From 6ec427b1726190df85af8a738c87a3b6d4c408a0 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 11 Apr 2021 18:10:26 +0900 Subject: [PATCH] Auto Update 2021/04/11 18:10:26 --- 2005/CVE-2005-0603.json | 25 + 2007/CVE-2007-2447.json | 23 + 2011/CVE-2011-3389.json | 8 +- 2016/CVE-2016-10033.json | 8 +- 2017/CVE-2017-0005.json | 25 + 2017/CVE-2017-0075.json | 25 + 2017/CVE-2017-0144.json | 46 + 2017/CVE-2017-0199.json | 115 + 2017/CVE-2017-0213.json | 138 ++ 2017/CVE-2017-0248.json | 25 + 2017/CVE-2017-0261.json | 23 + 2017/CVE-2017-0263.json | 25 + 2017/CVE-2017-0411.json | 25 + 2017/CVE-2017-0478.json | 23 + 2017/CVE-2017-0541.json | 23 + 2017/CVE-2017-0554.json | 25 + 2017/CVE-2017-0564.json | 25 + 2017/CVE-2017-0781.json | 46 + 2017/CVE-2017-0785.json | 186 ++ 2017/CVE-2017-0806.json | 25 + 2017/CVE-2017-0807.json | 25 + 2017/CVE-2017-1000083.json | 48 + 2017/CVE-2017-1000112.json | 23 + 2017/CVE-2017-1000117.json | 531 +++++ 2017/CVE-2017-1000250.json | 25 + 2017/CVE-2017-1000251.json | 94 + 2017/CVE-2017-1000253.json | 25 + 2017/CVE-2017-1000405.json | 25 + 2017/CVE-2017-1000475.json | 25 + 2017/CVE-2017-1000486.json | 46 + 2017/CVE-2017-1000499.json | 25 + 2017/CVE-2017-1002101.json | 25 + 2017/CVE-2017-10235.json | 25 + 2017/CVE-2017-10271.json | 483 ++++ 2017/CVE-2017-10352.json | 25 + 2017/CVE-2017-10366.json | 25 + 2017/CVE-2017-10617.json | 25 + 2017/CVE-2017-10661.json | 25 + 2017/CVE-2017-10797.json | 25 + 2017/CVE-2017-11176.json | 69 + 2017/CVE-2017-11427.json | 25 + 2017/CVE-2017-11503.json | 25 + 2017/CVE-2017-11519.json | 25 + 2017/CVE-2017-11611.json | 25 + 2017/CVE-2017-11774.json | 25 + 2017/CVE-2017-11816.json | 25 + 2017/CVE-2017-11882.json | 506 +++++ 2017/CVE-2017-11907.json | 25 + 2017/CVE-2017-12149.json | 94 + 2017/CVE-2017-12426.json | 25 + 2017/CVE-2017-12542.json | 48 + 2017/CVE-2017-12611.json | 25 + 2017/CVE-2017-12615.json | 161 ++ 2017/CVE-2017-12617.json | 92 + .../CVE-2017-12624.json | 14 +- 2017/CVE-2017-12636.json | 23 + 2017/CVE-2017-12792.json | 25 + 2017/CVE-2017-12852.json | 25 + 2017/CVE-2017-12943.json | 25 + 2017/CVE-2017-13089.json | 48 + 2017/CVE-2017-13156.json | 69 + 2017/CVE-2017-13672.json | 25 + 2017/CVE-2017-13868.json | 25 + 2017/CVE-2017-13872.json | 25 + 2017/CVE-2017-14105.json | 25 + 2017/CVE-2017-14262.json | 25 + 2017/CVE-2017-14263.json | 25 + 2017/CVE-2017-14322.json | 25 + 2017/CVE-2017-14491.json | 25 + 2017/CVE-2017-14493.json | 25 + 2017/CVE-2017-14719.json | 25 + 2017/CVE-2017-14948.json | 25 + 2017/CVE-2017-15120.json | 25 + 2017/CVE-2017-15303.json | 25 + 2017/CVE-2017-15361.json | 138 ++ 2017/CVE-2017-15394.json | 25 + 2017/CVE-2017-15708.json | 25 + 2017/CVE-2017-15715.json | 25 + 2017/CVE-2017-15944.json | 46 + 2017/CVE-2017-16082.json | 25 + 2017/CVE-2017-16088.json | 25 + 2017/CVE-2017-16245.json | 25 + 2017/CVE-2017-1635.json | 23 + 2017/CVE-2017-16524.json | 25 + 2017/CVE-2017-16567.json | 25 + 2017/CVE-2017-16568.json | 25 + 2017/CVE-2017-16744.json | 25 + 2017/CVE-2017-16806.json | 25 + 2017/CVE-2017-16995.json | 138 ++ 2017/CVE-2017-16997.json | 25 + 2017/CVE-2017-17215.json | 23 + 2017/CVE-2017-17485.json | 69 + 2017/CVE-2017-17562.json | 46 + 2017/CVE-2017-17692.json | 25 + 2017/CVE-2017-18044.json | 25 + 2017/CVE-2017-18345.json | 25 + 2017/CVE-2017-18486.json | 25 + 2017/CVE-2017-18635.json | 25 + 2017/CVE-2017-2368.json | 25 + 2017/CVE-2017-2370.json | 23 + 2017/CVE-2017-2388.json | 25 + .../CVE-2017-2666.json | 14 +- 2017/CVE-2017-3000.json | 25 + 2017/CVE-2017-3066.json | 48 + 2017/CVE-2017-3143.json | 25 + 2017/CVE-2017-3241.json | 25 + 2017/CVE-2017-3881.json | 23 + 2017/CVE-2017-4490.json | 23 + 2017/CVE-2017-4878.json | 25 + 2017/CVE-2017-4971.json | 25 + 2017/CVE-2017-5007.json | 25 + 2017/CVE-2017-5123.json | 92 + 2017/CVE-2017-5124.json | 25 + 2017/CVE-2017-5223.json | 25 + 2017/CVE-2017-5487.json | 69 + 2017/CVE-2017-5638.json | 437 ++++ 2017/CVE-2017-5645.json | 25 + 2017/CVE-2017-5689.json | 23 + 2017/CVE-2017-5715.json | 69 + 2017/CVE-2017-5721.json | 25 + 2017/CVE-2017-5753.json | 138 ++ 2017/CVE-2017-5754.json | 115 + 2017/CVE-2017-5792.json | 25 + 2017/CVE-2017-6079.json | 25 + 2017/CVE-2017-6090.json | 25 + 2017/CVE-2017-6736.json | 48 + 2017/CVE-2017-6913.json | 25 + 2017/CVE-2017-6971.json | 23 + 2017/CVE-2017-7038.json | 25 + 2017/CVE-2017-7047.json | 48 + 2017/CVE-2017-7061.json | 25 + 2017/CVE-2017-7089.json | 48 + 2017/CVE-2017-7092.json | 25 + 2017/CVE-2017-7173.json | 25 + 2017/CVE-2017-7184.json | 48 + 2017/CVE-2017-7269.json | 46 + 2017/CVE-2017-7374.json | 25 + 2017/CVE-2017-7494.json | 69 + 2017/CVE-2017-7525.json | 92 + 2017/CVE-2017-7529.json | 92 + 2017/CVE-2017-7679.json | 25 + 2017/CVE-2017-7912.json | 25 + 2017/CVE-2017-7998.json | 25 + 2017/CVE-2017-8046.json | 207 ++ 2017/CVE-2017-8464.json | 92 + 2017/CVE-2017-8465.json | 25 + 2017/CVE-2017-8529.json | 23 + 2017/CVE-2017-8570.json | 138 ++ 2017/CVE-2017-8625.json | 25 + 2017/CVE-2017-8641.json | 25 + 2017/CVE-2017-8759.json | 322 +++ 2017/CVE-2017-8760.json | 25 + 2017/CVE-2017-8802.json | 25 + 2017/CVE-2017-8890.json | 71 + 2017/CVE-2017-8917.json | 23 + 2017/CVE-2017-9097.json | 25 + 2017/CVE-2017-9101.json | 25 + 2017/CVE-2017-9248.json | 46 + 2017/CVE-2017-9417.json | 25 + 2017/CVE-2017-9430.json | 23 + 2017/CVE-2017-9476.json | 25 + 2017/CVE-2017-9506.json | 48 + 2017/CVE-2017-9544.json | 25 + 2017/CVE-2017-9554.json | 25 + 2017/CVE-2017-9779.json | 25 + 2017/CVE-2017-9791.json | 71 + 2017/CVE-2017-9798.json | 69 + 2017/CVE-2017-9805.json | 161 ++ 2017/CVE-2017-9830.json | 25 + 2017/CVE-2017-98505.json | 25 + 2017/CVE-2017-9934.json | 25 + 2017/CVE-2017-9999.json | 25 + 2018/CVE-2018-0296.json | 23 - 2018/CVE-2018-0952.json | 25 - 2018/CVE-2018-1000134.json | 25 - 2018/CVE-2018-1000802.json | 25 - 2018/CVE-2018-1002105.json | 46 - 2018/CVE-2018-10517.json | 25 - 2018/CVE-2018-10933.json | 529 ----- 2018/CVE-2018-10949.json | 25 - 2018/CVE-2018-11235.json | 23 - 2018/CVE-2018-11759.json | 23 - 2018/CVE-2018-11776.json | 253 --- 2018/CVE-2018-11788.json | 25 - 2018/CVE-2018-12018.json | 25 - 2018/CVE-2018-12038.json | 25 - 2018/CVE-2018-12418.json | 25 - 2018/CVE-2018-12463.json | 25 - 2018/CVE-2018-12537.json | 25 - 2018/CVE-2018-12540.json | 25 - 2018/CVE-2018-12613.json | 23 - 2018/CVE-2018-1270.json | 46 - 2018/CVE-2018-1273.json | 23 - 2018/CVE-2018-12895.json | 25 - 2018/CVE-2018-1313.json | 25 - 2018/CVE-2018-1324.json | 25 - 2018/CVE-2018-13784.json | 25 - 2018/CVE-2018-13864.json | 25 - 2018/CVE-2018-14.json | 25 - 2018/CVE-2018-14083.json | 25 - 2018/CVE-2018-14442.json | 23 - 2018/CVE-2018-14634.json | 25 - 2018/CVE-2018-14665.json | 23 - 2018/CVE-2018-14667.json | 92 - 2018/CVE-2018-14729.json | 25 - 2018/CVE-2018-14772.json | 25 - 2018/CVE-2018-14847.json | 69 - 2018/CVE-2018-15131.json | 25 - 2018/CVE-2018-15133.json | 23 - 2018/CVE-2018-15365.json | 25 - 2018/CVE-2018-15473.json | 46 - 2018/CVE-2018-15499.json | 25 - 2018/CVE-2018-15727.json | 25 - 2018/CVE-2018-15832.json | 25 - 2018/CVE-2018-15912.json | 25 - 2018/CVE-2018-15961.json | 23 - 2018/CVE-2018-15982.json | 92 - 2018/CVE-2018-16156.json | 25 - 2018/CVE-2018-16370.json | 25 - 2018/CVE-2018-16373.json | 25 - 2018/CVE-2018-16711.json | 25 - 2018/CVE-2018-16712.json | 25 - 2018/CVE-2018-16713.json | 25 - 2018/CVE-2018-16875.json | 25 - 2018/CVE-2018-16987.json | 25 - 2018/CVE-2018-17144.json | 48 - 2018/CVE-2018-17182.json | 71 - 2018/CVE-2018-17418.json | 25 - 2018/CVE-2018-17456.json | 46 - 2018/CVE-2018-17961.json | 25 - 2018/CVE-2018-18026.json | 25 - 2018/CVE-2018-18387.json | 25 - 2018/CVE-2018-18714.json | 25 - 2018/CVE-2018-19126.json | 25 - 2018/CVE-2018-19127.json | 25 - 2018/CVE-2018-19131.json | 25 - 2018/CVE-2018-19207.json | 23 - 2018/CVE-2018-19537.json | 25 - 2018/CVE-2018-19788.json | 94 - 2018/CVE-2018-19911.json | 25 - 2018/CVE-2018-2628.json | 69 - 2018/CVE-2018-2844.json | 25 - 2018/CVE-2018-2879.json | 23 - 2018/CVE-2018-2893.json | 138 -- 2018/CVE-2018-2894.json | 46 - 2018/CVE-2018-3191.json | 117 - 2018/CVE-2018-3245.json | 46 - 2018/CVE-2018-3252.json | 71 - 2018/CVE-2018-4013.json | 48 - 2018/CVE-2018-4121.json | 46 - 2018/CVE-2018-4233.json | 25 - 2018/CVE-2018-4242.json | 25 - 2018/CVE-2018-4327.json | 48 - 2018/CVE-2018-4330.json | 25 - 2018/CVE-2018-4407.json | 230 -- 2018/CVE-2018-4415.json | 25 - 2018/CVE-2018-4431.json | 25 - 2018/CVE-2018-4878.json | 46 - 2018/CVE-2018-5740.json | 25 - 2018/CVE-2018-5955.json | 23 - 2018/CVE-2018-6389.json | 69 - 2018/CVE-2018-6546.json | 23 - 2018/CVE-2018-6574.json | 92 - 2018/CVE-2018-6643.json | 25 - 2018/CVE-2018-7422.json | 25 - 2018/CVE-2018-7489.json | 25 - 2018/CVE-2018-7600.json | 46 - 2018/CVE-2018-7602.json | 23 - 2018/CVE-2018-7690.json | 25 - 2018/CVE-2018-7691.json | 25 - 2018/CVE-2018-7750.json | 25 - 2018/CVE-2018-8021.json | 25 - 2018/CVE-2018-8038.json | 25 - 2018/CVE-2018-8039.json | 25 - 2018/CVE-2018-8090.json | 25 - 2018/CVE-2018-8120.json | 69 - 2018/CVE-2018-8172.json | 25 - 2018/CVE-2018-8174.json | 46 - 2018/CVE-2018-8208.json | 25 - 2018/CVE-2018-8353.json | 25 - 2018/CVE-2018-8420.json | 25 - 2018/CVE-2018-8440.json | 25 - 2018/CVE-2018-8495.json | 25 - 2018/CVE-2018-8581.json | 46 - 2018/CVE-2018-8897.json | 23 - 2018/CVE-2018-9075.json | 25 - 2018/CVE-2018-9206.json | 46 - 2018/CVE-2018-9411.json | 25 - 2018/CVE-2018-9539.json | 25 - 2018/CVE-2018-9948.json | 48 - 2018/CVE-2018-9995.json | 23 - 2019/CVE-2019-17558.json | 12 +- 2019/CVE-2019-5475.json | 8 +- 2019/CVE-2019-6340.json | 8 +- 2019/CVE-2019-9193.json | 6 +- 2020/CVE-2020-0688.json | 8 +- 2020/CVE-2020-10199.json | 8 +- 2020/CVE-2020-10977.json | 23 + 2020/CVE-2020-14882.json | 12 +- 2020/CVE-2020-14883.json | 14 +- 2020/CVE-2020-17382.json | 4 +- 2020/CVE-2020-5902.json | 8 +- 2020/CVE-2020-6207.json | 8 +- 2021/CVE-2021-21402.json | 4 +- 2021/CVE-2021-25646.json | 14 +- 2021/CVE-2021-3129.json | 8 +- README.md | 1977 ++++++++++------- 307 files changed, 10217 insertions(+), 5825 deletions(-) create mode 100644 2005/CVE-2005-0603.json create mode 100644 2017/CVE-2017-0005.json create mode 100644 2017/CVE-2017-0075.json create mode 100644 2017/CVE-2017-0248.json create mode 100644 2017/CVE-2017-0263.json create mode 100644 2017/CVE-2017-0411.json create mode 100644 2017/CVE-2017-0554.json create mode 100644 2017/CVE-2017-0564.json create mode 100644 2017/CVE-2017-0785.json create mode 100644 2017/CVE-2017-0806.json create mode 100644 2017/CVE-2017-0807.json create mode 100644 2017/CVE-2017-1000083.json create mode 100644 2017/CVE-2017-1000117.json create mode 100644 2017/CVE-2017-1000250.json create mode 100644 2017/CVE-2017-1000251.json create mode 100644 2017/CVE-2017-1000253.json create mode 100644 2017/CVE-2017-1000405.json create mode 100644 2017/CVE-2017-1000475.json create mode 100644 2017/CVE-2017-1000499.json create mode 100644 2017/CVE-2017-1002101.json create mode 100644 2017/CVE-2017-10235.json create mode 100644 2017/CVE-2017-10352.json create mode 100644 2017/CVE-2017-10366.json create mode 100644 2017/CVE-2017-10617.json create mode 100644 2017/CVE-2017-10661.json create mode 100644 2017/CVE-2017-10797.json create mode 100644 2017/CVE-2017-11427.json create mode 100644 2017/CVE-2017-11503.json create mode 100644 2017/CVE-2017-11519.json create mode 100644 2017/CVE-2017-11611.json create mode 100644 2017/CVE-2017-11774.json create mode 100644 2017/CVE-2017-11816.json create mode 100644 2017/CVE-2017-11907.json create mode 100644 2017/CVE-2017-12149.json create mode 100644 2017/CVE-2017-12426.json create mode 100644 2017/CVE-2017-12542.json create mode 100644 2017/CVE-2017-12611.json rename 2018/CVE-2018-10936.json => 2017/CVE-2017-12624.json (58%) create mode 100644 2017/CVE-2017-12792.json create mode 100644 2017/CVE-2017-12852.json create mode 100644 2017/CVE-2017-12943.json create mode 100644 2017/CVE-2017-13089.json create mode 100644 2017/CVE-2017-13672.json create mode 100644 2017/CVE-2017-13868.json create mode 100644 2017/CVE-2017-13872.json create mode 100644 2017/CVE-2017-14105.json create mode 100644 2017/CVE-2017-14262.json create mode 100644 2017/CVE-2017-14263.json create mode 100644 2017/CVE-2017-14322.json create mode 100644 2017/CVE-2017-14491.json create mode 100644 2017/CVE-2017-14493.json create mode 100644 2017/CVE-2017-14719.json create mode 100644 2017/CVE-2017-14948.json create mode 100644 2017/CVE-2017-15120.json create mode 100644 2017/CVE-2017-15303.json create mode 100644 2017/CVE-2017-15394.json create mode 100644 2017/CVE-2017-15708.json create mode 100644 2017/CVE-2017-15715.json create mode 100644 2017/CVE-2017-16082.json create mode 100644 2017/CVE-2017-16088.json create mode 100644 2017/CVE-2017-16245.json create mode 100644 2017/CVE-2017-16524.json create mode 100644 2017/CVE-2017-16567.json create mode 100644 2017/CVE-2017-16568.json create mode 100644 2017/CVE-2017-16744.json create mode 100644 2017/CVE-2017-16806.json create mode 100644 2017/CVE-2017-16997.json create mode 100644 2017/CVE-2017-17692.json create mode 100644 2017/CVE-2017-18044.json create mode 100644 2017/CVE-2017-18345.json create mode 100644 2017/CVE-2017-18486.json create mode 100644 2017/CVE-2017-18635.json create mode 100644 2017/CVE-2017-2368.json create mode 100644 2017/CVE-2017-2388.json rename 2018/CVE-2018-1259.json => 2017/CVE-2017-2666.json (58%) create mode 100644 2017/CVE-2017-3000.json create mode 100644 2017/CVE-2017-3066.json create mode 100644 2017/CVE-2017-3143.json create mode 100644 2017/CVE-2017-3241.json create mode 100644 2017/CVE-2017-4878.json create mode 100644 2017/CVE-2017-4971.json create mode 100644 2017/CVE-2017-5007.json create mode 100644 2017/CVE-2017-5124.json create mode 100644 2017/CVE-2017-5223.json create mode 100644 2017/CVE-2017-5645.json create mode 100644 2017/CVE-2017-5721.json create mode 100644 2017/CVE-2017-5792.json create mode 100644 2017/CVE-2017-6079.json create mode 100644 2017/CVE-2017-6090.json create mode 100644 2017/CVE-2017-6736.json create mode 100644 2017/CVE-2017-6913.json create mode 100644 2017/CVE-2017-7038.json create mode 100644 2017/CVE-2017-7047.json create mode 100644 2017/CVE-2017-7061.json create mode 100644 2017/CVE-2017-7089.json create mode 100644 2017/CVE-2017-7092.json create mode 100644 2017/CVE-2017-7173.json create mode 100644 2017/CVE-2017-7184.json create mode 100644 2017/CVE-2017-7374.json create mode 100644 2017/CVE-2017-7679.json create mode 100644 2017/CVE-2017-7912.json create mode 100644 2017/CVE-2017-7998.json create mode 100644 2017/CVE-2017-8465.json create mode 100644 2017/CVE-2017-8625.json create mode 100644 2017/CVE-2017-8641.json create mode 100644 2017/CVE-2017-8760.json create mode 100644 2017/CVE-2017-8802.json create mode 100644 2017/CVE-2017-8890.json create mode 100644 2017/CVE-2017-9097.json create mode 100644 2017/CVE-2017-9101.json create mode 100644 2017/CVE-2017-9417.json create mode 100644 2017/CVE-2017-9476.json create mode 100644 2017/CVE-2017-9506.json create mode 100644 2017/CVE-2017-9544.json create mode 100644 2017/CVE-2017-9554.json create mode 100644 2017/CVE-2017-9779.json create mode 100644 2017/CVE-2017-9791.json create mode 100644 2017/CVE-2017-9830.json create mode 100644 2017/CVE-2017-98505.json create mode 100644 2017/CVE-2017-9934.json create mode 100644 2017/CVE-2017-9999.json delete mode 100644 2018/CVE-2018-0952.json delete mode 100644 2018/CVE-2018-1000134.json delete mode 100644 2018/CVE-2018-1000802.json delete mode 100644 2018/CVE-2018-10517.json delete mode 100644 2018/CVE-2018-10949.json delete mode 100644 2018/CVE-2018-11788.json delete mode 100644 2018/CVE-2018-12018.json delete mode 100644 2018/CVE-2018-12038.json delete mode 100644 2018/CVE-2018-12418.json delete mode 100644 2018/CVE-2018-12463.json delete mode 100644 2018/CVE-2018-12537.json delete mode 100644 2018/CVE-2018-12540.json delete mode 100644 2018/CVE-2018-12895.json delete mode 100644 2018/CVE-2018-1313.json delete mode 100644 2018/CVE-2018-1324.json delete mode 100644 2018/CVE-2018-13784.json delete mode 100644 2018/CVE-2018-13864.json delete mode 100644 2018/CVE-2018-14.json delete mode 100644 2018/CVE-2018-14083.json delete mode 100644 2018/CVE-2018-14634.json delete mode 100644 2018/CVE-2018-14729.json delete mode 100644 2018/CVE-2018-14772.json delete mode 100644 2018/CVE-2018-15131.json delete mode 100644 2018/CVE-2018-15365.json delete mode 100644 2018/CVE-2018-15499.json delete mode 100644 2018/CVE-2018-15727.json delete mode 100644 2018/CVE-2018-15832.json delete mode 100644 2018/CVE-2018-15912.json delete mode 100644 2018/CVE-2018-16156.json delete mode 100644 2018/CVE-2018-16370.json delete mode 100644 2018/CVE-2018-16373.json delete mode 100644 2018/CVE-2018-16711.json delete mode 100644 2018/CVE-2018-16712.json delete mode 100644 2018/CVE-2018-16713.json delete mode 100644 2018/CVE-2018-16875.json delete mode 100644 2018/CVE-2018-16987.json delete mode 100644 2018/CVE-2018-17144.json delete mode 100644 2018/CVE-2018-17182.json delete mode 100644 2018/CVE-2018-17418.json delete mode 100644 2018/CVE-2018-17961.json delete mode 100644 2018/CVE-2018-18026.json delete mode 100644 2018/CVE-2018-18387.json delete mode 100644 2018/CVE-2018-18714.json delete mode 100644 2018/CVE-2018-19126.json delete mode 100644 2018/CVE-2018-19127.json delete mode 100644 2018/CVE-2018-19131.json delete mode 100644 2018/CVE-2018-19537.json delete mode 100644 2018/CVE-2018-19788.json delete mode 100644 2018/CVE-2018-19911.json delete mode 100644 2018/CVE-2018-2844.json delete mode 100644 2018/CVE-2018-3191.json delete mode 100644 2018/CVE-2018-3252.json delete mode 100644 2018/CVE-2018-4013.json delete mode 100644 2018/CVE-2018-4233.json delete mode 100644 2018/CVE-2018-4242.json delete mode 100644 2018/CVE-2018-4327.json delete mode 100644 2018/CVE-2018-4330.json delete mode 100644 2018/CVE-2018-4415.json delete mode 100644 2018/CVE-2018-4431.json delete mode 100644 2018/CVE-2018-5740.json delete mode 100644 2018/CVE-2018-6643.json delete mode 100644 2018/CVE-2018-7422.json delete mode 100644 2018/CVE-2018-7489.json delete mode 100644 2018/CVE-2018-7690.json delete mode 100644 2018/CVE-2018-7691.json delete mode 100644 2018/CVE-2018-7750.json delete mode 100644 2018/CVE-2018-8021.json delete mode 100644 2018/CVE-2018-8038.json delete mode 100644 2018/CVE-2018-8039.json delete mode 100644 2018/CVE-2018-8090.json delete mode 100644 2018/CVE-2018-8172.json delete mode 100644 2018/CVE-2018-8208.json delete mode 100644 2018/CVE-2018-8353.json delete mode 100644 2018/CVE-2018-8420.json delete mode 100644 2018/CVE-2018-8440.json delete mode 100644 2018/CVE-2018-8495.json delete mode 100644 2018/CVE-2018-9075.json delete mode 100644 2018/CVE-2018-9411.json delete mode 100644 2018/CVE-2018-9539.json delete mode 100644 2018/CVE-2018-9948.json diff --git a/2005/CVE-2005-0603.json b/2005/CVE-2005-0603.json new file mode 100644 index 0000000000..1c72318770 --- /dev/null +++ b/2005/CVE-2005-0603.json @@ -0,0 +1,25 @@ +[ + { + "id": 291075050, + "name": "CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure", + "full_name": "Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure", + "owner": { + "login": "Parcer0", + "id": 70012338, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4", + "html_url": "https:\/\/github.com\/Parcer0" + }, + "html_url": "https:\/\/github.com\/Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure", + "description": null, + "fork": false, + "created_at": "2020-08-28T15:01:49Z", + "updated_at": "2020-08-28T15:04:23Z", + "pushed_at": "2020-08-28T15:04:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index dc02abb0fa..7becf30a72 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -274,5 +274,28 @@ "forks": 1, "watchers": 1, "score": 0 + }, + { + "id": 356803395, + "name": "CVE-2007-2447", + "full_name": "Un4gi\/CVE-2007-2447", + "owner": { + "login": "Un4gi", + "id": 47873286, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47873286?v=4", + "html_url": "https:\/\/github.com\/Un4gi" + }, + "html_url": "https:\/\/github.com\/Un4gi\/CVE-2007-2447", + "description": "Samba 3.0.20 username map script exploit", + "fork": false, + "created_at": "2021-04-11T07:53:20Z", + "updated_at": "2021-04-11T07:57:36Z", + "pushed_at": "2021-04-11T07:57:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2011/CVE-2011-3389.json b/2011/CVE-2011-3389.json index fac2c00422..d999d0f105 100644 --- a/2011/CVE-2011-3389.json +++ b/2011/CVE-2011-3389.json @@ -13,13 +13,13 @@ "description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:", "fork": false, "created_at": "2015-03-28T10:28:16Z", - "updated_at": "2021-01-13T01:04:57Z", + "updated_at": "2021-04-11T05:02:43Z", "pushed_at": "2019-01-30T21:36:22Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "forks_count": 27, "forks": 27, - "watchers": 43, + "watchers": 44, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-10033.json b/2016/CVE-2016-10033.json index 4992a16717..0afd4e3d7d 100644 --- a/2016/CVE-2016-10033.json +++ b/2016/CVE-2016-10033.json @@ -13,13 +13,13 @@ "description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2016-12-26T13:39:03Z", - "updated_at": "2021-03-04T03:13:53Z", + "updated_at": "2021-04-11T06:59:43Z", "pushed_at": "2019-10-13T12:23:02Z", - "stargazers_count": 356, - "watchers_count": 356, + "stargazers_count": 357, + "watchers_count": 357, "forks_count": 143, "forks": 143, - "watchers": 356, + "watchers": 357, "score": 0 }, { diff --git a/2017/CVE-2017-0005.json b/2017/CVE-2017-0005.json new file mode 100644 index 0000000000..a2b57c2ba7 --- /dev/null +++ b/2017/CVE-2017-0005.json @@ -0,0 +1,25 @@ +[ + { + "id": 219656365, + "name": "0005poc", + "full_name": "sheri31\/0005poc", + "owner": { + "login": "sheri31", + "id": 22992048, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22992048?v=4", + "html_url": "https:\/\/github.com\/sheri31" + }, + "html_url": "https:\/\/github.com\/sheri31\/0005poc", + "description": "CVE-2017-0005 POC", + "fork": false, + "created_at": "2019-11-05T04:18:08Z", + "updated_at": "2020-06-30T07:30:09Z", + "pushed_at": "2019-11-05T04:21:48Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0075.json b/2017/CVE-2017-0075.json new file mode 100644 index 0000000000..0c6fcf51f0 --- /dev/null +++ b/2017/CVE-2017-0075.json @@ -0,0 +1,25 @@ +[ + { + "id": 207950188, + "name": "HyperV", + "full_name": "4B5F5F4B\/HyperV", + "owner": { + "login": "4B5F5F4B", + "id": 19218802, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19218802?v=4", + "html_url": "https:\/\/github.com\/4B5F5F4B" + }, + "html_url": "https:\/\/github.com\/4B5F5F4B\/HyperV", + "description": "PoC for CVE-2017-0075", + "fork": false, + "created_at": "2019-09-12T02:45:07Z", + "updated_at": "2020-10-23T13:19:09Z", + "pushed_at": "2019-09-12T03:02:13Z", + "stargazers_count": 34, + "watchers_count": 34, + "forks_count": 15, + "forks": 15, + "watchers": 34, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json index 0a795fef1a..2c1f5cdd60 100644 --- a/2017/CVE-2017-0144.json +++ b/2017/CVE-2017-0144.json @@ -1,4 +1,50 @@ [ + { + "id": 97406900, + "name": "eternal_scanner", + "full_name": "peterpt\/eternal_scanner", + "owner": { + "login": "peterpt", + "id": 7487321, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7487321?v=4", + "html_url": "https:\/\/github.com\/peterpt" + }, + "html_url": "https:\/\/github.com\/peterpt\/eternal_scanner", + "description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)", + "fork": false, + "created_at": "2017-07-16T19:44:04Z", + "updated_at": "2021-04-08T07:30:06Z", + "pushed_at": "2019-07-23T19:24:01Z", + "stargazers_count": 277, + "watchers_count": 277, + "forks_count": 110, + "forks": 110, + "watchers": 277, + "score": 0 + }, + { + "id": 189801410, + "name": "eternalblue", + "full_name": "kimocoder\/eternalblue", + "owner": { + "login": "kimocoder", + "id": 4252297, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4252297?v=4", + "html_url": "https:\/\/github.com\/kimocoder" + }, + "html_url": "https:\/\/github.com\/kimocoder\/eternalblue", + "description": "CVE-2017-0144", + "fork": false, + "created_at": "2019-06-02T03:41:47Z", + "updated_at": "2021-03-17T09:29:07Z", + "pushed_at": "2019-06-02T03:51:12Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 350284554, "name": "CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution", diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index 25a13db79e..1da9d5879a 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -275,6 +275,121 @@ "watchers": 1, "score": 0 }, + { + "id": 104072875, + "name": "CVE-2017-0199", + "full_name": "viethdgit\/CVE-2017-0199", + "owner": { + "login": "viethdgit", + "id": 24888568, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24888568?v=4", + "html_url": "https:\/\/github.com\/viethdgit" + }, + "html_url": "https:\/\/github.com\/viethdgit\/CVE-2017-0199", + "description": null, + "fork": false, + "created_at": "2017-09-19T12:38:47Z", + "updated_at": "2017-09-19T12:38:47Z", + "pushed_at": "2017-09-19T12:47:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 109420190, + "name": "RTF-Cleaner", + "full_name": "nicpenning\/RTF-Cleaner", + "owner": { + "login": "nicpenning", + "id": 5582679, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5582679?v=4", + "html_url": "https:\/\/github.com\/nicpenning" + }, + "html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner", + "description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.", + "fork": false, + "created_at": "2017-11-03T16:47:16Z", + "updated_at": "2019-06-29T16:49:45Z", + "pushed_at": "2017-11-03T20:55:20Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 2, + "forks": 2, + "watchers": 3, + "score": 0 + }, + { + "id": 111145351, + "name": "2017-11-17-Maldoc-Using-CVE-2017-0199", + "full_name": "bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199", + "owner": { + "login": "bloomer1016", + "id": 12056770, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12056770?v=4", + "html_url": "https:\/\/github.com\/bloomer1016" + }, + "html_url": "https:\/\/github.com\/bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199", + "description": null, + "fork": false, + "created_at": "2017-11-17T20:00:29Z", + "updated_at": "2020-03-29T03:29:38Z", + "pushed_at": "2017-11-17T20:00:42Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 113558617, + "name": "RTF-Cleaner", + "full_name": "jacobsoo\/RTF-Cleaner", + "owner": { + "login": "jacobsoo", + "id": 3516693, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3516693?v=4", + "html_url": "https:\/\/github.com\/jacobsoo" + }, + "html_url": "https:\/\/github.com\/jacobsoo\/RTF-Cleaner", + "description": "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759", + "fork": false, + "created_at": "2017-12-08T09:45:25Z", + "updated_at": "2018-02-21T04:37:47Z", + "pushed_at": "2017-12-08T09:46:07Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "forks": 1, + "watchers": 3, + "score": 0 + }, + { + "id": 126305253, + "name": "CVE-2017-0199", + "full_name": "likescam\/CVE-2017-0199", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2017-0199", + "description": null, + "fork": false, + "created_at": "2018-03-22T08:40:55Z", + "updated_at": "2018-03-22T08:41:14Z", + "pushed_at": "2018-03-22T08:41:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 305189722, "name": "CVE-2017-0199-PY-KIT", diff --git a/2017/CVE-2017-0213.json b/2017/CVE-2017-0213.json index f72b6b64a2..935f8dc8b8 100644 --- a/2017/CVE-2017-0213.json +++ b/2017/CVE-2017-0213.json @@ -21,5 +21,143 @@ "forks": 6, "watchers": 1, "score": 0 + }, + { + "id": 95974378, + "name": "CVE-2017-0213", + "full_name": "zcgonvh\/CVE-2017-0213", + "owner": { + "login": "zcgonvh", + "id": 25787677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4", + "html_url": "https:\/\/github.com\/zcgonvh" + }, + "html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213", + "description": "CVE-2017-0213 for command line", + "fork": false, + "created_at": "2017-07-01T16:07:04Z", + "updated_at": "2020-10-21T22:15:15Z", + "pushed_at": "2017-07-01T16:19:12Z", + "stargazers_count": 55, + "watchers_count": 55, + "forks_count": 25, + "forks": 25, + "watchers": 55, + "score": 0 + }, + { + "id": 105444160, + "name": "CVE-2017-0213", + "full_name": "billa3283\/CVE-2017-0213", + "owner": { + "login": "billa3283", + "id": 32428387, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32428387?v=4", + "html_url": "https:\/\/github.com\/billa3283" + }, + "html_url": "https:\/\/github.com\/billa3283\/CVE-2017-0213", + "description": null, + "fork": false, + "created_at": "2017-10-01T13:29:59Z", + "updated_at": "2017-10-01T13:29:59Z", + "pushed_at": "2017-10-01T13:30:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 125799686, + "name": "CVE-2017-0213", + "full_name": "likescam\/CVE-2017-0213", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2017-0213", + "description": null, + "fork": false, + "created_at": "2018-03-19T04:04:05Z", + "updated_at": "2018-03-19T04:04:05Z", + "pushed_at": "2018-03-19T04:04:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 126122153, + "name": "CVE-2017-0213", + "full_name": "jbooz1\/CVE-2017-0213", + "owner": { + "login": "jbooz1", + "id": 19398243, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19398243?v=4", + "html_url": "https:\/\/github.com\/jbooz1" + }, + "html_url": "https:\/\/github.com\/jbooz1\/CVE-2017-0213", + "description": "A version of CVE-2017-0213 that I plan to use with an Empire stager", + "fork": false, + "created_at": "2018-03-21T04:13:29Z", + "updated_at": "2020-11-25T23:04:06Z", + "pushed_at": "2018-03-21T04:20:46Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 3, + "forks": 3, + "watchers": 1, + "score": 0 + }, + { + "id": 128978997, + "name": "CVE-2017-0213", + "full_name": "eonrickity\/CVE-2017-0213", + "owner": { + "login": "eonrickity", + "id": 33985450, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33985450?v=4", + "html_url": "https:\/\/github.com\/eonrickity" + }, + "html_url": "https:\/\/github.com\/eonrickity\/CVE-2017-0213", + "description": "Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.", + "fork": false, + "created_at": "2018-04-10T18:34:17Z", + "updated_at": "2020-11-25T23:03:02Z", + "pushed_at": "2018-04-17T23:14:39Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 7, + "forks": 7, + "watchers": 2, + "score": 0 + }, + { + "id": 194031587, + "name": "CVE-2017-0213-Exploit", + "full_name": "Jos675\/CVE-2017-0213-Exploit", + "owner": { + "login": "Jos675", + "id": 35967664, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35967664?v=4", + "html_url": "https:\/\/github.com\/Jos675" + }, + "html_url": "https:\/\/github.com\/Jos675\/CVE-2017-0213-Exploit", + "description": "Binary", + "fork": false, + "created_at": "2019-06-27T05:56:35Z", + "updated_at": "2020-11-25T23:11:22Z", + "pushed_at": "2019-07-04T04:25:15Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0248.json b/2017/CVE-2017-0248.json new file mode 100644 index 0000000000..2947e69c29 --- /dev/null +++ b/2017/CVE-2017-0248.json @@ -0,0 +1,25 @@ +[ + { + "id": 168158477, + "name": "CVE-2017-0248-Test", + "full_name": "rubenmamo\/CVE-2017-0248-Test", + "owner": { + "login": "rubenmamo", + "id": 7700562, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7700562?v=4", + "html_url": "https:\/\/github.com\/rubenmamo" + }, + "html_url": "https:\/\/github.com\/rubenmamo\/CVE-2017-0248-Test", + "description": "Sample project to test using Microsoft.CodeDom.Providers.DotNetCompilerPlatform 2.0.1 causing CVE-2017-0248", + "fork": false, + "created_at": "2019-01-29T13:23:24Z", + "updated_at": "2019-01-29T13:33:26Z", + "pushed_at": "2019-01-29T13:33:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0261.json b/2017/CVE-2017-0261.json index fec298b546..e397b3bf3f 100644 --- a/2017/CVE-2017-0261.json +++ b/2017/CVE-2017-0261.json @@ -1,4 +1,27 @@ [ + { + "id": 178656447, + "name": "eps-CVE-2017-0261", + "full_name": "kcufId\/eps-CVE-2017-0261", + "owner": { + "login": "kcufId", + "id": 10615265, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10615265?v=4", + "html_url": "https:\/\/github.com\/kcufId" + }, + "html_url": "https:\/\/github.com\/kcufId\/eps-CVE-2017-0261", + "description": "eps漏洞(CVE-2017-0261)漏洞分析", + "fork": false, + "created_at": "2019-03-31T07:29:48Z", + "updated_at": "2020-09-25T03:29:33Z", + "pushed_at": "2019-03-31T07:39:37Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 6, + "forks": 6, + "watchers": 5, + "score": 0 + }, { "id": 289408689, "name": "CVE-2017-0261", diff --git a/2017/CVE-2017-0263.json b/2017/CVE-2017-0263.json new file mode 100644 index 0000000000..5496df0736 --- /dev/null +++ b/2017/CVE-2017-0263.json @@ -0,0 +1,25 @@ +[ + { + "id": 164377700, + "name": "cve-2017-0263-poc", + "full_name": "R06otMD5\/cve-2017-0263-poc", + "owner": { + "login": "R06otMD5", + "id": 25081496, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25081496?v=4", + "html_url": "https:\/\/github.com\/R06otMD5" + }, + "html_url": "https:\/\/github.com\/R06otMD5\/cve-2017-0263-poc", + "description": "poc for 0263", + "fork": false, + "created_at": "2019-01-07T04:21:25Z", + "updated_at": "2019-01-07T04:21:28Z", + "pushed_at": "2019-01-07T04:21:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0411.json b/2017/CVE-2017-0411.json new file mode 100644 index 0000000000..36ef3430bd --- /dev/null +++ b/2017/CVE-2017-0411.json @@ -0,0 +1,25 @@ +[ + { + "id": 132620665, + "name": "PoC", + "full_name": "lulusudoku\/PoC", + "owner": { + "login": "lulusudoku", + "id": 11342842, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11342842?v=4", + "html_url": "https:\/\/github.com\/lulusudoku" + }, + "html_url": "https:\/\/github.com\/lulusudoku\/PoC", + "description": "CVE-2017-0411 PoC refered p0", + "fork": false, + "created_at": "2018-05-08T14:25:29Z", + "updated_at": "2018-05-09T06:10:02Z", + "pushed_at": "2018-05-09T06:10:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0478.json b/2017/CVE-2017-0478.json index 7e8be125b7..e36c4ade7d 100644 --- a/2017/CVE-2017-0478.json +++ b/2017/CVE-2017-0478.json @@ -21,5 +21,28 @@ "forks": 5, "watchers": 7, "score": 0 + }, + { + "id": 141312944, + "name": "CVE-2017-0478", + "full_name": "likescam\/CVE-2017-0478", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2017-0478", + "description": null, + "fork": false, + "created_at": "2018-07-17T16:01:13Z", + "updated_at": "2018-07-17T16:01:28Z", + "pushed_at": "2018-07-17T16:01:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0541.json b/2017/CVE-2017-0541.json index 71b1ce46bb..ad95e69b87 100644 --- a/2017/CVE-2017-0541.json +++ b/2017/CVE-2017-0541.json @@ -21,5 +21,28 @@ "forks": 11, "watchers": 19, "score": 0 + }, + { + "id": 141312906, + "name": "CVE-2017-0541", + "full_name": "likescam\/CVE-2017-0541", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2017-0541", + "description": null, + "fork": false, + "created_at": "2018-07-17T16:00:57Z", + "updated_at": "2018-07-17T16:01:14Z", + "pushed_at": "2018-07-17T16:01:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0554.json b/2017/CVE-2017-0554.json new file mode 100644 index 0000000000..1e31eeaba4 --- /dev/null +++ b/2017/CVE-2017-0554.json @@ -0,0 +1,25 @@ +[ + { + "id": 115291853, + "name": "tethr", + "full_name": "lanrat\/tethr", + "owner": { + "login": "lanrat", + "id": 164192, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164192?v=4", + "html_url": "https:\/\/github.com\/lanrat" + }, + "html_url": "https:\/\/github.com\/lanrat\/tethr", + "description": "Android Tethering Provisioning Check Bypass (CVE-2017-0554)", + "fork": false, + "created_at": "2017-12-24T23:18:28Z", + "updated_at": "2020-09-10T21:28:07Z", + "pushed_at": "2020-09-11T04:45:20Z", + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 3, + "forks": 3, + "watchers": 10, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0564.json b/2017/CVE-2017-0564.json new file mode 100644 index 0000000000..dee2c11769 --- /dev/null +++ b/2017/CVE-2017-0564.json @@ -0,0 +1,25 @@ +[ + { + "id": 117041381, + "name": "CVE-2017-0564-ION-PoC", + "full_name": "guoygang\/CVE-2017-0564-ION-PoC", + "owner": { + "login": "guoygang", + "id": 16954452, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16954452?v=4", + "html_url": "https:\/\/github.com\/guoygang" + }, + "html_url": "https:\/\/github.com\/guoygang\/CVE-2017-0564-ION-PoC", + "description": "ION通用提权漏洞PoC以及分析", + "fork": false, + "created_at": "2018-01-11T02:50:26Z", + "updated_at": "2019-07-16T01:41:58Z", + "pushed_at": "2018-01-11T02:53:43Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, + "forks": 1, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index abb4fe5c40..6be90430ee 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -1,4 +1,50 @@ [ + { + "id": 106299703, + "name": "CVE-2017-0781", + "full_name": "ojasookert\/CVE-2017-0781", + "owner": { + "login": "ojasookert", + "id": 12931198, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4", + "html_url": "https:\/\/github.com\/ojasookert" + }, + "html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0781", + "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", + "fork": false, + "created_at": "2017-10-09T15:13:25Z", + "updated_at": "2021-02-13T17:52:38Z", + "pushed_at": "2017-10-09T15:20:11Z", + "stargazers_count": 74, + "watchers_count": 74, + "forks_count": 37, + "forks": 37, + "watchers": 74, + "score": 0 + }, + { + "id": 125669064, + "name": "android712-blueborne", + "full_name": "marcinguy\/android712-blueborne", + "owner": { + "login": "marcinguy", + "id": 20355405, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4", + "html_url": "https:\/\/github.com\/marcinguy" + }, + "html_url": "https:\/\/github.com\/marcinguy\/android712-blueborne", + "description": "Android Blueborne RCE CVE-2017-0781", + "fork": false, + "created_at": "2018-03-17T21:07:24Z", + "updated_at": "2020-12-14T00:02:06Z", + "pushed_at": "2018-04-04T12:59:18Z", + "stargazers_count": 68, + "watchers_count": 68, + "forks_count": 23, + "forks": 23, + "watchers": 68, + "score": 0 + }, { "id": 283876725, "name": "BlueborneDetection", diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json new file mode 100644 index 0000000000..295adb0d91 --- /dev/null +++ b/2017/CVE-2017-0785.json @@ -0,0 +1,186 @@ +[ + { + "id": 104278164, + "name": "CVE-2017-0785", + "full_name": "ojasookert\/CVE-2017-0785", + "owner": { + "login": "ojasookert", + "id": 12931198, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4", + "html_url": "https:\/\/github.com\/ojasookert" + }, + "html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0785", + "description": "Blueborne CVE-2017-0785 Android information leak vulnerability", + "fork": false, + "created_at": "2017-09-20T23:32:29Z", + "updated_at": "2021-03-24T04:29:31Z", + "pushed_at": "2017-09-23T05:11:45Z", + "stargazers_count": 427, + "watchers_count": 427, + "forks_count": 188, + "forks": 188, + "watchers": 427, + "score": 0 + }, + { + "id": 104516404, + "name": "CVE-2017-0785", + "full_name": "aymankhalfatni\/CVE-2017-0785", + "owner": { + "login": "aymankhalfatni", + "id": 19715320, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19715320?v=4", + "html_url": "https:\/\/github.com\/aymankhalfatni" + }, + "html_url": "https:\/\/github.com\/aymankhalfatni\/CVE-2017-0785", + "description": "CVE-2017-0785: BlueBorne PoC", + "fork": false, + "created_at": "2017-09-22T20:33:12Z", + "updated_at": "2017-09-22T20:34:33Z", + "pushed_at": "2017-09-22T20:34:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 104522460, + "name": "-CVE-2017-0785-BlueBorne-PoC", + "full_name": "Alfa100001\/-CVE-2017-0785-BlueBorne-PoC", + "owner": { + "login": "Alfa100001", + "id": 29385626, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29385626?v=4", + "html_url": "https:\/\/github.com\/Alfa100001" + }, + "html_url": "https:\/\/github.com\/Alfa100001\/-CVE-2017-0785-BlueBorne-PoC", + "description": "CVE-2017-0785 BlueBorne PoC", + "fork": false, + "created_at": "2017-09-22T22:03:40Z", + "updated_at": "2020-09-10T09:52:50Z", + "pushed_at": "2017-09-22T22:23:52Z", + "stargazers_count": 27, + "watchers_count": 27, + "forks_count": 14, + "forks": 14, + "watchers": 27, + "score": 0 + }, + { + "id": 105568835, + "name": "BlueBorne-CVE-2017-0785", + "full_name": "Hackerscript\/BlueBorne-CVE-2017-0785", + "owner": { + "login": "Hackerscript", + "id": 29609985, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29609985?v=4", + "html_url": "https:\/\/github.com\/Hackerscript" + }, + "html_url": "https:\/\/github.com\/Hackerscript\/BlueBorne-CVE-2017-0785", + "description": "this script is used for hack bluetooth devices CVE 2017 0785 which was done by ARMIS This File is password protected for password contact atusha@gmail.comr", + "fork": false, + "created_at": "2017-10-02T18:21:43Z", + "updated_at": "2017-10-02T18:21:43Z", + "pushed_at": "2017-10-02T18:21:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 105816209, + "name": "blueborne", + "full_name": "pieterbork\/blueborne", + "owner": { + "login": "pieterbork", + "id": 31708728, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31708728?v=4", + "html_url": "https:\/\/github.com\/pieterbork" + }, + "html_url": "https:\/\/github.com\/pieterbork\/blueborne", + "description": "Scan\/Exploit Blueborne CVE-2017-0785", + "fork": false, + "created_at": "2017-10-04T20:41:12Z", + "updated_at": "2021-01-23T04:49:59Z", + "pushed_at": "2018-02-28T07:04:05Z", + "stargazers_count": 31, + "watchers_count": 31, + "forks_count": 23, + "forks": 23, + "watchers": 31, + "score": 0 + }, + { + "id": 116589306, + "name": "diff", + "full_name": "sigbitsadmin\/diff", + "owner": { + "login": "sigbitsadmin", + "id": 33204560, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33204560?v=4", + "html_url": "https:\/\/github.com\/sigbitsadmin" + }, + "html_url": "https:\/\/github.com\/sigbitsadmin\/diff", + "description": "Simply diff for CVE-2017-0785", + "fork": false, + "created_at": "2018-01-07T18:30:42Z", + "updated_at": "2018-01-07T18:31:03Z", + "pushed_at": "2018-01-07T18:31:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 117460479, + "name": "diff", + "full_name": "SigBitsLabs\/diff", + "owner": { + "login": "SigBitsLabs", + "id": 33204577, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33204577?v=4", + "html_url": "https:\/\/github.com\/SigBitsLabs" + }, + "html_url": "https:\/\/github.com\/SigBitsLabs\/diff", + "description": "diff for CVE-2017-0785 (Blueborne)", + "fork": false, + "created_at": "2018-01-14T19:36:03Z", + "updated_at": "2018-01-14T19:36:27Z", + "pushed_at": "2018-01-14T19:36:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 122293991, + "name": "Bluetooth-Crash-CVE-2017-0785", + "full_name": "RavSS\/Bluetooth-Crash-CVE-2017-0785", + "owner": { + "login": "RavSS", + "id": 31635233, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31635233?v=4", + "html_url": "https:\/\/github.com\/RavSS" + }, + "html_url": "https:\/\/github.com\/RavSS\/Bluetooth-Crash-CVE-2017-0785", + "description": null, + "fork": false, + "created_at": "2018-02-21T04:53:41Z", + "updated_at": "2019-07-28T03:26:34Z", + "pushed_at": "2018-04-20T16:12:27Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0806.json b/2017/CVE-2017-0806.json new file mode 100644 index 0000000000..761a33fe80 --- /dev/null +++ b/2017/CVE-2017-0806.json @@ -0,0 +1,25 @@ +[ + { + "id": 135889098, + "name": "ReparcelBug", + "full_name": "michalbednarski\/ReparcelBug", + "owner": { + "login": "michalbednarski", + "id": 1826899, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1826899?v=4", + "html_url": "https:\/\/github.com\/michalbednarski" + }, + "html_url": "https:\/\/github.com\/michalbednarski\/ReparcelBug", + "description": "CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel\/createFromParcel mismatch)", + "fork": false, + "created_at": "2018-06-03T09:04:50Z", + "updated_at": "2021-01-10T22:51:51Z", + "pushed_at": "2018-06-03T09:06:00Z", + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 8, + "forks": 8, + "watchers": 9, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-0807.json b/2017/CVE-2017-0807.json new file mode 100644 index 0000000000..423e4fddcf --- /dev/null +++ b/2017/CVE-2017-0807.json @@ -0,0 +1,25 @@ +[ + { + "id": 117631583, + "name": "PoC_CVE-2017-0807", + "full_name": "kpatsakis\/PoC_CVE-2017-0807", + "owner": { + "login": "kpatsakis", + "id": 9294190, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9294190?v=4", + "html_url": "https:\/\/github.com\/kpatsakis" + }, + "html_url": "https:\/\/github.com\/kpatsakis\/PoC_CVE-2017-0807", + "description": "Proof of concept of CVE-2017-0807", + "fork": false, + "created_at": "2018-01-16T04:34:06Z", + "updated_at": "2018-11-26T05:17:02Z", + "pushed_at": "2018-01-16T04:55:43Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000083.json b/2017/CVE-2017-1000083.json new file mode 100644 index 0000000000..40246e17c4 --- /dev/null +++ b/2017/CVE-2017-1000083.json @@ -0,0 +1,48 @@ +[ + { + "id": 155380204, + "name": "evince-cve-2017-1000083", + "full_name": "matlink\/evince-cve-2017-1000083", + "owner": { + "login": "matlink", + "id": 4450078, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4", + "html_url": "https:\/\/github.com\/matlink" + }, + "html_url": "https:\/\/github.com\/matlink\/evince-cve-2017-1000083", + "description": null, + "fork": false, + "created_at": "2018-10-30T12:18:11Z", + "updated_at": "2018-11-15T16:16:21Z", + "pushed_at": "2018-11-15T16:16:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 155380798, + "name": "cve-2017-1000083-atril-nautilus", + "full_name": "matlink\/cve-2017-1000083-atril-nautilus", + "owner": { + "login": "matlink", + "id": 4450078, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4", + "html_url": "https:\/\/github.com\/matlink" + }, + "html_url": "https:\/\/github.com\/matlink\/cve-2017-1000083-atril-nautilus", + "description": null, + "fork": false, + "created_at": "2018-10-30T12:22:41Z", + "updated_at": "2018-10-30T12:24:39Z", + "pushed_at": "2018-10-30T12:24:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000112.json b/2017/CVE-2017-1000112.json index fd803389de..4e012856b1 100644 --- a/2017/CVE-2017-1000112.json +++ b/2017/CVE-2017-1000112.json @@ -1,4 +1,27 @@ [ + { + "id": 208989601, + "name": "docker_escape_pwn", + "full_name": "hikame\/docker_escape_pwn", + "owner": { + "login": "hikame", + "id": 6397196, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6397196?v=4", + "html_url": "https:\/\/github.com\/hikame" + }, + "html_url": "https:\/\/github.com\/hikame\/docker_escape_pwn", + "description": "Escape from Docker using CVE-2017-1000112 and CVE-2017-18344, including gaining root privilage, get all capbilities, namespace recovery, filesystem recovery, cgroup limitation bypass and seccomp bypass.", + "fork": false, + "created_at": "2019-09-17T07:38:47Z", + "updated_at": "2019-09-29T10:14:51Z", + "pushed_at": "2019-09-29T10:14:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 240509756, "name": "CVE-2017-1000112-Adpated", diff --git a/2017/CVE-2017-1000117.json b/2017/CVE-2017-1000117.json new file mode 100644 index 0000000000..e4225358ac --- /dev/null +++ b/2017/CVE-2017-1000117.json @@ -0,0 +1,531 @@ +[ + { + "id": 100002532, + "name": "CVE-2017-1000117", + "full_name": "timwr\/CVE-2017-1000117", + "owner": { + "login": "timwr", + "id": 684924, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4", + "html_url": "https:\/\/github.com\/timwr" + }, + "html_url": "https:\/\/github.com\/timwr\/CVE-2017-1000117", + "description": "Proof of concept of CVE-2017-1000117", + "fork": false, + "created_at": "2017-08-11T07:03:23Z", + "updated_at": "2019-01-23T02:32:39Z", + "pushed_at": "2017-08-11T08:27:04Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 16, + "forks": 16, + "watchers": 6, + "score": 0 + }, + { + "id": 100058519, + "name": "test-git-vuln_CVE-2017-1000117", + "full_name": "GrahamMThomas\/test-git-vuln_CVE-2017-1000117", + "owner": { + "login": "GrahamMThomas", + "id": 14031456, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14031456?v=4", + "html_url": "https:\/\/github.com\/GrahamMThomas" + }, + "html_url": "https:\/\/github.com\/GrahamMThomas\/test-git-vuln_CVE-2017-1000117", + "description": "Repo to test the new git vulnerability", + "fork": false, + "created_at": "2017-08-11T18:05:01Z", + "updated_at": "2017-09-26T17:09:13Z", + "pushed_at": "2017-08-11T20:15:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 100069051, + "name": "CVE-2017-1000117", + "full_name": "Manouchehri\/CVE-2017-1000117", + "owner": { + "login": "Manouchehri", + "id": 7232674, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7232674?v=4", + "html_url": "https:\/\/github.com\/Manouchehri" + }, + "html_url": "https:\/\/github.com\/Manouchehri\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-08-11T20:47:53Z", + "updated_at": "2018-04-19T04:23:54Z", + "pushed_at": "2017-08-11T21:26:33Z", + "stargazers_count": 16, + "watchers_count": 16, + "forks_count": 14, + "forks": 14, + "watchers": 16, + "score": 0 + }, + { + "id": 100080640, + "name": "CVE-2017-1000117", + "full_name": "thelastbyte\/CVE-2017-1000117", + "owner": { + "login": "thelastbyte", + "id": 7829097, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7829097?v=4", + "html_url": "https:\/\/github.com\/thelastbyte" + }, + "html_url": "https:\/\/github.com\/thelastbyte\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-08-12T01:10:49Z", + "updated_at": "2017-09-01T22:06:02Z", + "pushed_at": "2017-09-01T22:08:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 100116587, + "name": "CVE-2017-1000117", + "full_name": "alilangtest\/CVE-2017-1000117", + "owner": { + "login": "alilangtest", + "id": 20162983, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20162983?v=4", + "html_url": "https:\/\/github.com\/alilangtest" + }, + "html_url": "https:\/\/github.com\/alilangtest\/CVE-2017-1000117", + "description": "test", + "fork": false, + "created_at": "2017-08-12T14:14:55Z", + "updated_at": "2019-05-09T09:27:01Z", + "pushed_at": "2017-08-12T14:25:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 100130122, + "name": "CVE-2017-1000117", + "full_name": "VulApps\/CVE-2017-1000117", + "owner": { + "login": "VulApps", + "id": 29811930, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29811930?v=4", + "html_url": "https:\/\/github.com\/VulApps" + }, + "html_url": "https:\/\/github.com\/VulApps\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-08-12T18:20:02Z", + "updated_at": "2020-03-21T15:06:32Z", + "pushed_at": "2017-08-12T18:22:32Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 22, + "forks": 22, + "watchers": 4, + "score": 0 + }, + { + "id": 100280254, + "name": "CVE-2017-1000117", + "full_name": "greymd\/CVE-2017-1000117", + "owner": { + "login": "greymd", + "id": 3874767, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4", + "html_url": "https:\/\/github.com\/greymd" + }, + "html_url": "https:\/\/github.com\/greymd\/CVE-2017-1000117", + "description": "Check Git's vulnerability CVE-2017-1000117", + "fork": false, + "created_at": "2017-08-14T15:05:48Z", + "updated_at": "2021-02-17T09:50:56Z", + "pushed_at": "2017-08-16T15:39:15Z", + "stargazers_count": 136, + "watchers_count": 136, + "forks_count": 25, + "forks": 25, + "watchers": 136, + "score": 0 + }, + { + "id": 100325886, + "name": "Fix-CVE-2017-1000117", + "full_name": "shogo82148\/Fix-CVE-2017-1000117", + "owner": { + "login": "shogo82148", + "id": 1157344, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1157344?v=4", + "html_url": "https:\/\/github.com\/shogo82148" + }, + "html_url": "https:\/\/github.com\/shogo82148\/Fix-CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-08-15T01:40:18Z", + "updated_at": "2017-08-17T03:44:20Z", + "pushed_at": "2017-08-17T03:44:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 100357293, + "name": "CVE-2017-1000117_wasawasa", + "full_name": "sasairc\/CVE-2017-1000117_wasawasa", + "owner": { + "login": "sasairc", + "id": 9349287, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9349287?v=4", + "html_url": "https:\/\/github.com\/sasairc" + }, + "html_url": "https:\/\/github.com\/sasairc\/CVE-2017-1000117_wasawasa", + "description": null, + "fork": false, + "created_at": "2017-08-15T08:39:23Z", + "updated_at": "2017-08-15T09:39:16Z", + "pushed_at": "2017-08-15T08:43:31Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 100374790, + "name": "CVE-2017-1000117-test", + "full_name": "Shadow5523\/CVE-2017-1000117-test", + "owner": { + "login": "Shadow5523", + "id": 22784789, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22784789?v=4", + "html_url": "https:\/\/github.com\/Shadow5523" + }, + "html_url": "https:\/\/github.com\/Shadow5523\/CVE-2017-1000117-test", + "description": "CVE-2017-1000117の検証", + "fork": false, + "created_at": "2017-08-15T12:24:57Z", + "updated_at": "2017-08-17T14:54:39Z", + "pushed_at": "2017-08-18T02:18:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 100437085, + "name": "CVE-2017-1000117", + "full_name": "bells17\/CVE-2017-1000117", + "owner": { + "login": "bells17", + "id": 2158863, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2158863?v=4", + "html_url": "https:\/\/github.com\/bells17" + }, + "html_url": "https:\/\/github.com\/bells17\/CVE-2017-1000117", + "description": "https:\/\/github.com\/greymd\/CVE-2017-1000117 の勉強用", + "fork": false, + "created_at": "2017-08-16T02:04:02Z", + "updated_at": "2017-10-13T17:48:19Z", + "pushed_at": "2017-08-16T09:35:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 100437171, + "name": "CVE-2017-1000117", + "full_name": "ieee0824\/CVE-2017-1000117", + "owner": { + "login": "ieee0824", + "id": 5692475, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4", + "html_url": "https:\/\/github.com\/ieee0824" + }, + "html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-08-16T02:05:08Z", + "updated_at": "2017-08-16T08:10:25Z", + "pushed_at": "2017-08-16T10:03:55Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 0, + "forks": 0, + "watchers": 3, + "score": 0 + }, + { + "id": 100445561, + "name": "CVE-2017-1000117", + "full_name": "rootclay\/CVE-2017-1000117", + "owner": { + "login": "rootclay", + "id": 29671471, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29671471?v=4", + "html_url": "https:\/\/github.com\/rootclay" + }, + "html_url": "https:\/\/github.com\/rootclay\/CVE-2017-1000117", + "description": "CVE-2017-1000117", + "fork": false, + "created_at": "2017-08-16T03:52:27Z", + "updated_at": "2017-08-16T04:00:53Z", + "pushed_at": "2017-08-16T06:14:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 2, + "forks": 2, + "watchers": 0, + "score": 0 + }, + { + "id": 100446125, + "name": "CVE-2017-1000117-sl", + "full_name": "ieee0824\/CVE-2017-1000117-sl", + "owner": { + "login": "ieee0824", + "id": 5692475, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5692475?v=4", + "html_url": "https:\/\/github.com\/ieee0824" + }, + "html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117-sl", + "description": "Experiment of CVE-2017-1000117", + "fork": false, + "created_at": "2017-08-16T04:01:08Z", + "updated_at": "2017-08-16T05:42:26Z", + "pushed_at": "2017-08-16T09:54:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 100498924, + "name": "CVE-2017-1000117", + "full_name": "takehaya\/CVE-2017-1000117", + "owner": { + "login": "takehaya", + "id": 10973623, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10973623?v=4", + "html_url": "https:\/\/github.com\/takehaya" + }, + "html_url": "https:\/\/github.com\/takehaya\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-08-16T14:34:37Z", + "updated_at": "2017-08-16T14:34:37Z", + "pushed_at": "2017-08-17T18:45:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 100544749, + "name": "CVE-2017-1000117", + "full_name": "ikmski\/CVE-2017-1000117", + "owner": { + "login": "ikmski", + "id": 6622579, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6622579?v=4", + "html_url": "https:\/\/github.com\/ikmski" + }, + "html_url": "https:\/\/github.com\/ikmski\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-08-17T00:37:47Z", + "updated_at": "2017-08-17T00:37:47Z", + "pushed_at": "2017-08-17T00:57:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 100730507, + "name": "CVE-2017-1000117", + "full_name": "nkoneko\/CVE-2017-1000117", + "owner": { + "login": "nkoneko", + "id": 1922341, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4", + "html_url": "https:\/\/github.com\/nkoneko" + }, + "html_url": "https:\/\/github.com\/nkoneko\/CVE-2017-1000117", + "description": "GitのCommand Injectionの脆弱性を利用してスクリプトを落として実行する例", + "fork": false, + "created_at": "2017-08-18T16:23:53Z", + "updated_at": "2018-06-27T07:59:10Z", + "pushed_at": "2017-08-18T16:30:26Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 100926724, + "name": "test", + "full_name": "chenzhuo0618\/test", + "owner": { + "login": "chenzhuo0618", + "id": 5562130, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5562130?v=4", + "html_url": "https:\/\/github.com\/chenzhuo0618" + }, + "html_url": "https:\/\/github.com\/chenzhuo0618\/test", + "description": "test for CVE-2017-1000117", + "fork": false, + "created_at": "2017-08-21T07:46:16Z", + "updated_at": "2017-08-21T07:46:48Z", + "pushed_at": "2017-08-21T08:51:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 102318198, + "name": "CVE-2017-1000117", + "full_name": "siling2017\/CVE-2017-1000117", + "owner": { + "login": "siling2017", + "id": 27729343, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27729343?v=4", + "html_url": "https:\/\/github.com\/siling2017" + }, + "html_url": "https:\/\/github.com\/siling2017\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-09-04T04:18:19Z", + "updated_at": "2017-09-04T04:18:29Z", + "pushed_at": "2017-09-04T04:18:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 112913757, + "name": "CVE-2017-1000117", + "full_name": "Q2h1Cg\/CVE-2017-1000117", + "owner": { + "login": "Q2h1Cg", + "id": 3953030, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3953030?v=4", + "html_url": "https:\/\/github.com\/Q2h1Cg" + }, + "html_url": "https:\/\/github.com\/Q2h1Cg\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2017-12-03T08:58:18Z", + "updated_at": "2017-12-03T08:58:33Z", + "pushed_at": "2017-12-03T08:59:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 166267328, + "name": "cve-2017-1000117", + "full_name": "cved-sources\/cve-2017-1000117", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-1000117", + "description": "cve-2017-1000117", + "fork": false, + "created_at": "2019-01-17T17:28:01Z", + "updated_at": "2019-02-01T21:15:29Z", + "pushed_at": "2019-02-01T21:15:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 187589348, + "name": "CVE-2017-1000117", + "full_name": "leezp\/CVE-2017-1000117", + "owner": { + "login": "leezp", + "id": 16287528, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16287528?v=4", + "html_url": "https:\/\/github.com\/leezp" + }, + "html_url": "https:\/\/github.com\/leezp\/CVE-2017-1000117", + "description": null, + "fork": false, + "created_at": "2019-05-20T07:25:58Z", + "updated_at": "2019-05-20T07:55:33Z", + "pushed_at": "2019-05-20T07:55:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 192838091, + "name": "CVE-2017-1000117", + "full_name": "AnonymKing\/CVE-2017-1000117", + "owner": { + "login": "AnonymKing", + "id": 26847177, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26847177?v=4", + "html_url": "https:\/\/github.com\/AnonymKing" + }, + "html_url": "https:\/\/github.com\/AnonymKing\/CVE-2017-1000117", + "description": "CVE-2017-1000117漏洞复现(PoC+Exp)", + "fork": false, + "created_at": "2019-06-20T02:55:19Z", + "updated_at": "2019-06-21T11:44:09Z", + "pushed_at": "2019-06-21T11:44:07Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000250.json b/2017/CVE-2017-1000250.json new file mode 100644 index 0000000000..18f70b8709 --- /dev/null +++ b/2017/CVE-2017-1000250.json @@ -0,0 +1,25 @@ +[ + { + "id": 110457097, + "name": "CVE-2017-1000250-PoC", + "full_name": "olav-st\/CVE-2017-1000250-PoC", + "owner": { + "login": "olav-st", + "id": 1856634, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1856634?v=4", + "html_url": "https:\/\/github.com\/olav-st" + }, + "html_url": "https:\/\/github.com\/olav-st\/CVE-2017-1000250-PoC", + "description": "Proof of concept exploit script for CVE-2017-1000250. Written while researching for the essay in TTM4137 Wireless Security.", + "fork": false, + "created_at": "2017-11-12T18:18:52Z", + "updated_at": "2019-03-20T07:23:31Z", + "pushed_at": "2017-11-12T19:46:35Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 3, + "forks": 3, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000251.json b/2017/CVE-2017-1000251.json new file mode 100644 index 0000000000..27511d0da1 --- /dev/null +++ b/2017/CVE-2017-1000251.json @@ -0,0 +1,94 @@ +[ + { + "id": 104546702, + "name": "Blueborne-CVE-2017-1000251", + "full_name": "hayzamjs\/Blueborne-CVE-2017-1000251", + "owner": { + "login": "hayzamjs", + "id": 3922884, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3922884?v=4", + "html_url": "https:\/\/github.com\/hayzamjs" + }, + "html_url": "https:\/\/github.com\/hayzamjs\/Blueborne-CVE-2017-1000251", + "description": "Blueborne CVE-2017-1000251 PoC for linux machines", + "fork": false, + "created_at": "2017-09-23T06:29:31Z", + "updated_at": "2020-11-04T16:52:04Z", + "pushed_at": "2017-10-11T17:46:21Z", + "stargazers_count": 16, + "watchers_count": 16, + "forks_count": 13, + "forks": 13, + "watchers": 16, + "score": 0 + }, + { + "id": 105091487, + "name": "blueborne-CVE-2017-1000251", + "full_name": "tlatkdgus1\/blueborne-CVE-2017-1000251", + "owner": { + "login": "tlatkdgus1", + "id": 13446909, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13446909?v=4", + "html_url": "https:\/\/github.com\/tlatkdgus1" + }, + "html_url": "https:\/\/github.com\/tlatkdgus1\/blueborne-CVE-2017-1000251", + "description": "clone", + "fork": false, + "created_at": "2017-09-28T02:12:57Z", + "updated_at": "2017-09-28T02:19:14Z", + "pushed_at": "2017-09-28T02:19:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 105433963, + "name": "blueborne-CVE-2017-1000251-POC", + "full_name": "own2pwn\/blueborne-CVE-2017-1000251-POC", + "owner": { + "login": "own2pwn", + "id": 7850039, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7850039?v=4", + "html_url": "https:\/\/github.com\/own2pwn" + }, + "html_url": "https:\/\/github.com\/own2pwn\/blueborne-CVE-2017-1000251-POC", + "description": null, + "fork": false, + "created_at": "2017-10-01T10:15:40Z", + "updated_at": "2018-11-16T07:29:50Z", + "pushed_at": "2017-10-01T10:23:36Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, + "forks": 1, + "watchers": 4, + "score": 0 + }, + { + "id": 110958300, + "name": "blueborne-CVE-2017-1000251", + "full_name": "marcinguy\/blueborne-CVE-2017-1000251", + "owner": { + "login": "marcinguy", + "id": 20355405, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4", + "html_url": "https:\/\/github.com\/marcinguy" + }, + "html_url": "https:\/\/github.com\/marcinguy\/blueborne-CVE-2017-1000251", + "description": "Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC) BlueBorne - Proof of Concept - Unarmed\/Unweaponized - DoS (Crash) only", + "fork": false, + "created_at": "2017-11-16T10:35:05Z", + "updated_at": "2019-11-23T05:24:53Z", + "pushed_at": "2018-02-11T18:25:40Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 2, + "forks": 2, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000253.json b/2017/CVE-2017-1000253.json new file mode 100644 index 0000000000..5586c6abf5 --- /dev/null +++ b/2017/CVE-2017-1000253.json @@ -0,0 +1,25 @@ +[ + { + "id": 137769369, + "name": "PIE-Stack-Clash-CVE-2017-1000253", + "full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253", + "owner": { + "login": "RicterZ", + "id": 5282759, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4", + "html_url": "https:\/\/github.com\/RicterZ" + }, + "html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253", + "description": "Demo-ing CVE-2017-1000253 in a container", + "fork": false, + "created_at": "2018-06-18T15:22:01Z", + "updated_at": "2020-09-21T07:09:05Z", + "pushed_at": "2017-11-01T07:59:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 5, + "forks": 5, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000405.json b/2017/CVE-2017-1000405.json new file mode 100644 index 0000000000..daa62399ff --- /dev/null +++ b/2017/CVE-2017-1000405.json @@ -0,0 +1,25 @@ +[ + { + "id": 112534496, + "name": "HugeDirtyCowPOC", + "full_name": "bindecy\/HugeDirtyCowPOC", + "owner": { + "login": "bindecy", + "id": 33990073, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33990073?v=4", + "html_url": "https:\/\/github.com\/bindecy" + }, + "html_url": "https:\/\/github.com\/bindecy\/HugeDirtyCowPOC", + "description": "A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)", + "fork": false, + "created_at": "2017-11-29T22:19:51Z", + "updated_at": "2021-01-20T12:50:48Z", + "pushed_at": "2017-11-30T00:24:14Z", + "stargazers_count": 200, + "watchers_count": 200, + "forks_count": 64, + "forks": 64, + "watchers": 200, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000475.json b/2017/CVE-2017-1000475.json new file mode 100644 index 0000000000..305860f24c --- /dev/null +++ b/2017/CVE-2017-1000475.json @@ -0,0 +1,25 @@ +[ + { + "id": 118515767, + "name": "CVE-2017-1000475", + "full_name": "lajarajorge\/CVE-2017-1000475", + "owner": { + "login": "lajarajorge", + "id": 35707370, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35707370?v=4", + "html_url": "https:\/\/github.com\/lajarajorge" + }, + "html_url": "https:\/\/github.com\/lajarajorge\/CVE-2017-1000475", + "description": "Unquoted Path Service", + "fork": false, + "created_at": "2018-01-22T21:10:22Z", + "updated_at": "2018-01-22T21:10:22Z", + "pushed_at": "2018-01-22T21:34:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000486.json b/2017/CVE-2017-1000486.json index deed09b622..1fa5b3f2a4 100644 --- a/2017/CVE-2017-1000486.json +++ b/2017/CVE-2017-1000486.json @@ -21,5 +21,51 @@ "forks": 20, "watchers": 51, "score": 0 + }, + { + "id": 153533103, + "name": "CVE-2017-1000486", + "full_name": "mogwailabs\/CVE-2017-1000486", + "owner": { + "login": "mogwailabs", + "id": 40667088, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40667088?v=4", + "html_url": "https:\/\/github.com\/mogwailabs" + }, + "html_url": "https:\/\/github.com\/mogwailabs\/CVE-2017-1000486", + "description": "Proof of Concept Exploit for PrimeFaces 5.x EL Injection (CVE-2017-1000486)", + "fork": false, + "created_at": "2018-10-17T22:47:30Z", + "updated_at": "2020-10-06T13:22:45Z", + "pushed_at": "2019-06-04T17:41:51Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, + "forks": 1, + "watchers": 5, + "score": 0 + }, + { + "id": 165310451, + "name": "cve-2017-1000486", + "full_name": "cved-sources\/cve-2017-1000486", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-1000486", + "description": "cve-2017-1000486", + "fork": false, + "created_at": "2019-01-11T21:11:14Z", + "updated_at": "2019-02-01T21:26:08Z", + "pushed_at": "2019-02-01T21:26:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-1000499.json b/2017/CVE-2017-1000499.json new file mode 100644 index 0000000000..d8c532d3ca --- /dev/null +++ b/2017/CVE-2017-1000499.json @@ -0,0 +1,25 @@ +[ + { + "id": 164232365, + "name": "5MMISSI-CVE-2017-1000499", + "full_name": "Villaquiranm\/5MMISSI-CVE-2017-1000499", + "owner": { + "login": "Villaquiranm", + "id": 22179290, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22179290?v=4", + "html_url": "https:\/\/github.com\/Villaquiranm" + }, + "html_url": "https:\/\/github.com\/Villaquiranm\/5MMISSI-CVE-2017-1000499", + "description": null, + "fork": false, + "created_at": "2019-01-05T16:33:08Z", + "updated_at": "2019-01-13T11:38:09Z", + "pushed_at": "2019-01-13T11:38:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1002101.json b/2017/CVE-2017-1002101.json new file mode 100644 index 0000000000..bce068355c --- /dev/null +++ b/2017/CVE-2017-1002101.json @@ -0,0 +1,25 @@ +[ + { + "id": 126385112, + "name": "subpath-exploit", + "full_name": "bgeesaman\/subpath-exploit", + "owner": { + "login": "bgeesaman", + "id": 3769609, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3769609?v=4", + "html_url": "https:\/\/github.com\/bgeesaman" + }, + "html_url": "https:\/\/github.com\/bgeesaman\/subpath-exploit", + "description": "Writeup of CVE-2017-1002101 with sample \"exploit\"\/escape", + "fork": false, + "created_at": "2018-03-22T19:26:12Z", + "updated_at": "2020-07-16T15:36:01Z", + "pushed_at": "2018-03-23T13:41:20Z", + "stargazers_count": 30, + "watchers_count": 30, + "forks_count": 0, + "forks": 0, + "watchers": 30, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-10235.json b/2017/CVE-2017-10235.json new file mode 100644 index 0000000000..a4afafa544 --- /dev/null +++ b/2017/CVE-2017-10235.json @@ -0,0 +1,25 @@ +[ + { + "id": 104800054, + "name": "vbox_cve_2017_10235", + "full_name": "fundacion-sadosky\/vbox_cve_2017_10235", + "owner": { + "login": "fundacion-sadosky", + "id": 30127931, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30127931?v=4", + "html_url": "https:\/\/github.com\/fundacion-sadosky" + }, + "html_url": "https:\/\/github.com\/fundacion-sadosky\/vbox_cve_2017_10235", + "description": "[CVE-2017-10235] Description and PoC of VirtualBox E1000 device Buffer Overflow", + "fork": false, + "created_at": "2017-09-25T20:42:47Z", + "updated_at": "2021-03-02T03:08:34Z", + "pushed_at": "2018-01-15T19:26:45Z", + "stargazers_count": 29, + "watchers_count": 29, + "forks_count": 5, + "forks": 5, + "watchers": 29, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index d4666dec39..c3ab0f7229 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -1,4 +1,165 @@ [ + { + "id": 115195951, + "name": "CVE-2017-10271", + "full_name": "1337g\/CVE-2017-10271", + "owner": { + "login": "1337g", + "id": 32504404, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4", + "html_url": "https:\/\/github.com\/1337g" + }, + "html_url": "https:\/\/github.com\/1337g\/CVE-2017-10271", + "description": "CVE-2017-10271 WEBLOGIC RCE (TESTED)", + "fork": false, + "created_at": "2017-12-23T13:04:23Z", + "updated_at": "2020-09-01T16:02:59Z", + "pushed_at": "2017-12-23T13:12:06Z", + "stargazers_count": 38, + "watchers_count": 38, + "forks_count": 27, + "forks": 27, + "watchers": 38, + "score": 0 + }, + { + "id": 115311346, + "name": "CVE-2017-10271", + "full_name": "s3xy\/CVE-2017-10271", + "owner": { + "login": "s3xy", + "id": 34327996, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34327996?v=4", + "html_url": "https:\/\/github.com\/s3xy" + }, + "html_url": "https:\/\/github.com\/s3xy\/CVE-2017-10271", + "description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.", + "fork": false, + "created_at": "2017-12-25T06:11:54Z", + "updated_at": "2020-12-11T01:36:14Z", + "pushed_at": "2017-12-25T06:21:23Z", + "stargazers_count": 24, + "watchers_count": 24, + "forks_count": 9, + "forks": 9, + "watchers": 24, + "score": 0 + }, + { + "id": 115339400, + "name": "PoCs-Weblogic_2017_10271", + "full_name": "ZH3FENG\/PoCs-Weblogic_2017_10271", + "owner": { + "login": "ZH3FENG", + "id": 20502660, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20502660?v=4", + "html_url": "https:\/\/github.com\/ZH3FENG" + }, + "html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271", + "description": "Simplified PoC for Weblogic-CVE-2017-10271", + "fork": false, + "created_at": "2017-12-25T13:18:45Z", + "updated_at": "2019-03-19T07:31:45Z", + "pushed_at": "2017-12-25T13:23:32Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 2, + "forks": 2, + "watchers": 3, + "score": 0 + }, + { + "id": 115571903, + "name": "CVE-2017-10271", + "full_name": "c0mmand3rOpSec\/CVE-2017-10271", + "owner": { + "login": "c0mmand3rOpSec", + "id": 17217255, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17217255?v=4", + "html_url": "https:\/\/github.com\/c0mmand3rOpSec" + }, + "html_url": "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271", + "description": "WebLogic Exploit", + "fork": false, + "created_at": "2017-12-28T01:30:50Z", + "updated_at": "2021-03-27T20:08:07Z", + "pushed_at": "2018-07-13T18:56:53Z", + "stargazers_count": 131, + "watchers_count": 131, + "forks_count": 50, + "forks": 50, + "watchers": 131, + "score": 0 + }, + { + "id": 115596796, + "name": "CVE-2017-10271", + "full_name": "Luffin\/CVE-2017-10271", + "owner": { + "login": "Luffin", + "id": 13807870, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13807870?v=4", + "html_url": "https:\/\/github.com\/Luffin" + }, + "html_url": "https:\/\/github.com\/Luffin\/CVE-2017-10271", + "description": "CVE-2017-10271 POC", + "fork": false, + "created_at": "2017-12-28T07:19:13Z", + "updated_at": "2020-08-10T02:31:05Z", + "pushed_at": "2018-01-10T02:34:56Z", + "stargazers_count": 29, + "watchers_count": 29, + "forks_count": 15, + "forks": 15, + "watchers": 29, + "score": 0 + }, + { + "id": 116099094, + "name": "weblogic_wls_wsat_rce", + "full_name": "cjjduck\/weblogic_wls_wsat_rce", + "owner": { + "login": "cjjduck", + "id": 23519154, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4", + "html_url": "https:\/\/github.com\/cjjduck" + }, + "html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce", + "description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l", + "fork": false, + "created_at": "2018-01-03T06:14:28Z", + "updated_at": "2020-10-09T02:33:00Z", + "pushed_at": "2018-01-03T00:42:57Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 39, + "forks": 39, + "watchers": 3, + "score": 0 + }, + { + "id": 116430643, + "name": "CVE-2017-10271", + "full_name": "kkirsche\/CVE-2017-10271", + "owner": { + "login": "kkirsche", + "id": 947110, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4", + "html_url": "https:\/\/github.com\/kkirsche" + }, + "html_url": "https:\/\/github.com\/kkirsche\/CVE-2017-10271", + "description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)", + "fork": false, + "created_at": "2018-01-05T21:57:03Z", + "updated_at": "2021-02-16T11:16:05Z", + "pushed_at": "2018-01-26T14:28:58Z", + "stargazers_count": 120, + "watchers_count": 120, + "forks_count": 41, + "forks": 41, + "watchers": 120, + "score": 0 + }, { "id": 117624791, "name": "CVE-2017-10271", @@ -22,6 +183,75 @@ "watchers": 4, "score": 0 }, + { + "id": 117926261, + "name": "cve-2017-10271-poc", + "full_name": "SuperHacker-liuan\/cve-2017-10271-poc", + "owner": { + "login": "SuperHacker-liuan", + "id": 30787037, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30787037?v=4", + "html_url": "https:\/\/github.com\/SuperHacker-liuan" + }, + "html_url": "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc", + "description": "cve-2017-10271 POC", + "fork": false, + "created_at": "2018-01-18T03:21:15Z", + "updated_at": "2020-01-06T03:15:27Z", + "pushed_at": "2018-02-02T07:47:30Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, + "forks": 1, + "watchers": 5, + "score": 0 + }, + { + "id": 118044092, + "name": "CVE-2017-10271", + "full_name": "bmcculley\/CVE-2017-10271", + "owner": { + "login": "bmcculley", + "id": 6238704, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6238704?v=4", + "html_url": "https:\/\/github.com\/bmcculley" + }, + "html_url": "https:\/\/github.com\/bmcculley\/CVE-2017-10271", + "description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)", + "fork": false, + "created_at": "2018-01-18T22:07:33Z", + "updated_at": "2020-12-11T01:14:53Z", + "pushed_at": "2019-10-26T15:31:55Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 118144871, + "name": "Oracle-WebLogic-CVE-2017-10271", + "full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271", + "owner": { + "login": "peterpeter228", + "id": 22089258, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22089258?v=4", + "html_url": "https:\/\/github.com\/peterpeter228" + }, + "html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271", + "description": "WebLogic wls-wsat RCE CVE-2017-10271", + "fork": false, + "created_at": "2018-01-19T15:50:08Z", + "updated_at": "2020-09-24T10:47:12Z", + "pushed_at": "2018-01-19T11:29:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 120571410, "name": "weblogic_honeypot", @@ -45,6 +275,75 @@ "watchers": 22, "score": 0 }, + { + "id": 123384221, + "name": "weblogic_wls_rce_poc-exp", + "full_name": "JackyTsuuuy\/weblogic_wls_rce_poc-exp", + "owner": { + "login": "JackyTsuuuy", + "id": 9449527, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9449527?v=4", + "html_url": "https:\/\/github.com\/JackyTsuuuy" + }, + "html_url": "https:\/\/github.com\/JackyTsuuuy\/weblogic_wls_rce_poc-exp", + "description": "cve-2017-10271", + "fork": false, + "created_at": "2018-03-01T04:57:09Z", + "updated_at": "2020-07-31T16:12:20Z", + "pushed_at": "2018-03-01T05:08:29Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 125456636, + "name": "Oracle-WebLogic-WLS-WSAT", + "full_name": "s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT", + "owner": { + "login": "s0wr0b1ndef", + "id": 37288034, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37288034?v=4", + "html_url": "https:\/\/github.com\/s0wr0b1ndef" + }, + "html_url": "https:\/\/github.com\/s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT", + "description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)", + "fork": false, + "created_at": "2018-03-16T03:09:29Z", + "updated_at": "2021-01-20T09:27:18Z", + "pushed_at": "2018-03-16T03:14:12Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + }, + { + "id": 139956588, + "name": "Oracle-WebLogic-CVE-2017-10271-master", + "full_name": "lonehand\/Oracle-WebLogic-CVE-2017-10271-master", + "owner": { + "login": "lonehand", + "id": 20275278, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20275278?v=4", + "html_url": "https:\/\/github.com\/lonehand" + }, + "html_url": "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master", + "description": null, + "fork": false, + "created_at": "2018-07-06T08:32:28Z", + "updated_at": "2019-06-27T03:08:05Z", + "pushed_at": "2018-07-06T08:42:40Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, { "id": 148616806, "name": "javaserializetools", @@ -68,6 +367,190 @@ "watchers": 271, "score": 0 }, + { + "id": 160370962, + "name": "CVE-2017-10271", + "full_name": "nhwuxiaojun\/CVE-2017-10271", + "owner": { + "login": "nhwuxiaojun", + "id": 15905850, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15905850?v=4", + "html_url": "https:\/\/github.com\/nhwuxiaojun" + }, + "html_url": "https:\/\/github.com\/nhwuxiaojun\/CVE-2017-10271", + "description": "Weblogic(CVE-2017-10271)", + "fork": false, + "created_at": "2018-12-04T14:34:10Z", + "updated_at": "2020-06-10T02:53:11Z", + "pushed_at": "2018-12-04T14:45:40Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 2, + "forks": 2, + "watchers": 2, + "score": 0 + }, + { + "id": 161570094, + "name": "JavaDeserialization", + "full_name": "ETOCheney\/JavaDeserialization", + "owner": { + "login": "ETOCheney", + "id": 28469578, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28469578?v=4", + "html_url": "https:\/\/github.com\/ETOCheney" + }, + "html_url": "https:\/\/github.com\/ETOCheney\/JavaDeserialization", + "description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器", + "fork": false, + "created_at": "2018-12-13T02:00:23Z", + "updated_at": "2020-10-28T10:00:45Z", + "pushed_at": "2018-12-13T14:05:28Z", + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 1, + "forks": 1, + "watchers": 7, + "score": 0 + }, + { + "id": 165317811, + "name": "cve-2017-10271", + "full_name": "cved-sources\/cve-2017-10271", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-10271", + "description": "cve-2017-10271", + "fork": false, + "created_at": "2019-01-11T22:11:16Z", + "updated_at": "2019-01-11T22:11:38Z", + "pushed_at": "2019-01-11T22:11:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 175729381, + "name": "Oracle-WebLogic-CVE-2017-10271", + "full_name": "XHSecurity\/Oracle-WebLogic-CVE-2017-10271", + "owner": { + "login": "XHSecurity", + "id": 48574583, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48574583?v=4", + "html_url": "https:\/\/github.com\/XHSecurity" + }, + "html_url": "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271", + "description": "Oracle-WebLogic-CVE-2017-10271", + "fork": false, + "created_at": "2019-03-15T01:50:01Z", + "updated_at": "2020-12-11T01:36:32Z", + "pushed_at": "2019-03-15T01:51:34Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 176763123, + "name": "Weblogic_Wsat_RCE", + "full_name": "kbsec\/Weblogic_Wsat_RCE", + "owner": { + "login": "kbsec", + "id": 11823496, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11823496?v=4", + "html_url": "https:\/\/github.com\/kbsec" + }, + "html_url": "https:\/\/github.com\/kbsec\/Weblogic_Wsat_RCE", + "description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ", + "fork": false, + "created_at": "2019-03-20T15:26:55Z", + "updated_at": "2019-12-19T13:44:39Z", + "pushed_at": "2019-03-27T17:47:52Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "forks": 1, + "watchers": 3, + "score": 0 + }, + { + "id": 183346706, + "name": "CNVD-C-2019-48814-CNNVD-201904-961", + "full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961", + "owner": { + "login": "SkyBlueEternal", + "id": 46418185, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46418185?v=4", + "html_url": "https:\/\/github.com\/SkyBlueEternal" + }, + "html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961", + "description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC", + "fork": false, + "created_at": "2019-04-25T03:07:53Z", + "updated_at": "2020-12-15T07:25:50Z", + "pushed_at": "2019-04-29T02:06:00Z", + "stargazers_count": 104, + "watchers_count": 104, + "forks_count": 37, + "forks": 37, + "watchers": 104, + "score": 0 + }, + { + "id": 183428186, + "name": "WebLogic_CNVD_C_2019_48814", + "full_name": "Yuusuke4\/WebLogic_CNVD_C_2019_48814", + "owner": { + "login": "Yuusuke4", + "id": 26989867, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26989867?v=4", + "html_url": "https:\/\/github.com\/Yuusuke4" + }, + "html_url": "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814", + "description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271", + "fork": false, + "created_at": "2019-04-25T12:18:16Z", + "updated_at": "2019-04-25T12:33:00Z", + "pushed_at": "2019-04-25T12:10:18Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 183430704, + "name": "WebLogic_CNVD_C2019_48814", + "full_name": "7kbstorm\/WebLogic_CNVD_C2019_48814", + "owner": { + "login": "7kbstorm", + "id": 38887063, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38887063?v=4", + "html_url": "https:\/\/github.com\/7kbstorm" + }, + "html_url": "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814", + "description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm", + "fork": false, + "created_at": "2019-04-25T12:33:31Z", + "updated_at": "2021-01-21T00:29:17Z", + "pushed_at": "2019-04-25T12:44:02Z", + "stargazers_count": 114, + "watchers_count": 114, + "forks_count": 53, + "forks": 53, + "watchers": 114, + "score": 0 + }, { "id": 219752851, "name": "-CVE-2017-10271-", diff --git a/2017/CVE-2017-10352.json b/2017/CVE-2017-10352.json new file mode 100644 index 0000000000..40b42e50a1 --- /dev/null +++ b/2017/CVE-2017-10352.json @@ -0,0 +1,25 @@ +[ + { + "id": 121908591, + "name": "weblogic-XMLDecoder", + "full_name": "bigsizeme\/weblogic-XMLDecoder", + "owner": { + "login": "bigsizeme", + "id": 17845094, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4", + "html_url": "https:\/\/github.com\/bigsizeme" + }, + "html_url": "https:\/\/github.com\/bigsizeme\/weblogic-XMLDecoder", + "description": "CVE-2017-10352 CVE-2017-10271 weblogic-XMLDecoder", + "fork": false, + "created_at": "2018-02-18T01:40:33Z", + "updated_at": "2020-01-30T15:24:26Z", + "pushed_at": "2018-02-25T02:01:19Z", + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 7, + "forks": 7, + "watchers": 8, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-10366.json b/2017/CVE-2017-10366.json new file mode 100644 index 0000000000..97e43af1d6 --- /dev/null +++ b/2017/CVE-2017-10366.json @@ -0,0 +1,25 @@ +[ + { + "id": 147225109, + "name": "CVE-2017-10366_peoplesoft", + "full_name": "blazeinfosec\/CVE-2017-10366_peoplesoft", + "owner": { + "login": "blazeinfosec", + "id": 16681975, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16681975?v=4", + "html_url": "https:\/\/github.com\/blazeinfosec" + }, + "html_url": "https:\/\/github.com\/blazeinfosec\/CVE-2017-10366_peoplesoft", + "description": "CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit", + "fork": false, + "created_at": "2018-09-03T15:46:39Z", + "updated_at": "2020-12-15T08:00:30Z", + "pushed_at": "2018-09-04T10:07:06Z", + "stargazers_count": 26, + "watchers_count": 26, + "forks_count": 5, + "forks": 5, + "watchers": 26, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-10617.json b/2017/CVE-2017-10617.json new file mode 100644 index 0000000000..2bfef7d8ae --- /dev/null +++ b/2017/CVE-2017-10617.json @@ -0,0 +1,25 @@ +[ + { + "id": 106521526, + "name": "CVE-2017-10617", + "full_name": "gteissier\/CVE-2017-10617", + "owner": { + "login": "gteissier", + "id": 201614, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/201614?v=4", + "html_url": "https:\/\/github.com\/gteissier" + }, + "html_url": "https:\/\/github.com\/gteissier\/CVE-2017-10617", + "description": "Contrail: hard coded credentials (CVE-2017-10616) and XML External Entity (XXE) vulnerability (CVE-2017-10617)", + "fork": false, + "created_at": "2017-10-11T07:38:18Z", + "updated_at": "2019-07-30T17:47:51Z", + "pushed_at": "2019-02-22T06:03:24Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-10661.json b/2017/CVE-2017-10661.json new file mode 100644 index 0000000000..03e6be1fe2 --- /dev/null +++ b/2017/CVE-2017-10661.json @@ -0,0 +1,25 @@ +[ + { + "id": 100021936, + "name": "CVE-2017-10661_POC", + "full_name": "GeneBlue\/CVE-2017-10661_POC", + "owner": { + "login": "GeneBlue", + "id": 10919709, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10919709?v=4", + "html_url": "https:\/\/github.com\/GeneBlue" + }, + "html_url": "https:\/\/github.com\/GeneBlue\/CVE-2017-10661_POC", + "description": "poc for cve-2017-10661", + "fork": false, + "created_at": "2017-08-11T10:45:10Z", + "updated_at": "2020-12-17T10:26:55Z", + "pushed_at": "2017-08-11T10:45:56Z", + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 5, + "forks": 5, + "watchers": 9, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-10797.json b/2017/CVE-2017-10797.json new file mode 100644 index 0000000000..4c43d89d1d --- /dev/null +++ b/2017/CVE-2017-10797.json @@ -0,0 +1,25 @@ +[ + { + "id": 119376202, + "name": "CVE-2017-10797", + "full_name": "n4xh4ck5\/CVE-2017-10797", + "owner": { + "login": "n4xh4ck5", + "id": 26029224, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26029224?v=4", + "html_url": "https:\/\/github.com\/n4xh4ck5" + }, + "html_url": "https:\/\/github.com\/n4xh4ck5\/CVE-2017-10797", + "description": "CVE-2017-10797- User Enumeration in OwnCloud Server 8.1-10.0", + "fork": false, + "created_at": "2018-01-29T11:53:14Z", + "updated_at": "2020-03-26T17:06:19Z", + "pushed_at": "2018-01-29T11:56:01Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 2, + "forks": 2, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-11176.json b/2017/CVE-2017-11176.json index ea425dd568..ac6377650c 100644 --- a/2017/CVE-2017-11176.json +++ b/2017/CVE-2017-11176.json @@ -1,4 +1,73 @@ [ + { + "id": 151221014, + "name": "cve-2017-11176", + "full_name": "lexfo\/cve-2017-11176", + "owner": { + "login": "lexfo", + "id": 23701097, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23701097?v=4", + "html_url": "https:\/\/github.com\/lexfo" + }, + "html_url": "https:\/\/github.com\/lexfo\/cve-2017-11176", + "description": null, + "fork": false, + "created_at": "2018-10-02T08:06:04Z", + "updated_at": "2020-11-28T22:25:57Z", + "pushed_at": "2018-10-02T10:27:06Z", + "stargazers_count": 20, + "watchers_count": 20, + "forks_count": 8, + "forks": 8, + "watchers": 20, + "score": 0 + }, + { + "id": 157327850, + "name": "cve-2017-11176", + "full_name": "DoubleMice\/cve-2017-11176", + "owner": { + "login": "DoubleMice", + "id": 22325256, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22325256?v=4", + "html_url": "https:\/\/github.com\/DoubleMice" + }, + "html_url": "https:\/\/github.com\/DoubleMice\/cve-2017-11176", + "description": "My first try to code my own LPE exploit.", + "fork": false, + "created_at": "2018-11-13T05:55:03Z", + "updated_at": "2018-11-22T03:50:39Z", + "pushed_at": "2018-11-22T03:50:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 2, + "forks": 2, + "watchers": 0, + "score": 0 + }, + { + "id": 201151172, + "name": "CVE-2017-11176", + "full_name": "HckEX\/CVE-2017-11176", + "owner": { + "login": "HckEX", + "id": 33862757, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33862757?v=4", + "html_url": "https:\/\/github.com\/HckEX" + }, + "html_url": "https:\/\/github.com\/HckEX\/CVE-2017-11176", + "description": null, + "fork": false, + "created_at": "2019-08-08T01:02:52Z", + "updated_at": "2019-08-08T01:03:36Z", + "pushed_at": "2019-08-08T01:03:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 216932661, "name": "cve-2017-11176", diff --git a/2017/CVE-2017-11427.json b/2017/CVE-2017-11427.json new file mode 100644 index 0000000000..7400308018 --- /dev/null +++ b/2017/CVE-2017-11427.json @@ -0,0 +1,25 @@ +[ + { + "id": 123645081, + "name": "CVE-2017-11427-DEMO", + "full_name": "CHYbeta\/CVE-2017-11427-DEMO", + "owner": { + "login": "CHYbeta", + "id": 18642224, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18642224?v=4", + "html_url": "https:\/\/github.com\/CHYbeta" + }, + "html_url": "https:\/\/github.com\/CHYbeta\/CVE-2017-11427-DEMO", + "description": "The Demo for CVE-2017-11427", + "fork": false, + "created_at": "2018-03-03T00:29:22Z", + "updated_at": "2020-02-12T13:05:42Z", + "pushed_at": "2018-03-03T04:40:10Z", + "stargazers_count": 12, + "watchers_count": 12, + "forks_count": 2, + "forks": 2, + "watchers": 12, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-11503.json b/2017/CVE-2017-11503.json new file mode 100644 index 0000000000..5f830f293f --- /dev/null +++ b/2017/CVE-2017-11503.json @@ -0,0 +1,25 @@ +[ + { + "id": 126858445, + "name": "download", + "full_name": "wizardafric\/download", + "owner": { + "login": "wizardafric", + "id": 37772539, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37772539?v=4", + "html_url": "https:\/\/github.com\/wizardafric" + }, + "html_url": "https:\/\/github.com\/wizardafric\/download", + "description": "(https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2017-11503", + "fork": false, + "created_at": "2018-03-26T16:35:17Z", + "updated_at": "2018-03-27T13:50:20Z", + "pushed_at": "2018-03-27T13:50:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-11519.json b/2017/CVE-2017-11519.json new file mode 100644 index 0000000000..4218b4578c --- /dev/null +++ b/2017/CVE-2017-11519.json @@ -0,0 +1,25 @@ +[ + { + "id": 137827933, + "name": "tplink-CVE-2017-11519", + "full_name": "vakzz\/tplink-CVE-2017-11519", + "owner": { + "login": "vakzz", + "id": 26542189, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26542189?v=4", + "html_url": "https:\/\/github.com\/vakzz" + }, + "html_url": "https:\/\/github.com\/vakzz\/tplink-CVE-2017-11519", + "description": "POC for TP-Link Archer C9 - Admin Password Reset and RCE (CVE-2017-11519)", + "fork": false, + "created_at": "2018-06-19T02:04:38Z", + "updated_at": "2020-03-26T01:19:54Z", + "pushed_at": "2018-06-19T02:12:35Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-11611.json b/2017/CVE-2017-11611.json new file mode 100644 index 0000000000..e21517e25d --- /dev/null +++ b/2017/CVE-2017-11611.json @@ -0,0 +1,25 @@ +[ + { + "id": 101361478, + "name": "Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc", + "full_name": "faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc", + "owner": { + "login": "faizzaidi", + "id": 12153050, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12153050?v=4", + "html_url": "https:\/\/github.com\/faizzaidi" + }, + "html_url": "https:\/\/github.com\/faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc", + "description": "WolfCMS-v0.8.3.1 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-11611", + "fork": false, + "created_at": "2017-08-25T03:19:05Z", + "updated_at": "2020-07-17T05:22:39Z", + "pushed_at": "2017-08-25T03:19:37Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-11774.json b/2017/CVE-2017-11774.json new file mode 100644 index 0000000000..18ffeb6df3 --- /dev/null +++ b/2017/CVE-2017-11774.json @@ -0,0 +1,25 @@ +[ + { + "id": 202635955, + "name": "SniperRoost", + "full_name": "devcoinfet\/SniperRoost", + "owner": { + "login": "devcoinfet", + "id": 34756993, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34756993?v=4", + "html_url": "https:\/\/github.com\/devcoinfet" + }, + "html_url": "https:\/\/github.com\/devcoinfet\/SniperRoost", + "description": "used to generate a valid attack chain to exploit CVE-2017-11774 tied to iranian apt only reasearch poc dont use for harm please", + "fork": false, + "created_at": "2019-08-16T01:25:13Z", + "updated_at": "2020-02-12T10:05:32Z", + "pushed_at": "2019-08-16T01:28:41Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-11816.json b/2017/CVE-2017-11816.json new file mode 100644 index 0000000000..96eb18ab19 --- /dev/null +++ b/2017/CVE-2017-11816.json @@ -0,0 +1,25 @@ +[ + { + "id": 106789971, + "name": "CVE-2017-11816", + "full_name": "lr3800\/CVE-2017-11816", + "owner": { + "login": "lr3800", + "id": 22863274, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22863274?v=4", + "html_url": "https:\/\/github.com\/lr3800" + }, + "html_url": "https:\/\/github.com\/lr3800\/CVE-2017-11816", + "description": null, + "fork": false, + "created_at": "2017-10-13T07:05:55Z", + "updated_at": "2017-10-13T07:05:55Z", + "pushed_at": "2017-10-13T14:25:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index b3f31f5089..c3549f3170 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -1,4 +1,510 @@ [ + { + "id": 111305094, + "name": "cve-2017-11882", + "full_name": "zhouat\/cve-2017-11882", + "owner": { + "login": "zhouat", + "id": 8078184, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8078184?v=4", + "html_url": "https:\/\/github.com\/zhouat" + }, + "html_url": "https:\/\/github.com\/zhouat\/cve-2017-11882", + "description": null, + "fork": false, + "created_at": "2017-11-19T14:57:41Z", + "updated_at": "2017-11-21T09:11:26Z", + "pushed_at": "2017-11-18T14:21:03Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "forks": 1, + "watchers": 3, + "score": 0 + }, + { + "id": 111435936, + "name": "CVE-2017-11882", + "full_name": "embedi\/CVE-2017-11882", + "owner": { + "login": "embedi", + "id": 24190344, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4", + "html_url": "https:\/\/github.com\/embedi" + }, + "html_url": "https:\/\/github.com\/embedi\/CVE-2017-11882", + "description": "Proof-of-Concept exploits for CVE-2017-11882", + "fork": false, + "created_at": "2017-11-20T16:35:30Z", + "updated_at": "2021-03-31T01:08:18Z", + "pushed_at": "2017-11-29T16:13:23Z", + "stargazers_count": 481, + "watchers_count": 481, + "forks_count": 199, + "forks": 199, + "watchers": 481, + "score": 0 + }, + { + "id": 111505810, + "name": "CVE-2017-11882", + "full_name": "Ridter\/CVE-2017-11882", + "owner": { + "login": "Ridter", + "id": 6007471, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4", + "html_url": "https:\/\/github.com\/Ridter" + }, + "html_url": "https:\/\/github.com\/Ridter\/CVE-2017-11882", + "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", + "fork": false, + "created_at": "2017-11-21T05:55:53Z", + "updated_at": "2021-03-31T02:07:32Z", + "pushed_at": "2017-11-29T03:33:53Z", + "stargazers_count": 486, + "watchers_count": 486, + "forks_count": 243, + "forks": 243, + "watchers": 486, + "score": 0 + }, + { + "id": 111525857, + "name": "2017-11882_Generator", + "full_name": "BlackMathIT\/2017-11882_Generator", + "owner": { + "login": "BlackMathIT", + "id": 26303870, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26303870?v=4", + "html_url": "https:\/\/github.com\/BlackMathIT" + }, + "html_url": "https:\/\/github.com\/BlackMathIT\/2017-11882_Generator", + "description": "CVE-2017-11882 File Generator PoC", + "fork": false, + "created_at": "2017-11-21T09:15:28Z", + "updated_at": "2021-02-24T12:48:33Z", + "pushed_at": "2017-11-22T08:38:18Z", + "stargazers_count": 32, + "watchers_count": 32, + "forks_count": 25, + "forks": 25, + "watchers": 32, + "score": 0 + }, + { + "id": 111566147, + "name": "CVE-2017-11882", + "full_name": "unamer\/CVE-2017-11882", + "owner": { + "login": "unamer", + "id": 12728984, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12728984?v=4", + "html_url": "https:\/\/github.com\/unamer" + }, + "html_url": "https:\/\/github.com\/unamer\/CVE-2017-11882", + "description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.", + "fork": false, + "created_at": "2017-11-21T15:22:41Z", + "updated_at": "2021-04-09T13:41:23Z", + "pushed_at": "2017-12-06T12:47:31Z", + "stargazers_count": 280, + "watchers_count": 280, + "forks_count": 83, + "forks": 83, + "watchers": 280, + "score": 0 + }, + { + "id": 111585219, + "name": "CVE-2017-11882-metasploit", + "full_name": "0x09AL\/CVE-2017-11882-metasploit", + "owner": { + "login": "0x09AL", + "id": 25826294, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25826294?v=4", + "html_url": "https:\/\/github.com\/0x09AL" + }, + "html_url": "https:\/\/github.com\/0x09AL\/CVE-2017-11882-metasploit", + "description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.", + "fork": false, + "created_at": "2017-11-21T18:17:28Z", + "updated_at": "2020-09-30T09:12:42Z", + "pushed_at": "2017-11-21T20:34:57Z", + "stargazers_count": 94, + "watchers_count": 94, + "forks_count": 50, + "forks": 50, + "watchers": 94, + "score": 0 + }, + { + "id": 111601525, + "name": "ABC", + "full_name": "HZachev\/ABC", + "owner": { + "login": "HZachev", + "id": 33879843, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33879843?v=4", + "html_url": "https:\/\/github.com\/HZachev" + }, + "html_url": "https:\/\/github.com\/HZachev\/ABC", + "description": "CVE-2017-11882", + "fork": false, + "created_at": "2017-11-21T21:07:57Z", + "updated_at": "2017-11-21T21:07:57Z", + "pushed_at": "2017-11-21T22:04:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 111619944, + "name": "CVE-2017-11882", + "full_name": "starnightcyber\/CVE-2017-11882", + "owner": { + "login": "starnightcyber", + "id": 19260696, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19260696?v=4", + "html_url": "https:\/\/github.com\/starnightcyber" + }, + "html_url": "https:\/\/github.com\/starnightcyber\/CVE-2017-11882", + "description": "CVE-2017-11882 exploitation", + "fork": false, + "created_at": "2017-11-22T01:11:39Z", + "updated_at": "2021-03-10T22:29:20Z", + "pushed_at": "2017-11-28T03:06:32Z", + "stargazers_count": 39, + "watchers_count": 39, + "forks_count": 53, + "forks": 53, + "watchers": 39, + "score": 0 + }, + { + "id": 111637919, + "name": "CVE-2017-11882", + "full_name": "Grey-Li\/CVE-2017-11882", + "owner": { + "login": "Grey-Li", + "id": 33873392, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33873392?v=4", + "html_url": "https:\/\/github.com\/Grey-Li" + }, + "html_url": "https:\/\/github.com\/Grey-Li\/CVE-2017-11882", + "description": null, + "fork": false, + "created_at": "2017-11-22T04:53:44Z", + "updated_at": "2017-11-22T04:54:38Z", + "pushed_at": "2017-11-22T04:54:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 111887551, + "name": "CVE-2017-11882-for-Kali", + "full_name": "legendsec\/CVE-2017-11882-for-Kali", + "owner": { + "login": "legendsec", + "id": 13389492, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13389492?v=4", + "html_url": "https:\/\/github.com\/legendsec" + }, + "html_url": "https:\/\/github.com\/legendsec\/CVE-2017-11882-for-Kali", + "description": "# CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to \/usr\/share\/metasploit-framework\/modules\/exploits\/windows\/local\/ 2) Copy the cve-2017-11882.rtf to \/usr\/share\/metasploit-framework\/data\/exploits\/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time.", + "fork": false, + "created_at": "2017-11-24T07:11:13Z", + "updated_at": "2017-11-24T07:11:13Z", + "pushed_at": "2017-11-24T07:11:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 111904379, + "name": "cve-2017-11882", + "full_name": "CSC-pentest\/cve-2017-11882", + "owner": { + "login": "CSC-pentest", + "id": 33954862, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33954862?v=4", + "html_url": "https:\/\/github.com\/CSC-pentest" + }, + "html_url": "https:\/\/github.com\/CSC-pentest\/cve-2017-11882", + "description": null, + "fork": false, + "created_at": "2017-11-24T10:09:49Z", + "updated_at": "2017-11-24T10:09:49Z", + "pushed_at": "2017-11-24T10:13:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 112133932, + "name": "CVE-2017-11882-", + "full_name": "Shadowshusky\/CVE-2017-11882-", + "owner": { + "login": "Shadowshusky", + "id": 31649758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31649758?v=4", + "html_url": "https:\/\/github.com\/Shadowshusky" + }, + "html_url": "https:\/\/github.com\/Shadowshusky\/CVE-2017-11882-", + "description": null, + "fork": false, + "created_at": "2017-11-27T01:50:44Z", + "updated_at": "2021-03-10T22:04:44Z", + "pushed_at": "2017-11-27T01:50:52Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 117080574, + "name": "CVE-2018-0802", + "full_name": "rxwx\/CVE-2018-0802", + "owner": { + "login": "rxwx", + "id": 2202542, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4", + "html_url": "https:\/\/github.com\/rxwx" + }, + "html_url": "https:\/\/github.com\/rxwx\/CVE-2018-0802", + "description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)", + "fork": false, + "created_at": "2018-01-11T09:43:46Z", + "updated_at": "2021-03-30T10:12:35Z", + "pushed_at": "2018-02-28T12:32:54Z", + "stargazers_count": 266, + "watchers_count": 266, + "forks_count": 135, + "forks": 135, + "watchers": 266, + "score": 0 + }, + { + "id": 117234193, + "name": "RTF_11882_0802", + "full_name": "Ridter\/RTF_11882_0802", + "owner": { + "login": "Ridter", + "id": 6007471, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4", + "html_url": "https:\/\/github.com\/Ridter" + }, + "html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802", + "description": "PoC for CVE-2018-0802 And CVE-2017-11882", + "fork": false, + "created_at": "2018-01-12T11:38:33Z", + "updated_at": "2021-03-11T01:08:36Z", + "pushed_at": "2018-01-12T11:42:29Z", + "stargazers_count": 157, + "watchers_count": 157, + "forks_count": 64, + "forks": 64, + "watchers": 157, + "score": 0 + }, + { + "id": 117637164, + "name": "CVE-2017-11882", + "full_name": "likescam\/CVE-2017-11882", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2017-11882", + "description": null, + "fork": false, + "created_at": "2018-01-16T05:47:47Z", + "updated_at": "2018-01-16T05:47:59Z", + "pushed_at": "2018-01-16T05:47:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 117637270, + "name": "CVE-2018-0802_CVE-2017-11882", + "full_name": "likescam\/CVE-2018-0802_CVE-2017-11882", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882", + "description": null, + "fork": false, + "created_at": "2018-01-16T05:49:01Z", + "updated_at": "2021-03-11T01:10:37Z", + "pushed_at": "2018-01-16T05:49:10Z", + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 4, + "forks": 4, + "watchers": 9, + "score": 0 + }, + { + "id": 130633082, + "name": "CVE-2017-11882-Possible-Remcos-Malspam", + "full_name": "bloomer1016\/CVE-2017-11882-Possible-Remcos-Malspam", + "owner": { + "login": "bloomer1016", + "id": 12056770, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12056770?v=4", + "html_url": "https:\/\/github.com\/bloomer1016" + }, + "html_url": "https:\/\/github.com\/bloomer1016\/CVE-2017-11882-Possible-Remcos-Malspam", + "description": null, + "fork": false, + "created_at": "2018-04-23T03:07:25Z", + "updated_at": "2020-03-29T03:28:55Z", + "pushed_at": "2018-04-23T03:08:38Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 132171985, + "name": "CVE-2017-11882", + "full_name": "ChaitanyaHaritash\/CVE-2017-11882", + "owner": { + "login": "ChaitanyaHaritash", + "id": 16261173, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16261173?v=4", + "html_url": "https:\/\/github.com\/ChaitanyaHaritash" + }, + "html_url": "https:\/\/github.com\/ChaitanyaHaritash\/CVE-2017-11882", + "description": "Empire Port of CVE-2017-11882", + "fork": false, + "created_at": "2018-05-04T17:50:57Z", + "updated_at": "2020-10-27T03:32:18Z", + "pushed_at": "2018-05-04T17:53:27Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + }, + { + "id": 139015885, + "name": "https-github.com-Ridter-CVE-2017-11882-", + "full_name": "qy1202\/https-github.com-Ridter-CVE-2017-11882-", + "owner": { + "login": "qy1202", + "id": 40664300, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40664300?v=4", + "html_url": "https:\/\/github.com\/qy1202" + }, + "html_url": "https:\/\/github.com\/qy1202\/https-github.com-Ridter-CVE-2017-11882-", + "description": null, + "fork": false, + "created_at": "2018-06-28T12:35:53Z", + "updated_at": "2018-06-28T12:35:53Z", + "pushed_at": "2018-06-28T12:35:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 154284917, + "name": "CVE-2017-11882", + "full_name": "j0lama\/CVE-2017-11882", + "owner": { + "login": "j0lama", + "id": 17393029, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17393029?v=4", + "html_url": "https:\/\/github.com\/j0lama" + }, + "html_url": "https:\/\/github.com\/j0lama\/CVE-2017-11882", + "description": null, + "fork": false, + "created_at": "2018-10-23T07:44:39Z", + "updated_at": "2018-11-05T22:36:38Z", + "pushed_at": "2018-10-23T07:46:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 156669000, + "name": "IDB_Share", + "full_name": "R0fM1a\/IDB_Share", + "owner": { + "login": "R0fM1a", + "id": 44599121, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44599121?v=4", + "html_url": "https:\/\/github.com\/R0fM1a" + }, + "html_url": "https:\/\/github.com\/R0fM1a\/IDB_Share", + "description": "CVE-2017-11882 analyse notebook", + "fork": false, + "created_at": "2018-11-08T07:44:32Z", + "updated_at": "2018-11-08T10:27:41Z", + "pushed_at": "2018-11-08T10:27:40Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 161162866, + "name": "CVE-2017-11882", + "full_name": "chanbin\/CVE-2017-11882", + "owner": { + "login": "chanbin", + "id": 24631331, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24631331?v=4", + "html_url": "https:\/\/github.com\/chanbin" + }, + "html_url": "https:\/\/github.com\/chanbin\/CVE-2017-11882", + "description": "Microsoft Equation 3.0\/Convert python2 to python3", + "fork": false, + "created_at": "2018-12-10T11:15:15Z", + "updated_at": "2018-12-10T13:19:33Z", + "pushed_at": "2018-12-10T11:18:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 202340795, "name": "CVE-2017-11882", diff --git a/2017/CVE-2017-11907.json b/2017/CVE-2017-11907.json new file mode 100644 index 0000000000..5d5edd6c82 --- /dev/null +++ b/2017/CVE-2017-11907.json @@ -0,0 +1,25 @@ +[ + { + "id": 133616005, + "name": "CVE-2017-11907", + "full_name": "AV1080p\/CVE-2017-11907", + "owner": { + "login": "AV1080p", + "id": 21303759, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21303759?v=4", + "html_url": "https:\/\/github.com\/AV1080p" + }, + "html_url": "https:\/\/github.com\/AV1080p\/CVE-2017-11907", + "description": "Windows: heap overflow in jscript.dll in Array.sort", + "fork": false, + "created_at": "2018-05-16T05:42:39Z", + "updated_at": "2019-08-26T16:40:29Z", + "pushed_at": "2018-05-16T05:51:44Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 5, + "forks": 5, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-12149.json b/2017/CVE-2017-12149.json new file mode 100644 index 0000000000..73b6f9fefb --- /dev/null +++ b/2017/CVE-2017-12149.json @@ -0,0 +1,94 @@ +[ + { + "id": 111536144, + "name": "CVE-2017-12149", + "full_name": "sevck\/CVE-2017-12149", + "owner": { + "login": "sevck", + "id": 11308052, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11308052?v=4", + "html_url": "https:\/\/github.com\/sevck" + }, + "html_url": "https:\/\/github.com\/sevck\/CVE-2017-12149", + "description": "CVE-2017-12149 JBOSS as 6.X反序列化(反弹shell版)", + "fork": false, + "created_at": "2017-11-21T10:48:24Z", + "updated_at": "2021-01-28T01:58:11Z", + "pushed_at": "2017-11-22T06:59:57Z", + "stargazers_count": 20, + "watchers_count": 20, + "forks_count": 11, + "forks": 11, + "watchers": 20, + "score": 0 + }, + { + "id": 112277258, + "name": "jboss-_CVE-2017-12149", + "full_name": "yunxu1\/jboss-_CVE-2017-12149", + "owner": { + "login": "yunxu1", + "id": 9799921, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9799921?v=4", + "html_url": "https:\/\/github.com\/yunxu1" + }, + "html_url": "https:\/\/github.com\/yunxu1\/jboss-_CVE-2017-12149", + "description": "CVE-2017-12149 jboss反序列化 可回显", + "fork": false, + "created_at": "2017-11-28T02:52:47Z", + "updated_at": "2021-04-10T11:17:26Z", + "pushed_at": "2019-03-13T08:57:50Z", + "stargazers_count": 109, + "watchers_count": 109, + "forks_count": 40, + "forks": 40, + "watchers": 109, + "score": 0 + }, + { + "id": 115089440, + "name": "CVE-2017-12149", + "full_name": "1337g\/CVE-2017-12149", + "owner": { + "login": "1337g", + "id": 32504404, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4", + "html_url": "https:\/\/github.com\/1337g" + }, + "html_url": "https:\/\/github.com\/1337g\/CVE-2017-12149", + "description": "CVE-2017-12149 JBOSS RCE (TESTED) ", + "fork": false, + "created_at": "2017-12-22T07:30:29Z", + "updated_at": "2020-03-10T20:03:04Z", + "pushed_at": "2017-12-23T06:43:16Z", + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 10, + "forks": 10, + "watchers": 10, + "score": 0 + }, + { + "id": 203873391, + "name": "CVE-2017-12149", + "full_name": "jreppiks\/CVE-2017-12149", + "owner": { + "login": "jreppiks", + "id": 31517228, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31517228?v=4", + "html_url": "https:\/\/github.com\/jreppiks" + }, + "html_url": "https:\/\/github.com\/jreppiks\/CVE-2017-12149", + "description": "Jboss Java Deserialization RCE (CVE-2017-12149)", + "fork": false, + "created_at": "2019-08-22T21:06:09Z", + "updated_at": "2021-03-11T03:14:36Z", + "pushed_at": "2019-08-22T21:08:14Z", + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 0, + "forks": 0, + "watchers": 7, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-12426.json b/2017/CVE-2017-12426.json new file mode 100644 index 0000000000..428df6f088 --- /dev/null +++ b/2017/CVE-2017-12426.json @@ -0,0 +1,25 @@ +[ + { + "id": 100264267, + "name": "CVE-2017-12426", + "full_name": "sm-paul-schuette\/CVE-2017-12426", + "owner": { + "login": "sm-paul-schuette", + "id": 29304646, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29304646?v=4", + "html_url": "https:\/\/github.com\/sm-paul-schuette" + }, + "html_url": "https:\/\/github.com\/sm-paul-schuette\/CVE-2017-12426", + "description": null, + "fork": false, + "created_at": "2017-08-14T12:18:15Z", + "updated_at": "2017-08-14T12:18:15Z", + "pushed_at": "2017-08-14T12:19:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-12542.json b/2017/CVE-2017-12542.json new file mode 100644 index 0000000000..f1d2883d54 --- /dev/null +++ b/2017/CVE-2017-12542.json @@ -0,0 +1,48 @@ +[ + { + "id": 120347425, + "name": "CVE-2017-12542", + "full_name": "skelsec\/CVE-2017-12542", + "owner": { + "login": "skelsec", + "id": 19204702, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19204702?v=4", + "html_url": "https:\/\/github.com\/skelsec" + }, + "html_url": "https:\/\/github.com\/skelsec\/CVE-2017-12542", + "description": "Test and exploit for CVE-2017-12542", + "fork": false, + "created_at": "2018-02-05T18:55:56Z", + "updated_at": "2021-03-03T00:00:24Z", + "pushed_at": "2018-04-15T12:01:38Z", + "stargazers_count": 78, + "watchers_count": 78, + "forks_count": 30, + "forks": 30, + "watchers": 78, + "score": 0 + }, + { + "id": 202627780, + "name": "ilo4-rce-vuln-scanner", + "full_name": "sk1dish\/ilo4-rce-vuln-scanner", + "owner": { + "login": "sk1dish", + "id": 46909212, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46909212?v=4", + "html_url": "https:\/\/github.com\/sk1dish" + }, + "html_url": "https:\/\/github.com\/sk1dish\/ilo4-rce-vuln-scanner", + "description": "Scan a list of given IP's for CVE-2017-12542", + "fork": false, + "created_at": "2019-08-16T00:03:29Z", + "updated_at": "2019-08-23T17:40:31Z", + "pushed_at": "2019-08-22T23:27:41Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, + "forks": 1, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-12611.json b/2017/CVE-2017-12611.json new file mode 100644 index 0000000000..d211c2926f --- /dev/null +++ b/2017/CVE-2017-12611.json @@ -0,0 +1,25 @@ +[ + { + "id": 102809812, + "name": "S2-053-CVE-2017-12611", + "full_name": "brianwrf\/S2-053-CVE-2017-12611", + "owner": { + "login": "brianwrf", + "id": 8141813, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", + "html_url": "https:\/\/github.com\/brianwrf" + }, + "html_url": "https:\/\/github.com\/brianwrf\/S2-053-CVE-2017-12611", + "description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)", + "fork": false, + "created_at": "2017-09-08T02:50:37Z", + "updated_at": "2020-12-14T01:19:43Z", + "pushed_at": "2017-09-08T11:59:20Z", + "stargazers_count": 38, + "watchers_count": 38, + "forks_count": 24, + "forks": 24, + "watchers": 38, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index b41011b8b6..b5da889b16 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -22,6 +22,167 @@ "watchers": 81, "score": 0 }, + { + "id": 104743685, + "name": "cve-2017-12615", + "full_name": "mefulton\/cve-2017-12615", + "owner": { + "login": "mefulton", + "id": 27797094, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27797094?v=4", + "html_url": "https:\/\/github.com\/mefulton" + }, + "html_url": "https:\/\/github.com\/mefulton\/cve-2017-12615", + "description": "just a python script for cve-2017-12615", + "fork": false, + "created_at": "2017-09-25T11:53:02Z", + "updated_at": "2019-04-28T08:33:21Z", + "pushed_at": "2017-10-01T08:13:44Z", + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 5, + "forks": 5, + "watchers": 9, + "score": 0 + }, + { + "id": 106053959, + "name": "POC-CVE-2017-12615-or-CVE-2017-12717", + "full_name": "zi0Black\/POC-CVE-2017-12615-or-CVE-2017-12717", + "owner": { + "login": "zi0Black", + "id": 13380579, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13380579?v=4", + "html_url": "https:\/\/github.com\/zi0Black" + }, + "html_url": "https:\/\/github.com\/zi0Black\/POC-CVE-2017-12615-or-CVE-2017-12717", + "description": "CVE-2017-12617 and CVE-2017-12615 for tomcat server", + "fork": false, + "created_at": "2017-10-06T22:04:23Z", + "updated_at": "2019-03-06T16:07:08Z", + "pushed_at": "2017-10-10T14:23:31Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "forks": 1, + "watchers": 3, + "score": 0 + }, + { + "id": 109152824, + "name": "cve-2017-12615", + "full_name": "wsg00d\/cve-2017-12615", + "owner": { + "login": "wsg00d", + "id": 20575929, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20575929?v=4", + "html_url": "https:\/\/github.com\/wsg00d" + }, + "html_url": "https:\/\/github.com\/wsg00d\/cve-2017-12615", + "description": "tomcat-put-cve-2017-12615", + "fork": false, + "created_at": "2017-11-01T16:05:32Z", + "updated_at": "2018-04-30T18:16:21Z", + "pushed_at": "2017-11-01T16:12:40Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 2, + "forks": 2, + "watchers": 2, + "score": 0 + }, + { + "id": 112277075, + "name": "CVE-2017-12615", + "full_name": "BeyondCy\/CVE-2017-12615", + "owner": { + "login": "BeyondCy", + "id": 4694785, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4694785?v=4", + "html_url": "https:\/\/github.com\/BeyondCy" + }, + "html_url": "https:\/\/github.com\/BeyondCy\/CVE-2017-12615", + "description": "Tomcat 远程代码执行漏洞 Exploit", + "fork": false, + "created_at": "2017-11-28T02:51:16Z", + "updated_at": "2020-11-28T11:13:12Z", + "pushed_at": "2017-10-18T13:15:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 115383252, + "name": "CVE-2017-12615", + "full_name": "1337g\/CVE-2017-12615", + "owner": { + "login": "1337g", + "id": 32504404, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4", + "html_url": "https:\/\/github.com\/1337g" + }, + "html_url": "https:\/\/github.com\/1337g\/CVE-2017-12615", + "description": "CVE-2017-12615 Tomcat RCE (TESTED)", + "fork": false, + "created_at": "2017-12-26T03:48:14Z", + "updated_at": "2018-04-30T18:15:17Z", + "pushed_at": "2017-12-26T12:38:46Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 127641351, + "name": "CVE-2017-12615", + "full_name": "Shellkeys\/CVE-2017-12615", + "owner": { + "login": "Shellkeys", + "id": 33480760, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33480760?v=4", + "html_url": "https:\/\/github.com\/Shellkeys" + }, + "html_url": "https:\/\/github.com\/Shellkeys\/CVE-2017-12615", + "description": "tomcat7.x远程命令执行", + "fork": false, + "created_at": "2018-04-01T15:22:51Z", + "updated_at": "2018-04-01T15:22:51Z", + "pushed_at": "2018-04-01T15:22:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 166267639, + "name": "cve-2017-12615", + "full_name": "cved-sources\/cve-2017-12615", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-12615", + "description": "cve-2017-12615", + "fork": false, + "created_at": "2019-01-17T17:30:03Z", + "updated_at": "2019-02-01T21:26:56Z", + "pushed_at": "2019-02-01T21:26:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 235126563, "name": "CVE-2017-12615", diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index 0177180430..21e62d1efd 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -1,4 +1,96 @@ [ + { + "id": 105951164, + "name": "CVE-2017-12617", + "full_name": "cyberheartmi9\/CVE-2017-12617", + "owner": { + "login": "cyberheartmi9", + "id": 12415756, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12415756?v=4", + "html_url": "https:\/\/github.com\/cyberheartmi9" + }, + "html_url": "https:\/\/github.com\/cyberheartmi9\/CVE-2017-12617", + "description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ", + "fork": false, + "created_at": "2017-10-05T23:41:52Z", + "updated_at": "2021-04-03T09:31:19Z", + "pushed_at": "2017-10-11T07:43:50Z", + "stargazers_count": 354, + "watchers_count": 354, + "forks_count": 133, + "forks": 133, + "watchers": 354, + "score": 0 + }, + { + "id": 120838002, + "name": "CVE-2017-12617", + "full_name": "devcoinfet\/CVE-2017-12617", + "owner": { + "login": "devcoinfet", + "id": 34756993, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34756993?v=4", + "html_url": "https:\/\/github.com\/devcoinfet" + }, + "html_url": "https:\/\/github.com\/devcoinfet\/CVE-2017-12617", + "description": "Code put together from a few peoples ideas credit given don't use maliciously please", + "fork": false, + "created_at": "2018-02-09T01:02:32Z", + "updated_at": "2018-02-09T01:04:38Z", + "pushed_at": "2018-02-09T01:04:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 162421259, + "name": "CVE-2017-12617", + "full_name": "qiantu88\/CVE-2017-12617", + "owner": { + "login": "qiantu88", + "id": 35452263, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4", + "html_url": "https:\/\/github.com\/qiantu88" + }, + "html_url": "https:\/\/github.com\/qiantu88\/CVE-2017-12617", + "description": null, + "fork": false, + "created_at": "2018-12-19T10:26:33Z", + "updated_at": "2018-12-19T10:27:18Z", + "pushed_at": "2018-12-19T10:27:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 165734023, + "name": "CVE-2017-12617", + "full_name": "ygouzerh\/CVE-2017-12617", + "owner": { + "login": "ygouzerh", + "id": 33725211, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33725211?v=4", + "html_url": "https:\/\/github.com\/ygouzerh" + }, + "html_url": "https:\/\/github.com\/ygouzerh\/CVE-2017-12617", + "description": "Proof of Concept - RCE Exploitation : Web Shell on Apache Tomcat - Ensimag January 2018", + "fork": false, + "created_at": "2019-01-14T20:58:29Z", + "updated_at": "2020-05-30T11:09:08Z", + "pushed_at": "2019-01-14T21:57:40Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 2, + "forks": 2, + "watchers": 2, + "score": 0 + }, { "id": 335837615, "name": "tomcat-cve-2017-12617", diff --git a/2018/CVE-2018-10936.json b/2017/CVE-2017-12624.json similarity index 58% rename from 2018/CVE-2018-10936.json rename to 2017/CVE-2017-12624.json index 6c6a463ae4..daffcc95ce 100644 --- a/2018/CVE-2018-10936.json +++ b/2017/CVE-2017-12624.json @@ -1,20 +1,20 @@ [ { - "id": 158224861, - "name": "CVE-2018-10936", - "full_name": "tafamace\/CVE-2018-10936", + "id": 158200351, + "name": "CVE-2017-12624", + "full_name": "tafamace\/CVE-2017-12624", "owner": { "login": "tafamace", "id": 45160113, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", "html_url": "https:\/\/github.com\/tafamace" }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-10936", + "html_url": "https:\/\/github.com\/tafamace\/CVE-2017-12624", "description": null, "fork": false, - "created_at": "2018-11-19T13:09:47Z", - "updated_at": "2018-11-19T13:13:10Z", - "pushed_at": "2018-11-19T13:13:09Z", + "created_at": "2018-11-19T10:07:55Z", + "updated_at": "2018-11-19T10:20:47Z", + "pushed_at": "2018-11-19T10:20:46Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2017/CVE-2017-12636.json b/2017/CVE-2017-12636.json index a7e2968d0e..2b6f22b80b 100644 --- a/2017/CVE-2017-12636.json +++ b/2017/CVE-2017-12636.json @@ -1,4 +1,27 @@ [ + { + "id": 146091131, + "name": "CVE-2017-12636", + "full_name": "moayadalmalat\/CVE-2017-12636", + "owner": { + "login": "moayadalmalat", + "id": 42471675, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42471675?v=4", + "html_url": "https:\/\/github.com\/moayadalmalat" + }, + "html_url": "https:\/\/github.com\/moayadalmalat\/CVE-2017-12636", + "description": null, + "fork": false, + "created_at": "2018-08-25T11:50:22Z", + "updated_at": "2018-08-25T12:01:25Z", + "pushed_at": "2018-08-25T12:01:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 3, + "forks": 3, + "watchers": 0, + "score": 0 + }, { "id": 249396383, "name": "CVE-2017-12636", diff --git a/2017/CVE-2017-12792.json b/2017/CVE-2017-12792.json new file mode 100644 index 0000000000..74a33f6db7 --- /dev/null +++ b/2017/CVE-2017-12792.json @@ -0,0 +1,25 @@ +[ + { + "id": 107090388, + "name": "cve-2017-12792", + "full_name": "ZZS2017\/cve-2017-12792", + "owner": { + "login": "ZZS2017", + "id": 30464951, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30464951?v=4", + "html_url": "https:\/\/github.com\/ZZS2017" + }, + "html_url": "https:\/\/github.com\/ZZS2017\/cve-2017-12792", + "description": "NexusPHP CSRF+XSS", + "fork": false, + "created_at": "2017-10-16T07:06:19Z", + "updated_at": "2019-11-21T10:28:20Z", + "pushed_at": "2017-08-21T09:38:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-12852.json b/2017/CVE-2017-12852.json new file mode 100644 index 0000000000..0abc0d214a --- /dev/null +++ b/2017/CVE-2017-12852.json @@ -0,0 +1,25 @@ +[ + { + "id": 105343958, + "name": "numpy-1.13.1", + "full_name": "BT123\/numpy-1.13.1", + "owner": { + "login": "BT123", + "id": 9165608, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9165608?v=4", + "html_url": "https:\/\/github.com\/BT123" + }, + "html_url": "https:\/\/github.com\/BT123\/numpy-1.13.1", + "description": "test the CVE-2017-12852 in numpy v1.13.1 and v1.13.3 has fixed the bug ", + "fork": false, + "created_at": "2017-09-30T05:21:48Z", + "updated_at": "2017-11-03T06:18:22Z", + "pushed_at": "2017-10-20T03:34:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-12943.json b/2017/CVE-2017-12943.json new file mode 100644 index 0000000000..b015e8b0ee --- /dev/null +++ b/2017/CVE-2017-12943.json @@ -0,0 +1,25 @@ +[ + { + "id": 105268887, + "name": "D-Link", + "full_name": "aymankhalfatni\/D-Link", + "owner": { + "login": "aymankhalfatni", + "id": 19715320, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19715320?v=4", + "html_url": "https:\/\/github.com\/aymankhalfatni" + }, + "html_url": "https:\/\/github.com\/aymankhalfatni\/D-Link", + "description": "CVE-2017-12943", + "fork": false, + "created_at": "2017-09-29T12:18:40Z", + "updated_at": "2017-09-29T12:18:40Z", + "pushed_at": "2017-09-29T12:22:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-13089.json b/2017/CVE-2017-13089.json new file mode 100644 index 0000000000..38d6b26e95 --- /dev/null +++ b/2017/CVE-2017-13089.json @@ -0,0 +1,48 @@ +[ + { + "id": 108590896, + "name": "CVE-2017-13089", + "full_name": "r1b\/CVE-2017-13089", + "owner": { + "login": "r1b", + "id": 5550520, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5550520?v=4", + "html_url": "https:\/\/github.com\/r1b" + }, + "html_url": "https:\/\/github.com\/r1b\/CVE-2017-13089", + "description": "PoC for wget v1.19.1", + "fork": false, + "created_at": "2017-10-27T20:06:11Z", + "updated_at": "2020-12-26T09:31:18Z", + "pushed_at": "2018-02-02T11:30:04Z", + "stargazers_count": 52, + "watchers_count": 52, + "forks_count": 21, + "forks": 21, + "watchers": 52, + "score": 0 + }, + { + "id": 110805304, + "name": "CVE-2017-13089", + "full_name": "mzeyong\/CVE-2017-13089", + "owner": { + "login": "mzeyong", + "id": 20426501, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20426501?v=4", + "html_url": "https:\/\/github.com\/mzeyong" + }, + "html_url": "https:\/\/github.com\/mzeyong\/CVE-2017-13089", + "description": "CVE-2017-13089", + "fork": false, + "created_at": "2017-11-15T08:22:58Z", + "updated_at": "2021-03-09T00:50:44Z", + "pushed_at": "2017-11-15T08:36:12Z", + "stargazers_count": 55, + "watchers_count": 55, + "forks_count": 18, + "forks": 18, + "watchers": 55, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-13156.json b/2017/CVE-2017-13156.json index a4caccd6bb..694b241962 100644 --- a/2017/CVE-2017-13156.json +++ b/2017/CVE-2017-13156.json @@ -1,4 +1,73 @@ [ + { + "id": 115697431, + "name": "Janus-CVE-2017-13156", + "full_name": "xyzAsian\/Janus-CVE-2017-13156", + "owner": { + "login": "xyzAsian", + "id": 34933799, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34933799?v=4", + "html_url": "https:\/\/github.com\/xyzAsian" + }, + "html_url": "https:\/\/github.com\/xyzAsian\/Janus-CVE-2017-13156", + "description": null, + "fork": false, + "created_at": "2017-12-29T07:11:42Z", + "updated_at": "2019-11-26T05:42:27Z", + "pushed_at": "2017-12-29T08:01:10Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 3, + "forks": 3, + "watchers": 11, + "score": 0 + }, + { + "id": 188905732, + "name": "CVE-2017-13156", + "full_name": "caxmd\/CVE-2017-13156", + "owner": { + "login": "caxmd", + "id": 24653899, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24653899?v=4", + "html_url": "https:\/\/github.com\/caxmd" + }, + "html_url": "https:\/\/github.com\/caxmd\/CVE-2017-13156", + "description": null, + "fork": false, + "created_at": "2019-05-27T20:32:05Z", + "updated_at": "2019-05-27T20:32:05Z", + "pushed_at": "2019-05-27T20:32:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 204320854, + "name": "janus-toolkit", + "full_name": "giacomoferretti\/janus-toolkit", + "owner": { + "login": "giacomoferretti", + "id": 1778595, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1778595?v=4", + "html_url": "https:\/\/github.com\/giacomoferretti" + }, + "html_url": "https:\/\/github.com\/giacomoferretti\/janus-toolkit", + "description": "A collection of tools for the Janus exploit [CVE-2017-13156].", + "fork": false, + "created_at": "2019-08-25T16:31:16Z", + "updated_at": "2020-11-26T10:13:27Z", + "pushed_at": "2019-10-22T20:04:08Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, + "forks": 1, + "watchers": 5, + "score": 0 + }, { "id": 292525072, "name": "CVE-2017-13156-Janus", diff --git a/2017/CVE-2017-13672.json b/2017/CVE-2017-13672.json new file mode 100644 index 0000000000..e05b0eab40 --- /dev/null +++ b/2017/CVE-2017-13672.json @@ -0,0 +1,25 @@ +[ + { + "id": 115146971, + "name": "CVE-2017-13672", + "full_name": "DavidBuchanan314\/CVE-2017-13672", + "owner": { + "login": "DavidBuchanan314", + "id": 13520633, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13520633?v=4", + "html_url": "https:\/\/github.com\/DavidBuchanan314" + }, + "html_url": "https:\/\/github.com\/DavidBuchanan314\/CVE-2017-13672", + "description": "POCs for CVE-2017-13672 (OOB read in VGA Cirrus QEMU driver, causing DoS)", + "fork": false, + "created_at": "2017-12-22T20:08:33Z", + "updated_at": "2018-01-29T04:34:02Z", + "pushed_at": "2017-12-22T22:52:43Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 4, + "forks": 4, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-13868.json b/2017/CVE-2017-13868.json new file mode 100644 index 0000000000..949d506c1d --- /dev/null +++ b/2017/CVE-2017-13868.json @@ -0,0 +1,25 @@ +[ + { + "id": 106086726, + "name": "ctl_ctloutput-leak", + "full_name": "bazad\/ctl_ctloutput-leak", + "owner": { + "login": "bazad", + "id": 3111637, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4", + "html_url": "https:\/\/github.com\/bazad" + }, + "html_url": "https:\/\/github.com\/bazad\/ctl_ctloutput-leak", + "description": "CVE-2017-13868: Information leak of uninitialized kernel heap data in XNU.", + "fork": false, + "created_at": "2017-10-07T09:42:05Z", + "updated_at": "2019-11-05T03:14:33Z", + "pushed_at": "2017-12-07T01:04:52Z", + "stargazers_count": 26, + "watchers_count": 26, + "forks_count": 5, + "forks": 5, + "watchers": 26, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-13872.json b/2017/CVE-2017-13872.json new file mode 100644 index 0000000000..f0235dedb6 --- /dev/null +++ b/2017/CVE-2017-13872.json @@ -0,0 +1,25 @@ +[ + { + "id": 112584924, + "name": "CVE-2017-13872-Patch", + "full_name": "giovannidispoto\/CVE-2017-13872-Patch", + "owner": { + "login": "giovannidispoto", + "id": 7195434, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7195434?v=4", + "html_url": "https:\/\/github.com\/giovannidispoto" + }, + "html_url": "https:\/\/github.com\/giovannidispoto\/CVE-2017-13872-Patch", + "description": null, + "fork": false, + "created_at": "2017-11-30T08:22:00Z", + "updated_at": "2017-11-30T08:23:41Z", + "pushed_at": "2017-11-30T15:26:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-14105.json b/2017/CVE-2017-14105.json new file mode 100644 index 0000000000..765a5c6151 --- /dev/null +++ b/2017/CVE-2017-14105.json @@ -0,0 +1,25 @@ +[ + { + "id": 102123441, + "name": "CVE-2017-14105", + "full_name": "theguly\/CVE-2017-14105", + "owner": { + "login": "theguly", + "id": 1745802, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1745802?v=4", + "html_url": "https:\/\/github.com\/theguly" + }, + "html_url": "https:\/\/github.com\/theguly\/CVE-2017-14105", + "description": null, + "fork": false, + "created_at": "2017-09-01T14:51:31Z", + "updated_at": "2019-01-08T00:25:52Z", + "pushed_at": "2017-09-14T13:14:18Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-14262.json b/2017/CVE-2017-14262.json new file mode 100644 index 0000000000..975a0b325b --- /dev/null +++ b/2017/CVE-2017-14262.json @@ -0,0 +1,25 @@ +[ + { + "id": 102810621, + "name": "CVE-2017-14262", + "full_name": "zzz66686\/CVE-2017-14262", + "owner": { + "login": "zzz66686", + "id": 14144972, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4", + "html_url": "https:\/\/github.com\/zzz66686" + }, + "html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14262", + "description": null, + "fork": false, + "created_at": "2017-09-08T02:59:21Z", + "updated_at": "2020-12-02T19:55:31Z", + "pushed_at": "2017-09-13T14:39:40Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 4, + "forks": 4, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-14263.json b/2017/CVE-2017-14263.json new file mode 100644 index 0000000000..f6748d84c0 --- /dev/null +++ b/2017/CVE-2017-14263.json @@ -0,0 +1,25 @@ +[ + { + "id": 102832029, + "name": "CVE-2017-14263", + "full_name": "zzz66686\/CVE-2017-14263", + "owner": { + "login": "zzz66686", + "id": 14144972, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14144972?v=4", + "html_url": "https:\/\/github.com\/zzz66686" + }, + "html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14263", + "description": null, + "fork": false, + "created_at": "2017-09-08T07:27:13Z", + "updated_at": "2020-05-18T10:42:14Z", + "pushed_at": "2017-09-13T14:40:53Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 6, + "forks": 6, + "watchers": 3, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-14322.json b/2017/CVE-2017-14322.json new file mode 100644 index 0000000000..6f33f9028d --- /dev/null +++ b/2017/CVE-2017-14322.json @@ -0,0 +1,25 @@ +[ + { + "id": 126989533, + "name": "CVE-2017-14322", + "full_name": "joesmithjaffa\/CVE-2017-14322", + "owner": { + "login": "joesmithjaffa", + "id": 33636378, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33636378?v=4", + "html_url": "https:\/\/github.com\/joesmithjaffa" + }, + "html_url": "https:\/\/github.com\/joesmithjaffa\/CVE-2017-14322", + "description": "CVE-2017-14322 Interspire Email Marketer (emailmarketer) Exploit", + "fork": false, + "created_at": "2018-03-27T13:20:31Z", + "updated_at": "2018-12-28T06:25:55Z", + "pushed_at": "2018-03-27T13:42:16Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, + "forks": 1, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-14491.json b/2017/CVE-2017-14491.json new file mode 100644 index 0000000000..66337924ee --- /dev/null +++ b/2017/CVE-2017-14491.json @@ -0,0 +1,25 @@ +[ + { + "id": 108858920, + "name": "dnsmasq-2.4.1-fix-CVE-2017-14491", + "full_name": "skyformat99\/dnsmasq-2.4.1-fix-CVE-2017-14491", + "owner": { + "login": "skyformat99", + "id": 10938976, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10938976?v=4", + "html_url": "https:\/\/github.com\/skyformat99" + }, + "html_url": "https:\/\/github.com\/skyformat99\/dnsmasq-2.4.1-fix-CVE-2017-14491", + "description": null, + "fork": false, + "created_at": "2017-10-30T14:02:52Z", + "updated_at": "2020-07-25T01:12:06Z", + "pushed_at": "2017-10-30T01:43:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-14493.json b/2017/CVE-2017-14493.json new file mode 100644 index 0000000000..13e99b3f6b --- /dev/null +++ b/2017/CVE-2017-14493.json @@ -0,0 +1,25 @@ +[ + { + "id": 160322339, + "name": "bof-dnsmasq-cve-2017-14493", + "full_name": "pupiles\/bof-dnsmasq-cve-2017-14493", + "owner": { + "login": "pupiles", + "id": 30405721, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30405721?v=4", + "html_url": "https:\/\/github.com\/pupiles" + }, + "html_url": "https:\/\/github.com\/pupiles\/bof-dnsmasq-cve-2017-14493", + "description": "dnsmasq rop exploit with NX bypass", + "fork": false, + "created_at": "2018-12-04T08:15:53Z", + "updated_at": "2021-03-10T09:05:32Z", + "pushed_at": "2018-07-31T23:26:06Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-14719.json b/2017/CVE-2017-14719.json new file mode 100644 index 0000000000..7eac2ac099 --- /dev/null +++ b/2017/CVE-2017-14719.json @@ -0,0 +1,25 @@ +[ + { + "id": 202961104, + "name": "CodePath_Week_7-8", + "full_name": "PalmTreeForest\/CodePath_Week_7-8", + "owner": { + "login": "PalmTreeForest", + "id": 30913112, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30913112?v=4", + "html_url": "https:\/\/github.com\/PalmTreeForest" + }, + "html_url": "https:\/\/github.com\/PalmTreeForest\/CodePath_Week_7-8", + "description": "CodePath Assignment for Weeks 7 & 8: CVE-2017-14719, CVE-2019-9787 & Unauthenticated Page\/Post Content Modification via REST API", + "fork": false, + "created_at": "2019-08-18T04:50:37Z", + "updated_at": "2019-08-18T05:22:44Z", + "pushed_at": "2019-08-18T05:18:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-14948.json b/2017/CVE-2017-14948.json new file mode 100644 index 0000000000..099b50e5e1 --- /dev/null +++ b/2017/CVE-2017-14948.json @@ -0,0 +1,25 @@ +[ + { + "id": 214687577, + "name": "d_link_880_bug", + "full_name": "badnack\/d_link_880_bug", + "owner": { + "login": "badnack", + "id": 1037156, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1037156?v=4", + "html_url": "https:\/\/github.com\/badnack" + }, + "html_url": "https:\/\/github.com\/badnack\/d_link_880_bug", + "description": "CVE-2017-14948 for D-Link 880 Firmware", + "fork": false, + "created_at": "2019-10-12T17:29:36Z", + "updated_at": "2019-10-16T17:40:25Z", + "pushed_at": "2019-10-14T21:52:26Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-15120.json b/2017/CVE-2017-15120.json new file mode 100644 index 0000000000..826c546680 --- /dev/null +++ b/2017/CVE-2017-15120.json @@ -0,0 +1,25 @@ +[ + { + "id": 153306341, + "name": "CVE-2017-15120_PoC", + "full_name": "shutingrz\/CVE-2017-15120_PoC", + "owner": { + "login": "shutingrz", + "id": 2587857, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2587857?v=4", + "html_url": "https:\/\/github.com\/shutingrz" + }, + "html_url": "https:\/\/github.com\/shutingrz\/CVE-2017-15120_PoC", + "description": "PowerDNS CVE-2017-15120 \/ DO NOT ABUSE", + "fork": false, + "created_at": "2018-10-16T15:08:15Z", + "updated_at": "2020-04-06T11:04:21Z", + "pushed_at": "2018-10-16T15:09:30Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 3, + "forks": 3, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-15303.json b/2017/CVE-2017-15303.json new file mode 100644 index 0000000000..2d6aff6c4e --- /dev/null +++ b/2017/CVE-2017-15303.json @@ -0,0 +1,25 @@ +[ + { + "id": 122435032, + "name": "Stryker", + "full_name": "hfiref0x\/Stryker", + "owner": { + "login": "hfiref0x", + "id": 10708977, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10708977?v=4", + "html_url": "https:\/\/github.com\/hfiref0x" + }, + "html_url": "https:\/\/github.com\/hfiref0x\/Stryker", + "description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303", + "fork": false, + "created_at": "2018-02-22T05:31:13Z", + "updated_at": "2021-02-06T02:19:41Z", + "pushed_at": "2018-02-25T08:49:07Z", + "stargazers_count": 86, + "watchers_count": 86, + "forks_count": 51, + "forks": 51, + "watchers": 86, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-15361.json b/2017/CVE-2017-15361.json index 86c5ff7800..fb7cdd6d6b 100644 --- a/2017/CVE-2017-15361.json +++ b/2017/CVE-2017-15361.json @@ -1,4 +1,142 @@ [ + { + "id": 107277248, + "name": "Infineon-CVE-2017-15361", + "full_name": "lva\/Infineon-CVE-2017-15361", + "owner": { + "login": "lva", + "id": 1962037, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1962037?v=4", + "html_url": "https:\/\/github.com\/lva" + }, + "html_url": "https:\/\/github.com\/lva\/Infineon-CVE-2017-15361", + "description": "Simple PowerShell script to check whether a computer is using an Infineon TPM chip that is vulnerable to CVE-2017-15361.", + "fork": false, + "created_at": "2017-10-17T14:07:45Z", + "updated_at": "2017-10-23T02:23:23Z", + "pushed_at": "2017-10-19T11:24:22Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + }, + { + "id": 107299810, + "name": "rocacheck", + "full_name": "titanous\/rocacheck", + "owner": { + "login": "titanous", + "id": 13026, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13026?v=4", + "html_url": "https:\/\/github.com\/titanous" + }, + "html_url": "https:\/\/github.com\/titanous\/rocacheck", + "description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361", + "fork": false, + "created_at": "2017-10-17T17:08:22Z", + "updated_at": "2021-02-06T07:54:35Z", + "pushed_at": "2017-10-23T19:39:21Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 5, + "forks": 5, + "watchers": 11, + "score": 0 + }, + { + "id": 107551756, + "name": "RocaCmTest", + "full_name": "jnpuskar\/RocaCmTest", + "owner": { + "login": "jnpuskar", + "id": 8107471, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8107471?v=4", + "html_url": "https:\/\/github.com\/jnpuskar" + }, + "html_url": "https:\/\/github.com\/jnpuskar\/RocaCmTest", + "description": "Windows tool that analyzes your computer for Infineon TPM weak RSA keys (CVE-2017-15361) ", + "fork": false, + "created_at": "2017-10-19T13:42:52Z", + "updated_at": "2017-10-19T17:24:19Z", + "pushed_at": "2017-10-20T12:09:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 107592667, + "name": "Detect-CVE-2017-15361-TPM", + "full_name": "nsacyber\/Detect-CVE-2017-15361-TPM", + "owner": { + "login": "nsacyber", + "id": 6088344, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6088344?v=4", + "html_url": "https:\/\/github.com\/nsacyber" + }, + "html_url": "https:\/\/github.com\/nsacyber\/Detect-CVE-2017-15361-TPM", + "description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber", + "fork": false, + "created_at": "2017-10-19T20:02:56Z", + "updated_at": "2020-12-30T10:15:30Z", + "pushed_at": "2018-09-04T21:35:36Z", + "stargazers_count": 34, + "watchers_count": 34, + "forks_count": 23, + "forks": 23, + "watchers": 34, + "score": 0 + }, + { + "id": 108202276, + "name": "zeek-plugin-roca", + "full_name": "0xxon\/zeek-plugin-roca", + "owner": { + "login": "0xxon", + "id": 1538460, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4", + "html_url": "https:\/\/github.com\/0xxon" + }, + "html_url": "https:\/\/github.com\/0xxon\/zeek-plugin-roca", + "description": "Bro plugin to check if certificates are affected by CVE-2017-15361", + "fork": false, + "created_at": "2017-10-25T01:10:06Z", + "updated_at": "2019-05-24T11:29:34Z", + "pushed_at": "2018-11-14T19:00:42Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "forks": 1, + "watchers": 3, + "score": 0 + }, + { + "id": 108287639, + "name": "roca", + "full_name": "0xxon\/roca", + "owner": { + "login": "0xxon", + "id": 1538460, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4", + "html_url": "https:\/\/github.com\/0xxon" + }, + "html_url": "https:\/\/github.com\/0xxon\/roca", + "description": "Reimplementation of CVE-2017-15361 checker in C", + "fork": false, + "created_at": "2017-10-25T15:16:11Z", + "updated_at": "2017-10-25T15:16:43Z", + "pushed_at": "2017-10-25T15:16:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 309390412, "name": "Attacco-ROCA-sulla-vulnerabilita-CVE-2017-15361", diff --git a/2017/CVE-2017-15394.json b/2017/CVE-2017-15394.json new file mode 100644 index 0000000000..d263e7c7ab --- /dev/null +++ b/2017/CVE-2017-15394.json @@ -0,0 +1,25 @@ +[ + { + "id": 112094225, + "name": "CVE-2017-15394", + "full_name": "sudosammy\/CVE-2017-15394", + "owner": { + "login": "sudosammy", + "id": 18524051, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18524051?v=4", + "html_url": "https:\/\/github.com\/sudosammy" + }, + "html_url": "https:\/\/github.com\/sudosammy\/CVE-2017-15394", + "description": null, + "fork": false, + "created_at": "2017-11-26T15:32:04Z", + "updated_at": "2017-11-26T15:32:04Z", + "pushed_at": "2017-11-26T15:32:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-15708.json b/2017/CVE-2017-15708.json new file mode 100644 index 0000000000..3dd6899f6c --- /dev/null +++ b/2017/CVE-2017-15708.json @@ -0,0 +1,25 @@ +[ + { + "id": 114627582, + "name": "CVE-2017-15708", + "full_name": "HuSoul\/CVE-2017-15708", + "owner": { + "login": "HuSoul", + "id": 17831277, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17831277?v=4", + "html_url": "https:\/\/github.com\/HuSoul" + }, + "html_url": "https:\/\/github.com\/HuSoul\/CVE-2017-15708", + "description": "Apache synapse 反序列化 CVE–2017–15708", + "fork": false, + "created_at": "2017-12-18T10:27:58Z", + "updated_at": "2020-09-24T10:42:20Z", + "pushed_at": "2017-12-18T07:16:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-15715.json b/2017/CVE-2017-15715.json new file mode 100644 index 0000000000..59056444ea --- /dev/null +++ b/2017/CVE-2017-15715.json @@ -0,0 +1,25 @@ +[ + { + "id": 193028306, + "name": "CVE-2017-15715", + "full_name": "whisp1830\/CVE-2017-15715", + "owner": { + "login": "whisp1830", + "id": 24414594, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24414594?v=4", + "html_url": "https:\/\/github.com\/whisp1830" + }, + "html_url": "https:\/\/github.com\/whisp1830\/CVE-2017-15715", + "description": null, + "fork": false, + "created_at": "2019-06-21T04:05:32Z", + "updated_at": "2019-06-21T04:06:25Z", + "pushed_at": "2019-06-21T04:06:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-15944.json b/2017/CVE-2017-15944.json index d2f3871251..64bd3d9023 100644 --- a/2017/CVE-2017-15944.json +++ b/2017/CVE-2017-15944.json @@ -1,4 +1,50 @@ [ + { + "id": 114719978, + "name": "CVE-2017-15944-POC", + "full_name": "xxnbyy\/CVE-2017-15944-POC", + "owner": { + "login": "xxnbyy", + "id": 20261647, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20261647?v=4", + "html_url": "https:\/\/github.com\/xxnbyy" + }, + "html_url": "https:\/\/github.com\/xxnbyy\/CVE-2017-15944-POC", + "description": "CVE-2017-15944 Palo Alto Networks firewalls remote root code execution POC", + "fork": false, + "created_at": "2017-12-19T04:43:24Z", + "updated_at": "2019-08-27T03:14:33Z", + "pushed_at": "2017-12-15T02:57:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 5, + "forks": 5, + "watchers": 0, + "score": 0 + }, + { + "id": 134778333, + "name": "PaloAltoRceDetectionAndExploit", + "full_name": "surajraghuvanshi\/PaloAltoRceDetectionAndExploit", + "owner": { + "login": "surajraghuvanshi", + "id": 7037657, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7037657?v=4", + "html_url": "https:\/\/github.com\/surajraghuvanshi" + }, + "html_url": "https:\/\/github.com\/surajraghuvanshi\/PaloAltoRceDetectionAndExploit", + "description": "Detecion for the vulnerability CVE-2017-15944", + "fork": false, + "created_at": "2018-05-24T23:19:57Z", + "updated_at": "2020-08-04T01:33:49Z", + "pushed_at": "2019-04-04T03:00:44Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "forks": 1, + "watchers": 3, + "score": 0 + }, { "id": 267752481, "name": "CVE-2017-15944", diff --git a/2017/CVE-2017-16082.json b/2017/CVE-2017-16082.json new file mode 100644 index 0000000000..668db7c335 --- /dev/null +++ b/2017/CVE-2017-16082.json @@ -0,0 +1,25 @@ +[ + { + "id": 159378663, + "name": "CVE-2017-16082", + "full_name": "nulldreams\/CVE-2017-16082", + "owner": { + "login": "nulldreams", + "id": 13773645, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13773645?v=4", + "html_url": "https:\/\/github.com\/nulldreams" + }, + "html_url": "https:\/\/github.com\/nulldreams\/CVE-2017-16082", + "description": "NodeJS + Postgres (Remote Code Execution) 🛰", + "fork": false, + "created_at": "2018-11-27T18:09:17Z", + "updated_at": "2020-11-06T15:37:24Z", + "pushed_at": "2018-11-27T18:42:48Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 0, + "forks": 0, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-16088.json b/2017/CVE-2017-16088.json new file mode 100644 index 0000000000..f006cd0216 --- /dev/null +++ b/2017/CVE-2017-16088.json @@ -0,0 +1,25 @@ +[ + { + "id": 203029257, + "name": "CVE-2017-16088", + "full_name": "Flyy-yu\/CVE-2017-16088", + "owner": { + "login": "Flyy-yu", + "id": 25512004, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25512004?v=4", + "html_url": "https:\/\/github.com\/Flyy-yu" + }, + "html_url": "https:\/\/github.com\/Flyy-yu\/CVE-2017-16088", + "description": "Exploit CVE-2017-16088 ", + "fork": false, + "created_at": "2019-08-18T16:22:46Z", + "updated_at": "2019-08-18T16:23:18Z", + "pushed_at": "2019-08-18T16:23:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-16245.json b/2017/CVE-2017-16245.json new file mode 100644 index 0000000000..2fc7b46cae --- /dev/null +++ b/2017/CVE-2017-16245.json @@ -0,0 +1,25 @@ +[ + { + "id": 153248100, + "name": "CVE-2017-16245", + "full_name": "AOCorsaire\/CVE-2017-16245", + "owner": { + "login": "AOCorsaire", + "id": 17743663, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17743663?v=4", + "html_url": "https:\/\/github.com\/AOCorsaire" + }, + "html_url": "https:\/\/github.com\/AOCorsaire\/CVE-2017-16245", + "description": "Source code for CVE-2017-16245 (Avecto Defendpoint bypass originally disclosed by Nettitude) ", + "fork": false, + "created_at": "2018-10-16T08:14:29Z", + "updated_at": "2019-11-13T09:28:06Z", + "pushed_at": "2018-10-16T14:30:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1635.json b/2017/CVE-2017-1635.json index bf6906fca3..a6d9e6c544 100644 --- a/2017/CVE-2017-1635.json +++ b/2017/CVE-2017-1635.json @@ -1,4 +1,27 @@ [ + { + "id": 120433534, + "name": "tivoli-poc", + "full_name": "emcalv\/tivoli-poc", + "owner": { + "login": "emcalv", + "id": 36189787, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36189787?v=4", + "html_url": "https:\/\/github.com\/emcalv" + }, + "html_url": "https:\/\/github.com\/emcalv\/tivoli-poc", + "description": "CVE-2017-1635 PoC code", + "fork": false, + "created_at": "2018-02-06T09:43:28Z", + "updated_at": "2019-05-15T02:02:47Z", + "pushed_at": "2018-02-06T12:14:06Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 344592351, "name": "cve-2017-1635-PoC", diff --git a/2017/CVE-2017-16524.json b/2017/CVE-2017-16524.json new file mode 100644 index 0000000000..c44e23902e --- /dev/null +++ b/2017/CVE-2017-16524.json @@ -0,0 +1,25 @@ +[ + { + "id": 109582148, + "name": "CVE-2017-16524", + "full_name": "realistic-security\/CVE-2017-16524", + "owner": { + "login": "realistic-security", + "id": 33375077, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33375077?v=4", + "html_url": "https:\/\/github.com\/realistic-security" + }, + "html_url": "https:\/\/github.com\/realistic-security\/CVE-2017-16524", + "description": "Unrestricted file upload vulnerability - Web Viewer 1.0.0.193 on Samsung SRN-1670D", + "fork": false, + "created_at": "2017-11-05T13:32:43Z", + "updated_at": "2019-11-18T19:42:37Z", + "pushed_at": "2017-11-05T23:17:44Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, + "forks": 1, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-16567.json b/2017/CVE-2017-16567.json new file mode 100644 index 0000000000..f754324f6b --- /dev/null +++ b/2017/CVE-2017-16567.json @@ -0,0 +1,25 @@ +[ + { + "id": 108069202, + "name": "CVE-2017-16567", + "full_name": "dewankpant\/CVE-2017-16567", + "owner": { + "login": "dewankpant", + "id": 8929631, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8929631?v=4", + "html_url": "https:\/\/github.com\/dewankpant" + }, + "html_url": "https:\/\/github.com\/dewankpant\/CVE-2017-16567", + "description": null, + "fork": false, + "created_at": "2017-10-24T02:54:08Z", + "updated_at": "2018-07-18T00:29:06Z", + "pushed_at": "2018-07-18T00:29:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-16568.json b/2017/CVE-2017-16568.json new file mode 100644 index 0000000000..010ee79c37 --- /dev/null +++ b/2017/CVE-2017-16568.json @@ -0,0 +1,25 @@ +[ + { + "id": 118300598, + "name": "CVE-2017-16568", + "full_name": "dewankpant\/CVE-2017-16568", + "owner": { + "login": "dewankpant", + "id": 8929631, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8929631?v=4", + "html_url": "https:\/\/github.com\/dewankpant" + }, + "html_url": "https:\/\/github.com\/dewankpant\/CVE-2017-16568", + "description": null, + "fork": false, + "created_at": "2018-01-21T03:17:56Z", + "updated_at": "2018-07-18T00:27:02Z", + "pushed_at": "2018-07-18T00:27:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-16744.json b/2017/CVE-2017-16744.json new file mode 100644 index 0000000000..5505df775d --- /dev/null +++ b/2017/CVE-2017-16744.json @@ -0,0 +1,25 @@ +[ + { + "id": 207384844, + "name": "CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara", + "full_name": "GainSec\/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara", + "owner": { + "login": "GainSec", + "id": 46727209, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46727209?v=4", + "html_url": "https:\/\/github.com\/GainSec" + }, + "html_url": "https:\/\/github.com\/GainSec\/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara", + "description": " Proof of Concept (PoC) for CVE: 2017-16744 and 2017-16748", + "fork": false, + "created_at": "2019-09-09T19:08:59Z", + "updated_at": "2020-08-02T19:27:59Z", + "pushed_at": "2019-09-09T19:11:14Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-16806.json b/2017/CVE-2017-16806.json new file mode 100644 index 0000000000..36435b0ccf --- /dev/null +++ b/2017/CVE-2017-16806.json @@ -0,0 +1,25 @@ +[ + { + "id": 110611562, + "name": "ulteriusExploit", + "full_name": "rickoooooo\/ulteriusExploit", + "owner": { + "login": "rickoooooo", + "id": 33641230, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33641230?v=4", + "html_url": "https:\/\/github.com\/rickoooooo" + }, + "html_url": "https:\/\/github.com\/rickoooooo\/ulteriusExploit", + "description": "Python exploit for CVE-2017-16806", + "fork": false, + "created_at": "2017-11-13T22:48:46Z", + "updated_at": "2017-11-13T22:52:09Z", + "pushed_at": "2017-11-13T23:04:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-16995.json b/2017/CVE-2017-16995.json index a00431fbb9..f832211b70 100644 --- a/2017/CVE-2017-16995.json +++ b/2017/CVE-2017-16995.json @@ -1,4 +1,142 @@ [ + { + "id": 125850596, + "name": "CVE-2017-16995", + "full_name": "C0dak\/CVE-2017-16995", + "owner": { + "login": "C0dak", + "id": 17883550, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17883550?v=4", + "html_url": "https:\/\/github.com\/C0dak" + }, + "html_url": "https:\/\/github.com\/C0dak\/CVE-2017-16995", + "description": "Linux Kernel Version 4.14 - 4.4 (Ubuntu && Debian)", + "fork": false, + "created_at": "2018-03-19T11:58:20Z", + "updated_at": "2020-10-20T22:43:59Z", + "pushed_at": "2018-03-19T05:59:15Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 131100341, + "name": "CVE-2017-16995", + "full_name": "Al1ex\/CVE-2017-16995", + "owner": { + "login": "Al1ex", + "id": 38161463, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", + "html_url": "https:\/\/github.com\/Al1ex" + }, + "html_url": "https:\/\/github.com\/Al1ex\/CVE-2017-16995", + "description": "CVE-2017-16995(Ubuntu本地提权漏洞)", + "fork": false, + "created_at": "2018-04-26T04:33:50Z", + "updated_at": "2019-12-04T08:15:00Z", + "pushed_at": "2018-04-26T04:57:11Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 5, + "forks": 5, + "watchers": 4, + "score": 0 + }, + { + "id": 153606892, + "name": "CVE-2017-16995", + "full_name": "gugronnier\/CVE-2017-16995", + "owner": { + "login": "gugronnier", + "id": 22094271, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22094271?v=4", + "html_url": "https:\/\/github.com\/gugronnier" + }, + "html_url": "https:\/\/github.com\/gugronnier\/CVE-2017-16995", + "description": "Exploit adapted for a specific PoC on Ubuntu 16.04.01", + "fork": false, + "created_at": "2018-10-18T10:34:24Z", + "updated_at": "2018-12-05T12:50:35Z", + "pushed_at": "2018-12-05T12:50:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 5, + "forks": 5, + "watchers": 0, + "score": 0 + }, + { + "id": 166941690, + "name": "cve-2017-16995", + "full_name": "senyuuri\/cve-2017-16995", + "owner": { + "login": "senyuuri", + "id": 2610986, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2610986?v=4", + "html_url": "https:\/\/github.com\/senyuuri" + }, + "html_url": "https:\/\/github.com\/senyuuri\/cve-2017-16995", + "description": "Writeup for CVE-2017-16995 Linux BPF Local Privilege Escalation", + "fork": false, + "created_at": "2019-01-22T06:42:27Z", + "updated_at": "2019-01-22T06:44:45Z", + "pushed_at": "2019-01-22T06:43:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 198427526, + "name": "CVE-2017-16995", + "full_name": "vnik5287\/CVE-2017-16995", + "owner": { + "login": "vnik5287", + "id": 9650718, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4", + "html_url": "https:\/\/github.com\/vnik5287" + }, + "html_url": "https:\/\/github.com\/vnik5287\/CVE-2017-16995", + "description": "CVE-2017-16995 eBPF PoC for Ubuntu 16.04", + "fork": false, + "created_at": "2019-07-23T12:37:27Z", + "updated_at": "2019-07-23T22:56:11Z", + "pushed_at": "2019-07-23T12:37:41Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 202306651, + "name": "CVE-2017-16995", + "full_name": "littlebin404\/CVE-2017-16995", + "owner": { + "login": "littlebin404", + "id": 54022042, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54022042?v=4", + "html_url": "https:\/\/github.com\/littlebin404" + }, + "html_url": "https:\/\/github.com\/littlebin404\/CVE-2017-16995", + "description": "CVE-2017-16995 ubuntun本地提权 POC", + "fork": false, + "created_at": "2019-08-14T08:21:05Z", + "updated_at": "2019-08-14T08:44:57Z", + "pushed_at": "2019-08-14T08:34:51Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 263389053, "name": "CVE-2017-16995-Linux-Kernel---BPF-Sign-Extension-Local-Privilege-Escalation-", diff --git a/2017/CVE-2017-16997.json b/2017/CVE-2017-16997.json new file mode 100644 index 0000000000..04a64847d7 --- /dev/null +++ b/2017/CVE-2017-16997.json @@ -0,0 +1,25 @@ +[ + { + "id": 116118639, + "name": "CVE-2017-16997-poc", + "full_name": "Xiami2012\/CVE-2017-16997-poc", + "owner": { + "login": "Xiami2012", + "id": 1927254, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4", + "html_url": "https:\/\/github.com\/Xiami2012" + }, + "html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc", + "description": "A proof-of-concept for CVE-2017-16997", + "fork": false, + "created_at": "2018-01-03T09:31:55Z", + "updated_at": "2018-01-03T09:33:01Z", + "pushed_at": "2018-01-03T10:39:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-17215.json b/2017/CVE-2017-17215.json index f726d15bb8..3a9757bc90 100644 --- a/2017/CVE-2017-17215.json +++ b/2017/CVE-2017-17215.json @@ -1,4 +1,27 @@ [ + { + "id": 115311315, + "name": "CVE-2017-17215", + "full_name": "1337g\/CVE-2017-17215", + "owner": { + "login": "1337g", + "id": 32504404, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4", + "html_url": "https:\/\/github.com\/1337g" + }, + "html_url": "https:\/\/github.com\/1337g\/CVE-2017-17215", + "description": "CVE-2017-17215 HuaWei Router RCE (NOT TESTED)", + "fork": false, + "created_at": "2017-12-25T06:11:24Z", + "updated_at": "2020-06-23T07:42:36Z", + "pushed_at": "2018-01-04T02:31:57Z", + "stargazers_count": 24, + "watchers_count": 24, + "forks_count": 18, + "forks": 18, + "watchers": 24, + "score": 0 + }, { "id": 313596733, "name": "HG532d-RCE-Exploit", diff --git a/2017/CVE-2017-17485.json b/2017/CVE-2017-17485.json index f349bd8a18..dd5e2a7684 100644 --- a/2017/CVE-2017-17485.json +++ b/2017/CVE-2017-17485.json @@ -1,4 +1,73 @@ [ + { + "id": 123458951, + "name": "Jackson-CVE-2017-17485", + "full_name": "maxbitcoin\/Jackson-CVE-2017-17485", + "owner": { + "login": "maxbitcoin", + "id": 5998127, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5998127?v=4", + "html_url": "https:\/\/github.com\/maxbitcoin" + }, + "html_url": "https:\/\/github.com\/maxbitcoin\/Jackson-CVE-2017-17485", + "description": "Jackson 反序列化", + "fork": false, + "created_at": "2018-03-01T16:09:20Z", + "updated_at": "2021-01-03T06:19:34Z", + "pushed_at": "2018-01-24T03:03:53Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 9, + "forks": 9, + "watchers": 1, + "score": 0 + }, + { + "id": 158195318, + "name": "CVE-2017-17485", + "full_name": "tafamace\/CVE-2017-17485", + "owner": { + "login": "tafamace", + "id": 45160113, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", + "html_url": "https:\/\/github.com\/tafamace" + }, + "html_url": "https:\/\/github.com\/tafamace\/CVE-2017-17485", + "description": null, + "fork": false, + "created_at": "2018-11-19T09:29:28Z", + "updated_at": "2018-11-19T10:33:01Z", + "pushed_at": "2018-11-19T10:32:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 182537771, + "name": "cve-2017-17485", + "full_name": "x7iaob\/cve-2017-17485", + "owner": { + "login": "x7iaob", + "id": 29616658, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29616658?v=4", + "html_url": "https:\/\/github.com\/x7iaob" + }, + "html_url": "https:\/\/github.com\/x7iaob\/cve-2017-17485", + "description": "cve-2017-17485 PoC", + "fork": false, + "created_at": "2019-04-21T13:36:03Z", + "updated_at": "2019-10-19T11:45:50Z", + "pushed_at": "2019-04-21T13:37:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 266009300, "name": "CVE-2017-17485", diff --git a/2017/CVE-2017-17562.json b/2017/CVE-2017-17562.json index bf641aae94..cfa6d22faa 100644 --- a/2017/CVE-2017-17562.json +++ b/2017/CVE-2017-17562.json @@ -1,4 +1,50 @@ [ + { + "id": 115486127, + "name": "CVE-2017-17562", + "full_name": "1337g\/CVE-2017-17562", + "owner": { + "login": "1337g", + "id": 32504404, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4", + "html_url": "https:\/\/github.com\/1337g" + }, + "html_url": "https:\/\/github.com\/1337g\/CVE-2017-17562", + "description": "CVE-2017-17562 GOAHEAD RCE (Author: Daniel Hodson)", + "fork": false, + "created_at": "2017-12-27T05:46:50Z", + "updated_at": "2018-11-30T02:36:05Z", + "pushed_at": "2017-12-27T05:51:10Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 3, + "forks": 3, + "watchers": 1, + "score": 0 + }, + { + "id": 215594323, + "name": "CVE-2017-17562", + "full_name": "ivanitlearning\/CVE-2017-17562", + "owner": { + "login": "ivanitlearning", + "id": 52420671, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4", + "html_url": "https:\/\/github.com\/ivanitlearning" + }, + "html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2017-17562", + "description": "Standalone Python 3 exploit for CVE-2017-17562", + "fork": false, + "created_at": "2019-10-16T16:28:27Z", + "updated_at": "2021-01-27T20:00:18Z", + "pushed_at": "2019-11-02T16:16:56Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 3, + "forks": 3, + "watchers": 6, + "score": 0 + }, { "id": 223557910, "name": "Goahead-CVE-2017-17562", diff --git a/2017/CVE-2017-17692.json b/2017/CVE-2017-17692.json new file mode 100644 index 0000000000..719f20b71b --- /dev/null +++ b/2017/CVE-2017-17692.json @@ -0,0 +1,25 @@ +[ + { + "id": 116019676, + "name": "CVE-2017-17692", + "full_name": "lr3800\/CVE-2017-17692", + "owner": { + "login": "lr3800", + "id": 22863274, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22863274?v=4", + "html_url": "https:\/\/github.com\/lr3800" + }, + "html_url": "https:\/\/github.com\/lr3800\/CVE-2017-17692", + "description": null, + "fork": false, + "created_at": "2018-01-02T13:47:36Z", + "updated_at": "2018-10-30T16:01:07Z", + "pushed_at": "2018-01-02T13:58:02Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "forks": 1, + "watchers": 3, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-18044.json b/2017/CVE-2017-18044.json new file mode 100644 index 0000000000..c1c279fc64 --- /dev/null +++ b/2017/CVE-2017-18044.json @@ -0,0 +1,25 @@ +[ + { + "id": 151310036, + "name": "CVE-2017-18044-Exploit", + "full_name": "securifera\/CVE-2017-18044-Exploit", + "owner": { + "login": "securifera", + "id": 12126525, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4", + "html_url": "https:\/\/github.com\/securifera" + }, + "html_url": "https:\/\/github.com\/securifera\/CVE-2017-18044-Exploit", + "description": "Commvault-CVE-2017-18044", + "fork": false, + "created_at": "2018-10-02T19:18:31Z", + "updated_at": "2021-03-21T10:31:14Z", + "pushed_at": "2018-10-07T18:12:55Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 5, + "forks": 5, + "watchers": 3, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-18345.json b/2017/CVE-2017-18345.json new file mode 100644 index 0000000000..38aeeb7db9 --- /dev/null +++ b/2017/CVE-2017-18345.json @@ -0,0 +1,25 @@ +[ + { + "id": 95982626, + "name": "CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD", + "full_name": "Luth1er\/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD", + "owner": { + "login": "Luth1er", + "id": 23650363, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23650363?v=4", + "html_url": "https:\/\/github.com\/Luth1er" + }, + "html_url": "https:\/\/github.com\/Luth1er\/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD", + "description": "The Joomanager component through 2.0.0 for Joomla! has an Arbitrary File Download issue, resulting in exposing the Credentials of the DataBase.", + "fork": false, + "created_at": "2017-07-01T19:02:45Z", + "updated_at": "2020-08-29T13:52:48Z", + "pushed_at": "2019-01-28T20:59:36Z", + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 6, + "forks": 6, + "watchers": 7, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-18486.json b/2017/CVE-2017-18486.json new file mode 100644 index 0000000000..5b81eb0fd9 --- /dev/null +++ b/2017/CVE-2017-18486.json @@ -0,0 +1,25 @@ +[ + { + "id": 104919233, + "name": "JitBit_Helpdesk_Auth_Bypass", + "full_name": "Kc57\/JitBit_Helpdesk_Auth_Bypass", + "owner": { + "login": "Kc57", + "id": 16500627, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16500627?v=4", + "html_url": "https:\/\/github.com\/Kc57" + }, + "html_url": "https:\/\/github.com\/Kc57\/JitBit_Helpdesk_Auth_Bypass", + "description": "Utility to derive the shared secret on a JitBit Helpdesk install which can be used for authentication bypass (CVE-2017-18486)", + "fork": false, + "created_at": "2017-09-26T17:51:01Z", + "updated_at": "2019-08-09T18:35:26Z", + "pushed_at": "2017-09-26T17:56:25Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 0, + "forks": 0, + "watchers": 3, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-18635.json b/2017/CVE-2017-18635.json new file mode 100644 index 0000000000..3d482ddf1c --- /dev/null +++ b/2017/CVE-2017-18635.json @@ -0,0 +1,25 @@ +[ + { + "id": 215647693, + "name": "CVE-2017-18635", + "full_name": "ShielderSec\/CVE-2017-18635", + "owner": { + "login": "ShielderSec", + "id": 24564748, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24564748?v=4", + "html_url": "https:\/\/github.com\/ShielderSec" + }, + "html_url": "https:\/\/github.com\/ShielderSec\/CVE-2017-18635", + "description": "PoC for CVE-2017-18635", + "fork": false, + "created_at": "2019-10-16T21:27:40Z", + "updated_at": "2020-04-10T16:47:58Z", + "pushed_at": "2019-10-19T18:37:07Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 3, + "forks": 3, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2368.json b/2017/CVE-2017-2368.json new file mode 100644 index 0000000000..8fbc5747c2 --- /dev/null +++ b/2017/CVE-2017-2368.json @@ -0,0 +1,25 @@ +[ + { + "id": 100696664, + "name": "CVE-2017-2368", + "full_name": "vincedes3\/CVE-2017-2368", + "owner": { + "login": "vincedes3", + "id": 26314689, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314689?v=4", + "html_url": "https:\/\/github.com\/vincedes3" + }, + "html_url": "https:\/\/github.com\/vincedes3\/CVE-2017-2368", + "description": "CVE-2017-2368 VCF Message App Crash Bug", + "fork": false, + "created_at": "2017-08-18T09:33:57Z", + "updated_at": "2017-08-18T09:33:57Z", + "pushed_at": "2017-08-18T09:36:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2370.json b/2017/CVE-2017-2370.json index f3cb100efc..967660cb10 100644 --- a/2017/CVE-2017-2370.json +++ b/2017/CVE-2017-2370.json @@ -67,5 +67,28 @@ "forks": 4, "watchers": 1, "score": 0 + }, + { + "id": 142854846, + "name": "CVE-2017-2370", + "full_name": "Peterpan0927\/CVE-2017-2370", + "owner": { + "login": "Peterpan0927", + "id": 26504662, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26504662?v=4", + "html_url": "https:\/\/github.com\/Peterpan0927" + }, + "html_url": "https:\/\/github.com\/Peterpan0927\/CVE-2017-2370", + "description": "on Mac 10.12.2", + "fork": false, + "created_at": "2018-07-30T09:32:15Z", + "updated_at": "2019-12-06T00:52:44Z", + "pushed_at": "2018-08-03T09:03:34Z", + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 2, + "forks": 2, + "watchers": 18, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-2388.json b/2017/CVE-2017-2388.json new file mode 100644 index 0000000000..07cb2110c7 --- /dev/null +++ b/2017/CVE-2017-2388.json @@ -0,0 +1,25 @@ +[ + { + "id": 99374230, + "name": "IOFireWireFamily-null-deref", + "full_name": "bazad\/IOFireWireFamily-null-deref", + "owner": { + "login": "bazad", + "id": 3111637, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4", + "html_url": "https:\/\/github.com\/bazad" + }, + "html_url": "https:\/\/github.com\/bazad\/IOFireWireFamily-null-deref", + "description": "CVE-2017-2388: Null-pointer dereference in IOFireWireFamily.", + "fork": false, + "created_at": "2017-08-04T19:35:20Z", + "updated_at": "2018-09-24T18:54:13Z", + "pushed_at": "2017-08-16T20:16:12Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1259.json b/2017/CVE-2017-2666.json similarity index 58% rename from 2018/CVE-2018-1259.json rename to 2017/CVE-2017-2666.json index b82daca8e7..a4f2eabd33 100644 --- a/2018/CVE-2018-1259.json +++ b/2017/CVE-2017-2666.json @@ -1,20 +1,20 @@ [ { - "id": 158194793, - "name": "CVE-2018-1259", - "full_name": "tafamace\/CVE-2018-1259", + "id": 158203525, + "name": "CVE-2017-2666", + "full_name": "tafamace\/CVE-2017-2666", "owner": { "login": "tafamace", "id": 45160113, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", "html_url": "https:\/\/github.com\/tafamace" }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1259", + "html_url": "https:\/\/github.com\/tafamace\/CVE-2017-2666", "description": null, "fork": false, - "created_at": "2018-11-19T09:25:32Z", - "updated_at": "2018-11-19T09:32:46Z", - "pushed_at": "2018-11-19T09:32:45Z", + "created_at": "2018-11-19T10:33:25Z", + "updated_at": "2018-11-19T11:06:10Z", + "pushed_at": "2018-11-19T11:06:09Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2017/CVE-2017-3000.json b/2017/CVE-2017-3000.json new file mode 100644 index 0000000000..a4861c224d --- /dev/null +++ b/2017/CVE-2017-3000.json @@ -0,0 +1,25 @@ +[ + { + "id": 146188265, + "name": "CVE-2017-3000", + "full_name": "dangokyo\/CVE-2017-3000", + "owner": { + "login": "dangokyo", + "id": 6947840, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6947840?v=4", + "html_url": "https:\/\/github.com\/dangokyo" + }, + "html_url": "https:\/\/github.com\/dangokyo\/CVE-2017-3000", + "description": "A full exploit of CVE-2017-3000 on Flash Player Constant Blinding PRNG", + "fork": false, + "created_at": "2018-08-26T14:34:44Z", + "updated_at": "2020-06-13T07:48:08Z", + "pushed_at": "2018-08-27T13:22:41Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 1, + "forks": 1, + "watchers": 6, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-3066.json b/2017/CVE-2017-3066.json new file mode 100644 index 0000000000..851a45cc8b --- /dev/null +++ b/2017/CVE-2017-3066.json @@ -0,0 +1,48 @@ +[ + { + "id": 124920554, + "name": "ColdFusionPwn", + "full_name": "codewhitesec\/ColdFusionPwn", + "owner": { + "login": "codewhitesec", + "id": 8680262, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8680262?v=4", + "html_url": "https:\/\/github.com\/codewhitesec" + }, + "html_url": "https:\/\/github.com\/codewhitesec\/ColdFusionPwn", + "description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12", + "fork": false, + "created_at": "2018-03-12T16:44:12Z", + "updated_at": "2021-04-03T14:10:37Z", + "pushed_at": "2018-03-12T16:50:20Z", + "stargazers_count": 58, + "watchers_count": 58, + "forks_count": 22, + "forks": 22, + "watchers": 58, + "score": 0 + }, + { + "id": 213896984, + "name": "CVE-2017-3066", + "full_name": "cucadili\/CVE-2017-3066", + "owner": { + "login": "cucadili", + "id": 48569185, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48569185?v=4", + "html_url": "https:\/\/github.com\/cucadili" + }, + "html_url": "https:\/\/github.com\/cucadili\/CVE-2017-3066", + "description": "The study of vulnerability CVE-2017-3066. Java deserialization", + "fork": false, + "created_at": "2019-10-09T11:13:00Z", + "updated_at": "2020-12-07T10:28:53Z", + "pushed_at": "2019-10-09T12:19:04Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-3143.json b/2017/CVE-2017-3143.json new file mode 100644 index 0000000000..ab84107bc9 --- /dev/null +++ b/2017/CVE-2017-3143.json @@ -0,0 +1,25 @@ +[ + { + "id": 196239476, + "name": "CVE-2017-3143", + "full_name": "saaph\/CVE-2017-3143", + "owner": { + "login": "saaph", + "id": 27734694, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27734694?v=4", + "html_url": "https:\/\/github.com\/saaph" + }, + "html_url": "https:\/\/github.com\/saaph\/CVE-2017-3143", + "description": "Exploit for TSIG bypass vulnerabilities in Bind (CVE-2017-3143) and Knot DNS (CVE-2017-11104)", + "fork": false, + "created_at": "2019-07-10T16:25:15Z", + "updated_at": "2020-12-03T16:58:14Z", + "pushed_at": "2019-07-10T16:31:29Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-3241.json b/2017/CVE-2017-3241.json new file mode 100644 index 0000000000..5c85c91c44 --- /dev/null +++ b/2017/CVE-2017-3241.json @@ -0,0 +1,25 @@ +[ + { + "id": 96219146, + "name": "CVE-2017-3241-POC", + "full_name": "xfei3\/CVE-2017-3241-POC", + "owner": { + "login": "xfei3", + "id": 29874084, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29874084?v=4", + "html_url": "https:\/\/github.com\/xfei3" + }, + "html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC", + "description": "POC for java RMI deserialization vulnerability", + "fork": false, + "created_at": "2017-07-04T13:05:46Z", + "updated_at": "2020-03-29T07:05:46Z", + "pushed_at": "2017-07-19T23:55:49Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-3881.json b/2017/CVE-2017-3881.json index 90dbebf4d8..b0d39725ee 100644 --- a/2017/CVE-2017-3881.json +++ b/2017/CVE-2017-3881.json @@ -90,5 +90,28 @@ "forks": 1, "watchers": 1, "score": 0 + }, + { + "id": 115962692, + "name": "CVE-2017-3881", + "full_name": "1337g\/CVE-2017-3881", + "owner": { + "login": "1337g", + "id": 32504404, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4", + "html_url": "https:\/\/github.com\/1337g" + }, + "html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881", + "description": "credit to artkond", + "fork": false, + "created_at": "2018-01-02T01:45:15Z", + "updated_at": "2018-01-10T18:55:16Z", + "pushed_at": "2018-01-02T01:46:19Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-4490.json b/2017/CVE-2017-4490.json index 040b921a13..844909ce36 100644 --- a/2017/CVE-2017-4490.json +++ b/2017/CVE-2017-4490.json @@ -21,5 +21,28 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 96573883, + "name": "CVE-2017-4490-install-Script-Python-in-Terminal-", + "full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-", + "owner": { + "login": "homjxi0e", + "id": 25440152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", + "html_url": "https:\/\/github.com\/homjxi0e" + }, + "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-", + "description": null, + "fork": false, + "created_at": "2017-07-07T20:21:51Z", + "updated_at": "2017-08-23T09:24:55Z", + "pushed_at": "2017-07-11T15:36:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-4878.json b/2017/CVE-2017-4878.json new file mode 100644 index 0000000000..cee5a2eab8 --- /dev/null +++ b/2017/CVE-2017-4878.json @@ -0,0 +1,25 @@ +[ + { + "id": 120257153, + "name": "CVE-2017-4878-Samples", + "full_name": "brianwrf\/CVE-2017-4878-Samples", + "owner": { + "login": "brianwrf", + "id": 8141813, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", + "html_url": "https:\/\/github.com\/brianwrf" + }, + "html_url": "https:\/\/github.com\/brianwrf\/CVE-2017-4878-Samples", + "description": "CVE-2017-4878 Samples - http:\/\/blog.talosintelligence.com\/2018\/02\/group-123-goes-wild.html", + "fork": false, + "created_at": "2018-02-05T05:01:40Z", + "updated_at": "2020-07-17T00:46:48Z", + "pushed_at": "2018-02-05T05:17:41Z", + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 9, + "forks": 9, + "watchers": 18, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-4971.json b/2017/CVE-2017-4971.json new file mode 100644 index 0000000000..63bc310a94 --- /dev/null +++ b/2017/CVE-2017-4971.json @@ -0,0 +1,25 @@ +[ + { + "id": 166267853, + "name": "cve-2017-4971", + "full_name": "cved-sources\/cve-2017-4971", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-4971", + "description": "cve-2017-4971", + "fork": false, + "created_at": "2019-01-17T17:31:59Z", + "updated_at": "2019-01-17T17:46:05Z", + "pushed_at": "2019-01-17T17:46:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-5007.json b/2017/CVE-2017-5007.json new file mode 100644 index 0000000000..d736b5187c --- /dev/null +++ b/2017/CVE-2017-5007.json @@ -0,0 +1,25 @@ +[ + { + "id": 159156980, + "name": "CVE-2017-5007", + "full_name": "Ang-YC\/CVE-2017-5007", + "owner": { + "login": "Ang-YC", + "id": 21954291, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21954291?v=4", + "html_url": "https:\/\/github.com\/Ang-YC" + }, + "html_url": "https:\/\/github.com\/Ang-YC\/CVE-2017-5007", + "description": null, + "fork": false, + "created_at": "2018-11-26T11:14:13Z", + "updated_at": "2018-11-26T11:19:23Z", + "pushed_at": "2018-11-26T11:19:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-5123.json b/2017/CVE-2017-5123.json index b22edf7f12..90351765db 100644 --- a/2017/CVE-2017-5123.json +++ b/2017/CVE-2017-5123.json @@ -1,4 +1,96 @@ [ + { + "id": 108940978, + "name": "CVE-2017-5123", + "full_name": "FloatingGuy\/CVE-2017-5123", + "owner": { + "login": "FloatingGuy", + "id": 6472909, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6472909?v=4", + "html_url": "https:\/\/github.com\/FloatingGuy" + }, + "html_url": "https:\/\/github.com\/FloatingGuy\/CVE-2017-5123", + "description": "linux kernel exploit ", + "fork": false, + "created_at": "2017-10-31T03:35:31Z", + "updated_at": "2017-12-31T09:13:28Z", + "pushed_at": "2017-10-31T03:39:23Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 4, + "forks": 4, + "watchers": 1, + "score": 0 + }, + { + "id": 109344615, + "name": "CVE-2017-5123", + "full_name": "0x5068656e6f6c\/CVE-2017-5123", + "owner": { + "login": "0x5068656e6f6c", + "id": 22329435, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22329435?v=4", + "html_url": "https:\/\/github.com\/0x5068656e6f6c" + }, + "html_url": "https:\/\/github.com\/0x5068656e6f6c\/CVE-2017-5123", + "description": "Exploit for the linux kernel vulnerability CVE-2017-5123", + "fork": false, + "created_at": "2017-11-03T02:52:26Z", + "updated_at": "2018-10-20T20:12:24Z", + "pushed_at": "2017-11-03T02:58:39Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 5, + "forks": 5, + "watchers": 5, + "score": 0 + }, + { + "id": 123423508, + "name": "exploiting-cve-2017-5123", + "full_name": "Synacktiv-contrib\/exploiting-cve-2017-5123", + "owner": { + "login": "Synacktiv-contrib", + "id": 28860793, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28860793?v=4", + "html_url": "https:\/\/github.com\/Synacktiv-contrib" + }, + "html_url": "https:\/\/github.com\/Synacktiv-contrib\/exploiting-cve-2017-5123", + "description": "Source code and configuration files related to our article in MISC96", + "fork": false, + "created_at": "2018-03-01T11:03:08Z", + "updated_at": "2019-09-11T11:42:32Z", + "pushed_at": "2018-03-01T12:55:59Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 2, + "forks": 2, + "watchers": 5, + "score": 0 + }, + { + "id": 136574054, + "name": "CVE-2017-5123", + "full_name": "teawater\/CVE-2017-5123", + "owner": { + "login": "teawater", + "id": 432382, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/432382?v=4", + "html_url": "https:\/\/github.com\/teawater" + }, + "html_url": "https:\/\/github.com\/teawater\/CVE-2017-5123", + "description": null, + "fork": false, + "created_at": "2018-06-08T06:07:01Z", + "updated_at": "2018-12-24T01:41:56Z", + "pushed_at": "2018-12-24T01:41:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, { "id": 262355402, "name": "CVE-2017-5123", diff --git a/2017/CVE-2017-5124.json b/2017/CVE-2017-5124.json new file mode 100644 index 0000000000..e859a4972f --- /dev/null +++ b/2017/CVE-2017-5124.json @@ -0,0 +1,25 @@ +[ + { + "id": 110604918, + "name": "CVE-2017-5124", + "full_name": "Bo0oM\/CVE-2017-5124", + "owner": { + "login": "Bo0oM", + "id": 3492361, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3492361?v=4", + "html_url": "https:\/\/github.com\/Bo0oM" + }, + "html_url": "https:\/\/github.com\/Bo0oM\/CVE-2017-5124", + "description": "Chrome < 62 uxss exploit (CVE-2017-5124)", + "fork": false, + "created_at": "2017-11-13T21:33:55Z", + "updated_at": "2021-01-25T14:36:40Z", + "pushed_at": "2017-11-14T10:26:28Z", + "stargazers_count": 160, + "watchers_count": 160, + "forks_count": 36, + "forks": 36, + "watchers": 160, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-5223.json b/2017/CVE-2017-5223.json new file mode 100644 index 0000000000..af07533768 --- /dev/null +++ b/2017/CVE-2017-5223.json @@ -0,0 +1,25 @@ +[ + { + "id": 150419436, + "name": "CVE-2017-5223", + "full_name": "cscli\/CVE-2017-5223", + "owner": { + "login": "cscli", + "id": 18289534, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18289534?v=4", + "html_url": "https:\/\/github.com\/cscli" + }, + "html_url": "https:\/\/github.com\/cscli\/CVE-2017-5223", + "description": null, + "fork": false, + "created_at": "2018-09-26T11:58:32Z", + "updated_at": "2021-02-01T09:33:48Z", + "pushed_at": "2018-09-26T12:03:33Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-5487.json b/2017/CVE-2017-5487.json index 30463db1e6..efc9df9989 100644 --- a/2017/CVE-2017-5487.json +++ b/2017/CVE-2017-5487.json @@ -1,4 +1,73 @@ [ + { + "id": 107852472, + "name": "wpUsersScan", + "full_name": "teambugsbunny\/wpUsersScan", + "owner": { + "login": "teambugsbunny", + "id": 32997799, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32997799?v=4", + "html_url": "https:\/\/github.com\/teambugsbunny" + }, + "html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan", + "description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ", + "fork": false, + "created_at": "2017-10-22T09:22:28Z", + "updated_at": "2020-04-06T12:23:41Z", + "pushed_at": "2017-06-11T16:47:07Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 4, + "forks": 4, + "watchers": 1, + "score": 0 + }, + { + "id": 121831599, + "name": "wpUsersScan", + "full_name": "R3K1NG\/wpUsersScan", + "owner": { + "login": "R3K1NG", + "id": 20783376, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20783376?v=4", + "html_url": "https:\/\/github.com\/R3K1NG" + }, + "html_url": "https:\/\/github.com\/R3K1NG\/wpUsersScan", + "description": " Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 -", + "fork": false, + "created_at": "2018-02-17T05:59:49Z", + "updated_at": "2018-02-17T06:08:24Z", + "pushed_at": "2018-02-17T06:09:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 191190894, + "name": "CVE-2017-5487", + "full_name": "GeunSam2\/CVE-2017-5487", + "owner": { + "login": "GeunSam2", + "id": 41275199, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41275199?v=4", + "html_url": "https:\/\/github.com\/GeunSam2" + }, + "html_url": "https:\/\/github.com\/GeunSam2\/CVE-2017-5487", + "description": "POC of CVE-2017-5487 + tool", + "fork": false, + "created_at": "2019-06-10T15:07:17Z", + "updated_at": "2019-06-10T15:14:16Z", + "pushed_at": "2019-06-10T15:10:00Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 258976805, "name": "wp-CVE-2017-5487-exploit", diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index 7498d662b5..5c9a064181 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -850,6 +850,351 @@ "watchers": 14, "score": 0 }, + { + "id": 98150795, + "name": "Apache-Struts-2-CVE-2017-5638-Exploit-", + "full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-", + "owner": { + "login": "R4v3nBl4ck", + "id": 30399308, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30399308?v=4", + "html_url": "https:\/\/github.com\/R4v3nBl4ck" + }, + "html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-", + "description": "Exploit created by: R4v3nBl4ck end Pacman", + "fork": false, + "created_at": "2017-07-24T05:05:28Z", + "updated_at": "2020-07-12T14:06:08Z", + "pushed_at": "2017-07-24T23:55:01Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 6, + "forks": 6, + "watchers": 4, + "score": 0 + }, + { + "id": 100141854, + "name": "CVE-2017-5638", + "full_name": "Xhendos\/CVE-2017-5638", + "owner": { + "login": "Xhendos", + "id": 16403693, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16403693?v=4", + "html_url": "https:\/\/github.com\/Xhendos" + }, + "html_url": "https:\/\/github.com\/Xhendos\/CVE-2017-5638", + "description": null, + "fork": false, + "created_at": "2017-08-12T23:00:14Z", + "updated_at": "2017-08-12T23:04:13Z", + "pushed_at": "2017-08-26T17:32:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 101267457, + "name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", + "full_name": "TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", + "owner": { + "login": "TamiiLambrado", + "id": 23249848, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23249848?v=4", + "html_url": "https:\/\/github.com\/TamiiLambrado" + }, + "html_url": "https:\/\/github.com\/TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", + "description": null, + "fork": false, + "created_at": "2017-08-24T07:36:14Z", + "updated_at": "2017-08-24T07:36:14Z", + "pushed_at": "2017-08-24T07:36:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 104686879, + "name": "strutser", + "full_name": "invisiblethreat\/strutser", + "owner": { + "login": "invisiblethreat", + "id": 2525006, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2525006?v=4", + "html_url": "https:\/\/github.com\/invisiblethreat" + }, + "html_url": "https:\/\/github.com\/invisiblethreat\/strutser", + "description": "Check for Struts Vulnerability CVE-2017-5638", + "fork": false, + "created_at": "2017-09-25T00:40:57Z", + "updated_at": "2019-06-11T14:15:40Z", + "pushed_at": "2017-09-28T21:10:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 3, + "forks": 3, + "watchers": 0, + "score": 0 + }, + { + "id": 105124155, + "name": "CVE-2017-5638", + "full_name": "lizhi16\/CVE-2017-5638", + "owner": { + "login": "lizhi16", + "id": 22630810, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22630810?v=4", + "html_url": "https:\/\/github.com\/lizhi16" + }, + "html_url": "https:\/\/github.com\/lizhi16\/CVE-2017-5638", + "description": null, + "fork": false, + "created_at": "2017-09-28T08:43:21Z", + "updated_at": "2018-03-27T09:10:07Z", + "pushed_at": "2018-03-25T02:49:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 107489354, + "name": "Apache-Struts", + "full_name": "c002\/Apache-Struts", + "owner": { + "login": "c002", + "id": 26592580, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26592580?v=4", + "html_url": "https:\/\/github.com\/c002" + }, + "html_url": "https:\/\/github.com\/c002\/Apache-Struts", + "description": " An exploit for Apache Struts CVE-2017-5638", + "fork": false, + "created_at": "2017-10-19T02:40:45Z", + "updated_at": "2020-05-17T04:32:06Z", + "pushed_at": "2017-05-28T14:03:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 108805305, + "name": "Common-Vulnerability-and-Exploit", + "full_name": "donaldashdown\/Common-Vulnerability-and-Exploit", + "owner": { + "login": "donaldashdown", + "id": 24925373, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24925373?v=4", + "html_url": "https:\/\/github.com\/donaldashdown" + }, + "html_url": "https:\/\/github.com\/donaldashdown\/Common-Vulnerability-and-Exploit", + "description": "This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.", + "fork": false, + "created_at": "2017-10-30T05:21:53Z", + "updated_at": "2017-10-30T05:21:53Z", + "pushed_at": "2017-11-11T23:32:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 117999664, + "name": "cybersecurity-struts2", + "full_name": "grant100\/cybersecurity-struts2", + "owner": { + "login": "grant100", + "id": 28523112, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28523112?v=4", + "html_url": "https:\/\/github.com\/grant100" + }, + "html_url": "https:\/\/github.com\/grant100\/cybersecurity-struts2", + "description": "Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.", + "fork": false, + "created_at": "2018-01-18T15:19:39Z", + "updated_at": "2019-01-23T00:39:32Z", + "pushed_at": "2019-01-23T00:39:29Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 3, + "forks": 3, + "watchers": 1, + "score": 0 + }, + { + "id": 119230111, + "name": "apache-struts-v2-CVE-2017-5638", + "full_name": "cafnet\/apache-struts-v2-CVE-2017-5638", + "owner": { + "login": "cafnet", + "id": 12993208, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12993208?v=4", + "html_url": "https:\/\/github.com\/cafnet" + }, + "html_url": "https:\/\/github.com\/cafnet\/apache-struts-v2-CVE-2017-5638", + "description": "Working POC for CVE 2017-5638", + "fork": false, + "created_at": "2018-01-28T05:17:04Z", + "updated_at": "2018-01-28T05:55:11Z", + "pushed_at": "2018-01-28T05:55:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 121659152, + "name": "CVE-2017-5638", + "full_name": "0x00-0x00\/CVE-2017-5638", + "owner": { + "login": "0x00-0x00", + "id": 23364530, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", + "html_url": "https:\/\/github.com\/0x00-0x00" + }, + "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2017-5638", + "description": "Struts02 s2-045 exploit program", + "fork": false, + "created_at": "2018-02-15T17:31:07Z", + "updated_at": "2020-12-22T19:32:04Z", + "pushed_at": "2018-02-15T17:36:07Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 2, + "forks": 2, + "watchers": 3, + "score": 0 + }, + { + "id": 123348547, + "name": "struts2_cve-2017-5638", + "full_name": "m3ssap0\/struts2_cve-2017-5638", + "owner": { + "login": "m3ssap0", + "id": 705120, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4", + "html_url": "https:\/\/github.com\/m3ssap0" + }, + "html_url": "https:\/\/github.com\/m3ssap0\/struts2_cve-2017-5638", + "description": "This is a sort of Java porting of the Python exploit at: https:\/\/www.exploit-db.com\/exploits\/41570\/.", + "fork": false, + "created_at": "2018-02-28T22:11:50Z", + "updated_at": "2018-03-17T10:17:06Z", + "pushed_at": "2018-03-10T11:56:50Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 125206287, + "name": "struts2-jakarta-inject", + "full_name": "Greynad\/struts2-jakarta-inject", + "owner": { + "login": "Greynad", + "id": 5173529, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5173529?v=4", + "html_url": "https:\/\/github.com\/Greynad" + }, + "html_url": "https:\/\/github.com\/Greynad\/struts2-jakarta-inject", + "description": "Golang exploit for CVE-2017-5638", + "fork": false, + "created_at": "2018-03-14T12:04:34Z", + "updated_at": "2018-03-28T19:59:04Z", + "pushed_at": "2018-03-19T17:57:29Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + }, + { + "id": 126003106, + "name": "struts-rce", + "full_name": "ggolawski\/struts-rce", + "owner": { + "login": "ggolawski", + "id": 35563296, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35563296?v=4", + "html_url": "https:\/\/github.com\/ggolawski" + }, + "html_url": "https:\/\/github.com\/ggolawski\/struts-rce", + "description": "Apache Struts CVE-2017-5638 RCE exploitation", + "fork": false, + "created_at": "2018-03-20T10:51:46Z", + "updated_at": "2018-05-18T09:54:51Z", + "pushed_at": "2018-03-20T11:32:35Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 133253539, + "name": "CVE-2017-5638", + "full_name": "win3zz\/CVE-2017-5638", + "owner": { + "login": "win3zz", + "id": 12781459, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12781459?v=4", + "html_url": "https:\/\/github.com\/win3zz" + }, + "html_url": "https:\/\/github.com\/win3zz\/CVE-2017-5638", + "description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script", + "fork": false, + "created_at": "2018-05-13T16:13:26Z", + "updated_at": "2021-02-24T00:03:00Z", + "pushed_at": "2018-05-13T16:14:53Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 3, + "forks": 3, + "watchers": 2, + "score": 0 + }, + { + "id": 138520346, + "name": "CVE-2017-5638-Mass-Exploit", + "full_name": "leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit", + "owner": { + "login": "leandrocamposcardoso", + "id": 13025156, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13025156?v=4", + "html_url": "https:\/\/github.com\/leandrocamposcardoso" + }, + "html_url": "https:\/\/github.com\/leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit", + "description": null, + "fork": false, + "created_at": "2018-06-24T22:40:54Z", + "updated_at": "2018-06-24T22:41:48Z", + "pushed_at": "2020-06-07T07:06:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, { "id": 138721867, "name": "struts2-rce", @@ -873,6 +1218,98 @@ "watchers": 8, "score": 0 }, + { + "id": 147389150, + "name": "check_struts", + "full_name": "andypitcher\/check_struts", + "owner": { + "login": "andypitcher", + "id": 12878731, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12878731?v=4", + "html_url": "https:\/\/github.com\/andypitcher" + }, + "html_url": "https:\/\/github.com\/andypitcher\/check_struts", + "description": "Apache Struts version analyzer (Ansible) based on CVE-2017-5638", + "fork": false, + "created_at": "2018-09-04T18:19:26Z", + "updated_at": "2020-03-05T21:25:49Z", + "pushed_at": "2018-10-29T21:49:54Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 158640611, + "name": "CVE-2017-5638", + "full_name": "un4ckn0wl3z\/CVE-2017-5638", + "owner": { + "login": "un4ckn0wl3z", + "id": 16059320, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16059320?v=4", + "html_url": "https:\/\/github.com\/un4ckn0wl3z" + }, + "html_url": "https:\/\/github.com\/un4ckn0wl3z\/CVE-2017-5638", + "description": null, + "fork": false, + "created_at": "2018-11-22T04:02:59Z", + "updated_at": "2018-11-22T07:57:38Z", + "pushed_at": "2018-11-22T04:08:08Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 177221305, + "name": "CVE-2017-5638", + "full_name": "colorblindpentester\/CVE-2017-5638", + "owner": { + "login": "colorblindpentester", + "id": 45195264, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45195264?v=4", + "html_url": "https:\/\/github.com\/colorblindpentester" + }, + "html_url": "https:\/\/github.com\/colorblindpentester\/CVE-2017-5638", + "description": "CVE-2017-5638 (PoC Exploits)", + "fork": false, + "created_at": "2019-03-22T23:25:49Z", + "updated_at": "2019-03-22T23:30:08Z", + "pushed_at": "2019-03-22T23:29:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 202619396, + "name": "cve-2017-5638", + "full_name": "injcristianrojas\/cve-2017-5638", + "owner": { + "login": "injcristianrojas", + "id": 862690, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/862690?v=4", + "html_url": "https:\/\/github.com\/injcristianrojas" + }, + "html_url": "https:\/\/github.com\/injcristianrojas\/cve-2017-5638", + "description": "Demo app of THAT data broker's security breach", + "fork": false, + "created_at": "2019-08-15T22:27:23Z", + "updated_at": "2019-09-07T02:06:14Z", + "pushed_at": "2020-07-01T19:11:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 263394878, "name": "Aspire", diff --git a/2017/CVE-2017-5645.json b/2017/CVE-2017-5645.json new file mode 100644 index 0000000000..637840eef7 --- /dev/null +++ b/2017/CVE-2017-5645.json @@ -0,0 +1,25 @@ +[ + { + "id": 99288784, + "name": "CVE-2017-5645", + "full_name": "pimps\/CVE-2017-5645", + "owner": { + "login": "pimps", + "id": 11393266, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11393266?v=4", + "html_url": "https:\/\/github.com\/pimps" + }, + "html_url": "https:\/\/github.com\/pimps\/CVE-2017-5645", + "description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization", + "fork": false, + "created_at": "2017-08-04T01:12:47Z", + "updated_at": "2021-04-08T12:09:17Z", + "pushed_at": "2018-11-18T11:14:20Z", + "stargazers_count": 59, + "watchers_count": 59, + "forks_count": 23, + "forks": 23, + "watchers": 59, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-5689.json b/2017/CVE-2017-5689.json index ae79cedad9..5420d80f49 100644 --- a/2017/CVE-2017-5689.json +++ b/2017/CVE-2017-5689.json @@ -67,5 +67,28 @@ "forks": 8, "watchers": 3, "score": 0 + }, + { + "id": 98579784, + "name": "amt_auth_bypass_poc", + "full_name": "embedi\/amt_auth_bypass_poc", + "owner": { + "login": "embedi", + "id": 24190344, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4", + "html_url": "https:\/\/github.com\/embedi" + }, + "html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc", + "description": "CVE-2017-5689 Proof-of-Concept exploit", + "fork": false, + "created_at": "2017-07-27T21:06:08Z", + "updated_at": "2021-03-10T19:30:18Z", + "pushed_at": "2017-07-27T21:08:49Z", + "stargazers_count": 51, + "watchers_count": 51, + "forks_count": 16, + "forks": 16, + "watchers": 51, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5715.json b/2017/CVE-2017-5715.json index 9d9bff1ef0..2a50ccd3e2 100644 --- a/2017/CVE-2017-5715.json +++ b/2017/CVE-2017-5715.json @@ -1,4 +1,50 @@ [ + { + "id": 116768537, + "name": "exploit-cve-2017-5715", + "full_name": "opsxcq\/exploit-cve-2017-5715", + "owner": { + "login": "opsxcq", + "id": 16995025, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4", + "html_url": "https:\/\/github.com\/opsxcq" + }, + "html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715", + "description": "Spectre exploit", + "fork": false, + "created_at": "2018-01-09T05:06:12Z", + "updated_at": "2021-03-12T23:39:50Z", + "pushed_at": "2018-01-09T22:27:25Z", + "stargazers_count": 51, + "watchers_count": 51, + "forks_count": 18, + "forks": 18, + "watchers": 51, + "score": 0 + }, + { + "id": 117425769, + "name": "meltdown-spectre-bios-list", + "full_name": "mathse\/meltdown-spectre-bios-list", + "owner": { + "login": "mathse", + "id": 5393624, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5393624?v=4", + "html_url": "https:\/\/github.com\/mathse" + }, + "html_url": "https:\/\/github.com\/mathse\/meltdown-spectre-bios-list", + "description": "a list of BIOS\/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754", + "fork": false, + "created_at": "2018-01-14T11:52:38Z", + "updated_at": "2020-07-14T16:49:36Z", + "pushed_at": "2018-03-27T19:59:31Z", + "stargazers_count": 15, + "watchers_count": 15, + "forks_count": 4, + "forks": 4, + "watchers": 15, + "score": 0 + }, { "id": 117585225, "name": "SpeculativeExecutionAssessment", @@ -21,5 +67,28 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 117944815, + "name": "retpoline-audit", + "full_name": "dmo2118\/retpoline-audit", + "owner": { + "login": "dmo2118", + "id": 11342823, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11342823?v=4", + "html_url": "https:\/\/github.com\/dmo2118" + }, + "html_url": "https:\/\/github.com\/dmo2118\/retpoline-audit", + "description": "A quick-and-dirty tool to verify that userspace executables are immune to Spectre variant 2 (CVE-2017-5715).", + "fork": false, + "created_at": "2018-01-18T06:55:53Z", + "updated_at": "2018-01-20T08:00:58Z", + "pushed_at": "2018-02-01T07:40:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5721.json b/2017/CVE-2017-5721.json new file mode 100644 index 0000000000..052d450b6c --- /dev/null +++ b/2017/CVE-2017-5721.json @@ -0,0 +1,25 @@ +[ + { + "id": 107970036, + "name": "smm_usbrt_poc", + "full_name": "embedi\/smm_usbrt_poc", + "owner": { + "login": "embedi", + "id": 24190344, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4", + "html_url": "https:\/\/github.com\/embedi" + }, + "html_url": "https:\/\/github.com\/embedi\/smm_usbrt_poc", + "description": "CVE-2017-5721 Proof-of-Concept", + "fork": false, + "created_at": "2017-10-23T11:00:18Z", + "updated_at": "2021-03-12T00:55:15Z", + "pushed_at": "2017-10-23T12:41:22Z", + "stargazers_count": 13, + "watchers_count": 13, + "forks_count": 11, + "forks": 11, + "watchers": 13, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index 3973d2a55f..2f05326e16 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -1,4 +1,142 @@ [ + { + "id": 116195445, + "name": "spectre-attack", + "full_name": "Eugnis\/spectre-attack", + "owner": { + "login": "Eugnis", + "id": 2463830, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2463830?v=4", + "html_url": "https:\/\/github.com\/Eugnis" + }, + "html_url": "https:\/\/github.com\/Eugnis\/spectre-attack", + "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", + "fork": false, + "created_at": "2018-01-04T00:28:50Z", + "updated_at": "2021-03-28T06:38:49Z", + "pushed_at": "2018-01-10T01:14:44Z", + "stargazers_count": 690, + "watchers_count": 690, + "forks_count": 186, + "forks": 186, + "watchers": 690, + "score": 0 + }, + { + "id": 116268310, + "name": "Spectre-PoC", + "full_name": "EdwardOwusuAdjei\/Spectre-PoC", + "owner": { + "login": "EdwardOwusuAdjei", + "id": 16462560, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4", + "html_url": "https:\/\/github.com\/EdwardOwusuAdjei" + }, + "html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC", + "description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.", + "fork": false, + "created_at": "2018-01-04T14:20:13Z", + "updated_at": "2020-03-29T03:06:24Z", + "pushed_at": "2018-01-04T14:27:29Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 3, + "forks": 3, + "watchers": 5, + "score": 0 + }, + { + "id": 116347505, + "name": "spectre-attack-example", + "full_name": "poilynx\/spectre-attack-example", + "owner": { + "login": "poilynx", + "id": 8926090, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4", + "html_url": "https:\/\/github.com\/poilynx" + }, + "html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example", + "description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用", + "fork": false, + "created_at": "2018-01-05T05:51:34Z", + "updated_at": "2021-02-24T01:25:15Z", + "pushed_at": "2018-01-05T05:56:02Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 7, + "forks": 7, + "watchers": 11, + "score": 0 + }, + { + "id": 116442461, + "name": "spectre-attack-demo", + "full_name": "pedrolucasoliva\/spectre-attack-demo", + "owner": { + "login": "pedrolucasoliva", + "id": 10757421, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4", + "html_url": "https:\/\/github.com\/pedrolucasoliva" + }, + "html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo", + "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", + "fork": false, + "created_at": "2018-01-06T01:08:15Z", + "updated_at": "2018-01-15T06:12:51Z", + "pushed_at": "2018-01-06T01:09:56Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 116505944, + "name": "spectreScope", + "full_name": "ixtal23\/spectreScope", + "owner": { + "login": "ixtal23", + "id": 11915559, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11915559?v=4", + "html_url": "https:\/\/github.com\/ixtal23" + }, + "html_url": "https:\/\/github.com\/ixtal23\/spectreScope", + "description": "The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715).", + "fork": false, + "created_at": "2018-01-06T18:27:03Z", + "updated_at": "2020-08-31T06:58:31Z", + "pushed_at": "2018-01-21T22:48:08Z", + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 1, + "forks": 1, + "watchers": 7, + "score": 0 + }, + { + "id": 116532057, + "name": "cve-2017-5753", + "full_name": "albertleecn\/cve-2017-5753", + "owner": { + "login": "albertleecn", + "id": 4608961, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4608961?v=4", + "html_url": "https:\/\/github.com\/albertleecn" + }, + "html_url": "https:\/\/github.com\/albertleecn\/cve-2017-5753", + "description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output", + "fork": false, + "created_at": "2018-01-07T02:46:38Z", + "updated_at": "2021-03-31T12:50:11Z", + "pushed_at": "2018-01-06T13:06:25Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 263311084, "name": "Spectre-Vulnerability-CVE-2017-5753-", diff --git a/2017/CVE-2017-5754.json b/2017/CVE-2017-5754.json index 68f439cd43..135df6732e 100644 --- a/2017/CVE-2017-5754.json +++ b/2017/CVE-2017-5754.json @@ -21,5 +21,120 @@ "forks": 93, "watchers": 541, "score": 0 + }, + { + "id": 116319052, + "name": "Am-I-affected-by-Meltdown", + "full_name": "raphaelsc\/Am-I-affected-by-Meltdown", + "owner": { + "login": "raphaelsc", + "id": 1409139, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1409139?v=4", + "html_url": "https:\/\/github.com\/raphaelsc" + }, + "html_url": "https:\/\/github.com\/raphaelsc\/Am-I-affected-by-Meltdown", + "description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.", + "fork": false, + "created_at": "2018-01-04T23:51:12Z", + "updated_at": "2021-03-14T20:56:22Z", + "pushed_at": "2018-02-27T05:22:38Z", + "stargazers_count": 549, + "watchers_count": 549, + "forks_count": 73, + "forks": 73, + "watchers": 549, + "score": 0 + }, + { + "id": 116368807, + "name": "In-Spectre-Meltdown", + "full_name": "Viralmaniar\/In-Spectre-Meltdown", + "owner": { + "login": "Viralmaniar", + "id": 3501170, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3501170?v=4", + "html_url": "https:\/\/github.com\/Viralmaniar" + }, + "html_url": "https:\/\/github.com\/Viralmaniar\/In-Spectre-Meltdown", + "description": "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in ", + "fork": false, + "created_at": "2018-01-05T09:43:04Z", + "updated_at": "2020-07-27T16:02:15Z", + "pushed_at": "2018-02-19T03:04:07Z", + "stargazers_count": 86, + "watchers_count": 86, + "forks_count": 42, + "forks": 42, + "watchers": 86, + "score": 0 + }, + { + "id": 116449314, + "name": "Am-I-affected-by-Meltdown", + "full_name": "speecyy\/Am-I-affected-by-Meltdown", + "owner": { + "login": "speecyy", + "id": 35145287, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4", + "html_url": "https:\/\/github.com\/speecyy" + }, + "html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown", + "description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ", + "fork": false, + "created_at": "2018-01-06T03:16:33Z", + "updated_at": "2020-02-27T19:31:43Z", + "pushed_at": "2018-01-06T03:17:22Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 118008705, + "name": "Meltdown", + "full_name": "zzado\/Meltdown", + "owner": { + "login": "zzado", + "id": 17024462, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17024462?v=4", + "html_url": "https:\/\/github.com\/zzado" + }, + "html_url": "https:\/\/github.com\/zzado\/Meltdown", + "description": "PoC for Meltdown in linux (CVE-2017-5754)", + "fork": false, + "created_at": "2018-01-18T16:32:50Z", + "updated_at": "2019-01-07T02:00:09Z", + "pushed_at": "2018-02-07T07:33:50Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 119104266, + "name": "meltdown-aws-scanner", + "full_name": "jdmulloy\/meltdown-aws-scanner", + "owner": { + "login": "jdmulloy", + "id": 3395292, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3395292?v=4", + "html_url": "https:\/\/github.com\/jdmulloy" + }, + "html_url": "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner", + "description": "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances", + "fork": false, + "created_at": "2018-01-26T21:18:13Z", + "updated_at": "2019-02-27T18:46:20Z", + "pushed_at": "2018-01-26T21:25:09Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5792.json b/2017/CVE-2017-5792.json new file mode 100644 index 0000000000..efc3cfa7f5 --- /dev/null +++ b/2017/CVE-2017-5792.json @@ -0,0 +1,25 @@ +[ + { + "id": 137987555, + "name": "HPE-iMC-7.3-RMI-Java-Deserialization", + "full_name": "scanfsec\/HPE-iMC-7.3-RMI-Java-Deserialization", + "owner": { + "login": "scanfsec", + "id": 8190138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8190138?v=4", + "html_url": "https:\/\/github.com\/scanfsec" + }, + "html_url": "https:\/\/github.com\/scanfsec\/HPE-iMC-7.3-RMI-Java-Deserialization", + "description": "CVE-2017-5792", + "fork": false, + "created_at": "2018-06-20T06:08:47Z", + "updated_at": "2020-07-19T09:02:14Z", + "pushed_at": "2018-06-20T02:31:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-6079.json b/2017/CVE-2017-6079.json new file mode 100644 index 0000000000..e64e697a9d --- /dev/null +++ b/2017/CVE-2017-6079.json @@ -0,0 +1,25 @@ +[ + { + "id": 149909331, + "name": "CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit", + "full_name": "MostafaSoliman\/CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit", + "owner": { + "login": "MostafaSoliman", + "id": 13528184, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13528184?v=4", + "html_url": "https:\/\/github.com\/MostafaSoliman" + }, + "html_url": "https:\/\/github.com\/MostafaSoliman\/CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit", + "description": null, + "fork": false, + "created_at": "2018-09-22T19:18:47Z", + "updated_at": "2020-07-10T13:31:04Z", + "pushed_at": "2018-09-22T21:17:51Z", + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 2, + "forks": 2, + "watchers": 18, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-6090.json b/2017/CVE-2017-6090.json new file mode 100644 index 0000000000..9e34b66e9d --- /dev/null +++ b/2017/CVE-2017-6090.json @@ -0,0 +1,25 @@ +[ + { + "id": 121817216, + "name": "exploit-CVE-2017-6090", + "full_name": "jlk\/exploit-CVE-2017-6090", + "owner": { + "login": "jlk", + "id": 146853, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146853?v=4", + "html_url": "https:\/\/github.com\/jlk" + }, + "html_url": "https:\/\/github.com\/jlk\/exploit-CVE-2017-6090", + "description": "Containerized exploitable PhpCollab", + "fork": false, + "created_at": "2018-02-17T01:07:58Z", + "updated_at": "2018-02-20T19:03:45Z", + "pushed_at": "2018-02-17T01:38:50Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-6736.json b/2017/CVE-2017-6736.json new file mode 100644 index 0000000000..7a75f69816 --- /dev/null +++ b/2017/CVE-2017-6736.json @@ -0,0 +1,48 @@ +[ + { + "id": 117869057, + "name": "CiscoSpectreTakeover", + "full_name": "GarnetSunset\/CiscoSpectreTakeover", + "owner": { + "login": "GarnetSunset", + "id": 13430434, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13430434?v=4", + "html_url": "https:\/\/github.com\/GarnetSunset" + }, + "html_url": "https:\/\/github.com\/GarnetSunset\/CiscoSpectreTakeover", + "description": "A POC chain exploit using the recent Cisco SMP exploit (CVE-2017-6736) to chain into Spectre (CVE-2017-5753 and CVE-2017-5715)", + "fork": false, + "created_at": "2018-01-17T17:26:14Z", + "updated_at": "2019-01-03T02:21:40Z", + "pushed_at": "2018-01-23T19:54:07Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 2, + "forks": 2, + "watchers": 5, + "score": 0 + }, + { + "id": 118516301, + "name": "CiscoIOSSNMPToolkit", + "full_name": "GarnetSunset\/CiscoIOSSNMPToolkit", + "owner": { + "login": "GarnetSunset", + "id": 13430434, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13430434?v=4", + "html_url": "https:\/\/github.com\/GarnetSunset" + }, + "html_url": "https:\/\/github.com\/GarnetSunset\/CiscoIOSSNMPToolkit", + "description": "Cisco iOS SNMP Overflow Exploit Toolkit (CVE-2017-6736)", + "fork": false, + "created_at": "2018-01-22T21:15:43Z", + "updated_at": "2019-06-30T13:36:39Z", + "pushed_at": "2018-06-28T18:56:25Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 7, + "forks": 7, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-6913.json b/2017/CVE-2017-6913.json new file mode 100644 index 0000000000..398cf645dd --- /dev/null +++ b/2017/CVE-2017-6913.json @@ -0,0 +1,25 @@ +[ + { + "id": 148588561, + "name": "CVE-2017-6913", + "full_name": "gquere\/CVE-2017-6913", + "owner": { + "login": "gquere", + "id": 1585000, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1585000?v=4", + "html_url": "https:\/\/github.com\/gquere" + }, + "html_url": "https:\/\/github.com\/gquere\/CVE-2017-6913", + "description": "Details about CVE-2017-6913 - Stored XSS in open-xchange's webmail", + "fork": false, + "created_at": "2018-09-13T05:51:59Z", + "updated_at": "2020-03-17T12:39:10Z", + "pushed_at": "2018-09-13T06:31:17Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-6971.json b/2017/CVE-2017-6971.json index 392ac454cf..e2293967ae 100644 --- a/2017/CVE-2017-6971.json +++ b/2017/CVE-2017-6971.json @@ -21,5 +21,28 @@ "forks": 7, "watchers": 4, "score": 0 + }, + { + "id": 183134145, + "name": "nfsen_1.3.7_CVE-2017-6971", + "full_name": "KeyStrOke95\/nfsen_1.3.7_CVE-2017-6971", + "owner": { + "login": "KeyStrOke95", + "id": 12446252, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12446252?v=4", + "html_url": "https:\/\/github.com\/KeyStrOke95" + }, + "html_url": "https:\/\/github.com\/KeyStrOke95\/nfsen_1.3.7_CVE-2017-6971", + "description": null, + "fork": false, + "created_at": "2019-04-24T02:45:17Z", + "updated_at": "2019-04-24T02:54:21Z", + "pushed_at": "2019-04-24T02:54:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-7038.json b/2017/CVE-2017-7038.json new file mode 100644 index 0000000000..2e6363bcae --- /dev/null +++ b/2017/CVE-2017-7038.json @@ -0,0 +1,25 @@ +[ + { + "id": 113333614, + "name": "CVE-2017-7038", + "full_name": "ansjdnakjdnajkd\/CVE-2017-7038", + "owner": { + "login": "ansjdnakjdnajkd", + "id": 1408055, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1408055?v=4", + "html_url": "https:\/\/github.com\/ansjdnakjdnajkd" + }, + "html_url": "https:\/\/github.com\/ansjdnakjdnajkd\/CVE-2017-7038", + "description": "Safari XSS (CVE-2017-7038) https:\/\/support.apple.com\/en-us\/HT207923", + "fork": false, + "created_at": "2017-12-06T15:31:08Z", + "updated_at": "2020-05-08T13:12:10Z", + "pushed_at": "2017-12-06T15:41:28Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 3, + "forks": 3, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7047.json b/2017/CVE-2017-7047.json new file mode 100644 index 0000000000..36e933bc00 --- /dev/null +++ b/2017/CVE-2017-7047.json @@ -0,0 +1,48 @@ +[ + { + "id": 99396176, + "name": "Triple_Fetch-Kernel-Creds", + "full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds", + "owner": { + "login": "JosephShenton", + "id": 12966231, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12966231?v=4", + "html_url": "https:\/\/github.com\/JosephShenton" + }, + "html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds", + "description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)", + "fork": false, + "created_at": "2017-08-05T03:23:13Z", + "updated_at": "2020-08-25T15:10:04Z", + "pushed_at": "2017-08-05T09:21:56Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 5, + "forks": 5, + "watchers": 4, + "score": 0 + }, + { + "id": 99915573, + "name": "Triple_fetch", + "full_name": "q1f3\/Triple_fetch", + "owner": { + "login": "q1f3", + "id": 9603950, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9603950?v=4", + "html_url": "https:\/\/github.com\/q1f3" + }, + "html_url": "https:\/\/github.com\/q1f3\/Triple_fetch", + "description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.", + "fork": false, + "created_at": "2017-08-10T11:24:47Z", + "updated_at": "2020-04-07T05:58:43Z", + "pushed_at": "2017-08-03T23:47:30Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7061.json b/2017/CVE-2017-7061.json new file mode 100644 index 0000000000..ead999fabe --- /dev/null +++ b/2017/CVE-2017-7061.json @@ -0,0 +1,25 @@ +[ + { + "id": 118516190, + "name": "jailbreakme103", + "full_name": "TheLoneHaxor\/jailbreakme103", + "owner": { + "login": "TheLoneHaxor", + "id": 25874459, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25874459?v=4", + "html_url": "https:\/\/github.com\/TheLoneHaxor" + }, + "html_url": "https:\/\/github.com\/TheLoneHaxor\/jailbreakme103", + "description": "Javascript Web-Kit exploit. CVE-2017-7061. By Lokihardt from Google Project Zero", + "fork": false, + "created_at": "2018-01-22T21:14:30Z", + "updated_at": "2020-07-14T10:02:28Z", + "pushed_at": "2018-01-22T21:29:22Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 2, + "forks": 2, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7089.json b/2017/CVE-2017-7089.json new file mode 100644 index 0000000000..daed20c52b --- /dev/null +++ b/2017/CVE-2017-7089.json @@ -0,0 +1,48 @@ +[ + { + "id": 105647741, + "name": "CVE-2017-7089", + "full_name": "Bo0oM\/CVE-2017-7089", + "owner": { + "login": "Bo0oM", + "id": 3492361, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3492361?v=4", + "html_url": "https:\/\/github.com\/Bo0oM" + }, + "html_url": "https:\/\/github.com\/Bo0oM\/CVE-2017-7089", + "description": "Webkit uxss exploit (CVE-2017-7089)", + "fork": false, + "created_at": "2017-10-03T12:13:43Z", + "updated_at": "2021-02-06T07:52:37Z", + "pushed_at": "2017-10-03T12:23:43Z", + "stargazers_count": 60, + "watchers_count": 60, + "forks_count": 18, + "forks": 18, + "watchers": 60, + "score": 0 + }, + { + "id": 106570313, + "name": "Safari_Mac", + "full_name": "aymankhalfatni\/Safari_Mac", + "owner": { + "login": "aymankhalfatni", + "id": 19715320, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19715320?v=4", + "html_url": "https:\/\/github.com\/aymankhalfatni" + }, + "html_url": "https:\/\/github.com\/aymankhalfatni\/Safari_Mac", + "description": "Exploit Safari CVE-2017-7089", + "fork": false, + "created_at": "2017-10-11T15:09:45Z", + "updated_at": "2020-04-07T05:36:45Z", + "pushed_at": "2017-10-11T15:10:21Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7092.json b/2017/CVE-2017-7092.json new file mode 100644 index 0000000000..a437c30c2d --- /dev/null +++ b/2017/CVE-2017-7092.json @@ -0,0 +1,25 @@ +[ + { + "id": 104834843, + "name": "CVE-2017-7092-PoC", + "full_name": "xuechiyaobai\/CVE-2017-7092-PoC", + "owner": { + "login": "xuechiyaobai", + "id": 8443947, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8443947?v=4", + "html_url": "https:\/\/github.com\/xuechiyaobai" + }, + "html_url": "https:\/\/github.com\/xuechiyaobai\/CVE-2017-7092-PoC", + "description": "This is the Pwn2Own 2017 Safari backup vul's exploit.", + "fork": false, + "created_at": "2017-09-26T04:10:32Z", + "updated_at": "2021-01-13T21:35:23Z", + "pushed_at": "2019-03-25T02:38:06Z", + "stargazers_count": 114, + "watchers_count": 114, + "forks_count": 28, + "forks": 28, + "watchers": 114, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7173.json b/2017/CVE-2017-7173.json new file mode 100644 index 0000000000..23da627a69 --- /dev/null +++ b/2017/CVE-2017-7173.json @@ -0,0 +1,25 @@ +[ + { + "id": 104429992, + "name": "sysctl_coalition_get_pid_list-dos", + "full_name": "bazad\/sysctl_coalition_get_pid_list-dos", + "owner": { + "login": "bazad", + "id": 3111637, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4", + "html_url": "https:\/\/github.com\/bazad" + }, + "html_url": "https:\/\/github.com\/bazad\/sysctl_coalition_get_pid_list-dos", + "description": "CVE-2017-7173: Local denial of service for iOS requiring root privileges.", + "fork": false, + "created_at": "2017-09-22T04:04:05Z", + "updated_at": "2021-01-10T00:18:08Z", + "pushed_at": "2018-01-17T19:19:01Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7184.json b/2017/CVE-2017-7184.json new file mode 100644 index 0000000000..3dc228cd35 --- /dev/null +++ b/2017/CVE-2017-7184.json @@ -0,0 +1,48 @@ +[ + { + "id": 118847628, + "name": "cve-2017-7184", + "full_name": "rockl\/cve-2017-7184", + "owner": { + "login": "rockl", + "id": 2081161, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2081161?v=4", + "html_url": "https:\/\/github.com\/rockl" + }, + "html_url": "https:\/\/github.com\/rockl\/cve-2017-7184", + "description": " the job is not yet finished", + "fork": false, + "created_at": "2018-01-25T01:55:47Z", + "updated_at": "2018-01-25T01:55:47Z", + "pushed_at": "2018-01-25T01:55:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 118849076, + "name": "cve-2017-7184-bak", + "full_name": "rockl\/cve-2017-7184-bak", + "owner": { + "login": "rockl", + "id": 2081161, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2081161?v=4", + "html_url": "https:\/\/github.com\/rockl" + }, + "html_url": "https:\/\/github.com\/rockl\/cve-2017-7184-bak", + "description": "not yet fin", + "fork": false, + "created_at": "2018-01-25T02:10:45Z", + "updated_at": "2018-01-25T02:10:45Z", + "pushed_at": "2018-01-25T02:10:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index beb71d8fda..d4c3af1fb0 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -274,5 +274,51 @@ "forks": 34, "watchers": 84, "score": 0 + }, + { + "id": 118708741, + "name": "CVE-2017-7269", + "full_name": "mirrorblack\/CVE-2017-7269", + "owner": { + "login": "mirrorblack", + "id": 33338951, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33338951?v=4", + "html_url": "https:\/\/github.com\/mirrorblack" + }, + "html_url": "https:\/\/github.com\/mirrorblack\/CVE-2017-7269", + "description": "CVE-2017-7269利用代码(rb文件)", + "fork": false, + "created_at": "2018-01-24T03:51:58Z", + "updated_at": "2018-01-24T03:51:58Z", + "pushed_at": "2018-01-24T03:51:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 131371800, + "name": "CVE-2017-7269", + "full_name": "Al1ex\/CVE-2017-7269", + "owner": { + "login": "Al1ex", + "id": 38161463, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", + "html_url": "https:\/\/github.com\/Al1ex" + }, + "html_url": "https:\/\/github.com\/Al1ex\/CVE-2017-7269", + "description": null, + "fork": false, + "created_at": "2018-04-28T04:11:45Z", + "updated_at": "2021-01-19T12:40:06Z", + "pushed_at": "2018-04-28T04:47:05Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 2, + "forks": 2, + "watchers": 6, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-7374.json b/2017/CVE-2017-7374.json new file mode 100644 index 0000000000..c3a305db96 --- /dev/null +++ b/2017/CVE-2017-7374.json @@ -0,0 +1,25 @@ +[ + { + "id": 123190167, + "name": "cve-2017-7374", + "full_name": "ww9210\/cve-2017-7374", + "owner": { + "login": "ww9210", + "id": 5433111, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5433111?v=4", + "html_url": "https:\/\/github.com\/ww9210" + }, + "html_url": "https:\/\/github.com\/ww9210\/cve-2017-7374", + "description": null, + "fork": false, + "created_at": "2018-02-27T21:22:01Z", + "updated_at": "2019-10-26T03:49:51Z", + "pushed_at": "2018-02-27T21:25:29Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 54783a3b34..2dbaea57a9 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -137,6 +137,75 @@ "watchers": 229, "score": 0 }, + { + "id": 98615757, + "name": "Samba-CVE-2017-7494", + "full_name": "Zer0d0y\/Samba-CVE-2017-7494", + "owner": { + "login": "Zer0d0y", + "id": 7157524, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7157524?v=4", + "html_url": "https:\/\/github.com\/Zer0d0y" + }, + "html_url": "https:\/\/github.com\/Zer0d0y\/Samba-CVE-2017-7494", + "description": "搭建漏洞利用测试环境", + "fork": false, + "created_at": "2017-07-28T06:21:29Z", + "updated_at": "2018-07-16T17:13:02Z", + "pushed_at": "2018-03-28T14:30:45Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 132869660, + "name": "CVE-2017-7494", + "full_name": "incredible1yu\/CVE-2017-7494", + "owner": { + "login": "incredible1yu", + "id": 39152132, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39152132?v=4", + "html_url": "https:\/\/github.com\/incredible1yu" + }, + "html_url": "https:\/\/github.com\/incredible1yu\/CVE-2017-7494", + "description": "CVE-2017-7494 C poc", + "fork": false, + "created_at": "2018-05-10T08:12:31Z", + "updated_at": "2018-05-10T08:29:03Z", + "pushed_at": "2018-05-10T08:29:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 164356178, + "name": "cve-2017-7494", + "full_name": "cved-sources\/cve-2017-7494", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-7494", + "description": "cve-2017-7494", + "fork": false, + "created_at": "2019-01-06T23:58:26Z", + "updated_at": "2019-02-01T22:32:18Z", + "pushed_at": "2019-02-01T22:32:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, { "id": 230847942, "name": "cve-2017-7494", diff --git a/2017/CVE-2017-7525.json b/2017/CVE-2017-7525.json index 72a5cd4fa9..6a2aee3458 100644 --- a/2017/CVE-2017-7525.json +++ b/2017/CVE-2017-7525.json @@ -1,4 +1,96 @@ [ + { + "id": 113026595, + "name": "study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095", + "full_name": "SecureSkyTechnology\/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095", + "owner": { + "login": "SecureSkyTechnology", + "id": 9350349, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9350349?v=4", + "html_url": "https:\/\/github.com\/SecureSkyTechnology" + }, + "html_url": "https:\/\/github.com\/SecureSkyTechnology\/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095", + "description": "Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告", + "fork": false, + "created_at": "2017-12-04T10:07:28Z", + "updated_at": "2021-02-09T22:57:57Z", + "pushed_at": "2017-12-13T03:34:56Z", + "stargazers_count": 107, + "watchers_count": 107, + "forks_count": 27, + "forks": 27, + "watchers": 107, + "score": 0 + }, + { + "id": 114703214, + "name": "S2-055", + "full_name": "Nazicc\/S2-055", + "owner": { + "login": "Nazicc", + "id": 12894927, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12894927?v=4", + "html_url": "https:\/\/github.com\/Nazicc" + }, + "html_url": "https:\/\/github.com\/Nazicc\/S2-055", + "description": "CVE-2017-7525 S2-055 Exploit", + "fork": false, + "created_at": "2017-12-19T01:02:04Z", + "updated_at": "2020-11-28T11:14:21Z", + "pushed_at": "2017-12-18T10:26:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 167006781, + "name": "Demo-Exploit-Jackson-RCE", + "full_name": "JavanXD\/Demo-Exploit-Jackson-RCE", + "owner": { + "login": "JavanXD", + "id": 4342160, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4342160?v=4", + "html_url": "https:\/\/github.com\/JavanXD" + }, + "html_url": "https:\/\/github.com\/JavanXD\/Demo-Exploit-Jackson-RCE", + "description": "Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.", + "fork": false, + "created_at": "2019-01-22T14:19:54Z", + "updated_at": "2020-08-25T13:59:11Z", + "pushed_at": "2019-02-21T13:18:24Z", + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 2, + "forks": 2, + "watchers": 14, + "score": 0 + }, + { + "id": 203529758, + "name": "CVE-2017-7525", + "full_name": "47bwy\/CVE-2017-7525", + "owner": { + "login": "47bwy", + "id": 13373982, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13373982?v=4", + "html_url": "https:\/\/github.com\/47bwy" + }, + "html_url": "https:\/\/github.com\/47bwy\/CVE-2017-7525", + "description": "jar(linux) for CVE-2017-7525 ", + "fork": false, + "created_at": "2019-08-21T07:23:24Z", + "updated_at": "2020-08-23T15:28:57Z", + "pushed_at": "2019-08-21T07:41:08Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + }, { "id": 229002257, "name": "jackson-RCE", diff --git a/2017/CVE-2017-7529.json b/2017/CVE-2017-7529.json index c1be8e833a..46f8bcb071 100644 --- a/2017/CVE-2017-7529.json +++ b/2017/CVE-2017-7529.json @@ -1,4 +1,96 @@ [ + { + "id": 97701175, + "name": "CVE-2017-7529", + "full_name": "liusec\/CVE-2017-7529", + "owner": { + "login": "liusec", + "id": 13982415, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4", + "html_url": "https:\/\/github.com\/liusec" + }, + "html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529", + "description": null, + "fork": false, + "created_at": "2017-07-19T09:55:42Z", + "updated_at": "2021-04-06T08:29:06Z", + "pushed_at": "2017-07-21T06:29:35Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 8, + "forks": 8, + "watchers": 11, + "score": 0 + }, + { + "id": 138050203, + "name": "CVE-2017-7529_PoC", + "full_name": "en0f\/CVE-2017-7529_PoC", + "owner": { + "login": "en0f", + "id": 5394464, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5394464?v=4", + "html_url": "https:\/\/github.com\/en0f" + }, + "html_url": "https:\/\/github.com\/en0f\/CVE-2017-7529_PoC", + "description": "CVE-2017-7529_PoC", + "fork": false, + "created_at": "2018-06-20T15:16:10Z", + "updated_at": "2021-01-14T07:44:15Z", + "pushed_at": "2018-06-20T15:16:39Z", + "stargazers_count": 12, + "watchers_count": 12, + "forks_count": 22, + "forks": 22, + "watchers": 12, + "score": 0 + }, + { + "id": 166269997, + "name": "cve-2017-7529", + "full_name": "cved-sources\/cve-2017-7529", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-7529", + "description": "cve-2017-7529", + "fork": false, + "created_at": "2019-01-17T17:47:34Z", + "updated_at": "2019-02-01T21:28:02Z", + "pushed_at": "2019-02-01T21:28:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 190598569, + "name": "CVE-2017-7529-POC", + "full_name": "MaxSecurity\/CVE-2017-7529-POC", + "owner": { + "login": "MaxSecurity", + "id": 16812469, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16812469?v=4", + "html_url": "https:\/\/github.com\/MaxSecurity" + }, + "html_url": "https:\/\/github.com\/MaxSecurity\/CVE-2017-7529-POC", + "description": null, + "fork": false, + "created_at": "2019-06-06T14:47:17Z", + "updated_at": "2019-06-06T14:53:53Z", + "pushed_at": "2019-06-06T14:53:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 3, + "forks": 3, + "watchers": 0, + "score": 0 + }, { "id": 272001877, "name": "CVE-2017-7529", diff --git a/2017/CVE-2017-7679.json b/2017/CVE-2017-7679.json new file mode 100644 index 0000000000..1c16af641d --- /dev/null +++ b/2017/CVE-2017-7679.json @@ -0,0 +1,25 @@ +[ + { + "id": 120799852, + "name": "CVE-2017-7679-in-python", + "full_name": "snknritr\/CVE-2017-7679-in-python", + "owner": { + "login": "snknritr", + "id": 36276619, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36276619?v=4", + "html_url": "https:\/\/github.com\/snknritr" + }, + "html_url": "https:\/\/github.com\/snknritr\/CVE-2017-7679-in-python", + "description": "At this project, we made a python exploit using buffer overflow at the CVE-2017-7679", + "fork": false, + "created_at": "2018-02-08T18:21:18Z", + "updated_at": "2020-06-17T00:24:51Z", + "pushed_at": "2018-02-08T18:21:19Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7912.json b/2017/CVE-2017-7912.json new file mode 100644 index 0000000000..3c48a076dc --- /dev/null +++ b/2017/CVE-2017-7912.json @@ -0,0 +1,25 @@ +[ + { + "id": 103750394, + "name": "CVE-2017-7912_Sneak", + "full_name": "homjxi0e\/CVE-2017-7912_Sneak", + "owner": { + "login": "homjxi0e", + "id": 25440152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", + "html_url": "https:\/\/github.com\/homjxi0e" + }, + "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7912_Sneak", + "description": null, + "fork": false, + "created_at": "2017-09-16T12:27:48Z", + "updated_at": "2017-09-16T12:27:48Z", + "pushed_at": "2017-09-16T12:27:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7998.json b/2017/CVE-2017-7998.json new file mode 100644 index 0000000000..ba38262bf2 --- /dev/null +++ b/2017/CVE-2017-7998.json @@ -0,0 +1,25 @@ +[ + { + "id": 101155833, + "name": "CVE-2017-7998", + "full_name": "homjxi0e\/CVE-2017-7998", + "owner": { + "login": "homjxi0e", + "id": 25440152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", + "html_url": "https:\/\/github.com\/homjxi0e" + }, + "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7998", + "description": " Denial of service by Exit in Terminal !! ", + "fork": false, + "created_at": "2017-08-23T08:17:10Z", + "updated_at": "2017-10-03T14:38:32Z", + "pushed_at": "2017-10-11T16:52:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-8046.json b/2017/CVE-2017-8046.json index b0c134939a..029e3ecf24 100644 --- a/2017/CVE-2017-8046.json +++ b/2017/CVE-2017-8046.json @@ -1,4 +1,211 @@ [ + { + "id": 105420015, + "name": "CVE-2017-8046-DEMO", + "full_name": "Soontao\/CVE-2017-8046-DEMO", + "owner": { + "login": "Soontao", + "id": 10473459, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10473459?v=4", + "html_url": "https:\/\/github.com\/Soontao" + }, + "html_url": "https:\/\/github.com\/Soontao\/CVE-2017-8046-DEMO", + "description": "SPRING DATA REST CVE-2017-8046 DEMO", + "fork": false, + "created_at": "2017-10-01T04:52:24Z", + "updated_at": "2017-10-09T09:05:05Z", + "pushed_at": "2017-10-01T10:54:22Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 110002512, + "name": "spring-data-rest-CVE-2017-8046", + "full_name": "sj\/spring-data-rest-CVE-2017-8046", + "owner": { + "login": "sj", + "id": 5082246, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5082246?v=4", + "html_url": "https:\/\/github.com\/sj" + }, + "html_url": "https:\/\/github.com\/sj\/spring-data-rest-CVE-2017-8046", + "description": "Fork of github.com\/spring-projects\/spring-data-rest (vulnerable to CVE-2017-8046)", + "fork": false, + "created_at": "2017-11-08T16:39:11Z", + "updated_at": "2018-03-08T02:37:48Z", + "pushed_at": "2020-06-15T20:06:50Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 124410900, + "name": "SpringBreakVulnerableApp", + "full_name": "m3ssap0\/SpringBreakVulnerableApp", + "owner": { + "login": "m3ssap0", + "id": 705120, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4", + "html_url": "https:\/\/github.com\/m3ssap0" + }, + "html_url": "https:\/\/github.com\/m3ssap0\/SpringBreakVulnerableApp", + "description": "WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk!", + "fork": false, + "created_at": "2018-03-08T15:29:44Z", + "updated_at": "2020-10-18T01:21:57Z", + "pushed_at": "2018-10-08T23:18:25Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 8, + "forks": 8, + "watchers": 11, + "score": 0 + }, + { + "id": 124591869, + "name": "spring-break_cve-2017-8046", + "full_name": "m3ssap0\/spring-break_cve-2017-8046", + "owner": { + "login": "m3ssap0", + "id": 705120, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4", + "html_url": "https:\/\/github.com\/m3ssap0" + }, + "html_url": "https:\/\/github.com\/m3ssap0\/spring-break_cve-2017-8046", + "description": "This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).", + "fork": false, + "created_at": "2018-03-09T20:51:19Z", + "updated_at": "2020-10-18T01:22:11Z", + "pushed_at": "2019-10-28T14:19:02Z", + "stargazers_count": 15, + "watchers_count": 15, + "forks_count": 8, + "forks": 8, + "watchers": 15, + "score": 0 + }, + { + "id": 124935868, + "name": "SpringBreakPoC", + "full_name": "FixYourFace\/SpringBreakPoC", + "owner": { + "login": "FixYourFace", + "id": 16994146, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16994146?v=4", + "html_url": "https:\/\/github.com\/FixYourFace" + }, + "html_url": "https:\/\/github.com\/FixYourFace\/SpringBreakPoC", + "description": "PoC for SpringBreak (CVE-2017-8046)", + "fork": false, + "created_at": "2018-03-12T18:49:45Z", + "updated_at": "2019-03-03T15:35:08Z", + "pushed_at": "2018-03-12T19:08:03Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 129776823, + "name": "spring-break-cve-2017-8046", + "full_name": "jkutner\/spring-break-cve-2017-8046", + "owner": { + "login": "jkutner", + "id": 1589, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1589?v=4", + "html_url": "https:\/\/github.com\/jkutner" + }, + "html_url": "https:\/\/github.com\/jkutner\/spring-break-cve-2017-8046", + "description": "This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).", + "fork": false, + "created_at": "2018-04-16T16:54:05Z", + "updated_at": "2018-08-09T02:14:12Z", + "pushed_at": "2018-04-16T17:00:37Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 150413982, + "name": "CVE-2017-8046", + "full_name": "bkhablenko\/CVE-2017-8046", + "owner": { + "login": "bkhablenko", + "id": 8275828, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8275828?v=4", + "html_url": "https:\/\/github.com\/bkhablenko" + }, + "html_url": "https:\/\/github.com\/bkhablenko\/CVE-2017-8046", + "description": null, + "fork": false, + "created_at": "2018-09-26T11:11:40Z", + "updated_at": "2018-09-26T11:18:18Z", + "pushed_at": "2018-09-26T11:18:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 166270192, + "name": "cve-2017-8046", + "full_name": "cved-sources\/cve-2017-8046", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-8046", + "description": "cve-2017-8046", + "fork": false, + "created_at": "2019-01-17T17:49:12Z", + "updated_at": "2020-03-06T03:07:08Z", + "pushed_at": "2019-02-01T21:28:38Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 183741969, + "name": "VulnerableSpringDataRest", + "full_name": "jsotiro\/VulnerableSpringDataRest", + "owner": { + "login": "jsotiro", + "id": 2410281, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2410281?v=4", + "html_url": "https:\/\/github.com\/jsotiro" + }, + "html_url": "https:\/\/github.com\/jsotiro\/VulnerableSpringDataRest", + "description": "An intentionally vulnerable (CVE-2017-8046) SrpingData REST appl with Swagger Support for pentesting purposes", + "fork": false, + "created_at": "2019-04-27T07:23:53Z", + "updated_at": "2019-05-08T20:01:55Z", + "pushed_at": "2019-05-08T20:01:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 284192206, "name": "CVE-2017-8046", diff --git a/2017/CVE-2017-8464.json b/2017/CVE-2017-8464.json index 7f5c6d7509..e4ac0096c7 100644 --- a/2017/CVE-2017-8464.json +++ b/2017/CVE-2017-8464.json @@ -21,5 +21,97 @@ "forks": 2, "watchers": 2, "score": 0 + }, + { + "id": 99062024, + "name": "CVE-2017-8464-EXP", + "full_name": "3gstudent\/CVE-2017-8464-EXP", + "owner": { + "login": "3gstudent", + "id": 15814408, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15814408?v=4", + "html_url": "https:\/\/github.com\/3gstudent" + }, + "html_url": "https:\/\/github.com\/3gstudent\/CVE-2017-8464-EXP", + "description": "Support x86 and x64", + "fork": false, + "created_at": "2017-08-02T02:14:37Z", + "updated_at": "2021-01-08T04:12:52Z", + "pushed_at": "2017-10-09T01:01:20Z", + "stargazers_count": 67, + "watchers_count": 67, + "forks_count": 31, + "forks": 31, + "watchers": 67, + "score": 0 + }, + { + "id": 99573027, + "name": "CVE-2017-8464-exp-generator", + "full_name": "Securitykid\/CVE-2017-8464-exp-generator", + "owner": { + "login": "Securitykid", + "id": 30798606, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30798606?v=4", + "html_url": "https:\/\/github.com\/Securitykid" + }, + "html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8464-exp-generator", + "description": "this tool can generate a exp for cve-2017-8486, it is developed by python", + "fork": false, + "created_at": "2017-08-07T11:56:11Z", + "updated_at": "2021-03-14T04:52:32Z", + "pushed_at": "2017-08-07T12:42:33Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 6, + "forks": 6, + "watchers": 6, + "score": 0 + }, + { + "id": 105686692, + "name": "usbhijacking", + "full_name": "X-Vector\/usbhijacking", + "owner": { + "login": "X-Vector", + "id": 30379192, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30379192?v=4", + "html_url": "https:\/\/github.com\/X-Vector" + }, + "html_url": "https:\/\/github.com\/X-Vector\/usbhijacking", + "description": "Usbhijacking | CVE-2017-8464", + "fork": false, + "created_at": "2017-10-03T18:18:28Z", + "updated_at": "2020-04-01T13:33:19Z", + "pushed_at": "2018-07-20T16:34:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 130337310, + "name": "CVE-2017-8464-EXP", + "full_name": "xssfile\/CVE-2017-8464-EXP", + "owner": { + "login": "xssfile", + "id": 38548622, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38548622?v=4", + "html_url": "https:\/\/github.com\/xssfile" + }, + "html_url": "https:\/\/github.com\/xssfile\/CVE-2017-8464-EXP", + "description": null, + "fork": false, + "created_at": "2018-04-20T09:01:03Z", + "updated_at": "2018-06-08T09:33:51Z", + "pushed_at": "2018-04-20T09:01:20Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-8465.json b/2017/CVE-2017-8465.json new file mode 100644 index 0000000000..54fb650649 --- /dev/null +++ b/2017/CVE-2017-8465.json @@ -0,0 +1,25 @@ +[ + { + "id": 218245795, + "name": "CVE-2017-8465", + "full_name": "nghiadt1098\/CVE-2017-8465", + "owner": { + "login": "nghiadt1098", + "id": 28037088, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28037088?v=4", + "html_url": "https:\/\/github.com\/nghiadt1098" + }, + "html_url": "https:\/\/github.com\/nghiadt1098\/CVE-2017-8465", + "description": "Exploit for CVE-2017-8465", + "fork": false, + "created_at": "2019-10-29T09:06:23Z", + "updated_at": "2019-10-29T09:07:19Z", + "pushed_at": "2019-10-29T09:07:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-8529.json b/2017/CVE-2017-8529.json index d86343874e..1f24ebfa4f 100644 --- a/2017/CVE-2017-8529.json +++ b/2017/CVE-2017-8529.json @@ -1,4 +1,27 @@ [ + { + "id": 206168284, + "name": "windows2016fixCVE-2017-8529", + "full_name": "Lynggaard91\/windows2016fixCVE-2017-8529", + "owner": { + "login": "Lynggaard91", + "id": 30240221, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30240221?v=4", + "html_url": "https:\/\/github.com\/Lynggaard91" + }, + "html_url": "https:\/\/github.com\/Lynggaard91\/windows2016fixCVE-2017-8529", + "description": null, + "fork": false, + "created_at": "2019-09-03T20:39:59Z", + "updated_at": "2019-09-04T05:35:12Z", + "pushed_at": "2019-09-04T05:35:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 239253819, "name": "cve-2017-8529", diff --git a/2017/CVE-2017-8570.json b/2017/CVE-2017-8570.json index 336e210452..167717fee8 100644 --- a/2017/CVE-2017-8570.json +++ b/2017/CVE-2017-8570.json @@ -1,4 +1,142 @@ [ + { + "id": 98222699, + "name": "ppsx-file-generator", + "full_name": "temesgeny\/ppsx-file-generator", + "owner": { + "login": "temesgeny", + "id": 17720149, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17720149?v=4", + "html_url": "https:\/\/github.com\/temesgeny" + }, + "html_url": "https:\/\/github.com\/temesgeny\/ppsx-file-generator", + "description": "ppsx file generator for cve-2017-8570 (based on bhdresh\/cve-2017-8570)", + "fork": false, + "created_at": "2017-07-24T18:35:26Z", + "updated_at": "2021-01-13T19:53:20Z", + "pushed_at": "2018-05-27T12:58:58Z", + "stargazers_count": 67, + "watchers_count": 67, + "forks_count": 65, + "forks": 65, + "watchers": 67, + "score": 0 + }, + { + "id": 116858521, + "name": "CVE-2017-8570", + "full_name": "rxwx\/CVE-2017-8570", + "owner": { + "login": "rxwx", + "id": 2202542, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4", + "html_url": "https:\/\/github.com\/rxwx" + }, + "html_url": "https:\/\/github.com\/rxwx\/CVE-2017-8570", + "description": "Proof of Concept exploit for CVE-2017-8570", + "fork": false, + "created_at": "2018-01-09T19:09:33Z", + "updated_at": "2021-02-07T09:41:31Z", + "pushed_at": "2018-01-09T19:23:43Z", + "stargazers_count": 174, + "watchers_count": 174, + "forks_count": 100, + "forks": 100, + "watchers": 174, + "score": 0 + }, + { + "id": 122914059, + "name": "Office-CVE-2017-8570", + "full_name": "MaxSecurity\/Office-CVE-2017-8570", + "owner": { + "login": "MaxSecurity", + "id": 16812469, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16812469?v=4", + "html_url": "https:\/\/github.com\/MaxSecurity" + }, + "html_url": "https:\/\/github.com\/MaxSecurity\/Office-CVE-2017-8570", + "description": null, + "fork": false, + "created_at": "2018-02-26T04:41:24Z", + "updated_at": "2018-02-26T04:44:15Z", + "pushed_at": "2018-02-26T04:44:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 3, + "forks": 3, + "watchers": 0, + "score": 0 + }, + { + "id": 128627702, + "name": "CVE-2017-8570", + "full_name": "SwordSheath\/CVE-2017-8570", + "owner": { + "login": "SwordSheath", + "id": 21040108, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21040108?v=4", + "html_url": "https:\/\/github.com\/SwordSheath" + }, + "html_url": "https:\/\/github.com\/SwordSheath\/CVE-2017-8570", + "description": "CVE-2017-8570生成脚本(CVE-2017-0199另一种利用方式)", + "fork": false, + "created_at": "2018-04-08T10:07:17Z", + "updated_at": "2020-08-07T16:18:33Z", + "pushed_at": "2018-04-08T10:10:12Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, + "forks": 1, + "watchers": 5, + "score": 0 + }, + { + "id": 163988337, + "name": "CVE-2017-8570", + "full_name": "Drac0nids\/CVE-2017-8570", + "owner": { + "login": "Drac0nids", + "id": 31087166, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31087166?v=4", + "html_url": "https:\/\/github.com\/Drac0nids" + }, + "html_url": "https:\/\/github.com\/Drac0nids\/CVE-2017-8570", + "description": "## 在kali中自动化生成cve-2017-8570的恶意ppsx文件和配置msf监听", + "fork": false, + "created_at": "2019-01-03T15:12:39Z", + "updated_at": "2020-03-24T12:09:30Z", + "pushed_at": "2019-01-03T16:01:52Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 185678026, + "name": "CVE-2017-8570", + "full_name": "sasqwatch\/CVE-2017-8570", + "owner": { + "login": "sasqwatch", + "id": 22352904, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22352904?v=4", + "html_url": "https:\/\/github.com\/sasqwatch" + }, + "html_url": "https:\/\/github.com\/sasqwatch\/CVE-2017-8570", + "description": null, + "fork": false, + "created_at": "2019-05-08T20:53:27Z", + "updated_at": "2021-01-19T05:54:41Z", + "pushed_at": "2019-05-07T16:35:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 285525811, "name": "CVE-2017-8570", diff --git a/2017/CVE-2017-8625.json b/2017/CVE-2017-8625.json new file mode 100644 index 0000000000..4995debf0b --- /dev/null +++ b/2017/CVE-2017-8625.json @@ -0,0 +1,25 @@ +[ + { + "id": 100988934, + "name": "CVE-2017-8625_Bypass_UMCI", + "full_name": "homjxi0e\/CVE-2017-8625_Bypass_UMCI", + "owner": { + "login": "homjxi0e", + "id": 25440152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", + "html_url": "https:\/\/github.com\/homjxi0e" + }, + "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8625_Bypass_UMCI", + "description": "Bypass Feature UMCI in Internet Explorer", + "fork": false, + "created_at": "2017-08-21T20:14:07Z", + "updated_at": "2020-11-18T13:22:34Z", + "pushed_at": "2017-08-25T13:04:08Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-8641.json b/2017/CVE-2017-8641.json new file mode 100644 index 0000000000..b568f39088 --- /dev/null +++ b/2017/CVE-2017-8641.json @@ -0,0 +1,25 @@ +[ + { + "id": 100988677, + "name": "CVE-2017-8641_chakra_Js_GlobalObject", + "full_name": "homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject", + "owner": { + "login": "homjxi0e", + "id": 25440152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", + "html_url": "https:\/\/github.com\/homjxi0e" + }, + "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject", + "description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ", + "fork": false, + "created_at": "2017-08-21T20:11:11Z", + "updated_at": "2017-08-23T09:18:42Z", + "pushed_at": "2017-08-23T09:09:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-8759.json b/2017/CVE-2017-8759.json index 6e86ec1f84..1ce1f8d0e4 100644 --- a/2017/CVE-2017-8759.json +++ b/2017/CVE-2017-8759.json @@ -22,6 +22,328 @@ "watchers": 259, "score": 0 }, + { + "id": 103416775, + "name": "CVE-2017-8759", + "full_name": "nccgroup\/CVE-2017-8759", + "owner": { + "login": "nccgroup", + "id": 4067082, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4", + "html_url": "https:\/\/github.com\/nccgroup" + }, + "html_url": "https:\/\/github.com\/nccgroup\/CVE-2017-8759", + "description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements", + "fork": false, + "created_at": "2017-09-13T15:24:10Z", + "updated_at": "2021-04-09T10:05:01Z", + "pushed_at": "2017-09-19T18:06:41Z", + "stargazers_count": 94, + "watchers_count": 94, + "forks_count": 48, + "forks": 48, + "watchers": 94, + "score": 0 + }, + { + "id": 103428172, + "name": "CVE-2017-8759", + "full_name": "vysecurity\/CVE-2017-8759", + "owner": { + "login": "vysecurity", + "id": 3596242, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4", + "html_url": "https:\/\/github.com\/vysecurity" + }, + "html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759", + "description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.", + "fork": false, + "created_at": "2017-09-13T17:10:18Z", + "updated_at": "2020-11-20T09:09:06Z", + "pushed_at": "2017-09-14T10:18:40Z", + "stargazers_count": 173, + "watchers_count": 173, + "forks_count": 85, + "forks": 85, + "watchers": 173, + "score": 0 + }, + { + "id": 103447049, + "name": "CVE-2017-8759", + "full_name": "BasuCert\/CVE-2017-8759", + "owner": { + "login": "BasuCert", + "id": 29852431, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4", + "html_url": "https:\/\/github.com\/BasuCert" + }, + "html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759", + "description": "CVE-2017-8759 Research", + "fork": false, + "created_at": "2017-09-13T20:27:29Z", + "updated_at": "2020-05-18T10:42:14Z", + "pushed_at": "2017-09-15T13:14:38Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 103447404, + "name": "CVE-2017-8759-Exploit-sample2", + "full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2", + "owner": { + "login": "tahisaad6", + "id": 21042116, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21042116?v=4", + "html_url": "https:\/\/github.com\/tahisaad6" + }, + "html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2", + "description": null, + "fork": false, + "created_at": "2017-09-13T20:31:43Z", + "updated_at": "2017-09-13T20:31:43Z", + "pushed_at": "2017-09-13T20:31:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 103493845, + "name": "CVE-2017-8759_-SOAP_WSDL", + "full_name": "homjxi0e\/CVE-2017-8759_-SOAP_WSDL", + "owner": { + "login": "homjxi0e", + "id": 25440152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", + "html_url": "https:\/\/github.com\/homjxi0e" + }, + "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8759_-SOAP_WSDL", + "description": "CVE-2017-8759 Remote Code Execution Vulnerability On SOAP WDSL - Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.5", + "fork": false, + "created_at": "2017-09-14T06:20:28Z", + "updated_at": "2018-11-16T12:24:03Z", + "pushed_at": "2017-09-21T16:41:37Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 5, + "forks": 5, + "watchers": 1, + "score": 0 + }, + { + "id": 103517315, + "name": "CVE-2017-8759", + "full_name": "bhdresh\/CVE-2017-8759", + "owner": { + "login": "bhdresh", + "id": 8931885, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4", + "html_url": "https:\/\/github.com\/bhdresh" + }, + "html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-8759", + "description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", + "fork": false, + "created_at": "2017-09-14T10:04:39Z", + "updated_at": "2021-03-05T13:04:22Z", + "pushed_at": "2018-09-10T16:25:12Z", + "stargazers_count": 308, + "watchers_count": 308, + "forks_count": 122, + "forks": 122, + "watchers": 308, + "score": 0 + }, + { + "id": 103595749, + "name": "CVE-2017-8759", + "full_name": "Lz1y\/CVE-2017-8759", + "owner": { + "login": "Lz1y", + "id": 23468993, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23468993?v=4", + "html_url": "https:\/\/github.com\/Lz1y" + }, + "html_url": "https:\/\/github.com\/Lz1y\/CVE-2017-8759", + "description": "CVE-2017-8759", + "fork": false, + "created_at": "2017-09-15T00:36:17Z", + "updated_at": "2021-01-08T03:56:13Z", + "pushed_at": "2017-12-28T07:16:15Z", + "stargazers_count": 84, + "watchers_count": 84, + "forks_count": 49, + "forks": 49, + "watchers": 84, + "score": 0 + }, + { + "id": 103865283, + "name": "CVE-2017-8759", + "full_name": "JonasUliana\/CVE-2017-8759", + "owner": { + "login": "JonasUliana", + "id": 29503841, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29503841?v=4", + "html_url": "https:\/\/github.com\/JonasUliana" + }, + "html_url": "https:\/\/github.com\/JonasUliana\/CVE-2017-8759", + "description": "Simple C# implementation of CVE-2017-8759", + "fork": false, + "created_at": "2017-09-17T22:05:56Z", + "updated_at": "2018-11-16T12:24:03Z", + "pushed_at": "2017-09-17T22:20:36Z", + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 3, + "forks": 3, + "watchers": 7, + "score": 0 + }, + { + "id": 103896322, + "name": "CVE-2017-8759", + "full_name": "Securitykid\/CVE-2017-8759", + "owner": { + "login": "Securitykid", + "id": 30798606, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30798606?v=4", + "html_url": "https:\/\/github.com\/Securitykid" + }, + "html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8759", + "description": "CVE-2017-8759", + "fork": false, + "created_at": "2017-09-18T05:35:57Z", + "updated_at": "2017-09-18T05:35:57Z", + "pushed_at": "2017-09-18T05:35:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 104033989, + "name": "CVE-2017-8759-exploits", + "full_name": "ashr\/CVE-2017-8759-exploits", + "owner": { + "login": "ashr", + "id": 171286, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171286?v=4", + "html_url": "https:\/\/github.com\/ashr" + }, + "html_url": "https:\/\/github.com\/ashr\/CVE-2017-8759-exploits", + "description": "Two versions of CVE-2017-8759 exploits", + "fork": false, + "created_at": "2017-09-19T06:12:10Z", + "updated_at": "2020-04-07T05:43:28Z", + "pushed_at": "2017-09-19T06:19:54Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 4, + "forks": 4, + "watchers": 2, + "score": 0 + }, + { + "id": 104625403, + "name": "CVE-2017-8759", + "full_name": "l0n3rs\/CVE-2017-8759", + "owner": { + "login": "l0n3rs", + "id": 31120718, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4", + "html_url": "https:\/\/github.com\/l0n3rs" + }, + "html_url": "https:\/\/github.com\/l0n3rs\/CVE-2017-8759", + "description": null, + "fork": false, + "created_at": "2017-09-24T06:58:55Z", + "updated_at": "2017-09-24T06:58:55Z", + "pushed_at": "2017-09-24T06:59:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 161397133, + "name": "CVE-2017-8759", + "full_name": "ChaitanyaHaritash\/CVE-2017-8759", + "owner": { + "login": "ChaitanyaHaritash", + "id": 16261173, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16261173?v=4", + "html_url": "https:\/\/github.com\/ChaitanyaHaritash" + }, + "html_url": "https:\/\/github.com\/ChaitanyaHaritash\/CVE-2017-8759", + "description": "Just My ports of CVE-2017-8759", + "fork": false, + "created_at": "2018-12-11T21:39:39Z", + "updated_at": "2020-10-27T03:30:41Z", + "pushed_at": "2018-12-11T22:02:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 2, + "forks": 2, + "watchers": 0, + "score": 0 + }, + { + "id": 188365315, + "name": "CVE-2017-8759Expoit", + "full_name": "smashinu\/CVE-2017-8759Expoit", + "owner": { + "login": "smashinu", + "id": 30433218, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30433218?v=4", + "html_url": "https:\/\/github.com\/smashinu" + }, + "html_url": "https:\/\/github.com\/smashinu\/CVE-2017-8759Expoit", + "description": "yehnah", + "fork": false, + "created_at": "2019-05-24T06:29:45Z", + "updated_at": "2019-05-30T02:01:34Z", + "pushed_at": "2019-05-30T02:01:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 193617602, + "name": "CVE-2017-8759", + "full_name": "adeljck\/CVE-2017-8759", + "owner": { + "login": "adeljck", + "id": 24542600, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24542600?v=4", + "html_url": "https:\/\/github.com\/adeljck" + }, + "html_url": "https:\/\/github.com\/adeljck\/CVE-2017-8759", + "description": "CVE-2017-8759 微软word漏洞利用脚本", + "fork": false, + "created_at": "2019-06-25T02:17:04Z", + "updated_at": "2019-06-25T02:17:51Z", + "pushed_at": "2019-06-25T02:17:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 231332316, "name": "CVE-2017-8759", diff --git a/2017/CVE-2017-8760.json b/2017/CVE-2017-8760.json new file mode 100644 index 0000000000..4219617fab --- /dev/null +++ b/2017/CVE-2017-8760.json @@ -0,0 +1,25 @@ +[ + { + "id": 150201971, + "name": "cve-2017-8760", + "full_name": "Voraka\/cve-2017-8760", + "owner": { + "login": "Voraka", + "id": 20237180, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20237180?v=4", + "html_url": "https:\/\/github.com\/Voraka" + }, + "html_url": "https:\/\/github.com\/Voraka\/cve-2017-8760", + "description": null, + "fork": false, + "created_at": "2018-09-25T03:23:13Z", + "updated_at": "2018-11-12T16:22:38Z", + "pushed_at": "2018-09-23T03:26:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 2, + "forks": 2, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-8802.json b/2017/CVE-2017-8802.json new file mode 100644 index 0000000000..bd44924bdc --- /dev/null +++ b/2017/CVE-2017-8802.json @@ -0,0 +1,25 @@ +[ + { + "id": 118624965, + "name": "Zimbra-CVE-2017-8802-Hotifx", + "full_name": "ozzi-\/Zimbra-CVE-2017-8802-Hotifx", + "owner": { + "login": "ozzi-", + "id": 7944573, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7944573?v=4", + "html_url": "https:\/\/github.com\/ozzi-" + }, + "html_url": "https:\/\/github.com\/ozzi-\/Zimbra-CVE-2017-8802-Hotifx", + "description": "Security hotfix for CVE-2017-8802 ", + "fork": false, + "created_at": "2018-01-23T14:56:18Z", + "updated_at": "2018-01-23T14:56:59Z", + "pushed_at": "2018-01-23T14:58:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-8890.json b/2017/CVE-2017-8890.json new file mode 100644 index 0000000000..806644922d --- /dev/null +++ b/2017/CVE-2017-8890.json @@ -0,0 +1,71 @@ +[ + { + "id": 96664720, + "name": "CVE-2017-8890", + "full_name": "beraphin\/CVE-2017-8890", + "owner": { + "login": "beraphin", + "id": 25315905, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315905?v=4", + "html_url": "https:\/\/github.com\/beraphin" + }, + "html_url": "https:\/\/github.com\/beraphin\/CVE-2017-8890", + "description": "None", + "fork": false, + "created_at": "2017-07-09T06:03:37Z", + "updated_at": "2021-01-13T01:57:33Z", + "pushed_at": "2018-08-25T16:09:21Z", + "stargazers_count": 19, + "watchers_count": 19, + "forks_count": 15, + "forks": 15, + "watchers": 19, + "score": 0 + }, + { + "id": 139380646, + "name": "CVE-2017-8890", + "full_name": "thinkycx\/CVE-2017-8890", + "owner": { + "login": "thinkycx", + "id": 13138128, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13138128?v=4", + "html_url": "https:\/\/github.com\/thinkycx" + }, + "html_url": "https:\/\/github.com\/thinkycx\/CVE-2017-8890", + "description": null, + "fork": false, + "created_at": "2018-07-02T02:21:28Z", + "updated_at": "2020-10-21T09:48:00Z", + "pushed_at": "2019-05-09T07:07:25Z", + "stargazers_count": 28, + "watchers_count": 28, + "forks_count": 12, + "forks": 12, + "watchers": 28, + "score": 0 + }, + { + "id": 184697347, + "name": "cve-2017-8890-msf", + "full_name": "7043mcgeep\/cve-2017-8890-msf", + "owner": { + "login": "7043mcgeep", + "id": 27043910, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27043910?v=4", + "html_url": "https:\/\/github.com\/7043mcgeep" + }, + "html_url": "https:\/\/github.com\/7043mcgeep\/cve-2017-8890-msf", + "description": "For Metasploit pull request", + "fork": false, + "created_at": "2019-05-03T04:14:17Z", + "updated_at": "2019-05-03T04:20:45Z", + "pushed_at": "2019-05-03T04:20:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-8917.json b/2017/CVE-2017-8917.json index 299e035561..16e38e5500 100644 --- a/2017/CVE-2017-8917.json +++ b/2017/CVE-2017-8917.json @@ -44,5 +44,28 @@ "forks": 10, "watchers": 9, "score": 0 + }, + { + "id": 165318193, + "name": "cve-2017-8917", + "full_name": "cved-sources\/cve-2017-8917", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-8917", + "description": "cve-2017-8917", + "fork": false, + "created_at": "2019-01-11T22:13:56Z", + "updated_at": "2019-01-11T22:39:59Z", + "pushed_at": "2019-01-11T22:39:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-9097.json b/2017/CVE-2017-9097.json new file mode 100644 index 0000000000..f06f426caa --- /dev/null +++ b/2017/CVE-2017-9097.json @@ -0,0 +1,25 @@ +[ + { + "id": 116008243, + "name": "AntiWeb_testing-Suite", + "full_name": "MDudek-ICS\/AntiWeb_testing-Suite", + "owner": { + "login": "MDudek-ICS", + "id": 31083304, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4", + "html_url": "https:\/\/github.com\/MDudek-ICS" + }, + "html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite", + "description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)", + "fork": false, + "created_at": "2018-01-02T11:28:40Z", + "updated_at": "2020-06-27T13:14:05Z", + "pushed_at": "2017-11-21T20:19:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 10, + "forks": 10, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9101.json b/2017/CVE-2017-9101.json new file mode 100644 index 0000000000..4d9bd853f5 --- /dev/null +++ b/2017/CVE-2017-9101.json @@ -0,0 +1,25 @@ +[ + { + "id": 156434987, + "name": "CVE-2017-9101", + "full_name": "jasperla\/CVE-2017-9101", + "owner": { + "login": "jasperla", + "id": 637504, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/637504?v=4", + "html_url": "https:\/\/github.com\/jasperla" + }, + "html_url": "https:\/\/github.com\/jasperla\/CVE-2017-9101", + "description": "Exploit for PlaySMS 1.4 authenticated RCE", + "fork": false, + "created_at": "2018-11-06T19:16:29Z", + "updated_at": "2021-03-03T11:40:21Z", + "pushed_at": "2018-11-06T19:45:40Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 1, + "forks": 1, + "watchers": 11, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index 04b110beb9..ee268a7905 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -22,6 +22,52 @@ "watchers": 100, "score": 0 }, + { + "id": 143378191, + "name": "Telewreck", + "full_name": "capt-meelo\/Telewreck", + "owner": { + "login": "capt-meelo", + "id": 40536834, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40536834?v=4", + "html_url": "https:\/\/github.com\/capt-meelo" + }, + "html_url": "https:\/\/github.com\/capt-meelo\/Telewreck", + "description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.", + "fork": false, + "created_at": "2018-08-03T04:36:23Z", + "updated_at": "2021-04-09T02:11:33Z", + "pushed_at": "2018-08-14T07:47:02Z", + "stargazers_count": 81, + "watchers_count": 81, + "forks_count": 24, + "forks": 24, + "watchers": 81, + "score": 0 + }, + { + "id": 217070902, + "name": "CVE-2017-9248", + "full_name": "ictnamanh\/CVE-2017-9248", + "owner": { + "login": "ictnamanh", + "id": 39141894, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39141894?v=4", + "html_url": "https:\/\/github.com\/ictnamanh" + }, + "html_url": "https:\/\/github.com\/ictnamanh\/CVE-2017-9248", + "description": null, + "fork": false, + "created_at": "2019-10-23T13:57:11Z", + "updated_at": "2019-10-23T14:02:06Z", + "pushed_at": "2019-10-23T14:02:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 235040508, "name": "dp", diff --git a/2017/CVE-2017-9417.json b/2017/CVE-2017-9417.json new file mode 100644 index 0000000000..86064e24cd --- /dev/null +++ b/2017/CVE-2017-9417.json @@ -0,0 +1,25 @@ +[ + { + "id": 98761662, + "name": "Broadpwn", + "full_name": "mailinneberg\/Broadpwn", + "owner": { + "login": "mailinneberg", + "id": 29992468, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29992468?v=4", + "html_url": "https:\/\/github.com\/mailinneberg" + }, + "html_url": "https:\/\/github.com\/mailinneberg\/Broadpwn", + "description": "Broadpwn bug (CVE-2017-9417)", + "fork": false, + "created_at": "2017-07-29T22:23:34Z", + "updated_at": "2020-09-11T14:53:55Z", + "pushed_at": "2017-09-22T12:14:25Z", + "stargazers_count": 42, + "watchers_count": 42, + "forks_count": 14, + "forks": 14, + "watchers": 42, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9430.json b/2017/CVE-2017-9430.json index 2595f62d51..b8f1535164 100644 --- a/2017/CVE-2017-9430.json +++ b/2017/CVE-2017-9430.json @@ -21,5 +21,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 111662357, + "name": "Dnstracer-1.9-Fix", + "full_name": "j0lama\/Dnstracer-1.9-Fix", + "owner": { + "login": "j0lama", + "id": 17393029, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17393029?v=4", + "html_url": "https:\/\/github.com\/j0lama" + }, + "html_url": "https:\/\/github.com\/j0lama\/Dnstracer-1.9-Fix", + "description": "CVE-2017-9430 Fix", + "fork": false, + "created_at": "2017-11-22T09:19:53Z", + "updated_at": "2017-11-22T09:23:55Z", + "pushed_at": "2017-11-22T09:40:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-9476.json b/2017/CVE-2017-9476.json new file mode 100644 index 0000000000..b3c0d638f0 --- /dev/null +++ b/2017/CVE-2017-9476.json @@ -0,0 +1,25 @@ +[ + { + "id": 106408008, + "name": "CVE-2017-9476", + "full_name": "wiire-a\/CVE-2017-9476", + "owner": { + "login": "wiire-a", + "id": 11740772, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11740772?v=4", + "html_url": "https:\/\/github.com\/wiire-a" + }, + "html_url": "https:\/\/github.com\/wiire-a\/CVE-2017-9476", + "description": "Hidden AP with Deterministic Credentials", + "fork": false, + "created_at": "2017-10-10T11:25:36Z", + "updated_at": "2020-09-11T12:03:08Z", + "pushed_at": "2017-10-10T11:26:40Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, + "forks": 1, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9506.json b/2017/CVE-2017-9506.json new file mode 100644 index 0000000000..1dde5dce58 --- /dev/null +++ b/2017/CVE-2017-9506.json @@ -0,0 +1,48 @@ +[ + { + "id": 130995909, + "name": "Jira-Scan", + "full_name": "random-robbie\/Jira-Scan", + "owner": { + "login": "random-robbie", + "id": 4902869, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4", + "html_url": "https:\/\/github.com\/random-robbie" + }, + "html_url": "https:\/\/github.com\/random-robbie\/Jira-Scan", + "description": "CVE-2017-9506 - SSRF", + "fork": false, + "created_at": "2018-04-25T11:25:18Z", + "updated_at": "2021-03-17T05:55:12Z", + "pushed_at": "2018-04-26T12:47:54Z", + "stargazers_count": 159, + "watchers_count": 159, + "forks_count": 41, + "forks": 41, + "watchers": 159, + "score": 0 + }, + { + "id": 216503835, + "name": "jira-ssrf", + "full_name": "pwn1sher\/jira-ssrf", + "owner": { + "login": "pwn1sher", + "id": 17316522, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17316522?v=4", + "html_url": "https:\/\/github.com\/pwn1sher" + }, + "html_url": "https:\/\/github.com\/pwn1sher\/jira-ssrf", + "description": "CVE-2017-9506", + "fork": false, + "created_at": "2019-10-21T07:26:18Z", + "updated_at": "2019-10-21T07:27:43Z", + "pushed_at": "2019-10-21T07:27:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9544.json b/2017/CVE-2017-9544.json new file mode 100644 index 0000000000..100298fda1 --- /dev/null +++ b/2017/CVE-2017-9544.json @@ -0,0 +1,25 @@ +[ + { + "id": 163818646, + "name": "CVE-2017-9544", + "full_name": "adenkiewicz\/CVE-2017-9544", + "owner": { + "login": "adenkiewicz", + "id": 1060275, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", + "html_url": "https:\/\/github.com\/adenkiewicz" + }, + "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2017-9544", + "description": "SEH BO based exploit for Easy Chat Server on Win 7 32b", + "fork": false, + "created_at": "2019-01-02T09:08:58Z", + "updated_at": "2019-05-04T15:54:27Z", + "pushed_at": "2019-01-02T09:10:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 2, + "forks": 2, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9554.json b/2017/CVE-2017-9554.json new file mode 100644 index 0000000000..a9ed64026c --- /dev/null +++ b/2017/CVE-2017-9554.json @@ -0,0 +1,25 @@ +[ + { + "id": 146395130, + "name": "Synology-DiskStation-User-Enumeration-CVE-2017-9554-", + "full_name": "rfcl\/Synology-DiskStation-User-Enumeration-CVE-2017-9554-", + "owner": { + "login": "rfcl", + "id": 28194115, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28194115?v=4", + "html_url": "https:\/\/github.com\/rfcl" + }, + "html_url": "https:\/\/github.com\/rfcl\/Synology-DiskStation-User-Enumeration-CVE-2017-9554-", + "description": "Tiny script to enumerate users using CVE-2017-9554 (forget_passwd.cgi) ", + "fork": false, + "created_at": "2018-08-28T05:13:59Z", + "updated_at": "2018-08-29T02:00:40Z", + "pushed_at": "2018-08-28T05:19:09Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9779.json b/2017/CVE-2017-9779.json new file mode 100644 index 0000000000..ae855a632c --- /dev/null +++ b/2017/CVE-2017-9779.json @@ -0,0 +1,25 @@ +[ + { + "id": 100739963, + "name": "CVE-2017-9779", + "full_name": "homjxi0e\/CVE-2017-9779", + "owner": { + "login": "homjxi0e", + "id": 25440152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", + "html_url": "https:\/\/github.com\/homjxi0e" + }, + "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9779", + "description": "Automatic execution Payload From Windows By Path Users All Exploit Via File bashrc ", + "fork": false, + "created_at": "2017-08-18T18:30:42Z", + "updated_at": "2017-09-11T14:35:42Z", + "pushed_at": "2017-09-11T23:28:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9791.json b/2017/CVE-2017-9791.json new file mode 100644 index 0000000000..649e3fc70a --- /dev/null +++ b/2017/CVE-2017-9791.json @@ -0,0 +1,71 @@ +[ + { + "id": 96536969, + "name": "s2-048", + "full_name": "IanSmith123\/s2-048", + "owner": { + "login": "IanSmith123", + "id": 19611084, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19611084?v=4", + "html_url": "https:\/\/github.com\/IanSmith123" + }, + "html_url": "https:\/\/github.com\/IanSmith123\/s2-048", + "description": "Apache struts struts 2 048, CVE-2017-9791.", + "fork": false, + "created_at": "2017-07-07T12:35:55Z", + "updated_at": "2017-07-07T14:05:07Z", + "pushed_at": "2017-07-07T17:10:50Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + }, + { + "id": 96565902, + "name": "Struts2-048", + "full_name": "dragoneeg\/Struts2-048", + "owner": { + "login": "dragoneeg", + "id": 4232461, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4232461?v=4", + "html_url": "https:\/\/github.com\/dragoneeg" + }, + "html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048", + "description": "CVE-2017-9791", + "fork": false, + "created_at": "2017-07-07T18:27:31Z", + "updated_at": "2020-10-21T14:13:27Z", + "pushed_at": "2017-07-08T02:08:36Z", + "stargazers_count": 26, + "watchers_count": 26, + "forks_count": 31, + "forks": 31, + "watchers": 26, + "score": 0 + }, + { + "id": 104592299, + "name": "CVE-2017-9791", + "full_name": "xfer0\/CVE-2017-9791", + "owner": { + "login": "xfer0", + "id": 30201498, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30201498?v=4", + "html_url": "https:\/\/github.com\/xfer0" + }, + "html_url": "https:\/\/github.com\/xfer0\/CVE-2017-9791", + "description": "Metasploit module for Apache Struts CVE-2017-9791 Remote Code Execution Vulnerability", + "fork": false, + "created_at": "2017-09-23T19:08:31Z", + "updated_at": "2019-05-02T18:56:11Z", + "pushed_at": "2019-05-02T18:56:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9798.json b/2017/CVE-2017-9798.json index 3625795eea..6bd3f4c5d0 100644 --- a/2017/CVE-2017-9798.json +++ b/2017/CVE-2017-9798.json @@ -1,4 +1,73 @@ [ + { + "id": 103955890, + "name": "CVE-2017-9798", + "full_name": "nitrado\/CVE-2017-9798", + "owner": { + "login": "nitrado", + "id": 3217095, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3217095?v=4", + "html_url": "https:\/\/github.com\/nitrado" + }, + "html_url": "https:\/\/github.com\/nitrado\/CVE-2017-9798", + "description": "Checks a shared hosting environment for CVE-2017-9798", + "fork": false, + "created_at": "2017-09-18T15:17:13Z", + "updated_at": "2021-03-10T05:40:19Z", + "pushed_at": "2017-09-18T15:38:40Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 2, + "forks": 2, + "watchers": 3, + "score": 0 + }, + { + "id": 104254696, + "name": "optionsbleed", + "full_name": "pabloec20\/optionsbleed", + "owner": { + "login": "pabloec20", + "id": 24191742, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4", + "html_url": "https:\/\/github.com\/pabloec20" + }, + "html_url": "https:\/\/github.com\/pabloec20\/optionsbleed", + "description": "CVE-2017-9798", + "fork": false, + "created_at": "2017-09-20T18:44:17Z", + "updated_at": "2020-11-23T17:31:10Z", + "pushed_at": "2017-09-20T18:45:54Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + }, + { + "id": 104625015, + "name": "CVE-2017-9798", + "full_name": "l0n3rs\/CVE-2017-9798", + "owner": { + "login": "l0n3rs", + "id": 31120718, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4", + "html_url": "https:\/\/github.com\/l0n3rs" + }, + "html_url": "https:\/\/github.com\/l0n3rs\/CVE-2017-9798", + "description": null, + "fork": false, + "created_at": "2017-09-24T06:51:32Z", + "updated_at": "2017-09-24T06:52:51Z", + "pushed_at": "2017-09-24T06:54:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, { "id": 104967629, "name": "OptionsBleed-POC-Scanner", diff --git a/2017/CVE-2017-9805.json b/2017/CVE-2017-9805.json index 27f7c59121..bbd303569e 100644 --- a/2017/CVE-2017-9805.json +++ b/2017/CVE-2017-9805.json @@ -22,6 +22,75 @@ "watchers": 55, "score": 0 }, + { + "id": 102714061, + "name": "struts2-rce-cve-2017-9805-ruby", + "full_name": "hahwul\/struts2-rce-cve-2017-9805-ruby", + "owner": { + "login": "hahwul", + "id": 13212227, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13212227?v=4", + "html_url": "https:\/\/github.com\/hahwul" + }, + "html_url": "https:\/\/github.com\/hahwul\/struts2-rce-cve-2017-9805-ruby", + "description": "cve -2017-9805", + "fork": false, + "created_at": "2017-09-07T08:49:14Z", + "updated_at": "2021-03-15T22:42:28Z", + "pushed_at": "2017-09-07T08:55:23Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 5, + "forks": 5, + "watchers": 2, + "score": 0 + }, + { + "id": 102917821, + "name": "struts-pwn_CVE-2017-9805", + "full_name": "mazen160\/struts-pwn_CVE-2017-9805", + "owner": { + "login": "mazen160", + "id": 8996052, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4", + "html_url": "https:\/\/github.com\/mazen160" + }, + "html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2017-9805", + "description": "An exploit for Apache Struts CVE-2017-9805", + "fork": false, + "created_at": "2017-09-09T01:32:57Z", + "updated_at": "2021-03-22T15:48:50Z", + "pushed_at": "2017-11-07T19:24:00Z", + "stargazers_count": 238, + "watchers_count": 238, + "forks_count": 78, + "forks": 78, + "watchers": 238, + "score": 0 + }, + { + "id": 103005989, + "name": "apache-struts-pwn_CVE-2017-9805", + "full_name": "Lone-Ranger\/apache-struts-pwn_CVE-2017-9805", + "owner": { + "login": "Lone-Ranger", + "id": 15882470, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15882470?v=4", + "html_url": "https:\/\/github.com\/Lone-Ranger" + }, + "html_url": "https:\/\/github.com\/Lone-Ranger\/apache-struts-pwn_CVE-2017-9805", + "description": "An exploit for Apache Struts CVE-2017-9805", + "fork": false, + "created_at": "2017-09-10T05:26:03Z", + "updated_at": "2020-11-24T23:21:26Z", + "pushed_at": "2017-09-10T05:28:03Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 9, + "forks": 9, + "watchers": 3, + "score": 0 + }, { "id": 111928630, "name": "-CVE-2017-9805", @@ -45,6 +114,98 @@ "watchers": 13, "score": 0 }, + { + "id": 112276528, + "name": "S2-052", + "full_name": "BeyondCy\/S2-052", + "owner": { + "login": "BeyondCy", + "id": 4694785, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4694785?v=4", + "html_url": "https:\/\/github.com\/BeyondCy" + }, + "html_url": "https:\/\/github.com\/BeyondCy\/S2-052", + "description": "CVE-2017-9805 - Exploit", + "fork": false, + "created_at": "2017-11-28T02:46:07Z", + "updated_at": "2020-11-24T14:16:12Z", + "pushed_at": "2017-10-20T21:04:38Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 113078841, + "name": "cve-2017-9805.py", + "full_name": "chrisjd20\/cve-2017-9805.py", + "owner": { + "login": "chrisjd20", + "id": 11812223, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11812223?v=4", + "html_url": "https:\/\/github.com\/chrisjd20" + }, + "html_url": "https:\/\/github.com\/chrisjd20\/cve-2017-9805.py", + "description": "Better Exploit Code For CVE 2017 9805 apache struts", + "fork": false, + "created_at": "2017-12-04T18:23:53Z", + "updated_at": "2020-11-25T21:45:43Z", + "pushed_at": "2017-12-23T14:07:59Z", + "stargazers_count": 21, + "watchers_count": 21, + "forks_count": 8, + "forks": 8, + "watchers": 21, + "score": 0 + }, + { + "id": 205600969, + "name": "struts_rest_rce_fuzz-CVE-2017-9805-", + "full_name": "UbuntuStrike\/struts_rest_rce_fuzz-CVE-2017-9805-", + "owner": { + "login": "UbuntuStrike", + "id": 30779753, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30779753?v=4", + "html_url": "https:\/\/github.com\/UbuntuStrike" + }, + "html_url": "https:\/\/github.com\/UbuntuStrike\/struts_rest_rce_fuzz-CVE-2017-9805-", + "description": "Simple python script to fuzz site for CVE-2017-9805", + "fork": false, + "created_at": "2019-08-31T22:06:31Z", + "updated_at": "2019-08-31T23:36:02Z", + "pushed_at": "2019-08-31T23:36:00Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 205945238, + "name": "CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit", + "full_name": "UbuntuStrike\/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit", + "owner": { + "login": "UbuntuStrike", + "id": 30779753, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30779753?v=4", + "html_url": "https:\/\/github.com\/UbuntuStrike" + }, + "html_url": "https:\/\/github.com\/UbuntuStrike\/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit", + "description": "A script to Fuzz and and exploit Apache struts CVE-2017-9805", + "fork": false, + "created_at": "2019-09-02T22:24:07Z", + "updated_at": "2020-06-18T02:43:56Z", + "pushed_at": "2019-09-02T22:36:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 263410855, "name": "CVE-2017-9805---Documentation---IT19143378", diff --git a/2017/CVE-2017-9830.json b/2017/CVE-2017-9830.json new file mode 100644 index 0000000000..10d613e62a --- /dev/null +++ b/2017/CVE-2017-9830.json @@ -0,0 +1,25 @@ +[ + { + "id": 200326896, + "name": "CVE-2017-9830", + "full_name": "securifera\/CVE-2017-9830", + "owner": { + "login": "securifera", + "id": 12126525, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4", + "html_url": "https:\/\/github.com\/securifera" + }, + "html_url": "https:\/\/github.com\/securifera\/CVE-2017-9830", + "description": null, + "fork": false, + "created_at": "2019-08-03T03:29:12Z", + "updated_at": "2020-03-30T03:50:32Z", + "pushed_at": "2019-08-03T05:38:40Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-98505.json b/2017/CVE-2017-98505.json new file mode 100644 index 0000000000..4060b36c34 --- /dev/null +++ b/2017/CVE-2017-98505.json @@ -0,0 +1,25 @@ +[ + { + "id": 103377643, + "name": "Struts2Vuln", + "full_name": "mike-williams\/Struts2Vuln", + "owner": { + "login": "mike-williams", + "id": 3205476, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3205476?v=4", + "html_url": "https:\/\/github.com\/mike-williams" + }, + "html_url": "https:\/\/github.com\/mike-williams\/Struts2Vuln", + "description": "Struts 2 web app that is vulnerable to CVE-2017-98505 and CVE-2017-5638", + "fork": false, + "created_at": "2017-09-13T09:01:34Z", + "updated_at": "2018-08-05T19:22:28Z", + "pushed_at": "2017-09-15T14:39:25Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9934.json b/2017/CVE-2017-9934.json new file mode 100644 index 0000000000..98f0a53066 --- /dev/null +++ b/2017/CVE-2017-9934.json @@ -0,0 +1,25 @@ +[ + { + "id": 100877312, + "name": "CVE-2017-9934", + "full_name": "xyringe\/CVE-2017-9934", + "owner": { + "login": "xyringe", + "id": 24970727, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24970727?v=4", + "html_url": "https:\/\/github.com\/xyringe" + }, + "html_url": "https:\/\/github.com\/xyringe\/CVE-2017-9934", + "description": "Joomla 1.7.3 - 3.7.2 CSRF exploit PoC", + "fork": false, + "created_at": "2017-08-20T17:23:44Z", + "updated_at": "2018-07-04T04:13:50Z", + "pushed_at": "2018-07-04T04:13:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-9999.json b/2017/CVE-2017-9999.json new file mode 100644 index 0000000000..3aa24f6645 --- /dev/null +++ b/2017/CVE-2017-9999.json @@ -0,0 +1,25 @@ +[ + { + "id": 106589531, + "name": "CVE-2017-9999_bypassing_General_Firefox", + "full_name": "homjxi0e\/CVE-2017-9999_bypassing_General_Firefox", + "owner": { + "login": "homjxi0e", + "id": 25440152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", + "html_url": "https:\/\/github.com\/homjxi0e" + }, + "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9999_bypassing_General_Firefox", + "description": null, + "fork": false, + "created_at": "2017-10-11T17:54:50Z", + "updated_at": "2017-10-11T17:54:50Z", + "pushed_at": "2017-10-11T17:54:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-0296.json b/2018/CVE-2018-0296.json index 944f3b3e18..7e3204a949 100644 --- a/2018/CVE-2018-0296.json +++ b/2018/CVE-2018-0296.json @@ -67,28 +67,5 @@ "forks": 2, "watchers": 1, "score": 0 - }, - { - "id": 162431036, - "name": "CVE-2018-0296", - "full_name": "qiantu88\/CVE-2018-0296", - "owner": { - "login": "qiantu88", - "id": 35452263, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4", - "html_url": "https:\/\/github.com\/qiantu88" - }, - "html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-0296", - "description": "https:\/\/github.com\/milo2012\/CVE-2018-0296.git", - "fork": false, - "created_at": "2018-12-19T11:57:43Z", - "updated_at": "2018-12-19T11:59:47Z", - "pushed_at": "2018-12-19T11:59:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-0952.json b/2018/CVE-2018-0952.json deleted file mode 100644 index 3bb7e422a2..0000000000 --- a/2018/CVE-2018-0952.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 145615979, - "name": "CVE-2018-0952-SystemCollector", - "full_name": "atredispartners\/CVE-2018-0952-SystemCollector", - "owner": { - "login": "atredispartners", - "id": 7254370, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7254370?v=4", - "html_url": "https:\/\/github.com\/atredispartners" - }, - "html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector", - "description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service", - "fork": false, - "created_at": "2018-08-21T20:29:10Z", - "updated_at": "2021-03-25T23:02:29Z", - "pushed_at": "2018-08-21T20:30:24Z", - "stargazers_count": 108, - "watchers_count": 108, - "forks_count": 36, - "forks": 36, - "watchers": 108, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-1000134.json b/2018/CVE-2018-1000134.json deleted file mode 100644 index 0d223efbd5..0000000000 --- a/2018/CVE-2018-1000134.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 156499957, - "name": "cve-2018-1000134", - "full_name": "dragotime\/cve-2018-1000134", - "owner": { - "login": "dragotime", - "id": 43851975, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43851975?v=4", - "html_url": "https:\/\/github.com\/dragotime" - }, - "html_url": "https:\/\/github.com\/dragotime\/cve-2018-1000134", - "description": null, - "fork": false, - "created_at": "2018-11-07T06:22:47Z", - "updated_at": "2018-11-07T06:22:47Z", - "pushed_at": "2018-11-07T06:22:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-1000802.json b/2018/CVE-2018-1000802.json deleted file mode 100644 index 4f7b78445b..0000000000 --- a/2018/CVE-2018-1000802.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 148814288, - "name": "CVE-2018-1000802-PoC", - "full_name": "tna0y\/CVE-2018-1000802-PoC", - "owner": { - "login": "tna0y", - "id": 22504374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22504374?v=4", - "html_url": "https:\/\/github.com\/tna0y" - }, - "html_url": "https:\/\/github.com\/tna0y\/CVE-2018-1000802-PoC", - "description": "Python CVE-2018-1000802 Proof-of-Concept", - "fork": false, - "created_at": "2018-09-14T16:22:12Z", - "updated_at": "2020-05-29T07:36:51Z", - "pushed_at": "2018-09-14T16:38:29Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-1002105.json b/2018/CVE-2018-1002105.json index 177c8ae235..7b2de7a7fa 100644 --- a/2018/CVE-2018-1002105.json +++ b/2018/CVE-2018-1002105.json @@ -1,50 +1,4 @@ [ - { - "id": 160451056, - "name": "cve-2018-1002105", - "full_name": "gravitational\/cve-2018-1002105", - "owner": { - "login": "gravitational", - "id": 10781132, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10781132?v=4", - "html_url": "https:\/\/github.com\/gravitational" - }, - "html_url": "https:\/\/github.com\/gravitational\/cve-2018-1002105", - "description": "Test utility for cve-2018-1002105", - "fork": false, - "created_at": "2018-12-05T02:51:43Z", - "updated_at": "2021-03-02T14:25:22Z", - "pushed_at": "2018-12-13T16:56:28Z", - "stargazers_count": 193, - "watchers_count": 193, - "forks_count": 26, - "forks": 26, - "watchers": 193, - "score": 0 - }, - { - "id": 160665138, - "name": "poc_CVE-2018-1002105", - "full_name": "evict\/poc_CVE-2018-1002105", - "owner": { - "login": "evict", - "id": 7238650, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7238650?v=4", - "html_url": "https:\/\/github.com\/evict" - }, - "html_url": "https:\/\/github.com\/evict\/poc_CVE-2018-1002105", - "description": "PoC for CVE-2018-1002105.", - "fork": false, - "created_at": "2018-12-06T11:28:02Z", - "updated_at": "2021-03-04T03:16:53Z", - "pushed_at": "2018-12-21T14:34:04Z", - "stargazers_count": 216, - "watchers_count": 216, - "forks_count": 39, - "forks": 39, - "watchers": 216, - "score": 0 - }, { "id": 161109755, "name": "Kubernetes-1.12.3-all-auto-install", diff --git a/2018/CVE-2018-10517.json b/2018/CVE-2018-10517.json deleted file mode 100644 index b0fa8639f7..0000000000 --- a/2018/CVE-2018-10517.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 156886365, - "name": "CVE-2018-10517", - "full_name": "0x00-0x00\/CVE-2018-10517", - "owner": { - "login": "0x00-0x00", - "id": 23364530, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", - "html_url": "https:\/\/github.com\/0x00-0x00" - }, - "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10517", - "description": "CMS Made Simple 2.2.7 RCE exploit", - "fork": false, - "created_at": "2018-11-09T16:09:39Z", - "updated_at": "2020-06-07T11:21:05Z", - "pushed_at": "2018-11-09T16:09:46Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 4, - "forks": 4, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 4168cbf0ae..3daa1578dd 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -1,27 +1,4 @@ [ - { - "id": 153427159, - "name": "CVE-2018-10933", - "full_name": "SoledaD208\/CVE-2018-10933", - "owner": { - "login": "SoledaD208", - "id": 8731578, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8731578?v=4", - "html_url": "https:\/\/github.com\/SoledaD208" - }, - "html_url": "https:\/\/github.com\/SoledaD208\/CVE-2018-10933", - "description": "CVE-2018-10933 very simple POC", - "fork": false, - "created_at": "2018-10-17T09:01:44Z", - "updated_at": "2020-12-18T03:51:25Z", - "pushed_at": "2018-10-23T13:51:06Z", - "stargazers_count": 131, - "watchers_count": 131, - "forks_count": 40, - "forks": 40, - "watchers": 131, - "score": 0 - }, { "id": 153468806, "name": "CVE-2018-10933", @@ -45,328 +22,6 @@ "watchers": 469, "score": 0 }, - { - "id": 153477523, - "name": "CVE-2018-10933", - "full_name": "hook-s3c\/CVE-2018-10933", - "owner": { - "login": "hook-s3c", - "id": 31825993, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4", - "html_url": "https:\/\/github.com\/hook-s3c" - }, - "html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933", - "description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit", - "fork": false, - "created_at": "2018-10-17T15:09:41Z", - "updated_at": "2018-10-17T15:09:44Z", - "pushed_at": "2018-10-17T15:09:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 153506738, - "name": "CVE-2018-10933", - "full_name": "kn6869610\/CVE-2018-10933", - "owner": { - "login": "kn6869610", - "id": 6917744, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4", - "html_url": "https:\/\/github.com\/kn6869610" - }, - "html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933", - "description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.", - "fork": false, - "created_at": "2018-10-17T18:44:05Z", - "updated_at": "2018-10-22T03:02:27Z", - "pushed_at": "2018-10-17T18:45:30Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 3, - "forks": 3, - "watchers": 13, - "score": 0 - }, - { - "id": 153534574, - "name": "libssh-scanner", - "full_name": "leapsecurity\/libssh-scanner", - "owner": { - "login": "leapsecurity", - "id": 40601062, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40601062?v=4", - "html_url": "https:\/\/github.com\/leapsecurity" - }, - "html_url": "https:\/\/github.com\/leapsecurity\/libssh-scanner", - "description": "Script to identify hosts vulnerable to CVE-2018-10933", - "fork": false, - "created_at": "2018-10-17T23:05:10Z", - "updated_at": "2021-03-27T04:56:42Z", - "pushed_at": "2018-11-04T17:29:33Z", - "stargazers_count": 230, - "watchers_count": 230, - "forks_count": 55, - "forks": 55, - "watchers": 230, - "score": 0 - }, - { - "id": 153562229, - "name": "CVE-2018-10933_ssh", - "full_name": "likescam\/CVE-2018-10933_ssh", - "owner": { - "login": "likescam", - "id": 2469038, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", - "html_url": "https:\/\/github.com\/likescam" - }, - "html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh", - "description": null, - "fork": false, - "created_at": "2018-10-18T04:10:25Z", - "updated_at": "2018-10-18T04:10:39Z", - "pushed_at": "2018-10-18T04:10:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 153562319, - "name": "bpnd-libssh", - "full_name": "trbpnd\/bpnd-libssh", - "owner": { - "login": "trbpnd", - "id": 39193403, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4", - "html_url": "https:\/\/github.com\/trbpnd" - }, - "html_url": "https:\/\/github.com\/trbpnd\/bpnd-libssh", - "description": "Multi-threaded, reliable scanner for CVE-2018-10933.", - "fork": false, - "created_at": "2018-10-18T04:11:33Z", - "updated_at": "2018-10-23T03:13:35Z", - "pushed_at": "2018-10-22T16:44:13Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 2, - "forks": 2, - "watchers": 5, - "score": 0 - }, - { - "id": 153598283, - "name": "CVE-2018-10933-libSSH-Authentication-Bypass", - "full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass", - "owner": { - "login": "likescam", - "id": 2469038, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", - "html_url": "https:\/\/github.com\/likescam" - }, - "html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass", - "description": null, - "fork": false, - "created_at": "2018-10-18T09:27:08Z", - "updated_at": "2018-10-18T16:47:53Z", - "pushed_at": "2018-10-18T09:27:22Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 153643745, - "name": "hunt-for-cve-2018-10933", - "full_name": "marco-lancini\/hunt-for-cve-2018-10933", - "owner": { - "login": "marco-lancini", - "id": 1472968, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4", - "html_url": "https:\/\/github.com\/marco-lancini" - }, - "html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933", - "description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)", - "fork": false, - "created_at": "2018-10-18T15:08:25Z", - "updated_at": "2020-10-25T16:36:25Z", - "pushed_at": "2018-10-18T15:11:35Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 4, - "forks": 4, - "watchers": 10, - "score": 0 - }, - { - "id": 153675108, - "name": "cve-2018-10933", - "full_name": "hackerhouse-opensource\/cve-2018-10933", - "owner": { - "login": "hackerhouse-opensource", - "id": 43967630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4", - "html_url": "https:\/\/github.com\/hackerhouse-opensource" - }, - "html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2018-10933", - "description": "cve-2018-10933 libssh authentication bypass", - "fork": false, - "created_at": "2018-10-18T19:13:45Z", - "updated_at": "2021-04-06T23:55:16Z", - "pushed_at": "2018-10-21T21:24:29Z", - "stargazers_count": 98, - "watchers_count": 98, - "forks_count": 31, - "forks": 31, - "watchers": 98, - "score": 0 - }, - { - "id": 153681539, - "name": "cve-2018-10933", - "full_name": "cve-2018\/cve-2018-10933", - "owner": { - "login": "cve-2018", - "id": 44275695, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44275695?v=4", - "html_url": "https:\/\/github.com\/cve-2018" - }, - "html_url": "https:\/\/github.com\/cve-2018\/cve-2018-10933", - "description": null, - "fork": false, - "created_at": "2018-10-18T20:11:22Z", - "updated_at": "2018-10-23T03:22:26Z", - "pushed_at": "2018-10-23T03:22:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 153855090, - "name": "CVE-2018-10933", - "full_name": "jas502n\/CVE-2018-10933", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933", - "description": "libssh CVE-2018-10933", - "fork": false, - "created_at": "2018-10-20T00:24:04Z", - "updated_at": "2019-07-31T09:33:04Z", - "pushed_at": "2018-10-20T00:29:04Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 5, - "forks": 5, - "watchers": 19, - "score": 0 - }, - { - "id": 153856713, - "name": "cve-2018-10933_poc", - "full_name": "ninp0\/cve-2018-10933_poc", - "owner": { - "login": "ninp0", - "id": 1008583, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4", - "html_url": "https:\/\/github.com\/ninp0" - }, - "html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc", - "description": "Variant of hackerhouse-opensource\/cve-2018-10933", - "fork": false, - "created_at": "2018-10-20T00:53:24Z", - "updated_at": "2018-10-22T15:05:53Z", - "pushed_at": "2018-10-20T01:53:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 153878160, - "name": "CVE-2018-10933_Scanner", - "full_name": "pghook\/CVE-2018-10933_Scanner", - "owner": { - "login": "pghook", - "id": 14160529, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4", - "html_url": "https:\/\/github.com\/pghook" - }, - "html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner", - "description": null, - "fork": false, - "created_at": "2018-10-20T06:53:59Z", - "updated_at": "2020-05-15T17:20:56Z", - "pushed_at": "2018-10-20T04:54:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 3, - "forks": 3, - "watchers": 0, - "score": 0 - }, - { - "id": 153920395, - "name": "POC-CVE-2018-10933", - "full_name": "Virgula0\/POC-CVE-2018-10933", - "owner": { - "login": "Virgula0", - "id": 16546435, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16546435?v=4", - "html_url": "https:\/\/github.com\/Virgula0" - }, - "html_url": "https:\/\/github.com\/Virgula0\/POC-CVE-2018-10933", - "description": "LibSSH Authentication Bypass Exploit using RCE", - "fork": false, - "created_at": "2018-10-20T15:34:26Z", - "updated_at": "2021-03-03T11:40:37Z", - "pushed_at": "2018-10-25T18:23:52Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 8, - "forks": 8, - "watchers": 12, - "score": 0 - }, - { - "id": 153975086, - "name": "pythonprojects-CVE-2018-10933", - "full_name": "shifa123\/pythonprojects-CVE-2018-10933", - "owner": { - "login": "shifa123", - "id": 18241082, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4", - "html_url": "https:\/\/github.com\/shifa123" - }, - "html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933", - "description": "CVE-2018-10933", - "fork": false, - "created_at": "2018-10-21T05:01:12Z", - "updated_at": "2021-01-15T03:06:17Z", - "pushed_at": "2018-10-21T05:13:13Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 4, - "forks": 4, - "watchers": 2, - "score": 0 - }, { "id": 154050332, "name": "CVE-2018-10933", @@ -390,190 +45,6 @@ "watchers": 4, "score": 0 }, - { - "id": 154390432, - "name": "CVE-2018-10933", - "full_name": "Bifrozt\/CVE-2018-10933", - "owner": { - "login": "Bifrozt", - "id": 8437560, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8437560?v=4", - "html_url": "https:\/\/github.com\/Bifrozt" - }, - "html_url": "https:\/\/github.com\/Bifrozt\/CVE-2018-10933", - "description": "CVE-2018-10933", - "fork": false, - "created_at": "2018-10-23T20:11:35Z", - "updated_at": "2018-10-23T20:14:53Z", - "pushed_at": "2018-10-23T20:14:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 154398082, - "name": "CVE-2018-10933", - "full_name": "r3dxpl0it\/CVE-2018-10933", - "owner": { - "login": "r3dxpl0it", - "id": 43002597, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4", - "html_url": "https:\/\/github.com\/r3dxpl0it" - }, - "html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-10933", - "description": "CVE-2018-10933 POC (LIBSSH)", - "fork": false, - "created_at": "2018-10-23T21:17:52Z", - "updated_at": "2021-03-03T11:40:35Z", - "pushed_at": "2018-10-24T07:58:27Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 3, - "forks": 3, - "watchers": 2, - "score": 0 - }, - { - "id": 154500673, - "name": "libssh-scanner", - "full_name": "ivanacostarubio\/libssh-scanner", - "owner": { - "login": "ivanacostarubio", - "id": 16559, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16559?v=4", - "html_url": "https:\/\/github.com\/ivanacostarubio" - }, - "html_url": "https:\/\/github.com\/ivanacostarubio\/libssh-scanner", - "description": "A libssh CVE-2018-10933 scanner written in rust", - "fork": false, - "created_at": "2018-10-24T12:52:09Z", - "updated_at": "2019-02-24T23:51:07Z", - "pushed_at": "2018-10-24T12:52:31Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 154520949, - "name": "precompiled-CVE-2018-10933", - "full_name": "throwawayaccount12312312\/precompiled-CVE-2018-10933", - "owner": { - "login": "throwawayaccount12312312", - "id": 44440605, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44440605?v=4", - "html_url": "https:\/\/github.com\/throwawayaccount12312312" - }, - "html_url": "https:\/\/github.com\/throwawayaccount12312312\/precompiled-CVE-2018-10933", - "description": null, - "fork": false, - "created_at": "2018-10-24T15:02:51Z", - "updated_at": "2018-10-24T15:04:19Z", - "pushed_at": "2018-10-24T15:04:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 154621353, - "name": "CVE-2018-10933", - "full_name": "ensimag-security\/CVE-2018-10933", - "owner": { - "login": "ensimag-security", - "id": 44459067, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44459067?v=4", - "html_url": "https:\/\/github.com\/ensimag-security" - }, - "html_url": "https:\/\/github.com\/ensimag-security\/CVE-2018-10933", - "description": null, - "fork": false, - "created_at": "2018-10-25T06:32:06Z", - "updated_at": "2018-11-28T14:11:24Z", - "pushed_at": "2018-11-28T14:14:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 157908147, - "name": "libSSH-bypass", - "full_name": "Ad1bDaw\/libSSH-bypass", - "owner": { - "login": "Ad1bDaw", - "id": 35436703, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35436703?v=4", - "html_url": "https:\/\/github.com\/Ad1bDaw" - }, - "html_url": "https:\/\/github.com\/Ad1bDaw\/libSSH-bypass", - "description": "Implementation of CVE-2018-10933 with CIDR block scanner ", - "fork": false, - "created_at": "2018-11-16T18:46:28Z", - "updated_at": "2018-11-16T19:00:29Z", - "pushed_at": "2018-11-16T19:00:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 158524069, - "name": "CVE-2018-10933-POC", - "full_name": "sambiyal\/CVE-2018-10933-POC", - "owner": { - "login": "sambiyal", - "id": 25122043, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25122043?v=4", - "html_url": "https:\/\/github.com\/sambiyal" - }, - "html_url": "https:\/\/github.com\/sambiyal\/CVE-2018-10933-POC", - "description": "libSSH bypass", - "fork": false, - "created_at": "2018-11-21T09:34:12Z", - "updated_at": "2018-11-21T09:57:11Z", - "pushed_at": "2018-11-21T09:43:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 162456991, - "name": "LibSSH-Authentication-Bypass", - "full_name": "nikhil1232\/LibSSH-Authentication-Bypass", - "owner": { - "login": "nikhil1232", - "id": 39535219, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39535219?v=4", - "html_url": "https:\/\/github.com\/nikhil1232" - }, - "html_url": "https:\/\/github.com\/nikhil1232\/LibSSH-Authentication-Bypass", - "description": "LibSSH Authentication Bypass CVE-2018-10933", - "fork": false, - "created_at": "2018-12-19T15:33:00Z", - "updated_at": "2020-01-09T05:02:59Z", - "pushed_at": "2018-12-19T15:46:37Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 1, - "forks": 1, - "watchers": 5, - "score": 0 - }, { "id": 169983604, "name": "LibSSH-exploit", diff --git a/2018/CVE-2018-10949.json b/2018/CVE-2018-10949.json deleted file mode 100644 index 8947766396..0000000000 --- a/2018/CVE-2018-10949.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 147528239, - "name": "CVE-2018-10949", - "full_name": "0x00-0x00\/CVE-2018-10949", - "owner": { - "login": "0x00-0x00", - "id": 23364530, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", - "html_url": "https:\/\/github.com\/0x00-0x00" - }, - "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10949", - "description": "Zimbra Collaboration Suite Username Enumeration ", - "fork": false, - "created_at": "2018-09-05T14:09:13Z", - "updated_at": "2020-10-20T18:45:33Z", - "pushed_at": "2018-09-05T14:10:09Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 3, - "forks": 3, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-11235.json b/2018/CVE-2018-11235.json index 5acee83a25..6dcfc262d4 100644 --- a/2018/CVE-2018-11235.json +++ b/2018/CVE-2018-11235.json @@ -137,29 +137,6 @@ "watchers": 1, "score": 0 }, - { - "id": 143149359, - "name": "CVE-2018-11235", - "full_name": "knqyf263\/CVE-2018-11235", - "owner": { - "login": "knqyf263", - "id": 2253692, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", - "html_url": "https:\/\/github.com\/knqyf263" - }, - "html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11235", - "description": "CVE-2018-11235 (Git)", - "fork": false, - "created_at": "2018-08-01T11:52:54Z", - "updated_at": "2019-04-24T05:32:20Z", - "pushed_at": "2018-11-23T14:34:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 160238249, "name": "CVE-2018-11235", diff --git a/2018/CVE-2018-11759.json b/2018/CVE-2018-11759.json index 45a1c0eeac..0ea5d197aa 100644 --- a/2018/CVE-2018-11759.json +++ b/2018/CVE-2018-11759.json @@ -1,27 +1,4 @@ [ - { - "id": 155689679, - "name": "CVE-2018-11759", - "full_name": "immunIT\/CVE-2018-11759", - "owner": { - "login": "immunIT", - "id": 17569882, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17569882?v=4", - "html_url": "https:\/\/github.com\/immunIT" - }, - "html_url": "https:\/\/github.com\/immunIT\/CVE-2018-11759", - "description": "Proof of concept showing how to exploit the CVE-2018-11759", - "fork": false, - "created_at": "2018-11-01T09:11:07Z", - "updated_at": "2020-07-13T15:43:59Z", - "pushed_at": "2018-12-11T12:59:26Z", - "stargazers_count": 35, - "watchers_count": 35, - "forks_count": 14, - "forks": 14, - "watchers": 35, - "score": 0 - }, { "id": 160896534, "name": "Identificador-CVE-2018-11759", diff --git a/2018/CVE-2018-11776.json b/2018/CVE-2018-11776.json index b6a5b88484..ab1062fb93 100644 --- a/2018/CVE-2018-11776.json +++ b/2018/CVE-2018-11776.json @@ -1,27 +1,4 @@ [ - { - "id": 145897861, - "name": "CVE-2018-11776", - "full_name": "trbpnd\/CVE-2018-11776", - "owner": { - "login": "trbpnd", - "id": 39193403, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4", - "html_url": "https:\/\/github.com\/trbpnd" - }, - "html_url": "https:\/\/github.com\/trbpnd\/CVE-2018-11776", - "description": "Docker image for a vulnerable struts app", - "fork": false, - "created_at": "2018-08-23T19:25:26Z", - "updated_at": "2018-08-23T19:28:53Z", - "pushed_at": "2018-08-23T19:28:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 145901668, "name": "CVE-2018-11776", @@ -45,236 +22,6 @@ "watchers": 14, "score": 0 }, - { - "id": 145935231, - "name": "CVE-2018-11776", - "full_name": "jiguangin\/CVE-2018-11776", - "owner": { - "login": "jiguangin", - "id": 22545712, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22545712?v=4", - "html_url": "https:\/\/github.com\/jiguangin" - }, - "html_url": "https:\/\/github.com\/jiguangin\/CVE-2018-11776", - "description": "CVE-2018-11776(S2-057) EXPLOIT CODE", - "fork": false, - "created_at": "2018-08-24T03:01:29Z", - "updated_at": "2020-12-29T15:23:34Z", - "pushed_at": "2018-08-24T03:27:02Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 5, - "forks": 5, - "watchers": 10, - "score": 0 - }, - { - "id": 145985371, - "name": "CVE-2018-11776-Python-PoC", - "full_name": "hook-s3c\/CVE-2018-11776-Python-PoC", - "owner": { - "login": "hook-s3c", - "id": 31825993, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4", - "html_url": "https:\/\/github.com\/hook-s3c" - }, - "html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-11776-Python-PoC", - "description": "Working Python test and PoC for CVE-2018-11776, includes Docker lab", - "fork": false, - "created_at": "2018-08-24T11:53:02Z", - "updated_at": "2021-03-01T18:21:49Z", - "pushed_at": "2018-08-25T02:14:49Z", - "stargazers_count": 118, - "watchers_count": 118, - "forks_count": 49, - "forks": 49, - "watchers": 118, - "score": 0 - }, - { - "id": 146056002, - "name": "struts-pwn_CVE-2018-11776", - "full_name": "mazen160\/struts-pwn_CVE-2018-11776", - "owner": { - "login": "mazen160", - "id": 8996052, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4", - "html_url": "https:\/\/github.com\/mazen160" - }, - "html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2018-11776", - "description": " An exploit for Apache Struts CVE-2018-11776", - "fork": false, - "created_at": "2018-08-25T01:53:30Z", - "updated_at": "2021-04-08T06:32:37Z", - "pushed_at": "2018-08-26T02:31:39Z", - "stargazers_count": 300, - "watchers_count": 300, - "forks_count": 102, - "forks": 102, - "watchers": 300, - "score": 0 - }, - { - "id": 146060181, - "name": "CVE-2018-11776", - "full_name": "bhdresh\/CVE-2018-11776", - "owner": { - "login": "bhdresh", - "id": 8931885, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4", - "html_url": "https:\/\/github.com\/bhdresh" - }, - "html_url": "https:\/\/github.com\/bhdresh\/CVE-2018-11776", - "description": "Vulnerable docker container for CVE-2018-11776", - "fork": false, - "created_at": "2018-08-25T03:06:30Z", - "updated_at": "2020-01-06T22:41:00Z", - "pushed_at": "2018-08-25T04:53:35Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 5, - "forks": 5, - "watchers": 8, - "score": 0 - }, - { - "id": 146094544, - "name": "CVE-2018-11776", - "full_name": "knqyf263\/CVE-2018-11776", - "owner": { - "login": "knqyf263", - "id": 2253692, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", - "html_url": "https:\/\/github.com\/knqyf263" - }, - "html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11776", - "description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)", - "fork": false, - "created_at": "2018-08-25T12:45:15Z", - "updated_at": "2021-01-19T03:50:38Z", - "pushed_at": "2018-08-25T14:20:46Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, - "forks": 2, - "watchers": 4, - "score": 0 - }, - { - "id": 146330536, - "name": "Strutter", - "full_name": "Ekultek\/Strutter", - "owner": { - "login": "Ekultek", - "id": 14183473, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14183473?v=4", - "html_url": "https:\/\/github.com\/Ekultek" - }, - "html_url": "https:\/\/github.com\/Ekultek\/Strutter", - "description": "Proof of Concept for CVE-2018-11776", - "fork": false, - "created_at": "2018-08-27T17:22:16Z", - "updated_at": "2020-12-12T20:05:33Z", - "pushed_at": "2018-09-12T14:28:35Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 3, - "forks": 3, - "watchers": 20, - "score": 0 - }, - { - "id": 146373342, - "name": "cve-2018-11776-docker", - "full_name": "tuxotron\/cve-2018-11776-docker", - "owner": { - "login": "tuxotron", - "id": 937637, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/937637?v=4", - "html_url": "https:\/\/github.com\/tuxotron" - }, - "html_url": "https:\/\/github.com\/tuxotron\/cve-2018-11776-docker", - "description": null, - "fork": false, - "created_at": "2018-08-28T01:14:52Z", - "updated_at": "2019-09-24T14:38:18Z", - "pushed_at": "2018-08-29T17:58:27Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, - "score": 0 - }, - { - "id": 146519519, - "name": "S2-057-CVE-2018-11776", - "full_name": "brianwrf\/S2-057-CVE-2018-11776", - "owner": { - "login": "brianwrf", - "id": 8141813, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", - "html_url": "https:\/\/github.com\/brianwrf" - }, - "html_url": "https:\/\/github.com\/brianwrf\/S2-057-CVE-2018-11776", - "description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)", - "fork": false, - "created_at": "2018-08-28T23:48:14Z", - "updated_at": "2018-12-23T03:47:07Z", - "pushed_at": "2018-08-29T00:03:56Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 4, - "forks": 4, - "watchers": 15, - "score": 0 - }, - { - "id": 146650579, - "name": "Apache-Struts-Shodan-Exploit", - "full_name": "649\/Apache-Struts-Shodan-Exploit", - "owner": { - "login": "649", - "id": 23534047, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23534047?v=4", - "html_url": "https:\/\/github.com\/649" - }, - "html_url": "https:\/\/github.com\/649\/Apache-Struts-Shodan-Exploit", - "description": "This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.", - "fork": false, - "created_at": "2018-08-29T19:50:26Z", - "updated_at": "2021-03-25T22:36:46Z", - "pushed_at": "2018-08-30T00:16:01Z", - "stargazers_count": 53, - "watchers_count": 53, - "forks_count": 17, - "forks": 17, - "watchers": 53, - "score": 0 - }, - { - "id": 147746262, - "name": "CVE-2018-11776-Python-PoC", - "full_name": "jezzus\/CVE-2018-11776-Python-PoC", - "owner": { - "login": "jezzus", - "id": 9899999, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9899999?v=4", - "html_url": "https:\/\/github.com\/jezzus" - }, - "html_url": "https:\/\/github.com\/jezzus\/CVE-2018-11776-Python-PoC", - "description": null, - "fork": false, - "created_at": "2018-09-06T23:49:20Z", - "updated_at": "2018-09-06T23:49:20Z", - "pushed_at": "2018-09-06T23:49:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 164352202, "name": "cve-2018-11776", diff --git a/2018/CVE-2018-11788.json b/2018/CVE-2018-11788.json deleted file mode 100644 index a299ef6997..0000000000 --- a/2018/CVE-2018-11788.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 164298909, - "name": "CVE-2018-11788", - "full_name": "brianwrf\/CVE-2018-11788", - "owner": { - "login": "brianwrf", - "id": 8141813, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", - "html_url": "https:\/\/github.com\/brianwrf" - }, - "html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11788", - "description": "Apache Karaf XXE Vulnerability (CVE-2018-11788)", - "fork": false, - "created_at": "2019-01-06T11:01:39Z", - "updated_at": "2020-03-29T02:47:45Z", - "pushed_at": "2019-01-06T11:50:43Z", - "stargazers_count": 36, - "watchers_count": 36, - "forks_count": 5, - "forks": 5, - "watchers": 36, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-12018.json b/2018/CVE-2018-12018.json deleted file mode 100644 index 46fac5724c..0000000000 --- a/2018/CVE-2018-12018.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 153770795, - "name": "CVE-2018-12018", - "full_name": "k3v142\/CVE-2018-12018", - "owner": { - "login": "k3v142", - "id": 12337759, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12337759?v=4", - "html_url": "https:\/\/github.com\/k3v142" - }, - "html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018", - "description": "EPoD (Ethereum Packet of Death)", - "fork": false, - "created_at": "2018-10-19T11:11:01Z", - "updated_at": "2019-12-14T15:32:33Z", - "pushed_at": "2018-10-20T21:07:42Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 0, - "forks": 0, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-12038.json b/2018/CVE-2018-12038.json deleted file mode 100644 index 7f4e8c6f0e..0000000000 --- a/2018/CVE-2018-12038.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 162155985, - "name": "remote-bitlocker-encryption-report", - "full_name": "gdraperi\/remote-bitlocker-encryption-report", - "owner": { - "login": "gdraperi", - "id": 33750242, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33750242?v=4", - "html_url": "https:\/\/github.com\/gdraperi" - }, - "html_url": "https:\/\/github.com\/gdraperi\/remote-bitlocker-encryption-report", - "description": "PowerShell script to mitigate CVE-2018-12038. The script takes a list of PC as input, gets their BitLocker encryption type remotely, and outputs a report as a CSV file", - "fork": false, - "created_at": "2018-12-17T16:02:26Z", - "updated_at": "2019-02-11T14:30:38Z", - "pushed_at": "2018-12-07T20:11:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-12418.json b/2018/CVE-2018-12418.json deleted file mode 100644 index d9d1b2ef1d..0000000000 --- a/2018/CVE-2018-12418.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158208279, - "name": "CVE-2018-12418", - "full_name": "tafamace\/CVE-2018-12418", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12418", - "description": null, - "fork": false, - "created_at": "2018-11-19T11:12:00Z", - "updated_at": "2018-11-19T11:15:44Z", - "pushed_at": "2018-11-19T11:15:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-12463.json b/2018/CVE-2018-12463.json deleted file mode 100644 index e2bd231fb6..0000000000 --- a/2018/CVE-2018-12463.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 140411928, - "name": "CVE-2018-12463", - "full_name": "alt3kx\/CVE-2018-12463", - "owner": { - "login": "alt3kx", - "id": 3140111, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" - }, - "html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463", - "description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)", - "fork": false, - "created_at": "2018-07-10T09:51:40Z", - "updated_at": "2021-01-12T12:20:23Z", - "pushed_at": "2018-07-17T08:13:34Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 1, - "forks": 1, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-12537.json b/2018/CVE-2018-12537.json deleted file mode 100644 index c82a70d31d..0000000000 --- a/2018/CVE-2018-12537.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158209208, - "name": "CVE-2018-12537", - "full_name": "tafamace\/CVE-2018-12537", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12537", - "description": null, - "fork": false, - "created_at": "2018-11-19T11:18:35Z", - "updated_at": "2018-11-19T11:32:44Z", - "pushed_at": "2018-11-19T11:32:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-12540.json b/2018/CVE-2018-12540.json deleted file mode 100644 index 5853ec7161..0000000000 --- a/2018/CVE-2018-12540.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158212154, - "name": "CVE-2018-12540", - "full_name": "tafamace\/CVE-2018-12540", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12540", - "description": null, - "fork": false, - "created_at": "2018-11-19T11:41:16Z", - "updated_at": "2018-11-19T11:46:57Z", - "pushed_at": "2018-11-19T11:46:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-12613.json b/2018/CVE-2018-12613.json index 3cc08760cb..e0028c9090 100644 --- a/2018/CVE-2018-12613.json +++ b/2018/CVE-2018-12613.json @@ -1,27 +1,4 @@ [ - { - "id": 156870746, - "name": "CVE-2018-12613", - "full_name": "0x00-0x00\/CVE-2018-12613", - "owner": { - "login": "0x00-0x00", - "id": 23364530, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", - "html_url": "https:\/\/github.com\/0x00-0x00" - }, - "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-12613", - "description": "PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit", - "fork": false, - "created_at": "2018-11-09T14:10:20Z", - "updated_at": "2020-03-11T07:23:14Z", - "pushed_at": "2018-11-09T14:42:23Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 3, - "forks": 3, - "watchers": 6, - "score": 0 - }, { "id": 208791479, "name": "CVE-2018-12613", diff --git a/2018/CVE-2018-1270.json b/2018/CVE-2018-1270.json index d15787e9e0..349eabd123 100644 --- a/2018/CVE-2018-1270.json +++ b/2018/CVE-2018-1270.json @@ -45,52 +45,6 @@ "watchers": 19, "score": 0 }, - { - "id": 158213121, - "name": "CVE-2018-1270", - "full_name": "tafamace\/CVE-2018-1270", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1270", - "description": null, - "fork": false, - "created_at": "2018-11-19T11:47:40Z", - "updated_at": "2018-11-19T12:00:19Z", - "pushed_at": "2018-11-19T12:00:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 162062968, - "name": "CVE-2018-1270", - "full_name": "Venscor\/CVE-2018-1270", - "owner": { - "login": "Venscor", - "id": 13192497, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13192497?v=4", - "html_url": "https:\/\/github.com\/Venscor" - }, - "html_url": "https:\/\/github.com\/Venscor\/CVE-2018-1270", - "description": "CVE-2018-1270 表达式RCE环境", - "fork": false, - "created_at": "2018-12-17T02:22:53Z", - "updated_at": "2018-12-17T02:28:09Z", - "pushed_at": "2018-12-17T02:28:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 295839871, "name": "owasp-formation-cve-2018-1270", diff --git a/2018/CVE-2018-1273.json b/2018/CVE-2018-1273.json index 67b278b1a8..402a525de1 100644 --- a/2018/CVE-2018-1273.json +++ b/2018/CVE-2018-1273.json @@ -45,29 +45,6 @@ "watchers": 21, "score": 0 }, - { - "id": 151734933, - "name": "poc-cve-2018-1273", - "full_name": "webr0ck\/poc-cve-2018-1273", - "owner": { - "login": "webr0ck", - "id": 30629042, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30629042?v=4", - "html_url": "https:\/\/github.com\/webr0ck" - }, - "html_url": "https:\/\/github.com\/webr0ck\/poc-cve-2018-1273", - "description": null, - "fork": false, - "created_at": "2018-10-05T14:42:07Z", - "updated_at": "2018-10-09T09:26:39Z", - "pushed_at": "2018-10-05T14:42:59Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 3, - "forks": 3, - "watchers": 1, - "score": 0 - }, { "id": 166271014, "name": "cve-2018-1273", diff --git a/2018/CVE-2018-12895.json b/2018/CVE-2018-12895.json deleted file mode 100644 index 4cbe26e3c5..0000000000 --- a/2018/CVE-2018-12895.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 139890292, - "name": "cve-2018-12895-hotfix", - "full_name": "bloom-ux\/cve-2018-12895-hotfix", - "owner": { - "login": "bloom-ux", - "id": 22582007, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22582007?v=4", - "html_url": "https:\/\/github.com\/bloom-ux" - }, - "html_url": "https:\/\/github.com\/bloom-ux\/cve-2018-12895-hotfix", - "description": "Hotfix for file deletion to to code execution vulnerability in WordPress", - "fork": false, - "created_at": "2018-07-05T19:09:17Z", - "updated_at": "2018-07-05T19:48:44Z", - "pushed_at": "2018-07-05T19:48:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-1313.json b/2018/CVE-2018-1313.json deleted file mode 100644 index b9690923e6..0000000000 --- a/2018/CVE-2018-1313.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158220324, - "name": "CVE-2018-1313", - "full_name": "tafamace\/CVE-2018-1313", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1313", - "description": null, - "fork": false, - "created_at": "2018-11-19T12:38:21Z", - "updated_at": "2018-11-19T12:48:53Z", - "pushed_at": "2018-11-19T12:48:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-1324.json b/2018/CVE-2018-1324.json deleted file mode 100644 index 109a44ac95..0000000000 --- a/2018/CVE-2018-1324.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158221452, - "name": "CVE-2018-1324", - "full_name": "tafamace\/CVE-2018-1324", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1324", - "description": null, - "fork": false, - "created_at": "2018-11-19T12:46:37Z", - "updated_at": "2018-11-19T13:04:11Z", - "pushed_at": "2018-11-19T13:04:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-13784.json b/2018/CVE-2018-13784.json deleted file mode 100644 index 7adc138aa6..0000000000 --- a/2018/CVE-2018-13784.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 141165293, - "name": "prestashop-exploits", - "full_name": "ambionics\/prestashop-exploits", - "owner": { - "login": "ambionics", - "id": 29630660, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4", - "html_url": "https:\/\/github.com\/ambionics" - }, - "html_url": "https:\/\/github.com\/ambionics\/prestashop-exploits", - "description": "Collection of exploits\/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)", - "fork": false, - "created_at": "2018-07-16T16:33:41Z", - "updated_at": "2021-03-17T03:38:56Z", - "pushed_at": "2018-07-17T09:02:34Z", - "stargazers_count": 46, - "watchers_count": 46, - "forks_count": 11, - "forks": 11, - "watchers": 46, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-13864.json b/2018/CVE-2018-13864.json deleted file mode 100644 index 8ce59f8fe8..0000000000 --- a/2018/CVE-2018-13864.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158196795, - "name": "CVE-2018-13864", - "full_name": "tafamace\/CVE-2018-13864", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-13864", - "description": null, - "fork": false, - "created_at": "2018-11-19T09:40:47Z", - "updated_at": "2018-11-19T09:45:34Z", - "pushed_at": "2018-11-19T09:45:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-14.json b/2018/CVE-2018-14.json deleted file mode 100644 index 5071090734..0000000000 --- a/2018/CVE-2018-14.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 144012223, - "name": "legacySymfony", - "full_name": "lckJack\/legacySymfony", - "owner": { - "login": "lckJack", - "id": 38405856, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38405856?v=4", - "html_url": "https:\/\/github.com\/lckJack" - }, - "html_url": "https:\/\/github.com\/lckJack\/legacySymfony", - "description": "Easy script to check if drupal 8.x-8.5.6 is vulnerable to CVE-2018-14.773", - "fork": false, - "created_at": "2018-08-08T12:42:56Z", - "updated_at": "2018-08-08T17:28:27Z", - "pushed_at": "2018-08-08T12:46:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-14083.json b/2018/CVE-2018-14083.json deleted file mode 100644 index ee85f59c8e..0000000000 --- a/2018/CVE-2018-14083.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 142094467, - "name": "CVE-2018-14083", - "full_name": "pudding2\/CVE-2018-14083", - "owner": { - "login": "pudding2", - "id": 28480779, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28480779?v=4", - "html_url": "https:\/\/github.com\/pudding2" - }, - "html_url": "https:\/\/github.com\/pudding2\/CVE-2018-14083", - "description": null, - "fork": false, - "created_at": "2018-07-24T02:36:08Z", - "updated_at": "2019-01-14T11:31:59Z", - "pushed_at": "2018-07-24T02:56:28Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-14442.json b/2018/CVE-2018-14442.json index 2a2d81a5a1..e4b72f95a2 100644 --- a/2018/CVE-2018-14442.json +++ b/2018/CVE-2018-14442.json @@ -1,27 +1,4 @@ [ - { - "id": 163386526, - "name": "CVE-2018-14442", - "full_name": "payatu\/CVE-2018-14442", - "owner": { - "login": "payatu", - "id": 16715624, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16715624?v=4", - "html_url": "https:\/\/github.com\/payatu" - }, - "html_url": "https:\/\/github.com\/payatu\/CVE-2018-14442", - "description": "PoC for Foxit Reader CVE-2018-14442", - "fork": false, - "created_at": "2018-12-28T08:29:28Z", - "updated_at": "2021-03-26T15:16:17Z", - "pushed_at": "2018-12-28T09:46:29Z", - "stargazers_count": 56, - "watchers_count": 56, - "forks_count": 17, - "forks": 17, - "watchers": 56, - "score": 0 - }, { "id": 215229045, "name": "PS-2018-002---CVE-2018-14442", diff --git a/2018/CVE-2018-14634.json b/2018/CVE-2018-14634.json deleted file mode 100644 index 4bab72572c..0000000000 --- a/2018/CVE-2018-14634.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 152124947, - "name": "cve-2018-14634", - "full_name": "luan0ap\/cve-2018-14634", - "owner": { - "login": "luan0ap", - "id": 26953960, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26953960?v=4", - "html_url": "https:\/\/github.com\/luan0ap" - }, - "html_url": "https:\/\/github.com\/luan0ap\/cve-2018-14634", - "description": "proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1", - "fork": false, - "created_at": "2018-10-08T18:12:03Z", - "updated_at": "2020-03-29T03:02:36Z", - "pushed_at": "2018-10-09T16:44:32Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 10, - "forks": 10, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-14665.json b/2018/CVE-2018-14665.json index 0340890173..d2f1c31e95 100644 --- a/2018/CVE-2018-14665.json +++ b/2018/CVE-2018-14665.json @@ -1,27 +1,4 @@ [ - { - "id": 154950649, - "name": "CVE-2018-14665", - "full_name": "jas502n\/CVE-2018-14665", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14665", - "description": "OpenBsd_CVE-2018-14665", - "fork": false, - "created_at": "2018-10-27T10:12:05Z", - "updated_at": "2020-10-26T10:10:05Z", - "pushed_at": "2018-10-27T10:44:35Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 8, - "forks": 8, - "watchers": 14, - "score": 0 - }, { "id": 155795794, "name": "CVE-2018-14665", diff --git a/2018/CVE-2018-14667.json b/2018/CVE-2018-14667.json index b6046053cf..b775e23798 100644 --- a/2018/CVE-2018-14667.json +++ b/2018/CVE-2018-14667.json @@ -1,96 +1,4 @@ [ - { - "id": 158057391, - "name": "cve-2018-14667", - "full_name": "nareshmail\/cve-2018-14667", - "owner": { - "login": "nareshmail", - "id": 6008091, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6008091?v=4", - "html_url": "https:\/\/github.com\/nareshmail" - }, - "html_url": "https:\/\/github.com\/nareshmail\/cve-2018-14667", - "description": "cve-2018-14667 demo", - "fork": false, - "created_at": "2018-11-18T06:43:46Z", - "updated_at": "2020-04-01T03:46:35Z", - "pushed_at": "2018-11-17T04:13:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 158791727, - "name": "CVE-2018-14667", - "full_name": "zeroto01\/CVE-2018-14667", - "owner": { - "login": "zeroto01", - "id": 45281392, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45281392?v=4", - "html_url": "https:\/\/github.com\/zeroto01" - }, - "html_url": "https:\/\/github.com\/zeroto01\/CVE-2018-14667", - "description": null, - "fork": false, - "created_at": "2018-11-23T06:44:49Z", - "updated_at": "2018-11-27T04:22:10Z", - "pushed_at": "2018-11-23T06:50:53Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 159462372, - "name": "CVE-2018-14667", - "full_name": "r00t4dm\/CVE-2018-14667", - "owner": { - "login": "r00t4dm", - "id": 36941976, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36941976?v=4", - "html_url": "https:\/\/github.com\/r00t4dm" - }, - "html_url": "https:\/\/github.com\/r00t4dm\/CVE-2018-14667", - "description": "about CVE-2018-14667 from RichFaces Framework 3.3.4", - "fork": false, - "created_at": "2018-11-28T07:35:28Z", - "updated_at": "2018-11-29T02:48:19Z", - "pushed_at": "2018-11-29T02:48:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 159766854, - "name": "CVE-2018-14667", - "full_name": "syriusbughunt\/CVE-2018-14667", - "owner": { - "login": "syriusbughunt", - "id": 45476916, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45476916?v=4", - "html_url": "https:\/\/github.com\/syriusbughunt" - }, - "html_url": "https:\/\/github.com\/syriusbughunt\/CVE-2018-14667", - "description": "All about CVE-2018-14667; From what it is to how to successfully exploit it.", - "fork": false, - "created_at": "2018-11-30T04:06:08Z", - "updated_at": "2021-02-18T03:16:19Z", - "pushed_at": "2018-11-30T07:10:44Z", - "stargazers_count": 41, - "watchers_count": 41, - "forks_count": 11, - "forks": 11, - "watchers": 41, - "score": 0 - }, { "id": 199370771, "name": "cve-2018-14667", diff --git a/2018/CVE-2018-14729.json b/2018/CVE-2018-14729.json deleted file mode 100644 index 706672a827..0000000000 --- a/2018/CVE-2018-14729.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 146291248, - "name": "CVE-2018-14729", - "full_name": "FoolMitAh\/CVE-2018-14729", - "owner": { - "login": "FoolMitAh", - "id": 23001766, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23001766?v=4", - "html_url": "https:\/\/github.com\/FoolMitAh" - }, - "html_url": "https:\/\/github.com\/FoolMitAh\/CVE-2018-14729", - "description": "Discuz backend getshell", - "fork": false, - "created_at": "2018-08-27T11:58:49Z", - "updated_at": "2020-08-06T02:38:53Z", - "pushed_at": "2018-12-15T10:30:34Z", - "stargazers_count": 82, - "watchers_count": 82, - "forks_count": 21, - "forks": 21, - "watchers": 82, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-14772.json b/2018/CVE-2018-14772.json deleted file mode 100644 index cecbe13dfc..0000000000 --- a/2018/CVE-2018-14772.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 148241935, - "name": "CVE-2018-14772", - "full_name": "spencerdodd\/CVE-2018-14772", - "owner": { - "login": "spencerdodd", - "id": 9969454, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9969454?v=4", - "html_url": "https:\/\/github.com\/spencerdodd" - }, - "html_url": "https:\/\/github.com\/spencerdodd\/CVE-2018-14772", - "description": "RCE exploit for CVE-2018-14772", - "fork": false, - "created_at": "2018-09-11T01:24:21Z", - "updated_at": "2020-10-21T22:16:16Z", - "pushed_at": "2018-11-01T01:47:17Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 2, - "forks": 2, - "watchers": 9, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 8816ba3437..01767875ac 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -22,75 +22,6 @@ "watchers": 414, "score": 0 }, - { - "id": 148370201, - "name": "WinboxExploit", - "full_name": "msterusky\/WinboxExploit", - "owner": { - "login": "msterusky", - "id": 29436829, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4", - "html_url": "https:\/\/github.com\/msterusky" - }, - "html_url": "https:\/\/github.com\/msterusky\/WinboxExploit", - "description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]", - "fork": false, - "created_at": "2018-09-11T19:36:49Z", - "updated_at": "2021-03-13T16:56:42Z", - "pushed_at": "2018-09-11T20:12:25Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 4, - "forks": 4, - "watchers": 5, - "score": 0 - }, - { - "id": 152906288, - "name": "MikroRoot", - "full_name": "syrex1013\/MikroRoot", - "owner": { - "login": "syrex1013", - "id": 31669127, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4", - "html_url": "https:\/\/github.com\/syrex1013" - }, - "html_url": "https:\/\/github.com\/syrex1013\/MikroRoot", - "description": "Automated version of CVE-2018-14847 (MikroTik Exploit)", - "fork": false, - "created_at": "2018-10-13T19:17:42Z", - "updated_at": "2020-11-02T06:16:27Z", - "pushed_at": "2018-10-14T08:39:24Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 2, - "forks": 2, - "watchers": 13, - "score": 0 - }, - { - "id": 161894724, - "name": "CVE-2018-14847", - "full_name": "jas502n\/CVE-2018-14847", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847", - "description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞", - "fork": false, - "created_at": "2018-12-15T10:38:26Z", - "updated_at": "2020-09-19T14:14:39Z", - "pushed_at": "2018-12-16T04:15:01Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 8, - "forks": 8, - "watchers": 17, - "score": 0 - }, { "id": 178807607, "name": "winboxPOC", diff --git a/2018/CVE-2018-15131.json b/2018/CVE-2018-15131.json deleted file mode 100644 index b7b59636fc..0000000000 --- a/2018/CVE-2018-15131.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 147528539, - "name": "CVE-2018-15131", - "full_name": "0x00-0x00\/CVE-2018-15131", - "owner": { - "login": "0x00-0x00", - "id": 23364530, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", - "html_url": "https:\/\/github.com\/0x00-0x00" - }, - "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-15131", - "description": "Zimbra Collaboration Suite Username Enumeration ", - "fork": false, - "created_at": "2018-09-05T14:11:16Z", - "updated_at": "2018-10-28T04:05:13Z", - "pushed_at": "2018-09-05T14:11:43Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index ab9f2f287f..5fc3f75c8b 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -1,27 +1,4 @@ [ - { - "id": 144760095, - "name": "laravel-poc-CVE-2018-15133", - "full_name": "kozmic\/laravel-poc-CVE-2018-15133", - "owner": { - "login": "kozmic", - "id": 6666, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6666?v=4", - "html_url": "https:\/\/github.com\/kozmic" - }, - "html_url": "https:\/\/github.com\/kozmic\/laravel-poc-CVE-2018-15133", - "description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)", - "fork": false, - "created_at": "2018-08-14T18:51:50Z", - "updated_at": "2021-03-25T11:02:27Z", - "pushed_at": "2018-09-27T07:32:19Z", - "stargazers_count": 224, - "watchers_count": 224, - "forks_count": 43, - "forks": 43, - "watchers": 224, - "score": 0 - }, { "id": 243072477, "name": "Laravel-CVE-2018-15133", diff --git a/2018/CVE-2018-15365.json b/2018/CVE-2018-15365.json deleted file mode 100644 index 8d6f56f35c..0000000000 --- a/2018/CVE-2018-15365.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 150475298, - "name": "CVE-2018-15365", - "full_name": "nixwizard\/CVE-2018-15365", - "owner": { - "login": "nixwizard", - "id": 3982790, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3982790?v=4", - "html_url": "https:\/\/github.com\/nixwizard" - }, - "html_url": "https:\/\/github.com\/nixwizard\/CVE-2018-15365", - "description": null, - "fork": false, - "created_at": "2018-09-26T18:56:41Z", - "updated_at": "2018-09-27T07:31:12Z", - "pushed_at": "2018-09-27T07:31:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 0583ce6291..842f0157e6 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -22,29 +22,6 @@ "watchers": 123, "score": 0 }, - { - "id": 145296891, - "name": "opensshenum", - "full_name": "gbonacini\/opensshenum", - "owner": { - "login": "gbonacini", - "id": 5440458, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5440458?v=4", - "html_url": "https:\/\/github.com\/gbonacini" - }, - "html_url": "https:\/\/github.com\/gbonacini\/opensshenum", - "description": "CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug", - "fork": false, - "created_at": "2018-08-19T11:23:54Z", - "updated_at": "2019-09-15T11:44:34Z", - "pushed_at": "2018-10-17T12:27:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 145483388, "name": "CVE-2018-15473-Exploit", @@ -137,29 +114,6 @@ "watchers": 7, "score": 0 }, - { - "id": 155492594, - "name": "SSHUsernameBruter-SSHUB", - "full_name": "JoeBlackSecurity\/SSHUsernameBruter-SSHUB", - "owner": { - "login": "JoeBlackSecurity", - "id": 44617164, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44617164?v=4", - "html_url": "https:\/\/github.com\/JoeBlackSecurity" - }, - "html_url": "https:\/\/github.com\/JoeBlackSecurity\/SSHUsernameBruter-SSHUB", - "description": "Fully functional script for brute forcing SSH and trying credentials - CVE-2018-15473", - "fork": false, - "created_at": "2018-10-31T03:23:46Z", - "updated_at": "2020-04-23T05:36:20Z", - "pushed_at": "2018-12-05T12:04:40Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 3, - "forks": 3, - "watchers": 1, - "score": 0 - }, { "id": 165318682, "name": "cve-2018-15473", diff --git a/2018/CVE-2018-15499.json b/2018/CVE-2018-15499.json deleted file mode 100644 index fa8ca9e9f9..0000000000 --- a/2018/CVE-2018-15499.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 145583266, - "name": "CVE-2018-15499", - "full_name": "DownWithUp\/CVE-2018-15499", - "owner": { - "login": "DownWithUp", - "id": 16905064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4", - "html_url": "https:\/\/github.com\/DownWithUp" - }, - "html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-15499", - "description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)", - "fork": false, - "created_at": "2018-08-21T15:26:35Z", - "updated_at": "2021-02-27T22:04:13Z", - "pushed_at": "2018-08-23T12:55:23Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 5, - "forks": 5, - "watchers": 9, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-15727.json b/2018/CVE-2018-15727.json deleted file mode 100644 index f1ef7e85e7..0000000000 --- a/2018/CVE-2018-15727.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 146628899, - "name": "grafana-CVE-2018-15727", - "full_name": "u238\/grafana-CVE-2018-15727", - "owner": { - "login": "u238", - "id": 2368573, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2368573?v=4", - "html_url": "https:\/\/github.com\/u238" - }, - "html_url": "https:\/\/github.com\/u238\/grafana-CVE-2018-15727", - "description": "a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)", - "fork": false, - "created_at": "2018-08-29T16:35:22Z", - "updated_at": "2020-07-29T06:48:10Z", - "pushed_at": "2018-08-31T20:31:12Z", - "stargazers_count": 21, - "watchers_count": 21, - "forks_count": 7, - "forks": 7, - "watchers": 21, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-15832.json b/2018/CVE-2018-15832.json deleted file mode 100644 index bb0e42cc39..0000000000 --- a/2018/CVE-2018-15832.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 148423840, - "name": "Ubisoft-Uplay-Desktop-Client-63.0.5699.0", - "full_name": "JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0", - "owner": { - "login": "JacksonKuo", - "id": 5520730, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5520730?v=4", - "html_url": "https:\/\/github.com\/JacksonKuo" - }, - "html_url": "https:\/\/github.com\/JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0", - "description": "CVE-2018-15832", - "fork": false, - "created_at": "2018-09-12T04:59:11Z", - "updated_at": "2018-09-12T05:05:37Z", - "pushed_at": "2018-09-12T05:00:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-15912.json b/2018/CVE-2018-15912.json deleted file mode 100644 index 4f4569786e..0000000000 --- a/2018/CVE-2018-15912.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 146484081, - "name": "CVE-2018-15912-PoC", - "full_name": "coderobe\/CVE-2018-15912-PoC", - "owner": { - "login": "coderobe", - "id": 8442384, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8442384?v=4", - "html_url": "https:\/\/github.com\/coderobe" - }, - "html_url": "https:\/\/github.com\/coderobe\/CVE-2018-15912-PoC", - "description": null, - "fork": false, - "created_at": "2018-08-28T17:40:52Z", - "updated_at": "2018-08-30T10:59:24Z", - "pushed_at": "2018-08-28T17:54:24Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-15961.json b/2018/CVE-2018-15961.json index d9f98abfc1..96300f1540 100644 --- a/2018/CVE-2018-15961.json +++ b/2018/CVE-2018-15961.json @@ -1,27 +1,4 @@ [ - { - "id": 160696698, - "name": "CVE-2018-15961", - "full_name": "vah13\/CVE-2018-15961", - "owner": { - "login": "vah13", - "id": 7976421, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7976421?v=4", - "html_url": "https:\/\/github.com\/vah13" - }, - "html_url": "https:\/\/github.com\/vah13\/CVE-2018-15961", - "description": "Unrestricted file upload in Adobe ColdFusion", - "fork": false, - "created_at": "2018-12-06T15:47:57Z", - "updated_at": "2019-10-21T04:12:24Z", - "pushed_at": "2018-12-11T16:06:39Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 5, - "forks": 5, - "watchers": 8, - "score": 0 - }, { "id": 166859165, "name": "cve-2018-15961", diff --git a/2018/CVE-2018-15982.json b/2018/CVE-2018-15982.json index 442ddc57c7..1a00f86092 100644 --- a/2018/CVE-2018-15982.json +++ b/2018/CVE-2018-15982.json @@ -1,27 +1,4 @@ [ - { - "id": 160592463, - "name": "CVE-2018-15982", - "full_name": "FlatL1neAPT\/CVE-2018-15982", - "owner": { - "login": "FlatL1neAPT", - "id": 33692082, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33692082?v=4", - "html_url": "https:\/\/github.com\/FlatL1neAPT" - }, - "html_url": "https:\/\/github.com\/FlatL1neAPT\/CVE-2018-15982", - "description": "Flash sources for CVE-2018-15982 used by NK", - "fork": false, - "created_at": "2018-12-05T23:41:37Z", - "updated_at": "2020-03-30T04:44:32Z", - "pushed_at": "2018-12-05T21:42:10Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 15, - "forks": 15, - "watchers": 1, - "score": 0 - }, { "id": 160650543, "name": "CVE-2018-15982_PoC", @@ -45,29 +22,6 @@ "watchers": 14, "score": 0 }, - { - "id": 161118743, - "name": "CVE-2018-15982_EXP", - "full_name": "Ridter\/CVE-2018-15982_EXP", - "owner": { - "login": "Ridter", - "id": 6007471, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4", - "html_url": "https:\/\/github.com\/Ridter" - }, - "html_url": "https:\/\/github.com\/Ridter\/CVE-2018-15982_EXP", - "description": "exp of CVE-2018-15982", - "fork": false, - "created_at": "2018-12-10T04:53:31Z", - "updated_at": "2021-01-13T19:57:16Z", - "pushed_at": "2019-01-04T09:29:01Z", - "stargazers_count": 180, - "watchers_count": 180, - "forks_count": 65, - "forks": 65, - "watchers": 180, - "score": 0 - }, { "id": 161362902, "name": "adobe-flash-cve2018-15982", @@ -91,29 +45,6 @@ "watchers": 10, "score": 0 }, - { - "id": 161422909, - "name": "CVE-2018-15982_EXP_IE", - "full_name": "jas502n\/CVE-2018-15982_EXP_IE", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-15982_EXP_IE", - "description": "CVE-2018-15982_EXP_IE", - "fork": false, - "created_at": "2018-12-12T02:41:31Z", - "updated_at": "2020-04-06T10:50:19Z", - "pushed_at": "2018-12-12T02:54:01Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 7, - "forks": 7, - "watchers": 12, - "score": 0 - }, { "id": 161431093, "name": "CVE-2018-15982", @@ -137,29 +68,6 @@ "watchers": 25, "score": 0 }, - { - "id": 162516879, - "name": "CVE-2018-15982", - "full_name": "SyFi\/CVE-2018-15982", - "owner": { - "login": "SyFi", - "id": 26314806, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4", - "html_url": "https:\/\/github.com\/SyFi" - }, - "html_url": "https:\/\/github.com\/SyFi\/CVE-2018-15982", - "description": "Flash 2018-15982 UAF ", - "fork": false, - "created_at": "2018-12-20T02:40:22Z", - "updated_at": "2020-02-13T14:33:56Z", - "pushed_at": "2018-12-20T11:14:56Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 3, - "forks": 3, - "watchers": 5, - "score": 0 - }, { "id": 219955315, "name": "CVE-2018-15982", diff --git a/2018/CVE-2018-16156.json b/2018/CVE-2018-16156.json deleted file mode 100644 index 9897fb732e..0000000000 --- a/2018/CVE-2018-16156.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 161401564, - "name": "CVE-2018-16156-Exploit", - "full_name": "securifera\/CVE-2018-16156-Exploit", - "owner": { - "login": "securifera", - "id": 12126525, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4", - "html_url": "https:\/\/github.com\/securifera" - }, - "html_url": "https:\/\/github.com\/securifera\/CVE-2018-16156-Exploit", - "description": null, - "fork": false, - "created_at": "2018-12-11T22:25:22Z", - "updated_at": "2020-03-30T03:50:41Z", - "pushed_at": "2018-12-11T22:29:58Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16370.json b/2018/CVE-2018-16370.json deleted file mode 100644 index eb73d14940..0000000000 --- a/2018/CVE-2018-16370.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 147602690, - "name": "CVE-2018-16370", - "full_name": "snappyJack\/CVE-2018-16370", - "owner": { - "login": "snappyJack", - "id": 16055573, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4", - "html_url": "https:\/\/github.com\/snappyJack" - }, - "html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16370", - "description": "In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through \/Public\/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.", - "fork": false, - "created_at": "2018-09-06T01:52:47Z", - "updated_at": "2018-09-06T02:02:55Z", - "pushed_at": "2018-09-06T02:02:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16373.json b/2018/CVE-2018-16373.json deleted file mode 100644 index 711ccf0be4..0000000000 --- a/2018/CVE-2018-16373.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 147603389, - "name": "CVE-2018-16373", - "full_name": "snappyJack\/CVE-2018-16373", - "owner": { - "login": "snappyJack", - "id": 16055573, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4", - "html_url": "https:\/\/github.com\/snappyJack" - }, - "html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16373", - "description": "Frog CMS 0.9.5 has an Upload > vulnerability that can create files via > \/admin\/?\/plugin\/file_manager\/save", - "fork": false, - "created_at": "2018-09-06T02:00:24Z", - "updated_at": "2018-09-06T02:01:33Z", - "pushed_at": "2018-09-06T02:01:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16711.json b/2018/CVE-2018-16711.json deleted file mode 100644 index f7951f040b..0000000000 --- a/2018/CVE-2018-16711.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 149358711, - "name": "CVE-2018-16711", - "full_name": "DownWithUp\/CVE-2018-16711", - "owner": { - "login": "DownWithUp", - "id": 16905064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4", - "html_url": "https:\/\/github.com\/DownWithUp" - }, - "html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16711", - "description": "PoC code for CVE-2018-16711 (exploit by wrmsr)", - "fork": false, - "created_at": "2018-09-18T22:18:32Z", - "updated_at": "2021-02-27T22:04:11Z", - "pushed_at": "2018-09-25T12:15:50Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16712.json b/2018/CVE-2018-16712.json deleted file mode 100644 index fdb79f33c6..0000000000 --- a/2018/CVE-2018-16712.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 150000695, - "name": "CVE-2018-16712", - "full_name": "DownWithUp\/CVE-2018-16712", - "owner": { - "login": "DownWithUp", - "id": 16905064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4", - "html_url": "https:\/\/github.com\/DownWithUp" - }, - "html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16712", - "description": "PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)", - "fork": false, - "created_at": "2018-09-23T16:03:06Z", - "updated_at": "2021-02-27T22:03:59Z", - "pushed_at": "2018-12-01T23:02:46Z", - "stargazers_count": 24, - "watchers_count": 24, - "forks_count": 5, - "forks": 5, - "watchers": 24, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16713.json b/2018/CVE-2018-16713.json deleted file mode 100644 index 8766f84e7b..0000000000 --- a/2018/CVE-2018-16713.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 148797728, - "name": "CVE-2018-16713", - "full_name": "DownWithUp\/CVE-2018-16713", - "owner": { - "login": "DownWithUp", - "id": 16905064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4", - "html_url": "https:\/\/github.com\/DownWithUp" - }, - "html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16713", - "description": "PoC code for CVE-2018-16713 (exploit by rdmsr)", - "fork": false, - "created_at": "2018-09-14T14:10:22Z", - "updated_at": "2021-02-27T22:04:10Z", - "pushed_at": "2018-09-25T12:15:56Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16875.json b/2018/CVE-2018-16875.json deleted file mode 100644 index 271ac7ddb3..0000000000 --- a/2018/CVE-2018-16875.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 161712530, - "name": "poc-cve-2018-16875", - "full_name": "alexzorin\/poc-cve-2018-16875", - "owner": { - "login": "alexzorin", - "id": 311534, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/311534?v=4", - "html_url": "https:\/\/github.com\/alexzorin" - }, - "html_url": "https:\/\/github.com\/alexzorin\/poc-cve-2018-16875", - "description": null, - "fork": false, - "created_at": "2018-12-14T00:53:46Z", - "updated_at": "2020-04-06T10:49:41Z", - "pushed_at": "2018-12-14T00:54:01Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 3, - "forks": 3, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16987.json b/2018/CVE-2018-16987.json deleted file mode 100644 index 3022ca9e77..0000000000 --- a/2018/CVE-2018-16987.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 148659258, - "name": "CVE-2018-16987", - "full_name": "gquere\/CVE-2018-16987", - "owner": { - "login": "gquere", - "id": 1585000, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1585000?v=4", - "html_url": "https:\/\/github.com\/gquere" - }, - "html_url": "https:\/\/github.com\/gquere\/CVE-2018-16987", - "description": "Details about CVE-2018-16987 - Cleartext storage of TA servers' passwords in Squash TM", - "fork": false, - "created_at": "2018-09-13T15:32:48Z", - "updated_at": "2018-09-14T06:17:55Z", - "pushed_at": "2018-09-13T16:47:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-17144.json b/2018/CVE-2018-17144.json deleted file mode 100644 index 36ce860464..0000000000 --- a/2018/CVE-2018-17144.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 152480350, - "name": "ban-exploitable-bitcoin-nodes", - "full_name": "iioch\/ban-exploitable-bitcoin-nodes", - "owner": { - "login": "iioch", - "id": 18705326, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18705326?v=4", - "html_url": "https:\/\/github.com\/iioch" - }, - "html_url": "https:\/\/github.com\/iioch\/ban-exploitable-bitcoin-nodes", - "description": "Ban all denial-of-service vulnerability exploitable nodes from your node CVE-2018-17144 ", - "fork": false, - "created_at": "2018-10-10T19:44:09Z", - "updated_at": "2018-10-16T13:56:34Z", - "pushed_at": "2018-10-10T20:08:45Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, - { - "id": 155528435, - "name": "CVE-2018-17144_POC", - "full_name": "hikame\/CVE-2018-17144_POC", - "owner": { - "login": "hikame", - "id": 6397196, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6397196?v=4", - "html_url": "https:\/\/github.com\/hikame" - }, - "html_url": "https:\/\/github.com\/hikame\/CVE-2018-17144_POC", - "description": "Put the *.py files to test\/functional folder of bitcoin sourcecode (commit: 4901c00792c1dabae4bb01e6373c9b1ed9ef3008)", - "fork": false, - "created_at": "2018-10-31T09:07:35Z", - "updated_at": "2020-12-05T14:05:15Z", - "pushed_at": "2018-11-12T10:11:00Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 6, - "forks": 6, - "watchers": 10, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-17182.json b/2018/CVE-2018-17182.json deleted file mode 100644 index cd766d6e03..0000000000 --- a/2018/CVE-2018-17182.json +++ /dev/null @@ -1,71 +0,0 @@ -[ - { - "id": 150880187, - "name": "CVE-2018-17182", - "full_name": "jas502n\/CVE-2018-17182", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-17182", - "description": "Linux 内核VMA-UAF 提权漏洞(CVE-2018-17182),0day", - "fork": false, - "created_at": "2018-09-29T15:58:55Z", - "updated_at": "2021-02-18T02:36:02Z", - "pushed_at": "2018-10-02T09:03:37Z", - "stargazers_count": 119, - "watchers_count": 119, - "forks_count": 49, - "forks": 49, - "watchers": 119, - "score": 0 - }, - { - "id": 151031561, - "name": "CVE-2018-17182", - "full_name": "likescam\/CVE-2018-17182", - "owner": { - "login": "likescam", - "id": 2469038, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", - "html_url": "https:\/\/github.com\/likescam" - }, - "html_url": "https:\/\/github.com\/likescam\/CVE-2018-17182", - "description": null, - "fork": false, - "created_at": "2018-10-01T03:20:05Z", - "updated_at": "2018-10-01T03:20:17Z", - "pushed_at": "2018-10-01T03:20:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 151032211, - "name": "vmacache_CVE-2018-17182", - "full_name": "likescam\/vmacache_CVE-2018-17182", - "owner": { - "login": "likescam", - "id": 2469038, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", - "html_url": "https:\/\/github.com\/likescam" - }, - "html_url": "https:\/\/github.com\/likescam\/vmacache_CVE-2018-17182", - "description": null, - "fork": false, - "created_at": "2018-10-01T03:29:04Z", - "updated_at": "2018-10-01T16:07:20Z", - "pushed_at": "2018-10-01T03:34:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-17418.json b/2018/CVE-2018-17418.json deleted file mode 100644 index 2a99e71cf9..0000000000 --- a/2018/CVE-2018-17418.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 149421281, - "name": "monstra_cms-3.0.4--getshell", - "full_name": "AlwaysHereFight\/monstra_cms-3.0.4--getshell", - "owner": { - "login": "AlwaysHereFight", - "id": 21152658, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21152658?v=4", - "html_url": "https:\/\/github.com\/AlwaysHereFight" - }, - "html_url": "https:\/\/github.com\/AlwaysHereFight\/monstra_cms-3.0.4--getshell", - "description": "monstra_cms-3.0.4-上传getshell CVE-2018-17418", - "fork": false, - "created_at": "2018-09-19T08:54:45Z", - "updated_at": "2018-10-09T06:40:44Z", - "pushed_at": "2018-09-24T15:58:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-17456.json b/2018/CVE-2018-17456.json index bf29a931f7..acd7963853 100644 --- a/2018/CVE-2018-17456.json +++ b/2018/CVE-2018-17456.json @@ -1,50 +1,4 @@ [ - { - "id": 154035813, - "name": "CVE-2018-17456", - "full_name": "shpik-kr\/CVE-2018-17456", - "owner": { - "login": "shpik-kr", - "id": 12602773, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12602773?v=4", - "html_url": "https:\/\/github.com\/shpik-kr" - }, - "html_url": "https:\/\/github.com\/shpik-kr\/CVE-2018-17456", - "description": "1-day", - "fork": false, - "created_at": "2018-10-21T17:46:10Z", - "updated_at": "2018-10-23T11:22:27Z", - "pushed_at": "2018-10-23T11:22:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 156715728, - "name": "CVE-2018-17456", - "full_name": "matlink\/CVE-2018-17456", - "owner": { - "login": "matlink", - "id": 4450078, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4", - "html_url": "https:\/\/github.com\/matlink" - }, - "html_url": "https:\/\/github.com\/matlink\/CVE-2018-17456", - "description": null, - "fork": false, - "created_at": "2018-11-08T14:03:52Z", - "updated_at": "2018-11-08T14:21:16Z", - "pushed_at": "2018-11-08T14:21:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 190417594, "name": "CVE-2018-17456", diff --git a/2018/CVE-2018-17961.json b/2018/CVE-2018-17961.json deleted file mode 100644 index ca4e101a45..0000000000 --- a/2018/CVE-2018-17961.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 155720048, - "name": "CVE-2018-17961", - "full_name": "matlink\/CVE-2018-17961", - "owner": { - "login": "matlink", - "id": 4450078, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4450078?v=4", - "html_url": "https:\/\/github.com\/matlink" - }, - "html_url": "https:\/\/github.com\/matlink\/CVE-2018-17961", - "description": null, - "fork": false, - "created_at": "2018-11-01T13:33:12Z", - "updated_at": "2019-09-02T09:36:54Z", - "pushed_at": "2018-11-01T13:33:34Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-18026.json b/2018/CVE-2018-18026.json deleted file mode 100644 index abfd213f02..0000000000 --- a/2018/CVE-2018-18026.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 153657332, - "name": "CVE-2018-18026", - "full_name": "DownWithUp\/CVE-2018-18026", - "owner": { - "login": "DownWithUp", - "id": 16905064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4", - "html_url": "https:\/\/github.com\/DownWithUp" - }, - "html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-18026", - "description": "PoC Code for CVE-2018-18026 (exploit by stack overflow)", - "fork": false, - "created_at": "2018-10-18T16:51:26Z", - "updated_at": "2021-02-27T22:04:04Z", - "pushed_at": "2018-11-07T04:00:59Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-18387.json b/2018/CVE-2018-18387.json deleted file mode 100644 index 176611dbcc..0000000000 --- a/2018/CVE-2018-18387.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 153663293, - "name": "CVE-2018-18387", - "full_name": "TheeBlind\/CVE-2018-18387", - "owner": { - "login": "TheeBlind", - "id": 26583110, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26583110?v=4", - "html_url": "https:\/\/github.com\/TheeBlind" - }, - "html_url": "https:\/\/github.com\/TheeBlind\/CVE-2018-18387", - "description": "playSMS < = 1.4.2 - Privilege escalation", - "fork": false, - "created_at": "2018-10-18T17:40:42Z", - "updated_at": "2021-03-03T11:40:30Z", - "pushed_at": "2018-10-26T16:00:05Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 3, - "forks": 3, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-18714.json b/2018/CVE-2018-18714.json deleted file mode 100644 index 192331e4f9..0000000000 --- a/2018/CVE-2018-18714.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 155772208, - "name": "CVE-2018-18714", - "full_name": "DownWithUp\/CVE-2018-18714", - "owner": { - "login": "DownWithUp", - "id": 16905064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4", - "html_url": "https:\/\/github.com\/DownWithUp" - }, - "html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-18714", - "description": "PoC Code for CVE-2018-18714 (exploit by stack overflow)", - "fork": false, - "created_at": "2018-11-01T20:31:50Z", - "updated_at": "2021-02-27T22:04:02Z", - "pushed_at": "2018-11-09T21:08:46Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-19126.json b/2018/CVE-2018-19126.json deleted file mode 100644 index a5ba09aeaf..0000000000 --- a/2018/CVE-2018-19126.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 159935158, - "name": "PrestaShop-CVE-2018-19126", - "full_name": "farisv\/PrestaShop-CVE-2018-19126", - "owner": { - "login": "farisv", - "id": 44131180, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44131180?v=4", - "html_url": "https:\/\/github.com\/farisv" - }, - "html_url": "https:\/\/github.com\/farisv\/PrestaShop-CVE-2018-19126", - "description": "PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)", - "fork": false, - "created_at": "2018-12-01T10:53:45Z", - "updated_at": "2020-11-28T10:03:37Z", - "pushed_at": "2018-12-12T22:11:45Z", - "stargazers_count": 38, - "watchers_count": 38, - "forks_count": 7, - "forks": 7, - "watchers": 38, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-19127.json b/2018/CVE-2018-19127.json deleted file mode 100644 index f4eb5fccba..0000000000 --- a/2018/CVE-2018-19127.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 156842411, - "name": "phpcms-2008-CVE-2018-19127", - "full_name": "ab1gale\/phpcms-2008-CVE-2018-19127", - "owner": { - "login": "ab1gale", - "id": 5143253, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5143253?v=4", - "html_url": "https:\/\/github.com\/ab1gale" - }, - "html_url": "https:\/\/github.com\/ab1gale\/phpcms-2008-CVE-2018-19127", - "description": null, - "fork": false, - "created_at": "2018-11-09T09:51:26Z", - "updated_at": "2021-04-07T12:21:15Z", - "pushed_at": "2018-11-09T09:55:35Z", - "stargazers_count": 42, - "watchers_count": 42, - "forks_count": 7, - "forks": 7, - "watchers": 42, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-19131.json b/2018/CVE-2018-19131.json deleted file mode 100644 index e0d549c4b6..0000000000 --- a/2018/CVE-2018-19131.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 157386452, - "name": "CVE-2018-19131", - "full_name": "JonathanWilbur\/CVE-2018-19131", - "owner": { - "login": "JonathanWilbur", - "id": 20342114, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20342114?v=4", - "html_url": "https:\/\/github.com\/JonathanWilbur" - }, - "html_url": "https:\/\/github.com\/JonathanWilbur\/CVE-2018-19131", - "description": "Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate", - "fork": false, - "created_at": "2018-11-13T13:40:10Z", - "updated_at": "2021-04-09T17:09:52Z", - "pushed_at": "2018-11-14T02:40:24Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 2, - "forks": 2, - "watchers": 14, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-19207.json b/2018/CVE-2018-19207.json index b202844007..85681a1f6d 100644 --- a/2018/CVE-2018-19207.json +++ b/2018/CVE-2018-19207.json @@ -1,27 +1,4 @@ [ - { - "id": 159347902, - "name": "WP-GDPR-Compliance-Plugin-Exploit", - "full_name": "aeroot\/WP-GDPR-Compliance-Plugin-Exploit", - "owner": { - "login": "aeroot", - "id": 281911, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/281911?v=4", - "html_url": "https:\/\/github.com\/aeroot" - }, - "html_url": "https:\/\/github.com\/aeroot\/WP-GDPR-Compliance-Plugin-Exploit", - "description": "Exploit of the privilege escalation vulnerability of the WordPress plugin \"WP GDPR Compliance\" by \"Van Ons\" (https:\/\/de.wordpress.org\/plugins\/wp-gdpr-compliance\/) CVE-2018-19207", - "fork": false, - "created_at": "2018-11-27T14:27:06Z", - "updated_at": "2019-05-02T21:05:50Z", - "pushed_at": "2018-11-27T14:51:02Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, { "id": 175869819, "name": "cve-2018-19207", diff --git a/2018/CVE-2018-19537.json b/2018/CVE-2018-19537.json deleted file mode 100644 index d784af0589..0000000000 --- a/2018/CVE-2018-19537.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 159082952, - "name": "TP-Link-ArcherC5-RCE", - "full_name": "JackDoan\/TP-Link-ArcherC5-RCE", - "owner": { - "login": "JackDoan", - "id": 1024837, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1024837?v=4", - "html_url": "https:\/\/github.com\/JackDoan" - }, - "html_url": "https:\/\/github.com\/JackDoan\/TP-Link-ArcherC5-RCE", - "description": "CVE-2018-19537", - "fork": false, - "created_at": "2018-11-25T23:03:19Z", - "updated_at": "2021-01-26T15:41:10Z", - "pushed_at": "2018-11-26T22:39:08Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 5, - "forks": 5, - "watchers": 14, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-19788.json b/2018/CVE-2018-19788.json deleted file mode 100644 index bda6966f4b..0000000000 --- a/2018/CVE-2018-19788.json +++ /dev/null @@ -1,94 +0,0 @@ -[ - { - "id": 160750436, - "name": "CVE-2018-19788", - "full_name": "AbsoZed\/CVE-2018-19788", - "owner": { - "login": "AbsoZed", - "id": 17788335, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17788335?v=4", - "html_url": "https:\/\/github.com\/AbsoZed" - }, - "html_url": "https:\/\/github.com\/AbsoZed\/CVE-2018-19788", - "description": "Silly easy exploit for CVE-2018-19788", - "fork": false, - "created_at": "2018-12-07T00:42:35Z", - "updated_at": "2019-06-09T08:58:32Z", - "pushed_at": "2018-12-07T00:56:25Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 3, - "forks": 3, - "watchers": 5, - "score": 0 - }, - { - "id": 160872186, - "name": "CVE-2018-19788", - "full_name": "d4gh0s7\/CVE-2018-19788", - "owner": { - "login": "d4gh0s7", - "id": 29960687, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29960687?v=4", - "html_url": "https:\/\/github.com\/d4gh0s7" - }, - "html_url": "https:\/\/github.com\/d4gh0s7\/CVE-2018-19788", - "description": "Ansible role to check the vulnerability tracked as CVE-2018-19788, impacts PolicyKit version 0.115 which comes pre-installed on a wide range of Linux distributions", - "fork": false, - "created_at": "2018-12-07T20:27:01Z", - "updated_at": "2019-12-17T20:34:48Z", - "pushed_at": "2018-12-10T15:57:47Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, - "score": 0 - }, - { - "id": 162179568, - "name": "PoC", - "full_name": "Ekultek\/PoC", - "owner": { - "login": "Ekultek", - "id": 14183473, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14183473?v=4", - "html_url": "https:\/\/github.com\/Ekultek" - }, - "html_url": "https:\/\/github.com\/Ekultek\/PoC", - "description": "Leveraging CVE-2018-19788 without root shells", - "fork": false, - "created_at": "2018-12-17T19:26:22Z", - "updated_at": "2020-11-10T06:38:31Z", - "pushed_at": "2018-12-18T19:11:25Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 3, - "forks": 3, - "watchers": 16, - "score": 0 - }, - { - "id": 163684618, - "name": "CVE-2018-19788", - "full_name": "jhlongjr\/CVE-2018-19788", - "owner": { - "login": "jhlongjr", - "id": 39674727, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39674727?v=4", - "html_url": "https:\/\/github.com\/jhlongjr" - }, - "html_url": "https:\/\/github.com\/jhlongjr\/CVE-2018-19788", - "description": "Exploiting The CVE-2018-19788 PolicyKit Bug", - "fork": false, - "created_at": "2018-12-31T16:54:58Z", - "updated_at": "2020-08-27T02:29:39Z", - "pushed_at": "2018-12-31T17:12:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-19911.json b/2018/CVE-2018-19911.json deleted file mode 100644 index 1cc418730d..0000000000 --- a/2018/CVE-2018-19911.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 160625335, - "name": "freeswitch_rce", - "full_name": "iSafeBlue\/freeswitch_rce", - "owner": { - "login": "iSafeBlue", - "id": 25784279, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25784279?v=4", - "html_url": "https:\/\/github.com\/iSafeBlue" - }, - "html_url": "https:\/\/github.com\/iSafeBlue\/freeswitch_rce", - "description": "freeswitch all version remote command execute (cve-2018-19911)", - "fork": false, - "created_at": "2018-12-06T05:48:02Z", - "updated_at": "2019-06-30T16:07:31Z", - "pushed_at": "2018-12-06T08:47:02Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 2, - "forks": 2, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 5d825fb9f0..d1904cd02f 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -344,75 +344,6 @@ "watchers": 0, "score": 0 }, - { - "id": 139417715, - "name": "CVE-2018-2628", - "full_name": "likescam\/CVE-2018-2628", - "owner": { - "login": "likescam", - "id": 2469038, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", - "html_url": "https:\/\/github.com\/likescam" - }, - "html_url": "https:\/\/github.com\/likescam\/CVE-2018-2628", - "description": null, - "fork": false, - "created_at": "2018-07-02T09:00:34Z", - "updated_at": "2019-05-26T06:58:12Z", - "pushed_at": "2018-07-02T09:00:52Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, - { - "id": 147341225, - "name": "WebLogic-RCE-exploit", - "full_name": "Nervous\/WebLogic-RCE-exploit", - "owner": { - "login": "Nervous", - "id": 172442, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172442?v=4", - "html_url": "https:\/\/github.com\/Nervous" - }, - "html_url": "https:\/\/github.com\/Nervous\/WebLogic-RCE-exploit", - "description": "A remote code execution exploit for WebLogic based on CVE-2018-2628", - "fork": false, - "created_at": "2018-09-04T12:17:21Z", - "updated_at": "2019-10-11T08:19:19Z", - "pushed_at": "2018-09-04T12:21:21Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 3, - "forks": 3, - "watchers": 5, - "score": 0 - }, - { - "id": 155318699, - "name": "CVE-2018-2628", - "full_name": "Lighird\/CVE-2018-2628", - "owner": { - "login": "Lighird", - "id": 28284964, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28284964?v=4", - "html_url": "https:\/\/github.com\/Lighird" - }, - "html_url": "https:\/\/github.com\/Lighird\/CVE-2018-2628", - "description": "CVE-2018-2628漏洞工具包", - "fork": false, - "created_at": "2018-10-30T03:26:16Z", - "updated_at": "2020-07-13T02:21:36Z", - "pushed_at": "2018-10-30T03:35:42Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 6, - "forks": 6, - "watchers": 4, - "score": 0 - }, { "id": 164424976, "name": "CVE-2018-2628", diff --git a/2018/CVE-2018-2844.json b/2018/CVE-2018-2844.json deleted file mode 100644 index a6cf343959..0000000000 --- a/2018/CVE-2018-2844.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 146413224, - "name": "virtualbox-cve-2018-2844", - "full_name": "renorobert\/virtualbox-cve-2018-2844", - "owner": { - "login": "renorobert", - "id": 4233909, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4233909?v=4", - "html_url": "https:\/\/github.com\/renorobert" - }, - "html_url": "https:\/\/github.com\/renorobert\/virtualbox-cve-2018-2844", - "description": null, - "fork": false, - "created_at": "2018-08-28T08:04:19Z", - "updated_at": "2021-02-08T17:01:33Z", - "pushed_at": "2018-08-28T08:06:21Z", - "stargazers_count": 93, - "watchers_count": 93, - "forks_count": 32, - "forks": 32, - "watchers": 93, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-2879.json b/2018/CVE-2018-2879.json index 06c4f4ee30..665630b85d 100644 --- a/2018/CVE-2018-2879.json +++ b/2018/CVE-2018-2879.json @@ -1,27 +1,4 @@ [ - { - "id": 142485401, - "name": "Oracle-OAM-Padding-Oracle-CVE-2018-2879-Exploit", - "full_name": "MostafaSoliman\/Oracle-OAM-Padding-Oracle-CVE-2018-2879-Exploit", - "owner": { - "login": "MostafaSoliman", - "id": 13528184, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13528184?v=4", - "html_url": "https:\/\/github.com\/MostafaSoliman" - }, - "html_url": "https:\/\/github.com\/MostafaSoliman\/Oracle-OAM-Padding-Oracle-CVE-2018-2879-Exploit", - "description": null, - "fork": false, - "created_at": "2018-07-26T19:31:45Z", - "updated_at": "2020-07-10T13:31:49Z", - "pushed_at": "2018-07-27T12:09:40Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 6, - "forks": 6, - "watchers": 9, - "score": 0 - }, { "id": 142787515, "name": "oracle-oam-authentication-bypas-exploit", diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json index 4c06ae88d5..7bdf069de5 100644 --- a/2018/CVE-2018-2893.json +++ b/2018/CVE-2018-2893.json @@ -1,142 +1,4 @@ [ - { - "id": 141531715, - "name": "CVE-2018-2893", - "full_name": "sry309\/CVE-2018-2893", - "owner": { - "login": "sry309", - "id": 15671013, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15671013?v=4", - "html_url": "https:\/\/github.com\/sry309" - }, - "html_url": "https:\/\/github.com\/sry309\/CVE-2018-2893", - "description": "CVE-2018-2893", - "fork": false, - "created_at": "2018-07-19T06:06:10Z", - "updated_at": "2020-12-10T06:55:01Z", - "pushed_at": "2018-07-19T05:59:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 141534186, - "name": "CVE-2018-2893", - "full_name": "ryanInf\/CVE-2018-2893", - "owner": { - "login": "ryanInf", - "id": 19621374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19621374?v=4", - "html_url": "https:\/\/github.com\/ryanInf" - }, - "html_url": "https:\/\/github.com\/ryanInf\/CVE-2018-2893", - "description": "CVE-2018-2893 PoC", - "fork": false, - "created_at": "2018-07-19T06:28:12Z", - "updated_at": "2020-12-16T09:58:12Z", - "pushed_at": "2018-07-19T06:12:51Z", - "stargazers_count": 28, - "watchers_count": 28, - "forks_count": 37, - "forks": 37, - "watchers": 28, - "score": 0 - }, - { - "id": 141678694, - "name": "CVE-2018-2893", - "full_name": "bigsizeme\/CVE-2018-2893", - "owner": { - "login": "bigsizeme", - "id": 17845094, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4", - "html_url": "https:\/\/github.com\/bigsizeme" - }, - "html_url": "https:\/\/github.com\/bigsizeme\/CVE-2018-2893", - "description": "反弹shell生成器", - "fork": false, - "created_at": "2018-07-20T07:26:43Z", - "updated_at": "2019-04-22T04:46:36Z", - "pushed_at": "2018-07-23T04:31:27Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 5, - "forks": 5, - "watchers": 17, - "score": 0 - }, - { - "id": 141856470, - "name": "CVE-2018-2893", - "full_name": "pyn3rd\/CVE-2018-2893", - "owner": { - "login": "pyn3rd", - "id": 41412951, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41412951?v=4", - "html_url": "https:\/\/github.com\/pyn3rd" - }, - "html_url": "https:\/\/github.com\/pyn3rd\/CVE-2018-2893", - "description": "CVE-2018-2893-PoC", - "fork": false, - "created_at": "2018-07-22T01:15:58Z", - "updated_at": "2021-02-07T08:16:47Z", - "pushed_at": "2018-10-27T01:42:20Z", - "stargazers_count": 91, - "watchers_count": 91, - "forks_count": 37, - "forks": 37, - "watchers": 91, - "score": 0 - }, - { - "id": 142403659, - "name": "CVE-2018-2893", - "full_name": "qianl0ng\/CVE-2018-2893", - "owner": { - "login": "qianl0ng", - "id": 26949233, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26949233?v=4", - "html_url": "https:\/\/github.com\/qianl0ng" - }, - "html_url": "https:\/\/github.com\/qianl0ng\/CVE-2018-2893", - "description": "可以直接反弹shell", - "fork": false, - "created_at": "2018-07-26T07:16:38Z", - "updated_at": "2020-08-19T01:40:23Z", - "pushed_at": "2018-07-26T07:50:15Z", - "stargazers_count": 44, - "watchers_count": 44, - "forks_count": 14, - "forks": 14, - "watchers": 44, - "score": 0 - }, - { - "id": 151921677, - "name": "CVE-2018-2893", - "full_name": "jas502n\/CVE-2018-2893", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-2893", - "description": "CVE-2018-2893", - "fork": false, - "created_at": "2018-10-07T08:41:14Z", - "updated_at": "2020-12-16T08:25:44Z", - "pushed_at": "2018-10-07T09:53:54Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 9, - "forks": 9, - "watchers": 10, - "score": 0 - }, { "id": 219763712, "name": "CVE-2018-2893", diff --git a/2018/CVE-2018-2894.json b/2018/CVE-2018-2894.json index ba6d8ebdb4..d59d30a742 100644 --- a/2018/CVE-2018-2894.json +++ b/2018/CVE-2018-2894.json @@ -1,50 +1,4 @@ [ - { - "id": 141601079, - "name": "cve-2018-2894", - "full_name": "111ddea\/cve-2018-2894", - "owner": { - "login": "111ddea", - "id": 41444127, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41444127?v=4", - "html_url": "https:\/\/github.com\/111ddea" - }, - "html_url": "https:\/\/github.com\/111ddea\/cve-2018-2894", - "description": "cve-2018-2894 不同别人的利用方法。", - "fork": false, - "created_at": "2018-07-19T15:50:35Z", - "updated_at": "2020-11-26T11:40:23Z", - "pushed_at": "2018-07-22T08:34:27Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 7, - "forks": 7, - "watchers": 13, - "score": 0 - }, - { - "id": 141661586, - "name": "CVE-2018-2894", - "full_name": "LandGrey\/CVE-2018-2894", - "owner": { - "login": "LandGrey", - "id": 16769779, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16769779?v=4", - "html_url": "https:\/\/github.com\/LandGrey" - }, - "html_url": "https:\/\/github.com\/LandGrey\/CVE-2018-2894", - "description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script", - "fork": false, - "created_at": "2018-07-20T03:59:18Z", - "updated_at": "2021-02-04T08:53:23Z", - "pushed_at": "2018-07-20T12:46:50Z", - "stargazers_count": 130, - "watchers_count": 130, - "forks_count": 50, - "forks": 50, - "watchers": 130, - "score": 0 - }, { "id": 151928392, "name": "CVE-2018-2894", diff --git a/2018/CVE-2018-3191.json b/2018/CVE-2018-3191.json deleted file mode 100644 index 164140dc62..0000000000 --- a/2018/CVE-2018-3191.json +++ /dev/null @@ -1,117 +0,0 @@ -[ - { - "id": 154076972, - "name": "CVE-2018-3191", - "full_name": "arongmh\/CVE-2018-3191", - "owner": { - "login": "arongmh", - "id": 30547070, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30547070?v=4", - "html_url": "https:\/\/github.com\/arongmh" - }, - "html_url": "https:\/\/github.com\/arongmh\/CVE-2018-3191", - "description": "CVE-2018-3191 payload generator", - "fork": false, - "created_at": "2018-10-22T02:29:12Z", - "updated_at": "2020-04-06T11:03:47Z", - "pushed_at": "2018-10-21T17:28:13Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 52, - "forks": 52, - "watchers": 1, - "score": 0 - }, - { - "id": 154250933, - "name": "CVE-2018-3191", - "full_name": "pyn3rd\/CVE-2018-3191", - "owner": { - "login": "pyn3rd", - "id": 41412951, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41412951?v=4", - "html_url": "https:\/\/github.com\/pyn3rd" - }, - "html_url": "https:\/\/github.com\/pyn3rd\/CVE-2018-3191", - "description": "CVE-2018-3191-PoC", - "fork": false, - "created_at": "2018-10-23T02:43:39Z", - "updated_at": "2021-03-01T05:41:46Z", - "pushed_at": "2018-10-26T17:54:54Z", - "stargazers_count": 95, - "watchers_count": 95, - "forks_count": 43, - "forks": 43, - "watchers": 95, - "score": 0 - }, - { - "id": 154368972, - "name": "CVE-2018-3191", - "full_name": "Libraggbond\/CVE-2018-3191", - "owner": { - "login": "Libraggbond", - "id": 37012218, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37012218?v=4", - "html_url": "https:\/\/github.com\/Libraggbond" - }, - "html_url": "https:\/\/github.com\/Libraggbond\/CVE-2018-3191", - "description": "CVE-2018-3191 反弹shell", - "fork": false, - "created_at": "2018-10-23T17:24:43Z", - "updated_at": "2021-03-22T07:47:56Z", - "pushed_at": "2018-10-23T17:28:05Z", - "stargazers_count": 56, - "watchers_count": 56, - "forks_count": 31, - "forks": 31, - "watchers": 56, - "score": 0 - }, - { - "id": 154426418, - "name": "CVE-2018-3191", - "full_name": "jas502n\/CVE-2018-3191", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-3191", - "description": "Weblogic-CVE-2018-3191远程代码命令执行漏洞", - "fork": false, - "created_at": "2018-10-24T02:26:53Z", - "updated_at": "2020-12-22T15:35:45Z", - "pushed_at": "2018-10-24T17:42:47Z", - "stargazers_count": 62, - "watchers_count": 62, - "forks_count": 24, - "forks": 24, - "watchers": 62, - "score": 0 - }, - { - "id": 154477893, - "name": "CVE-2018-3191-Rce-Exploit", - "full_name": "mackleadmire\/CVE-2018-3191-Rce-Exploit", - "owner": { - "login": "mackleadmire", - "id": 10216868, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10216868?v=4", - "html_url": "https:\/\/github.com\/mackleadmire" - }, - "html_url": "https:\/\/github.com\/mackleadmire\/CVE-2018-3191-Rce-Exploit", - "description": null, - "fork": false, - "created_at": "2018-10-24T09:54:00Z", - "updated_at": "2020-11-19T04:08:52Z", - "pushed_at": "2018-10-25T08:12:46Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 4, - "forks": 4, - "watchers": 19, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-3245.json b/2018/CVE-2018-3245.json index 26acda74f0..42662a8f55 100644 --- a/2018/CVE-2018-3245.json +++ b/2018/CVE-2018-3245.json @@ -1,50 +1,4 @@ [ - { - "id": 154452586, - "name": "CVE-2018-3245", - "full_name": "pyn3rd\/CVE-2018-3245", - "owner": { - "login": "pyn3rd", - "id": 41412951, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41412951?v=4", - "html_url": "https:\/\/github.com\/pyn3rd" - }, - "html_url": "https:\/\/github.com\/pyn3rd\/CVE-2018-3245", - "description": "CVE-2018-3245-PoC", - "fork": false, - "created_at": "2018-10-24T06:49:33Z", - "updated_at": "2020-10-26T07:34:53Z", - "pushed_at": "2018-10-27T01:41:18Z", - "stargazers_count": 154, - "watchers_count": 154, - "forks_count": 62, - "forks": 62, - "watchers": 154, - "score": 0 - }, - { - "id": 154593773, - "name": "CVE-2018-3245", - "full_name": "jas502n\/CVE-2018-3245", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-3245", - "description": "CVE-2018-3245", - "fork": false, - "created_at": "2018-10-25T01:46:56Z", - "updated_at": "2019-08-23T03:53:49Z", - "pushed_at": "2018-10-25T02:01:39Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 9, - "forks": 9, - "watchers": 12, - "score": 0 - }, { "id": 219765536, "name": "CVE-2018-3245", diff --git a/2018/CVE-2018-3252.json b/2018/CVE-2018-3252.json deleted file mode 100644 index 0924666a3f..0000000000 --- a/2018/CVE-2018-3252.json +++ /dev/null @@ -1,71 +0,0 @@ -[ - { - "id": 154596948, - "name": "CVE-2018-3252", - "full_name": "jas502n\/CVE-2018-3252", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-3252", - "description": "Weblogic-CVE-2018-3252", - "fork": false, - "created_at": "2018-10-25T02:16:49Z", - "updated_at": "2019-03-12T05:44:19Z", - "pushed_at": "2018-10-25T02:16:50Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 1, - "forks": 1, - "watchers": 7, - "score": 0 - }, - { - "id": 160289379, - "name": "CVE-2018-3252", - "full_name": "b1ueb0y\/CVE-2018-3252", - "owner": { - "login": "b1ueb0y", - "id": 13690411, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13690411?v=4", - "html_url": "https:\/\/github.com\/b1ueb0y" - }, - "html_url": "https:\/\/github.com\/b1ueb0y\/CVE-2018-3252", - "description": null, - "fork": false, - "created_at": "2018-12-04T03:14:21Z", - "updated_at": "2020-10-12T02:02:08Z", - "pushed_at": "2018-12-04T04:01:01Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 2, - "forks": 2, - "watchers": 16, - "score": 0 - }, - { - "id": 160681161, - "name": "CVE-2018-3252", - "full_name": "pyn3rd\/CVE-2018-3252", - "owner": { - "login": "pyn3rd", - "id": 41412951, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41412951?v=4", - "html_url": "https:\/\/github.com\/pyn3rd" - }, - "html_url": "https:\/\/github.com\/pyn3rd\/CVE-2018-3252", - "description": "CVE-2018-3252-PoC", - "fork": false, - "created_at": "2018-12-06T13:48:53Z", - "updated_at": "2020-05-22T02:13:16Z", - "pushed_at": "2018-12-07T04:31:50Z", - "stargazers_count": 70, - "watchers_count": 70, - "forks_count": 24, - "forks": 24, - "watchers": 70, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-4013.json b/2018/CVE-2018-4013.json deleted file mode 100644 index a6fcf5f6f4..0000000000 --- a/2018/CVE-2018-4013.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 154464449, - "name": "cve-2018-4013", - "full_name": "DoubleMice\/cve-2018-4013", - "owner": { - "login": "DoubleMice", - "id": 22325256, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22325256?v=4", - "html_url": "https:\/\/github.com\/DoubleMice" - }, - "html_url": "https:\/\/github.com\/DoubleMice\/cve-2018-4013", - "description": "TALOS-2018-0684\/cve-2018-4013 poc", - "fork": false, - "created_at": "2018-10-24T08:19:25Z", - "updated_at": "2018-12-05T10:24:48Z", - "pushed_at": "2018-11-24T03:01:25Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 3, - "forks": 3, - "watchers": 7, - "score": 0 - }, - { - "id": 158950902, - "name": "RTSPServer-Code-Execution-Vulnerability", - "full_name": "r3dxpl0it\/RTSPServer-Code-Execution-Vulnerability", - "owner": { - "login": "r3dxpl0it", - "id": 43002597, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4", - "html_url": "https:\/\/github.com\/r3dxpl0it" - }, - "html_url": "https:\/\/github.com\/r3dxpl0it\/RTSPServer-Code-Execution-Vulnerability", - "description": "RTSPServer Code Execution Vulnerability CVE-2018-4013", - "fork": false, - "created_at": "2018-11-24T15:49:53Z", - "updated_at": "2020-08-06T07:17:07Z", - "pushed_at": "2018-11-26T23:35:57Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 5, - "forks": 5, - "watchers": 11, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-4121.json b/2018/CVE-2018-4121.json index 6a91b72aa0..a0d254d431 100644 --- a/2018/CVE-2018-4121.json +++ b/2018/CVE-2018-4121.json @@ -21,51 +21,5 @@ "forks": 34, "watchers": 114, "score": 0 - }, - { - "id": 141314432, - "name": "CVE-2018-4121", - "full_name": "likescam\/CVE-2018-4121", - "owner": { - "login": "likescam", - "id": 2469038, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", - "html_url": "https:\/\/github.com\/likescam" - }, - "html_url": "https:\/\/github.com\/likescam\/CVE-2018-4121", - "description": null, - "fork": false, - "created_at": "2018-07-17T16:15:29Z", - "updated_at": "2018-07-17T16:15:44Z", - "pushed_at": "2018-07-17T16:15:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 147746670, - "name": "CVE-2018-4121", - "full_name": "jezzus\/CVE-2018-4121", - "owner": { - "login": "jezzus", - "id": 9899999, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9899999?v=4", - "html_url": "https:\/\/github.com\/jezzus" - }, - "html_url": "https:\/\/github.com\/jezzus\/CVE-2018-4121", - "description": null, - "fork": false, - "created_at": "2018-09-06T23:55:43Z", - "updated_at": "2018-09-06T23:55:53Z", - "pushed_at": "2018-09-06T23:55:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json deleted file mode 100644 index be73d5ab77..0000000000 --- a/2018/CVE-2018-4233.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 144027153, - "name": "cve-2018-4233", - "full_name": "saelo\/cve-2018-4233", - "owner": { - "login": "saelo", - "id": 2453290, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2453290?v=4", - "html_url": "https:\/\/github.com\/saelo" - }, - "html_url": "https:\/\/github.com\/saelo\/cve-2018-4233", - "description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018", - "fork": false, - "created_at": "2018-08-08T14:41:20Z", - "updated_at": "2021-04-09T10:20:11Z", - "pushed_at": "2018-08-17T23:31:46Z", - "stargazers_count": 158, - "watchers_count": 158, - "forks_count": 33, - "forks": 33, - "watchers": 158, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-4242.json b/2018/CVE-2018-4242.json deleted file mode 100644 index 81b7d9bfe1..0000000000 --- a/2018/CVE-2018-4242.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 160888223, - "name": "Look-at-The-XNU-Through-A-Tube-CVE-2018-4242-Write-up-Translation-", - "full_name": "yeonnic\/Look-at-The-XNU-Through-A-Tube-CVE-2018-4242-Write-up-Translation-", - "owner": { - "login": "yeonnic", - "id": 23390602, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23390602?v=4", - "html_url": "https:\/\/github.com\/yeonnic" - }, - "html_url": "https:\/\/github.com\/yeonnic\/Look-at-The-XNU-Through-A-Tube-CVE-2018-4242-Write-up-Translation-", - "description": null, - "fork": false, - "created_at": "2018-12-08T00:13:28Z", - "updated_at": "2018-12-21T06:43:45Z", - "pushed_at": "2018-12-08T02:15:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-4327.json b/2018/CVE-2018-4327.json deleted file mode 100644 index bc0fa42226..0000000000 --- a/2018/CVE-2018-4327.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 148367467, - "name": "brokentooth", - "full_name": "omerporze\/brokentooth", - "owner": { - "login": "omerporze", - "id": 6332303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6332303?v=4", - "html_url": "https:\/\/github.com\/omerporze" - }, - "html_url": "https:\/\/github.com\/omerporze\/brokentooth", - "description": " POC for CVE-2018-4327", - "fork": false, - "created_at": "2018-09-11T19:15:09Z", - "updated_at": "2020-12-26T09:15:03Z", - "pushed_at": "2018-09-13T15:59:05Z", - "stargazers_count": 41, - "watchers_count": 41, - "forks_count": 8, - "forks": 8, - "watchers": 41, - "score": 0 - }, - { - "id": 148547298, - "name": "POC-CVE-2018-4327-and-CVE-2018-4330", - "full_name": "harryanon\/POC-CVE-2018-4327-and-CVE-2018-4330", - "owner": { - "login": "harryanon", - "id": 37672417, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37672417?v=4", - "html_url": "https:\/\/github.com\/harryanon" - }, - "html_url": "https:\/\/github.com\/harryanon\/POC-CVE-2018-4327-and-CVE-2018-4330", - "description": null, - "fork": false, - "created_at": "2018-09-12T22:00:58Z", - "updated_at": "2018-09-30T09:47:45Z", - "pushed_at": "2018-09-12T22:01:09Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-4330.json b/2018/CVE-2018-4330.json deleted file mode 100644 index f5f6ecbf50..0000000000 --- a/2018/CVE-2018-4330.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 148663645, - "name": "toothfairy", - "full_name": "omerporze\/toothfairy", - "owner": { - "login": "omerporze", - "id": 6332303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6332303?v=4", - "html_url": "https:\/\/github.com\/omerporze" - }, - "html_url": "https:\/\/github.com\/omerporze\/toothfairy", - "description": "CVE-2018-4330 POC for iOS", - "fork": false, - "created_at": "2018-09-13T16:05:20Z", - "updated_at": "2021-02-05T15:44:05Z", - "pushed_at": "2018-09-13T18:34:20Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 2, - "forks": 2, - "watchers": 14, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-4407.json b/2018/CVE-2018-4407.json index 24cde37f06..6f2ad709db 100644 --- a/2018/CVE-2018-4407.json +++ b/2018/CVE-2018-4407.json @@ -1,96 +1,4 @@ [ - { - "id": 155684007, - "name": "check_icmp_dos", - "full_name": "Pa55w0rd\/check_icmp_dos", - "owner": { - "login": "Pa55w0rd", - "id": 16274549, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16274549?v=4", - "html_url": "https:\/\/github.com\/Pa55w0rd" - }, - "html_url": "https:\/\/github.com\/Pa55w0rd\/check_icmp_dos", - "description": "iOS 12 \/ OS X Remote Kernel Heap Overflow (CVE-2018-4407) POC", - "fork": false, - "created_at": "2018-11-01T08:21:59Z", - "updated_at": "2020-04-06T11:00:33Z", - "pushed_at": "2018-11-01T08:53:23Z", - "stargazers_count": 59, - "watchers_count": 59, - "forks_count": 14, - "forks": 14, - "watchers": 59, - "score": 0 - }, - { - "id": 155748281, - "name": "cve-2018-4407", - "full_name": "unixpickle\/cve-2018-4407", - "owner": { - "login": "unixpickle", - "id": 406021, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/406021?v=4", - "html_url": "https:\/\/github.com\/unixpickle" - }, - "html_url": "https:\/\/github.com\/unixpickle\/cve-2018-4407", - "description": "Crash macOS and iOS devices with one packet", - "fork": false, - "created_at": "2018-11-01T17:03:25Z", - "updated_at": "2020-12-21T17:36:52Z", - "pushed_at": "2018-11-15T21:13:37Z", - "stargazers_count": 50, - "watchers_count": 50, - "forks_count": 19, - "forks": 19, - "watchers": 50, - "score": 0 - }, - { - "id": 155810193, - "name": "check_icmp_dos-CVE-2018-4407-", - "full_name": "s2339956\/check_icmp_dos-CVE-2018-4407-", - "owner": { - "login": "s2339956", - "id": 17181670, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17181670?v=4", - "html_url": "https:\/\/github.com\/s2339956" - }, - "html_url": "https:\/\/github.com\/s2339956\/check_icmp_dos-CVE-2018-4407-", - "description": "CVE-2018-4407 概述與實現", - "fork": false, - "created_at": "2018-11-02T03:38:41Z", - "updated_at": "2018-11-02T03:48:36Z", - "pushed_at": "2018-11-02T03:48:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 155836421, - "name": "AppleDOS", - "full_name": "farisv\/AppleDOS", - "owner": { - "login": "farisv", - "id": 44131180, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44131180?v=4", - "html_url": "https:\/\/github.com\/farisv" - }, - "html_url": "https:\/\/github.com\/farisv\/AppleDOS", - "description": "Messing Apple devices on the network with CVE-2018-4407 (heap overflow in bad packet handling)", - "fork": false, - "created_at": "2018-11-02T08:29:29Z", - "updated_at": "2020-10-03T07:29:19Z", - "pushed_at": "2018-12-04T08:21:43Z", - "stargazers_count": 24, - "watchers_count": 24, - "forks_count": 5, - "forks": 5, - "watchers": 24, - "score": 0 - }, { "id": 155837722, "name": "CVE-2018-4407", @@ -114,98 +22,6 @@ "watchers": 13, "score": 0 }, - { - "id": 155885238, - "name": "CVE-2018-4407-IOS", - "full_name": "zteeed\/CVE-2018-4407-IOS", - "owner": { - "login": "zteeed", - "id": 34286541, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34286541?v=4", - "html_url": "https:\/\/github.com\/zteeed" - }, - "html_url": "https:\/\/github.com\/zteeed\/CVE-2018-4407-IOS", - "description": "POC: Heap buffer overflow in the networking code in the XNU operating system kernel", - "fork": false, - "created_at": "2018-11-02T15:26:47Z", - "updated_at": "2021-02-20T08:54:05Z", - "pushed_at": "2018-12-01T23:17:56Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 1, - "forks": 1, - "watchers": 12, - "score": 0 - }, - { - "id": 155925880, - "name": "node-cve-2018-4407", - "full_name": "SamDecrock\/node-cve-2018-4407", - "owner": { - "login": "SamDecrock", - "id": 550487, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/550487?v=4", - "html_url": "https:\/\/github.com\/SamDecrock" - }, - "html_url": "https:\/\/github.com\/SamDecrock\/node-cve-2018-4407", - "description": "Node.js PoC exploit code for CVE-2018-4407", - "fork": false, - "created_at": "2018-11-02T22:00:17Z", - "updated_at": "2020-06-19T07:48:32Z", - "pushed_at": "2018-11-02T22:13:40Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 6, - "forks": 6, - "watchers": 11, - "score": 0 - }, - { - "id": 156039963, - "name": "CVE-2018-4407", - "full_name": "r3dxpl0it\/CVE-2018-4407", - "owner": { - "login": "r3dxpl0it", - "id": 43002597, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4", - "html_url": "https:\/\/github.com\/r3dxpl0it" - }, - "html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-4407", - "description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]", - "fork": false, - "created_at": "2018-11-04T01:47:05Z", - "updated_at": "2020-12-28T15:24:25Z", - "pushed_at": "2018-11-04T02:25:08Z", - "stargazers_count": 22, - "watchers_count": 22, - "forks_count": 9, - "forks": 9, - "watchers": 22, - "score": 0 - }, - { - "id": 156051346, - "name": "CVE-2018-4407", - "full_name": "lucagiovagnoli\/CVE-2018-4407", - "owner": { - "login": "lucagiovagnoli", - "id": 4341034, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4341034?v=4", - "html_url": "https:\/\/github.com\/lucagiovagnoli" - }, - "html_url": "https:\/\/github.com\/lucagiovagnoli\/CVE-2018-4407", - "description": "A buffer overflow vulnerability in the XNU kernel's ICMP error code causes IOS devices to crash (laptops and mobiles).", - "fork": false, - "created_at": "2018-11-04T05:10:38Z", - "updated_at": "2019-12-06T13:15:13Z", - "pushed_at": "2018-11-04T19:00:16Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 156611823, "name": "Apple-Remote-Crash-Tool-CVE-2018-4407", @@ -229,52 +45,6 @@ "watchers": 4, "score": 0 }, - { - "id": 159180451, - "name": "wifi", - "full_name": "soccercab\/wifi", - "owner": { - "login": "soccercab", - "id": 26183552, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26183552?v=4", - "html_url": "https:\/\/github.com\/soccercab" - }, - "html_url": "https:\/\/github.com\/soccercab\/wifi", - "description": "iOS 11 WiFi Exploit - icmp_error_CVE-2018-4407", - "fork": false, - "created_at": "2018-11-26T14:14:55Z", - "updated_at": "2018-11-26T20:38:51Z", - "pushed_at": "2018-11-26T20:38:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 163652093, - "name": "CVE-2018-4407-iOS-exploit", - "full_name": "zeng9t\/CVE-2018-4407-iOS-exploit", - "owner": { - "login": "zeng9t", - "id": 10195620, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10195620?v=4", - "html_url": "https:\/\/github.com\/zeng9t" - }, - "html_url": "https:\/\/github.com\/zeng9t\/CVE-2018-4407-iOS-exploit", - "description": "CVE-2018-4407,iOS exploit", - "fork": false, - "created_at": "2018-12-31T08:24:06Z", - "updated_at": "2019-12-06T03:03:03Z", - "pushed_at": "2018-12-31T08:48:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 183878561, "name": "CVE-2018-4407", diff --git a/2018/CVE-2018-4415.json b/2018/CVE-2018-4415.json deleted file mode 100644 index 0b195e01e1..0000000000 --- a/2018/CVE-2018-4415.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 159675683, - "name": "CVE-2018-4415", - "full_name": "T1V0h\/CVE-2018-4415", - "owner": { - "login": "T1V0h", - "id": 27940897, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27940897?v=4", - "html_url": "https:\/\/github.com\/T1V0h" - }, - "html_url": "https:\/\/github.com\/T1V0h\/CVE-2018-4415", - "description": null, - "fork": false, - "created_at": "2018-11-29T14:06:50Z", - "updated_at": "2018-11-29T14:12:49Z", - "pushed_at": "2018-11-29T14:09:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-4431.json b/2018/CVE-2018-4431.json deleted file mode 100644 index f26f4ce580..0000000000 --- a/2018/CVE-2018-4431.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 163434196, - "name": "PoC_iOS12", - "full_name": "ktiOSz\/PoC_iOS12", - "owner": { - "login": "ktiOSz", - "id": 37155945, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37155945?v=4", - "html_url": "https:\/\/github.com\/ktiOSz" - }, - "html_url": "https:\/\/github.com\/ktiOSz\/PoC_iOS12", - "description": "PoC Exploit iOS 12 to iOS 12.1 (CVE-2018-4431)", - "fork": false, - "created_at": "2018-12-28T17:26:35Z", - "updated_at": "2019-03-17T10:28:32Z", - "pushed_at": "2018-12-28T17:31:40Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-4878.json b/2018/CVE-2018-4878.json index 04a94d347d..7c7fd79c47 100644 --- a/2018/CVE-2018-4878.json +++ b/2018/CVE-2018-4878.json @@ -160,52 +160,6 @@ "watchers": 0, "score": 0 }, - { - "id": 153381902, - "name": "CVE-2018-4878", - "full_name": "B0fH\/CVE-2018-4878", - "owner": { - "login": "B0fH", - "id": 1335037, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1335037?v=4", - "html_url": "https:\/\/github.com\/B0fH" - }, - "html_url": "https:\/\/github.com\/B0fH\/CVE-2018-4878", - "description": "Metasploit module for CVE-2018-4878", - "fork": false, - "created_at": "2018-10-17T02:11:24Z", - "updated_at": "2018-12-26T09:33:54Z", - "pushed_at": "2018-10-24T02:18:00Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 162440583, - "name": "CVE-2018-4878", - "full_name": "Yable\/CVE-2018-4878", - "owner": { - "login": "Yable", - "id": 33931550, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33931550?v=4", - "html_url": "https:\/\/github.com\/Yable" - }, - "html_url": "https:\/\/github.com\/Yable\/CVE-2018-4878", - "description": null, - "fork": false, - "created_at": "2018-12-19T13:22:03Z", - "updated_at": "2018-12-20T08:11:04Z", - "pushed_at": "2018-12-20T08:11:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 197427494, "name": "SoftwareSystemSecurity-2019", diff --git a/2018/CVE-2018-5740.json b/2018/CVE-2018-5740.json deleted file mode 100644 index d59d038d97..0000000000 --- a/2018/CVE-2018-5740.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 144792218, - "name": "cve-2018-5740", - "full_name": "sischkg\/cve-2018-5740", - "owner": { - "login": "sischkg", - "id": 3468384, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3468384?v=4", - "html_url": "https:\/\/github.com\/sischkg" - }, - "html_url": "https:\/\/github.com\/sischkg\/cve-2018-5740", - "description": null, - "fork": false, - "created_at": "2018-08-15T01:50:41Z", - "updated_at": "2019-02-25T15:06:06Z", - "pushed_at": "2018-08-15T06:25:14Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 39ea2f3f37..416d0c8e31 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -1,27 +1,4 @@ [ - { - "id": 148261072, - "name": "GitStackRCE", - "full_name": "cisp\/GitStackRCE", - "owner": { - "login": "cisp", - "id": 11972644, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11972644?v=4", - "html_url": "https:\/\/github.com\/cisp" - }, - "html_url": "https:\/\/github.com\/cisp\/GitStackRCE", - "description": "GitStackRCE漏洞(CVE-2018-5955)EXP", - "fork": false, - "created_at": "2018-09-11T04:39:43Z", - "updated_at": "2018-09-21T15:13:18Z", - "pushed_at": "2018-09-11T04:40:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 229491909, "name": "Cerberus", diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 3f2a63a383..1cfdd880b0 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -344,75 +344,6 @@ "watchers": 0, "score": 0 }, - { - "id": 146678844, - "name": "trellis-cve-2018-6389", - "full_name": "ItinerisLtd\/trellis-cve-2018-6389", - "owner": { - "login": "ItinerisLtd", - "id": 32365928, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32365928?v=4", - "html_url": "https:\/\/github.com\/ItinerisLtd" - }, - "html_url": "https:\/\/github.com\/ItinerisLtd\/trellis-cve-2018-6389", - "description": "Mitigate CVE-2018-6389 WordPress load-scripts \/ load-styles attacks", - "fork": false, - "created_at": "2018-08-30T01:25:20Z", - "updated_at": "2020-08-11T04:43:27Z", - "pushed_at": "2018-08-30T01:47:48Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 0, - "forks": 0, - "watchers": 7, - "score": 0 - }, - { - "id": 155115549, - "name": "Wordpress-DOS", - "full_name": "Zazzzles\/Wordpress-DOS", - "owner": { - "login": "Zazzzles", - "id": 16189557, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16189557?v=4", - "html_url": "https:\/\/github.com\/Zazzzles" - }, - "html_url": "https:\/\/github.com\/Zazzzles\/Wordpress-DOS", - "description": "Exploit for vulnerability CVE-2018-6389 on wordpress sites", - "fork": false, - "created_at": "2018-10-28T21:05:04Z", - "updated_at": "2020-06-17T01:53:45Z", - "pushed_at": "2018-11-01T06:45:17Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, - "forks": 2, - "watchers": 4, - "score": 0 - }, - { - "id": 164352797, - "name": "tvsz", - "full_name": "fakedob\/tvsz", - "owner": { - "login": "fakedob", - "id": 8687970, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8687970?v=4", - "html_url": "https:\/\/github.com\/fakedob" - }, - "html_url": "https:\/\/github.com\/fakedob\/tvsz", - "description": "CVE-2018-6389 PoC node js multisite with proxy", - "fork": false, - "created_at": "2019-01-06T22:57:48Z", - "updated_at": "2019-07-08T20:41:54Z", - "pushed_at": "2019-01-06T23:37:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 220969745, "name": "Wordpress-DOS-Attack-CVE-2018-6389", diff --git a/2018/CVE-2018-6546.json b/2018/CVE-2018-6546.json index f0b91e0906..5b68e3c274 100644 --- a/2018/CVE-2018-6546.json +++ b/2018/CVE-2018-6546.json @@ -21,28 +21,5 @@ "forks": 10, "watchers": 42, "score": 0 - }, - { - "id": 142284375, - "name": "CVE-2018-6546", - "full_name": "YanZiShuang\/CVE-2018-6546", - "owner": { - "login": "YanZiShuang", - "id": 41621080, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41621080?v=4", - "html_url": "https:\/\/github.com\/YanZiShuang" - }, - "html_url": "https:\/\/github.com\/YanZiShuang\/CVE-2018-6546", - "description": null, - "fork": false, - "created_at": "2018-07-25T10:22:53Z", - "updated_at": "2019-09-02T13:24:16Z", - "pushed_at": "2018-07-25T11:59:09Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, - "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6574.json b/2018/CVE-2018-6574.json index eb242cf725..3dc89b844b 100644 --- a/2018/CVE-2018-6574.json +++ b/2018/CVE-2018-6574.json @@ -114,98 +114,6 @@ "watchers": 0, "score": 0 }, - { - "id": 150020637, - "name": "cve-2018-6574", - "full_name": "kenprice\/cve-2018-6574", - "owner": { - "login": "kenprice", - "id": 8813522, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8813522?v=4", - "html_url": "https:\/\/github.com\/kenprice" - }, - "html_url": "https:\/\/github.com\/kenprice\/cve-2018-6574", - "description": null, - "fork": false, - "created_at": "2018-09-23T20:00:38Z", - "updated_at": "2018-09-23T20:17:54Z", - "pushed_at": "2018-09-23T20:16:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 155760240, - "name": "cve-2018-6574", - "full_name": "redirected\/cve-2018-6574", - "owner": { - "login": "redirected", - "id": 11227335, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11227335?v=4", - "html_url": "https:\/\/github.com\/redirected" - }, - "html_url": "https:\/\/github.com\/redirected\/cve-2018-6574", - "description": null, - "fork": false, - "created_at": "2018-11-01T18:44:35Z", - "updated_at": "2018-11-01T18:57:35Z", - "pushed_at": "2018-11-01T18:57:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 162044535, - "name": "CVE-2018-6574-POC", - "full_name": "20matan\/CVE-2018-6574-POC", - "owner": { - "login": "20matan", - "id": 10909504, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10909504?v=4", - "html_url": "https:\/\/github.com\/20matan" - }, - "html_url": "https:\/\/github.com\/20matan\/CVE-2018-6574-POC", - "description": null, - "fork": false, - "created_at": "2018-12-16T21:55:27Z", - "updated_at": "2018-12-16T22:02:50Z", - "pushed_at": "2018-12-16T22:02:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 163056409, - "name": "Zur-Go-GET-RCE-Solution", - "full_name": "zur250\/Zur-Go-GET-RCE-Solution", - "owner": { - "login": "zur250", - "id": 14151749, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14151749?v=4", - "html_url": "https:\/\/github.com\/zur250" - }, - "html_url": "https:\/\/github.com\/zur250\/Zur-Go-GET-RCE-Solution", - "description": "CVE-2018-6574", - "fork": false, - "created_at": "2018-12-25T07:08:55Z", - "updated_at": "2018-12-25T07:48:09Z", - "pushed_at": "2020-05-05T05:28:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 163621881, "name": "cve-2018-6574", diff --git a/2018/CVE-2018-6643.json b/2018/CVE-2018-6643.json deleted file mode 100644 index 178d45d2bb..0000000000 --- a/2018/CVE-2018-6643.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 146195248, - "name": "CVE-2018-6643", - "full_name": "undefinedmode\/CVE-2018-6643", - "owner": { - "login": "undefinedmode", - "id": 4165481, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4165481?v=4", - "html_url": "https:\/\/github.com\/undefinedmode" - }, - "html_url": "https:\/\/github.com\/undefinedmode\/CVE-2018-6643", - "description": "CVE-2018-6643", - "fork": false, - "created_at": "2018-08-26T16:03:08Z", - "updated_at": "2018-08-27T13:36:10Z", - "pushed_at": "2018-08-28T23:03:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-7422.json b/2018/CVE-2018-7422.json deleted file mode 100644 index 453eea5d4a..0000000000 --- a/2018/CVE-2018-7422.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 156874990, - "name": "CVE-2018-7422", - "full_name": "0x00-0x00\/CVE-2018-7422", - "owner": { - "login": "0x00-0x00", - "id": 23364530, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", - "html_url": "https:\/\/github.com\/0x00-0x00" - }, - "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-7422", - "description": "Wordpress plugin Site-Editor v1.1.1 LFI exploit", - "fork": false, - "created_at": "2018-11-09T14:42:57Z", - "updated_at": "2019-09-27T14:14:03Z", - "pushed_at": "2018-11-09T14:43:08Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-7489.json b/2018/CVE-2018-7489.json deleted file mode 100644 index 13768fc252..0000000000 --- a/2018/CVE-2018-7489.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158225407, - "name": "CVE-2018-7489", - "full_name": "tafamace\/CVE-2018-7489", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-7489", - "description": null, - "fork": false, - "created_at": "2018-11-19T13:13:27Z", - "updated_at": "2018-11-19T13:23:28Z", - "pushed_at": "2018-11-19T13:23:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 0a79cbbd6b..730b58f0d2 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -390,29 +390,6 @@ "watchers": 0, "score": 0 }, - { - "id": 140643631, - "name": "CVE-2018-7600", - "full_name": "happynote3966\/CVE-2018-7600", - "owner": { - "login": "happynote3966", - "id": 19719330, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4", - "html_url": "https:\/\/github.com\/happynote3966" - }, - "html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7600", - "description": null, - "fork": false, - "created_at": "2018-07-12T01:12:44Z", - "updated_at": "2018-07-17T03:24:11Z", - "pushed_at": "2018-07-17T03:24:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 151199861, "name": "CVE-2018-7600-Drupal-RCE", @@ -459,29 +436,6 @@ "watchers": 4, "score": 0 }, - { - "id": 164355216, - "name": "cve-2018-7600", - "full_name": "cved-sources\/cve-2018-7600", - "owner": { - "login": "cved-sources", - "id": 46423677, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", - "html_url": "https:\/\/github.com\/cved-sources" - }, - "html_url": "https:\/\/github.com\/cved-sources\/cve-2018-7600", - "description": "cve-2018-7600", - "fork": false, - "created_at": "2019-01-06T23:41:33Z", - "updated_at": "2019-01-06T23:42:37Z", - "pushed_at": "2019-01-06T23:42:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 175778651, "name": "codeql-scanner", diff --git a/2018/CVE-2018-7602.json b/2018/CVE-2018-7602.json index a25e194e0e..bbfa4801d5 100644 --- a/2018/CVE-2018-7602.json +++ b/2018/CVE-2018-7602.json @@ -22,29 +22,6 @@ "watchers": 5, "score": 0 }, - { - "id": 140663638, - "name": "CVE-2018-7602", - "full_name": "happynote3966\/CVE-2018-7602", - "owner": { - "login": "happynote3966", - "id": 19719330, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4", - "html_url": "https:\/\/github.com\/happynote3966" - }, - "html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7602", - "description": null, - "fork": false, - "created_at": "2018-07-12T05:08:14Z", - "updated_at": "2018-07-17T02:57:18Z", - "pushed_at": "2018-07-17T02:57:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, { "id": 155205612, "name": "CVE-2018-7602", diff --git a/2018/CVE-2018-7690.json b/2018/CVE-2018-7690.json deleted file mode 100644 index 416b898a6e..0000000000 --- a/2018/CVE-2018-7690.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 159177319, - "name": "CVE-2018-7690", - "full_name": "alt3kx\/CVE-2018-7690", - "owner": { - "login": "alt3kx", - "id": 3140111, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" - }, - "html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-7690", - "description": "The SSC REST API contains Insecure Direct Object Reference (IDOR) vulnerabilities in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 ", - "fork": false, - "created_at": "2018-11-26T13:52:45Z", - "updated_at": "2018-12-15T11:14:26Z", - "pushed_at": "2018-12-15T11:14:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-7691.json b/2018/CVE-2018-7691.json deleted file mode 100644 index dfcef2582b..0000000000 --- a/2018/CVE-2018-7691.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 159177517, - "name": "CVE-2018-7691", - "full_name": "alt3kx\/CVE-2018-7691", - "owner": { - "login": "alt3kx", - "id": 3140111, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" - }, - "html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-7691", - "description": "The SSC REST API contains Insecure Direct Object Reference (IDOR) vulnerabilities in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 ", - "fork": false, - "created_at": "2018-11-26T13:54:08Z", - "updated_at": "2020-12-28T14:43:04Z", - "pushed_at": "2018-12-15T11:18:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-7750.json b/2018/CVE-2018-7750.json deleted file mode 100644 index cab1dc65d7..0000000000 --- a/2018/CVE-2018-7750.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 156363089, - "name": "CVE-2018-7750", - "full_name": "jm33-m0\/CVE-2018-7750", - "owner": { - "login": "jm33-m0", - "id": 10167884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10167884?v=4", - "html_url": "https:\/\/github.com\/jm33-m0" - }, - "html_url": "https:\/\/github.com\/jm33-m0\/CVE-2018-7750", - "description": "an RCE (remote command execution) approach of CVE-2018-7750", - "fork": false, - "created_at": "2018-11-06T10:01:13Z", - "updated_at": "2020-04-06T10:57:16Z", - "pushed_at": "2018-11-06T10:10:31Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 8, - "forks": 8, - "watchers": 17, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8021.json b/2018/CVE-2018-8021.json deleted file mode 100644 index b29b64efee..0000000000 --- a/2018/CVE-2018-8021.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 160079576, - "name": "Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021", - "full_name": "r3dxpl0it\/Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021", - "owner": { - "login": "r3dxpl0it", - "id": 43002597, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4", - "html_url": "https:\/\/github.com\/r3dxpl0it" - }, - "html_url": "https:\/\/github.com\/r3dxpl0it\/Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021", - "description": "CVE-2018-8021 Proof-Of-Concept and Exploit ", - "fork": false, - "created_at": "2018-12-02T19:01:17Z", - "updated_at": "2020-12-14T07:02:58Z", - "pushed_at": "2018-12-03T21:13:00Z", - "stargazers_count": 104, - "watchers_count": 104, - "forks_count": 18, - "forks": 18, - "watchers": 104, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8038.json b/2018/CVE-2018-8038.json deleted file mode 100644 index b64100d260..0000000000 --- a/2018/CVE-2018-8038.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158217015, - "name": "CVE-2018-8038", - "full_name": "tafamace\/CVE-2018-8038", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-8038", - "description": null, - "fork": false, - "created_at": "2018-11-19T12:14:45Z", - "updated_at": "2018-11-19T12:37:32Z", - "pushed_at": "2018-11-19T12:37:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8039.json b/2018/CVE-2018-8039.json deleted file mode 100644 index 744f3612c7..0000000000 --- a/2018/CVE-2018-8039.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 158216115, - "name": "CVE-2018-8039", - "full_name": "tafamace\/CVE-2018-8039", - "owner": { - "login": "tafamace", - "id": 45160113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" - }, - "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-8039", - "description": null, - "fork": false, - "created_at": "2018-11-19T12:08:07Z", - "updated_at": "2018-11-19T12:29:15Z", - "pushed_at": "2018-11-19T12:29:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8090.json b/2018/CVE-2018-8090.json deleted file mode 100644 index 7bc3cc026a..0000000000 --- a/2018/CVE-2018-8090.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 141976453, - "name": "CVE-2018-8090", - "full_name": "kernelm0de\/CVE-2018-8090", - "owner": { - "login": "kernelm0de", - "id": 30472260, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30472260?v=4", - "html_url": "https:\/\/github.com\/kernelm0de" - }, - "html_url": "https:\/\/github.com\/kernelm0de\/CVE-2018-8090", - "description": "DLL Hijacking in Quickheal Total Security\/ Internet Security\/ Antivirus Pro (Installers)", - "fork": false, - "created_at": "2018-07-23T07:17:07Z", - "updated_at": "2019-01-22T12:46:02Z", - "pushed_at": "2018-07-26T13:39:28Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, - "forks": 2, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index a202f2b801..55028876c8 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -114,75 +114,6 @@ "watchers": 2, "score": 0 }, - { - "id": 140512208, - "name": "CVE-2018-8120", - "full_name": "EVOL4\/CVE-2018-8120", - "owner": { - "login": "EVOL4", - "id": 26862344, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26862344?v=4", - "html_url": "https:\/\/github.com\/EVOL4" - }, - "html_url": "https:\/\/github.com\/EVOL4\/CVE-2018-8120", - "description": "dd", - "fork": false, - "created_at": "2018-07-11T02:41:16Z", - "updated_at": "2018-11-16T12:24:05Z", - "pushed_at": "2018-08-10T13:06:04Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, - { - "id": 144975276, - "name": "CVE-2018-8120", - "full_name": "ozkanbilge\/CVE-2018-8120", - "owner": { - "login": "ozkanbilge", - "id": 39211596, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39211596?v=4", - "html_url": "https:\/\/github.com\/ozkanbilge" - }, - "html_url": "https:\/\/github.com\/ozkanbilge\/CVE-2018-8120", - "description": "CVE-2018-8120 Windows LPE exploit", - "fork": false, - "created_at": "2018-08-16T10:51:00Z", - "updated_at": "2020-10-20T17:21:43Z", - "pushed_at": "2018-08-16T10:53:19Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, - { - "id": 162424739, - "name": "CVE-2018-8120", - "full_name": "qiantu88\/CVE-2018-8120", - "owner": { - "login": "qiantu88", - "id": 35452263, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4", - "html_url": "https:\/\/github.com\/qiantu88" - }, - "html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-8120", - "description": null, - "fork": false, - "created_at": "2018-12-19T10:58:55Z", - "updated_at": "2018-12-19T10:59:30Z", - "pushed_at": "2018-12-19T10:59:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 197940307, "name": "cve-2018-8120-exp", diff --git a/2018/CVE-2018-8172.json b/2018/CVE-2018-8172.json deleted file mode 100644 index 5e4d083932..0000000000 --- a/2018/CVE-2018-8172.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 145187210, - "name": "CVE-2018-8172", - "full_name": "SyFi\/CVE-2018-8172", - "owner": { - "login": "SyFi", - "id": 26314806, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4", - "html_url": "https:\/\/github.com\/SyFi" - }, - "html_url": "https:\/\/github.com\/SyFi\/CVE-2018-8172", - "description": "Microsoft Visual Studio CVE-2018-8172 Remote Code Execution Vulnerability", - "fork": false, - "created_at": "2018-08-18T03:37:15Z", - "updated_at": "2020-10-21T22:16:11Z", - "pushed_at": "2018-08-18T03:56:36Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 3, - "forks": 3, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json index ab16faf279..ac5f4598ab 100644 --- a/2018/CVE-2018-8174.json +++ b/2018/CVE-2018-8174.json @@ -91,52 +91,6 @@ "watchers": 1, "score": 0 }, - { - "id": 140478620, - "name": "cve-2018-8174_analysis", - "full_name": "piotrflorczyk\/cve-2018-8174_analysis", - "owner": { - "login": "piotrflorczyk", - "id": 7830144, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4", - "html_url": "https:\/\/github.com\/piotrflorczyk" - }, - "html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis", - "description": "Analysis of VBS exploit CVE-2018-8174", - "fork": false, - "created_at": "2018-07-10T19:31:25Z", - "updated_at": "2021-03-09T02:04:07Z", - "pushed_at": "2018-07-12T08:35:13Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 16, - "forks": 16, - "watchers": 15, - "score": 0 - }, - { - "id": 147615569, - "name": "CVE-2018-8174-msf", - "full_name": "likescam\/CVE-2018-8174-msf", - "owner": { - "login": "likescam", - "id": 2469038, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", - "html_url": "https:\/\/github.com\/likescam" - }, - "html_url": "https:\/\/github.com\/likescam\/CVE-2018-8174-msf", - "description": null, - "fork": false, - "created_at": "2018-09-06T04:03:25Z", - "updated_at": "2018-09-06T04:03:37Z", - "pushed_at": "2018-09-06T04:03:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 188212551, "name": "ie11_vbscript_exploit", diff --git a/2018/CVE-2018-8208.json b/2018/CVE-2018-8208.json deleted file mode 100644 index 433d699d8b..0000000000 --- a/2018/CVE-2018-8208.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 144541015, - "name": "CVE-2018-8208", - "full_name": "kaisaryousuf\/CVE-2018-8208", - "owner": { - "login": "kaisaryousuf", - "id": 27071719, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27071719?v=4", - "html_url": "https:\/\/github.com\/kaisaryousuf" - }, - "html_url": "https:\/\/github.com\/kaisaryousuf\/CVE-2018-8208", - "description": null, - "fork": false, - "created_at": "2018-08-13T06:56:11Z", - "updated_at": "2018-11-12T16:22:38Z", - "pushed_at": "2018-06-21T15:06:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8353.json b/2018/CVE-2018-8353.json deleted file mode 100644 index 24c17a3572..0000000000 --- a/2018/CVE-2018-8353.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 148192905, - "name": "CVE-2018-8353-POC", - "full_name": "whereisr0da\/CVE-2018-8353-POC", - "owner": { - "login": "whereisr0da", - "id": 37551872, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37551872?v=4", - "html_url": "https:\/\/github.com\/whereisr0da" - }, - "html_url": "https:\/\/github.com\/whereisr0da\/CVE-2018-8353-POC", - "description": "Simple poc of CVE-2018-8353 Microsoft Scripting Engine Use After Free", - "fork": false, - "created_at": "2018-09-10T17:28:05Z", - "updated_at": "2018-10-15T01:07:56Z", - "pushed_at": "2018-09-10T17:32:49Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 4, - "forks": 4, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8420.json b/2018/CVE-2018-8420.json deleted file mode 100644 index 7023a6c566..0000000000 --- a/2018/CVE-2018-8420.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 148446677, - "name": "CVE-2018-8420", - "full_name": "idkwim\/CVE-2018-8420", - "owner": { - "login": "idkwim", - "id": 4337087, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4337087?v=4", - "html_url": "https:\/\/github.com\/idkwim" - }, - "html_url": "https:\/\/github.com\/idkwim\/CVE-2018-8420", - "description": null, - "fork": false, - "created_at": "2018-09-12T08:22:54Z", - "updated_at": "2020-10-21T22:16:16Z", - "pushed_at": "2018-09-12T03:50:14Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 53, - "forks": 53, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8440.json b/2018/CVE-2018-8440.json deleted file mode 100644 index afce0f88f3..0000000000 --- a/2018/CVE-2018-8440.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 155593957, - "name": "CVE-2018-8440", - "full_name": "sourceincite\/CVE-2018-8440", - "owner": { - "login": "sourceincite", - "id": 13770985, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13770985?v=4", - "html_url": "https:\/\/github.com\/sourceincite" - }, - "html_url": "https:\/\/github.com\/sourceincite\/CVE-2018-8440", - "description": "CVE-2018-8440 standalone exploit", - "fork": false, - "created_at": "2018-10-31T17:00:43Z", - "updated_at": "2021-03-01T08:16:12Z", - "pushed_at": "2018-10-31T19:05:17Z", - "stargazers_count": 72, - "watchers_count": 72, - "forks_count": 23, - "forks": 23, - "watchers": 72, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8495.json b/2018/CVE-2018-8495.json deleted file mode 100644 index a6ec6eee37..0000000000 --- a/2018/CVE-2018-8495.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 152781400, - "name": "CVE-2018-8495-POC", - "full_name": "whereisr0da\/CVE-2018-8495-POC", - "owner": { - "login": "whereisr0da", - "id": 37551872, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37551872?v=4", - "html_url": "https:\/\/github.com\/whereisr0da" - }, - "html_url": "https:\/\/github.com\/whereisr0da\/CVE-2018-8495-POC", - "description": "Simple poc of CVE-2018-8495 Microsoft Edge Remote Code Execution", - "fork": false, - "created_at": "2018-10-12T16:49:57Z", - "updated_at": "2021-04-10T22:23:46Z", - "pushed_at": "2018-10-12T16:52:34Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 8, - "forks": 8, - "watchers": 9, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8581.json b/2018/CVE-2018-8581.json index dd11bb2385..e5a1fa5d65 100644 --- a/2018/CVE-2018-8581.json +++ b/2018/CVE-2018-8581.json @@ -1,50 +1,4 @@ [ - { - "id": 163256409, - "name": "CVE-2018-8581", - "full_name": "WyAtu\/CVE-2018-8581", - "owner": { - "login": "WyAtu", - "id": 23521935, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23521935?v=4", - "html_url": "https:\/\/github.com\/WyAtu" - }, - "html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-8581", - "description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability", - "fork": false, - "created_at": "2018-12-27T06:30:32Z", - "updated_at": "2021-03-28T06:04:00Z", - "pushed_at": "2018-12-30T11:53:08Z", - "stargazers_count": 322, - "watchers_count": 322, - "forks_count": 113, - "forks": 113, - "watchers": 322, - "score": 0 - }, - { - "id": 163425981, - "name": "CVE-2018-8581", - "full_name": "qiantu88\/CVE-2018-8581", - "owner": { - "login": "qiantu88", - "id": 35452263, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4", - "html_url": "https:\/\/github.com\/qiantu88" - }, - "html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-8581", - "description": "CVE-2018-8581", - "fork": false, - "created_at": "2018-12-28T15:47:32Z", - "updated_at": "2019-02-07T04:37:49Z", - "pushed_at": "2018-12-28T15:47:53Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 0, - "forks": 0, - "watchers": 5, - "score": 0 - }, { "id": 167313064, "name": "Exchange2domain", diff --git a/2018/CVE-2018-8897.json b/2018/CVE-2018-8897.json index 24fc64019b..2f224f9120 100644 --- a/2018/CVE-2018-8897.json +++ b/2018/CVE-2018-8897.json @@ -67,28 +67,5 @@ "forks": 110, "watchers": 389, "score": 0 - }, - { - "id": 144062105, - "name": "syscall_exploit_CVE-2018-8897", - "full_name": "nmulasmajic\/syscall_exploit_CVE-2018-8897", - "owner": { - "login": "nmulasmajic", - "id": 30013958, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30013958?v=4", - "html_url": "https:\/\/github.com\/nmulasmajic" - }, - "html_url": "https:\/\/github.com\/nmulasmajic\/syscall_exploit_CVE-2018-8897", - "description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).", - "fork": false, - "created_at": "2018-08-08T20:04:56Z", - "updated_at": "2021-03-15T13:20:03Z", - "pushed_at": "2018-08-08T20:12:20Z", - "stargazers_count": 108, - "watchers_count": 108, - "forks_count": 25, - "forks": 25, - "watchers": 108, - "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-9075.json b/2018/CVE-2018-9075.json deleted file mode 100644 index 231478bd8a..0000000000 --- a/2018/CVE-2018-9075.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 150627369, - "name": "cve-2018-9075", - "full_name": "beverlymiller818\/cve-2018-9075", - "owner": { - "login": "beverlymiller818", - "id": 43651541, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43651541?v=4", - "html_url": "https:\/\/github.com\/beverlymiller818" - }, - "html_url": "https:\/\/github.com\/beverlymiller818\/cve-2018-9075", - "description": null, - "fork": false, - "created_at": "2018-09-27T17:58:00Z", - "updated_at": "2018-09-27T19:26:57Z", - "pushed_at": "2018-09-27T19:27:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-9206.json b/2018/CVE-2018-9206.json index 22db8bb197..d433564bd9 100644 --- a/2018/CVE-2018-9206.json +++ b/2018/CVE-2018-9206.json @@ -1,50 +1,4 @@ [ - { - "id": 154178141, - "name": "CVE-2018-9206", - "full_name": "Den1al\/CVE-2018-9206", - "owner": { - "login": "Den1al", - "id": 7230603, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7230603?v=4", - "html_url": "https:\/\/github.com\/Den1al" - }, - "html_url": "https:\/\/github.com\/Den1al\/CVE-2018-9206", - "description": "A Python PoC for CVE-2018-9206", - "fork": false, - "created_at": "2018-10-22T16:33:22Z", - "updated_at": "2021-02-20T07:43:16Z", - "pushed_at": "2018-10-22T16:49:08Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 12, - "forks": 12, - "watchers": 14, - "score": 0 - }, - { - "id": 154564555, - "name": "JQShell", - "full_name": "Stahlz\/JQShell", - "owner": { - "login": "Stahlz", - "id": 4689086, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4689086?v=4", - "html_url": "https:\/\/github.com\/Stahlz" - }, - "html_url": "https:\/\/github.com\/Stahlz\/JQShell", - "description": "A weaponized version of CVE-2018-9206", - "fork": false, - "created_at": "2018-10-24T20:24:20Z", - "updated_at": "2020-10-26T09:05:01Z", - "pushed_at": "2018-10-30T01:48:42Z", - "stargazers_count": 63, - "watchers_count": 63, - "forks_count": 16, - "forks": 16, - "watchers": 63, - "score": 0 - }, { "id": 165319420, "name": "cve-2018-9206", diff --git a/2018/CVE-2018-9411.json b/2018/CVE-2018-9411.json deleted file mode 100644 index 5adca1c6bf..0000000000 --- a/2018/CVE-2018-9411.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 155439217, - "name": "CVE-2018-9411", - "full_name": "tamirzb\/CVE-2018-9411", - "owner": { - "login": "tamirzb", - "id": 1054209, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1054209?v=4", - "html_url": "https:\/\/github.com\/tamirzb" - }, - "html_url": "https:\/\/github.com\/tamirzb\/CVE-2018-9411", - "description": "Exploit code for CVE-2018-9411 for MediaCasService", - "fork": false, - "created_at": "2018-10-30T18:48:20Z", - "updated_at": "2021-02-18T07:26:59Z", - "pushed_at": "2018-10-30T21:51:16Z", - "stargazers_count": 48, - "watchers_count": 48, - "forks_count": 14, - "forks": 14, - "watchers": 48, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-9539.json b/2018/CVE-2018-9539.json deleted file mode 100644 index 8735a38386..0000000000 --- a/2018/CVE-2018-9539.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 157086233, - "name": "CVE-2018-9539", - "full_name": "tamirzb\/CVE-2018-9539", - "owner": { - "login": "tamirzb", - "id": 1054209, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1054209?v=4", - "html_url": "https:\/\/github.com\/tamirzb" - }, - "html_url": "https:\/\/github.com\/tamirzb\/CVE-2018-9539", - "description": " PoC code for CVE-2018-9539", - "fork": false, - "created_at": "2018-11-11T14:14:04Z", - "updated_at": "2019-07-11T00:57:55Z", - "pushed_at": "2018-11-11T14:19:32Z", - "stargazers_count": 18, - "watchers_count": 18, - "forks_count": 8, - "forks": 8, - "watchers": 18, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-9948.json b/2018/CVE-2018-9948.json deleted file mode 100644 index 3d9694695a..0000000000 --- a/2018/CVE-2018-9948.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 143491453, - "name": "Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958", - "full_name": "manojcode\/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958", - "owner": { - "login": "manojcode", - "id": 17510282, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17510282?v=4", - "html_url": "https:\/\/github.com\/manojcode" - }, - "html_url": "https:\/\/github.com\/manojcode\/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958", - "description": "Foxit Reader version 9.0.1.1049 Use After Free with ASLR and DEP bypass on heap", - "fork": false, - "created_at": "2018-08-04T02:32:28Z", - "updated_at": "2021-03-26T07:34:59Z", - "pushed_at": "2018-09-11T14:19:07Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, - "forks": 2, - "watchers": 4, - "score": 0 - }, - { - "id": 145526091, - "name": "cve-2018-9948-9958-exp", - "full_name": "orangepirate\/cve-2018-9948-9958-exp", - "owner": { - "login": "orangepirate", - "id": 40813235, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40813235?v=4", - "html_url": "https:\/\/github.com\/orangepirate" - }, - "html_url": "https:\/\/github.com\/orangepirate\/cve-2018-9948-9958-exp", - "description": "a exp for cve-2018-9948\/9958 , current shellcode called win-calc ", - "fork": false, - "created_at": "2018-08-21T07:43:38Z", - "updated_at": "2018-08-24T00:18:07Z", - "pushed_at": "2018-08-24T00:18:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index dfe7101618..2d422e3a2a 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -114,29 +114,6 @@ "watchers": 4, "score": 0 }, - { - "id": 150025071, - "name": "DVR-Exploiter", - "full_name": "Cyb0r9\/DVR-Exploiter", - "owner": { - "login": "Cyb0r9", - "id": 43474676, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43474676?v=4", - "html_url": "https:\/\/github.com\/Cyb0r9" - }, - "html_url": "https:\/\/github.com\/Cyb0r9\/DVR-Exploiter", - "description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995", - "fork": false, - "created_at": "2018-09-23T20:58:40Z", - "updated_at": "2020-12-23T20:45:44Z", - "pushed_at": "2018-10-11T16:54:31Z", - "stargazers_count": 81, - "watchers_count": 81, - "forks_count": 42, - "forks": 42, - "watchers": 81, - "score": 0 - }, { "id": 167874136, "name": "CVE-2018-9995", diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index b75d94b2b9..b5d45df49a 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-04-11T01:15:30Z", + "updated_at": "2021-04-11T07:08:11Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2481, - "watchers_count": 2481, - "forks_count": 716, - "forks": 716, - "watchers": 2481, + "stargazers_count": 2482, + "watchers_count": 2482, + "forks_count": 717, + "forks": 717, + "watchers": 2482, "score": 0 }, { diff --git a/2019/CVE-2019-5475.json b/2019/CVE-2019-5475.json index 630fb1291d..4272ab410e 100644 --- a/2019/CVE-2019-5475.json +++ b/2019/CVE-2019-5475.json @@ -36,13 +36,13 @@ "description": "CVE-2019-5475-EXP 【Nexus Repository Manager 2.x远程命令执行漏洞】", "fork": false, "created_at": "2020-04-12T15:49:36Z", - "updated_at": "2021-02-15T22:06:43Z", + "updated_at": "2021-04-11T08:56:09Z", "pushed_at": "2020-04-12T15:59:16Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 8, "forks": 8, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2019/CVE-2019-6340.json b/2019/CVE-2019-6340.json index 307f271b81..f492404c06 100644 --- a/2019/CVE-2019-6340.json +++ b/2019/CVE-2019-6340.json @@ -151,13 +151,13 @@ "description": "Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340", "fork": false, "created_at": "2019-05-27T19:06:14Z", - "updated_at": "2020-11-18T16:15:26Z", + "updated_at": "2021-04-11T06:38:18Z", "pushed_at": "2020-06-10T18:03:24Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 25, "forks": 25, - "watchers": 66, + "watchers": 67, "score": 0 }, { diff --git a/2019/CVE-2019-9193.json b/2019/CVE-2019-9193.json index 5c5f05c828..c3bdb5ed2c 100644 --- a/2019/CVE-2019-9193.json +++ b/2019/CVE-2019-9193.json @@ -14,11 +14,11 @@ "fork": false, "created_at": "2020-02-12T00:17:58Z", "updated_at": "2021-03-01T16:16:24Z", - "pushed_at": "2021-03-01T12:44:04Z", + "pushed_at": "2021-04-11T09:01:32Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 1, "score": 0 }, diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index d3143fab16..2bb657c3ef 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -197,13 +197,13 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2021-04-09T05:19:04Z", + "updated_at": "2021-04-11T06:14:30Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 278, - "watchers_count": 278, + "stargazers_count": 279, + "watchers_count": 279, "forks_count": 71, "forks": 71, - "watchers": 278, + "watchers": 279, "score": 0 }, { diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json index 84659ae717..6d057e4ee3 100644 --- a/2020/CVE-2020-10199.json +++ b/2020/CVE-2020-10199.json @@ -82,13 +82,13 @@ "description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)", "fork": false, "created_at": "2020-04-16T09:40:15Z", - "updated_at": "2021-03-19T13:45:50Z", + "updated_at": "2021-04-11T08:55:28Z", "pushed_at": "2020-05-26T10:23:34Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "forks_count": 10, "forks": 10, - "watchers": 32, + "watchers": 33, "score": 0 }, { diff --git a/2020/CVE-2020-10977.json b/2020/CVE-2020-10977.json index ca1e10d7dd..9dd8f15c82 100644 --- a/2020/CVE-2020-10977.json +++ b/2020/CVE-2020-10977.json @@ -136,5 +136,28 @@ "forks": 1, "watchers": 2, "score": 0 + }, + { + "id": 356786384, + "name": "cve-2020-10977-read-and-execute", + "full_name": "lisp3r\/cve-2020-10977-read-and-execute", + "owner": { + "login": "lisp3r", + "id": 6272944, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6272944?v=4", + "html_url": "https:\/\/github.com\/lisp3r" + }, + "html_url": "https:\/\/github.com\/lisp3r\/cve-2020-10977-read-and-execute", + "description": "cve-2020-10977 read and execute", + "fork": false, + "created_at": "2021-04-11T06:31:06Z", + "updated_at": "2021-04-11T06:32:35Z", + "pushed_at": "2021-04-11T06:32:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index ae45aad245..3493a0ffe8 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-04-11T01:15:30Z", + "updated_at": "2021-04-11T07:08:11Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2481, - "watchers_count": 2481, - "forks_count": 716, - "forks": 716, - "watchers": 2481, + "stargazers_count": 2482, + "watchers_count": 2482, + "forks_count": 717, + "forks": 717, + "watchers": 2482, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index c967473dff..39111e99bb 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-04-11T03:07:47Z", - "pushed_at": "2021-04-10T23:43:59Z", - "stargazers_count": 444, - "watchers_count": 444, - "forks_count": 109, - "forks": 109, - "watchers": 444, + "updated_at": "2021-04-11T09:05:12Z", + "pushed_at": "2021-04-11T03:25:34Z", + "stargazers_count": 459, + "watchers_count": 459, + "forks_count": 115, + "forks": 115, + "watchers": 459, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17382.json b/2020/CVE-2020-17382.json index 13205eb4c2..de12ec5f55 100644 --- a/2020/CVE-2020-17382.json +++ b/2020/CVE-2020-17382.json @@ -17,8 +17,8 @@ "pushed_at": "2020-10-02T18:45:43Z", "stargazers_count": 106, "watchers_count": 106, - "forks_count": 24, - "forks": 24, + "forks_count": 25, + "forks": 25, "watchers": 106, "score": 0 } diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index e5e076ea91..e33a93df87 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -59,13 +59,13 @@ "description": "CVE-2020-5902 BIG-IP", "fork": false, "created_at": "2020-07-05T16:38:32Z", - "updated_at": "2021-04-02T12:41:00Z", + "updated_at": "2021-04-11T06:12:53Z", "pushed_at": "2020-07-15T02:52:33Z", - "stargazers_count": 343, - "watchers_count": 343, + "stargazers_count": 344, + "watchers_count": 344, "forks_count": 108, "forks": 108, - "watchers": 343, + "watchers": 344, "score": 0 }, { diff --git a/2020/CVE-2020-6207.json b/2020/CVE-2020-6207.json index c798965924..3336e0344a 100644 --- a/2020/CVE-2020-6207.json +++ b/2020/CVE-2020-6207.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)", "fork": false, "created_at": "2021-01-14T10:49:40Z", - "updated_at": "2021-03-25T15:57:11Z", + "updated_at": "2021-04-11T09:06:13Z", "pushed_at": "2021-01-15T16:25:19Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "forks_count": 25, "forks": 25, - "watchers": 71, + "watchers": 72, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21402.json b/2021/CVE-2021-21402.json index 39f80d2389..ba0bbf0971 100644 --- a/2021/CVE-2021-21402.json +++ b/2021/CVE-2021-21402.json @@ -36,8 +36,8 @@ "description": "CVE-2021-21402", "fork": false, "created_at": "2021-04-09T06:38:25Z", - "updated_at": "2021-04-09T06:42:34Z", - "pushed_at": "2021-04-09T06:41:47Z", + "updated_at": "2021-04-11T07:32:59Z", + "pushed_at": "2021-04-11T06:11:13Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 72ba63dd1e..b498cbd9f9 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-04-11T03:07:47Z", - "pushed_at": "2021-04-10T23:43:59Z", - "stargazers_count": 444, - "watchers_count": 444, - "forks_count": 109, - "forks": 109, - "watchers": 444, + "updated_at": "2021-04-11T09:05:12Z", + "pushed_at": "2021-04-11T03:25:34Z", + "stargazers_count": 459, + "watchers_count": 459, + "forks_count": 115, + "forks": 115, + "watchers": 459, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index a1ab831045..5e270ab1a6 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -40,8 +40,8 @@ "pushed_at": "2021-01-24T05:28:07Z", "stargazers_count": 83, "watchers_count": 83, - "forks_count": 30, - "forks": 30, + "forks_count": 31, + "forks": 31, "watchers": 83, "score": 0 }, @@ -178,8 +178,8 @@ "pushed_at": "2021-02-21T06:34:17Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/README.md b/README.md index 0a89173a8b..fdaa74e89a 100644 --- a/README.md +++ b/README.md @@ -2811,6 +2811,7 @@ GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an iss - [VoxelNaut/cve-2020-10977](https://github.com/VoxelNaut/cve-2020-10977) - [erk3/gitlab-12.9.0-file-read](https://github.com/erk3/gitlab-12.9.0-file-read) - [Liath/CVE-2020-10977](https://github.com/Liath/CVE-2020-10977) +- [lisp3r/cve-2020-10977-read-and-execute](https://github.com/lisp3r/cve-2020-10977-read-and-execute) ### CVE-2020-11076 (2020-05-22) @@ -8667,7 +8668,6 @@ A vulnerability in the web interface of the Cisco Adaptive Security Appliance (A - [milo2012/CVE-2018-0296](https://github.com/milo2012/CVE-2018-0296) - [yassineaboukir/CVE-2018-0296](https://github.com/yassineaboukir/CVE-2018-0296) - [bhenner1/CVE-2018-0296](https://github.com/bhenner1/CVE-2018-0296) -- [qiantu88/CVE-2018-0296](https://github.com/qiantu88/CVE-2018-0296) ### CVE-2018-0708 (2018-07-16) @@ -8706,17 +8706,6 @@ The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows - [preempt/credssp](https://github.com/preempt/credssp) -### CVE-2018-0952 (2018-08-15) - - -An Elevation of Privilege vulnerability exists when Diagnostics Hub Standard Collector allows file creation in arbitrary locations, aka "Diagnostic Hub Standard Collector Elevation Of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Microsoft Visual Studio, Windows 10 Servers. - - -- [atredispartners/CVE-2018-0952-SystemCollector](https://github.com/atredispartners/CVE-2018-0952-SystemCollector) - -### CVE-2018-14 -- [lckJack/legacySymfony](https://github.com/lckJack/legacySymfony) - ### CVE-2018-1010 (2018-04-11) @@ -8785,14 +8774,6 @@ Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions - [AbsoZed/CVE-2018-1235](https://github.com/AbsoZed/CVE-2018-1235) -### CVE-2018-1259 (2018-05-11) - - -Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system. - - -- [tafamace/CVE-2018-1259](https://github.com/tafamace/CVE-2018-1259) - ### CVE-2018-1270 (2018-04-06) @@ -8801,8 +8782,6 @@ Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 a - [CaledoniaProject/CVE-2018-1270](https://github.com/CaledoniaProject/CVE-2018-1270) - [genxor/CVE-2018-1270_EXP](https://github.com/genxor/CVE-2018-1270_EXP) -- [tafamace/CVE-2018-1270](https://github.com/tafamace/CVE-2018-1270) -- [Venscor/CVE-2018-1270](https://github.com/Venscor/CVE-2018-1270) - [mprunet/owasp-formation-cve-2018-1270](https://github.com/mprunet/owasp-formation-cve-2018-1270) ### CVE-2018-1273 (2018-04-11) @@ -8813,7 +8792,6 @@ Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older - [knqyf263/CVE-2018-1273](https://github.com/knqyf263/CVE-2018-1273) - [wearearima/poc-cve-2018-1273](https://github.com/wearearima/poc-cve-2018-1273) -- [webr0ck/poc-cve-2018-1273](https://github.com/webr0ck/poc-cve-2018-1273) - [cved-sources/cve-2018-1273](https://github.com/cved-sources/cve-2018-1273) - [jas502n/cve-2018-1273](https://github.com/jas502n/cve-2018-1273) @@ -8859,22 +8837,6 @@ The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pl - [JJSO12/Apache-Pluto-3.0.0--CVE-2018-1306](https://github.com/JJSO12/Apache-Pluto-3.0.0--CVE-2018-1306) -### CVE-2018-1313 (2018-05-07) - - -In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. If the Derby Network Server is not running with a Java Security Manager policy file, the attack is successful. If the server is using a policy file, the policy file must permit the database location to be read for the attack to work. The default Derby Network Server policy file distributed with the affected releases includes a permissive policy as the default Network Server policy, which allows the attack to work. - - -- [tafamace/CVE-2018-1313](https://github.com/tafamace/CVE-2018-1313) - -### CVE-2018-1324 (2018-03-16) - - -A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package. - - -- [tafamace/CVE-2018-1324](https://github.com/tafamace/CVE-2018-1324) - ### CVE-2018-1335 (2018-04-25) @@ -8931,9 +8893,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [wrysunny/cve-2018-2628](https://github.com/wrysunny/cve-2018-2628) - [jas502n/CVE-2018-2628](https://github.com/jas502n/CVE-2018-2628) - [stevenlinfeng/CVE-2018-2628](https://github.com/stevenlinfeng/CVE-2018-2628) -- [likescam/CVE-2018-2628](https://github.com/likescam/CVE-2018-2628) -- [Nervous/WebLogic-RCE-exploit](https://github.com/Nervous/WebLogic-RCE-exploit) -- [Lighird/CVE-2018-2628](https://github.com/Lighird/CVE-2018-2628) - [0xMJ/CVE-2018-2628](https://github.com/0xMJ/CVE-2018-2628) - [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner) - [seethen/cve-2018-2628](https://github.com/seethen/cve-2018-2628) @@ -8947,21 +8906,12 @@ Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality - [erpscanteam/CVE-2018-2636](https://github.com/erpscanteam/CVE-2018-2636) - [Cymmetria/micros_honeypot](https://github.com/Cymmetria/micros_honeypot) -### CVE-2018-2844 (2018-04-18) - - -Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.36 and Prior to 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). - - -- [renorobert/virtualbox-cve-2018-2844](https://github.com/renorobert/virtualbox-cve-2018-2844) - ### CVE-2018-2879 (2018-04-18) Vulnerability in the Oracle Access Manager component of Oracle Fusion Middleware (subcomponent: Authentication Engine). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. While the vulnerability is in Oracle Access Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. Note: Please refer to Doc ID <a href="http://support.oracle.com/CSP/main/article?cmd=show&type=NOT&id=2386496.1">My Oracle Support Note 2386496.1 for instructions on how to address this issue. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). -- [MostafaSoliman/Oracle-OAM-Padding-Oracle-CVE-2018-2879-Exploit](https://github.com/MostafaSoliman/Oracle-OAM-Padding-Oracle-CVE-2018-2879-Exploit) - [AymanElSherif/oracle-oam-authentication-bypas-exploit](https://github.com/AymanElSherif/oracle-oam-authentication-bypas-exploit) - [redtimmy/OAMBuster](https://github.com/redtimmy/OAMBuster) @@ -8971,12 +8921,6 @@ Vulnerability in the Oracle Access Manager component of Oracle Fusion Middleware Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). -- [sry309/CVE-2018-2893](https://github.com/sry309/CVE-2018-2893) -- [ryanInf/CVE-2018-2893](https://github.com/ryanInf/CVE-2018-2893) -- [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893) -- [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893) -- [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893) -- [jas502n/CVE-2018-2893](https://github.com/jas502n/CVE-2018-2893) - [ianxtianxt/CVE-2018-2893](https://github.com/ianxtianxt/CVE-2018-2893) ### CVE-2018-2894 (2018-07-18) @@ -8985,44 +8929,18 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). -- [111ddea/cve-2018-2894](https://github.com/111ddea/cve-2018-2894) -- [LandGrey/CVE-2018-2894](https://github.com/LandGrey/CVE-2018-2894) - [jas502n/CVE-2018-2894](https://github.com/jas502n/CVE-2018-2894) - [k8gege/PyLadon](https://github.com/k8gege/PyLadon) - [changpin666com/CVE-2018-2894-Weblogic-](https://github.com/changpin666com/CVE-2018-2894-Weblogic-) -### CVE-2018-3191 (2018-10-16) - - -Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). - - -- [arongmh/CVE-2018-3191](https://github.com/arongmh/CVE-2018-3191) -- [pyn3rd/CVE-2018-3191](https://github.com/pyn3rd/CVE-2018-3191) -- [Libraggbond/CVE-2018-3191](https://github.com/Libraggbond/CVE-2018-3191) -- [jas502n/CVE-2018-3191](https://github.com/jas502n/CVE-2018-3191) -- [mackleadmire/CVE-2018-3191-Rce-Exploit](https://github.com/mackleadmire/CVE-2018-3191-Rce-Exploit) - ### CVE-2018-3245 (2018-10-16) Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). -- [pyn3rd/CVE-2018-3245](https://github.com/pyn3rd/CVE-2018-3245) -- [jas502n/CVE-2018-3245](https://github.com/jas502n/CVE-2018-3245) - [ianxtianxt/CVE-2018-3245](https://github.com/ianxtianxt/CVE-2018-3245) -### CVE-2018-3252 (2018-10-16) - - -Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). - - -- [jas502n/CVE-2018-3252](https://github.com/jas502n/CVE-2018-3252) -- [b1ueb0y/CVE-2018-3252](https://github.com/b1ueb0y/CVE-2018-3252) -- [pyn3rd/CVE-2018-3252](https://github.com/pyn3rd/CVE-2018-3252) - ### CVE-2018-3260 - [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck) @@ -9096,15 +9014,6 @@ SQL Injection vulnerability in the Oturia Smart Google Code Inserter plugin befo - [cved-sources/cve-2018-3811](https://github.com/cved-sources/cve-2018-3811) -### CVE-2018-4013 (2018-10-19) - - -An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. - - -- [DoubleMice/cve-2018-4013](https://github.com/DoubleMice/cve-2018-4013) -- [r3dxpl0it/RTSPServer-Code-Execution-Vulnerability](https://github.com/r3dxpl0it/RTSPServer-Code-Execution-Vulnerability) - ### CVE-2018-4087 (2018-04-03) @@ -9130,8 +9039,6 @@ An issue was discovered in certain Apple products. iOS before 11.3 is affected. - [FSecureLABS/CVE-2018-4121](https://github.com/FSecureLABS/CVE-2018-4121) -- [likescam/CVE-2018-4121](https://github.com/likescam/CVE-2018-4121) -- [jezzus/CVE-2018-4121](https://github.com/jezzus/CVE-2018-4121) ### CVE-2018-4124 (2018-04-03) @@ -9167,14 +9074,6 @@ An issue was discovered in certain Apple products. macOS before 10.13.5 is affec - [Synacktiv-contrib/CVE-2018-4193](https://github.com/Synacktiv-contrib/CVE-2018-4193) -### CVE-2018-4233 (2018-06-08) - - -An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. - - -- [saelo/cve-2018-4233](https://github.com/saelo/cve-2018-4233) - ### CVE-2018-4241 (2018-06-08) @@ -9183,14 +9082,6 @@ An issue was discovered in certain Apple products. iOS before 11.4 is affected. - [0neday/multi_path](https://github.com/0neday/multi_path) -### CVE-2018-4242 (2018-06-08) - - -An issue was discovered in certain Apple products. macOS before 10.13.5 is affected. The issue involves the "Hypervisor" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. - - -- [yeonnic/Look-at-The-XNU-Through-A-Tube-CVE-2018-4242-Write-up-Translation-](https://github.com/yeonnic/Look-at-The-XNU-Through-A-Tube-CVE-2018-4242-Write-up-Translation-) - ### CVE-2018-4243 (2018-06-08) @@ -9216,23 +9107,6 @@ A memory corruption issue was addressed with improved memory handling. This issu - [bazad/launchd-portrep](https://github.com/bazad/launchd-portrep) - [bazad/blanket](https://github.com/bazad/blanket) -### CVE-2018-4327 (2019-04-03) - - -A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1. - - -- [omerporze/brokentooth](https://github.com/omerporze/brokentooth) -- [harryanon/POC-CVE-2018-4327-and-CVE-2018-4330](https://github.com/harryanon/POC-CVE-2018-4327-and-CVE-2018-4330) - -### CVE-2018-4330 (2019-01-11) - - -In iOS before 11.4, a memory corruption issue exists and was addressed with improved memory handling. - - -- [omerporze/toothfairy](https://github.com/omerporze/toothfairy) - ### CVE-2018-4331 (2019-04-03) @@ -9255,18 +9129,8 @@ A memory corruption issue was addressed with improved memory handling. This issu A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5. -- [Pa55w0rd/check_icmp_dos](https://github.com/Pa55w0rd/check_icmp_dos) -- [unixpickle/cve-2018-4407](https://github.com/unixpickle/cve-2018-4407) -- [s2339956/check_icmp_dos-CVE-2018-4407-](https://github.com/s2339956/check_icmp_dos-CVE-2018-4407-) -- [farisv/AppleDOS](https://github.com/farisv/AppleDOS) - [WyAtu/CVE-2018-4407](https://github.com/WyAtu/CVE-2018-4407) -- [zteeed/CVE-2018-4407-IOS](https://github.com/zteeed/CVE-2018-4407-IOS) -- [SamDecrock/node-cve-2018-4407](https://github.com/SamDecrock/node-cve-2018-4407) -- [r3dxpl0it/CVE-2018-4407](https://github.com/r3dxpl0it/CVE-2018-4407) -- [lucagiovagnoli/CVE-2018-4407](https://github.com/lucagiovagnoli/CVE-2018-4407) - [anonymouz4/Apple-Remote-Crash-Tool-CVE-2018-4407](https://github.com/anonymouz4/Apple-Remote-Crash-Tool-CVE-2018-4407) -- [soccercab/wifi](https://github.com/soccercab/wifi) -- [zeng9t/CVE-2018-4407-iOS-exploit](https://github.com/zeng9t/CVE-2018-4407-iOS-exploit) - [5431/CVE-2018-4407](https://github.com/5431/CVE-2018-4407) - [pwnhacker0x18/iOS-Kernel-Crash](https://github.com/pwnhacker0x18/iOS-Kernel-Crash) - [Fans0n-Fan/CVE-2018-4407](https://github.com/Fans0n-Fan/CVE-2018-4407) @@ -9279,22 +9143,6 @@ A memory corruption issue was addressed with improved input validation. This iss - [lilang-wu/POC-CVE-2018-4411](https://github.com/lilang-wu/POC-CVE-2018-4411) -### CVE-2018-4415 (2019-04-03) - - -A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to macOS Mojave 10.14.1. - - -- [T1V0h/CVE-2018-4415](https://github.com/T1V0h/CVE-2018-4415) - -### CVE-2018-4431 (2019-04-03) - - -A memory initialization issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, macOS Mojave 10.14.2, tvOS 12.1.1, watchOS 5.1.2. - - -- [ktiOSz/PoC_iOS12](https://github.com/ktiOSz/PoC_iOS12) - ### CVE-2018-4441 (2019-04-03) @@ -9316,8 +9164,6 @@ A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0. - [KathodeN/CVE-2018-4878](https://github.com/KathodeN/CVE-2018-4878) - [SyFi/CVE-2018-4878](https://github.com/SyFi/CVE-2018-4878) - [ydl555/CVE-2018-4878](https://github.com/ydl555/CVE-2018-4878) -- [B0fH/CVE-2018-4878](https://github.com/B0fH/CVE-2018-4878) -- [Yable/CVE-2018-4878](https://github.com/Yable/CVE-2018-4878) - [HuanWoWeiLan/SoftwareSystemSecurity-2019](https://github.com/HuanWoWeiLan/SoftwareSystemSecurity-2019) ### CVE-2018-4879 (2018-02-27) @@ -9385,14 +9231,6 @@ Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potenti - [ezelf/seatel_terminals](https://github.com/ezelf/seatel_terminals) -### CVE-2018-5740 (2019-01-16) - - -"deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0->9.8.8, 9.9.0->9.9.13, 9.10.0->9.10.8, 9.11.0->9.11.4, 9.12.0->9.12.2, 9.13.0->9.13.2. - - -- [sischkg/cve-2018-5740](https://github.com/sischkg/cve-2018-5740) - ### CVE-2018-5951 (2020-03-02) @@ -9407,7 +9245,6 @@ An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size An issue was discovered in GitStack through 2.3.10. User controlled input is not sufficiently filtered, allowing an unauthenticated attacker to add a user to the server via the username and password fields to the rest/user/ URI. -- [cisp/GitStackRCE](https://github.com/cisp/GitStackRCE) - [YagamiiLight/Cerberus](https://github.com/YagamiiLight/Cerberus) ### CVE-2018-6242 (2018-05-01) @@ -9451,9 +9288,6 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv - [s0md3v/Shiva](https://github.com/s0md3v/Shiva) - [mudhappy/Wordpress-Hack-CVE-2018-6389](https://github.com/mudhappy/Wordpress-Hack-CVE-2018-6389) - [armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389](https://github.com/armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389) -- [ItinerisLtd/trellis-cve-2018-6389](https://github.com/ItinerisLtd/trellis-cve-2018-6389) -- [Zazzzles/Wordpress-DOS](https://github.com/Zazzzles/Wordpress-DOS) -- [fakedob/tvsz](https://github.com/fakedob/tvsz) - [vineetkia/Wordpress-DOS-Attack-CVE-2018-6389](https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389) - [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389) - [Elsfa7-110/CVE-2018-6389](https://github.com/Elsfa7-110/CVE-2018-6389) @@ -9497,7 +9331,6 @@ plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD - [securifera/CVE-2018-6546-Exploit](https://github.com/securifera/CVE-2018-6546-Exploit) -- [YanZiShuang/CVE-2018-6546](https://github.com/YanZiShuang/CVE-2018-6546) ### CVE-2018-6574 (2018-02-07) @@ -9510,10 +9343,6 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r - [willbo4r/go-get-rce](https://github.com/willbo4r/go-get-rce) - [ahmetmanga/go-get-rce](https://github.com/ahmetmanga/go-get-rce) - [ahmetmanga/cve-2018-6574](https://github.com/ahmetmanga/cve-2018-6574) -- [kenprice/cve-2018-6574](https://github.com/kenprice/cve-2018-6574) -- [redirected/cve-2018-6574](https://github.com/redirected/cve-2018-6574) -- [20matan/CVE-2018-6574-POC](https://github.com/20matan/CVE-2018-6574-POC) -- [zur250/Zur-Go-GET-RCE-Solution](https://github.com/zur250/Zur-Go-GET-RCE-Solution) - [mekhalleh/cve-2018-6574](https://github.com/mekhalleh/cve-2018-6574) - [veter069/go-get-rce](https://github.com/veter069/go-get-rce) - [duckzsc2/CVE-2018-6574-POC](https://github.com/duckzsc2/CVE-2018-6574-POC) @@ -9567,14 +9396,6 @@ An issue was discovered that affects all producers of BIOS firmware who make a c - [kkamagui/napper-for-tpm](https://github.com/kkamagui/napper-for-tpm) -### CVE-2018-6643 (2018-08-28) - - -Infoblox NetMRI 7.1.1 has Reflected Cross-Site Scripting via the /api/docs/index.php query parameter. - - -- [undefinedmode/CVE-2018-6643](https://github.com/undefinedmode/CVE-2018-6643) - ### CVE-2018-6789 (2018-02-08) @@ -9685,22 +9506,6 @@ A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through - [Rodrigo-D/astDoS](https://github.com/Rodrigo-D/astDoS) -### CVE-2018-7422 (2018-03-19) - - -A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php, aka absolute path traversal. - - -- [0x00-0x00/CVE-2018-7422](https://github.com/0x00-0x00/CVE-2018-7422) - -### CVE-2018-7489 (2018-02-26) - - -FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath. - - -- [tafamace/CVE-2018-7489](https://github.com/tafamace/CVE-2018-7489) - ### CVE-2018-7600 (2018-03-29) @@ -9724,10 +9529,8 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 - [fyraiga/CVE-2018-7600-drupalgeddon2-scanner](https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner) - [Damian972/drupalgeddon-2](https://github.com/Damian972/drupalgeddon-2) - [Jyozi/CVE-2018-7600](https://github.com/Jyozi/CVE-2018-7600) -- [happynote3966/CVE-2018-7600](https://github.com/happynote3966/CVE-2018-7600) - [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE) - [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600) -- [cved-sources/cve-2018-7600](https://github.com/cved-sources/cve-2018-7600) - [madneal/codeql-scanner](https://github.com/madneal/codeql-scanner) - [drugeddon/drupal-exploit](https://github.com/drugeddon/drupal-exploit) - [shellord/Drupalgeddon-Mass-Exploiter](https://github.com/shellord/Drupalgeddon-Mass-Exploiter) @@ -9744,7 +9547,6 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa - [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3) -- [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602) - [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602) - [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602) @@ -9756,22 +9558,6 @@ An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 - [palaziv/CVE-2018-7669](https://github.com/palaziv/CVE-2018-7669) -### CVE-2018-7690 (2018-12-13) - - -A potential Remote Unauthorized Access in Micro Focus Fortify Software Security Center (SSC), versions 17.10, 17.20, 18.10 this exploitation could allow Remote Unauthorized Access - - -- [alt3kx/CVE-2018-7690](https://github.com/alt3kx/CVE-2018-7690) - -### CVE-2018-7691 (2018-12-13) - - -A potential Remote Unauthorized Access in Micro Focus Fortify Software Security Center (SSC), versions 17.10, 17.20, 18.10 this exploitation could allow Remote Unauthorized Access - - -- [alt3kx/CVE-2018-7691](https://github.com/alt3kx/CVE-2018-7691) - ### CVE-2018-7747 (2018-04-20) @@ -9780,14 +9566,6 @@ Multiple cross-site scripting (XSS) vulnerabilities in the Caldera Forms plugin - [mindpr00f/CVE-2018-7747](https://github.com/mindpr00f/CVE-2018-7747) -### CVE-2018-7750 (2018-03-13) - - -transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step. - - -- [jm33-m0/CVE-2018-7750](https://github.com/jm33-m0/CVE-2018-7750) - ### CVE-2018-7935 - [lawrenceamer/CVE-2018-7935](https://github.com/lawrenceamer/CVE-2018-7935) @@ -9799,14 +9577,6 @@ There are multiple HTTP smuggling and cache poisoning issues when clients making - [mosesrenegade/CVE-2018-8004](https://github.com/mosesrenegade/CVE-2018-8004) -### CVE-2018-8021 (2018-11-07) - - -Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation. - - -- [r3dxpl0it/Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021](https://github.com/r3dxpl0it/Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021) - ### CVE-2018-8032 (2018-08-02) @@ -9815,22 +9585,6 @@ Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting - [cairuojin/CVE-2018-8032](https://github.com/cairuojin/CVE-2018-8032) -### CVE-2018-8038 (2018-07-05) - - -Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters. - - -- [tafamace/CVE-2018-8038](https://github.com/tafamace/CVE-2018-8038) - -### CVE-2018-8039 (2018-07-02) - - -It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks. - - -- [tafamace/CVE-2018-8039](https://github.com/tafamace/CVE-2018-8039) - ### CVE-2018-8045 (2018-03-14) @@ -9863,14 +9617,6 @@ YzmCMS 3.7 has Stored XSS via the title parameter to advertisement/adver/edit.ht - [AlwaysHereFight/YZMCMSxss](https://github.com/AlwaysHereFight/YZMCMSxss) -### CVE-2018-8090 (2018-07-25) - - -Quick Heal Total Security 64 bit 17.00 (QHTS64.exe), (QHTSFT64.exe) - Version 10.0.1.38; Quick Heal Total Security 32 bit 17.00 (QHTS32.exe), (QHTSFT32.exe) - Version 10.0.1.38; Quick Heal Internet Security 64 bit 17.00 (QHIS64.exe), (QHISFT64.exe) - Version 10.0.0.37; Quick Heal Internet Security 32 bit 17.00 (QHIS32.exe), (QHISFT32.exe) - Version 10.0.0.37; Quick Heal AntiVirus Pro 64 bit 17.00 (QHAV64.exe), (QHAVFT64.exe) - Version 10.0.0.37; and Quick Heal AntiVirus Pro 32 bit 17.00 (QHAV32.exe), (QHAVFT32.exe) - Version 10.0.0.37 allow DLL Hijacking because of Insecure Library Loading. - - -- [kernelm0de/CVE-2018-8090](https://github.com/kernelm0de/CVE-2018-8090) - ### CVE-2018-8108 (2018-03-14) @@ -9898,22 +9644,11 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon - [ne1llee/cve-2018-8120](https://github.com/ne1llee/cve-2018-8120) - [alpha1ab/CVE-2018-8120](https://github.com/alpha1ab/CVE-2018-8120) - [areuu/CVE-2018-8120](https://github.com/areuu/CVE-2018-8120) -- [EVOL4/CVE-2018-8120](https://github.com/EVOL4/CVE-2018-8120) -- [ozkanbilge/CVE-2018-8120](https://github.com/ozkanbilge/CVE-2018-8120) -- [qiantu88/CVE-2018-8120](https://github.com/qiantu88/CVE-2018-8120) - [Y0n0Y/cve-2018-8120-exp](https://github.com/Y0n0Y/cve-2018-8120-exp) - [DreamoneOnly/CVE-2018-8120](https://github.com/DreamoneOnly/CVE-2018-8120) - [StartZYP/CVE-2018-8120](https://github.com/StartZYP/CVE-2018-8120) - [wikiZ/cve-2018-8120](https://github.com/wikiZ/cve-2018-8120) -### CVE-2018-8172 (2018-07-10) - - -A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project, aka "Visual Studio Remote Code Execution Vulnerability." This affects Microsoft Visual Studio, Expression Blend 4. - - -- [SyFi/CVE-2018-8172](https://github.com/SyFi/CVE-2018-8172) - ### CVE-2018-8174 (2018-05-09) @@ -9924,8 +9659,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine - [Yt1g3r/CVE-2018-8174_EXP](https://github.com/Yt1g3r/CVE-2018-8174_EXP) - [SyFi/CVE-2018-8174](https://github.com/SyFi/CVE-2018-8174) - [orf53975/Rig-Exploit-for-CVE-2018-8174](https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174) -- [piotrflorczyk/cve-2018-8174_analysis](https://github.com/piotrflorczyk/cve-2018-8174_analysis) -- [likescam/CVE-2018-8174-msf](https://github.com/likescam/CVE-2018-8174-msf) - [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit) - [ericisnotrealname/CVE-2018-8174_EXP](https://github.com/ericisnotrealname/CVE-2018-8174_EXP) - [www201001/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP) @@ -9933,14 +9666,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine - [delina1/CVE-2018-8174](https://github.com/delina1/CVE-2018-8174) - [delina1/CVE-2018-8174_EXP](https://github.com/delina1/CVE-2018-8174_EXP) -### CVE-2018-8208 (2018-06-14) - - -An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8214. - - -- [kaisaryousuf/CVE-2018-8208](https://github.com/kaisaryousuf/CVE-2018-8208) - ### CVE-2018-8214 (2018-06-14) @@ -9957,14 +9682,6 @@ A remote code execution vulnerability exists when the Microsoft .NET Framework f - [quantiti/CVE-2018-8284-Sharepoint-RCE](https://github.com/quantiti/CVE-2018-8284-Sharepoint-RCE) -### CVE-2018-8353 (2018-08-15) - - -A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390. - - -- [whereisr0da/CVE-2018-8353-POC](https://github.com/whereisr0da/CVE-2018-8353-POC) - ### CVE-2018-8389 (2018-08-15) @@ -9981,22 +9698,6 @@ A remote code execution vulnerability exists when the Windows Shell does not pro - [whereisr0da/CVE-2018-8414-POC](https://github.com/whereisr0da/CVE-2018-8414-POC) -### CVE-2018-8420 (2018-09-12) - - -A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka "MS XML Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. - - -- [idkwim/CVE-2018-8420](https://github.com/idkwim/CVE-2018-8420) - -### CVE-2018-8440 (2018-09-12) - - -An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. - - -- [sourceincite/CVE-2018-8440](https://github.com/sourceincite/CVE-2018-8440) - ### CVE-2018-8453 (2018-10-10) @@ -10007,22 +9708,12 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon - [ze0r/cve-2018-8453-exp](https://github.com/ze0r/cve-2018-8453-exp) - [thepwnrip/leHACK-Analysis-of-CVE-2018-8453](https://github.com/thepwnrip/leHACK-Analysis-of-CVE-2018-8453) -### CVE-2018-8495 (2018-10-10) - - -A remote code execution vulnerability exists when Windows Shell improperly handles URIs, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. - - -- [whereisr0da/CVE-2018-8495-POC](https://github.com/whereisr0da/CVE-2018-8495-POC) - ### CVE-2018-8581 (2018-11-13) An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." This affects Microsoft Exchange Server. -- [WyAtu/CVE-2018-8581](https://github.com/WyAtu/CVE-2018-8581) -- [qiantu88/CVE-2018-8581](https://github.com/qiantu88/CVE-2018-8581) - [Ridter/Exchange2domain](https://github.com/Ridter/Exchange2domain) ### CVE-2018-8639 (2018-12-11) @@ -10067,7 +9758,6 @@ A statement in the System Programming Guide of the Intel 64 and IA-32 Architectu - [nmulasmajic/CVE-2018-8897](https://github.com/nmulasmajic/CVE-2018-8897) - [jiazhang0/pop-mov-ss-exploit](https://github.com/jiazhang0/pop-mov-ss-exploit) - [can1357/CVE-2018-8897](https://github.com/can1357/CVE-2018-8897) -- [nmulasmajic/syscall_exploit_CVE-2018-8897](https://github.com/nmulasmajic/syscall_exploit_CVE-2018-8897) ### CVE-2018-8941 (2018-04-03) @@ -10101,14 +9791,6 @@ Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 7.2 allows rem - [manojcode/easy-file-share-7.2-exploit-CVE-2018-9059](https://github.com/manojcode/easy-file-share-7.2-exploit-CVE-2018-9059) -### CVE-2018-9075 (2018-09-28) - - -For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, when joining a PersonalCloud setup, an attacker can craft a command injection payload using backtick "``" characters in the client:password parameter. As a result, arbitrary commands may be executed as the root user. The attack requires a value __c and iomega parameter. - - -- [beverlymiller818/cve-2018-9075](https://github.com/beverlymiller818/cve-2018-9075) - ### CVE-2018-9160 (2018-03-31) @@ -10123,8 +9805,6 @@ SickRage before v2018.03.09-1 includes cleartext credentials in HTTP responses. Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0 -- [Den1al/CVE-2018-9206](https://github.com/Den1al/CVE-2018-9206) -- [Stahlz/JQShell](https://github.com/Stahlz/JQShell) - [cved-sources/cve-2018-9206](https://github.com/cved-sources/cve-2018-9206) ### CVE-2018-9207 (2018-11-19) @@ -10155,9 +9835,6 @@ An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who ### CVE-2018-9375 - [IOActive/AOSP-ExploitUserDictionary](https://github.com/IOActive/AOSP-ExploitUserDictionary) -### CVE-2018-9411 -- [tamirzb/CVE-2018-9411](https://github.com/tamirzb/CVE-2018-9411) - ### CVE-2018-9468 - [IOActive/AOSP-DownloadProviderHijacker](https://github.com/IOActive/AOSP-DownloadProviderHijacker) @@ -10169,26 +9846,9 @@ In the content provider of the download manager, there is a possible SQL injecti - [IOActive/AOSP-DownloadProviderDbDumper](https://github.com/IOActive/AOSP-DownloadProviderDbDumper) -### CVE-2018-9539 (2018-11-14) - - -In the ClearKey CAS descrambler, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 Android-8.1 Android-9. Android ID: A-113027383 - - -- [tamirzb/CVE-2018-9539](https://github.com/tamirzb/CVE-2018-9539) - ### CVE-2018-9546 - [IOActive/AOSP-DownloadProviderHeadersDumper](https://github.com/IOActive/AOSP-DownloadProviderHeadersDumper) -### CVE-2018-9948 (2018-05-17) - - -This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of typed arrays. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5380. - - -- [manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958](https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958) -- [orangepirate/cve-2018-9948-9958-exp](https://github.com/orangepirate/cve-2018-9948-9958-exp) - ### CVE-2018-9950 (2018-05-17) @@ -10224,7 +9884,6 @@ TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in - [Huangkey/CVE-2018-9995_check](https://github.com/Huangkey/CVE-2018-9995_check) - [gwolfs/CVE-2018-9995-ModifiedByGwolfs](https://github.com/gwolfs/CVE-2018-9995-ModifiedByGwolfs) - [shacojx/cve-2018-9995](https://github.com/shacojx/cve-2018-9995) -- [Cyb0r9/DVR-Exploiter](https://github.com/Cyb0r9/DVR-Exploiter) - [codeholic2k18/CVE-2018-9995](https://github.com/codeholic2k18/CVE-2018-9995) - [TateYdq/CVE-2018-9995-ModifiedByGwolfs](https://github.com/TateYdq/CVE-2018-9995-ModifiedByGwolfs) - [ABIZCHI/CVE-2018-9995_dvr_credentials](https://github.com/ABIZCHI/CVE-2018-9995_dvr_credentials) @@ -10262,14 +9921,6 @@ Format string vulnerability in the logMess function in TFTP Server SP 1.66 and e ### CVE-2018-10467 - [alt3kx/CVE-2018-10467](https://github.com/alt3kx/CVE-2018-10467) -### CVE-2018-10517 (2018-04-27) - - -In CMS Made Simple (CMSMS) through 2.2.7, the "module import" operation in the admin dashboard contains a remote code execution vulnerability, exploitable by an admin user, because an XML Package can contain base64-encoded PHP code in a data element. - - -- [0x00-0x00/CVE-2018-10517](https://github.com/0x00-0x00/CVE-2018-10517) - ### CVE-2018-10546 (2018-04-29) @@ -10339,31 +9990,8 @@ Improper input validation bug in DNS resolver component of Knot Resolver before A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access. -- [SoledaD208/CVE-2018-10933](https://github.com/SoledaD208/CVE-2018-10933) - [blacknbunny/CVE-2018-10933](https://github.com/blacknbunny/CVE-2018-10933) -- [hook-s3c/CVE-2018-10933](https://github.com/hook-s3c/CVE-2018-10933) -- [kn6869610/CVE-2018-10933](https://github.com/kn6869610/CVE-2018-10933) -- [leapsecurity/libssh-scanner](https://github.com/leapsecurity/libssh-scanner) -- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh) -- [trbpnd/bpnd-libssh](https://github.com/trbpnd/bpnd-libssh) -- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass) -- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933) -- [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933) -- [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933) -- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933) -- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc) -- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner) -- [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933) -- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933) - [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933) -- [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933) -- [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933) -- [ivanacostarubio/libssh-scanner](https://github.com/ivanacostarubio/libssh-scanner) -- [throwawayaccount12312312/precompiled-CVE-2018-10933](https://github.com/throwawayaccount12312312/precompiled-CVE-2018-10933) -- [ensimag-security/CVE-2018-10933](https://github.com/ensimag-security/CVE-2018-10933) -- [Ad1bDaw/libSSH-bypass](https://github.com/Ad1bDaw/libSSH-bypass) -- [sambiyal/CVE-2018-10933-POC](https://github.com/sambiyal/CVE-2018-10933-POC) -- [nikhil1232/LibSSH-Authentication-Bypass](https://github.com/nikhil1232/LibSSH-Authentication-Bypass) - [Kurlee/LibSSH-exploit](https://github.com/Kurlee/LibSSH-exploit) - [crispy-peppers/Libssh-server-CVE-2018-10933](https://github.com/crispy-peppers/Libssh-server-CVE-2018-10933) - [youkergav/CVE-2018-10933](https://github.com/youkergav/CVE-2018-10933) @@ -10372,22 +10000,6 @@ A vulnerability was found in libssh's server-side state machine before versions - [JoSecMx/CVE-2018-10933_Scanner](https://github.com/JoSecMx/CVE-2018-10933_Scanner) - [cyberharsh/Libssh-server-CVE-2018-10933](https://github.com/cyberharsh/Libssh-server-CVE-2018-10933) -### CVE-2018-10936 (2018-08-30) - - -A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA. - - -- [tafamace/CVE-2018-10936](https://github.com/tafamace/CVE-2018-10936) - -### CVE-2018-10949 (2018-05-09) - - -mailboxd in Zimbra Collaboration Suite 8.8 before 8.8.8; 8.7 before 8.7.11.Patch3; and 8.6 allows Account Enumeration by leveraging a Discrepancy between the "HTTP 404 - account is not active" and "HTTP 401 - must authenticate" errors. - - -- [0x00-0x00/CVE-2018-10949](https://github.com/0x00-0x00/CVE-2018-10949) - ### CVE-2018-11235 (2018-05-30) @@ -10400,7 +10012,6 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before - [CHYbeta/CVE-2018-11235-DEMO](https://github.com/CHYbeta/CVE-2018-11235-DEMO) - [Kiss-sh0t/CVE-2018-11235-poc](https://github.com/Kiss-sh0t/CVE-2018-11235-poc) - [H0K5/clone_and_pwn](https://github.com/H0K5/clone_and_pwn) -- [knqyf263/CVE-2018-11235](https://github.com/knqyf263/CVE-2018-11235) - [ygouzerh/CVE-2018-11235](https://github.com/ygouzerh/CVE-2018-11235) - [qweraqq/CVE-2018-11235-Git-Submodule-CE](https://github.com/qweraqq/CVE-2018-11235-Git-Submodule-CE) - [jhswartz/CVE-2018-11235](https://github.com/jhswartz/CVE-2018-11235) @@ -10484,7 +10095,6 @@ The Publish Service in FlexPaper (later renamed FlowPaper) 2.3.6 allows remote c The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical. -- [immunIT/CVE-2018-11759](https://github.com/immunIT/CVE-2018-11759) - [Jul10l1r4/Identificador-CVE-2018-11759](https://github.com/Jul10l1r4/Identificador-CVE-2018-11759) ### CVE-2018-11761 (2018-09-19) @@ -10509,32 +10119,13 @@ From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API f Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace. -- [trbpnd/CVE-2018-11776](https://github.com/trbpnd/CVE-2018-11776) - [xfox64x/CVE-2018-11776](https://github.com/xfox64x/CVE-2018-11776) -- [jiguangin/CVE-2018-11776](https://github.com/jiguangin/CVE-2018-11776) -- [hook-s3c/CVE-2018-11776-Python-PoC](https://github.com/hook-s3c/CVE-2018-11776-Python-PoC) -- [mazen160/struts-pwn_CVE-2018-11776](https://github.com/mazen160/struts-pwn_CVE-2018-11776) -- [bhdresh/CVE-2018-11776](https://github.com/bhdresh/CVE-2018-11776) -- [knqyf263/CVE-2018-11776](https://github.com/knqyf263/CVE-2018-11776) -- [Ekultek/Strutter](https://github.com/Ekultek/Strutter) -- [tuxotron/cve-2018-11776-docker](https://github.com/tuxotron/cve-2018-11776-docker) -- [brianwrf/S2-057-CVE-2018-11776](https://github.com/brianwrf/S2-057-CVE-2018-11776) -- [649/Apache-Struts-Shodan-Exploit](https://github.com/649/Apache-Struts-Shodan-Exploit) -- [jezzus/CVE-2018-11776-Python-PoC](https://github.com/jezzus/CVE-2018-11776-Python-PoC) - [cved-sources/cve-2018-11776](https://github.com/cved-sources/cve-2018-11776) - [OzNetNerd/apche-struts-vuln-demo-cve-2018-11776](https://github.com/OzNetNerd/apche-struts-vuln-demo-cve-2018-11776) - [cucadili/CVE-2018-11776](https://github.com/cucadili/CVE-2018-11776) - [LightC0der/Apache-Struts-0Day-Exploit](https://github.com/LightC0der/Apache-Struts-0Day-Exploit) - [freshdemo/ApacheStruts-CVE-2018-11776](https://github.com/freshdemo/ApacheStruts-CVE-2018-11776) -### CVE-2018-11788 (2019-01-07) - - -Apache Karaf provides a features deployer, which allows users to "hot deploy" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as an user can inject external XML entities in Apache Karaf version prior to 4.1.7 or 4.2.2. It has been fixed in Apache Karaf 4.1.7 and 4.2.2 releases. - - -- [brianwrf/CVE-2018-11788](https://github.com/brianwrf/CVE-2018-11788) - ### CVE-2018-11882 (2018-10-29) @@ -10543,14 +10134,6 @@ Incorrect bound check can lead to potential buffer overwrite in WLAN controller - [jguard01/cve-2018-11882](https://github.com/jguard01/cve-2018-11882) -### CVE-2018-12018 (2018-07-04) - - -The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue. - - -- [k3v142/CVE-2018-12018](https://github.com/k3v142/CVE-2018-12018) - ### CVE-2018-12031 (2018-06-07) @@ -10559,14 +10142,6 @@ Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker - [EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion](https://github.com/EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion) -### CVE-2018-12038 (2018-11-20) - - -An issue was discovered on Samsung 840 EVO devices. Vendor-specific commands may allow access to the disk-encryption key. - - -- [gdraperi/remote-bitlocker-encryption-report](https://github.com/gdraperi/remote-bitlocker-encryption-report) - ### CVE-2018-12086 (2018-09-14) @@ -10584,14 +10159,6 @@ A vulnerability in register allocation in JavaScript can lead to type confusion, - [Hydra3evil/cve-2018-12386](https://github.com/Hydra3evil/cve-2018-12386) - [0xLyte/cve-2018-12386](https://github.com/0xLyte/cve-2018-12386) -### CVE-2018-12418 (2018-06-14) - - -Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files. - - -- [tafamace/CVE-2018-12418](https://github.com/tafamace/CVE-2018-12418) - ### CVE-2018-12421 (2018-06-14) @@ -10600,14 +10167,6 @@ LTB (aka LDAP Tool Box) Self Service Password before 1.3 allows a change to a us - [ReverseBrain/CVE-2018-12421](https://github.com/ReverseBrain/CVE-2018-12421) -### CVE-2018-12463 (2018-07-12) - - -An XML external entity (XXE) vulnerability in Fortify Software Security Center (SSC), version 17.1, 17.2, 18.1 allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. - - -- [alt3kx/CVE-2018-12463](https://github.com/alt3kx/CVE-2018-12463) - ### CVE-2018-12533 (2018-06-18) @@ -10616,22 +10175,6 @@ JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to i - [TheKalin/CVE-2018-12533](https://github.com/TheKalin/CVE-2018-12533) -### CVE-2018-12537 (2018-08-14) - - -In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response. - - -- [tafamace/CVE-2018-12537](https://github.com/tafamace/CVE-2018-12537) - -### CVE-2018-12540 (2018-07-12) - - -In version from 3.0.0 to 3.5.2 of Eclipse Vert.x, the CSRFHandler do not assert that the XSRF Cookie matches the returned XSRF header/form parameter. This allows replay attacks with previously issued tokens which are not expired yet. - - -- [tafamace/CVE-2018-12540](https://github.com/tafamace/CVE-2018-12540) - ### CVE-2018-12596 (2018-10-10) @@ -10652,7 +10195,6 @@ Episerver Ektron CMS before 9.0 SP3 Site CU 31, 9.1 before SP3 Site CU 45, or 9. An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication). -- [0x00-0x00/CVE-2018-12613](https://github.com/0x00-0x00/CVE-2018-12613) - [ivanitlearning/CVE-2018-12613](https://github.com/ivanitlearning/CVE-2018-12613) - [eastmountyxz/CVE-2018-12613-phpMyAdmin](https://github.com/eastmountyxz/CVE-2018-12613-phpMyAdmin) @@ -10664,14 +10206,6 @@ Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, - [sharmasandeepkr/cve-2018-12798](https://github.com/sharmasandeepkr/cve-2018-12798) -### CVE-2018-12895 (2018-06-26) - - -WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges. - - -- [bloom-ux/cve-2018-12895-hotfix](https://github.com/bloom-ux/cve-2018-12895-hotfix) - ### CVE-2018-13257 (2019-11-18) @@ -10721,14 +10255,6 @@ An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6. - [shinecome/zip](https://github.com/shinecome/zip) -### CVE-2018-13784 (2018-07-09) - - -PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption in Cookie.php, Rinjdael.php, and Blowfish.php. - - -- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits) - ### CVE-2018-13797 (2018-07-10) @@ -10737,46 +10263,20 @@ The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command - [dsp-testing/CVE-2018-13797](https://github.com/dsp-testing/CVE-2018-13797) -### CVE-2018-13864 (2018-07-17) - - -A directory traversal vulnerability has been found in the Assets controller in Play Framework 2.6.12 through 2.6.15 (fixed in 2.6.16) when running on Windows. It allows a remote attacker to download arbitrary files from the target server via specially crafted HTTP requests. - - -- [tafamace/CVE-2018-13864](https://github.com/tafamace/CVE-2018-13864) - -### CVE-2018-14083 (2018-07-25) - - -LICA miniCMTS E8K(u/i/...) devices allow remote attackers to obtain sensitive information via a direct POST request for the inc/user.ini file, leading to discovery of a password hash. - - -- [pudding2/CVE-2018-14083](https://github.com/pudding2/CVE-2018-14083) - ### CVE-2018-14442 (2018-07-20) Foxit Reader before 9.2 and PhantomPDF before 9.2 have a Use-After-Free that leads to Remote Code Execution, aka V-88f4smlocs. -- [payatu/CVE-2018-14442](https://github.com/payatu/CVE-2018-14442) - [sharmasandeepkr/PS-2018-002---CVE-2018-14442](https://github.com/sharmasandeepkr/PS-2018-002---CVE-2018-14442) -### CVE-2018-14634 (2018-09-25) - - -An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable. - - -- [luan0ap/cve-2018-14634](https://github.com/luan0ap/cve-2018-14634) - ### CVE-2018-14665 (2018-10-25) A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges. -- [jas502n/CVE-2018-14665](https://github.com/jas502n/CVE-2018-14665) - [bolonobolo/CVE-2018-14665](https://github.com/bolonobolo/CVE-2018-14665) - [samueldustin/cve-2018-14665](https://github.com/samueldustin/cve-2018-14665) @@ -10786,10 +10286,6 @@ A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via org.ajax4jsf.resource.UserResource$UriData. -- [nareshmail/cve-2018-14667](https://github.com/nareshmail/cve-2018-14667) -- [zeroto01/CVE-2018-14667](https://github.com/zeroto01/CVE-2018-14667) -- [r00t4dm/CVE-2018-14667](https://github.com/r00t4dm/CVE-2018-14667) -- [syriusbughunt/CVE-2018-14667](https://github.com/syriusbughunt/CVE-2018-14667) - [quandqn/cve-2018-14667](https://github.com/quandqn/cve-2018-14667) - [Venscor/CVE-2018-14667-poc](https://github.com/Venscor/CVE-2018-14667-poc) @@ -10801,22 +10297,6 @@ System command injection in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.500 - [tin-z/CVE-2018-14714-POC](https://github.com/tin-z/CVE-2018-14714-POC) -### CVE-2018-14729 (2019-05-22) - - -The database backup feature in upload/source/admincp/admincp_db.php in Discuz! 2.5 and 3.4 allows remote attackers to execute arbitrary PHP code. - - -- [FoolMitAh/CVE-2018-14729](https://github.com/FoolMitAh/CVE-2018-14729) - -### CVE-2018-14772 (2018-10-16) - - -Pydio 4.2.1 through 8.2.1 has an authenticated remote code execution vulnerability in which an attacker with administrator access to the web application can execute arbitrary code on the underlying system via Command Injection. - - -- [spencerdodd/CVE-2018-14772](https://github.com/spencerdodd/CVE-2018-14772) - ### CVE-2018-14847 (2018-08-02) @@ -10824,29 +10304,17 @@ MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read a - [BasuCert/WinboxPoC](https://github.com/BasuCert/WinboxPoC) -- [msterusky/WinboxExploit](https://github.com/msterusky/WinboxExploit) -- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot) -- [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847) - [th3f3n1x87/winboxPOC](https://github.com/th3f3n1x87/winboxPOC) - [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast) - [sinichi449/Python-MikrotikLoginExploit](https://github.com/sinichi449/Python-MikrotikLoginExploit) - [yukar1z0e/CVE-2018-14847](https://github.com/yukar1z0e/CVE-2018-14847) -### CVE-2018-15131 (2019-05-30) - - -An issue was discovered in Synacor Zimbra Collaboration Suite 8.6.x before 8.6.0 Patch 11, 8.7.x before 8.7.11 Patch 6, 8.8.x before 8.8.8 Patch 9, and 8.8.9 before 8.8.9 Patch 3. Account number enumeration is possible via inconsistent responses for specific types of authentication requests. - - -- [0x00-0x00/CVE-2018-15131](https://github.com/0x00-0x00/CVE-2018-15131) - ### CVE-2018-15133 (2018-08-09) In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack. -- [kozmic/laravel-poc-CVE-2018-15133](https://github.com/kozmic/laravel-poc-CVE-2018-15133) - [Bilelxdz/Laravel-CVE-2018-15133](https://github.com/Bilelxdz/Laravel-CVE-2018-15133) - [Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader](https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader) - [iansangaji/laravel-rce-cve-2018-15133](https://github.com/iansangaji/laravel-rce-cve-2018-15133) @@ -10855,14 +10323,6 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut - [PwnedShell/Larascript](https://github.com/PwnedShell/Larascript) - [AzhariKun/CVE-2018-15133](https://github.com/AzhariKun/CVE-2018-15133) -### CVE-2018-15365 (2018-09-28) - - -A Reflected Cross-Site Scripting (XSS) vulnerability in Trend Micro Deep Discovery Inspector 3.85 and below could allow an attacker to bypass CSRF protection and conduct an attack on vulnerable installations. An attacker must be an authenticated user in order to exploit the vulnerability. - - -- [nixwizard/CVE-2018-15365](https://github.com/nixwizard/CVE-2018-15365) - ### CVE-2018-15473 (2018-08-17) @@ -10870,12 +10330,10 @@ OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not dela - [trimstray/massh-enum](https://github.com/trimstray/massh-enum) -- [gbonacini/opensshenum](https://github.com/gbonacini/opensshenum) - [Rhynorater/CVE-2018-15473-Exploit](https://github.com/Rhynorater/CVE-2018-15473-Exploit) - [epi052/cve-2018-15473](https://github.com/epi052/cve-2018-15473) - [pyperanger/CVE-2018-15473_exploit](https://github.com/pyperanger/CVE-2018-15473_exploit) - [r3dxpl0it/CVE-2018-15473](https://github.com/r3dxpl0it/CVE-2018-15473) -- [JoeBlackSecurity/SSHUsernameBruter-SSHUB](https://github.com/JoeBlackSecurity/SSHUsernameBruter-SSHUB) - [cved-sources/cve-2018-15473](https://github.com/cved-sources/cve-2018-15473) - [LINYIKAI/CVE-2018-15473-exp](https://github.com/LINYIKAI/CVE-2018-15473-exp) - [secmode/enumpossible](https://github.com/secmode/enumpossible) @@ -10890,14 +10348,6 @@ OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not dela - [Sait-Nuri/CVE-2018-15473](https://github.com/Sait-Nuri/CVE-2018-15473) - [WildfootW/CVE-2018-15473_OpenSSH_7.7](https://github.com/WildfootW/CVE-2018-15473_OpenSSH_7.7) -### CVE-2018-15499 (2018-08-24) - - -GEAR Software products that include GEARAspiWDM.sys, 2.2.5.0, allow local users to cause a denial of service (Race Condition and BSoD on Windows) by not checking that user-mode memory is available right before writing to it. A check is only performed at the beginning of a long subroutine. - - -- [DownWithUp/CVE-2018-15499](https://github.com/DownWithUp/CVE-2018-15499) - ### CVE-2018-15686 (2018-10-26) @@ -10906,22 +10356,6 @@ A vulnerability in unit_deserialize of systemd allows an attacker to supply arbi - [hpcprofessional/remediate_cesa_2019_2091](https://github.com/hpcprofessional/remediate_cesa_2019_2091) -### CVE-2018-15727 (2018-08-29) - - -Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user. - - -- [u238/grafana-CVE-2018-15727](https://github.com/u238/grafana-CVE-2018-15727) - -### CVE-2018-15832 (2018-09-20) - - -upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI handlers. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process. - - -- [JacksonKuo/Ubisoft-Uplay-Desktop-Client-63.0.5699.0](https://github.com/JacksonKuo/Ubisoft-Uplay-Desktop-Client-63.0.5699.0) - ### CVE-2018-15835 (2018-11-30) @@ -10938,21 +10372,12 @@ The Plainview Activity Monitor plugin before 20180826 for WordPress is vulnerabl - [cved-sources/cve-2018-15877](https://github.com/cved-sources/cve-2018-15877) -### CVE-2018-15912 (2018-08-29) - - -An issue was discovered in manjaro-update-system.sh in manjaro-system 20180716-1 on Manjaro Linux. A local attacker can install or remove arbitrary packages and package repositories potentially containing hooks with arbitrary code, which will automatically be run as root, or remove packages vital to the system. - - -- [coderobe/CVE-2018-15912-PoC](https://github.com/coderobe/CVE-2018-15912-PoC) - ### CVE-2018-15961 (2018-09-25) Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have an unrestricted file upload vulnerability. Successful exploitation could lead to arbitrary code execution. -- [vah13/CVE-2018-15961](https://github.com/vah13/CVE-2018-15961) - [cved-sources/cve-2018-15961](https://github.com/cved-sources/cve-2018-15961) - [0xAJ2K/CVE-2018-15961](https://github.com/0xAJ2K/CVE-2018-15961) @@ -10970,13 +10395,9 @@ Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. -- [FlatL1neAPT/CVE-2018-15982](https://github.com/FlatL1neAPT/CVE-2018-15982) - [AirEvan/CVE-2018-15982_PoC](https://github.com/AirEvan/CVE-2018-15982_PoC) -- [Ridter/CVE-2018-15982_EXP](https://github.com/Ridter/CVE-2018-15982_EXP) - [kphongagsorn/adobe-flash-cve2018-15982](https://github.com/kphongagsorn/adobe-flash-cve2018-15982) -- [jas502n/CVE-2018-15982_EXP_IE](https://github.com/jas502n/CVE-2018-15982_EXP_IE) - [scanfsec/CVE-2018-15982](https://github.com/scanfsec/CVE-2018-15982) -- [SyFi/CVE-2018-15982](https://github.com/SyFi/CVE-2018-15982) - [create12138/CVE-2018-15982](https://github.com/create12138/CVE-2018-15982) ### CVE-2018-16119 (2019-06-20) @@ -10990,14 +10411,6 @@ Stack-based buffer overflow in the httpd server of TP-Link WR1043nd (Firmware Ve ### CVE-2018-16135 - [c0d3G33k/CVE-2018-16135](https://github.com/c0d3G33k/CVE-2018-16135) -### CVE-2018-16156 (2019-05-17) - - -In PaperStream IP (TWAIN) 1.42.0.5685 (Service Update 7), the FJTWSVIC service running with SYSTEM privilege processes unauthenticated messages received over the FjtwMkic_Fjicube_32 named pipe. One of these message processing functions attempts to dynamically load the UninOldIS.dll library and executes an exported function named ChangeUninstallString. The default install does not contain this library and therefore if any DLL with that name exists in any directory listed in the PATH variable, it can be used to escalate to SYSTEM level privilege. - - -- [securifera/CVE-2018-16156-Exploit](https://github.com/securifera/CVE-2018-16156-Exploit) - ### CVE-2018-16283 (2018-09-24) @@ -11017,22 +10430,6 @@ ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitial ### CVE-2018-16341 - [mpgn/CVE-2018-16341](https://github.com/mpgn/CVE-2018-16341) -### CVE-2018-16370 (2018-09-02) - - -In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive. - - -- [snappyJack/CVE-2018-16370](https://github.com/snappyJack/CVE-2018-16370) - -### CVE-2018-16373 (2018-09-02) - - -Frog CMS 0.9.5 has an Upload vulnerability that can create files via /admin/?/plugin/file_manager/save. - - -- [snappyJack/CVE-2018-16373](https://github.com/snappyJack/CVE-2018-16373) - ### CVE-2018-16492 (2019-02-01) @@ -11060,30 +10457,6 @@ LG SuperSign CMS allows TVs to be rebooted remotely without authentication via a - [Nurdilin/CVE-2018-16706](https://github.com/Nurdilin/CVE-2018-16706) -### CVE-2018-16711 (2018-09-26) - - -IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send an IOCTL (0x9C402088) with a buffer containing user defined content. The driver's subroutine will execute a wrmsr instruction with the user's buffer for input. - - -- [DownWithUp/CVE-2018-16711](https://github.com/DownWithUp/CVE-2018-16711) - -### CVE-2018-16712 (2018-09-26) - - -IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send a specially crafted IOCTL 0x9C406104 to read physical memory. - - -- [DownWithUp/CVE-2018-16712](https://github.com/DownWithUp/CVE-2018-16712) - -### CVE-2018-16713 (2018-09-26) - - -IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send an IOCTL (0x9C402084) with a buffer containing user defined content. The driver's subroutine will execute a rdmsr instruction with the user's buffer for input, and provide output from the instruction. - - -- [DownWithUp/CVE-2018-16713](https://github.com/DownWithUp/CVE-2018-16713) - ### CVE-2018-16763 (2018-09-09) @@ -11122,14 +10495,6 @@ It was found that libreoffice before versions 6.0.7 and 6.1.3 was vulnerable to - [4nimanegra/libreofficeExploit1](https://github.com/4nimanegra/libreofficeExploit1) - [phongld97/detect-cve-2018-16858](https://github.com/phongld97/detect-cve-2018-16858) -### CVE-2018-16875 (2018-12-14) - - -The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected. - - -- [alexzorin/poc-cve-2018-16875](https://github.com/alexzorin/poc-cve-2018-16875) - ### CVE-2018-16890 (2019-02-06) @@ -11138,14 +10503,6 @@ libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out - [zjw88282740/CVE-2018-16890](https://github.com/zjw88282740/CVE-2018-16890) -### CVE-2018-16987 (2018-09-13) - - -Squash TM through 1.18.0 presents the cleartext passwords of external services in the administration panel, as demonstrated by a ta-server-password field in the HTML source code. - - -- [gquere/CVE-2018-16987](https://github.com/gquere/CVE-2018-16987) - ### CVE-2018-17081 (2018-09-26) @@ -11154,25 +10511,6 @@ e107 2.1.9 allows CSRF via e107_admin/wmessage.php?mode=&action=inline&a - [himanshurahi/e107_2.1.9_CSRF_POC](https://github.com/himanshurahi/e107_2.1.9_CSRF_POC) -### CVE-2018-17144 (2018-09-19) - - -Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash. - - -- [iioch/ban-exploitable-bitcoin-nodes](https://github.com/iioch/ban-exploitable-bitcoin-nodes) -- [hikame/CVE-2018-17144_POC](https://github.com/hikame/CVE-2018-17144_POC) - -### CVE-2018-17182 (2018-09-19) - - -An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations. - - -- [jas502n/CVE-2018-17182](https://github.com/jas502n/CVE-2018-17182) -- [likescam/CVE-2018-17182](https://github.com/likescam/CVE-2018-17182) -- [likescam/vmacache_CVE-2018-17182](https://github.com/likescam/vmacache_CVE-2018-17182) - ### CVE-2018-17207 (2018-09-19) @@ -11189,14 +10527,6 @@ Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw - [mpgn/CVE-2018-17246](https://github.com/mpgn/CVE-2018-17246) -### CVE-2018-17418 (2019-03-07) - - -Monstra CMS 3.0.4 allows remote attackers to execute arbitrary PHP code via a mixed-case file extension, as demonstrated by the 123.PhP filename, because plugins\box\filesmanager\filesmanager.admin.php mishandles the forbidden_types variable. - - -- [AlwaysHereFight/monstra_cms-3.0.4--getshell](https://github.com/AlwaysHereFight/monstra_cms-3.0.4--getshell) - ### CVE-2018-17431 (2019-01-29) @@ -11211,8 +10541,6 @@ Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execu Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character. -- [shpik-kr/CVE-2018-17456](https://github.com/shpik-kr/CVE-2018-17456) -- [matlink/CVE-2018-17456](https://github.com/matlink/CVE-2018-17456) - [799600966/CVE-2018-17456](https://github.com/799600966/CVE-2018-17456) - [AnonymKing/CVE-2018-17456](https://github.com/AnonymKing/CVE-2018-17456) @@ -11224,22 +10552,6 @@ An incorrect access control vulnerability in the FTP configuration of WiFiRanger - [Luct0r/CVE-2018-17873](https://github.com/Luct0r/CVE-2018-17873) -### CVE-2018-17961 (2018-10-15) - - -Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183. - - -- [matlink/CVE-2018-17961](https://github.com/matlink/CVE-2018-17961) - -### CVE-2018-18026 (2018-10-19) - - -IMFCameraProtect.sys in IObit Malware Fighter 6.2 (and possibly lower versions) is vulnerable to a stack-based buffer overflow. The attacker can use DeviceIoControl to pass a user specified size which can be used to overwrite return addresses. This can lead to a denial of service or code execution attack. - - -- [DownWithUp/CVE-2018-18026](https://github.com/DownWithUp/CVE-2018-18026) - ### CVE-2018-18368 (2019-11-15) @@ -11248,14 +10560,6 @@ Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU1, may be susceptib - [DimopoulosElias/SEPM-EoP](https://github.com/DimopoulosElias/SEPM-EoP) -### CVE-2018-18387 (2018-10-29) - - -playSMS through 1.4.2 allows Privilege Escalation through Daemon abuse. - - -- [TheeBlind/CVE-2018-18387](https://github.com/TheeBlind/CVE-2018-18387) - ### CVE-2018-18500 (2019-02-05) @@ -11272,14 +10576,6 @@ An issue was discovered in the wiki API in GitLab Community and Enterprise Editi - [Snowming04/CVE-2018-18649](https://github.com/Snowming04/CVE-2018-18649) -### CVE-2018-18714 (2018-11-01) - - -RegFilter.sys in IOBit Malware Fighter 6.2 and earlier is susceptible to a stack-based buffer overflow when an attacker uses IOCTL 0x8006E010. This can lead to denial of service (DoS) or code execution with root privileges. - - -- [DownWithUp/CVE-2018-18714](https://github.com/DownWithUp/CVE-2018-18714) - ### CVE-2018-18778 (2018-10-28) @@ -11297,37 +10593,12 @@ Cerio DT-300N 1.1.6 through 1.1.12 devices allow OS command injection because of - [hook-s3c/CVE-2018-18852](https://github.com/hook-s3c/CVE-2018-18852) - [andripwn/CVE-2018-18852](https://github.com/andripwn/CVE-2018-18852) -### CVE-2018-19126 (2018-11-09) - - -PrestaShop 1.6.x before 1.6.1.23 and 1.7.x before 1.7.4.4 allows remote attackers to execute arbitrary code via a file upload. - - -- [farisv/PrestaShop-CVE-2018-19126](https://github.com/farisv/PrestaShop-CVE-2018-19126) - -### CVE-2018-19127 (2018-11-09) - - -A code injection vulnerability in /type.php in PHPCMS 2008 allows attackers to write arbitrary content to a website cache file with a controllable filename, leading to arbitrary code execution. The PHP code is sent via the template parameter, and is written to a data/cache_template/*.tpl.php file along with a "<?php function " substring. - - -- [ab1gale/phpcms-2008-CVE-2018-19127](https://github.com/ab1gale/phpcms-2008-CVE-2018-19127) - -### CVE-2018-19131 (2018-11-09) - - -Squid before 4.4 has XSS via a crafted X.509 certificate during HTTP(S) error page generation for certificate errors. - - -- [JonathanWilbur/CVE-2018-19131](https://github.com/JonathanWilbur/CVE-2018-19131) - ### CVE-2018-19207 (2018-11-12) The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $wpdb->prepare() input is mishandled, as exploited in the wild in November 2018. -- [aeroot/WP-GDPR-Compliance-Plugin-Exploit](https://github.com/aeroot/WP-GDPR-Compliance-Plugin-Exploit) - [cved-sources/cve-2018-19207](https://github.com/cved-sources/cve-2018-19207) ### CVE-2018-19276 (2019-03-17) @@ -11370,14 +10641,6 @@ University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in P - [ensimag-security/CVE-2018-19518](https://github.com/ensimag-security/CVE-2018-19518) -### CVE-2018-19537 (2018-11-25) - - -TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases. - - -- [JackDoan/TP-Link-ArcherC5-RCE](https://github.com/JackDoan/TP-Link-ArcherC5-RCE) - ### CVE-2018-19571 (2019-07-10) @@ -11394,17 +10657,6 @@ The "CLink4Service" service is installed with Corsair Link 4.9.7.35 wi - [BradyDonovan/CVE-2018-19592](https://github.com/BradyDonovan/CVE-2018-19592) -### CVE-2018-19788 (2018-12-03) - - -A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command. - - -- [AbsoZed/CVE-2018-19788](https://github.com/AbsoZed/CVE-2018-19788) -- [d4gh0s7/CVE-2018-19788](https://github.com/d4gh0s7/CVE-2018-19788) -- [Ekultek/PoC](https://github.com/Ekultek/PoC) -- [jhlongjr/CVE-2018-19788](https://github.com/jhlongjr/CVE-2018-19788) - ### CVE-2018-19859 (2018-12-05) @@ -11421,14 +10673,6 @@ NUUO NVRmini2 Network Video Recorder firmware through 3.9.1 allows remote attack - [pwnhacker0x18/CVE-2018-19864](https://github.com/pwnhacker0x18/CVE-2018-19864) -### CVE-2018-19911 (2018-12-06) - - -FreeSWITCH through 1.8.2, when mod_xml_rpc is enabled, allows remote attackers to execute arbitrary commands via the api/system or txtapi/system (or api/bg_system or txtapi/bg_system) query string on TCP port 8080, as demonstrated by an api/system?calc URI. This can also be exploited via CSRF. Alternatively, the default password of works for the freeswitch account can sometimes be used. - - -- [iSafeBlue/freeswitch_rce](https://github.com/iSafeBlue/freeswitch_rce) - ### CVE-2018-19987 (2019-05-13) @@ -11588,14 +10832,6 @@ Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows conta - [u0pattern/CVE-2018-1000117-Exploit](https://github.com/u0pattern/CVE-2018-1000117-Exploit) -### CVE-2018-1000134 (2018-03-16) - - -UnboundID LDAP SDK version from commit 801111d8b5c732266a5dbd4b3bb0b6c7b94d7afb up to commit 8471904a02438c03965d21367890276bc25fa5a6, where the issue was reported and fixed contains an Incorrect Access Control vulnerability in process function in SimpleBindRequest class doesn't check for empty password when running in synchronous mode. commit with applied fix https://github.com/pingidentity/ldapsdk/commit/8471904a02438c03965d21367890276bc25fa5a6#diff-f6cb23b459be1ec17df1da33760087fd that can result in Ability to impersonate any valid user. This attack appear to be exploitable via Providing valid username and empty password against servers that do not do additional validation as per https://tools.ietf.org/html/rfc4513#section-5.1.1. This vulnerability appears to have been fixed in after commit 8471904a02438c03965d21367890276bc25fa5a6. - - -- [dragotime/cve-2018-1000134](https://github.com/dragotime/cve-2018-1000134) - ### CVE-2018-1000140 (2018-03-23) @@ -11637,14 +10873,6 @@ netbeans-mmd-plugin version <= 1.4.3 contains a XML External Entity (XXE) vul - [forse01/CVE-2018-1000542-NetBeans](https://github.com/forse01/CVE-2018-1000542-NetBeans) -### CVE-2018-1000802 (2018-09-18) - - -Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace. - - -- [tna0y/CVE-2018-1000802-PoC](https://github.com/tna0y/CVE-2018-1000802-PoC) - ### CVE-2018-1000861 (2018-12-10) @@ -11660,8 +10888,6 @@ A code execution vulnerability exists in the Stapler web framework used by Jenki In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection. -- [gravitational/cve-2018-1002105](https://github.com/gravitational/cve-2018-1002105) -- [evict/poc_CVE-2018-1002105](https://github.com/evict/poc_CVE-2018-1002105) - [imlzw/Kubernetes-1.12.3-all-auto-install](https://github.com/imlzw/Kubernetes-1.12.3-all-auto-install) - [bgeesaman/cve-2018-1002105](https://github.com/bgeesaman/cve-2018-1002105) @@ -11677,6 +10903,14 @@ A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 ## 2017 +### CVE-2017-0005 (2017-03-16) + + +The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047. + + +- [sheri31/0005poc](https://github.com/sheri31/0005poc) + ### CVE-2017-0038 (2017-02-20) @@ -11693,6 +10927,14 @@ Microsoft Edge allows remote attackers to obtain sensitive information from proc - [Dankirk/cve-2017-0065](https://github.com/Dankirk/cve-2017-0065) +### CVE-2017-0075 (2017-03-16) + + +Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0109. + + +- [4B5F5F4B/HyperV](https://github.com/4B5F5F4B/HyperV) + ### CVE-2017-0100 (2017-03-16) @@ -11732,6 +10974,8 @@ The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. +- [peterpt/eternal_scanner](https://github.com/peterpt/eternal_scanner) +- [kimocoder/eternalblue](https://github.com/kimocoder/eternalblue) - [EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution](https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution) ### CVE-2017-0145 (2017-03-16) @@ -11760,6 +11004,11 @@ Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, - [joke998/Cve-2017-0199](https://github.com/joke998/Cve-2017-0199) - [joke998/Cve-2017-0199-](https://github.com/joke998/Cve-2017-0199-) - [sUbc0ol/Microsoft-Word-CVE-2017-0199-](https://github.com/sUbc0ol/Microsoft-Word-CVE-2017-0199-) +- [viethdgit/CVE-2017-0199](https://github.com/viethdgit/CVE-2017-0199) +- [nicpenning/RTF-Cleaner](https://github.com/nicpenning/RTF-Cleaner) +- [bloomer1016/2017-11-17-Maldoc-Using-CVE-2017-0199](https://github.com/bloomer1016/2017-11-17-Maldoc-Using-CVE-2017-0199) +- [jacobsoo/RTF-Cleaner](https://github.com/jacobsoo/RTF-Cleaner) +- [likescam/CVE-2017-0199](https://github.com/likescam/CVE-2017-0199) - [stealth-ronin/CVE-2017-0199-PY-KIT](https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT) ### CVE-2017-0204 (2017-04-12) @@ -11777,6 +11026,20 @@ Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, - [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-) +- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213) +- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213) +- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213) +- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213) +- [eonrickity/CVE-2017-0213](https://github.com/eonrickity/CVE-2017-0213) +- [Jos675/CVE-2017-0213-Exploit](https://github.com/Jos675/CVE-2017-0213-Exploit) + +### CVE-2017-0248 (2017-05-12) + + +Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability." + + +- [rubenmamo/CVE-2017-0248-Test](https://github.com/rubenmamo/CVE-2017-0248-Test) ### CVE-2017-0261 (2017-05-12) @@ -11784,8 +11047,17 @@ Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281. +- [kcufId/eps-CVE-2017-0261](https://github.com/kcufId/eps-CVE-2017-0261) - [erfze/CVE-2017-0261](https://github.com/erfze/CVE-2017-0261) +### CVE-2017-0263 (2017-05-12) + + +The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." + + +- [R06otMD5/cve-2017-0263-poc](https://github.com/R06otMD5/cve-2017-0263-poc) + ### CVE-2017-0290 (2017-05-09) @@ -11794,6 +11066,14 @@ The Microsoft Malware Protection Engine running on Microsoft Forefront and Micro - [homjxi0e/CVE-2017-0290-](https://github.com/homjxi0e/CVE-2017-0290-) +### CVE-2017-0411 (2017-02-08) + + +An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 7.0, 7.1.1. Android ID: A-33042690. + + +- [lulusudoku/PoC](https://github.com/lulusudoku/PoC) + ### CVE-2017-0478 (2017-03-07) @@ -11801,6 +11081,7 @@ A remote code execution vulnerability in the Framesequence library could enable - [JiounDai/CVE-2017-0478](https://github.com/JiounDai/CVE-2017-0478) +- [likescam/CVE-2017-0478](https://github.com/likescam/CVE-2017-0478) ### CVE-2017-0541 (2017-04-07) @@ -11809,6 +11090,23 @@ A remote code execution vulnerability in sonivox in Mediaserver could enable an - [JiounDai/CVE-2017-0541](https://github.com/JiounDai/CVE-2017-0541) +- [likescam/CVE-2017-0541](https://github.com/likescam/CVE-2017-0541) + +### CVE-2017-0554 (2017-04-07) + + +An elevation of privilege vulnerability in the Telephony component could enable a local malicious application to access capabilities outside of its permission levels. This issue is rated as Moderate because it could be used to gain access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33815946. + + +- [lanrat/tethr](https://github.com/lanrat/tethr) + +### CVE-2017-0564 (2017-04-07) + + +An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203. + + +- [guoygang/CVE-2017-0564-ION-PoC](https://github.com/guoygang/CVE-2017-0564-ION-PoC) ### CVE-2017-0781 (2017-09-14) @@ -11816,17 +11114,59 @@ A remote code execution vulnerability in sonivox in Mediaserver could enable an A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105. +- [ojasookert/CVE-2017-0781](https://github.com/ojasookert/CVE-2017-0781) +- [marcinguy/android712-blueborne](https://github.com/marcinguy/android712-blueborne) - [mjancek/BlueborneDetection](https://github.com/mjancek/BlueborneDetection) - [CrackSoft900/Blue-Borne](https://github.com/CrackSoft900/Blue-Borne) +### CVE-2017-0785 (2017-09-14) + + +A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146698. + + +- [ojasookert/CVE-2017-0785](https://github.com/ojasookert/CVE-2017-0785) +- [aymankhalfatni/CVE-2017-0785](https://github.com/aymankhalfatni/CVE-2017-0785) +- [Alfa100001/-CVE-2017-0785-BlueBorne-PoC](https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC) +- [Hackerscript/BlueBorne-CVE-2017-0785](https://github.com/Hackerscript/BlueBorne-CVE-2017-0785) +- [pieterbork/blueborne](https://github.com/pieterbork/blueborne) +- [sigbitsadmin/diff](https://github.com/sigbitsadmin/diff) +- [SigBitsLabs/diff](https://github.com/SigBitsLabs/diff) +- [RavSS/Bluetooth-Crash-CVE-2017-0785](https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785) + +### CVE-2017-0806 (2017-10-03) + + +An elevation of privilege vulnerability in the Android framework (gatekeeperresponse). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62998805. + + +- [michalbednarski/ReparcelBug](https://github.com/michalbednarski/ReparcelBug) + +### CVE-2017-0807 (2017-10-03) + + +An elevation of privilege vulnerability in the Android framework (ui framework). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-35056974. + + +- [kpatsakis/PoC_CVE-2017-0807](https://github.com/kpatsakis/PoC_CVE-2017-0807) + ### CVE-2017-1635 (2017-12-13) IBM Tivoli Monitoring V6 6.2.2.x could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free error. A remote attacker could exploit this vulnerability to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 133243. +- [emcalv/tivoli-poc](https://github.com/emcalv/tivoli-poc) - [bcdannyboy/cve-2017-1635-PoC](https://github.com/bcdannyboy/cve-2017-1635-PoC) +### CVE-2017-2368 (2017-02-20) + + +An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "Contacts" component. It allows remote attackers to cause a denial of service (application crash) via a crafted contact card. + + +- [vincedes3/CVE-2017-2368](https://github.com/vincedes3/CVE-2017-2368) + ### CVE-2017-2370 (2017-02-20) @@ -11836,6 +11176,15 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected - [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe) - [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe) - [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2) +- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370) + +### CVE-2017-2388 (2017-04-01) + + +An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "IOFireWireFamily" component. It allows attackers to cause a denial of service (NULL pointer dereference) via a crafted app. + + +- [bazad/IOFireWireFamily-null-deref](https://github.com/bazad/IOFireWireFamily-null-deref) ### CVE-2017-2636 (2017-03-07) @@ -11845,6 +11194,14 @@ Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows - [alexzorin/cve-2017-2636-el](https://github.com/alexzorin/cve-2017-2636-el) +### CVE-2017-2666 (2018-07-27) + + +It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. + + +- [tafamace/CVE-2017-2666](https://github.com/tafamace/CVE-2017-2666) + ### CVE-2017-2671 (2017-04-05) @@ -11869,6 +11226,23 @@ An exploitable heap corruption vulnerability exists in the UnCompressUnicode fun - [sUbc0ol/Detection-for-CVE-2017-2793](https://github.com/sUbc0ol/Detection-for-CVE-2017-2793) +### CVE-2017-3000 (2017-03-14) + + +Adobe Flash Player versions 24.0.0.221 and earlier have a vulnerability in the random number generator used for constant blinding. Successful exploitation could lead to information disclosure. + + +- [dangokyo/CVE-2017-3000](https://github.com/dangokyo/CVE-2017-3000) + +### CVE-2017-3066 (2017-04-27) + + +Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution. + + +- [codewhitesec/ColdFusionPwn](https://github.com/codewhitesec/ColdFusionPwn) +- [cucadili/CVE-2017-3066](https://github.com/cucadili/CVE-2017-3066) + ### CVE-2017-3078 (2017-06-20) @@ -11877,6 +11251,22 @@ Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory co - [homjxi0e/CVE-2017-3078](https://github.com/homjxi0e/CVE-2017-3078) +### CVE-2017-3143 (2019-01-16) + + +An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2. + + +- [saaph/CVE-2017-3143](https://github.com/saaph/CVE-2017-3143) + +### CVE-2017-3241 (2017-01-27) + + +Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). + + +- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC) + ### CVE-2017-3248 (2017-01-27) @@ -11921,9 +11311,22 @@ A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code i - [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-) - [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco) - [zakybstrd21215/PoC-CVE-2017-3881](https://github.com/zakybstrd21215/PoC-CVE-2017-3881) +- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881) ### CVE-2017-4490 - [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-) +- [homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-](https://github.com/homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-) + +### CVE-2017-4878 +- [brianwrf/CVE-2017-4878-Samples](https://github.com/brianwrf/CVE-2017-4878-Samples) + +### CVE-2017-4971 (2017-06-13) + + +An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings. + + +- [cved-sources/cve-2017-4971](https://github.com/cved-sources/cve-2017-4971) ### CVE-2017-5005 (2017-01-02) @@ -11933,9 +11336,37 @@ Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earli - [payatu/QuickHeal](https://github.com/payatu/QuickHeal) +### CVE-2017-5007 (2017-02-17) + + +Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. + + +- [Ang-YC/CVE-2017-5007](https://github.com/Ang-YC/CVE-2017-5007) + ### CVE-2017-5123 +- [FloatingGuy/CVE-2017-5123](https://github.com/FloatingGuy/CVE-2017-5123) +- [0x5068656e6f6c/CVE-2017-5123](https://github.com/0x5068656e6f6c/CVE-2017-5123) +- [Synacktiv-contrib/exploiting-cve-2017-5123](https://github.com/Synacktiv-contrib/exploiting-cve-2017-5123) +- [teawater/CVE-2017-5123](https://github.com/teawater/CVE-2017-5123) - [c3r34lk1ll3r/CVE-2017-5123](https://github.com/c3r34lk1ll3r/CVE-2017-5123) +### CVE-2017-5124 (2018-02-07) + + +Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted MHTML page. + + +- [Bo0oM/CVE-2017-5124](https://github.com/Bo0oM/CVE-2017-5124) + +### CVE-2017-5223 (2017-01-16) + + +An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to /, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory. + + +- [cscli/CVE-2017-5223](https://github.com/cscli/CVE-2017-5223) + ### CVE-2017-5415 (2018-06-11) @@ -11950,6 +11381,9 @@ An attack can use a blob URL and script to spoof an arbitrary addressbar URL pre wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. +- [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan) +- [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan) +- [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487) - [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit) ### CVE-2017-5633 (2017-03-06) @@ -12003,12 +11437,39 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be - [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638) - [sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner) - [sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638) +- [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-) +- [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638) +- [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner) +- [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser) +- [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638) +- [c002/Apache-Struts](https://github.com/c002/Apache-Struts) +- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit) +- [grant100/cybersecurity-struts2](https://github.com/grant100/cybersecurity-struts2) +- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638) +- [0x00-0x00/CVE-2017-5638](https://github.com/0x00-0x00/CVE-2017-5638) +- [m3ssap0/struts2_cve-2017-5638](https://github.com/m3ssap0/struts2_cve-2017-5638) +- [Greynad/struts2-jakarta-inject](https://github.com/Greynad/struts2-jakarta-inject) +- [ggolawski/struts-rce](https://github.com/ggolawski/struts-rce) +- [win3zz/CVE-2017-5638](https://github.com/win3zz/CVE-2017-5638) +- [leandrocamposcardoso/CVE-2017-5638-Mass-Exploit](https://github.com/leandrocamposcardoso/CVE-2017-5638-Mass-Exploit) - [Iletee/struts2-rce](https://github.com/Iletee/struts2-rce) +- [andypitcher/check_struts](https://github.com/andypitcher/check_struts) +- [un4ckn0wl3z/CVE-2017-5638](https://github.com/un4ckn0wl3z/CVE-2017-5638) +- [colorblindpentester/CVE-2017-5638](https://github.com/colorblindpentester/CVE-2017-5638) +- [injcristianrojas/cve-2017-5638](https://github.com/injcristianrojas/cve-2017-5638) - [pasannirmana/Aspire](https://github.com/pasannirmana/Aspire) - [ludy-dev/XworkStruts-RCE](https://github.com/ludy-dev/XworkStruts-RCE) - [jongmartinez/CVE-2017-5638](https://github.com/jongmartinez/CVE-2017-5638) - [dock0d1/Apache-Struts-2-CVE-2017-5638-Exploit](https://github.com/dock0d1/Apache-Struts-2-CVE-2017-5638-Exploit) +### CVE-2017-5645 (2017-04-17) + + +In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. + + +- [pimps/CVE-2017-5645](https://github.com/pimps/CVE-2017-5645) + ### CVE-2017-5689 (2017-05-02) @@ -12018,6 +11479,7 @@ An unprivileged network attacker could gain system privileges to provisioned Int - [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689) - [x1sec/amthoneypot](https://github.com/x1sec/amthoneypot) - [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass) +- [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc) ### CVE-2017-5693 (2018-07-31) @@ -12033,7 +11495,18 @@ Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletio Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. +- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715) +- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list) - [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment) +- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit) + +### CVE-2017-5721 (2017-10-10) + + +Insufficient input validation in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to execute arbitrary code via manipulation of memory. + + +- [embedi/smm_usbrt_poc](https://github.com/embedi/smm_usbrt_poc) ### CVE-2017-5753 (2018-01-04) @@ -12041,6 +11514,12 @@ Systems with microprocessors utilizing speculative execution and indirect branch Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. +- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack) +- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC) +- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example) +- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo) +- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope) +- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753) - [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-) ### CVE-2017-5754 (2018-01-04) @@ -12050,6 +11529,19 @@ Systems with microprocessors utilizing speculative execution and indirect branch - [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck) +- [raphaelsc/Am-I-affected-by-Meltdown](https://github.com/raphaelsc/Am-I-affected-by-Meltdown) +- [Viralmaniar/In-Spectre-Meltdown](https://github.com/Viralmaniar/In-Spectre-Meltdown) +- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown) +- [zzado/Meltdown](https://github.com/zzado/Meltdown) +- [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner) + +### CVE-2017-5792 (2018-02-15) + + +A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. + + +- [scanfsec/HPE-iMC-7.3-RMI-Java-Deserialization](https://github.com/scanfsec/HPE-iMC-7.3-RMI-Java-Deserialization) ### CVE-2017-5941 (2017-02-09) @@ -12075,6 +11567,22 @@ The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel thro - [BimsaraMalinda/Linux-Kernel-4.4.0-Ubuntu---DCCP-Double-Free-Privilege-Escalation-CVE-2017-6074](https://github.com/BimsaraMalinda/Linux-Kernel-4.4.0-Ubuntu---DCCP-Double-Free-Privilege-Escalation-CVE-2017-6074) +### CVE-2017-6079 (2017-05-16) + + +The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web application: if the command is valid, it executes. An example is the wget command. The page that allows this has been confirmed in firmware as old as 2006. + + +- [MostafaSoliman/CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit](https://github.com/MostafaSoliman/CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit) + +### CVE-2017-6090 (2017-10-02) + + +Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/. + + +- [jlk/exploit-CVE-2017-6090](https://github.com/jlk/exploit-CVE-2017-6090) + ### CVE-2017-6206 (2017-02-23) @@ -12107,6 +11615,23 @@ A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software could - [hemp3l/CVE-2017-6640-POC](https://github.com/hemp3l/CVE-2017-6640-POC) +### CVE-2017-6736 (2017-07-17) + + +The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697. + + +- [GarnetSunset/CiscoSpectreTakeover](https://github.com/GarnetSunset/CiscoSpectreTakeover) +- [GarnetSunset/CiscoIOSSNMPToolkit](https://github.com/GarnetSunset/CiscoIOSSNMPToolkit) + +### CVE-2017-6913 (2018-09-18) + + +Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.3-rev28 allows remote attackers to inject arbitrary web script or HTML via the event attribute in a time tag. + + +- [gquere/CVE-2017-6913](https://github.com/gquere/CVE-2017-6913) + ### CVE-2017-6971 (2017-03-22) @@ -12114,6 +11639,66 @@ AlienVault USM and OSSIM before 5.3.7 and NfSen before 1.3.8 allow remote authen - [patrickfreed/nfsen-exploit](https://github.com/patrickfreed/nfsen-exploit) +- [KeyStrOke95/nfsen_1.3.7_CVE-2017-6971](https://github.com/KeyStrOke95/nfsen_1.3.7_CVE-2017-6971) + +### CVE-2017-7038 (2017-07-20) + + +A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. + + +- [ansjdnakjdnajkd/CVE-2017-7038](https://github.com/ansjdnakjdnajkd/CVE-2017-7038) + +### CVE-2017-7047 (2017-07-20) + + +An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxpc" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. + + +- [JosephShenton/Triple_Fetch-Kernel-Creds](https://github.com/JosephShenton/Triple_Fetch-Kernel-Creds) +- [q1f3/Triple_fetch](https://github.com/q1f3/Triple_fetch) + +### CVE-2017-7061 (2017-07-20) + + +An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. + + +- [TheLoneHaxor/jailbreakme103](https://github.com/TheLoneHaxor/jailbreakme103) + +### CVE-2017-7089 (2017-10-22) + + +An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing. + + +- [Bo0oM/CVE-2017-7089](https://github.com/Bo0oM/CVE-2017-7089) +- [aymankhalfatni/Safari_Mac](https://github.com/aymankhalfatni/Safari_Mac) + +### CVE-2017-7092 (2017-10-22) + + +An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. + + +- [xuechiyaobai/CVE-2017-7092-PoC](https://github.com/xuechiyaobai/CVE-2017-7092-PoC) + +### CVE-2017-7173 (2018-04-03) + + +An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. + + +- [bazad/sysctl_coalition_get_pid_list-dos](https://github.com/bazad/sysctl_coalition_get_pid_list-dos) + +### CVE-2017-7184 (2017-03-19) + + +The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52. + + +- [rockl/cve-2017-7184](https://github.com/rockl/cve-2017-7184) +- [rockl/cve-2017-7184-bak](https://github.com/rockl/cve-2017-7184-bak) ### CVE-2017-7188 (2017-04-14) @@ -12141,6 +11726,16 @@ Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in In - [homjxi0e/cve-2017-7269](https://github.com/homjxi0e/cve-2017-7269) - [xiaovpn/CVE-2017-7269](https://github.com/xiaovpn/CVE-2017-7269) - [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool) +- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269) +- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269) + +### CVE-2017-7374 (2017-03-31) + + +Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely. + + +- [ww9210/cve-2017-7374](https://github.com/ww9210/cve-2017-7374) ### CVE-2017-7376 (2018-02-19) @@ -12170,6 +11765,9 @@ Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to r - [Waffles-2/SambaCry](https://github.com/Waffles-2/SambaCry) - [brianwrf/SambaHunter](https://github.com/brianwrf/SambaHunter) - [joxeankoret/CVE-2017-7494](https://github.com/joxeankoret/CVE-2017-7494) +- [Zer0d0y/Samba-CVE-2017-7494](https://github.com/Zer0d0y/Samba-CVE-2017-7494) +- [incredible1yu/CVE-2017-7494](https://github.com/incredible1yu/CVE-2017-7494) +- [cved-sources/cve-2017-7494](https://github.com/cved-sources/cve-2017-7494) - [john-80/cve-2017-7494](https://github.com/john-80/cve-2017-7494) - [Hansindu-M/CVE-2017-7494_IT19115344](https://github.com/Hansindu-M/CVE-2017-7494_IT19115344) @@ -12179,6 +11777,10 @@ Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to r A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. +- [SecureSkyTechnology/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095](https://github.com/SecureSkyTechnology/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095) +- [Nazicc/S2-055](https://github.com/Nazicc/S2-055) +- [JavanXD/Demo-Exploit-Jackson-RCE](https://github.com/JavanXD/Demo-Exploit-Jackson-RCE) +- [47bwy/CVE-2017-7525](https://github.com/47bwy/CVE-2017-7525) - [BassinD/jackson-RCE](https://github.com/BassinD/jackson-RCE) - [Dannners/jackson-deserialization-2017-7525](https://github.com/Dannners/jackson-deserialization-2017-7525) - [Ingenuity-Fainting-Goats/CVE-2017-7525-Jackson-Deserialization-Lab](https://github.com/Ingenuity-Fainting-Goats/CVE-2017-7525-Jackson-Deserialization-Lab) @@ -12189,6 +11791,10 @@ A deserialization flaw was discovered in the jackson-databind, versions before 2 Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. +- [liusec/CVE-2017-7529](https://github.com/liusec/CVE-2017-7529) +- [en0f/CVE-2017-7529_PoC](https://github.com/en0f/CVE-2017-7529_PoC) +- [cved-sources/cve-2017-7529](https://github.com/cved-sources/cve-2017-7529) +- [MaxSecurity/CVE-2017-7529-POC](https://github.com/MaxSecurity/CVE-2017-7529-POC) - [cyberk1w1/CVE-2017-7529](https://github.com/cyberk1w1/CVE-2017-7529) - [cyberharsh/nginx-CVE-2017-7529](https://github.com/cyberharsh/nginx-CVE-2017-7529) - [daehee/nginx-overflow](https://github.com/daehee/nginx-overflow) @@ -12204,6 +11810,22 @@ Foscam networked devices use the same hardcoded SSL private key across different - [notmot/CVE-2017-7648.](https://github.com/notmot/CVE-2017-7648.) +### CVE-2017-7679 (2017-06-19) + + +In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header. + + +- [snknritr/CVE-2017-7679-in-python](https://github.com/snknritr/CVE-2017-7679-in-python) + +### CVE-2017-7912 (2019-04-08) + + +Hanwha Techwin SRN-4000, SRN-4000 firmware versions prior to SRN4000_v2.16_170401, A specially crafted http request and response could allow an attacker to gain access to the device management page with admin privileges without proper authentication. + + +- [homjxi0e/CVE-2017-7912_Sneak](https://github.com/homjxi0e/CVE-2017-7912_Sneak) + ### CVE-2017-7921 (2017-05-05) @@ -12215,12 +11837,29 @@ An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Serie - [MisakaMikato/cve-2017-7921-golang](https://github.com/MisakaMikato/cve-2017-7921-golang) - [chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor) +### CVE-2017-7998 (2018-01-08) + + +Multiple cross-site scripting (XSS) vulnerabilities in Gespage before 7.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) printer name when adding a printer in the admin panel or (2) username parameter to webapp/users/user_reg.jsp. + + +- [homjxi0e/CVE-2017-7998](https://github.com/homjxi0e/CVE-2017-7998) + ### CVE-2017-8046 (2018-01-04) Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code. +- [Soontao/CVE-2017-8046-DEMO](https://github.com/Soontao/CVE-2017-8046-DEMO) +- [sj/spring-data-rest-CVE-2017-8046](https://github.com/sj/spring-data-rest-CVE-2017-8046) +- [m3ssap0/SpringBreakVulnerableApp](https://github.com/m3ssap0/SpringBreakVulnerableApp) +- [m3ssap0/spring-break_cve-2017-8046](https://github.com/m3ssap0/spring-break_cve-2017-8046) +- [FixYourFace/SpringBreakPoC](https://github.com/FixYourFace/SpringBreakPoC) +- [jkutner/spring-break-cve-2017-8046](https://github.com/jkutner/spring-break-cve-2017-8046) +- [bkhablenko/CVE-2017-8046](https://github.com/bkhablenko/CVE-2017-8046) +- [cved-sources/cve-2017-8046](https://github.com/cved-sources/cve-2017-8046) +- [jsotiro/VulnerableSpringDataRest](https://github.com/jsotiro/VulnerableSpringDataRest) - [guanjivip/CVE-2017-8046](https://github.com/guanjivip/CVE-2017-8046) ### CVE-2017-8295 (2017-05-04) @@ -12248,6 +11887,18 @@ Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Wi - [Elm0D/CVE-2017-8464](https://github.com/Elm0D/CVE-2017-8464) +- [3gstudent/CVE-2017-8464-EXP](https://github.com/3gstudent/CVE-2017-8464-EXP) +- [Securitykid/CVE-2017-8464-exp-generator](https://github.com/Securitykid/CVE-2017-8464-exp-generator) +- [X-Vector/usbhijacking](https://github.com/X-Vector/usbhijacking) +- [xssfile/CVE-2017-8464-EXP](https://github.com/xssfile/CVE-2017-8464-EXP) + +### CVE-2017-8465 (2017-06-14) + + +Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to run processes in an elevated context when the Windows kernel improperly handles objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-8468. + + +- [nghiadt1098/CVE-2017-8465](https://github.com/nghiadt1098/CVE-2017-8465) ### CVE-2017-8529 (2017-06-14) @@ -12255,6 +11906,7 @@ Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Wi Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2 allow an attacker to detect specific files on the user's computer when affected Microsoft scripting engines do not properly handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability". +- [Lynggaard91/windows2016fixCVE-2017-8529](https://github.com/Lynggaard91/windows2016fixCVE-2017-8529) - [sfitpro/cve-2017-8529](https://github.com/sfitpro/cve-2017-8529) ### CVE-2017-8543 (2017-06-14) @@ -12271,8 +11923,30 @@ Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows V Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243. +- [temesgeny/ppsx-file-generator](https://github.com/temesgeny/ppsx-file-generator) +- [rxwx/CVE-2017-8570](https://github.com/rxwx/CVE-2017-8570) +- [MaxSecurity/Office-CVE-2017-8570](https://github.com/MaxSecurity/Office-CVE-2017-8570) +- [SwordSheath/CVE-2017-8570](https://github.com/SwordSheath/CVE-2017-8570) +- [Drac0nids/CVE-2017-8570](https://github.com/Drac0nids/CVE-2017-8570) +- [sasqwatch/CVE-2017-8570](https://github.com/sasqwatch/CVE-2017-8570) - [erfze/CVE-2017-8570](https://github.com/erfze/CVE-2017-8570) +### CVE-2017-8625 (2017-08-08) + + +Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to bypass Device Guard User Mode Code Integrity (UMCI) policies due to Internet Explorer failing to validate UMCI policies, aka "Internet Explorer Security Feature Bypass Vulnerability". + + +- [homjxi0e/CVE-2017-8625_Bypass_UMCI](https://github.com/homjxi0e/CVE-2017-8625_Bypass_UMCI) + +### CVE-2017-8641 (2017-08-08) + + +Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674. + + +- [homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject](https://github.com/homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject) + ### CVE-2017-8759 (2017-09-12) @@ -12280,10 +11954,32 @@ Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow - [Voulnet/CVE-2017-8759-Exploit-sample](https://github.com/Voulnet/CVE-2017-8759-Exploit-sample) +- [nccgroup/CVE-2017-8759](https://github.com/nccgroup/CVE-2017-8759) +- [vysecurity/CVE-2017-8759](https://github.com/vysecurity/CVE-2017-8759) +- [BasuCert/CVE-2017-8759](https://github.com/BasuCert/CVE-2017-8759) +- [tahisaad6/CVE-2017-8759-Exploit-sample2](https://github.com/tahisaad6/CVE-2017-8759-Exploit-sample2) +- [homjxi0e/CVE-2017-8759_-SOAP_WSDL](https://github.com/homjxi0e/CVE-2017-8759_-SOAP_WSDL) +- [bhdresh/CVE-2017-8759](https://github.com/bhdresh/CVE-2017-8759) +- [Lz1y/CVE-2017-8759](https://github.com/Lz1y/CVE-2017-8759) +- [JonasUliana/CVE-2017-8759](https://github.com/JonasUliana/CVE-2017-8759) +- [Securitykid/CVE-2017-8759](https://github.com/Securitykid/CVE-2017-8759) +- [ashr/CVE-2017-8759-exploits](https://github.com/ashr/CVE-2017-8759-exploits) +- [l0n3rs/CVE-2017-8759](https://github.com/l0n3rs/CVE-2017-8759) +- [ChaitanyaHaritash/CVE-2017-8759](https://github.com/ChaitanyaHaritash/CVE-2017-8759) +- [smashinu/CVE-2017-8759Expoit](https://github.com/smashinu/CVE-2017-8759Expoit) +- [adeljck/CVE-2017-8759](https://github.com/adeljck/CVE-2017-8759) - [zhengkook/CVE-2017-8759](https://github.com/zhengkook/CVE-2017-8759) - [varunsaru/SNP](https://github.com/varunsaru/SNP) - [GayashanM/OHTS](https://github.com/GayashanM/OHTS) +### CVE-2017-8760 (2017-05-05) + + +An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is XSS in courier/1000@/index.html with the auth_params parameter. The device tries to use internal WAF filters to stop specific XSS Vulnerabilities. However, these can be bypassed by using some modifications to the payloads, e.g., URL encoding. + + +- [Voraka/cve-2017-8760](https://github.com/Voraka/cve-2017-8760) + ### CVE-2017-8779 (2017-05-04) @@ -12292,6 +11988,14 @@ rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, an - [drbothen/GO-RPCBOMB](https://github.com/drbothen/GO-RPCBOMB) +### CVE-2017-8802 (2018-01-16) + + +Cross-site scripting (XSS) vulnerability in Zimbra Collaboration Suite (aka ZCS) before 8.8.0 Beta2 might allow remote attackers to inject arbitrary web script or HTML via vectors related to the "Show Snippet" functionality. + + +- [ozzi-/Zimbra-CVE-2017-8802-Hotifx](https://github.com/ozzi-/Zimbra-CVE-2017-8802-Hotifx) + ### CVE-2017-8809 (2017-11-15) @@ -12300,6 +12004,16 @@ api.php in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29 - [motikan2010/CVE-2017-8809_MediaWiki_RFD](https://github.com/motikan2010/CVE-2017-8809_MediaWiki_RFD) +### CVE-2017-8890 (2017-05-10) + + +The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. + + +- [beraphin/CVE-2017-8890](https://github.com/beraphin/CVE-2017-8890) +- [thinkycx/CVE-2017-8890](https://github.com/thinkycx/CVE-2017-8890) +- [7043mcgeep/cve-2017-8890-msf](https://github.com/7043mcgeep/cve-2017-8890-msf) + ### CVE-2017-8917 (2017-05-17) @@ -12308,6 +12022,23 @@ SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to ex - [brianwrf/Joomla3.7-SQLi-CVE-2017-8917](https://github.com/brianwrf/Joomla3.7-SQLi-CVE-2017-8917) - [stefanlucas/Exploit-Joomla](https://github.com/stefanlucas/Exploit-Joomla) +- [cved-sources/cve-2017-8917](https://github.com/cved-sources/cve-2017-8917) + +### CVE-2017-9097 (2017-06-15) + + +In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file. + + +- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite) + +### CVE-2017-9101 (2017-05-21) + + +import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file. + + +- [jasperla/CVE-2017-9101](https://github.com/jasperla/CVE-2017-9101) ### CVE-2017-9248 (2017-07-03) @@ -12316,8 +12047,18 @@ Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 an - [bao7uo/dp_crypto](https://github.com/bao7uo/dp_crypto) +- [capt-meelo/Telewreck](https://github.com/capt-meelo/Telewreck) +- [ictnamanh/CVE-2017-9248](https://github.com/ictnamanh/CVE-2017-9248) - [shacojx/dp](https://github.com/shacojx/dp) +### CVE-2017-9417 (2017-06-03) + + +Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute arbitrary code via unspecified vectors, aka the "Broadpwn" issue. + + +- [mailinneberg/Broadpwn](https://github.com/mailinneberg/Broadpwn) + ### CVE-2017-9430 (2017-06-05) @@ -12325,6 +12066,40 @@ Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a - [homjxi0e/CVE-2017-9430](https://github.com/homjxi0e/CVE-2017-9430) +- [j0lama/Dnstracer-1.9-Fix](https://github.com/j0lama/Dnstracer-1.9-Fix) + +### CVE-2017-9476 (2017-07-30) + + +The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices makes it easy for remote attackers to determine the hidden SSID and passphrase for a Home Security Wi-Fi network. + + +- [wiire-a/CVE-2017-9476](https://github.com/wiire-a/CVE-2017-9476) + +### CVE-2017-9506 (2017-08-23) + + +The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF). + + +- [random-robbie/Jira-Scan](https://github.com/random-robbie/Jira-Scan) +- [pwn1sher/jira-ssrf](https://github.com/pwn1sher/jira-ssrf) + +### CVE-2017-9544 (2017-06-12) + + +There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code. + + +- [adenkiewicz/CVE-2017-9544](https://github.com/adenkiewicz/CVE-2017-9544) + +### CVE-2017-9554 (2017-07-24) + + +An information exposure vulnerability in forget_passwd.cgi in Synology DiskStation Manager (DSM) before 6.1.3-15152 allows remote attackers to enumerate valid usernames via unspecified vectors. + + +- [rfcl/Synology-DiskStation-User-Enumeration-CVE-2017-9554-](https://github.com/rfcl/Synology-DiskStation-User-Enumeration-CVE-2017-9554-) ### CVE-2017-9606 (2017-06-14) @@ -12358,12 +12133,33 @@ A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse - [kkent030315/CVE-2017-9769](https://github.com/kkent030315/CVE-2017-9769) +### CVE-2017-9779 (2017-09-07) + + +OCaml compiler allows attackers to have unspecified impact via unknown vectors, a similar issue to CVE-2017-9772 "but with much less impact." + + +- [homjxi0e/CVE-2017-9779](https://github.com/homjxi0e/CVE-2017-9779) + +### CVE-2017-9791 (2017-07-10) + + +The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. + + +- [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048) +- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048) +- [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791) + ### CVE-2017-9798 (2017-09-18) Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. +- [nitrado/CVE-2017-9798](https://github.com/nitrado/CVE-2017-9798) +- [pabloec20/optionsbleed](https://github.com/pabloec20/optionsbleed) +- [l0n3rs/CVE-2017-9798](https://github.com/l0n3rs/CVE-2017-9798) - [brokensound77/OptionsBleed-POC-Scanner](https://github.com/brokensound77/OptionsBleed-POC-Scanner) ### CVE-2017-9805 (2017-09-15) @@ -12373,7 +12169,14 @@ The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x bef - [luc10/struts-rce-cve-2017-9805](https://github.com/luc10/struts-rce-cve-2017-9805) +- [hahwul/struts2-rce-cve-2017-9805-ruby](https://github.com/hahwul/struts2-rce-cve-2017-9805-ruby) +- [mazen160/struts-pwn_CVE-2017-9805](https://github.com/mazen160/struts-pwn_CVE-2017-9805) +- [Lone-Ranger/apache-struts-pwn_CVE-2017-9805](https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805) - [0x00-0x00/-CVE-2017-9805](https://github.com/0x00-0x00/-CVE-2017-9805) +- [BeyondCy/S2-052](https://github.com/BeyondCy/S2-052) +- [chrisjd20/cve-2017-9805.py](https://github.com/chrisjd20/cve-2017-9805.py) +- [UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-](https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-) +- [UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit](https://github.com/UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit) - [AvishkaSenadheera/CVE-2017-9805---Documentation---IT19143378](https://github.com/AvishkaSenadheera/CVE-2017-9805---Documentation---IT19143378) - [wifido/CVE-2017-9805-Exploit](https://github.com/wifido/CVE-2017-9805-Exploit) - [rvermeulen/apache-struts-cve-2017-9805](https://github.com/rvermeulen/apache-struts-cve-2017-9805) @@ -12389,6 +12192,14 @@ DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka &q - [murataydemir/CVE-2017-9822](https://github.com/murataydemir/CVE-2017-9822) +### CVE-2017-9830 (2017-06-27) + + +Remote Code Execution is possible in Code42 CrashPlan 5.4.x via the org.apache.commons.ssl.rmi.DateRMI Java class, because (upon instantiation) it creates an RMI server that listens on a TCP port and deserializes objects sent by TCP clients. + + +- [securifera/CVE-2017-9830](https://github.com/securifera/CVE-2017-9830) + ### CVE-2017-9841 (2017-06-27) @@ -12401,19 +12212,94 @@ Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem - [ludy-dev/PHPUnit_eval-stdin_RCE](https://github.com/ludy-dev/PHPUnit_eval-stdin_RCE) - [z3ox1s/PHPUnit-CVE-2017-9841](https://github.com/z3ox1s/PHPUnit-CVE-2017-9841) +### CVE-2017-9934 (2017-07-17) + + +Missing CSRF token checks and improper input validation in Joomla! CMS 1.7.3 through 3.7.2 lead to an XSS vulnerability. + + +- [xyringe/CVE-2017-9934](https://github.com/xyringe/CVE-2017-9934) + +### CVE-2017-9999 +- [homjxi0e/CVE-2017-9999_bypassing_General_Firefox](https://github.com/homjxi0e/CVE-2017-9999_bypassing_General_Firefox) + +### CVE-2017-10235 (2017-08-08) + + +Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.7 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H). + + +- [fundacion-sadosky/vbox_cve_2017_10235](https://github.com/fundacion-sadosky/vbox_cve_2017_10235) + ### CVE-2017-10271 (2017-10-19) Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). +- [1337g/CVE-2017-10271](https://github.com/1337g/CVE-2017-10271) +- [s3xy/CVE-2017-10271](https://github.com/s3xy/CVE-2017-10271) +- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271) +- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271) +- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271) +- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce) +- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271) - [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271) +- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc) +- [bmcculley/CVE-2017-10271](https://github.com/bmcculley/CVE-2017-10271) +- [peterpeter228/Oracle-WebLogic-CVE-2017-10271](https://github.com/peterpeter228/Oracle-WebLogic-CVE-2017-10271) - [Cymmetria/weblogic_honeypot](https://github.com/Cymmetria/weblogic_honeypot) +- [JackyTsuuuy/weblogic_wls_rce_poc-exp](https://github.com/JackyTsuuuy/weblogic_wls_rce_poc-exp) +- [s0wr0b1ndef/Oracle-WebLogic-WLS-WSAT](https://github.com/s0wr0b1ndef/Oracle-WebLogic-WLS-WSAT) +- [lonehand/Oracle-WebLogic-CVE-2017-10271-master](https://github.com/lonehand/Oracle-WebLogic-CVE-2017-10271-master) - [shack2/javaserializetools](https://github.com/shack2/javaserializetools) +- [nhwuxiaojun/CVE-2017-10271](https://github.com/nhwuxiaojun/CVE-2017-10271) +- [ETOCheney/JavaDeserialization](https://github.com/ETOCheney/JavaDeserialization) +- [cved-sources/cve-2017-10271](https://github.com/cved-sources/cve-2017-10271) +- [XHSecurity/Oracle-WebLogic-CVE-2017-10271](https://github.com/XHSecurity/Oracle-WebLogic-CVE-2017-10271) +- [kbsec/Weblogic_Wsat_RCE](https://github.com/kbsec/Weblogic_Wsat_RCE) +- [SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961](https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961) +- [Yuusuke4/WebLogic_CNVD_C_2019_48814](https://github.com/Yuusuke4/WebLogic_CNVD_C_2019_48814) +- [7kbstorm/WebLogic_CNVD_C2019_48814](https://github.com/7kbstorm/WebLogic_CNVD_C2019_48814) - [ianxtianxt/-CVE-2017-10271-](https://github.com/ianxtianxt/-CVE-2017-10271-) - [testwc/CVE-2017-10271](https://github.com/testwc/CVE-2017-10271) - [Al1ex/CVE-2017-10271](https://github.com/Al1ex/CVE-2017-10271) +### CVE-2017-10352 (2017-10-19) + + +Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). The supported version that is affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server as well as unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H). + + +- [bigsizeme/weblogic-XMLDecoder](https://github.com/bigsizeme/weblogic-XMLDecoder) + +### CVE-2017-10366 (2017-10-19) + + +Vulnerability in the PeopleSoft Enterprise PT PeopleTools component of Oracle PeopleSoft Products (subcomponent: Performance Monitor). Supported versions that are affected are 8.54, 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PT PeopleTools. Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PT PeopleTools. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). + + +- [blazeinfosec/CVE-2017-10366_peoplesoft](https://github.com/blazeinfosec/CVE-2017-10366_peoplesoft) + +### CVE-2017-10617 (2017-10-13) + + +The ifmap service that comes bundled with Contrail has an XML External Entity (XXE) vulnerability that may allow an attacker to retrieve sensitive system files. Affected releases are Juniper Networks Contrail 2.2 prior to 2.21.4; 3.0 prior to 3.0.3.4; 3.1 prior to 3.1.4.0; 3.2 prior to 3.2.5.0. CVE-2017-10616 and CVE-2017-10617 can be chained together and have a combined CVSSv3 score of 5.8 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N). + + +- [gteissier/CVE-2017-10617](https://github.com/gteissier/CVE-2017-10617) + +### CVE-2017-10661 (2017-08-19) + + +Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing. + + +- [GeneBlue/CVE-2017-10661_POC](https://github.com/GeneBlue/CVE-2017-10661_POC) + +### CVE-2017-10797 +- [n4xh4ck5/CVE-2017-10797](https://github.com/n4xh4ck5/CVE-2017-10797) + ### CVE-2017-10952 (2017-08-29) @@ -12428,6 +12314,9 @@ This vulnerability allows remote attackers to execute arbitrary code on vulnerab The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. +- [lexfo/cve-2017-11176](https://github.com/lexfo/cve-2017-11176) +- [DoubleMice/cve-2017-11176](https://github.com/DoubleMice/cve-2017-11176) +- [HckEX/CVE-2017-11176](https://github.com/HckEX/CVE-2017-11176) - [leonardo1101/cve-2017-11176](https://github.com/leonardo1101/cve-2017-11176) - [c3r34lk1ll3r/CVE-2017-11176](https://github.com/c3r34lk1ll3r/CVE-2017-11176) - [applemasterz17/CVE-2017-11176](https://github.com/applemasterz17/CVE-2017-11176) @@ -12440,6 +12329,30 @@ Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 bef - [bao7uo/RAU_crypto](https://github.com/bao7uo/RAU_crypto) +### CVE-2017-11427 (2019-04-17) + + +OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. + + +- [CHYbeta/CVE-2017-11427-DEMO](https://github.com/CHYbeta/CVE-2017-11427-DEMO) + +### CVE-2017-11503 (2017-07-20) + + +PHPMailer 5.2.23 has XSS in the "From Email Address" and "To Email Address" fields of code_generator.php. + + +- [wizardafric/download](https://github.com/wizardafric/download) + +### CVE-2017-11519 (2017-07-21) + + +passwd_recovery.lua on the TP-Link Archer C9(UN)_V2_160517 allows an attacker to reset the admin password by leveraging a predictable random number generator seed. This is fixed in C9(UN)_V2_170511. + + +- [vakzz/tplink-CVE-2017-11519](https://github.com/vakzz/tplink-CVE-2017-11519) + ### CVE-2017-11610 (2017-08-23) @@ -12449,6 +12362,22 @@ The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before - [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610) - [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610) +### CVE-2017-11611 (2017-09-08) + + +Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of the file name in a "create-file-popup" action, and the directory name in a "create-directory-popup" action, in the HTTP POST method to the "/plugin/file_manager/" script (aka an /admin/plugin/file_manager/browse// URI). + + +- [faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc](https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc) + +### CVE-2017-11774 (2017-10-13) + + +Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability." + + +- [devcoinfet/SniperRoost](https://github.com/devcoinfet/SniperRoost) + ### CVE-2017-11783 (2017-10-13) @@ -12457,6 +12386,14 @@ Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, - [Sheisback/CVE-2017-11783](https://github.com/Sheisback/CVE-2017-11783) +### CVE-2017-11816 (2017-10-13) + + +The Microsoft Windows Graphics Device Interface (GDI) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability in the way it handles objects in memory, aka "Windows GDI Information Disclosure Vulnerability". + + +- [lr3800/CVE-2017-11816](https://github.com/lr3800/CVE-2017-11816) + ### CVE-2017-11826 (2017-10-13) @@ -12471,6 +12408,28 @@ Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010 Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884. +- [zhouat/cve-2017-11882](https://github.com/zhouat/cve-2017-11882) +- [embedi/CVE-2017-11882](https://github.com/embedi/CVE-2017-11882) +- [Ridter/CVE-2017-11882](https://github.com/Ridter/CVE-2017-11882) +- [BlackMathIT/2017-11882_Generator](https://github.com/BlackMathIT/2017-11882_Generator) +- [unamer/CVE-2017-11882](https://github.com/unamer/CVE-2017-11882) +- [0x09AL/CVE-2017-11882-metasploit](https://github.com/0x09AL/CVE-2017-11882-metasploit) +- [HZachev/ABC](https://github.com/HZachev/ABC) +- [starnightcyber/CVE-2017-11882](https://github.com/starnightcyber/CVE-2017-11882) +- [Grey-Li/CVE-2017-11882](https://github.com/Grey-Li/CVE-2017-11882) +- [legendsec/CVE-2017-11882-for-Kali](https://github.com/legendsec/CVE-2017-11882-for-Kali) +- [CSC-pentest/cve-2017-11882](https://github.com/CSC-pentest/cve-2017-11882) +- [Shadowshusky/CVE-2017-11882-](https://github.com/Shadowshusky/CVE-2017-11882-) +- [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802) +- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802) +- [likescam/CVE-2017-11882](https://github.com/likescam/CVE-2017-11882) +- [likescam/CVE-2018-0802_CVE-2017-11882](https://github.com/likescam/CVE-2018-0802_CVE-2017-11882) +- [bloomer1016/CVE-2017-11882-Possible-Remcos-Malspam](https://github.com/bloomer1016/CVE-2017-11882-Possible-Remcos-Malspam) +- [ChaitanyaHaritash/CVE-2017-11882](https://github.com/ChaitanyaHaritash/CVE-2017-11882) +- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-) +- [j0lama/CVE-2017-11882](https://github.com/j0lama/CVE-2017-11882) +- [R0fM1a/IDB_Share](https://github.com/R0fM1a/IDB_Share) +- [chanbin/CVE-2017-11882](https://github.com/chanbin/CVE-2017-11882) - [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882) - [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882) - [HaoJame/CVE-2017-11882](https://github.com/HaoJame/CVE-2017-11882) @@ -12478,6 +12437,50 @@ Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr - [ActorExpose/CVE-2017-11882](https://github.com/ActorExpose/CVE-2017-11882) - [Retr0-code/SignHere](https://github.com/Retr0-code/SignHere) +### CVE-2017-11907 (2017-12-12) + + +Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930. + + +- [AV1080p/CVE-2017-11907](https://github.com/AV1080p/CVE-2017-11907) + +### CVE-2017-12149 (2017-10-04) + + +In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data. + + +- [sevck/CVE-2017-12149](https://github.com/sevck/CVE-2017-12149) +- [yunxu1/jboss-_CVE-2017-12149](https://github.com/yunxu1/jboss-_CVE-2017-12149) +- [1337g/CVE-2017-12149](https://github.com/1337g/CVE-2017-12149) +- [jreppiks/CVE-2017-12149](https://github.com/jreppiks/CVE-2017-12149) + +### CVE-2017-12426 (2017-08-14) + + +GitLab Community Edition (CE) and Enterprise Edition (EE) before 8.17.8, 9.0.x before 9.0.13, 9.1.x before 9.1.10, 9.2.x before 9.2.10, 9.3.x before 9.3.10, and 9.4.x before 9.4.4 might allow remote attackers to execute arbitrary code via a crafted SSH URL in a project import. + + +- [sm-paul-schuette/CVE-2017-12426](https://github.com/sm-paul-schuette/CVE-2017-12426) + +### CVE-2017-12542 (2018-02-15) + + +A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found. + + +- [skelsec/CVE-2017-12542](https://github.com/skelsec/CVE-2017-12542) +- [sk1dish/ilo4-rce-vuln-scanner](https://github.com/sk1dish/ilo4-rce-vuln-scanner) + +### CVE-2017-12611 (2017-09-20) + + +In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack. + + +- [brianwrf/S2-053-CVE-2017-12611](https://github.com/brianwrf/S2-053-CVE-2017-12611) + ### CVE-2017-12615 (2017-09-19) @@ -12485,6 +12488,13 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e. - [breaktoprotect/CVE-2017-12615](https://github.com/breaktoprotect/CVE-2017-12615) +- [mefulton/cve-2017-12615](https://github.com/mefulton/cve-2017-12615) +- [zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717](https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717) +- [wsg00d/cve-2017-12615](https://github.com/wsg00d/cve-2017-12615) +- [BeyondCy/CVE-2017-12615](https://github.com/BeyondCy/CVE-2017-12615) +- [1337g/CVE-2017-12615](https://github.com/1337g/CVE-2017-12615) +- [Shellkeys/CVE-2017-12615](https://github.com/Shellkeys/CVE-2017-12615) +- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615) - [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615) - [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615) - [gardenWhy/CVE-2017-12615-EXP](https://github.com/gardenWhy/CVE-2017-12615-EXP) @@ -12495,8 +12505,20 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e. When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. +- [cyberheartmi9/CVE-2017-12617](https://github.com/cyberheartmi9/CVE-2017-12617) +- [devcoinfet/CVE-2017-12617](https://github.com/devcoinfet/CVE-2017-12617) +- [qiantu88/CVE-2017-12617](https://github.com/qiantu88/CVE-2017-12617) +- [ygouzerh/CVE-2017-12617](https://github.com/ygouzerh/CVE-2017-12617) - [tyranteye666/tomcat-cve-2017-12617](https://github.com/tyranteye666/tomcat-cve-2017-12617) +### CVE-2017-12624 (2017-11-14) + + +Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS and JAX-RS services are vulnerable to this attack. From Apache CXF 3.2.1 and 3.1.14, message attachment headers that are greater than 300 characters will be rejected by default. This value is configurable via the property "attachment-max-header-size". + + +- [tafamace/CVE-2017-12624](https://github.com/tafamace/CVE-2017-12624) + ### CVE-2017-12635 (2017-11-14) @@ -12512,8 +12534,17 @@ Due to differences in the Erlang-based JSON parser and JavaScript-based JSON par CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet. +- [moayadalmalat/CVE-2017-12636](https://github.com/moayadalmalat/CVE-2017-12636) - [RedTeamWing/CVE-2017-12636](https://github.com/RedTeamWing/CVE-2017-12636) +### CVE-2017-12792 (2017-10-02) + + +Multiple cross-site request forgery (CSRF) vulnerabilities in NexusPHP 1.5 allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) linkname, (2) url, or (3) title parameter in an add action to linksmanage.php. + + +- [ZZS2017/cve-2017-12792](https://github.com/ZZS2017/cve-2017-12792) + ### CVE-2017-12842 (2020-03-16) @@ -12522,6 +12553,22 @@ Bitcoin Core before 0.14 allows an attacker to create an ostensibly valid SPV pr - [nondejus/CVE-2017-12842](https://github.com/nondejus/CVE-2017-12842) +### CVE-2017-12852 (2017-08-15) + + +The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack. + + +- [BT123/numpy-1.13.1](https://github.com/BT123/numpy-1.13.1) + +### CVE-2017-12943 (2017-08-18) + + +D-Link DIR-600 Rev Bx devices with v2.x firmware allow remote attackers to read passwords via a model/__show_info.php?REQUIRE_FILE= absolute path traversal attack, as demonstrated by discovering the admin password. + + +- [aymankhalfatni/D-Link](https://github.com/aymankhalfatni/D-Link) + ### CVE-2017-12945 (2019-11-27) @@ -12530,12 +12577,24 @@ Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 - [aress31/cve-2017-12945](https://github.com/aress31/cve-2017-12945) +### CVE-2017-13089 (2017-10-27) + + +The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. + + +- [r1b/CVE-2017-13089](https://github.com/r1b/CVE-2017-13089) +- [mzeyong/CVE-2017-13089](https://github.com/mzeyong/CVE-2017-13089) + ### CVE-2017-13156 (2017-12-06) An elevation of privilege vulnerability in the Android system (art). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-64211847. +- [xyzAsian/Janus-CVE-2017-13156](https://github.com/xyzAsian/Janus-CVE-2017-13156) +- [caxmd/CVE-2017-13156](https://github.com/caxmd/CVE-2017-13156) +- [giacomoferretti/janus-toolkit](https://github.com/giacomoferretti/janus-toolkit) - [tea9/CVE-2017-13156-Janus](https://github.com/tea9/CVE-2017-13156-Janus) - [ari5ti/Janus-Vulnerability-CVE-2017-13156-Exploit-with-POC](https://github.com/ari5ti/Janus-Vulnerability-CVE-2017-13156-Exploit-with-POC) @@ -12547,6 +12606,102 @@ In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds - [tamirzb/CVE-2017-13253](https://github.com/tamirzb/CVE-2017-13253) +### CVE-2017-13672 (2017-09-01) + + +QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update. + + +- [DavidBuchanan314/CVE-2017-13672](https://github.com/DavidBuchanan314/CVE-2017-13672) + +### CVE-2017-13868 (2017-12-25) + + +An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. + + +- [bazad/ctl_ctloutput-leak](https://github.com/bazad/ctl_ctloutput-leak) + +### CVE-2017-13872 (2017-11-29) + + +An issue was discovered in certain Apple products. macOS High Sierra before Security Update 2017-001 is affected. The issue involves the "Directory Utility" component. It allows attackers to obtain administrator access without a password via certain interactions involving entry of the root user name. + + +- [giovannidispoto/CVE-2017-13872-Patch](https://github.com/giovannidispoto/CVE-2017-13872-Patch) + +### CVE-2017-14105 (2017-09-01) + + +HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifying a backup archive before a restore, because the restore feature does not validate pathnames within the archive. An authenticated, local attacker - even restricted as a tenant - can add a jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will be exposed at the web interface). + + +- [theguly/CVE-2017-14105](https://github.com/theguly/CVE-2017-14105) + +### CVE-2017-14262 (2017-09-11) + + +On Samsung NVR devices, remote attackers can read the MD5 password hash of the 'admin' account via certain szUserName JSON data to cgi-bin/main-cgi, and login to the device with that hash in the szUserPasswd parameter. + + +- [zzz66686/CVE-2017-14262](https://github.com/zzz66686/CVE-2017-14262) + +### CVE-2017-14263 (2017-09-11) + + +Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device. + + +- [zzz66686/CVE-2017-14263](https://github.com/zzz66686/CVE-2017-14263) + +### CVE-2017-14322 (2017-10-18) + + +The function in charge to check whether the user is already logged in init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows remote attackers to bypass authentication and obtain administrative access by using the IEM_CookieLogin cookie with a specially crafted value. + + +- [joesmithjaffa/CVE-2017-14322](https://github.com/joesmithjaffa/CVE-2017-14322) + +### CVE-2017-14491 (2017-10-02) + + +Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. + + +- [skyformat99/dnsmasq-2.4.1-fix-CVE-2017-14491](https://github.com/skyformat99/dnsmasq-2.4.1-fix-CVE-2017-14491) + +### CVE-2017-14493 (2017-10-02) + + +Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. + + +- [pupiles/bof-dnsmasq-cve-2017-14493](https://github.com/pupiles/bof-dnsmasq-cve-2017-14493) + +### CVE-2017-14719 (2017-09-23) + + +Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components. + + +- [PalmTreeForest/CodePath_Week_7-8](https://github.com/PalmTreeForest/CodePath_Week_7-8) + +### CVE-2017-14948 (2019-10-14) + + +Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L 1.08B04 and DIR-895 L/R 1.13b03. The impact is: execute arbitrary code (remote). The component is: htdocs/fileaccess.cgi. The attack vector is: A crafted HTTP request handled by fileacces.cgi could allow an attacker to mount a ROP attack: if the HTTP header field CONTENT_TYPE starts with ''boundary=' followed by more than 256 characters, a buffer overflow would be triggered, potentially causing code execution. + + +- [badnack/d_link_880_bug](https://github.com/badnack/d_link_880_bug) + +### CVE-2017-15120 (2018-07-27) + + +An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service. + + +- [shutingrz/CVE-2017-15120_PoC](https://github.com/shutingrz/CVE-2017-15120_PoC) + ### CVE-2017-15277 (2017-10-12) @@ -12555,22 +12710,89 @@ ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 le - [tacticthreat/ImageMagick-CVE-2017-15277](https://github.com/tacticthreat/ImageMagick-CVE-2017-15277) +### CVE-2017-15303 (2017-10-15) + + +In CPUID CPU-Z before 1.43, there is an arbitrary memory write that results directly in elevation of privileges, because any program running on the local machine (while CPU-Z is running) can issue an ioctl 0x9C402430 call to the kernel-mode driver (e.g., cpuz141_x64.sys for version 1.41). + + +- [hfiref0x/Stryker](https://github.com/hfiref0x/Stryker) + ### CVE-2017-15361 (2017-10-16) The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS. +- [lva/Infineon-CVE-2017-15361](https://github.com/lva/Infineon-CVE-2017-15361) +- [titanous/rocacheck](https://github.com/titanous/rocacheck) +- [jnpuskar/RocaCmTest](https://github.com/jnpuskar/RocaCmTest) +- [nsacyber/Detect-CVE-2017-15361-TPM](https://github.com/nsacyber/Detect-CVE-2017-15361-TPM) +- [0xxon/zeek-plugin-roca](https://github.com/0xxon/zeek-plugin-roca) +- [0xxon/roca](https://github.com/0xxon/roca) - [Elbarbons/Attacco-ROCA-sulla-vulnerabilita-CVE-2017-15361](https://github.com/Elbarbons/Attacco-ROCA-sulla-vulnerabilita-CVE-2017-15361) +### CVE-2017-15394 (2018-02-07) + + +Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension. + + +- [sudosammy/CVE-2017-15394](https://github.com/sudosammy/CVE-2017-15394) + +### CVE-2017-15708 (2017-12-11) + + +In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. In Synapse 3.0.1, Commons Collection has been updated to 3.2.2 version. + + +- [HuSoul/CVE-2017-15708](https://github.com/HuSoul/CVE-2017-15708) + +### CVE-2017-15715 (2018-03-26) + + +In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename. + + +- [whisp1830/CVE-2017-15715](https://github.com/whisp1830/CVE-2017-15715) + ### CVE-2017-15944 (2017-12-11) Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface. +- [xxnbyy/CVE-2017-15944-POC](https://github.com/xxnbyy/CVE-2017-15944-POC) +- [surajraghuvanshi/PaloAltoRceDetectionAndExploit](https://github.com/surajraghuvanshi/PaloAltoRceDetectionAndExploit) - [yukar1z0e/CVE-2017-15944](https://github.com/yukar1z0e/CVE-2017-15944) +### CVE-2017-16082 (2018-06-06) + + +A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious. + + +- [nulldreams/CVE-2017-16082](https://github.com/nulldreams/CVE-2017-16082) + +### CVE-2017-16088 (2018-06-06) + + +The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox. + + +- [Flyy-yu/CVE-2017-16088](https://github.com/Flyy-yu/CVE-2017-16088) + +### CVE-2017-16245 +- [AOCorsaire/CVE-2017-16245](https://github.com/AOCorsaire/CVE-2017-16245) + +### CVE-2017-16524 (2017-11-06) + + +Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted file upload vulnerability: 'network_ssl_upload.php' allows remote authenticated attackers to upload and execute arbitrary PHP code via a filename with a .php extension, which is then accessed via a direct request to the file in the upload/ directory. To authenticate for this attack, one can obtain web-interface credentials in cleartext by leveraging the existing Local File Read Vulnerability referenced as CVE-2015-8279, which allows remote attackers to read the web-interface credentials via a request for the cslog_export.php?path=/root/php_modules/lighttpd/sbin/userpw URI. + + +- [realistic-security/CVE-2017-16524](https://github.com/realistic-security/CVE-2017-16524) + ### CVE-2017-16541 (2017-11-04) @@ -12579,6 +12801,22 @@ Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass th - [Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541](https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541) +### CVE-2017-16567 (2017-11-09) + + +Cross-site scripting (XSS) vulnerability in Logitech Media Server 7.9.0 allows remote attackers to inject arbitrary web script or HTML via a "favorite." + + +- [dewankpant/CVE-2017-16567](https://github.com/dewankpant/CVE-2017-16567) + +### CVE-2017-16568 (2017-11-09) + + +Cross-site scripting (XSS) vulnerability in Logitech Media Server 7.9.0 allows remote attackers to inject arbitrary web script or HTML via a radio URL. + + +- [dewankpant/CVE-2017-16568](https://github.com/dewankpant/CVE-2017-16568) + ### CVE-2017-16651 (2017-11-09) @@ -12588,6 +12826,14 @@ Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allo - [Abady0x/CVE-2017-16651](https://github.com/Abady0x/CVE-2017-16651) - [stonepresto/CVE-2017-16651](https://github.com/stonepresto/CVE-2017-16651) +### CVE-2017-16744 (2018-08-20) + + +A path traversal vulnerability in Tridium Niagara AX Versions 3.8 and prior and Niagara 4 systems Versions 4.4 and prior installed on Microsoft Windows Systems can be exploited by leveraging valid platform (administrator) credentials. + + +- [GainSec/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara](https://github.com/GainSec/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara) + ### CVE-2017-16778 (2019-12-24) @@ -12596,6 +12842,14 @@ An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel all - [breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection](https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection) +### CVE-2017-16806 (2017-11-13) + + +The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal. + + +- [rickoooooo/ulteriusExploit](https://github.com/rickoooooo/ulteriusExploit) + ### CVE-2017-16894 (2017-11-19) @@ -12618,9 +12872,23 @@ The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 a The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension. +- [C0dak/CVE-2017-16995](https://github.com/C0dak/CVE-2017-16995) +- [Al1ex/CVE-2017-16995](https://github.com/Al1ex/CVE-2017-16995) +- [gugronnier/CVE-2017-16995](https://github.com/gugronnier/CVE-2017-16995) +- [senyuuri/cve-2017-16995](https://github.com/senyuuri/cve-2017-16995) +- [vnik5287/CVE-2017-16995](https://github.com/vnik5287/CVE-2017-16995) +- [littlebin404/CVE-2017-16995](https://github.com/littlebin404/CVE-2017-16995) - [Lumindu/CVE-2017-16995-Linux-Kernel---BPF-Sign-Extension-Local-Privilege-Escalation-](https://github.com/Lumindu/CVE-2017-16995-Linux-Kernel---BPF-Sign-Extension-Local-Privilege-Escalation-) - [ph4ntonn/CVE-2017-16995](https://github.com/ph4ntonn/CVE-2017-16995) +### CVE-2017-16997 (2017-12-17) + + +elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution. + + +- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc) + ### CVE-2017-17099 (2017-12-03) @@ -12635,6 +12903,7 @@ There exists an unauthenticated SEH based Buffer Overflow vulnerability in the H Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code. +- [1337g/CVE-2017-17215](https://github.com/1337g/CVE-2017-17215) - [wilfred-wulbou/HG532d-RCE-Exploit](https://github.com/wilfred-wulbou/HG532d-RCE-Exploit) ### CVE-2017-17309 (2018-06-14) @@ -12651,6 +12920,9 @@ Huawei HG255s-10 V100R001C163B025SP02 has a path traversal vulnerability due to FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath. +- [maxbitcoin/Jackson-CVE-2017-17485](https://github.com/maxbitcoin/Jackson-CVE-2017-17485) +- [tafamace/CVE-2017-17485](https://github.com/tafamace/CVE-2017-17485) +- [x7iaob/cve-2017-17485](https://github.com/x7iaob/cve-2017-17485) - [Al1ex/CVE-2017-17485](https://github.com/Al1ex/CVE-2017-17485) ### CVE-2017-17562 (2017-12-12) @@ -12659,20 +12931,105 @@ FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthe Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0. +- [1337g/CVE-2017-17562](https://github.com/1337g/CVE-2017-17562) +- [ivanitlearning/CVE-2017-17562](https://github.com/ivanitlearning/CVE-2017-17562) - [crispy-peppers/Goahead-CVE-2017-17562](https://github.com/crispy-peppers/Goahead-CVE-2017-17562) +### CVE-2017-17692 (2017-12-21) + + +Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property. + + +- [lr3800/CVE-2017-17692](https://github.com/lr3800/CVE-2017-17692) + +### CVE-2017-18044 (2018-01-19) + + +A Command Injection issue was discovered in ContentStore/Base/CVDataPipe.dll in Commvault before v11 SP6. A certain message parsing function inside the Commvault service does not properly validate the input of an incoming string before passing it to CreateProcess. As a result, a specially crafted message can inject commands that will be executed on the target operating system. Exploitation of this vulnerability does not require authentication and can lead to SYSTEM level privilege on any system running the cvd daemon. This is a different vulnerability than CVE-2017-3195. + + +- [securifera/CVE-2017-18044-Exploit](https://github.com/securifera/CVE-2017-18044-Exploit) + +### CVE-2017-18345 (2018-08-26) + + +The Joomanager component through 2.0.0 for Joomla! has an arbitrary file download issue, resulting in exposing the credentials of the database via an index.php?option=com_joomanager&controller=details&task=download&path=configuration.php request. + + +- [Luth1er/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD](https://github.com/Luth1er/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD) + +### CVE-2017-18486 (2019-08-09) + + +Jitbit Helpdesk before 9.0.3 allows remote attackers to escalate privileges because of mishandling of the User/AutoLogin userHash parameter. By inspecting the token value provided in a password reset link, a user can leverage a weak PRNG to recover the shared secret used by the server for remote authentication. The shared secret can be used to escalate privileges by forging new tokens for any user. These tokens can be used to automatically log in as the affected user. + + +- [Kc57/JitBit_Helpdesk_Auth_Bypass](https://github.com/Kc57/JitBit_Helpdesk_Auth_Bypass) + +### CVE-2017-18635 (2019-09-25) + + +An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name. + + +- [ShielderSec/CVE-2017-18635](https://github.com/ShielderSec/CVE-2017-18635) + +### CVE-2017-98505 +- [mike-williams/Struts2Vuln](https://github.com/mike-williams/Struts2Vuln) + ### CVE-2017-1000000 - [smythtech/DWF-CVE-2017-1000000](https://github.com/smythtech/DWF-CVE-2017-1000000) +### CVE-2017-1000083 (2017-09-05) + + +backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename. + + +- [matlink/evince-cve-2017-1000083](https://github.com/matlink/evince-cve-2017-1000083) +- [matlink/cve-2017-1000083-atril-nautilus](https://github.com/matlink/cve-2017-1000083-atril-nautilus) + ### CVE-2017-1000112 (2017-10-03) Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005. +- [hikame/docker_escape_pwn](https://github.com/hikame/docker_escape_pwn) - [ol0273st-s/CVE-2017-1000112-Adpated](https://github.com/ol0273st-s/CVE-2017-1000112-Adpated) - [IT19083124/SNP-Assignment](https://github.com/IT19083124/SNP-Assignment) +### CVE-2017-1000117 (2017-10-03) + + +A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability. + + +- [timwr/CVE-2017-1000117](https://github.com/timwr/CVE-2017-1000117) +- [GrahamMThomas/test-git-vuln_CVE-2017-1000117](https://github.com/GrahamMThomas/test-git-vuln_CVE-2017-1000117) +- [Manouchehri/CVE-2017-1000117](https://github.com/Manouchehri/CVE-2017-1000117) +- [thelastbyte/CVE-2017-1000117](https://github.com/thelastbyte/CVE-2017-1000117) +- [alilangtest/CVE-2017-1000117](https://github.com/alilangtest/CVE-2017-1000117) +- [VulApps/CVE-2017-1000117](https://github.com/VulApps/CVE-2017-1000117) +- [greymd/CVE-2017-1000117](https://github.com/greymd/CVE-2017-1000117) +- [shogo82148/Fix-CVE-2017-1000117](https://github.com/shogo82148/Fix-CVE-2017-1000117) +- [sasairc/CVE-2017-1000117_wasawasa](https://github.com/sasairc/CVE-2017-1000117_wasawasa) +- [Shadow5523/CVE-2017-1000117-test](https://github.com/Shadow5523/CVE-2017-1000117-test) +- [bells17/CVE-2017-1000117](https://github.com/bells17/CVE-2017-1000117) +- [ieee0824/CVE-2017-1000117](https://github.com/ieee0824/CVE-2017-1000117) +- [rootclay/CVE-2017-1000117](https://github.com/rootclay/CVE-2017-1000117) +- [ieee0824/CVE-2017-1000117-sl](https://github.com/ieee0824/CVE-2017-1000117-sl) +- [takehaya/CVE-2017-1000117](https://github.com/takehaya/CVE-2017-1000117) +- [ikmski/CVE-2017-1000117](https://github.com/ikmski/CVE-2017-1000117) +- [nkoneko/CVE-2017-1000117](https://github.com/nkoneko/CVE-2017-1000117) +- [chenzhuo0618/test](https://github.com/chenzhuo0618/test) +- [siling2017/CVE-2017-1000117](https://github.com/siling2017/CVE-2017-1000117) +- [Q2h1Cg/CVE-2017-1000117](https://github.com/Q2h1Cg/CVE-2017-1000117) +- [cved-sources/cve-2017-1000117](https://github.com/cved-sources/cve-2017-1000117) +- [leezp/CVE-2017-1000117](https://github.com/leezp/CVE-2017-1000117) +- [AnonymKing/CVE-2017-1000117](https://github.com/AnonymKing/CVE-2017-1000117) + ### CVE-2017-1000170 (2017-11-17) @@ -12681,6 +13038,33 @@ jqueryFileTree 2.1.5 and older Directory Traversal - [Nickguitar/Jquery-File-Tree-1.6.6-Path-Traversal](https://github.com/Nickguitar/Jquery-File-Tree-1.6.6-Path-Traversal) +### CVE-2017-1000250 (2017-09-12) + + +All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests. + + +- [olav-st/CVE-2017-1000250-PoC](https://github.com/olav-st/CVE-2017-1000250-PoC) + +### CVE-2017-1000251 (2017-09-12) + + +The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space. + + +- [hayzamjs/Blueborne-CVE-2017-1000251](https://github.com/hayzamjs/Blueborne-CVE-2017-1000251) +- [tlatkdgus1/blueborne-CVE-2017-1000251](https://github.com/tlatkdgus1/blueborne-CVE-2017-1000251) +- [own2pwn/blueborne-CVE-2017-1000251-POC](https://github.com/own2pwn/blueborne-CVE-2017-1000251-POC) +- [marcinguy/blueborne-CVE-2017-1000251](https://github.com/marcinguy/blueborne-CVE-2017-1000251) + +### CVE-2017-1000253 (2017-10-03) + + +Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary. + + +- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253) + ### CVE-2017-1000353 (2018-01-29) @@ -12699,6 +13083,22 @@ Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validati - [homjxi0e/CVE-2017-1000367](https://github.com/homjxi0e/CVE-2017-1000367) - [pucerpocok/sudo_exploit](https://github.com/pucerpocok/sudo_exploit) +### CVE-2017-1000405 (2017-11-30) + + +The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp. + + +- [bindecy/HugeDirtyCowPOC](https://github.com/bindecy/HugeDirtyCowPOC) + +### CVE-2017-1000475 (2018-01-24) + + +FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges. + + +- [lajarajorge/CVE-2017-1000475](https://github.com/lajarajorge/CVE-2017-1000475) + ### CVE-2017-1000486 (2018-01-03) @@ -12706,6 +13106,24 @@ Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in rem - [pimps/CVE-2017-1000486](https://github.com/pimps/CVE-2017-1000486) +- [mogwailabs/CVE-2017-1000486](https://github.com/mogwailabs/CVE-2017-1000486) +- [cved-sources/cve-2017-1000486](https://github.com/cved-sources/cve-2017-1000486) + +### CVE-2017-1000499 (2018-01-03) + + +phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc. + + +- [Villaquiranm/5MMISSI-CVE-2017-1000499](https://github.com/Villaquiranm/5MMISSI-CVE-2017-1000499) + +### CVE-2017-1002101 (2018-03-13) + + +In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem. + + +- [bgeesaman/subpath-exploit](https://github.com/bgeesaman/subpath-exploit) ## 2016 @@ -16813,6 +17231,7 @@ The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote - [Ziemni/CVE-2007-2447-in-Python](https://github.com/Ziemni/CVE-2007-2447-in-Python) - [0xKn/CVE-2007-2447](https://github.com/0xKn/CVE-2007-2447) - [ozuma/CVE-2007-2447](https://github.com/ozuma/CVE-2007-2447) +- [Un4gi/CVE-2007-2447](https://github.com/Un4gi/CVE-2007-2447) ### CVE-2007-3830 (2007-07-17) @@ -16933,6 +17352,14 @@ Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1. ## 2005 +### CVE-2005-0603 (2005-03-01) + + +viewtopic.php in phpBB 2.0.12 and earlier allows remote attackers to obtain sensitive information via a highlight parameter containing invalid regular expression syntax, which reveals the path in a PHP error message. + + +- [Parcer0/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure](https://github.com/Parcer0/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure) + ### CVE-2005-1125 (2005-04-16)