"html_url": "https:\/\/github.com\/xyzAsian"
},
"html_url": "https:\/\/github.com\/xyzAsian\/Janus-CVE-2017-13156",
"description": null,
"fork": false,
"created_at": "2017-12-29T07:11:42Z",
"updated_at": "2019-11-26T05:42:27Z",
"pushed_at": "2017-12-29T08:01:10Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"score": 0
},
{
"id": 188905732,
"name": "CVE-2017-13156",
"full_name": "caxmd\/CVE-2017-13156",
"owner": {
"login": "caxmd",
"id": 24653899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24653899?v=4",
"html_url": "https:\/\/github.com\/caxmd"
},
"html_url": "https:\/\/github.com\/caxmd\/CVE-2017-13156",
"description": null,
"fork": false,
"created_at": "2019-05-27T20:32:05Z",
"updated_at": "2019-05-27T20:32:05Z",
"pushed_at": "2019-05-27T20:32:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 204320854,
"name": "janus-toolkit",
"full_name": "giacomoferretti\/janus-toolkit",
"owner": {
"login": "giacomoferretti",
"id": 1778595,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1778595?v=4",
"html_url": "https:\/\/github.com\/giacomoferretti"
},
"html_url": "https:\/\/github.com\/giacomoferretti\/janus-toolkit",
"description": "A collection of tools for the Janus exploit [CVE-2017-13156].",
"fork": false,
"created_at": "2019-08-25T16:31:16Z",
"updated_at": "2020-11-26T10:13:27Z",
"pushed_at": "2019-10-22T20:04:08Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 292525072,
"name": "CVE-2017-13156-Janus",

25
2017/CVE-2017-13672.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 115146971,
"name": "CVE-2017-13672",
"full_name": "DavidBuchanan314\/CVE-2017-13672",
"owner": {
"login": "DavidBuchanan314",
"id": 13520633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13520633?v=4",
"html_url": "https:\/\/github.com\/DavidBuchanan314"
},
"html_url": "https:\/\/github.com\/DavidBuchanan314\/CVE-2017-13672",
"description": "POCs for CVE-2017-13672 (OOB read in VGA Cirrus QEMU driver, causing DoS)",
"fork": false,
"created_at": "2017-12-22T20:08:33Z",
"updated_at": "2018-01-29T04:34:02Z",
"pushed_at": "2017-12-22T22:52:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-13868.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 106086726,
"name": "ctl_ctloutput-leak",
"full_name": "bazad\/ctl_ctloutput-leak",
"owner": {
"login": "bazad",
"id": 3111637,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
"html_url": "https:\/\/github.com\/bazad"
},
"html_url": "https:\/\/github.com\/bazad\/ctl_ctloutput-leak",
"description": "CVE-2017-13868: Information leak of uninitialized kernel heap data in XNU.",
"fork": false,
"created_at": "2017-10-07T09:42:05Z",
"updated_at": "2019-11-05T03:14:33Z",
"pushed_at": "2017-12-07T01:04:52Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 5,
"forks": 5,
"watchers": 26,
"score": 0
}
]

25
2017/CVE-2017-13872.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 112584924,
"name": "CVE-2017-13872-Patch",
"full_name": "giovannidispoto\/CVE-2017-13872-Patch",
"owner": {
"login": "giovannidispoto",
"id": 7195434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7195434?v=4",
"html_url": "https:\/\/github.com\/giovannidispoto"
},
"html_url": "https:\/\/github.com\/giovannidispoto\/CVE-2017-13872-Patch",
"description": null,
"fork": false,
"created_at": "2017-11-30T08:22:00Z",
"updated_at": "2017-11-30T08:23:41Z",
"pushed_at": "2017-11-30T15:26:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-14105.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 102123441,
"name": "CVE-2017-14105",
"full_name": "theguly\/CVE-2017-14105",
"owner": {
"login": "theguly",
"id": 1745802,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1745802?v=4",
"html_url": "https:\/\/github.com\/theguly"
},
"html_url": "https:\/\/github.com\/theguly\/CVE-2017-14105",
"description": null,
"fork": false,
"created_at": "2017-09-01T14:51:31Z",
"updated_at": "2019-01-08T00:25:52Z",
"pushed_at": "2017-09-14T13:14:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-14262.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 102810621,
"name": "CVE-2017-14262",
"full_name": "zzz66686\/CVE-2017-14262",
"owner": {
"login": "zzz66686",
"id": 14144972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4",
"html_url": "https:\/\/github.com\/zzz66686"
},
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14262",
"description": null,
"fork": false,
"created_at": "2017-09-08T02:59:21Z",
"updated_at": "2020-12-02T19:55:31Z",
"pushed_at": "2017-09-13T14:39:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
}
]

25
2017/CVE-2017-14263.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 102832029,
"name": "CVE-2017-14263",
"full_name": "zzz66686\/CVE-2017-14263",
"owner": {
"login": "zzz66686",
"id": 14144972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4",
"html_url": "https:\/\/github.com\/zzz66686"
},
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14263",
"description": null,
"fork": false,
"created_at": "2017-09-08T07:27:13Z",
"updated_at": "2020-05-18T10:42:14Z",
"pushed_at": "2017-09-13T14:40:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 6,
"forks": 6,
"watchers": 3,
"score": 0
}
]

25
2017/CVE-2017-14322.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 126989533,
"name": "CVE-2017-14322",
"full_name": "joesmithjaffa\/CVE-2017-14322",
"owner": {
"login": "joesmithjaffa",
"id": 33636378,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33636378?v=4",
"html_url": "https:\/\/github.com\/joesmithjaffa"
},
"html_url": "https:\/\/github.com\/joesmithjaffa\/CVE-2017-14322",
"description": "CVE-2017-14322 Interspire Email Marketer (emailmarketer) Exploit",
"fork": false,
"created_at": "2018-03-27T13:20:31Z",
"updated_at": "2018-12-28T06:25:55Z",
"pushed_at": "2018-03-27T13:42:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

25
2017/CVE-2017-14491.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 108858920,
"name": "dnsmasq-2.4.1-fix-CVE-2017-14491",
"full_name": "skyformat99\/dnsmasq-2.4.1-fix-CVE-2017-14491",
"owner": {
"login": "skyformat99",
"id": 10938976,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10938976?v=4",
"html_url": "https:\/\/github.com\/skyformat99"
},
"html_url": "https:\/\/github.com\/skyformat99\/dnsmasq-2.4.1-fix-CVE-2017-14491",
"description": null,
"fork": false,
"created_at": "2017-10-30T14:02:52Z",
"updated_at": "2020-07-25T01:12:06Z",
"pushed_at": "2017-10-30T01:43:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-14493.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 160322339,
"name": "bof-dnsmasq-cve-2017-14493",
"full_name": "pupiles\/bof-dnsmasq-cve-2017-14493",
"owner": {
"login": "pupiles",
"id": 30405721,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30405721?v=4",
"html_url": "https:\/\/github.com\/pupiles"
},
"html_url": "https:\/\/github.com\/pupiles\/bof-dnsmasq-cve-2017-14493",
"description": "dnsmasq rop exploit with NX bypass",
"fork": false,
"created_at": "2018-12-04T08:15:53Z",
"updated_at": "2021-03-10T09:05:32Z",
"pushed_at": "2018-07-31T23:26:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-14719.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 202961104,
"name": "CodePath_Week_7-8",
"full_name": "PalmTreeForest\/CodePath_Week_7-8",
"owner": {
"login": "PalmTreeForest",
"id": 30913112,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30913112?v=4",
"html_url": "https:\/\/github.com\/PalmTreeForest"
},
"html_url": "https:\/\/github.com\/PalmTreeForest\/CodePath_Week_7-8",
"description": "CodePath Assignment for Weeks 7 & 8: CVE-2017-14719, CVE-2019-9787 & Unauthenticated Page\/Post Content Modification via REST API",
"fork": false,
"created_at": "2019-08-18T04:50:37Z",
"updated_at": "2019-08-18T05:22:44Z",
"pushed_at": "2019-08-18T05:18:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-14948.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 214687577,
"name": "d_link_880_bug",
"full_name": "badnack\/d_link_880_bug",
"owner": {
"login": "badnack",
"id": 1037156,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1037156?v=4",
"html_url": "https:\/\/github.com\/badnack"
},
"html_url": "https:\/\/github.com\/badnack\/d_link_880_bug",
"description": "CVE-2017-14948 for D-Link 880 Firmware",
"fork": false,
"created_at": "2019-10-12T17:29:36Z",
"updated_at": "2019-10-16T17:40:25Z",
"pushed_at": "2019-10-14T21:52:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-15120.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 153306341,
"name": "CVE-2017-15120_PoC",
"full_name": "shutingrz\/CVE-2017-15120_PoC",
"owner": {
"login": "shutingrz",
"id": 2587857,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2587857?v=4",
"html_url": "https:\/\/github.com\/shutingrz"
},
"html_url": "https:\/\/github.com\/shutingrz\/CVE-2017-15120_PoC",
"description": "PowerDNS CVE-2017-15120 \/ DO NOT ABUSE",
"fork": false,
"created_at": "2018-10-16T15:08:15Z",
"updated_at": "2020-04-06T11:04:21Z",
"pushed_at": "2018-10-16T15:09:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-15303.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 122435032,
"name": "Stryker",
"full_name": "hfiref0x\/Stryker",
"owner": {
"login": "hfiref0x",
"id": 10708977,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10708977?v=4",
"html_url": "https:\/\/github.com\/hfiref0x"
},
"html_url": "https:\/\/github.com\/hfiref0x\/Stryker",
"description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303",
"fork": false,
"created_at": "2018-02-22T05:31:13Z",
"updated_at": "2021-02-06T02:19:41Z",
"pushed_at": "2018-02-25T08:49:07Z",
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 51,
"forks": 51,
"watchers": 86,
"score": 0
}
]

View file

@ -1,4 +1,142 @@
[
{
"id": 107277248,
"name": "Infineon-CVE-2017-15361",
"full_name": "lva\/Infineon-CVE-2017-15361",
"owner": {
"login": "lva",
"id": 1962037,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1962037?v=4",
"html_url": "https:\/\/github.com\/lva"
},
"html_url": "https:\/\/github.com\/lva\/Infineon-CVE-2017-15361",
"description": "Simple PowerShell script to check whether a computer is using an Infineon TPM chip that is vulnerable to CVE-2017-15361.",
"fork": false,
"created_at": "2017-10-17T14:07:45Z",
"updated_at": "2017-10-23T02:23:23Z",
"pushed_at": "2017-10-19T11:24:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 107299810,
"name": "rocacheck",
"full_name": "titanous\/rocacheck",
"owner": {
"login": "titanous",
"id": 13026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13026?v=4",
"html_url": "https:\/\/github.com\/titanous"
},
"html_url": "https:\/\/github.com\/titanous\/rocacheck",
"description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361",
"fork": false,
"created_at": "2017-10-17T17:08:22Z",
"updated_at": "2021-02-06T07:54:35Z",
"pushed_at": "2017-10-23T19:39:21Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},
{
"id": 107551756,
"name": "RocaCmTest",
"full_name": "jnpuskar\/RocaCmTest",
"owner": {
"login": "jnpuskar",
"id": 8107471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8107471?v=4",
"html_url": "https:\/\/github.com\/jnpuskar"
},
"html_url": "https:\/\/github.com\/jnpuskar\/RocaCmTest",
"description": "Windows tool that analyzes your computer for Infineon TPM weak RSA keys (CVE-2017-15361) ",
"fork": false,
"created_at": "2017-10-19T13:42:52Z",
"updated_at": "2017-10-19T17:24:19Z",
"pushed_at": "2017-10-20T12:09:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 107592667,
"name": "Detect-CVE-2017-15361-TPM",
"full_name": "nsacyber\/Detect-CVE-2017-15361-TPM",
"owner": {
"login": "nsacyber",
"id": 6088344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6088344?v=4",
"html_url": "https:\/\/github.com\/nsacyber"
},
"html_url": "https:\/\/github.com\/nsacyber\/Detect-CVE-2017-15361-TPM",
"description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber",
"fork": false,
"created_at": "2017-10-19T20:02:56Z",
"updated_at": "2020-12-30T10:15:30Z",
"pushed_at": "2018-09-04T21:35:36Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 23,
"forks": 23,
"watchers": 34,
"score": 0
},
{
"id": 108202276,
"name": "zeek-plugin-roca",
"full_name": "0xxon\/zeek-plugin-roca",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/zeek-plugin-roca",
"description": "Bro plugin to check if certificates are affected by CVE-2017-15361",
"fork": false,
"created_at": "2017-10-25T01:10:06Z",
"updated_at": "2019-05-24T11:29:34Z",
"pushed_at": "2018-11-14T19:00:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 108287639,
"name": "roca",
"full_name": "0xxon\/roca",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/roca",
"description": "Reimplementation of CVE-2017-15361 checker in C",
"fork": false,
"created_at": "2017-10-25T15:16:11Z",
"updated_at": "2017-10-25T15:16:43Z",
"pushed_at": "2017-10-25T15:16:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 309390412,
"name": "Attacco-ROCA-sulla-vulnerabilita-CVE-2017-15361",

25
2017/CVE-2017-15394.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 112094225,
"name": "CVE-2017-15394",
"full_name": "sudosammy\/CVE-2017-15394",
"owner": {
"login": "sudosammy",
"id": 18524051,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18524051?v=4",
"html_url": "https:\/\/github.com\/sudosammy"
},
"html_url": "https:\/\/github.com\/sudosammy\/CVE-2017-15394",
"description": null,
"fork": false,
"created_at": "2017-11-26T15:32:04Z",
"updated_at": "2017-11-26T15:32:04Z",
"pushed_at": "2017-11-26T15:32:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-15708.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 114627582,
"name": "CVE-2017-15708",
"full_name": "HuSoul\/CVE-2017-15708",
"owner": {
"login": "HuSoul",
"id": 17831277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17831277?v=4",
"html_url": "https:\/\/github.com\/HuSoul"
},
"html_url": "https:\/\/github.com\/HuSoul\/CVE-2017-15708",
"description": "Apache synapse 反序列化 CVE201715708",
"fork": false,
"created_at": "2017-12-18T10:27:58Z",
"updated_at": "2020-09-24T10:42:20Z",
"pushed_at": "2017-12-18T07:16:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-15715.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 193028306,
"name": "CVE-2017-15715",
"full_name": "whisp1830\/CVE-2017-15715",
"owner": {
"login": "whisp1830",
"id": 24414594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24414594?v=4",
"html_url": "https:\/\/github.com\/whisp1830"
},
"html_url": "https:\/\/github.com\/whisp1830\/CVE-2017-15715",
"description": null,
"fork": false,
"created_at": "2019-06-21T04:05:32Z",
"updated_at": "2019-06-21T04:06:25Z",
"pushed_at": "2019-06-21T04:06:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 114719978,
"name": "CVE-2017-15944-POC",
"full_name": "xxnbyy\/CVE-2017-15944-POC",
"owner": {
"login": "xxnbyy",
"id": 20261647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20261647?v=4",
"html_url": "https:\/\/github.com\/xxnbyy"
},
"html_url": "https:\/\/github.com\/xxnbyy\/CVE-2017-15944-POC",
"description": "CVE-2017-15944 Palo Alto Networks firewalls remote root code execution POC",
"fork": false,
"created_at": "2017-12-19T04:43:24Z",
"updated_at": "2019-08-27T03:14:33Z",
"pushed_at": "2017-12-15T02:57:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 5,
"forks": 5,
"watchers": 0,
"score": 0
},
{
"id": 134778333,
"name": "PaloAltoRceDetectionAndExploit",
"full_name": "surajraghuvanshi\/PaloAltoRceDetectionAndExploit",
"owner": {
"login": "surajraghuvanshi",
"id": 7037657,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7037657?v=4",
"html_url": "https:\/\/github.com\/surajraghuvanshi"
},
"html_url": "https:\/\/github.com\/surajraghuvanshi\/PaloAltoRceDetectionAndExploit",
"description": "Detecion for the vulnerability CVE-2017-15944",
"fork": false,
"created_at": "2018-05-24T23:19:57Z",
"updated_at": "2020-08-04T01:33:49Z",
"pushed_at": "2019-04-04T03:00:44Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 267752481,
"name": "CVE-2017-15944",

25
2017/CVE-2017-16082.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 159378663,
"name": "CVE-2017-16082",
"full_name": "nulldreams\/CVE-2017-16082",
"owner": {
"login": "nulldreams",
"id": 13773645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13773645?v=4",
"html_url": "https:\/\/github.com\/nulldreams"
},
"html_url": "https:\/\/github.com\/nulldreams\/CVE-2017-16082",
"description": "NodeJS + Postgres (Remote Code Execution) 🛰",
"fork": false,
"created_at": "2018-11-27T18:09:17Z",
"updated_at": "2020-11-06T15:37:24Z",
"pushed_at": "2018-11-27T18:42:48Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

25
2017/CVE-2017-16088.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 203029257,
"name": "CVE-2017-16088",
"full_name": "Flyy-yu\/CVE-2017-16088",
"owner": {
"login": "Flyy-yu",
"id": 25512004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25512004?v=4",
"html_url": "https:\/\/github.com\/Flyy-yu"
},
"html_url": "https:\/\/github.com\/Flyy-yu\/CVE-2017-16088",
"description": "Exploit CVE-2017-16088 ",
"fork": false,
"created_at": "2019-08-18T16:22:46Z",
"updated_at": "2019-08-18T16:23:18Z",
"pushed_at": "2019-08-18T16:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-16245.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 153248100,
"name": "CVE-2017-16245",
"full_name": "AOCorsaire\/CVE-2017-16245",
"owner": {
"login": "AOCorsaire",
"id": 17743663,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17743663?v=4",
"html_url": "https:\/\/github.com\/AOCorsaire"
},
"html_url": "https:\/\/github.com\/AOCorsaire\/CVE-2017-16245",
"description": "Source code for CVE-2017-16245 (Avecto Defendpoint bypass originally disclosed by Nettitude) ",
"fork": false,
"created_at": "2018-10-16T08:14:29Z",
"updated_at": "2019-11-13T09:28:06Z",
"pushed_at": "2018-10-16T14:30:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 120433534,
"name": "tivoli-poc",
"full_name": "emcalv\/tivoli-poc",
"owner": {
"login": "emcalv",
"id": 36189787,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36189787?v=4",
"html_url": "https:\/\/github.com\/emcalv"
},
"html_url": "https:\/\/github.com\/emcalv\/tivoli-poc",
"description": "CVE-2017-1635 PoC code",
"fork": false,
"created_at": "2018-02-06T09:43:28Z",
"updated_at": "2019-05-15T02:02:47Z",
"pushed_at": "2018-02-06T12:14:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 344592351,
"name": "cve-2017-1635-PoC",

25
2017/CVE-2017-16524.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 109582148,
"name": "CVE-2017-16524",
"full_name": "realistic-security\/CVE-2017-16524",
"owner": {
"login": "realistic-security",
"id": 33375077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33375077?v=4",
"html_url": "https:\/\/github.com\/realistic-security"
},
"html_url": "https:\/\/github.com\/realistic-security\/CVE-2017-16524",
"description": "Unrestricted file upload vulnerability - Web Viewer 1.0.0.193 on Samsung SRN-1670D",
"fork": false,
"created_at": "2017-11-05T13:32:43Z",
"updated_at": "2019-11-18T19:42:37Z",
"pushed_at": "2017-11-05T23:17:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

25
2017/CVE-2017-16567.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 108069202,
"name": "CVE-2017-16567",
"full_name": "dewankpant\/CVE-2017-16567",
"owner": {
"login": "dewankpant",
"id": 8929631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8929631?v=4",
"html_url": "https:\/\/github.com\/dewankpant"
},
"html_url": "https:\/\/github.com\/dewankpant\/CVE-2017-16567",
"description": null,
"fork": false,
"created_at": "2017-10-24T02:54:08Z",
"updated_at": "2018-07-18T00:29:06Z",
"pushed_at": "2018-07-18T00:29:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-16568.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 118300598,
"name": "CVE-2017-16568",
"full_name": "dewankpant\/CVE-2017-16568",
"owner": {
"login": "dewankpant",
"id": 8929631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8929631?v=4",
"html_url": "https:\/\/github.com\/dewankpant"
},
"html_url": "https:\/\/github.com\/dewankpant\/CVE-2017-16568",
"description": null,
"fork": false,
"created_at": "2018-01-21T03:17:56Z",
"updated_at": "2018-07-18T00:27:02Z",
"pushed_at": "2018-07-18T00:27:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-16744.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 207384844,
"name": "CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara",
"full_name": "GainSec\/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara",
"owner": {
"login": "GainSec",
"id": 46727209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46727209?v=4",
"html_url": "https:\/\/github.com\/GainSec"
},
"html_url": "https:\/\/github.com\/GainSec\/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara",
"description": " Proof of Concept (PoC) for CVE: 2017-16744 and 2017-16748",
"fork": false,
"created_at": "2019-09-09T19:08:59Z",
"updated_at": "2020-08-02T19:27:59Z",
"pushed_at": "2019-09-09T19:11:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-16806.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 110611562,
"name": "ulteriusExploit",
"full_name": "rickoooooo\/ulteriusExploit",
"owner": {
"login": "rickoooooo",
"id": 33641230,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33641230?v=4",
"html_url": "https:\/\/github.com\/rickoooooo"
},
"html_url": "https:\/\/github.com\/rickoooooo\/ulteriusExploit",
"description": "Python exploit for CVE-2017-16806",
"fork": false,
"created_at": "2017-11-13T22:48:46Z",
"updated_at": "2017-11-13T22:52:09Z",
"pushed_at": "2017-11-13T23:04:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,142 @@
[
{
"id": 125850596,
"name": "CVE-2017-16995",
"full_name": "C0dak\/CVE-2017-16995",
"owner": {
"login": "C0dak",
"id": 17883550,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17883550?v=4",
"html_url": "https:\/\/github.com\/C0dak"
},
"html_url": "https:\/\/github.com\/C0dak\/CVE-2017-16995",
"description": "Linux Kernel Version 4.14 - 4.4 (Ubuntu && Debian)",
"fork": false,
"created_at": "2018-03-19T11:58:20Z",
"updated_at": "2020-10-20T22:43:59Z",
"pushed_at": "2018-03-19T05:59:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 131100341,
"name": "CVE-2017-16995",
"full_name": "Al1ex\/CVE-2017-16995",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2017-16995",
"description": "CVE-2017-16995Ubuntu本地提权漏洞",
"fork": false,
"created_at": "2018-04-26T04:33:50Z",
"updated_at": "2019-12-04T08:15:00Z",
"pushed_at": "2018-04-26T04:57:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"score": 0
},
{
"id": 153606892,
"name": "CVE-2017-16995",
"full_name": "gugronnier\/CVE-2017-16995",
"owner": {
"login": "gugronnier",
"id": 22094271,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22094271?v=4",
"html_url": "https:\/\/github.com\/gugronnier"
},
"html_url": "https:\/\/github.com\/gugronnier\/CVE-2017-16995",
"description": "Exploit adapted for a specific PoC on Ubuntu 16.04.01",
"fork": false,
"created_at": "2018-10-18T10:34:24Z",
"updated_at": "2018-12-05T12:50:35Z",
"pushed_at": "2018-12-05T12:50:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 5,
"forks": 5,
"watchers": 0,
"score": 0
},
{
"id": 166941690,
"name": "cve-2017-16995",
"full_name": "senyuuri\/cve-2017-16995",
"owner": {
"login": "senyuuri",
"id": 2610986,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2610986?v=4",
"html_url": "https:\/\/github.com\/senyuuri"
},
"html_url": "https:\/\/github.com\/senyuuri\/cve-2017-16995",
"description": "Writeup for CVE-2017-16995 Linux BPF Local Privilege Escalation",
"fork": false,
"created_at": "2019-01-22T06:42:27Z",
"updated_at": "2019-01-22T06:44:45Z",
"pushed_at": "2019-01-22T06:43:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 198427526,
"name": "CVE-2017-16995",
"full_name": "vnik5287\/CVE-2017-16995",
"owner": {
"login": "vnik5287",
"id": 9650718,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4",
"html_url": "https:\/\/github.com\/vnik5287"
},
"html_url": "https:\/\/github.com\/vnik5287\/CVE-2017-16995",
"description": "CVE-2017-16995 eBPF PoC for Ubuntu 16.04",
"fork": false,
"created_at": "2019-07-23T12:37:27Z",
"updated_at": "2019-07-23T22:56:11Z",
"pushed_at": "2019-07-23T12:37:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 202306651,
"name": "CVE-2017-16995",
"full_name": "littlebin404\/CVE-2017-16995",
"owner": {
"login": "littlebin404",
"id": 54022042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54022042?v=4",
"html_url": "https:\/\/github.com\/littlebin404"
},
"html_url": "https:\/\/github.com\/littlebin404\/CVE-2017-16995",
"description": "CVE-2017-16995 ubuntun本地提权 POC",
"fork": false,
"created_at": "2019-08-14T08:21:05Z",
"updated_at": "2019-08-14T08:44:57Z",
"pushed_at": "2019-08-14T08:34:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 263389053,
"name": "CVE-2017-16995-Linux-Kernel---BPF-Sign-Extension-Local-Privilege-Escalation-",

25
2017/CVE-2017-16997.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 116118639,
"name": "CVE-2017-16997-poc",
"full_name": "Xiami2012\/CVE-2017-16997-poc",
"owner": {
"login": "Xiami2012",
"id": 1927254,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
"html_url": "https:\/\/github.com\/Xiami2012"
},
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
"description": "A proof-of-concept for CVE-2017-16997",
"fork": false,
"created_at": "2018-01-03T09:31:55Z",
"updated_at": "2018-01-03T09:33:01Z",
"pushed_at": "2018-01-03T10:39:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 115311315,
"name": "CVE-2017-17215",
"full_name": "1337g\/CVE-2017-17215",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-17215",
"description": "CVE-2017-17215 HuaWei Router RCE (NOT TESTED)",
"fork": false,
"created_at": "2017-12-25T06:11:24Z",
"updated_at": "2020-06-23T07:42:36Z",
"pushed_at": "2018-01-04T02:31:57Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 18,
"forks": 18,
"watchers": 24,
"score": 0
},
{
"id": 313596733,
"name": "HG532d-RCE-Exploit",

View file

@ -1,4 +1,73 @@
[
{
"id": 123458951,
"name": "Jackson-CVE-2017-17485",
"full_name": "maxbitcoin\/Jackson-CVE-2017-17485",
"owner": {
"login": "maxbitcoin",
"id": 5998127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5998127?v=4",
"html_url": "https:\/\/github.com\/maxbitcoin"
},
"html_url": "https:\/\/github.com\/maxbitcoin\/Jackson-CVE-2017-17485",
"description": "Jackson 反序列化",
"fork": false,
"created_at": "2018-03-01T16:09:20Z",
"updated_at": "2021-01-03T06:19:34Z",
"pushed_at": "2018-01-24T03:03:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 9,
"forks": 9,
"watchers": 1,
"score": 0
},
{
"id": 158195318,
"name": "CVE-2017-17485",
"full_name": "tafamace\/CVE-2017-17485",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2017-17485",
"description": null,
"fork": false,
"created_at": "2018-11-19T09:29:28Z",
"updated_at": "2018-11-19T10:33:01Z",
"pushed_at": "2018-11-19T10:32:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 182537771,
"name": "cve-2017-17485",
"full_name": "x7iaob\/cve-2017-17485",
"owner": {
"login": "x7iaob",
"id": 29616658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29616658?v=4",
"html_url": "https:\/\/github.com\/x7iaob"
},
"html_url": "https:\/\/github.com\/x7iaob\/cve-2017-17485",
"description": "cve-2017-17485 PoC",
"fork": false,
"created_at": "2019-04-21T13:36:03Z",
"updated_at": "2019-10-19T11:45:50Z",
"pushed_at": "2019-04-21T13:37:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 266009300,
"name": "CVE-2017-17485",

View file

@ -1,4 +1,50 @@
[
{
"id": 115486127,
"name": "CVE-2017-17562",
"full_name": "1337g\/CVE-2017-17562",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-17562",
"description": "CVE-2017-17562 GOAHEAD RCE (Author: Daniel Hodson)",
"fork": false,
"created_at": "2017-12-27T05:46:50Z",
"updated_at": "2018-11-30T02:36:05Z",
"pushed_at": "2017-12-27T05:51:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 215594323,
"name": "CVE-2017-17562",
"full_name": "ivanitlearning\/CVE-2017-17562",
"owner": {
"login": "ivanitlearning",
"id": 52420671,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4",
"html_url": "https:\/\/github.com\/ivanitlearning"
},
"html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2017-17562",
"description": "Standalone Python 3 exploit for CVE-2017-17562",
"fork": false,
"created_at": "2019-10-16T16:28:27Z",
"updated_at": "2021-01-27T20:00:18Z",
"pushed_at": "2019-11-02T16:16:56Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 223557910,
"name": "Goahead-CVE-2017-17562",

25
2017/CVE-2017-17692.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 116019676,
"name": "CVE-2017-17692",
"full_name": "lr3800\/CVE-2017-17692",
"owner": {
"login": "lr3800",
"id": 22863274,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22863274?v=4",
"html_url": "https:\/\/github.com\/lr3800"
},
"html_url": "https:\/\/github.com\/lr3800\/CVE-2017-17692",
"description": null,
"fork": false,
"created_at": "2018-01-02T13:47:36Z",
"updated_at": "2018-10-30T16:01:07Z",
"pushed_at": "2018-01-02T13:58:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

25
2017/CVE-2017-18044.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 151310036,
"name": "CVE-2017-18044-Exploit",
"full_name": "securifera\/CVE-2017-18044-Exploit",
"owner": {
"login": "securifera",
"id": 12126525,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4",
"html_url": "https:\/\/github.com\/securifera"
},
"html_url": "https:\/\/github.com\/securifera\/CVE-2017-18044-Exploit",
"description": "Commvault-CVE-2017-18044",
"fork": false,
"created_at": "2018-10-02T19:18:31Z",
"updated_at": "2021-03-21T10:31:14Z",
"pushed_at": "2018-10-07T18:12:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 3,
"score": 0
}
]

25
2017/CVE-2017-18345.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 95982626,
"name": "CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD",
"full_name": "Luth1er\/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD",
"owner": {
"login": "Luth1er",
"id": 23650363,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23650363?v=4",
"html_url": "https:\/\/github.com\/Luth1er"
},
"html_url": "https:\/\/github.com\/Luth1er\/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD",
"description": "The Joomanager component through 2.0.0 for Joomla! has an Arbitrary File Download issue, resulting in exposing the Credentials of the DataBase.",
"fork": false,
"created_at": "2017-07-01T19:02:45Z",
"updated_at": "2020-08-29T13:52:48Z",
"pushed_at": "2019-01-28T20:59:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"forks": 6,
"watchers": 7,
"score": 0
}
]

25
2017/CVE-2017-18486.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 104919233,
"name": "JitBit_Helpdesk_Auth_Bypass",
"full_name": "Kc57\/JitBit_Helpdesk_Auth_Bypass",
"owner": {
"login": "Kc57",
"id": 16500627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16500627?v=4",
"html_url": "https:\/\/github.com\/Kc57"
},
"html_url": "https:\/\/github.com\/Kc57\/JitBit_Helpdesk_Auth_Bypass",
"description": "Utility to derive the shared secret on a JitBit Helpdesk install which can be used for authentication bypass (CVE-2017-18486)",
"fork": false,
"created_at": "2017-09-26T17:51:01Z",
"updated_at": "2019-08-09T18:35:26Z",
"pushed_at": "2017-09-26T17:56:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

25
2017/CVE-2017-18635.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 215647693,
"name": "CVE-2017-18635",
"full_name": "ShielderSec\/CVE-2017-18635",
"owner": {
"login": "ShielderSec",
"id": 24564748,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24564748?v=4",
"html_url": "https:\/\/github.com\/ShielderSec"
},
"html_url": "https:\/\/github.com\/ShielderSec\/CVE-2017-18635",
"description": "PoC for CVE-2017-18635",
"fork": false,
"created_at": "2019-10-16T21:27:40Z",
"updated_at": "2020-04-10T16:47:58Z",
"pushed_at": "2019-10-19T18:37:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-2368.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100696664,
"name": "CVE-2017-2368",
"full_name": "vincedes3\/CVE-2017-2368",
"owner": {
"login": "vincedes3",
"id": 26314689,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314689?v=4",
"html_url": "https:\/\/github.com\/vincedes3"
},
"html_url": "https:\/\/github.com\/vincedes3\/CVE-2017-2368",
"description": "CVE-2017-2368 VCF Message App Crash Bug",
"fork": false,
"created_at": "2017-08-18T09:33:57Z",
"updated_at": "2017-08-18T09:33:57Z",
"pushed_at": "2017-08-18T09:36:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -67,5 +67,28 @@
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 142854846,
"name": "CVE-2017-2370",
"full_name": "Peterpan0927\/CVE-2017-2370",
"owner": {
"login": "Peterpan0927",
"id": 26504662,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26504662?v=4",
"html_url": "https:\/\/github.com\/Peterpan0927"
},
"html_url": "https:\/\/github.com\/Peterpan0927\/CVE-2017-2370",
"description": "on Mac 10.12.2",
"fork": false,
"created_at": "2018-07-30T09:32:15Z",
"updated_at": "2019-12-06T00:52:44Z",
"pushed_at": "2018-08-03T09:03:34Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 2,
"forks": 2,
"watchers": 18,
"score": 0
}
]

Some files were not shown because too many files have changed in this diff Show more