From 7c1a27176c000341defe1711052b4994f7d9a18c Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 19 Jun 2021 12:12:20 +0900 Subject: [PATCH] Auto Update 2021/06/19 12:12:20 --- 2014/CVE-2014-4210.json | 8 +- 2016/CVE-2016-0638.json | 8 +- 2017/CVE-2017-3248.json | 8 +- 2018/CVE-2018-2628.json | 8 +- 2018/CVE-2018-2893.json | 8 +- 2019/CVE-2019-0192.json | 23 - 2019/CVE-2019-0193.json | 46 -- 2019/CVE-2019-0227.json | 25 - 2019/CVE-2019-0232.json | 23 - 2019/CVE-2019-0539.json | 25 - 2019/CVE-2019-0604.json | 23 - 2019/CVE-2019-0678.json | 25 - 2019/CVE-2019-0708.json | 552 ----------------- 2019/CVE-2019-0785.json | 25 - 2019/CVE-2019-10086.json | 25 - 2019/CVE-2019-1010298.json | 25 - 2019/CVE-2019-10149.json | 69 --- 2019/CVE-2019-10207.json | 25 - 2019/CVE-2019-10392.json | 48 -- 2019/CVE-2019-1040.json | 23 - 2019/CVE-2019-10475.json | 25 - 2019/CVE-2019-10708.json | 25 - 2019/CVE-2019-10758.json | 23 - 2019/CVE-2019-10915.json | 25 - 2019/CVE-2019-1096.json | 25 - 2019/CVE-2019-11043.json | 322 ---------- 2019/CVE-2019-11157.json | 25 - 2019/CVE-2019-1132.json | 48 -- 2019/CVE-2019-11358.json | 23 - 2019/CVE-2019-11477.json | 25 - 2019/CVE-2019-11510.json | 138 ----- 2019/CVE-2019-11539.json | 25 - 2019/CVE-2019-11580.json | 23 - 2019/CVE-2019-11581.json | 48 -- 2019/CVE-2019-11707.json | 23 - 2019/CVE-2019-11730.json | 25 - 2019/CVE-2019-1181.json | 25 - 2019/CVE-2019-11931.json | 48 -- 2019/CVE-2019-11932.json | 161 ----- 2019/CVE-2019-12255.json | 25 - 2019/CVE-2019-12272.json | 48 -- 2019/CVE-2019-12314.json | 25 - 2019/CVE-2019-12384.json | 23 - 2019/CVE-2019-12409.json | 25 - 2019/CVE-2019-12453.json | 25 - 2019/CVE-2019-12475.json | 25 - 2019/CVE-2019-1253.json | 69 --- 2019/CVE-2019-12562.json | 25 - 2019/CVE-2019-12586.json | 25 - 2019/CVE-2019-12750.json | 25 - 2019/CVE-2019-12815.json | 23 - 2019/CVE-2019-12840.json | 46 -- 2019/CVE-2019-12889.json | 25 - 2019/CVE-2019-12890.json | 25 - 2019/CVE-2019-12999.json | 25 - 2019/CVE-2019-13000.json | 25 - 2019/CVE-2019-13024.json | 48 -- 2019/CVE-2019-13025.json | 25 - 2019/CVE-2019-13027.json | 25 - 2019/CVE-2019-13051.json | 25 - 2019/CVE-2019-13063.json | 25 - 2019/CVE-2019-13101.json | 25 - 2019/CVE-2019-13115.json | 23 - 2019/CVE-2019-13143.json | 25 - 2019/CVE-2019-1315.json | 25 - 2019/CVE-2019-13272.json | 115 ---- 2019/CVE-2019-13361.json | 25 - 2019/CVE-2019-13403.json | 25 - 2019/CVE-2019-13496.json | 25 - 2019/CVE-2019-13497.json | 25 - 2019/CVE-2019-13498.json | 25 - 2019/CVE-2019-13504.json | 25 - 2019/CVE-2019-13574.json | 25 - 2019/CVE-2019-1367.json | 25 - 2019/CVE-2019-13720.json | 23 - 2019/CVE-2019-1385.json | 48 -- 2019/CVE-2019-1388.json | 46 -- 2019/CVE-2019-1402.json | 25 - 2019/CVE-2019-1405.json | 25 - 2019/CVE-2019-14205.json | 25 - 2019/CVE-2019-1422.json | 25 - 2019/CVE-2019-14220.json | 25 - 2019/CVE-2019-14287.json | 184 ------ 2019/CVE-2019-14319.json | 25 - 2019/CVE-2019-14339.json | 25 - 2019/CVE-2019-14439.json | 25 - 2019/CVE-2019-14529.json | 25 - 2019/CVE-2019-14530.json | 25 - 2019/CVE-2019-14537.json | 25 - 2019/CVE-2019-14540.json | 25 - 2019/CVE-2019-14745.json | 25 - 2019/CVE-2019-14751.json | 25 - 2019/CVE-2019-1476.json | 25 - 2019/CVE-2019-14830.json | 25 - 2019/CVE-2019-14912.json | 25 - 2019/CVE-2019-15029.json | 25 - 2019/CVE-2019-15053.json | 25 - 2019/CVE-2019-15107.json | 207 ------- 2019/CVE-2019-15120.json | 25 - 2019/CVE-2019-15224.json | 25 - 2019/CVE-2019-15233.json | 25 - 2019/CVE-2019-15511.json | 25 - 2019/CVE-2019-15642.json | 25 - 2019/CVE-2019-1579.json | 23 - 2019/CVE-2019-15846.json | 25 - 2019/CVE-2019-15858.json | 25 - 2019/CVE-2019-15972.json | 25 - 2019/CVE-2019-16097.json | 140 ----- 2019/CVE-2019-16098.json | 25 - 2019/CVE-2019-16278.json | 138 ----- 2019/CVE-2019-16279.json | 25 - 2019/CVE-2019-16662.json | 25 - 2019/CVE-2019-16663.json | 25 - 2019/CVE-2019-16692.json | 25 - 2019/CVE-2019-16759.json | 92 --- 2019/CVE-2019-16889.json | 25 - 2019/CVE-2019-16920.json | 25 - 2019/CVE-2019-16941.json | 25 - 2019/CVE-2019-17080.json | 48 -- 2019/CVE-2019-17124.json | 25 - 2019/CVE-2019-17424.json | 25 - 2019/CVE-2019-17495.json | 25 - 2019/CVE-2019-17571.json | 23 - 2019/CVE-2019-17596.json | 25 - 2019/CVE-2019-17633.json | 25 - 2019/CVE-2019-18873.json | 25 - 2019/CVE-2019-19012.json | 48 -- 2019/CVE-2019-19033.json | 25 - 2019/CVE-2019-19203.json | 48 -- 2019/CVE-2019-19204.json | 48 -- 2019/CVE-2019-19231.json | 25 - 2019/CVE-2019-19268.json | 25 - 2019/CVE-2019-19315.json | 25 - 2019/CVE-2019-19633.json | 25 - 2019/CVE-2019-19634.json | 25 - 2019/CVE-2019-19651.json | 25 - 2019/CVE-2019-19652.json | 25 - 2019/CVE-2019-19658.json | 25 - 2019/CVE-2019-19732.json | 25 - 2019/CVE-2019-19733.json | 25 - 2019/CVE-2019-19734.json | 25 - 2019/CVE-2019-19735.json | 25 - 2019/CVE-2019-19738.json | 25 - 2019/CVE-2019-19844.json | 23 - 2019/CVE-2019-2107.json | 23 - 2019/CVE-2019-2215.json | 69 --- 2019/CVE-2019-2525.json | 23 - 2019/CVE-2019-2618.json | 54 +- 2019/CVE-2019-2725.json | 69 --- 2019/CVE-2019-2888.json | 25 - 2019/CVE-2019-2890.json | 138 ----- 2019/CVE-2019-3394.json | 25 - 2019/CVE-2019-3396.json | 92 --- 2019/CVE-2019-3778.json | 25 - 2019/CVE-2019-3929.json | 25 - 2019/CVE-2019-5418.json | 46 -- 2019/CVE-2019-5475.json | 23 - 2019/CVE-2019-5489.json | 25 - 2019/CVE-2019-5700.json | 25 - 2019/CVE-2019-5736.json | 69 --- 2019/CVE-2019-5782.json | 8 +- 2019/CVE-2019-5825.json | 25 - 2019/CVE-2019-6225.json | 23 - 2019/CVE-2019-6329.json | 25 - 2019/CVE-2019-6715.json | 25 - 2019/CVE-2019-7238.json | 23 - 2019/CVE-2019-7609.json | 92 --- 2019/CVE-2019-7610.json | 25 - 2019/CVE-2019-7839.json | 25 - 2019/CVE-2019-8451.json | 94 --- 2019/CVE-2019-8781.json | 48 -- 2019/CVE-2019-9670.json | 48 -- 2019/CVE-2019-9745.json | 25 - 2019/CVE-2019-9787.json | 23 - 2020/CVE-2020-10199.json | 8 +- 2020/CVE-2020-13935.json | 8 +- 2020/CVE-2020-14321.json | 8 +- 2020/CVE-2020-1472.json | 24 +- 2020/CVE-2020-16947.json | 8 +- 2020/CVE-2020-2551.json | 8 +- 2020/CVE-2020-36179.json | 8 +- 2020/CVE-2020-5902.json | 16 +- 2021/CVE-2021-27905.json | 8 +- 2021/CVE-2021-31166.json | 4 +- 2021/CVE-2021-3156.json | 12 +- README.md | 1139 ------------------------------------ 186 files changed, 84 insertions(+), 8120 deletions(-) delete mode 100644 2019/CVE-2019-0227.json delete mode 100644 2019/CVE-2019-0539.json delete mode 100644 2019/CVE-2019-0678.json delete mode 100644 2019/CVE-2019-0785.json delete mode 100644 2019/CVE-2019-10086.json delete mode 100644 2019/CVE-2019-1010298.json delete mode 100644 2019/CVE-2019-10207.json delete mode 100644 2019/CVE-2019-10392.json delete mode 100644 2019/CVE-2019-10475.json delete mode 100644 2019/CVE-2019-10708.json delete mode 100644 2019/CVE-2019-10915.json delete mode 100644 2019/CVE-2019-1096.json delete mode 100644 2019/CVE-2019-11157.json delete mode 100644 2019/CVE-2019-1132.json delete mode 100644 2019/CVE-2019-11477.json delete mode 100644 2019/CVE-2019-11539.json delete mode 100644 2019/CVE-2019-11581.json delete mode 100644 2019/CVE-2019-11730.json delete mode 100644 2019/CVE-2019-1181.json delete mode 100644 2019/CVE-2019-11931.json delete mode 100644 2019/CVE-2019-12255.json delete mode 100644 2019/CVE-2019-12272.json delete mode 100644 2019/CVE-2019-12314.json delete mode 100644 2019/CVE-2019-12409.json delete mode 100644 2019/CVE-2019-12453.json delete mode 100644 2019/CVE-2019-12475.json delete mode 100644 2019/CVE-2019-12562.json delete mode 100644 2019/CVE-2019-12586.json delete mode 100644 2019/CVE-2019-12750.json delete mode 100644 2019/CVE-2019-12889.json delete mode 100644 2019/CVE-2019-12890.json delete mode 100644 2019/CVE-2019-12999.json delete mode 100644 2019/CVE-2019-13000.json delete mode 100644 2019/CVE-2019-13024.json delete mode 100644 2019/CVE-2019-13025.json delete mode 100644 2019/CVE-2019-13027.json delete mode 100644 2019/CVE-2019-13051.json delete mode 100644 2019/CVE-2019-13063.json delete mode 100644 2019/CVE-2019-13101.json delete mode 100644 2019/CVE-2019-13143.json delete mode 100644 2019/CVE-2019-1315.json delete mode 100644 2019/CVE-2019-13361.json delete mode 100644 2019/CVE-2019-13403.json delete mode 100644 2019/CVE-2019-13496.json delete mode 100644 2019/CVE-2019-13497.json delete mode 100644 2019/CVE-2019-13498.json delete mode 100644 2019/CVE-2019-13504.json delete mode 100644 2019/CVE-2019-13574.json delete mode 100644 2019/CVE-2019-1367.json delete mode 100644 2019/CVE-2019-1385.json delete mode 100644 2019/CVE-2019-1402.json delete mode 100644 2019/CVE-2019-1405.json delete mode 100644 2019/CVE-2019-14205.json delete mode 100644 2019/CVE-2019-1422.json delete mode 100644 2019/CVE-2019-14220.json delete mode 100644 2019/CVE-2019-14319.json delete mode 100644 2019/CVE-2019-14339.json delete mode 100644 2019/CVE-2019-14439.json delete mode 100644 2019/CVE-2019-14529.json delete mode 100644 2019/CVE-2019-14530.json delete mode 100644 2019/CVE-2019-14537.json delete mode 100644 2019/CVE-2019-14540.json delete mode 100644 2019/CVE-2019-14745.json delete mode 100644 2019/CVE-2019-14751.json delete mode 100644 2019/CVE-2019-1476.json delete mode 100644 2019/CVE-2019-14830.json delete mode 100644 2019/CVE-2019-14912.json delete mode 100644 2019/CVE-2019-15029.json delete mode 100644 2019/CVE-2019-15053.json delete mode 100644 2019/CVE-2019-15120.json delete mode 100644 2019/CVE-2019-15224.json delete mode 100644 2019/CVE-2019-15233.json delete mode 100644 2019/CVE-2019-15511.json delete mode 100644 2019/CVE-2019-15642.json delete mode 100644 2019/CVE-2019-15846.json delete mode 100644 2019/CVE-2019-15858.json delete mode 100644 2019/CVE-2019-15972.json delete mode 100644 2019/CVE-2019-16097.json delete mode 100644 2019/CVE-2019-16098.json delete mode 100644 2019/CVE-2019-16279.json delete mode 100644 2019/CVE-2019-16662.json delete mode 100644 2019/CVE-2019-16663.json delete mode 100644 2019/CVE-2019-16692.json delete mode 100644 2019/CVE-2019-16889.json delete mode 100644 2019/CVE-2019-16920.json delete mode 100644 2019/CVE-2019-16941.json delete mode 100644 2019/CVE-2019-17080.json delete mode 100644 2019/CVE-2019-17124.json delete mode 100644 2019/CVE-2019-17424.json delete mode 100644 2019/CVE-2019-17495.json delete mode 100644 2019/CVE-2019-17596.json delete mode 100644 2019/CVE-2019-17633.json delete mode 100644 2019/CVE-2019-18873.json delete mode 100644 2019/CVE-2019-19012.json delete mode 100644 2019/CVE-2019-19033.json delete mode 100644 2019/CVE-2019-19203.json delete mode 100644 2019/CVE-2019-19204.json delete mode 100644 2019/CVE-2019-19231.json delete mode 100644 2019/CVE-2019-19268.json delete mode 100644 2019/CVE-2019-19315.json delete mode 100644 2019/CVE-2019-19633.json delete mode 100644 2019/CVE-2019-19634.json delete mode 100644 2019/CVE-2019-19651.json delete mode 100644 2019/CVE-2019-19652.json delete mode 100644 2019/CVE-2019-19658.json delete mode 100644 2019/CVE-2019-19732.json delete mode 100644 2019/CVE-2019-19733.json delete mode 100644 2019/CVE-2019-19734.json delete mode 100644 2019/CVE-2019-19735.json delete mode 100644 2019/CVE-2019-19738.json delete mode 100644 2019/CVE-2019-2888.json delete mode 100644 2019/CVE-2019-3394.json delete mode 100644 2019/CVE-2019-3778.json delete mode 100644 2019/CVE-2019-3929.json delete mode 100644 2019/CVE-2019-5489.json delete mode 100644 2019/CVE-2019-5700.json delete mode 100644 2019/CVE-2019-5825.json delete mode 100644 2019/CVE-2019-6329.json delete mode 100644 2019/CVE-2019-6715.json delete mode 100644 2019/CVE-2019-7610.json delete mode 100644 2019/CVE-2019-7839.json delete mode 100644 2019/CVE-2019-8451.json delete mode 100644 2019/CVE-2019-8781.json delete mode 100644 2019/CVE-2019-9670.json delete mode 100644 2019/CVE-2019-9745.json diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index d78edc6934..1c604b42c7 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-06-18T03:28:34Z", + "updated_at": "2021-06-18T23:08:29Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1070, - "watchers_count": 1070, + "stargazers_count": 1071, + "watchers_count": 1071, "forks_count": 238, "forks": 238, - "watchers": 1070, + "watchers": 1071, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 7f72413f6f..f8f1e7a11a 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-06-18T03:28:34Z", + "updated_at": "2021-06-18T23:08:29Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1070, - "watchers_count": 1070, + "stargazers_count": 1071, + "watchers_count": 1071, "forks_count": 238, "forks": 238, - "watchers": 1070, + "watchers": 1071, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 9e16d57913..7ab8d1db18 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-06-18T03:28:34Z", + "updated_at": "2021-06-18T23:08:29Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1070, - "watchers_count": 1070, + "stargazers_count": 1071, + "watchers_count": 1071, "forks_count": 238, "forks": 238, - "watchers": 1070, + "watchers": 1071, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 17569af589..fb9bd05471 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-06-18T03:28:34Z", + "updated_at": "2021-06-18T23:08:29Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1070, - "watchers_count": 1070, + "stargazers_count": 1071, + "watchers_count": 1071, "forks_count": 238, "forks": 238, - "watchers": 1070, + "watchers": 1071, "score": 0 }, { diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json index d6cea93e8a..f354637b0e 100644 --- a/2018/CVE-2018-2893.json +++ b/2018/CVE-2018-2893.json @@ -105,13 +105,13 @@ "description": "可以直接反弹shell", "fork": false, "created_at": "2018-07-26T07:16:38Z", - "updated_at": "2020-08-19T01:40:23Z", + "updated_at": "2021-06-18T23:11:26Z", "pushed_at": "2018-07-26T07:50:15Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "forks_count": 14, "forks": 14, - "watchers": 44, + "watchers": 45, "score": 0 }, { diff --git a/2019/CVE-2019-0192.json b/2019/CVE-2019-0192.json index 81b63a84c7..4756160b7d 100644 --- a/2019/CVE-2019-0192.json +++ b/2019/CVE-2019-0192.json @@ -21,28 +21,5 @@ "forks": 62, "watchers": 210, "score": 0 - }, - { - "id": 218993619, - "name": "Solr-RCE-CVE-2019-0192", - "full_name": "Rapidsafeguard\/Solr-RCE-CVE-2019-0192", - "owner": { - "login": "Rapidsafeguard", - "id": 48471397, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48471397?v=4", - "html_url": "https:\/\/github.com\/Rapidsafeguard" - }, - "html_url": "https:\/\/github.com\/Rapidsafeguard\/Solr-RCE-CVE-2019-0192", - "description": "Apache Solr remote code execution via dataImportHandler", - "fork": false, - "created_at": "2019-11-01T13:46:37Z", - "updated_at": "2020-10-27T10:29:28Z", - "pushed_at": "2019-11-01T13:58:26Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, - "forks": 2, - "watchers": 2, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0193.json b/2019/CVE-2019-0193.json index ce7fa1f9a3..4b78207890 100644 --- a/2019/CVE-2019-0193.json +++ b/2019/CVE-2019-0193.json @@ -22,29 +22,6 @@ "watchers": 8, "score": 0 }, - { - "id": 201405406, - "name": "CVE-2019-0193", - "full_name": "jas502n\/CVE-2019-0193", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0193", - "description": "Apache Solr DataImport Handler RCE", - "fork": false, - "created_at": "2019-08-09T06:27:39Z", - "updated_at": "2021-06-03T04:56:19Z", - "pushed_at": "2019-08-12T02:23:38Z", - "stargazers_count": 80, - "watchers_count": 80, - "forks_count": 39, - "forks": 39, - "watchers": 80, - "score": 0 - }, { "id": 201878363, "name": "solr_exploit", @@ -67,28 +44,5 @@ "forks": 11, "watchers": 48, "score": 0 - }, - { - "id": 206173868, - "name": "CVE-2019-0193-exp", - "full_name": "jaychouzzk\/CVE-2019-0193-exp", - "owner": { - "login": "jaychouzzk", - "id": 45549315, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45549315?v=4", - "html_url": "https:\/\/github.com\/jaychouzzk" - }, - "html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-0193-exp", - "description": null, - "fork": false, - "created_at": "2019-09-03T21:16:24Z", - "updated_at": "2020-09-06T01:31:02Z", - "pushed_at": "2019-09-04T15:40:41Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0227.json b/2019/CVE-2019-0227.json deleted file mode 100644 index a964bd729f..0000000000 --- a/2019/CVE-2019-0227.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 217869109, - "name": "cve-2019-0227", - "full_name": "ianxtianxt\/cve-2019-0227", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/cve-2019-0227", - "description": "apache axis1.4远程代码执行漏洞", - "fork": false, - "created_at": "2019-10-27T14:42:54Z", - "updated_at": "2020-10-29T03:05:29Z", - "pushed_at": "2019-10-27T14:51:21Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index 7bdd989af7..7cbff04a36 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -68,29 +68,6 @@ "watchers": 2, "score": 0 }, - { - "id": 223192188, - "name": "CVE-2019-0232", - "full_name": "setrus\/CVE-2019-0232", - "owner": { - "login": "setrus", - "id": 34648357, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34648357?v=4", - "html_url": "https:\/\/github.com\/setrus" - }, - "html_url": "https:\/\/github.com\/setrus\/CVE-2019-0232", - "description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42", - "fork": false, - "created_at": "2019-11-21T14:25:39Z", - "updated_at": "2021-05-25T16:01:18Z", - "pushed_at": "2019-11-21T15:03:15Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 4, - "forks": 4, - "watchers": 8, - "score": 0 - }, { "id": 312163767, "name": "CVE-2019-0232", diff --git a/2019/CVE-2019-0539.json b/2019/CVE-2019-0539.json deleted file mode 100644 index a2c90d2d3b..0000000000 --- a/2019/CVE-2019-0539.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 196580913, - "name": "CVE-2019-0539", - "full_name": "0x43434343\/CVE-2019-0539", - "owner": { - "login": "0x43434343", - "id": 28482599, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28482599?v=4", - "html_url": "https:\/\/github.com\/0x43434343" - }, - "html_url": "https:\/\/github.com\/0x43434343\/CVE-2019-0539", - "description": "R\/W ", - "fork": false, - "created_at": "2019-07-12T13:06:17Z", - "updated_at": "2020-06-15T12:29:01Z", - "pushed_at": "2019-07-12T13:18:22Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-0604.json b/2019/CVE-2019-0604.json index 6890c59005..66d65df0fd 100644 --- a/2019/CVE-2019-0604.json +++ b/2019/CVE-2019-0604.json @@ -68,29 +68,6 @@ "watchers": 91, "score": 0 }, - { - "id": 208650796, - "name": "CVE-2019-0604", - "full_name": "m5050\/CVE-2019-0604", - "owner": { - "login": "m5050", - "id": 18764171, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18764171?v=4", - "html_url": "https:\/\/github.com\/m5050" - }, - "html_url": "https:\/\/github.com\/m5050\/CVE-2019-0604", - "description": "CVE-2019-0604: SharePoint RCE detection rules and sample PCAP", - "fork": false, - "created_at": "2019-09-15T20:06:54Z", - "updated_at": "2021-06-08T06:05:07Z", - "pushed_at": "2019-09-17T19:40:29Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 227013447, "name": "CVE-2019-0604", diff --git a/2019/CVE-2019-0678.json b/2019/CVE-2019-0678.json deleted file mode 100644 index e3bfff9e3e..0000000000 --- a/2019/CVE-2019-0678.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 197764635, - "name": "CVE-2019-0678", - "full_name": "c0d3G33k\/CVE-2019-0678", - "owner": { - "login": "c0d3G33k", - "id": 16446505, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16446505?v=4", - "html_url": "https:\/\/github.com\/c0d3G33k" - }, - "html_url": "https:\/\/github.com\/c0d3G33k\/CVE-2019-0678", - "description": "Microsoft Edge Elevation of Privilege Vulnerability", - "fork": false, - "created_at": "2019-07-19T11:55:32Z", - "updated_at": "2019-07-19T12:15:21Z", - "pushed_at": "2019-07-19T12:15:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 022e14f4ae..2f13ac8123 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1747,75 +1747,6 @@ "watchers": 14, "score": 0 }, - { - "id": 195150954, - "name": "CVE-2019-0708-exp", - "full_name": "ze0r\/CVE-2019-0708-exp", - "owner": { - "login": "ze0r", - "id": 43227253, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4", - "html_url": "https:\/\/github.com\/ze0r" - }, - "html_url": "https:\/\/github.com\/ze0r\/CVE-2019-0708-exp", - "description": null, - "fork": false, - "created_at": "2019-07-04T01:49:22Z", - "updated_at": "2021-04-02T06:30:10Z", - "pushed_at": "2019-07-25T07:31:57Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 4, - "forks": 4, - "watchers": 11, - "score": 0 - }, - { - "id": 196871345, - "name": "cve-2019-0708", - "full_name": "mekhalleh\/cve-2019-0708", - "owner": { - "login": "mekhalleh", - "id": 5225129, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5225129?v=4", - "html_url": "https:\/\/github.com\/mekhalleh" - }, - "html_url": "https:\/\/github.com\/mekhalleh\/cve-2019-0708", - "description": "Metasploit module for massive Denial of Service using #Bluekeep vector.", - "fork": false, - "created_at": "2019-07-14T18:43:48Z", - "updated_at": "2021-03-20T08:55:36Z", - "pushed_at": "2019-10-01T15:31:26Z", - "stargazers_count": 23, - "watchers_count": 23, - "forks_count": 7, - "forks": 7, - "watchers": 23, - "score": 0 - }, - { - "id": 197547695, - "name": "cve-2019-0708", - "full_name": "cve-2019-0708-poc\/cve-2019-0708", - "owner": { - "login": "cve-2019-0708-poc", - "id": 53038783, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53038783?v=4", - "html_url": "https:\/\/github.com\/cve-2019-0708-poc" - }, - "html_url": "https:\/\/github.com\/cve-2019-0708-poc\/cve-2019-0708", - "description": "CVE-2019-0708 Exploit Tool", - "fork": false, - "created_at": "2019-07-18T08:41:01Z", - "updated_at": "2019-08-29T04:15:45Z", - "pushed_at": "2019-07-18T08:44:51Z", - "stargazers_count": 18, - "watchers_count": 18, - "forks_count": 0, - "forks": 0, - "watchers": 18, - "score": 0 - }, { "id": 197655376, "name": "CVE-2019-0708", @@ -1839,397 +1770,6 @@ "watchers": 2, "score": 0 }, - { - "id": 198343084, - "name": "bluekeep", - "full_name": "0xeb-bp\/bluekeep", - "owner": { - "login": "0xeb-bp", - "id": 53204152, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53204152?v=4", - "html_url": "https:\/\/github.com\/0xeb-bp" - }, - "html_url": "https:\/\/github.com\/0xeb-bp\/bluekeep", - "description": "Public work for CVE-2019-0708", - "fork": false, - "created_at": "2019-07-23T03:15:53Z", - "updated_at": "2021-05-31T20:15:52Z", - "pushed_at": "2019-11-19T02:43:38Z", - "stargazers_count": 287, - "watchers_count": 287, - "forks_count": 95, - "forks": 95, - "watchers": 287, - "score": 0 - }, - { - "id": 198731225, - "name": "CVE-2019-0708", - "full_name": "ntkernel0\/CVE-2019-0708", - "owner": { - "login": "ntkernel0", - "id": 46866847, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46866847?v=4", - "html_url": "https:\/\/github.com\/ntkernel0" - }, - "html_url": "https:\/\/github.com\/ntkernel0\/CVE-2019-0708", - "description": "收集网上CVE-2018-0708的poc和exp(目前没有找到exp)", - "fork": false, - "created_at": "2019-07-25T01:05:21Z", - "updated_at": "2019-12-07T02:05:23Z", - "pushed_at": "2019-07-25T01:03:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 202911823, - "name": "Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", - "full_name": "dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", - "owner": { - "login": "dorkerdevil", - "id": 15796745, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4", - "html_url": "https:\/\/github.com\/dorkerdevil" - }, - "html_url": "https:\/\/github.com\/dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", - "description": "rce exploit , made to work with pocsuite3", - "fork": false, - "created_at": "2019-08-17T17:23:53Z", - "updated_at": "2021-06-07T01:40:22Z", - "pushed_at": "2019-08-19T02:52:11Z", - "stargazers_count": 113, - "watchers_count": 113, - "forks_count": 58, - "forks": 58, - "watchers": 113, - "score": 0 - }, - { - "id": 202951481, - "name": "bluekeep", - "full_name": "turingcompl33t\/bluekeep", - "owner": { - "login": "turingcompl33t", - "id": 19956905, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19956905?v=4", - "html_url": "https:\/\/github.com\/turingcompl33t" - }, - "html_url": "https:\/\/github.com\/turingcompl33t\/bluekeep", - "description": "Research Regarding CVE-2019-0708.", - "fork": false, - "created_at": "2019-08-18T02:34:31Z", - "updated_at": "2020-03-09T19:52:03Z", - "pushed_at": "2019-11-04T01:15:22Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 2, - "forks": 2, - "watchers": 3, - "score": 0 - }, - { - "id": 203477227, - "name": "CVE-2019-0708-test", - "full_name": "fade-vivida\/CVE-2019-0708-test", - "owner": { - "login": "fade-vivida", - "id": 38774342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38774342?v=4", - "html_url": "https:\/\/github.com\/fade-vivida" - }, - "html_url": "https:\/\/github.com\/fade-vivida\/CVE-2019-0708-test", - "description": null, - "fork": false, - "created_at": "2019-08-21T00:48:55Z", - "updated_at": "2020-03-11T13:53:42Z", - "pushed_at": "2019-11-28T01:38:56Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 206050892, - "name": "CVE-2019-0708", - "full_name": "skommando\/CVE-2019-0708", - "owner": { - "login": "skommando", - "id": 22767889, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22767889?v=4", - "html_url": "https:\/\/github.com\/skommando" - }, - "html_url": "https:\/\/github.com\/skommando\/CVE-2019-0708", - "description": "CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。", - "fork": false, - "created_at": "2019-09-03T10:25:48Z", - "updated_at": "2019-10-02T17:51:34Z", - "pushed_at": "2019-09-12T02:29:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 206863569, - "name": "msf-module-CVE-2019-0708", - "full_name": "RickGeex\/msf-module-CVE-2019-0708", - "owner": { - "login": "RickGeex", - "id": 7975904, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7975904?v=4", - "html_url": "https:\/\/github.com\/RickGeex" - }, - "html_url": "https:\/\/github.com\/RickGeex\/msf-module-CVE-2019-0708", - "description": "Metasploit module for CVE-2019-0708 (BlueKeep) - https:\/\/github.com\/rapid7\/metasploit-framework\/tree\/5a0119b04309c8e61b44763ac08811cd3ecbbf8d\/modules\/exploits\/windows\/rdp", - "fork": false, - "created_at": "2019-09-06T19:46:03Z", - "updated_at": "2021-05-24T22:36:55Z", - "pushed_at": "2019-09-07T09:41:22Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 4, - "forks": 4, - "watchers": 12, - "score": 0 - }, - { - "id": 206893335, - "name": "CVE-2019-0708", - "full_name": "wqsemc\/CVE-2019-0708", - "owner": { - "login": "wqsemc", - "id": 36132717, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36132717?v=4", - "html_url": "https:\/\/github.com\/wqsemc" - }, - "html_url": "https:\/\/github.com\/wqsemc\/CVE-2019-0708", - "description": "initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data\/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.", - "fork": false, - "created_at": "2019-09-07T00:28:45Z", - "updated_at": "2020-09-30T09:13:29Z", - "pushed_at": "2019-09-16T10:35:57Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 3, - "forks": 3, - "watchers": 12, - "score": 0 - }, - { - "id": 206919373, - "name": "CVE-2019-0708-RCE", - "full_name": "mai-lang-chai\/CVE-2019-0708-RCE", - "owner": { - "login": "mai-lang-chai", - "id": 36095584, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36095584?v=4", - "html_url": "https:\/\/github.com\/mai-lang-chai" - }, - "html_url": "https:\/\/github.com\/mai-lang-chai\/CVE-2019-0708-RCE", - "description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程", - "fork": false, - "created_at": "2019-09-07T05:15:23Z", - "updated_at": "2021-03-19T16:47:42Z", - "pushed_at": "2019-09-20T04:53:41Z", - "stargazers_count": 40, - "watchers_count": 40, - "forks_count": 16, - "forks": 16, - "watchers": 40, - "score": 0 - }, - { - "id": 206926531, - "name": "CVE-2019-0708RDP-MSF", - "full_name": "Micr067\/CVE-2019-0708RDP-MSF", - "owner": { - "login": "Micr067", - "id": 49861012, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49861012?v=4", - "html_url": "https:\/\/github.com\/Micr067" - }, - "html_url": "https:\/\/github.com\/Micr067\/CVE-2019-0708RDP-MSF", - "description": "CVE-2019-0708RDP MSF", - "fork": false, - "created_at": "2019-09-07T06:32:25Z", - "updated_at": "2019-09-07T06:32:25Z", - "pushed_at": "2019-09-07T06:32:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 206928449, - "name": "CVE-2019-0708-BlueKeep", - "full_name": "cpkkcb\/CVE-2019-0708-BlueKeep", - "owner": { - "login": "cpkkcb", - "id": 31617622, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31617622?v=4", - "html_url": "https:\/\/github.com\/cpkkcb" - }, - "html_url": "https:\/\/github.com\/cpkkcb\/CVE-2019-0708-BlueKeep", - "description": null, - "fork": false, - "created_at": "2019-09-07T06:50:47Z", - "updated_at": "2020-03-25T05:24:54Z", - "pushed_at": "2019-09-07T07:05:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - }, - { - "id": 206932731, - "name": "CVE-2019-0708", - "full_name": "FrostsaberX\/CVE-2019-0708", - "owner": { - "login": "FrostsaberX", - "id": 24857203, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24857203?v=4", - "html_url": "https:\/\/github.com\/FrostsaberX" - }, - "html_url": "https:\/\/github.com\/FrostsaberX\/CVE-2019-0708", - "description": "CVE-2019-0708 With Metasploit-Framework Exploit", - "fork": false, - "created_at": "2019-09-07T07:32:14Z", - "updated_at": "2019-09-09T01:17:19Z", - "pushed_at": "2019-09-07T08:50:59Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, - { - "id": 206976374, - "name": "CVE-2019-0708-EXP-MSF-", - "full_name": "qing-root\/CVE-2019-0708-EXP-MSF-", - "owner": { - "login": "qing-root", - "id": 30001685, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30001685?v=4", - "html_url": "https:\/\/github.com\/qing-root" - }, - "html_url": "https:\/\/github.com\/qing-root\/CVE-2019-0708-EXP-MSF-", - "description": "CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708", - "fork": false, - "created_at": "2019-09-07T14:02:50Z", - "updated_at": "2021-05-15T14:15:17Z", - "pushed_at": "2019-09-07T15:07:24Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 8, - "forks": 8, - "watchers": 5, - "score": 0 - }, - { - "id": 207703935, - "name": "CVE-2019-0708", - "full_name": "distance-vector\/CVE-2019-0708", - "owner": { - "login": "distance-vector", - "id": 35881006, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35881006?v=4", - "html_url": "https:\/\/github.com\/distance-vector" - }, - "html_url": "https:\/\/github.com\/distance-vector\/CVE-2019-0708", - "description": null, - "fork": false, - "created_at": "2019-09-11T02:19:19Z", - "updated_at": "2019-09-11T02:23:01Z", - "pushed_at": "2019-09-11T02:23:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 207790184, - "name": "CVE-2019-0708-test", - "full_name": "0xFlag\/CVE-2019-0708-test", - "owner": { - "login": "0xFlag", - "id": 54313514, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54313514?v=4", - "html_url": "https:\/\/github.com\/0xFlag" - }, - "html_url": "https:\/\/github.com\/0xFlag\/CVE-2019-0708-test", - "description": "CVE-2019-0708 C#验证漏洞", - "fork": false, - "created_at": "2019-09-11T10:58:04Z", - "updated_at": "2019-09-13T01:46:23Z", - "pushed_at": "2019-09-13T01:46:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 208964787, - "name": "CVE-2019-0708", - "full_name": "1aa87148377\/CVE-2019-0708", - "owner": { - "login": "1aa87148377", - "id": 51265955, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51265955?v=4", - "html_url": "https:\/\/github.com\/1aa87148377" - }, - "html_url": "https:\/\/github.com\/1aa87148377\/CVE-2019-0708", - "description": null, - "fork": false, - "created_at": "2019-09-17T05:15:28Z", - "updated_at": "2019-09-17T05:17:33Z", - "pushed_at": "2019-09-17T05:17:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 211623683, - "name": "cve-2019-0708_bluekeep_rce", - "full_name": "coolboy4me\/cve-2019-0708_bluekeep_rce", - "owner": { - "login": "coolboy4me", - "id": 10040130, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10040130?v=4", - "html_url": "https:\/\/github.com\/coolboy4me" - }, - "html_url": "https:\/\/github.com\/coolboy4me\/cve-2019-0708_bluekeep_rce", - "description": "it works on xp (all version sp2 sp3)", - "fork": false, - "created_at": "2019-09-29T07:38:41Z", - "updated_at": "2021-03-03T11:33:02Z", - "pushed_at": "2019-09-30T03:44:18Z", - "stargazers_count": 71, - "watchers_count": 71, - "forks_count": 15, - "forks": 15, - "watchers": 71, - "score": 0 - }, { "id": 211942417, "name": "ispy", @@ -2253,52 +1793,6 @@ "watchers": 190, "score": 0 }, - { - "id": 214051334, - "name": "CVE-2019-0708", - "full_name": "shishibabyq\/CVE-2019-0708", - "owner": { - "login": "shishibabyq", - "id": 56372841, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56372841?v=4", - "html_url": "https:\/\/github.com\/shishibabyq" - }, - "html_url": "https:\/\/github.com\/shishibabyq\/CVE-2019-0708", - "description": "CVE-2019-0708", - "fork": false, - "created_at": "2019-10-10T00:34:41Z", - "updated_at": "2020-03-25T05:23:01Z", - "pushed_at": "2019-10-10T00:50:48Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, - "score": 0 - }, - { - "id": 214524140, - "name": "Wincrash", - "full_name": "pwnhacker0x18\/Wincrash", - "owner": { - "login": "pwnhacker0x18", - "id": 51971493, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51971493?v=4", - "html_url": "https:\/\/github.com\/pwnhacker0x18" - }, - "html_url": "https:\/\/github.com\/pwnhacker0x18\/Wincrash", - "description": "Mass exploit for CVE-2019-0708", - "fork": false, - "created_at": "2019-10-11T20:33:35Z", - "updated_at": "2020-07-18T04:11:40Z", - "pushed_at": "2019-10-11T20:42:38Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, - "forks": 2, - "watchers": 2, - "score": 0 - }, { "id": 221436919, "name": "CVE-2019-0708-DOS", @@ -2345,29 +1839,6 @@ "watchers": 0, "score": 0 }, - { - "id": 223320391, - "name": "-2-CVE-2019-0708", - "full_name": "ulisesrc\/-2-CVE-2019-0708", - "owner": { - "login": "ulisesrc", - "id": 3741400, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3741400?v=4", - "html_url": "https:\/\/github.com\/ulisesrc" - }, - "html_url": "https:\/\/github.com\/ulisesrc\/-2-CVE-2019-0708", - "description": null, - "fork": false, - "created_at": "2019-11-22T04:00:49Z", - "updated_at": "2019-11-22T04:01:11Z", - "pushed_at": "2019-11-22T04:01:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 226491441, "name": "CVE-2019-0708", @@ -2506,29 +1977,6 @@ "watchers": 0, "score": 0 }, - { - "id": 318113571, - "name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit", - "full_name": "DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit", - "owner": { - "login": "DeathStroke-source", - "id": 23089257, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23089257?v=4", - "html_url": "https:\/\/github.com\/DeathStroke-source" - }, - "html_url": "https:\/\/github.com\/DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit", - "description": "Scan through given ip list", - "fork": false, - "created_at": "2020-12-03T07:40:19Z", - "updated_at": "2021-01-29T14:08:43Z", - "pushed_at": "2019-05-22T22:32:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 324765199, "name": "CVE-2019-0708", diff --git a/2019/CVE-2019-0785.json b/2019/CVE-2019-0785.json deleted file mode 100644 index c6ae4ab73f..0000000000 --- a/2019/CVE-2019-0785.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 196208560, - "name": "CVE-2019-0785", - "full_name": "Jaky5155\/CVE-2019-0785", - "owner": { - "login": "Jaky5155", - "id": 47801640, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47801640?v=4", - "html_url": "https:\/\/github.com\/Jaky5155" - }, - "html_url": "https:\/\/github.com\/Jaky5155\/CVE-2019-0785", - "description": "CVE-2019-0785", - "fork": false, - "created_at": "2019-07-10T13:16:42Z", - "updated_at": "2020-04-05T09:53:47Z", - "pushed_at": "2019-07-10T13:18:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10086.json b/2019/CVE-2019-10086.json deleted file mode 100644 index a9d647afd8..0000000000 --- a/2019/CVE-2019-10086.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 218899327, - "name": "CVE-2019-10086", - "full_name": "evilangelplus\/CVE-2019-10086", - "owner": { - "login": "evilangelplus", - "id": 56948123, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56948123?v=4", - "html_url": "https:\/\/github.com\/evilangelplus" - }, - "html_url": "https:\/\/github.com\/evilangelplus\/CVE-2019-10086", - "description": "wait for exp.", - "fork": false, - "created_at": "2019-11-01T02:36:17Z", - "updated_at": "2019-11-01T02:36:17Z", - "pushed_at": "2019-11-01T02:36:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1010298.json b/2019/CVE-2019-1010298.json deleted file mode 100644 index 750c82d804..0000000000 --- a/2019/CVE-2019-1010298.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 201962859, - "name": "CVE-2019-1010298", - "full_name": "RKX1209\/CVE-2019-1010298", - "owner": { - "login": "RKX1209", - "id": 964758, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/964758?v=4", - "html_url": "https:\/\/github.com\/RKX1209" - }, - "html_url": "https:\/\/github.com\/RKX1209\/CVE-2019-1010298", - "description": "Proof of Concept of TrustZone exploit ", - "fork": false, - "created_at": "2019-08-12T15:58:06Z", - "updated_at": "2021-02-05T03:37:59Z", - "pushed_at": "2019-08-12T16:01:24Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 4, - "forks": 4, - "watchers": 13, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10149.json b/2019/CVE-2019-10149.json index f5a099e46a..82cbabab91 100644 --- a/2019/CVE-2019-10149.json +++ b/2019/CVE-2019-10149.json @@ -114,75 +114,6 @@ "watchers": 9, "score": 0 }, - { - "id": 198729185, - "name": "StickyExim", - "full_name": "Brets0150\/StickyExim", - "owner": { - "login": "Brets0150", - "id": 40045956, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40045956?v=4", - "html_url": "https:\/\/github.com\/Brets0150" - }, - "html_url": "https:\/\/github.com\/Brets0150\/StickyExim", - "description": "Exim Honey Pot for CVE-2019-10149 exploit attempts.", - "fork": false, - "created_at": "2019-07-25T00:46:37Z", - "updated_at": "2021-05-05T07:05:02Z", - "pushed_at": "2019-08-06T20:21:46Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 206647936, - "name": "exim.exp", - "full_name": "ChrissHack\/exim.exp", - "owner": { - "login": "ChrissHack", - "id": 36897897, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36897897?v=4", - "html_url": "https:\/\/github.com\/ChrissHack" - }, - "html_url": "https:\/\/github.com\/ChrissHack\/exim.exp", - "description": "CVE-2019-10149", - "fork": false, - "created_at": "2019-09-05T20:04:14Z", - "updated_at": "2019-09-11T01:27:28Z", - "pushed_at": "2019-09-05T20:34:18Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, - { - "id": 216513053, - "name": "CVE-2019-10149", - "full_name": "darsigovrustam\/CVE-2019-10149", - "owner": { - "login": "darsigovrustam", - "id": 36308333, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36308333?v=4", - "html_url": "https:\/\/github.com\/darsigovrustam" - }, - "html_url": "https:\/\/github.com\/darsigovrustam\/CVE-2019-10149", - "description": "Instructions for installing a vulnerable version of Exim and its expluatation", - "fork": false, - "created_at": "2019-10-21T08:13:27Z", - "updated_at": "2020-04-13T06:36:31Z", - "pushed_at": "2019-10-24T07:19:28Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 217788444, "name": "CVE-2019-10149", diff --git a/2019/CVE-2019-10207.json b/2019/CVE-2019-10207.json deleted file mode 100644 index 5ee3989bb7..0000000000 --- a/2019/CVE-2019-10207.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 199611138, - "name": "CVE-2019-10207", - "full_name": "butterflyhack\/CVE-2019-10207", - "owner": { - "login": "butterflyhack", - "id": 11525772, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11525772?v=4", - "html_url": "https:\/\/github.com\/butterflyhack" - }, - "html_url": "https:\/\/github.com\/butterflyhack\/CVE-2019-10207", - "description": "PoC for CVE-2019-10207", - "fork": false, - "created_at": "2019-07-30T08:39:21Z", - "updated_at": "2020-10-26T08:01:10Z", - "pushed_at": "2019-07-30T08:50:32Z", - "stargazers_count": 18, - "watchers_count": 18, - "forks_count": 6, - "forks": 6, - "watchers": 18, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10392.json b/2019/CVE-2019-10392.json deleted file mode 100644 index 7a1a6c872b..0000000000 --- a/2019/CVE-2019-10392.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 211009198, - "name": "CVE-2019-10392", - "full_name": "jas502n\/CVE-2019-10392", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-10392", - "description": "CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)", - "fork": false, - "created_at": "2019-09-26T05:45:00Z", - "updated_at": "2020-11-06T17:52:46Z", - "pushed_at": "2019-09-26T05:49:21Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 4, - "forks": 4, - "watchers": 19, - "score": 0 - }, - { - "id": 211651844, - "name": "CVE-2019-10392_EXP", - "full_name": "ftk-sostupid\/CVE-2019-10392_EXP", - "owner": { - "login": "ftk-sostupid", - "id": 30171892, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30171892?v=4", - "html_url": "https:\/\/github.com\/ftk-sostupid" - }, - "html_url": "https:\/\/github.com\/ftk-sostupid\/CVE-2019-10392_EXP", - "description": "Jenkins Git Client RCE CVE-2019-10392_Exp", - "fork": false, - "created_at": "2019-09-29T11:22:41Z", - "updated_at": "2019-10-27T17:19:37Z", - "pushed_at": "2019-10-21T02:02:42Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index 94d9582e20..ad2f4c78c6 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -91,29 +91,6 @@ "watchers": 247, "score": 0 }, - { - "id": 209096168, - "name": "CVE-2019-1040", - "full_name": "wzxmt\/CVE-2019-1040", - "owner": { - "login": "wzxmt", - "id": 44249535, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44249535?v=4", - "html_url": "https:\/\/github.com\/wzxmt" - }, - "html_url": "https:\/\/github.com\/wzxmt\/CVE-2019-1040", - "description": null, - "fork": false, - "created_at": "2019-09-17T15:53:25Z", - "updated_at": "2020-04-01T05:23:50Z", - "pushed_at": "2019-09-17T15:53:48Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 325925728, "name": "dcpwn", diff --git a/2019/CVE-2019-10475.json b/2019/CVE-2019-10475.json deleted file mode 100644 index 96ec88db11..0000000000 --- a/2019/CVE-2019-10475.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 220101094, - "name": "CVE-2019-10475", - "full_name": "vesche\/CVE-2019-10475", - "owner": { - "login": "vesche", - "id": 8083281, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8083281?v=4", - "html_url": "https:\/\/github.com\/vesche" - }, - "html_url": "https:\/\/github.com\/vesche\/CVE-2019-10475", - "description": null, - "fork": false, - "created_at": "2019-11-06T22:19:01Z", - "updated_at": "2020-03-02T00:23:05Z", - "pushed_at": "2019-11-06T23:33:11Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 3, - "forks": 3, - "watchers": 12, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10708.json b/2019/CVE-2019-10708.json deleted file mode 100644 index 6bd812a999..0000000000 --- a/2019/CVE-2019-10708.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 202295806, - "name": "CVE-2019-10708", - "full_name": "stavhaygn\/CVE-2019-10708", - "owner": { - "login": "stavhaygn", - "id": 17663058, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17663058?v=4", - "html_url": "https:\/\/github.com\/stavhaygn" - }, - "html_url": "https:\/\/github.com\/stavhaygn\/CVE-2019-10708", - "description": "CVE-2019-10708 SQL injection PoC", - "fork": false, - "created_at": "2019-08-14T07:15:58Z", - "updated_at": "2019-08-18T10:17:37Z", - "pushed_at": "2019-08-18T10:17:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10758.json b/2019/CVE-2019-10758.json index 6f48338d05..95473645ea 100644 --- a/2019/CVE-2019-10758.json +++ b/2019/CVE-2019-10758.json @@ -1,27 +1,4 @@ [ - { - "id": 230212773, - "name": "CVE-2019-10758", - "full_name": "masahiro331\/CVE-2019-10758", - "owner": { - "login": "masahiro331", - "id": 20438853, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4", - "html_url": "https:\/\/github.com\/masahiro331" - }, - "html_url": "https:\/\/github.com\/masahiro331\/CVE-2019-10758", - "description": null, - "fork": false, - "created_at": "2019-12-26T06:58:56Z", - "updated_at": "2021-03-28T14:34:49Z", - "pushed_at": "2019-12-26T08:44:54Z", - "stargazers_count": 107, - "watchers_count": 107, - "forks_count": 25, - "forks": 25, - "watchers": 107, - "score": 0 - }, { "id": 231926488, "name": "CVE-2019-10758", diff --git a/2019/CVE-2019-10915.json b/2019/CVE-2019-10915.json deleted file mode 100644 index b749c131dd..0000000000 --- a/2019/CVE-2019-10915.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 198133475, - "name": "CVE-2019-10915", - "full_name": "jiansiting\/CVE-2019-10915", - "owner": { - "login": "jiansiting", - "id": 28823754, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4", - "html_url": "https:\/\/github.com\/jiansiting" - }, - "html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-10915", - "description": "Siemens TIA administrator Tool RCE", - "fork": false, - "created_at": "2019-07-22T02:38:54Z", - "updated_at": "2020-03-18T01:41:48Z", - "pushed_at": "2019-07-22T11:48:39Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 3, - "forks": 3, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1096.json b/2019/CVE-2019-1096.json deleted file mode 100644 index 15c1a7de67..0000000000 --- a/2019/CVE-2019-1096.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 198785536, - "name": "cve-2019-1096-poc", - "full_name": "CrackerCat\/cve-2019-1096-poc", - "owner": { - "login": "CrackerCat", - "id": 17995064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4", - "html_url": "https:\/\/github.com\/CrackerCat" - }, - "html_url": "https:\/\/github.com\/CrackerCat\/cve-2019-1096-poc", - "description": null, - "fork": false, - "created_at": "2019-07-25T07:58:44Z", - "updated_at": "2020-08-17T10:36:33Z", - "pushed_at": "2019-07-25T07:24:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index ce02cc5496..6b8c0fe419 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -1,73 +1,4 @@ [ - { - "id": 210457246, - "name": "phuip-fpizdam", - "full_name": "neex\/phuip-fpizdam", - "owner": { - "login": "neex", - "id": 684237, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684237?v=4", - "html_url": "https:\/\/github.com\/neex" - }, - "html_url": "https:\/\/github.com\/neex\/phuip-fpizdam", - "description": "Exploit for CVE-2019-11043", - "fork": false, - "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2021-06-16T19:03:57Z", - "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1661, - "watchers_count": 1661, - "forks_count": 250, - "forks": 250, - "watchers": 1661, - "score": 0 - }, - { - "id": 217065303, - "name": "CVE-2019-11043", - "full_name": "B1gd0g\/CVE-2019-11043", - "owner": { - "login": "B1gd0g", - "id": 49259860, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49259860?v=4", - "html_url": "https:\/\/github.com\/B1gd0g" - }, - "html_url": "https:\/\/github.com\/B1gd0g\/CVE-2019-11043", - "description": "CVE-2019-11043", - "fork": false, - "created_at": "2019-10-23T13:32:14Z", - "updated_at": "2020-09-07T00:53:59Z", - "pushed_at": "2019-10-23T13:35:48Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 217065801, - "name": "CVE-2019-11043", - "full_name": "tinker-li\/CVE-2019-11043", - "owner": { - "login": "tinker-li", - "id": 41416976, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41416976?v=4", - "html_url": "https:\/\/github.com\/tinker-li" - }, - "html_url": "https:\/\/github.com\/tinker-li\/CVE-2019-11043", - "description": null, - "fork": false, - "created_at": "2019-10-23T13:34:28Z", - "updated_at": "2020-09-09T02:32:37Z", - "pushed_at": "2019-10-23T13:41:51Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 217171261, "name": "CVE-2019-11043", @@ -114,259 +45,6 @@ "watchers": 4, "score": 0 }, - { - "id": 217257852, - "name": "CVE-2019-11043", - "full_name": "ianxtianxt\/CVE-2019-11043", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-11043", - "description": null, - "fork": false, - "created_at": "2019-10-24T09:09:01Z", - "updated_at": "2020-09-09T02:32:38Z", - "pushed_at": "2019-10-24T09:12:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - }, - { - "id": 217258558, - "name": "CVE-2019-11043", - "full_name": "fairyming\/CVE-2019-11043", - "owner": { - "login": "fairyming", - "id": 44915879, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44915879?v=4", - "html_url": "https:\/\/github.com\/fairyming" - }, - "html_url": "https:\/\/github.com\/fairyming\/CVE-2019-11043", - "description": null, - "fork": false, - "created_at": "2019-10-24T09:12:38Z", - "updated_at": "2020-04-05T08:53:01Z", - "pushed_at": "2019-10-24T10:04:02Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, - { - "id": 217294430, - "name": "CVE-2019-11043-Docker", - "full_name": "akamajoris\/CVE-2019-11043-Docker", - "owner": { - "login": "akamajoris", - "id": 4648441, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4648441?v=4", - "html_url": "https:\/\/github.com\/akamajoris" - }, - "html_url": "https:\/\/github.com\/akamajoris\/CVE-2019-11043-Docker", - "description": null, - "fork": false, - "created_at": "2019-10-24T12:32:02Z", - "updated_at": "2020-09-07T00:19:06Z", - "pushed_at": "2019-10-28T10:23:17Z", - "stargazers_count": 27, - "watchers_count": 27, - "forks_count": 8, - "forks": 8, - "watchers": 27, - "score": 0 - }, - { - "id": 218028044, - "name": "CVE-2019-11043", - "full_name": "theMiddleBlue\/CVE-2019-11043", - "owner": { - "login": "theMiddleBlue", - "id": 4454961, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4454961?v=4", - "html_url": "https:\/\/github.com\/theMiddleBlue" - }, - "html_url": "https:\/\/github.com\/theMiddleBlue\/CVE-2019-11043", - "description": "(PoC) Python version of CVE-2019-11043 exploit by neex", - "fork": false, - "created_at": "2019-10-28T11:09:06Z", - "updated_at": "2021-05-20T08:45:52Z", - "pushed_at": "2019-10-29T15:47:02Z", - "stargazers_count": 132, - "watchers_count": 132, - "forks_count": 30, - "forks": 30, - "watchers": 132, - "score": 0 - }, - { - "id": 218080163, - "name": "cve-2019-11043", - "full_name": "shadow-horse\/cve-2019-11043", - "owner": { - "login": "shadow-horse", - "id": 5432330, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5432330?v=4", - "html_url": "https:\/\/github.com\/shadow-horse" - }, - "html_url": "https:\/\/github.com\/shadow-horse\/cve-2019-11043", - "description": "CVE-2019-11043 PHP远程代码执行", - "fork": false, - "created_at": "2019-10-28T15:31:34Z", - "updated_at": "2019-10-29T15:39:20Z", - "pushed_at": "2019-10-29T15:39:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 218269194, - "name": "CVE-2019-11043", - "full_name": "huowen\/CVE-2019-11043", - "owner": { - "login": "huowen", - "id": 31957041, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957041?v=4", - "html_url": "https:\/\/github.com\/huowen" - }, - "html_url": "https:\/\/github.com\/huowen\/CVE-2019-11043", - "description": "Python exp for CVE-2019-11043", - "fork": false, - "created_at": "2019-10-29T11:16:12Z", - "updated_at": "2020-08-23T10:21:00Z", - "pushed_at": "2019-10-30T06:19:21Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 1, - "forks": 1, - "watchers": 6, - "score": 0 - }, - { - "id": 218500391, - "name": "docker-CVE-2019-11043", - "full_name": "ypereirareis\/docker-CVE-2019-11043", - "owner": { - "login": "ypereirareis", - "id": 6838923, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6838923?v=4", - "html_url": "https:\/\/github.com\/ypereirareis" - }, - "html_url": "https:\/\/github.com\/ypereirareis\/docker-CVE-2019-11043", - "description": "Docker image and commands to check CVE-2019-11043 vulnerability on nginx\/php-fpm applications.", - "fork": false, - "created_at": "2019-10-30T10:22:41Z", - "updated_at": "2021-06-15T03:01:34Z", - "pushed_at": "2019-10-30T12:53:43Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 2, - "forks": 2, - "watchers": 6, - "score": 0 - }, - { - "id": 220021213, - "name": "CVE-2019-11043", - "full_name": "MRdoulestar\/CVE-2019-11043", - "owner": { - "login": "MRdoulestar", - "id": 18137763, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18137763?v=4", - "html_url": "https:\/\/github.com\/MRdoulestar" - }, - "html_url": "https:\/\/github.com\/MRdoulestar\/CVE-2019-11043", - "description": "CVE-2019-11043 && PHP7.x && RCE EXP", - "fork": false, - "created_at": "2019-11-06T14:53:13Z", - "updated_at": "2019-11-06T15:29:35Z", - "pushed_at": "2019-11-06T15:24:52Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, - { - "id": 220032292, - "name": "CVE-2019-11043", - "full_name": "0th3rs-Security-Team\/CVE-2019-11043", - "owner": { - "login": "0th3rs-Security-Team", - "id": 57450857, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57450857?v=4", - "html_url": "https:\/\/github.com\/0th3rs-Security-Team" - }, - "html_url": "https:\/\/github.com\/0th3rs-Security-Team\/CVE-2019-11043", - "description": "CVE-2019-11043 PHP7.x RCE", - "fork": false, - "created_at": "2019-11-06T15:44:47Z", - "updated_at": "2020-08-26T07:52:56Z", - "pushed_at": "2019-11-06T15:48:18Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 2, - "forks": 2, - "watchers": 13, - "score": 0 - }, - { - "id": 220966609, - "name": "CVE-2019-11043", - "full_name": "k8gege\/CVE-2019-11043", - "owner": { - "login": "k8gege", - "id": 42312878, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4", - "html_url": "https:\/\/github.com\/k8gege" - }, - "html_url": "https:\/\/github.com\/k8gege\/CVE-2019-11043", - "description": "Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)", - "fork": false, - "created_at": "2019-11-11T11:29:54Z", - "updated_at": "2021-02-09T20:33:50Z", - "pushed_at": "2019-11-11T11:59:52Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 15, - "forks": 15, - "watchers": 16, - "score": 0 - }, - { - "id": 222200768, - "name": "CVE-2019-11043_env", - "full_name": "moniik\/CVE-2019-11043_env", - "owner": { - "login": "moniik", - "id": 40794673, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40794673?v=4", - "html_url": "https:\/\/github.com\/moniik" - }, - "html_url": "https:\/\/github.com\/moniik\/CVE-2019-11043_env", - "description": "remote debug environment for CLion", - "fork": false, - "created_at": "2019-11-17T05:16:02Z", - "updated_at": "2020-09-09T02:32:52Z", - "pushed_at": "2019-11-17T05:19:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 261416297, "name": "CVE-2019-11043", diff --git a/2019/CVE-2019-11157.json b/2019/CVE-2019-11157.json deleted file mode 100644 index ddb38ddeed..0000000000 --- a/2019/CVE-2019-11157.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 228203919, - "name": "v0ltpwn", - "full_name": "zkenjar\/v0ltpwn", - "owner": { - "login": "zkenjar", - "id": 9324632, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9324632?v=4", - "html_url": "https:\/\/github.com\/zkenjar" - }, - "html_url": "https:\/\/github.com\/zkenjar\/v0ltpwn", - "description": "Tool Suite for V0LTpwn (CVE-2019-11157). Code will be published soon.", - "fork": false, - "created_at": "2019-12-15T15:11:07Z", - "updated_at": "2021-03-10T06:19:44Z", - "pushed_at": "2019-12-16T22:32:06Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 4, - "forks": 4, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1132.json b/2019/CVE-2019-1132.json deleted file mode 100644 index f15af8ea79..0000000000 --- a/2019/CVE-2019-1132.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 198963113, - "name": "CVE-2019-1132", - "full_name": "Vlad-tri\/CVE-2019-1132", - "owner": { - "login": "Vlad-tri", - "id": 20975540, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20975540?v=4", - "html_url": "https:\/\/github.com\/Vlad-tri" - }, - "html_url": "https:\/\/github.com\/Vlad-tri\/CVE-2019-1132", - "description": "EoP POC for CVE-2019-1132", - "fork": false, - "created_at": "2019-07-26T06:51:28Z", - "updated_at": "2021-06-08T15:34:25Z", - "pushed_at": "2019-09-08T07:58:12Z", - "stargazers_count": 62, - "watchers_count": 62, - "forks_count": 36, - "forks": 36, - "watchers": 62, - "score": 0 - }, - { - "id": 199763019, - "name": "CVE-2019-1132", - "full_name": "petercc\/CVE-2019-1132", - "owner": { - "login": "petercc", - "id": 1819628, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1819628?v=4", - "html_url": "https:\/\/github.com\/petercc" - }, - "html_url": "https:\/\/github.com\/petercc\/CVE-2019-1132", - "description": "CVE-2019-1132", - "fork": false, - "created_at": "2019-07-31T02:30:28Z", - "updated_at": "2020-12-07T22:04:33Z", - "pushed_at": "2019-07-31T02:38:41Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 3, - "forks": 3, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json index 730446b154..7ffb18cc99 100644 --- a/2019/CVE-2019-11358.json +++ b/2019/CVE-2019-11358.json @@ -22,29 +22,6 @@ "watchers": 21, "score": 0 }, - { - "id": 197643691, - "name": "jquery-prototype-pollution-fix", - "full_name": "bitnesswise\/jquery-prototype-pollution-fix", - "owner": { - "login": "bitnesswise", - "id": 32780182, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32780182?v=4", - "html_url": "https:\/\/github.com\/bitnesswise" - }, - "html_url": "https:\/\/github.com\/bitnesswise\/jquery-prototype-pollution-fix", - "description": "A fix for CVE-2019-11358 (prototype pollution in jquery)", - "fork": false, - "created_at": "2019-07-18T19:15:33Z", - "updated_at": "2020-04-04T15:02:00Z", - "pushed_at": "2019-07-18T20:00:15Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, { "id": 255702097, "name": "snyk-js-jquery-565129", diff --git a/2019/CVE-2019-11477.json b/2019/CVE-2019-11477.json deleted file mode 100644 index 248ee9a4f3..0000000000 --- a/2019/CVE-2019-11477.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 198296662, - "name": "cve-2019-11477-poc", - "full_name": "sasqwatch\/cve-2019-11477-poc", - "owner": { - "login": "sasqwatch", - "id": 22352904, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22352904?v=4", - "html_url": "https:\/\/github.com\/sasqwatch" - }, - "html_url": "https:\/\/github.com\/sasqwatch\/cve-2019-11477-poc", - "description": null, - "fork": false, - "created_at": "2019-07-22T20:23:08Z", - "updated_at": "2020-06-28T07:56:08Z", - "pushed_at": "2019-07-21T15:56:43Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 3, - "forks": 3, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index 9b7845684b..edd468db5a 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -22,144 +22,6 @@ "watchers": 343, "score": 0 }, - { - "id": 203575464, - "name": "Pulse", - "full_name": "nuc13us\/Pulse", - "owner": { - "login": "nuc13us", - "id": 22916937, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22916937?v=4", - "html_url": "https:\/\/github.com\/nuc13us" - }, - "html_url": "https:\/\/github.com\/nuc13us\/Pulse", - "description": "Pulse Secure VPN CVE-2019-11510", - "fork": false, - "created_at": "2019-08-21T12:03:14Z", - "updated_at": "2020-10-19T12:40:24Z", - "pushed_at": "2019-08-21T12:03:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, - "score": 0 - }, - { - "id": 203747377, - "name": "CVE-2019-11510-poc", - "full_name": "imjdl\/CVE-2019-11510-poc", - "owner": { - "login": "imjdl", - "id": 31382943, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4", - "html_url": "https:\/\/github.com\/imjdl" - }, - "html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc", - "description": "Pulse Secure SSL VPN pre-auth file reading", - "fork": false, - "created_at": "2019-08-22T08:18:19Z", - "updated_at": "2021-04-27T16:37:20Z", - "pushed_at": "2019-08-26T19:33:43Z", - "stargazers_count": 50, - "watchers_count": 50, - "forks_count": 16, - "forks": 16, - "watchers": 50, - "score": 0 - }, - { - "id": 204579243, - "name": "CVE-2019-11510_poc", - "full_name": "es0\/CVE-2019-11510_poc", - "owner": { - "login": "es0", - "id": 10739380, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10739380?v=4", - "html_url": "https:\/\/github.com\/es0" - }, - "html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc", - "description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability", - "fork": false, - "created_at": "2019-08-26T23:30:15Z", - "updated_at": "2020-07-07T01:57:08Z", - "pushed_at": "2019-08-27T00:52:49Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 4, - "forks": 4, - "watchers": 4, - "score": 0 - }, - { - "id": 204608508, - "name": "http-pulse_ssl_vpn.nse", - "full_name": "r00tpgp\/http-pulse_ssl_vpn.nse", - "owner": { - "login": "r00tpgp", - "id": 29351179, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29351179?v=4", - "html_url": "https:\/\/github.com\/r00tpgp" - }, - "html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse", - "description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510", - "fork": false, - "created_at": "2019-08-27T03:04:19Z", - "updated_at": "2021-03-28T15:43:08Z", - "pushed_at": "2019-08-27T07:03:26Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 7, - "forks": 7, - "watchers": 16, - "score": 0 - }, - { - "id": 204666616, - "name": "CVE-2019-11510-1", - "full_name": "jas502n\/CVE-2019-11510-1", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1", - "description": "SSL VPN Rce", - "fork": false, - "created_at": "2019-08-27T09:21:10Z", - "updated_at": "2020-08-11T18:29:29Z", - "pushed_at": "2019-08-27T09:29:05Z", - "stargazers_count": 51, - "watchers_count": 51, - "forks_count": 20, - "forks": 20, - "watchers": 51, - "score": 0 - }, - { - "id": 205106127, - "name": "CVE-2019-11510", - "full_name": "jason3e7\/CVE-2019-11510", - "owner": { - "login": "jason3e7", - "id": 3059297, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3059297?v=4", - "html_url": "https:\/\/github.com\/jason3e7" - }, - "html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510", - "description": null, - "fork": false, - "created_at": "2019-08-29T07:27:57Z", - "updated_at": "2019-08-29T07:28:54Z", - "pushed_at": "2019-08-29T07:28:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 207348255, "name": "pwn-pulse", diff --git a/2019/CVE-2019-11539.json b/2019/CVE-2019-11539.json deleted file mode 100644 index 35fe2141c5..0000000000 --- a/2019/CVE-2019-11539.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 206321288, - "name": "CVE-2019-11539", - "full_name": "0xDezzy\/CVE-2019-11539", - "owner": { - "login": "0xDezzy", - "id": 4141697, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4141697?v=4", - "html_url": "https:\/\/github.com\/0xDezzy" - }, - "html_url": "https:\/\/github.com\/0xDezzy\/CVE-2019-11539", - "description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect", - "fork": false, - "created_at": "2019-09-04T13:06:02Z", - "updated_at": "2021-05-26T15:43:17Z", - "pushed_at": "2019-09-04T17:39:35Z", - "stargazers_count": 120, - "watchers_count": 120, - "forks_count": 37, - "forks": 37, - "watchers": 120, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11580.json b/2019/CVE-2019-11580.json index 444bb1cd71..33a6329eec 100644 --- a/2019/CVE-2019-11580.json +++ b/2019/CVE-2019-11580.json @@ -1,27 +1,4 @@ [ - { - "id": 197342430, - "name": "CVE-2019-11580", - "full_name": "jas502n\/CVE-2019-11580", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11580", - "description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE", - "fork": false, - "created_at": "2019-07-17T07:54:38Z", - "updated_at": "2021-05-28T12:48:10Z", - "pushed_at": "2019-07-18T10:03:28Z", - "stargazers_count": 86, - "watchers_count": 86, - "forks_count": 19, - "forks": 19, - "watchers": 86, - "score": 0 - }, { "id": 245476096, "name": "CVE-2019-11580", diff --git a/2019/CVE-2019-11581.json b/2019/CVE-2019-11581.json deleted file mode 100644 index b8bbf884fc..0000000000 --- a/2019/CVE-2019-11581.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 197105656, - "name": "CVE-2019-11581", - "full_name": "jas502n\/CVE-2019-11581", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11581", - "description": "Atlassian JIRA Template injection vulnerability RCE", - "fork": false, - "created_at": "2019-07-16T02:27:00Z", - "updated_at": "2021-04-11T18:04:38Z", - "pushed_at": "2019-07-22T06:47:52Z", - "stargazers_count": 78, - "watchers_count": 78, - "forks_count": 27, - "forks": 27, - "watchers": 78, - "score": 0 - }, - { - "id": 198763431, - "name": "CVE-2019-11581", - "full_name": "kobs0N\/CVE-2019-11581", - "owner": { - "login": "kobs0N", - "id": 23138815, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23138815?v=4", - "html_url": "https:\/\/github.com\/kobs0N" - }, - "html_url": "https:\/\/github.com\/kobs0N\/CVE-2019-11581", - "description": "CVE-2019–11581 PoC", - "fork": false, - "created_at": "2019-07-25T05:29:23Z", - "updated_at": "2020-12-02T09:58:53Z", - "pushed_at": "2019-12-13T13:03:39Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 3, - "forks": 3, - "watchers": 6, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11707.json b/2019/CVE-2019-11707.json index 906fe75f31..89ba5bde1c 100644 --- a/2019/CVE-2019-11707.json +++ b/2019/CVE-2019-11707.json @@ -1,27 +1,4 @@ [ - { - "id": 202974494, - "name": "CVE-2019-11707", - "full_name": "vigneshsrao\/CVE-2019-11707", - "owner": { - "login": "vigneshsrao", - "id": 20860267, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20860267?v=4", - "html_url": "https:\/\/github.com\/vigneshsrao" - }, - "html_url": "https:\/\/github.com\/vigneshsrao\/CVE-2019-11707", - "description": "Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu ", - "fork": false, - "created_at": "2019-08-18T07:41:01Z", - "updated_at": "2021-06-06T21:58:20Z", - "pushed_at": "2019-08-18T07:42:36Z", - "stargazers_count": 43, - "watchers_count": 43, - "forks_count": 10, - "forks": 10, - "watchers": 43, - "score": 0 - }, { "id": 255362000, "name": "cve-2019-11707", diff --git a/2019/CVE-2019-11730.json b/2019/CVE-2019-11730.json deleted file mode 100644 index 279c1730c7..0000000000 --- a/2019/CVE-2019-11730.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 229617717, - "name": "CVE-2019-11730", - "full_name": "alidnf\/CVE-2019-11730", - "owner": { - "login": "alidnf", - "id": 54067374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54067374?v=4", - "html_url": "https:\/\/github.com\/alidnf" - }, - "html_url": "https:\/\/github.com\/alidnf\/CVE-2019-11730", - "description": null, - "fork": false, - "created_at": "2019-12-22T19:14:05Z", - "updated_at": "2020-04-04T01:29:38Z", - "pushed_at": "2019-12-22T19:18:35Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 3, - "forks": 3, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1181.json b/2019/CVE-2019-1181.json deleted file mode 100644 index 858f267c02..0000000000 --- a/2019/CVE-2019-1181.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 202264461, - "name": "cve-2019-1181", - "full_name": "major203\/cve-2019-1181", - "owner": { - "login": "major203", - "id": 7425945, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7425945?v=4", - "html_url": "https:\/\/github.com\/major203" - }, - "html_url": "https:\/\/github.com\/major203\/cve-2019-1181", - "description": null, - "fork": false, - "created_at": "2019-08-14T03:07:02Z", - "updated_at": "2019-08-14T03:07:02Z", - "pushed_at": "2019-08-14T03:07:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11931.json b/2019/CVE-2019-11931.json deleted file mode 100644 index 9c6ff8e731..0000000000 --- a/2019/CVE-2019-11931.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 222086842, - "name": "whatsapp-rce-patched", - "full_name": "kasif-dekel\/whatsapp-rce-patched", - "owner": { - "login": "kasif-dekel", - "id": 5827021, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5827021?v=4", - "html_url": "https:\/\/github.com\/kasif-dekel" - }, - "html_url": "https:\/\/github.com\/kasif-dekel\/whatsapp-rce-patched", - "description": "cve-2019-11931", - "fork": false, - "created_at": "2019-11-16T11:06:52Z", - "updated_at": "2020-11-14T15:25:28Z", - "pushed_at": "2019-11-16T11:15:06Z", - "stargazers_count": 31, - "watchers_count": 31, - "forks_count": 15, - "forks": 15, - "watchers": 31, - "score": 0 - }, - { - "id": 223598650, - "name": "CVE-2019-11931", - "full_name": "nop-team\/CVE-2019-11931", - "owner": { - "login": "nop-team", - "id": 58111818, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58111818?v=4", - "html_url": "https:\/\/github.com\/nop-team" - }, - "html_url": "https:\/\/github.com\/nop-team\/CVE-2019-11931", - "description": null, - "fork": false, - "created_at": "2019-11-23T14:06:13Z", - "updated_at": "2019-11-23T14:06:17Z", - "pushed_at": "2019-11-23T14:06:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 3725d2fa5e..3721f64df4 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -45,121 +45,6 @@ "watchers": 71, "score": 0 }, - { - "id": 212837105, - "name": "CVE-2019-11932", - "full_name": "awakened1712\/CVE-2019-11932", - "owner": { - "login": "awakened1712", - "id": 628212, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628212?v=4", - "html_url": "https:\/\/github.com\/awakened1712" - }, - "html_url": "https:\/\/github.com\/awakened1712\/CVE-2019-11932", - "description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif", - "fork": false, - "created_at": "2019-10-04T14:43:57Z", - "updated_at": "2021-06-17T06:07:27Z", - "pushed_at": "2019-11-30T10:28:01Z", - "stargazers_count": 153, - "watchers_count": 153, - "forks_count": 82, - "forks": 82, - "watchers": 153, - "score": 0 - }, - { - "id": 212954402, - "name": "CVE-2019-11932", - "full_name": "TulungagungCyberLink\/CVE-2019-11932", - "owner": { - "login": "TulungagungCyberLink", - "id": 46483873, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46483873?v=4", - "html_url": "https:\/\/github.com\/TulungagungCyberLink" - }, - "html_url": "https:\/\/github.com\/TulungagungCyberLink\/CVE-2019-11932", - "description": "Double-Free BUG in WhatsApp exploit poc.", - "fork": false, - "created_at": "2019-10-05T06:24:08Z", - "updated_at": "2019-11-03T03:01:39Z", - "pushed_at": "2019-10-08T06:17:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, - { - "id": 213187543, - "name": "CVE-2019-11932", - "full_name": "infiniteLoopers\/CVE-2019-11932", - "owner": { - "login": "infiniteLoopers", - "id": 27885817, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27885817?v=4", - "html_url": "https:\/\/github.com\/infiniteLoopers" - }, - "html_url": "https:\/\/github.com\/infiniteLoopers\/CVE-2019-11932", - "description": null, - "fork": false, - "created_at": "2019-10-06T14:54:35Z", - "updated_at": "2019-10-18T20:41:54Z", - "pushed_at": "2019-10-06T15:34:22Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 3, - "forks": 3, - "watchers": 3, - "score": 0 - }, - { - "id": 214405727, - "name": "CVE-2019-11932", - "full_name": "5l1v3r1\/CVE-2019-11932", - "owner": { - "login": "5l1v3r1", - "id": 34143537, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4", - "html_url": "https:\/\/github.com\/5l1v3r1" - }, - "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2019-11932", - "description": "The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244", - "fork": false, - "created_at": "2019-10-11T10:14:10Z", - "updated_at": "2021-06-12T15:23:06Z", - "pushed_at": "2019-10-09T17:00:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 215516489, - "name": "CVE-2019-11932-SupportApp", - "full_name": "valbrux\/CVE-2019-11932-SupportApp", - "owner": { - "login": "valbrux", - "id": 20357515, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20357515?v=4", - "html_url": "https:\/\/github.com\/valbrux" - }, - "html_url": "https:\/\/github.com\/valbrux\/CVE-2019-11932-SupportApp", - "description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ", - "fork": false, - "created_at": "2019-10-16T10:04:30Z", - "updated_at": "2021-05-08T20:41:29Z", - "pushed_at": "2019-10-16T12:20:53Z", - "stargazers_count": 24, - "watchers_count": 24, - "forks_count": 14, - "forks": 14, - "watchers": 24, - "score": 0 - }, { "id": 215635890, "name": "CVE-2019-11932", @@ -183,52 +68,6 @@ "watchers": 4, "score": 0 }, - { - "id": 217001772, - "name": "CVE-2019-11932-whatsApp-exploit", - "full_name": "mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit", - "owner": { - "login": "mRanonyMousTZ", - "id": 38766899, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38766899?v=4", - "html_url": "https:\/\/github.com\/mRanonyMousTZ" - }, - "html_url": "https:\/\/github.com\/mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit", - "description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/", - "fork": false, - "created_at": "2019-10-23T08:02:15Z", - "updated_at": "2020-12-27T09:47:19Z", - "pushed_at": "2019-10-23T08:25:48Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 9, - "forks": 9, - "watchers": 8, - "score": 0 - }, - { - "id": 228222453, - "name": "CVE-2019-11932", - "full_name": "SmoZy92\/CVE-2019-11932", - "owner": { - "login": "SmoZy92", - "id": 58377338, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58377338?v=4", - "html_url": "https:\/\/github.com\/SmoZy92" - }, - "html_url": "https:\/\/github.com\/SmoZy92\/CVE-2019-11932", - "description": null, - "fork": false, - "created_at": "2019-12-15T17:21:26Z", - "updated_at": "2020-09-02T11:23:41Z", - "pushed_at": "2019-12-15T17:40:15Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 0, - "forks": 0, - "watchers": 6, - "score": 0 - }, { "id": 239654888, "name": "https-github.com-awakened171", diff --git a/2019/CVE-2019-12255.json b/2019/CVE-2019-12255.json deleted file mode 100644 index eab10027cc..0000000000 --- a/2019/CVE-2019-12255.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 221308311, - "name": "Urgent11-Suricata-LUA-scripts", - "full_name": "sud0woodo\/Urgent11-Suricata-LUA-scripts", - "owner": { - "login": "sud0woodo", - "id": 40278342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40278342?v=4", - "html_url": "https:\/\/github.com\/sud0woodo" - }, - "html_url": "https:\/\/github.com\/sud0woodo\/Urgent11-Suricata-LUA-scripts", - "description": "Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260", - "fork": false, - "created_at": "2019-11-12T20:43:46Z", - "updated_at": "2021-06-14T06:26:36Z", - "pushed_at": "2019-11-28T20:16:35Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 4, - "forks": 4, - "watchers": 15, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12272.json b/2019/CVE-2019-12272.json deleted file mode 100644 index 5fe27c8bf4..0000000000 --- a/2019/CVE-2019-12272.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 195171033, - "name": "LuCI_RCE_exp", - "full_name": "HACHp1\/LuCI_RCE_exp", - "owner": { - "login": "HACHp1", - "id": 25722416, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25722416?v=4", - "html_url": "https:\/\/github.com\/HACHp1" - }, - "html_url": "https:\/\/github.com\/HACHp1\/LuCI_RCE_exp", - "description": "Exp of cve-2019-12272", - "fork": false, - "created_at": "2019-07-04T04:54:36Z", - "updated_at": "2021-06-18T02:51:57Z", - "pushed_at": "2019-07-10T04:33:30Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 5, - "forks": 5, - "watchers": 16, - "score": 0 - }, - { - "id": 226418974, - "name": "lede-17.01.3", - "full_name": "roguedream\/lede-17.01.3", - "owner": { - "login": "roguedream", - "id": 15247135, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15247135?v=4", - "html_url": "https:\/\/github.com\/roguedream" - }, - "html_url": "https:\/\/github.com\/roguedream\/lede-17.01.3", - "description": "Version-contains-cve-2019-12272", - "fork": false, - "created_at": "2019-12-06T22:04:24Z", - "updated_at": "2019-12-06T22:19:00Z", - "pushed_at": "2019-12-06T22:18:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12314.json b/2019/CVE-2019-12314.json deleted file mode 100644 index 9698a91965..0000000000 --- a/2019/CVE-2019-12314.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 219755425, - "name": "CVE-2019-12314", - "full_name": "ras313\/CVE-2019-12314", - "owner": { - "login": "ras313", - "id": 57402076, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57402076?v=4", - "html_url": "https:\/\/github.com\/ras313" - }, - "html_url": "https:\/\/github.com\/ras313\/CVE-2019-12314", - "description": "Optional Mitigation Steps", - "fork": false, - "created_at": "2019-11-05T13:45:58Z", - "updated_at": "2019-11-05T13:53:04Z", - "pushed_at": "2019-11-05T13:51:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12384.json b/2019/CVE-2019-12384.json index 32d765df94..24a0ab76e5 100644 --- a/2019/CVE-2019-12384.json +++ b/2019/CVE-2019-12384.json @@ -1,27 +1,4 @@ [ - { - "id": 198579428, - "name": "CVE-2019-12384", - "full_name": "jas502n\/CVE-2019-12384", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12384", - "description": "Jackson Rce For CVE-2019-12384 ", - "fork": false, - "created_at": "2019-07-24T07:12:14Z", - "updated_at": "2021-06-02T08:06:54Z", - "pushed_at": "2019-07-24T07:31:42Z", - "stargazers_count": 92, - "watchers_count": 92, - "forks_count": 24, - "forks": 24, - "watchers": 92, - "score": 0 - }, { "id": 198939305, "name": "Jackson_RCE-CVE-2019-12384", diff --git a/2019/CVE-2019-12409.json b/2019/CVE-2019-12409.json deleted file mode 100644 index e59c3ba0a0..0000000000 --- a/2019/CVE-2019-12409.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 222651199, - "name": "CVE-2019-12409", - "full_name": "jas502n\/CVE-2019-12409", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12409", - "description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")", - "fork": false, - "created_at": "2019-11-19T08:53:56Z", - "updated_at": "2021-04-27T02:35:39Z", - "pushed_at": "2019-11-19T09:18:00Z", - "stargazers_count": 96, - "watchers_count": 96, - "forks_count": 32, - "forks": 32, - "watchers": 96, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12453.json b/2019/CVE-2019-12453.json deleted file mode 100644 index aba5491134..0000000000 --- a/2019/CVE-2019-12453.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 197012907, - "name": "CVE-2019-12453", - "full_name": "undefinedmode\/CVE-2019-12453", - "owner": { - "login": "undefinedmode", - "id": 4165481, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4165481?v=4", - "html_url": "https:\/\/github.com\/undefinedmode" - }, - "html_url": "https:\/\/github.com\/undefinedmode\/CVE-2019-12453", - "description": "Authenticated XSS in Microstrategy Web - Versions prior to 10.1 patch 10", - "fork": false, - "created_at": "2019-07-15T14:17:10Z", - "updated_at": "2019-07-15T14:44:49Z", - "pushed_at": "2019-07-15T14:44:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12475.json b/2019/CVE-2019-12475.json deleted file mode 100644 index 0d65b20bb3..0000000000 --- a/2019/CVE-2019-12475.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 197017455, - "name": "CVE-2019-12475", - "full_name": "undefinedmode\/CVE-2019-12475", - "owner": { - "login": "undefinedmode", - "id": 4165481, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4165481?v=4", - "html_url": "https:\/\/github.com\/undefinedmode" - }, - "html_url": "https:\/\/github.com\/undefinedmode\/CVE-2019-12475", - "description": "Stored XSS in MicroStrategy Web prior to 10.4.6", - "fork": false, - "created_at": "2019-07-15T14:42:53Z", - "updated_at": "2019-07-15T14:47:02Z", - "pushed_at": "2019-07-15T14:47:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1253.json b/2019/CVE-2019-1253.json index 362f86065e..7758b5d5ed 100644 --- a/2019/CVE-2019-1253.json +++ b/2019/CVE-2019-1253.json @@ -21,74 +21,5 @@ "forks": 18, "watchers": 50, "score": 0 - }, - { - "id": 207780184, - "name": "CVE-2019-1253", - "full_name": "likescam\/CVE-2019-1253", - "owner": { - "login": "likescam", - "id": 2469038, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", - "html_url": "https:\/\/github.com\/likescam" - }, - "html_url": "https:\/\/github.com\/likescam\/CVE-2019-1253", - "description": null, - "fork": false, - "created_at": "2019-09-11T09:59:22Z", - "updated_at": "2020-11-26T04:16:55Z", - "pushed_at": "2019-09-11T09:59:42Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 207902814, - "name": "CVE-2019-1253", - "full_name": "padovah4ck\/CVE-2019-1253", - "owner": { - "login": "padovah4ck", - "id": 13963076, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13963076?v=4", - "html_url": "https:\/\/github.com\/padovah4ck" - }, - "html_url": "https:\/\/github.com\/padovah4ck\/CVE-2019-1253", - "description": "Poc for CVE-2019-1253", - "fork": false, - "created_at": "2019-09-11T20:40:15Z", - "updated_at": "2021-06-18T03:29:55Z", - "pushed_at": "2019-09-12T14:43:47Z", - "stargazers_count": 139, - "watchers_count": 139, - "forks_count": 40, - "forks": 40, - "watchers": 139, - "score": 0 - }, - { - "id": 207924388, - "name": "CVE-2019-1253", - "full_name": "sgabe\/CVE-2019-1253", - "owner": { - "login": "sgabe", - "id": 5206619, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5206619?v=4", - "html_url": "https:\/\/github.com\/sgabe" - }, - "html_url": "https:\/\/github.com\/sgabe\/CVE-2019-1253", - "description": "AppXSvc Arbitrary File Security Descriptor Overwrite EoP", - "fork": false, - "created_at": "2019-09-11T23:28:59Z", - "updated_at": "2020-12-25T20:06:24Z", - "pushed_at": "2019-09-15T17:09:51Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 4, - "forks": 4, - "watchers": 17, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-12562.json b/2019/CVE-2019-12562.json deleted file mode 100644 index 1b985d6e49..0000000000 --- a/2019/CVE-2019-12562.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 212626761, - "name": "CVE-2019-12562", - "full_name": "MAYASEVEN\/CVE-2019-12562", - "owner": { - "login": "MAYASEVEN", - "id": 1219852, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1219852?v=4", - "html_url": "https:\/\/github.com\/MAYASEVEN" - }, - "html_url": "https:\/\/github.com\/MAYASEVEN\/CVE-2019-12562", - "description": "Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 | XSS to RCE", - "fork": false, - "created_at": "2019-10-03T16:29:58Z", - "updated_at": "2020-07-12T12:12:02Z", - "pushed_at": "2019-10-03T17:28:50Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 2, - "forks": 2, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json deleted file mode 100644 index 4372e42b3e..0000000000 --- a/2019/CVE-2019-12586.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 206106300, - "name": "esp32_esp8266_attacks", - "full_name": "Matheus-Garbelini\/esp32_esp8266_attacks", - "owner": { - "login": "Matheus-Garbelini", - "id": 6465668, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6465668?v=4", - "html_url": "https:\/\/github.com\/Matheus-Garbelini" - }, - "html_url": "https:\/\/github.com\/Matheus-Garbelini\/esp32_esp8266_attacks", - "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)", - "fork": false, - "created_at": "2019-09-03T15:08:49Z", - "updated_at": "2021-06-12T06:33:37Z", - "pushed_at": "2019-09-08T06:09:11Z", - "stargazers_count": 693, - "watchers_count": 693, - "forks_count": 60, - "forks": 60, - "watchers": 693, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12750.json b/2019/CVE-2019-12750.json deleted file mode 100644 index b6cafd8f64..0000000000 --- a/2019/CVE-2019-12750.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 229357043, - "name": "cve-2019-12750", - "full_name": "v-p-b\/cve-2019-12750", - "owner": { - "login": "v-p-b", - "id": 540246, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/540246?v=4", - "html_url": "https:\/\/github.com\/v-p-b" - }, - "html_url": "https:\/\/github.com\/v-p-b\/cve-2019-12750", - "description": "sploit", - "fork": false, - "created_at": "2019-12-21T00:44:25Z", - "updated_at": "2021-03-28T14:34:44Z", - "pushed_at": "2019-12-21T00:56:27Z", - "stargazers_count": 68, - "watchers_count": 68, - "forks_count": 15, - "forks": 15, - "watchers": 68, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12815.json b/2019/CVE-2019-12815.json index a723ceb1c8..059347d03c 100644 --- a/2019/CVE-2019-12815.json +++ b/2019/CVE-2019-12815.json @@ -1,27 +1,4 @@ [ - { - "id": 199214840, - "name": "CVE-2019-12815", - "full_name": "KTN1990\/CVE-2019-12815", - "owner": { - "login": "KTN1990", - "id": 33407405, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4", - "html_url": "https:\/\/github.com\/KTN1990" - }, - "html_url": "https:\/\/github.com\/KTN1990\/CVE-2019-12815", - "description": "ProFTPd mod_copy - arbitrary file copy without authentication", - "fork": false, - "created_at": "2019-07-27T21:26:06Z", - "updated_at": "2020-09-06T05:30:02Z", - "pushed_at": "2019-09-24T02:06:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 6, - "forks": 6, - "watchers": 2, - "score": 0 - }, { "id": 290230078, "name": "proftpd-cve-2019-12815", diff --git a/2019/CVE-2019-12840.json b/2019/CVE-2019-12840.json index 3c3499febb..6592383d84 100644 --- a/2019/CVE-2019-12840.json +++ b/2019/CVE-2019-12840.json @@ -1,50 +1,4 @@ [ - { - "id": 219832922, - "name": "CVE-2019-12840_POC", - "full_name": "bkaraceylan\/CVE-2019-12840_POC", - "owner": { - "login": "bkaraceylan", - "id": 22098635, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22098635?v=4", - "html_url": "https:\/\/github.com\/bkaraceylan" - }, - "html_url": "https:\/\/github.com\/bkaraceylan\/CVE-2019-12840_POC", - "description": "PoC for Webmin Package Update Authenticated Remote Command Execution", - "fork": false, - "created_at": "2019-11-05T19:22:45Z", - "updated_at": "2020-07-09T08:26:39Z", - "pushed_at": "2019-11-05T19:27:31Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - }, - { - "id": 220680650, - "name": "webmin_cve-2019-12840_poc", - "full_name": "KrE80r\/webmin_cve-2019-12840_poc", - "owner": { - "login": "KrE80r", - "id": 13027962, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13027962?v=4", - "html_url": "https:\/\/github.com\/KrE80r" - }, - "html_url": "https:\/\/github.com\/KrE80r\/webmin_cve-2019-12840_poc", - "description": "A standalone POC for CVE-2019-12840", - "fork": false, - "created_at": "2019-11-09T17:48:39Z", - "updated_at": "2021-03-19T02:36:25Z", - "pushed_at": "2019-11-10T13:26:41Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - }, { "id": 323973616, "name": "webminscan", diff --git a/2019/CVE-2019-12889.json b/2019/CVE-2019-12889.json deleted file mode 100644 index 0c785809d6..0000000000 --- a/2019/CVE-2019-12889.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 196251116, - "name": "CVE-2019-12889", - "full_name": "nulsect0r\/CVE-2019-12889", - "owner": { - "login": "nulsect0r", - "id": 52004761, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52004761?v=4", - "html_url": "https:\/\/github.com\/nulsect0r" - }, - "html_url": "https:\/\/github.com\/nulsect0r\/CVE-2019-12889", - "description": null, - "fork": false, - "created_at": "2019-07-10T17:49:51Z", - "updated_at": "2019-08-12T15:14:04Z", - "pushed_at": "2019-08-12T15:14:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12890.json b/2019/CVE-2019-12890.json deleted file mode 100644 index f1da8c0c41..0000000000 --- a/2019/CVE-2019-12890.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 221921802, - "name": "CVE-2019-12890_RedxploitHQ", - "full_name": "EthicalHCOP\/CVE-2019-12890_RedxploitHQ", - "owner": { - "login": "EthicalHCOP", - "id": 33833733, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33833733?v=4", - "html_url": "https:\/\/github.com\/EthicalHCOP" - }, - "html_url": "https:\/\/github.com\/EthicalHCOP\/CVE-2019-12890_RedxploitHQ", - "description": "Use RedxploitHQ to create a new Admin user into redwoodhq and get all the functions on the framework", - "fork": false, - "created_at": "2019-11-15T12:41:19Z", - "updated_at": "2020-12-30T14:24:42Z", - "pushed_at": "2019-11-15T13:02:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12999.json b/2019/CVE-2019-12999.json deleted file mode 100644 index 1ad4d7fcc6..0000000000 --- a/2019/CVE-2019-12999.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 211231317, - "name": "chanleakcheck", - "full_name": "lightninglabs\/chanleakcheck", - "owner": { - "login": "lightninglabs", - "id": 24724349, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24724349?v=4", - "html_url": "https:\/\/github.com\/lightninglabs" - }, - "html_url": "https:\/\/github.com\/lightninglabs\/chanleakcheck", - "description": "A tool to check if your lnd node was targeted by CVE-2019-12999", - "fork": false, - "created_at": "2019-09-27T03:47:09Z", - "updated_at": "2021-01-11T17:27:22Z", - "pushed_at": "2019-09-27T21:08:41Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 1, - "forks": 1, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13000.json b/2019/CVE-2019-13000.json deleted file mode 100644 index 0c3221c234..0000000000 --- a/2019/CVE-2019-13000.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 211268436, - "name": "detection-tool-cve-2019-13000", - "full_name": "ACINQ\/detection-tool-cve-2019-13000", - "owner": { - "login": "ACINQ", - "id": 7670721, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7670721?v=4", - "html_url": "https:\/\/github.com\/ACINQ" - }, - "html_url": "https:\/\/github.com\/ACINQ\/detection-tool-cve-2019-13000", - "description": "A tool that detect if your node has been victim of the invalid funding tx attack.", - "fork": false, - "created_at": "2019-09-27T08:07:07Z", - "updated_at": "2019-09-27T15:02:33Z", - "pushed_at": "2019-09-27T13:44:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13024.json b/2019/CVE-2019-13024.json deleted file mode 100644 index b9c2507ee8..0000000000 --- a/2019/CVE-2019-13024.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 204202778, - "name": "CVE-2019-13024", - "full_name": "mhaskar\/CVE-2019-13024", - "owner": { - "login": "mhaskar", - "id": 6861215, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4", - "html_url": "https:\/\/github.com\/mhaskar" - }, - "html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-13024", - "description": "The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024", - "fork": false, - "created_at": "2019-08-24T19:26:19Z", - "updated_at": "2021-04-09T07:14:45Z", - "pushed_at": "2019-08-24T19:27:24Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 5, - "forks": 5, - "watchers": 10, - "score": 0 - }, - { - "id": 220509225, - "name": "Centreon-RCE", - "full_name": "get-get-get-get\/Centreon-RCE", - "owner": { - "login": "get-get-get-get", - "id": 51015518, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51015518?v=4", - "html_url": "https:\/\/github.com\/get-get-get-get" - }, - "html_url": "https:\/\/github.com\/get-get-get-get\/Centreon-RCE", - "description": "Centreon v.19.04 Remote Code Execution exploit (CVE-2019-13024)", - "fork": false, - "created_at": "2019-11-08T16:46:13Z", - "updated_at": "2019-11-25T03:44:16Z", - "pushed_at": "2019-11-08T17:39:34Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13025.json b/2019/CVE-2019-13025.json deleted file mode 100644 index a1db253c0e..0000000000 --- a/2019/CVE-2019-13025.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 212197607, - "name": "CVE-2019-13025", - "full_name": "x1tan\/CVE-2019-13025", - "owner": { - "login": "x1tan", - "id": 5700584, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5700584?v=4", - "html_url": "https:\/\/github.com\/x1tan" - }, - "html_url": "https:\/\/github.com\/x1tan\/CVE-2019-13025", - "description": "Connect Box CH7465LG (CVE-2019-13025)", - "fork": false, - "created_at": "2019-10-01T20:53:47Z", - "updated_at": "2021-04-27T03:21:23Z", - "pushed_at": "2021-06-02T21:00:50Z", - "stargazers_count": 32, - "watchers_count": 32, - "forks_count": 6, - "forks": 6, - "watchers": 32, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13027.json b/2019/CVE-2019-13027.json deleted file mode 100644 index e291095235..0000000000 --- a/2019/CVE-2019-13027.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 195768661, - "name": "CVE-2019-13027", - "full_name": "IckoGZ\/CVE-2019-13027", - "owner": { - "login": "IckoGZ", - "id": 52542268, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52542268?v=4", - "html_url": "https:\/\/github.com\/IckoGZ" - }, - "html_url": "https:\/\/github.com\/IckoGZ\/CVE-2019-13027", - "description": "Details for disclosing CVE-2019-13027", - "fork": false, - "created_at": "2019-07-08T08:25:07Z", - "updated_at": "2019-07-11T08:33:11Z", - "pushed_at": "2019-07-11T08:33:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13051.json b/2019/CVE-2019-13051.json deleted file mode 100644 index 1f54951f24..0000000000 --- a/2019/CVE-2019-13051.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 216841467, - "name": "CVE-2019-13051", - "full_name": "pr0tean\/CVE-2019-13051", - "owner": { - "login": "pr0tean", - "id": 52039659, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52039659?v=4", - "html_url": "https:\/\/github.com\/pr0tean" - }, - "html_url": "https:\/\/github.com\/pr0tean\/CVE-2019-13051", - "description": null, - "fork": false, - "created_at": "2019-10-22T15:00:48Z", - "updated_at": "2021-05-16T20:12:07Z", - "pushed_at": "2019-10-22T15:03:34Z", - "stargazers_count": 21, - "watchers_count": 21, - "forks_count": 4, - "forks": 4, - "watchers": 21, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13063.json b/2019/CVE-2019-13063.json deleted file mode 100644 index 035005a8a8..0000000000 --- a/2019/CVE-2019-13063.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 196970646, - "name": "CVE-2019-13063-POC", - "full_name": "0x6b7966\/CVE-2019-13063-POC", - "owner": { - "login": "0x6b7966", - "id": 22814832, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22814832?v=4", - "html_url": "https:\/\/github.com\/0x6b7966" - }, - "html_url": "https:\/\/github.com\/0x6b7966\/CVE-2019-13063-POC", - "description": "Proof of concept tool to exploit the directory traversal and local file inclusion vulnerability that resides in the Sahi-pro web application CVE-2019-13063", - "fork": false, - "created_at": "2019-07-15T09:45:36Z", - "updated_at": "2019-08-18T02:47:49Z", - "pushed_at": "2019-07-01T19:16:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13101.json b/2019/CVE-2019-13101.json deleted file mode 100644 index fd421137ef..0000000000 --- a/2019/CVE-2019-13101.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 202451022, - "name": "dlkploit600", - "full_name": "halencarjunior\/dlkploit600", - "owner": { - "login": "halencarjunior", - "id": 403088, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4", - "html_url": "https:\/\/github.com\/halencarjunior" - }, - "html_url": "https:\/\/github.com\/halencarjunior\/dlkploit600", - "description": "Simple Python script for D-Link vulnerability scan and test [CVE-2019-13101]", - "fork": false, - "created_at": "2019-08-15T01:20:45Z", - "updated_at": "2019-08-15T15:17:18Z", - "pushed_at": "2019-08-15T15:17:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13115.json b/2019/CVE-2019-13115.json index f9a2fccf9c..cd27372740 100644 --- a/2019/CVE-2019-13115.json +++ b/2019/CVE-2019-13115.json @@ -21,28 +21,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 212644372, - "name": "libssh2-Exploit", - "full_name": "CSSProject\/libssh2-Exploit", - "owner": { - "login": "CSSProject", - "id": 56131742, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56131742?v=4", - "html_url": "https:\/\/github.com\/CSSProject" - }, - "html_url": "https:\/\/github.com\/CSSProject\/libssh2-Exploit", - "description": "Create an exploit to libssh2 vulnerabulity described in CVE-2019-13115", - "fork": false, - "created_at": "2019-10-03T17:58:03Z", - "updated_at": "2019-10-03T17:59:45Z", - "pushed_at": "2019-10-03T17:59:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-13143.json b/2019/CVE-2019-13143.json deleted file mode 100644 index 95dc5957dc..0000000000 --- a/2019/CVE-2019-13143.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 200684724, - "name": "pwnfb50", - "full_name": "securelayer7\/pwnfb50", - "owner": { - "login": "securelayer7", - "id": 14994455, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14994455?v=4", - "html_url": "https:\/\/github.com\/securelayer7" - }, - "html_url": "https:\/\/github.com\/securelayer7\/pwnfb50", - "description": ":unlock: transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)", - "fork": false, - "created_at": "2019-08-05T15:45:02Z", - "updated_at": "2020-12-20T09:40:47Z", - "pushed_at": "2019-08-07T13:06:15Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 4, - "forks": 4, - "watchers": 14, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1315.json b/2019/CVE-2019-1315.json deleted file mode 100644 index a1a4c1195e..0000000000 --- a/2019/CVE-2019-1315.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 218240051, - "name": "CVE-2019-1315", - "full_name": "Mayter\/CVE-2019-1315", - "owner": { - "login": "Mayter", - "id": 6148807, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6148807?v=4", - "html_url": "https:\/\/github.com\/Mayter" - }, - "html_url": "https:\/\/github.com\/Mayter\/CVE-2019-1315", - "description": null, - "fork": false, - "created_at": "2019-10-29T08:36:25Z", - "updated_at": "2020-10-14T20:51:43Z", - "pushed_at": "2019-10-29T08:46:08Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 2, - "forks": 2, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index 8f148846e5..346ef06c28 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -1,119 +1,4 @@ [ - { - "id": 199781061, - "name": "CVE-2019-13272", - "full_name": "jas502n\/CVE-2019-13272", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272", - "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", - "fork": false, - "created_at": "2019-07-31T04:51:43Z", - "updated_at": "2021-05-25T22:32:25Z", - "pushed_at": "2019-08-01T16:02:59Z", - "stargazers_count": 256, - "watchers_count": 256, - "forks_count": 96, - "forks": 96, - "watchers": 256, - "score": 0 - }, - { - "id": 199794841, - "name": "CVE-2019-13272", - "full_name": "Cyc1eC\/CVE-2019-13272", - "owner": { - "login": "Cyc1eC", - "id": 26767829, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767829?v=4", - "html_url": "https:\/\/github.com\/Cyc1eC" - }, - "html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272", - "description": "The exploit for CVE-2019-13272", - "fork": false, - "created_at": "2019-07-31T06:36:21Z", - "updated_at": "2020-12-14T12:01:59Z", - "pushed_at": "2019-07-31T07:05:04Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 6, - "forks": 6, - "watchers": 4, - "score": 0 - }, - { - "id": 200459882, - "name": "cve-2019-13272", - "full_name": "bigbigliang-malwarebenchmark\/cve-2019-13272", - "owner": { - "login": "bigbigliang-malwarebenchmark", - "id": 45776349, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45776349?v=4", - "html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark" - }, - "html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark\/cve-2019-13272", - "description": "提权漏洞", - "fork": false, - "created_at": "2019-08-04T06:51:36Z", - "updated_at": "2019-09-12T15:32:19Z", - "pushed_at": "2019-08-04T07:06:47Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 200948343, - "name": "CVE-2019-13272", - "full_name": "oneoy\/CVE-2019-13272", - "owner": { - "login": "oneoy", - "id": 38435398, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4", - "html_url": "https:\/\/github.com\/oneoy" - }, - "html_url": "https:\/\/github.com\/oneoy\/CVE-2019-13272", - "description": "linux 提权", - "fork": false, - "created_at": "2019-08-07T01:21:26Z", - "updated_at": "2020-03-25T06:34:45Z", - "pushed_at": "2019-08-07T01:21:38Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 4, - "forks": 4, - "watchers": 3, - "score": 0 - }, - { - "id": 209440455, - "name": "CVE-2019-13272", - "full_name": "Huandtx\/CVE-2019-13272", - "owner": { - "login": "Huandtx", - "id": 44591522, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44591522?v=4", - "html_url": "https:\/\/github.com\/Huandtx" - }, - "html_url": "https:\/\/github.com\/Huandtx\/CVE-2019-13272", - "description": "5.1.17之前的Linux内核中普通用户执行文件提权为root用户", - "fork": false, - "created_at": "2019-09-19T01:58:35Z", - "updated_at": "2021-01-04T12:16:18Z", - "pushed_at": "2019-09-19T02:09:28Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 245129315, "name": "CVE-2019-13272", diff --git a/2019/CVE-2019-13361.json b/2019/CVE-2019-13361.json deleted file mode 100644 index ce6774ae67..0000000000 --- a/2019/CVE-2019-13361.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 201811193, - "name": "CVE-2019-13361", - "full_name": "lodi-g\/CVE-2019-13361", - "owner": { - "login": "lodi-g", - "id": 4528943, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4528943?v=4", - "html_url": "https:\/\/github.com\/lodi-g" - }, - "html_url": "https:\/\/github.com\/lodi-g\/CVE-2019-13361", - "description": "Smanos W100 1.0.0 devices have Insecure Permissions, exploitable by an attacker on the same Wi-Fi network.", - "fork": false, - "created_at": "2019-08-11T20:21:07Z", - "updated_at": "2019-08-11T20:36:22Z", - "pushed_at": "2019-08-11T20:35:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13403.json b/2019/CVE-2019-13403.json deleted file mode 100644 index 85719eacf6..0000000000 --- a/2019/CVE-2019-13403.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 196799368, - "name": "CVE-2019-13403", - "full_name": "B3Bo1d\/CVE-2019-13403", - "owner": { - "login": "B3Bo1d", - "id": 19810607, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19810607?v=4", - "html_url": "https:\/\/github.com\/B3Bo1d" - }, - "html_url": "https:\/\/github.com\/B3Bo1d\/CVE-2019-13403", - "description": "CVE-2019-13403", - "fork": false, - "created_at": "2019-07-14T05:52:01Z", - "updated_at": "2019-07-14T06:10:02Z", - "pushed_at": "2019-07-14T06:10:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13496.json b/2019/CVE-2019-13496.json deleted file mode 100644 index dcc3334119..0000000000 --- a/2019/CVE-2019-13496.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 219145624, - "name": "CVE-2019-13496", - "full_name": "FurqanKhan1\/CVE-2019-13496", - "owner": { - "login": "FurqanKhan1", - "id": 15893015, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15893015?v=4", - "html_url": "https:\/\/github.com\/FurqanKhan1" - }, - "html_url": "https:\/\/github.com\/FurqanKhan1\/CVE-2019-13496", - "description": null, - "fork": false, - "created_at": "2019-11-02T11:41:25Z", - "updated_at": "2019-12-18T14:03:06Z", - "pushed_at": "2019-11-10T20:59:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13497.json b/2019/CVE-2019-13497.json deleted file mode 100644 index 3b7b8d0d36..0000000000 --- a/2019/CVE-2019-13497.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 219150734, - "name": "CVE-2019-13497", - "full_name": "FurqanKhan1\/CVE-2019-13497", - "owner": { - "login": "FurqanKhan1", - "id": 15893015, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15893015?v=4", - "html_url": "https:\/\/github.com\/FurqanKhan1" - }, - "html_url": "https:\/\/github.com\/FurqanKhan1\/CVE-2019-13497", - "description": null, - "fork": false, - "created_at": "2019-11-02T12:29:26Z", - "updated_at": "2019-12-18T14:03:04Z", - "pushed_at": "2019-11-02T12:38:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13498.json b/2019/CVE-2019-13498.json deleted file mode 100644 index e4b58d04da..0000000000 --- a/2019/CVE-2019-13498.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 200299320, - "name": "CVE-2019-13498", - "full_name": "FurqanKhan1\/CVE-2019-13498", - "owner": { - "login": "FurqanKhan1", - "id": 15893015, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15893015?v=4", - "html_url": "https:\/\/github.com\/FurqanKhan1" - }, - "html_url": "https:\/\/github.com\/FurqanKhan1\/CVE-2019-13498", - "description": "CVE-2019-13498", - "fork": false, - "created_at": "2019-08-02T21:22:23Z", - "updated_at": "2020-09-01T12:37:31Z", - "pushed_at": "2019-11-10T20:58:40Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 1, - "forks": 1, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13504.json b/2019/CVE-2019-13504.json deleted file mode 100644 index 928a79fbe0..0000000000 --- a/2019/CVE-2019-13504.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 207112945, - "name": "fuzzenv-exiv2", - "full_name": "hazedic\/fuzzenv-exiv2", - "owner": { - "login": "hazedic", - "id": 13882826, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13882826?v=4", - "html_url": "https:\/\/github.com\/hazedic" - }, - "html_url": "https:\/\/github.com\/hazedic\/fuzzenv-exiv2", - "description": "https:\/\/fuzzit.dev\/2019\/07\/11\/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing\/", - "fork": false, - "created_at": "2019-09-08T12:58:45Z", - "updated_at": "2019-09-08T13:00:07Z", - "pushed_at": "2019-09-08T12:59:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13574.json b/2019/CVE-2019-13574.json deleted file mode 100644 index 2c21b56f44..0000000000 --- a/2019/CVE-2019-13574.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 197141535, - "name": "CVE-2019-13574", - "full_name": "masahiro331\/CVE-2019-13574", - "owner": { - "login": "masahiro331", - "id": 20438853, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4", - "html_url": "https:\/\/github.com\/masahiro331" - }, - "html_url": "https:\/\/github.com\/masahiro331\/CVE-2019-13574", - "description": null, - "fork": false, - "created_at": "2019-07-16T07:17:57Z", - "updated_at": "2020-06-06T08:27:22Z", - "pushed_at": "2019-11-01T15:33:30Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1367.json b/2019/CVE-2019-1367.json deleted file mode 100644 index 8edc3c960e..0000000000 --- a/2019/CVE-2019-1367.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 210525167, - "name": "CVE-2019-1367", - "full_name": "mandarenmanman\/CVE-2019-1367", - "owner": { - "login": "mandarenmanman", - "id": 11764268, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11764268?v=4", - "html_url": "https:\/\/github.com\/mandarenmanman" - }, - "html_url": "https:\/\/github.com\/mandarenmanman\/CVE-2019-1367", - "description": "CVE-2019-1367", - "fork": false, - "created_at": "2019-09-24T06:11:10Z", - "updated_at": "2019-10-15T06:44:17Z", - "pushed_at": "2019-09-24T06:13:32Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13720.json b/2019/CVE-2019-13720.json index 1027530891..2cc1d5706d 100644 --- a/2019/CVE-2019-13720.json +++ b/2019/CVE-2019-13720.json @@ -1,27 +1,4 @@ [ - { - "id": 219498737, - "name": "cve-2019-13720", - "full_name": "cve-2019-13720\/cve-2019-13720", - "owner": { - "login": "cve-2019-13720", - "id": 57355337, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57355337?v=4", - "html_url": "https:\/\/github.com\/cve-2019-13720" - }, - "html_url": "https:\/\/github.com\/cve-2019-13720\/cve-2019-13720", - "description": "POC for CVE-2019-13720", - "fork": false, - "created_at": "2019-11-04T12:40:28Z", - "updated_at": "2019-11-10T00:08:30Z", - "pushed_at": "2019-11-04T19:40:31Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, { "id": 249014343, "name": "CVE-2019-13720", diff --git a/2019/CVE-2019-1385.json b/2019/CVE-2019-1385.json deleted file mode 100644 index 07b790e8eb..0000000000 --- a/2019/CVE-2019-1385.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 230090155, - "name": "CVE-2019-1385", - "full_name": "klinix5\/CVE-2019-1385", - "owner": { - "login": "klinix5", - "id": 53986347, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53986347?v=4", - "html_url": "https:\/\/github.com\/klinix5" - }, - "html_url": "https:\/\/github.com\/klinix5\/CVE-2019-1385", - "description": "Enjoy hacking ;)", - "fork": false, - "created_at": "2019-12-25T11:03:52Z", - "updated_at": "2021-01-04T19:28:17Z", - "pushed_at": "2019-12-25T11:20:19Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 4, - "forks": 4, - "watchers": 4, - "score": 0 - }, - { - "id": 269204367, - "name": "CVE-2019-1385", - "full_name": "0x413x4\/CVE-2019-1385", - "owner": { - "login": "0x413x4", - "id": 11176964, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11176964?v=4", - "html_url": "https:\/\/github.com\/0x413x4" - }, - "html_url": "https:\/\/github.com\/0x413x4\/CVE-2019-1385", - "description": "Enjoy hacking ;)", - "fork": false, - "created_at": "2020-06-03T22:06:49Z", - "updated_at": "2020-07-15T19:44:52Z", - "pushed_at": "2019-12-25T11:20:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index 63ca7792c3..bd9bfe5274 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -1,50 +1,4 @@ [ - { - "id": 223103877, - "name": "CVE-2019-1388", - "full_name": "jas502n\/CVE-2019-1388", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-1388", - "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", - "fork": false, - "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2021-06-18T03:27:32Z", - "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 108, - "watchers_count": 108, - "forks_count": 39, - "forks": 39, - "watchers": 108, - "score": 0 - }, - { - "id": 223127146, - "name": "CVE-2019-1388", - "full_name": "jaychouzzk\/CVE-2019-1388", - "owner": { - "login": "jaychouzzk", - "id": 45549315, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45549315?v=4", - "html_url": "https:\/\/github.com\/jaychouzzk" - }, - "html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-1388", - "description": null, - "fork": false, - "created_at": "2019-11-21T08:38:38Z", - "updated_at": "2020-09-06T01:30:25Z", - "pushed_at": "2019-11-21T08:41:23Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - }, { "id": 224330054, "name": "CVE-2019-1388", diff --git a/2019/CVE-2019-1402.json b/2019/CVE-2019-1402.json deleted file mode 100644 index b358cfca68..0000000000 --- a/2019/CVE-2019-1402.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 221768702, - "name": "CorruptQueryAccessWorkaround", - "full_name": "lauxjpn\/CorruptQueryAccessWorkaround", - "owner": { - "login": "lauxjpn", - "id": 14178357, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14178357?v=4", - "html_url": "https:\/\/github.com\/lauxjpn" - }, - "html_url": "https:\/\/github.com\/lauxjpn\/CorruptQueryAccessWorkaround", - "description": "The latest workaround for the \"Query is corrupt\" error introduced with CVE-2019-1402", - "fork": false, - "created_at": "2019-11-14T19:11:27Z", - "updated_at": "2021-04-08T14:00:28Z", - "pushed_at": "2019-12-10T18:51:25Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json deleted file mode 100644 index fc41b2386e..0000000000 --- a/2019/CVE-2019-1405.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 221504958, - "name": "COMahawk", - "full_name": "apt69\/COMahawk", - "owner": { - "login": "apt69", - "id": 55776655, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55776655?v=4", - "html_url": "https:\/\/github.com\/apt69" - }, - "html_url": "https:\/\/github.com\/apt69\/COMahawk", - "description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322", - "fork": false, - "created_at": "2019-11-13T16:34:03Z", - "updated_at": "2021-06-18T03:18:41Z", - "pushed_at": "2019-11-14T14:16:54Z", - "stargazers_count": 274, - "watchers_count": 274, - "forks_count": 67, - "forks": 67, - "watchers": 274, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14205.json b/2019/CVE-2019-14205.json deleted file mode 100644 index a7eb07c77f..0000000000 --- a/2019/CVE-2019-14205.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 219652435, - "name": "EXPLOITING-CVE-2019-14205", - "full_name": "security-kma\/EXPLOITING-CVE-2019-14205", - "owner": { - "login": "security-kma", - "id": 52393069, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52393069?v=4", - "html_url": "https:\/\/github.com\/security-kma" - }, - "html_url": "https:\/\/github.com\/security-kma\/EXPLOITING-CVE-2019-14205", - "description": "EXPLOITING CVE 2019-14205", - "fork": false, - "created_at": "2019-11-05T03:47:06Z", - "updated_at": "2019-11-05T04:49:51Z", - "pushed_at": "2019-11-05T04:49:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1422.json b/2019/CVE-2019-1422.json deleted file mode 100644 index e93b3e2c02..0000000000 --- a/2019/CVE-2019-1422.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 224766189, - "name": "cve-2019-1422", - "full_name": "ze0r\/cve-2019-1422", - "owner": { - "login": "ze0r", - "id": 43227253, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4", - "html_url": "https:\/\/github.com\/ze0r" - }, - "html_url": "https:\/\/github.com\/ze0r\/cve-2019-1422", - "description": null, - "fork": false, - "created_at": "2019-11-29T02:58:32Z", - "updated_at": "2021-04-02T06:38:36Z", - "pushed_at": "2019-11-29T07:26:27Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 6, - "forks": 6, - "watchers": 13, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14220.json b/2019/CVE-2019-14220.json deleted file mode 100644 index c4840f2eb4..0000000000 --- a/2019/CVE-2019-14220.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 211860095, - "name": "cve-2019-14220", - "full_name": "seqred-s-a\/cve-2019-14220", - "owner": { - "login": "seqred-s-a", - "id": 49437606, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49437606?v=4", - "html_url": "https:\/\/github.com\/seqred-s-a" - }, - "html_url": "https:\/\/github.com\/seqred-s-a\/cve-2019-14220", - "description": "Arbitrary file read in BlueStacks", - "fork": false, - "created_at": "2019-09-30T12:57:35Z", - "updated_at": "2019-10-01T11:53:47Z", - "pushed_at": "2019-09-30T13:11:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14287.json b/2019/CVE-2019-14287.json index e632679588..42f66b6596 100644 --- a/2019/CVE-2019-14287.json +++ b/2019/CVE-2019-14287.json @@ -1,27 +1,4 @@ [ - { - "id": 215227089, - "name": "sudo-cve-2019-14287", - "full_name": "FauxFaux\/sudo-cve-2019-14287", - "owner": { - "login": "FauxFaux", - "id": 328180, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/328180?v=4", - "html_url": "https:\/\/github.com\/FauxFaux" - }, - "html_url": "https:\/\/github.com\/FauxFaux\/sudo-cve-2019-14287", - "description": null, - "fork": false, - "created_at": "2019-10-15T06:47:58Z", - "updated_at": "2019-10-20T12:06:59Z", - "pushed_at": "2019-10-15T06:48:23Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 215363376, "name": "CVE-2019-14287-demo", @@ -45,52 +22,6 @@ "watchers": 1, "score": 0 }, - { - "id": 215379835, - "name": "CVE-2019-14287", - "full_name": "n0w4n\/CVE-2019-14287", - "owner": { - "login": "n0w4n", - "id": 43784479, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43784479?v=4", - "html_url": "https:\/\/github.com\/n0w4n" - }, - "html_url": "https:\/\/github.com\/n0w4n\/CVE-2019-14287", - "description": "Sudo exploit", - "fork": false, - "created_at": "2019-10-15T19:26:42Z", - "updated_at": "2020-12-12T13:58:25Z", - "pushed_at": "2019-10-15T20:02:57Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 3, - "forks": 3, - "watchers": 3, - "score": 0 - }, - { - "id": 215573200, - "name": "CVE-2019-14287-write-up", - "full_name": "gurneesh\/CVE-2019-14287-write-up", - "owner": { - "login": "gurneesh", - "id": 26605645, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26605645?v=4", - "html_url": "https:\/\/github.com\/gurneesh" - }, - "html_url": "https:\/\/github.com\/gurneesh\/CVE-2019-14287-write-up", - "description": null, - "fork": false, - "created_at": "2019-10-16T14:47:08Z", - "updated_at": "2019-10-16T15:09:22Z", - "pushed_at": "2019-10-16T15:09:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 215939284, "name": "Sudo-Security-Bypass-CVE-2019-14287", @@ -114,98 +45,6 @@ "watchers": 2, "score": 0 }, - { - "id": 216456479, - "name": "cve-2019-14287sudoexp", - "full_name": "Janette88\/cve-2019-14287sudoexp", - "owner": { - "login": "Janette88", - "id": 20410684, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20410684?v=4", - "html_url": "https:\/\/github.com\/Janette88" - }, - "html_url": "https:\/\/github.com\/Janette88\/cve-2019-14287sudoexp", - "description": null, - "fork": false, - "created_at": "2019-10-21T01:54:45Z", - "updated_at": "2019-10-21T02:01:14Z", - "pushed_at": "2019-10-21T02:01:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 217958958, - "name": "cve-2019-14287-PPT", - "full_name": "huang919\/cve-2019-14287-PPT", - "owner": { - "login": "huang919", - "id": 54520509, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54520509?v=4", - "html_url": "https:\/\/github.com\/huang919" - }, - "html_url": "https:\/\/github.com\/huang919\/cve-2019-14287-PPT", - "description": null, - "fork": false, - "created_at": "2019-10-28T03:27:23Z", - "updated_at": "2019-11-13T13:21:56Z", - "pushed_at": "2019-11-13T13:21:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 220971939, - "name": "sudo-", - "full_name": "wenyu1999\/sudo-", - "owner": { - "login": "wenyu1999", - "id": 55389198, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55389198?v=4", - "html_url": "https:\/\/github.com\/wenyu1999" - }, - "html_url": "https:\/\/github.com\/wenyu1999\/sudo-", - "description": "cve-2019-14287", - "fork": false, - "created_at": "2019-11-11T12:01:02Z", - "updated_at": "2019-11-11T12:02:10Z", - "pushed_at": "2019-11-11T12:02:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 221210783, - "name": "cve-2019-14287", - "full_name": "Sindadziy\/cve-2019-14287", - "owner": { - "login": "Sindadziy", - "id": 55396899, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55396899?v=4", - "html_url": "https:\/\/github.com\/Sindadziy" - }, - "html_url": "https:\/\/github.com\/Sindadziy\/cve-2019-14287", - "description": null, - "fork": false, - "created_at": "2019-11-12T12:17:48Z", - "updated_at": "2019-11-12T12:18:23Z", - "pushed_at": "2019-11-12T12:18:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 221475763, "name": "CVE-2019-14287-CVE-2014-6271", @@ -252,29 +91,6 @@ "watchers": 5, "score": 0 }, - { - "id": 258967892, - "name": "sudo-vulnerability-CVE-2019-14287", - "full_name": "axax002\/sudo-vulnerability-CVE-2019-14287", - "owner": { - "login": "axax002", - "id": 55937601, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55937601?v=4", - "html_url": "https:\/\/github.com\/axax002" - }, - "html_url": "https:\/\/github.com\/axax002\/sudo-vulnerability-CVE-2019-14287", - "description": "Sudo Vulnerability CVE-2019-14287", - "fork": false, - "created_at": "2020-04-26T07:29:44Z", - "updated_at": "2021-04-14T16:06:10Z", - "pushed_at": "2019-12-04T07:25:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 263100309, "name": "Exploit-CVE-2019-14287", diff --git a/2019/CVE-2019-14319.json b/2019/CVE-2019-14319.json deleted file mode 100644 index 4fd7b373f4..0000000000 --- a/2019/CVE-2019-14319.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 206061423, - "name": "CVE-2019-14319", - "full_name": "MelroyB\/CVE-2019-14319", - "owner": { - "login": "MelroyB", - "id": 39052594, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39052594?v=4", - "html_url": "https:\/\/github.com\/MelroyB" - }, - "html_url": "https:\/\/github.com\/MelroyB\/CVE-2019-14319", - "description": null, - "fork": false, - "created_at": "2019-09-03T11:29:51Z", - "updated_at": "2021-05-17T12:21:25Z", - "pushed_at": "2019-09-03T11:30:26Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 0, - "forks": 0, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14339.json b/2019/CVE-2019-14339.json deleted file mode 100644 index a7661494b2..0000000000 --- a/2019/CVE-2019-14339.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 198801002, - "name": "CVE-2019-14339", - "full_name": "0x48piraj\/CVE-2019-14339", - "owner": { - "login": "0x48piraj", - "id": 5800726, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5800726?v=4", - "html_url": "https:\/\/github.com\/0x48piraj" - }, - "html_url": "https:\/\/github.com\/0x48piraj\/CVE-2019-14339", - "description": "POC for CVE-2019-14339 Canon PRINT 2.5.5", - "fork": false, - "created_at": "2019-07-25T09:30:02Z", - "updated_at": "2020-09-27T02:27:14Z", - "pushed_at": "2019-09-15T16:45:19Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 5, - "forks": 5, - "watchers": 13, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14439.json b/2019/CVE-2019-14439.json deleted file mode 100644 index 61fb3aaa87..0000000000 --- a/2019/CVE-2019-14439.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 199983488, - "name": "CVE-2019-14439", - "full_name": "jas502n\/CVE-2019-14439", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-14439", - "description": "Jackson-databind RCE", - "fork": false, - "created_at": "2019-08-01T05:33:06Z", - "updated_at": "2019-12-15T16:09:26Z", - "pushed_at": "2019-08-01T05:33:07Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, - "forks": 2, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14529.json b/2019/CVE-2019-14529.json deleted file mode 100644 index 57f0598430..0000000000 --- a/2019/CVE-2019-14529.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 202034341, - "name": "CVE-2019-14529", - "full_name": "Wezery\/CVE-2019-14529", - "owner": { - "login": "Wezery", - "id": 53606486, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53606486?v=4", - "html_url": "https:\/\/github.com\/Wezery" - }, - "html_url": "https:\/\/github.com\/Wezery\/CVE-2019-14529", - "description": "OpenEMR Security issue", - "fork": false, - "created_at": "2019-08-13T01:01:51Z", - "updated_at": "2019-10-14T10:21:18Z", - "pushed_at": "2019-10-14T10:21:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14530.json b/2019/CVE-2019-14530.json deleted file mode 100644 index eed2513075..0000000000 --- a/2019/CVE-2019-14530.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 202038918, - "name": "CVE-2019-14530", - "full_name": "Wezery\/CVE-2019-14530", - "owner": { - "login": "Wezery", - "id": 53606486, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53606486?v=4", - "html_url": "https:\/\/github.com\/Wezery" - }, - "html_url": "https:\/\/github.com\/Wezery\/CVE-2019-14530", - "description": "OpenEMR security issue", - "fork": false, - "created_at": "2019-08-13T01:33:11Z", - "updated_at": "2019-08-14T01:32:29Z", - "pushed_at": "2019-08-14T01:32:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14537.json b/2019/CVE-2019-14537.json deleted file mode 100644 index fbc0dd00ed..0000000000 --- a/2019/CVE-2019-14537.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 201036325, - "name": "CVE-2019-14537", - "full_name": "Wocanilo\/CVE-2019-14537", - "owner": { - "login": "Wocanilo", - "id": 25706428, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25706428?v=4", - "html_url": "https:\/\/github.com\/Wocanilo" - }, - "html_url": "https:\/\/github.com\/Wocanilo\/CVE-2019-14537", - "description": "CVE-2019-14537 PoC", - "fork": false, - "created_at": "2019-08-07T11:25:39Z", - "updated_at": "2020-09-21T10:01:40Z", - "pushed_at": "2019-08-08T08:04:22Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 1, - "forks": 1, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14540.json b/2019/CVE-2019-14540.json deleted file mode 100644 index 4b523a3227..0000000000 --- a/2019/CVE-2019-14540.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 203497733, - "name": "cve-2019-14540-exploit", - "full_name": "LeadroyaL\/cve-2019-14540-exploit", - "owner": { - "login": "LeadroyaL", - "id": 9478918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478918?v=4", - "html_url": "https:\/\/github.com\/LeadroyaL" - }, - "html_url": "https:\/\/github.com\/LeadroyaL\/cve-2019-14540-exploit", - "description": "CVE-2019-14540 Exploit", - "fork": false, - "created_at": "2019-08-21T03:19:19Z", - "updated_at": "2021-01-13T07:34:15Z", - "pushed_at": "2019-08-21T03:59:02Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 8, - "forks": 8, - "watchers": 19, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14745.json b/2019/CVE-2019-14745.json deleted file mode 100644 index 5047ee23c1..0000000000 --- a/2019/CVE-2019-14745.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 219609133, - "name": "CVE-2019-14745", - "full_name": "xooxo\/CVE-2019-14745", - "owner": { - "login": "xooxo", - "id": 9900851, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9900851?v=4", - "html_url": "https:\/\/github.com\/xooxo" - }, - "html_url": "https:\/\/github.com\/xooxo\/CVE-2019-14745", - "description": "weaponized radare2 vulnerability found by @CaptnBanana and blenk92", - "fork": false, - "created_at": "2019-11-04T22:31:27Z", - "updated_at": "2021-04-25T11:26:32Z", - "pushed_at": "2019-11-04T22:46:52Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14751.json b/2019/CVE-2019-14751.json deleted file mode 100644 index 36578a7c83..0000000000 --- a/2019/CVE-2019-14751.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 201508767, - "name": "CVE-2019-14751_PoC", - "full_name": "mssalvatore\/CVE-2019-14751_PoC", - "owner": { - "login": "mssalvatore", - "id": 19957806, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19957806?v=4", - "html_url": "https:\/\/github.com\/mssalvatore" - }, - "html_url": "https:\/\/github.com\/mssalvatore\/CVE-2019-14751_PoC", - "description": "A Proof of Concept for CVE-2019-14751", - "fork": false, - "created_at": "2019-08-09T16:56:54Z", - "updated_at": "2020-09-29T05:51:03Z", - "pushed_at": "2019-08-20T13:02:11Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1476.json b/2019/CVE-2019-1476.json deleted file mode 100644 index dbfece765f..0000000000 --- a/2019/CVE-2019-1476.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 226188349, - "name": "CVE-2019-1476", - "full_name": "sgabe\/CVE-2019-1476", - "owner": { - "login": "sgabe", - "id": 5206619, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5206619?v=4", - "html_url": "https:\/\/github.com\/sgabe" - }, - "html_url": "https:\/\/github.com\/sgabe\/CVE-2019-1476", - "description": "AppXSvc Arbitrary File Overwrite DoS", - "fork": false, - "created_at": "2019-12-05T21:00:16Z", - "updated_at": "2020-12-25T20:05:28Z", - "pushed_at": "2019-12-10T18:12:43Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14830.json b/2019/CVE-2019-14830.json deleted file mode 100644 index 1af92afff7..0000000000 --- a/2019/CVE-2019-14830.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 209007546, - "name": "moodle-token-stealer", - "full_name": "Fr3d-\/moodle-token-stealer", - "owner": { - "login": "Fr3d-", - "id": 6999865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6999865?v=4", - "html_url": "https:\/\/github.com\/Fr3d-" - }, - "html_url": "https:\/\/github.com\/Fr3d-\/moodle-token-stealer", - "description": "CVE-2019-14830", - "fork": false, - "created_at": "2019-09-17T09:04:41Z", - "updated_at": "2019-09-17T09:05:16Z", - "pushed_at": "2019-09-17T09:05:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14912.json b/2019/CVE-2019-14912.json deleted file mode 100644 index c879c77de8..0000000000 --- a/2019/CVE-2019-14912.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 208986817, - "name": "adaPwn", - "full_name": "Wocanilo\/adaPwn", - "owner": { - "login": "Wocanilo", - "id": 25706428, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25706428?v=4", - "html_url": "https:\/\/github.com\/Wocanilo" - }, - "html_url": "https:\/\/github.com\/Wocanilo\/adaPwn", - "description": "CVE-2019-14912 PoC", - "fork": false, - "created_at": "2019-09-17T07:24:23Z", - "updated_at": "2019-09-19T07:50:59Z", - "pushed_at": "2019-09-17T07:32:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15029.json b/2019/CVE-2019-15029.json deleted file mode 100644 index a95bb46bba..0000000000 --- a/2019/CVE-2019-15029.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 204203015, - "name": "CVE-2019-15029", - "full_name": "mhaskar\/CVE-2019-15029", - "owner": { - "login": "mhaskar", - "id": 6861215, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4", - "html_url": "https:\/\/github.com\/mhaskar" - }, - "html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-15029", - "description": "The official exploit code for FusionPBX v4.4.8 Remote Code Execution CVE-2019-15029", - "fork": false, - "created_at": "2019-08-24T19:28:36Z", - "updated_at": "2021-04-09T07:15:13Z", - "pushed_at": "2019-09-23T13:39:09Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 2, - "forks": 2, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15053.json b/2019/CVE-2019-15053.json deleted file mode 100644 index 56d5ac83e2..0000000000 --- a/2019/CVE-2019-15053.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 202405759, - "name": "CVE-2019-15053", - "full_name": "l0nax\/CVE-2019-15053", - "owner": { - "login": "l0nax", - "id": 29659953, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29659953?v=4", - "html_url": "https:\/\/github.com\/l0nax" - }, - "html_url": "https:\/\/github.com\/l0nax\/CVE-2019-15053", - "description": "(FAB-2019-00156) Vulnerability discoverd by me CVE-2019-15053 ", - "fork": false, - "created_at": "2019-08-14T18:35:36Z", - "updated_at": "2019-11-05T05:17:21Z", - "pushed_at": "2019-10-04T09:15:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index 6bdba114bd..2b0fa24f74 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -1,211 +1,4 @@ [ - { - "id": 203123412, - "name": "CVE-2019-15107", - "full_name": "jas502n\/CVE-2019-15107", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-15107", - "description": "CVE-2019-15107 Webmin RCE (unauthorized)", - "fork": false, - "created_at": "2019-08-19T07:43:16Z", - "updated_at": "2021-01-22T19:49:37Z", - "pushed_at": "2019-09-02T16:06:19Z", - "stargazers_count": 49, - "watchers_count": 49, - "forks_count": 18, - "forks": 18, - "watchers": 49, - "score": 0 - }, - { - "id": 203752840, - "name": "webmin_docker_and_exp", - "full_name": "HACHp1\/webmin_docker_and_exp", - "owner": { - "login": "HACHp1", - "id": 25722416, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25722416?v=4", - "html_url": "https:\/\/github.com\/HACHp1" - }, - "html_url": "https:\/\/github.com\/HACHp1\/webmin_docker_and_exp", - "description": "Dockerfiles for CVE-2019-15107(webmin RCE) recurrence including v1.890 and v1.920 with Exp for each version.", - "fork": false, - "created_at": "2019-08-22T08:48:07Z", - "updated_at": "2019-08-29T11:15:41Z", - "pushed_at": "2019-08-22T08:58:55Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 203787157, - "name": "CVE-2019-15107", - "full_name": "ketlerd\/CVE-2019-15107", - "owner": { - "login": "ketlerd", - "id": 4441136, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4441136?v=4", - "html_url": "https:\/\/github.com\/ketlerd" - }, - "html_url": "https:\/\/github.com\/ketlerd\/CVE-2019-15107", - "description": "Implementation of CVE-2019-15107 exploit in python", - "fork": false, - "created_at": "2019-08-22T12:07:16Z", - "updated_at": "2019-12-17T15:16:20Z", - "pushed_at": "2019-08-24T01:37:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, - "score": 0 - }, - { - "id": 203983183, - "name": "CVE-2019-15107", - "full_name": "AdministratorGithub\/CVE-2019-15107", - "owner": { - "login": "AdministratorGithub", - "id": 19834937, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19834937?v=4", - "html_url": "https:\/\/github.com\/AdministratorGithub" - }, - "html_url": "https:\/\/github.com\/AdministratorGithub\/CVE-2019-15107", - "description": "CVE-2019-15107 webmin python3", - "fork": false, - "created_at": "2019-08-23T11:10:01Z", - "updated_at": "2019-12-17T15:16:20Z", - "pushed_at": "2019-08-23T11:11:43Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - }, - { - "id": 210371345, - "name": "Make-and-Break", - "full_name": "Rayferrufino\/Make-and-Break", - "owner": { - "login": "Rayferrufino", - "id": 52383730, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52383730?v=4", - "html_url": "https:\/\/github.com\/Rayferrufino" - }, - "html_url": "https:\/\/github.com\/Rayferrufino\/Make-and-Break", - "description": "Built a custom Virtual Machine, running Ubuntu 18.04.1 and Webmin 1.810. Using CVE-2019-15107 to exploit a backdoor in the Linux machine", - "fork": false, - "created_at": "2019-09-23T14:07:03Z", - "updated_at": "2019-09-30T13:28:14Z", - "pushed_at": "2019-09-26T03:33:05Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - }, - { - "id": 217217171, - "name": "WebminRCE-EXP-CVE-2019-15107-", - "full_name": "AleWong\/WebminRCE-EXP-CVE-2019-15107-", - "owner": { - "login": "AleWong", - "id": 13904980, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13904980?v=4", - "html_url": "https:\/\/github.com\/AleWong" - }, - "html_url": "https:\/\/github.com\/AleWong\/WebminRCE-EXP-CVE-2019-15107-", - "description": "Remote Code Execution Vulnerability in Webmin", - "fork": false, - "created_at": "2019-10-24T05:19:20Z", - "updated_at": "2020-03-13T11:51:37Z", - "pushed_at": "2019-11-01T07:16:09Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 3, - "forks": 3, - "watchers": 3, - "score": 0 - }, - { - "id": 228190849, - "name": "CVE-2019-15107", - "full_name": "ianxtianxt\/CVE-2019-15107", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-15107", - "description": null, - "fork": false, - "created_at": "2019-12-15T13:42:28Z", - "updated_at": "2020-07-03T03:58:55Z", - "pushed_at": "2019-12-15T13:42:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 230108996, - "name": "webminex", - "full_name": "hannob\/webminex", - "owner": { - "login": "hannob", - "id": 990588, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/990588?v=4", - "html_url": "https:\/\/github.com\/hannob" - }, - "html_url": "https:\/\/github.com\/hannob\/webminex", - "description": "poc exploit for webmin backdoor (CVE-2019-15107 and CVE-2019-15231)", - "fork": false, - "created_at": "2019-12-25T13:47:02Z", - "updated_at": "2020-06-19T21:34:25Z", - "pushed_at": "2019-12-25T13:48:27Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 2, - "forks": 2, - "watchers": 8, - "score": 0 - }, - { - "id": 230738228, - "name": "webmin_CVE-2019-15107", - "full_name": "ChakoMoonFish\/webmin_CVE-2019-15107", - "owner": { - "login": "ChakoMoonFish", - "id": 5085275, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5085275?v=4", - "html_url": "https:\/\/github.com\/ChakoMoonFish" - }, - "html_url": "https:\/\/github.com\/ChakoMoonFish\/webmin_CVE-2019-15107", - "description": "webmin_CVE-2019-15107", - "fork": false, - "created_at": "2019-12-29T11:02:35Z", - "updated_at": "2019-12-29T11:03:18Z", - "pushed_at": "2019-12-29T11:03:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 273768106, "name": "Modified-CVE-2019-15107", diff --git a/2019/CVE-2019-15120.json b/2019/CVE-2019-15120.json deleted file mode 100644 index 93fa59b4b5..0000000000 --- a/2019/CVE-2019-15120.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 210601259, - "name": "CVE-2019-15120", - "full_name": "h3llraiser\/CVE-2019-15120", - "owner": { - "login": "h3llraiser", - "id": 52741391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52741391?v=4", - "html_url": "https:\/\/github.com\/h3llraiser" - }, - "html_url": "https:\/\/github.com\/h3llraiser\/CVE-2019-15120", - "description": "Exploit for XSS via BBCode on Kunena extension before 5.1.14 for Joomla!", - "fork": false, - "created_at": "2019-09-24T12:47:09Z", - "updated_at": "2019-11-16T17:11:30Z", - "pushed_at": "2019-11-16T17:11:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15224.json b/2019/CVE-2019-15224.json deleted file mode 100644 index 9989d8dae5..0000000000 --- a/2019/CVE-2019-15224.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 204066882, - "name": "inspec_cve_2019_15224", - "full_name": "chef-cft\/inspec_cve_2019_15224", - "owner": { - "login": "chef-cft", - "id": 13543320, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13543320?v=4", - "html_url": "https:\/\/github.com\/chef-cft" - }, - "html_url": "https:\/\/github.com\/chef-cft\/inspec_cve_2019_15224", - "description": "Example InSpec profile to detect presence of a malicious rest-client gem (CVE-2019-15224)", - "fork": false, - "created_at": "2019-08-23T20:38:44Z", - "updated_at": "2019-09-09T08:22:43Z", - "pushed_at": "2019-08-26T14:07:36Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15233.json b/2019/CVE-2019-15233.json deleted file mode 100644 index 351037a5a1..0000000000 --- a/2019/CVE-2019-15233.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 203378087, - "name": "CVE-2019-15233", - "full_name": "l0nax\/CVE-2019-15233", - "owner": { - "login": "l0nax", - "id": 29659953, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29659953?v=4", - "html_url": "https:\/\/github.com\/l0nax" - }, - "html_url": "https:\/\/github.com\/l0nax\/CVE-2019-15233", - "description": "(FAB-2019-00157) Vulnerability discoverd by me CVE-2019-15233", - "fork": false, - "created_at": "2019-08-20T13:05:56Z", - "updated_at": "2019-11-05T05:17:21Z", - "pushed_at": "2019-10-04T09:10:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15511.json b/2019/CVE-2019-15511.json deleted file mode 100644 index 4dac8131e4..0000000000 --- a/2019/CVE-2019-15511.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 203594549, - "name": "CVE-2019-15511", - "full_name": "adenkiewicz\/CVE-2019-15511", - "owner": { - "login": "adenkiewicz", - "id": 1060275, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", - "html_url": "https:\/\/github.com\/adenkiewicz" - }, - "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2019-15511", - "description": "GOG Galaxy Exploit for CVE-2019-15511", - "fork": false, - "created_at": "2019-08-21T13:52:13Z", - "updated_at": "2020-12-10T07:57:02Z", - "pushed_at": "2019-11-15T14:50:47Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15642.json b/2019/CVE-2019-15642.json deleted file mode 100644 index ee67fcb75f..0000000000 --- a/2019/CVE-2019-15642.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 205655418, - "name": "CVE-2019-15642", - "full_name": "jas502n\/CVE-2019-15642", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-15642", - "description": "Webmin Remote Code Execution (authenticated) ", - "fork": false, - "created_at": "2019-09-01T09:28:56Z", - "updated_at": "2020-04-04T03:02:51Z", - "pushed_at": "2019-09-01T11:35:43Z", - "stargazers_count": 29, - "watchers_count": 29, - "forks_count": 7, - "forks": 7, - "watchers": 29, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1579.json b/2019/CVE-2019-1579.json index d19e9210f6..c41ae229fb 100644 --- a/2019/CVE-2019-1579.json +++ b/2019/CVE-2019-1579.json @@ -1,27 +1,4 @@ [ - { - "id": 207451672, - "name": "CVE-2019-1579", - "full_name": "securifera\/CVE-2019-1579", - "owner": { - "login": "securifera", - "id": 12126525, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4", - "html_url": "https:\/\/github.com\/securifera" - }, - "html_url": "https:\/\/github.com\/securifera\/CVE-2019-1579", - "description": null, - "fork": false, - "created_at": "2019-09-10T02:53:03Z", - "updated_at": "2021-02-22T16:55:43Z", - "pushed_at": "2019-09-10T15:57:23Z", - "stargazers_count": 59, - "watchers_count": 59, - "forks_count": 29, - "forks": 29, - "watchers": 59, - "score": 0 - }, { "id": 306017929, "name": "CVE-2019-1579", diff --git a/2019/CVE-2019-15846.json b/2019/CVE-2019-15846.json deleted file mode 100644 index fbd56883ae..0000000000 --- a/2019/CVE-2019-15846.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 213952894, - "name": "Exim-CVE-2019-15846", - "full_name": "synacktiv\/Exim-CVE-2019-15846", - "owner": { - "login": "synacktiv", - "id": 50145679, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4", - "html_url": "https:\/\/github.com\/synacktiv" - }, - "html_url": "https:\/\/github.com\/synacktiv\/Exim-CVE-2019-15846", - "description": "PoC materials to exploit CVE-2019-15846", - "fork": false, - "created_at": "2019-10-09T15:19:58Z", - "updated_at": "2021-05-10T05:44:29Z", - "pushed_at": "2019-10-10T09:55:59Z", - "stargazers_count": 27, - "watchers_count": 27, - "forks_count": 9, - "forks": 9, - "watchers": 27, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15858.json b/2019/CVE-2019-15858.json deleted file mode 100644 index 8cfe060852..0000000000 --- a/2019/CVE-2019-15858.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 208152610, - "name": "CVE-2019-15858", - "full_name": "GeneralEG\/CVE-2019-15858", - "owner": { - "login": "GeneralEG", - "id": 20465962, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20465962?v=4", - "html_url": "https:\/\/github.com\/GeneralEG" - }, - "html_url": "https:\/\/github.com\/GeneralEG\/CVE-2019-15858", - "description": "Unauthenticated RCE at Woody Ad Snippets \/ CVE-2019-15858 (PoC)", - "fork": false, - "created_at": "2019-09-12T21:52:55Z", - "updated_at": "2021-02-03T12:16:27Z", - "pushed_at": "2019-09-12T22:19:47Z", - "stargazers_count": 29, - "watchers_count": 29, - "forks_count": 6, - "forks": 6, - "watchers": 29, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15972.json b/2019/CVE-2019-15972.json deleted file mode 100644 index 9e6f695944..0000000000 --- a/2019/CVE-2019-15972.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 222742364, - "name": "Cisco-UCM-SQLi-Scripts", - "full_name": "FSecureLABS\/Cisco-UCM-SQLi-Scripts", - "owner": { - "login": "FSecureLABS", - "id": 1469843, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1469843?v=4", - "html_url": "https:\/\/github.com\/FSecureLABS" - }, - "html_url": "https:\/\/github.com\/FSecureLABS\/Cisco-UCM-SQLi-Scripts", - "description": "Scripts that can be used to exploit CVE-2019-15972 which was an Authenticated SQLi issue in Cisco Unified Call Manager (UCM).", - "fork": false, - "created_at": "2019-11-19T16:38:39Z", - "updated_at": "2021-06-03T02:39:22Z", - "pushed_at": "2019-11-20T15:05:54Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 6, - "forks": 6, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16097.json b/2019/CVE-2019-16097.json deleted file mode 100644 index 2d8eb6a810..0000000000 --- a/2019/CVE-2019-16097.json +++ /dev/null @@ -1,140 +0,0 @@ -[ - { - "id": 209584763, - "name": "CVE-2019-16097", - "full_name": "evilAdan0s\/CVE-2019-16097", - "owner": { - "login": "evilAdan0s", - "id": 37237766, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37237766?v=4", - "html_url": "https:\/\/github.com\/evilAdan0s" - }, - "html_url": "https:\/\/github.com\/evilAdan0s\/CVE-2019-16097", - "description": "CVE-2019-16097 PoC", - "fork": false, - "created_at": "2019-09-19T15:12:11Z", - "updated_at": "2021-04-22T04:50:52Z", - "pushed_at": "2019-09-19T15:27:48Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 9, - "forks": 9, - "watchers": 20, - "score": 0 - }, - { - "id": 209684562, - "name": "CVE-2019-16097-batch", - "full_name": "rockmelodies\/CVE-2019-16097-batch", - "owner": { - "login": "rockmelodies", - "id": 24653177, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24653177?v=4", - "html_url": "https:\/\/github.com\/rockmelodies" - }, - "html_url": "https:\/\/github.com\/rockmelodies\/CVE-2019-16097-batch", - "description": "CVE-2019-16097-batch", - "fork": false, - "created_at": "2019-09-20T02:03:45Z", - "updated_at": "2020-10-11T02:08:51Z", - "pushed_at": "2019-09-21T04:51:38Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 2, - "forks": 2, - "watchers": 5, - "score": 0 - }, - { - "id": 210135326, - "name": "CVE-2019-16097", - "full_name": "ianxtianxt\/CVE-2019-16097", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16097", - "description": null, - "fork": false, - "created_at": "2019-09-22T11:24:28Z", - "updated_at": "2019-09-22T11:26:55Z", - "pushed_at": "2019-09-22T11:26:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 3, - "forks": 3, - "watchers": 0, - "score": 0 - }, - { - "id": 210735062, - "name": "cve-2019-16097", - "full_name": "dacade\/cve-2019-16097", - "owner": { - "login": "dacade", - "id": 31815137, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31815137?v=4", - "html_url": "https:\/\/github.com\/dacade" - }, - "html_url": "https:\/\/github.com\/dacade\/cve-2019-16097", - "description": "cve-2019-1609", - "fork": false, - "created_at": "2019-09-25T02:05:49Z", - "updated_at": "2020-01-08T07:00:47Z", - "pushed_at": "2019-09-25T02:24:55Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 212393854, - "name": "harbor-give-me-admin", - "full_name": "theLSA\/harbor-give-me-admin", - "owner": { - "login": "theLSA", - "id": 28248956, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4", - "html_url": "https:\/\/github.com\/theLSA" - }, - "html_url": "https:\/\/github.com\/theLSA\/harbor-give-me-admin", - "description": "harbor(<1.7.6\/1.8.3) privilege escalation (CVE-2019-16097)", - "fork": false, - "created_at": "2019-10-02T16:53:06Z", - "updated_at": "2019-10-02T17:01:53Z", - "pushed_at": "2019-10-02T17:01:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 221669111, - "name": "CVE-2019-16097", - "full_name": "luckybool1020\/CVE-2019-16097", - "owner": { - "login": "luckybool1020", - "id": 16422202, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16422202?v=4", - "html_url": "https:\/\/github.com\/luckybool1020" - }, - "html_url": "https:\/\/github.com\/luckybool1020\/CVE-2019-16097", - "description": "Harbor 未授权创建管理员漏洞原理 docker及poc[基于pocsuite框架]", - "fork": false, - "created_at": "2019-11-14T10:19:47Z", - "updated_at": "2020-12-13T02:27:55Z", - "pushed_at": "2019-11-14T10:22:23Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16098.json b/2019/CVE-2019-16098.json deleted file mode 100644 index 5f1e279257..0000000000 --- a/2019/CVE-2019-16098.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 207602452, - "name": "CVE-2019-16098", - "full_name": "Barakat\/CVE-2019-16098", - "owner": { - "login": "Barakat", - "id": 11032985, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11032985?v=4", - "html_url": "https:\/\/github.com\/Barakat" - }, - "html_url": "https:\/\/github.com\/Barakat\/CVE-2019-16098", - "description": "Local privilege escalation PoC exploit for CVE-2019-16098", - "fork": false, - "created_at": "2019-09-10T15:57:36Z", - "updated_at": "2021-06-07T17:39:25Z", - "pushed_at": "2019-09-13T20:05:43Z", - "stargazers_count": 136, - "watchers_count": 136, - "forks_count": 44, - "forks": 44, - "watchers": 136, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16278.json b/2019/CVE-2019-16278.json index c13732267e..b7ffff0ab8 100644 --- a/2019/CVE-2019-16278.json +++ b/2019/CVE-2019-16278.json @@ -1,50 +1,4 @@ [ - { - "id": 215200285, - "name": "CVE-2019-16278", - "full_name": "jas502n\/CVE-2019-16278", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278", - "description": "Directory transversal to remote code execution", - "fork": false, - "created_at": "2019-10-15T03:40:13Z", - "updated_at": "2021-05-25T10:21:04Z", - "pushed_at": "2019-10-15T03:53:55Z", - "stargazers_count": 67, - "watchers_count": 67, - "forks_count": 27, - "forks": 27, - "watchers": 67, - "score": 0 - }, - { - "id": 215258157, - "name": "CVE-2019-16278-PoC", - "full_name": "imjdl\/CVE-2019-16278-PoC", - "owner": { - "login": "imjdl", - "id": 31382943, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4", - "html_url": "https:\/\/github.com\/imjdl" - }, - "html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC", - "description": "CVE-2019-16728 Proof of Concept", - "fork": false, - "created_at": "2019-10-15T09:22:36Z", - "updated_at": "2020-05-18T10:43:21Z", - "pushed_at": "2019-10-15T09:28:25Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 1, - "forks": 1, - "watchers": 6, - "score": 0 - }, { "id": 215297351, "name": "CVE-2019-16278", @@ -68,98 +22,6 @@ "watchers": 3, "score": 0 }, - { - "id": 217164072, - "name": "Nostromo_Python3", - "full_name": "darkerego\/Nostromo_Python3", - "owner": { - "login": "darkerego", - "id": 8583665, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8583665?v=4", - "html_url": "https:\/\/github.com\/darkerego" - }, - "html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3", - "description": "CVE-2019-16278 Python3 Exploit Code", - "fork": false, - "created_at": "2019-10-23T22:24:18Z", - "updated_at": "2019-10-23T22:26:43Z", - "pushed_at": "2019-10-23T22:26:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, - "score": 0 - }, - { - "id": 223463242, - "name": "CVE-2019-16278", - "full_name": "AnubisSec\/CVE-2019-16278", - "owner": { - "login": "AnubisSec", - "id": 38790814, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38790814?v=4", - "html_url": "https:\/\/github.com\/AnubisSec" - }, - "html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278", - "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ", - "fork": false, - "created_at": "2019-11-22T18:35:14Z", - "updated_at": "2020-05-18T10:43:26Z", - "pushed_at": "2019-11-22T18:57:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - }, - { - "id": 224208624, - "name": "CVE-2019-16278-Nostromo_1.9.6-RCE", - "full_name": "theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE", - "owner": { - "login": "theRealFr13nd", - "id": 36172640, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36172640?v=4", - "html_url": "https:\/\/github.com\/theRealFr13nd" - }, - "html_url": "https:\/\/github.com\/theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE", - "description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.", - "fork": false, - "created_at": "2019-11-26T14:15:44Z", - "updated_at": "2019-11-26T14:26:05Z", - "pushed_at": "2019-11-26T14:26:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 231114950, - "name": "cve-2019-16278", - "full_name": "Kr0ff\/cve-2019-16278", - "owner": { - "login": "Kr0ff", - "id": 35173514, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4", - "html_url": "https:\/\/github.com\/Kr0ff" - }, - "html_url": "https:\/\/github.com\/Kr0ff\/cve-2019-16278", - "description": "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal ", - "fork": false, - "created_at": "2019-12-31T16:06:13Z", - "updated_at": "2020-02-19T19:35:33Z", - "pushed_at": "2019-12-31T16:07:48Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 231220055, "name": "CVE-2019-16278", diff --git a/2019/CVE-2019-16279.json b/2019/CVE-2019-16279.json deleted file mode 100644 index 92998a2cc6..0000000000 --- a/2019/CVE-2019-16279.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 215296435, - "name": "CVE-2019-16279", - "full_name": "ianxtianxt\/CVE-2019-16279", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16279", - "description": "(CVE-2019-16279)dos", - "fork": false, - "created_at": "2019-10-15T12:43:28Z", - "updated_at": "2019-10-15T12:46:09Z", - "pushed_at": "2019-10-15T12:46:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 2, - "forks": 2, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16662.json b/2019/CVE-2019-16662.json deleted file mode 100644 index eb7d618a36..0000000000 --- a/2019/CVE-2019-16662.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 220831587, - "name": "CVE-2019-16662", - "full_name": "mhaskar\/CVE-2019-16662", - "owner": { - "login": "mhaskar", - "id": 6861215, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4", - "html_url": "https:\/\/github.com\/mhaskar" - }, - "html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-16662", - "description": "The official exploit for rConfig 3.9.2 Pre-auth Remote Code Execution CVE-2019-16662", - "fork": false, - "created_at": "2019-11-10T18:26:25Z", - "updated_at": "2021-04-09T07:15:35Z", - "pushed_at": "2019-11-10T18:27:02Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 3, - "forks": 3, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16663.json b/2019/CVE-2019-16663.json deleted file mode 100644 index 3b2f73ba52..0000000000 --- a/2019/CVE-2019-16663.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 220831806, - "name": "CVE-2019-16663", - "full_name": "mhaskar\/CVE-2019-16663", - "owner": { - "login": "mhaskar", - "id": 6861215, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4", - "html_url": "https:\/\/github.com\/mhaskar" - }, - "html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-16663", - "description": "The official exploit for rConfig 3.9.2 Post-auth Remote Code Execution CVE-2019-16663", - "fork": false, - "created_at": "2019-11-10T18:28:11Z", - "updated_at": "2021-04-09T07:15:45Z", - "pushed_at": "2019-11-10T18:28:40Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 5, - "forks": 5, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16692.json b/2019/CVE-2019-16692.json deleted file mode 100644 index a8b2ac6318..0000000000 --- a/2019/CVE-2019-16692.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 211323513, - "name": "CVE-2019-16692", - "full_name": "kkirsche\/CVE-2019-16692", - "owner": { - "login": "kkirsche", - "id": 947110, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4", - "html_url": "https:\/\/github.com\/kkirsche" - }, - "html_url": "https:\/\/github.com\/kkirsche\/CVE-2019-16692", - "description": "Exploit code for CVE-2019-16692", - "fork": false, - "created_at": "2019-09-27T13:18:00Z", - "updated_at": "2019-10-11T18:34:37Z", - "pushed_at": "2019-10-11T18:34:36Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 3, - "forks": 3, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16759.json b/2019/CVE-2019-16759.json index ccefa063ab..e962e652f1 100644 --- a/2019/CVE-2019-16759.json +++ b/2019/CVE-2019-16759.json @@ -1,73 +1,4 @@ [ - { - "id": 210888122, - "name": "CVE-2019-16759-Vbulletin-rce-exploit", - "full_name": "M0sterHxck\/CVE-2019-16759-Vbulletin-rce-exploit", - "owner": { - "login": "M0sterHxck", - "id": 32819554, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32819554?v=4", - "html_url": "https:\/\/github.com\/M0sterHxck" - }, - "html_url": "https:\/\/github.com\/M0sterHxck\/CVE-2019-16759-Vbulletin-rce-exploit", - "description": "Vbulletin rce exploit CVE-2019-16759", - "fork": false, - "created_at": "2019-09-25T16:12:27Z", - "updated_at": "2020-08-10T00:28:14Z", - "pushed_at": "2019-09-25T16:32:27Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 4, - "forks": 4, - "watchers": 5, - "score": 0 - }, - { - "id": 210991486, - "name": "http-vuln-CVE-2019-16759", - "full_name": "r00tpgp\/http-vuln-CVE-2019-16759", - "owner": { - "login": "r00tpgp", - "id": 29351179, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29351179?v=4", - "html_url": "https:\/\/github.com\/r00tpgp" - }, - "html_url": "https:\/\/github.com\/r00tpgp\/http-vuln-CVE-2019-16759", - "description": "Nmap NSE Script to Detect vBulletin pre-auth 5.x RCE CVE-2019-16759", - "fork": false, - "created_at": "2019-09-26T03:27:17Z", - "updated_at": "2020-08-17T18:14:17Z", - "pushed_at": "2019-09-26T03:35:50Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - }, - { - "id": 210995647, - "name": "CVE-2019-16759", - "full_name": "jas502n\/CVE-2019-16759", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16759", - "description": "vBulletin 5.x 未授权远程代码执行漏洞", - "fork": false, - "created_at": "2019-09-26T03:56:22Z", - "updated_at": "2020-12-16T10:09:32Z", - "pushed_at": "2019-09-26T04:25:36Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 3, - "forks": 3, - "watchers": 20, - "score": 0 - }, { "id": 212392680, "name": "vbulletin5-rce", @@ -91,29 +22,6 @@ "watchers": 18, "score": 0 }, - { - "id": 214698783, - "name": "CVE-2019-16759", - "full_name": "FarjaalAhmad\/CVE-2019-16759", - "owner": { - "login": "FarjaalAhmad", - "id": 45895453, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45895453?v=4", - "html_url": "https:\/\/github.com\/FarjaalAhmad" - }, - "html_url": "https:\/\/github.com\/FarjaalAhmad\/CVE-2019-16759", - "description": "Interactive-Like Command-Line Console for CVE-2019-16759", - "fork": false, - "created_at": "2019-10-12T18:51:16Z", - "updated_at": "2021-03-14T10:23:15Z", - "pushed_at": "2019-10-12T18:56:58Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 230790251, "name": "pwn-vbulletin", diff --git a/2019/CVE-2019-16889.json b/2019/CVE-2019-16889.json deleted file mode 100644 index 712510e0b8..0000000000 --- a/2019/CVE-2019-16889.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 226750951, - "name": "meep", - "full_name": "grampae\/meep", - "owner": { - "login": "grampae", - "id": 36344197, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36344197?v=4", - "html_url": "https:\/\/github.com\/grampae" - }, - "html_url": "https:\/\/github.com\/grampae\/meep", - "description": "Proof of conecept for CVE-2019-16889 (Resource consumption on Ubiquiti Edgemax 1.10.6 and earlier", - "fork": false, - "created_at": "2019-12-09T00:09:08Z", - "updated_at": "2019-12-22T20:22:21Z", - "pushed_at": "2019-12-22T20:22:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16920.json b/2019/CVE-2019-16920.json deleted file mode 100644 index 390a44e5f2..0000000000 --- a/2019/CVE-2019-16920.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 215362480, - "name": "CVE-2019-16920-MassPwn3r", - "full_name": "pwnhacker0x18\/CVE-2019-16920-MassPwn3r", - "owner": { - "login": "pwnhacker0x18", - "id": 51971493, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51971493?v=4", - "html_url": "https:\/\/github.com\/pwnhacker0x18" - }, - "html_url": "https:\/\/github.com\/pwnhacker0x18\/CVE-2019-16920-MassPwn3r", - "description": "Exploit and Mass Pwn3r for CVE-2019-16920", - "fork": false, - "created_at": "2019-10-15T17:54:03Z", - "updated_at": "2021-06-03T18:45:54Z", - "pushed_at": "2019-12-21T17:31:56Z", - "stargazers_count": 27, - "watchers_count": 27, - "forks_count": 14, - "forks": 14, - "watchers": 27, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16941.json b/2019/CVE-2019-16941.json deleted file mode 100644 index 2dffac14db..0000000000 --- a/2019/CVE-2019-16941.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 212068191, - "name": "CVE-2019-16941", - "full_name": "purpleracc00n\/CVE-2019-16941", - "owner": { - "login": "purpleracc00n", - "id": 47504061, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47504061?v=4", - "html_url": "https:\/\/github.com\/purpleracc00n" - }, - "html_url": "https:\/\/github.com\/purpleracc00n\/CVE-2019-16941", - "description": "PoC for CVE-2019-16941", - "fork": false, - "created_at": "2019-10-01T10:26:27Z", - "updated_at": "2020-08-13T19:25:51Z", - "pushed_at": "2019-10-03T18:08:50Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17080.json b/2019/CVE-2019-17080.json deleted file mode 100644 index bbcc3d10da..0000000000 --- a/2019/CVE-2019-17080.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 212289598, - "name": "Mintinstall-object-injection", - "full_name": "Andhrimnirr\/Mintinstall-object-injection", - "owner": { - "login": "Andhrimnirr", - "id": 38662689, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38662689?v=4", - "html_url": "https:\/\/github.com\/Andhrimnirr" - }, - "html_url": "https:\/\/github.com\/Andhrimnirr\/Mintinstall-object-injection", - "description": "CVE-2019-17080 ", - "fork": false, - "created_at": "2019-10-02T08:26:34Z", - "updated_at": "2020-10-23T15:51:33Z", - "pushed_at": "2019-10-08T16:58:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 216088358, - "name": "Mintinstall-object-injection", - "full_name": "materaj2\/Mintinstall-object-injection", - "owner": { - "login": "materaj2", - "id": 46865671, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46865671?v=4", - "html_url": "https:\/\/github.com\/materaj2" - }, - "html_url": "https:\/\/github.com\/materaj2\/Mintinstall-object-injection", - "description": "CVE-2019-17080 ", - "fork": false, - "created_at": "2019-10-18T18:52:17Z", - "updated_at": "2020-07-21T10:59:38Z", - "pushed_at": "2019-10-08T16:58:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17124.json b/2019/CVE-2019-17124.json deleted file mode 100644 index a4314d6b06..0000000000 --- a/2019/CVE-2019-17124.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 213818580, - "name": "CVE-2019-17124", - "full_name": "hessandrew\/CVE-2019-17124", - "owner": { - "login": "hessandrew", - "id": 45692132, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45692132?v=4", - "html_url": "https:\/\/github.com\/hessandrew" - }, - "html_url": "https:\/\/github.com\/hessandrew\/CVE-2019-17124", - "description": "KRAMER VIAware 2.5.0719.1034 - Remote Code Execution", - "fork": false, - "created_at": "2019-10-09T04:10:25Z", - "updated_at": "2019-12-22T15:02:04Z", - "pushed_at": "2019-10-11T02:32:36Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17424.json b/2019/CVE-2019-17424.json deleted file mode 100644 index 386eea7111..0000000000 --- a/2019/CVE-2019-17424.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 216429041, - "name": "CVE-2019-17424", - "full_name": "guywhataguy\/CVE-2019-17424", - "owner": { - "login": "guywhataguy", - "id": 33753158, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33753158?v=4", - "html_url": "https:\/\/github.com\/guywhataguy" - }, - "html_url": "https:\/\/github.com\/guywhataguy\/CVE-2019-17424", - "description": "RCE Exploit For CVE-2019-17424 (nipper-ng 0.11.10)", - "fork": false, - "created_at": "2019-10-20T21:20:28Z", - "updated_at": "2020-04-20T05:07:36Z", - "pushed_at": "2019-11-16T09:47:12Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 1, - "forks": 1, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17495.json b/2019/CVE-2019-17495.json deleted file mode 100644 index 3935280f3e..0000000000 --- a/2019/CVE-2019-17495.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 229946045, - "name": "CVE-2019-17495-test", - "full_name": "SecT0uch\/CVE-2019-17495-test", - "owner": { - "login": "SecT0uch", - "id": 26085417, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26085417?v=4", - "html_url": "https:\/\/github.com\/SecT0uch" - }, - "html_url": "https:\/\/github.com\/SecT0uch\/CVE-2019-17495-test", - "description": null, - "fork": false, - "created_at": "2019-12-24T13:23:06Z", - "updated_at": "2019-12-24T13:33:21Z", - "pushed_at": "2019-12-24T13:33:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17571.json b/2019/CVE-2019-17571.json index 82d0e03883..691c64671b 100644 --- a/2019/CVE-2019-17571.json +++ b/2019/CVE-2019-17571.json @@ -1,27 +1,4 @@ [ - { - "id": 230129409, - "name": "CVE-2019-17571", - "full_name": "shadow-horse\/CVE-2019-17571", - "owner": { - "login": "shadow-horse", - "id": 5432330, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5432330?v=4", - "html_url": "https:\/\/github.com\/shadow-horse" - }, - "html_url": "https:\/\/github.com\/shadow-horse\/CVE-2019-17571", - "description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞", - "fork": false, - "created_at": "2019-12-25T16:46:11Z", - "updated_at": "2021-03-28T14:34:48Z", - "pushed_at": "2019-12-25T16:48:41Z", - "stargazers_count": 69, - "watchers_count": 69, - "forks_count": 3, - "forks": 3, - "watchers": 69, - "score": 0 - }, { "id": 280048798, "name": "CVE-2019-17571", diff --git a/2019/CVE-2019-17596.json b/2019/CVE-2019-17596.json deleted file mode 100644 index 43622b2e3b..0000000000 --- a/2019/CVE-2019-17596.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 216283040, - "name": "poc-dsa-verify-CVE-2019-17596", - "full_name": "pquerna\/poc-dsa-verify-CVE-2019-17596", - "owner": { - "login": "pquerna", - "id": 110123, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110123?v=4", - "html_url": "https:\/\/github.com\/pquerna" - }, - "html_url": "https:\/\/github.com\/pquerna\/poc-dsa-verify-CVE-2019-17596", - "description": "Demonstration of Go's dsa.Verify bug (CVE-2019-17596)", - "fork": false, - "created_at": "2019-10-19T23:32:02Z", - "updated_at": "2019-10-24T17:18:50Z", - "pushed_at": "2019-10-24T15:00:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17633.json b/2019/CVE-2019-17633.json deleted file mode 100644 index 07ff2002bd..0000000000 --- a/2019/CVE-2019-17633.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 229132579, - "name": "CVE-2019-17633", - "full_name": "mgrube\/CVE-2019-17633", - "owner": { - "login": "mgrube", - "id": 90159, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90159?v=4", - "html_url": "https:\/\/github.com\/mgrube" - }, - "html_url": "https:\/\/github.com\/mgrube\/CVE-2019-17633", - "description": "Eclipse Che CSRF leading to RCE", - "fork": false, - "created_at": "2019-12-19T20:22:12Z", - "updated_at": "2019-12-24T12:47:52Z", - "pushed_at": "2019-12-20T16:45:35Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 0, - "forks": 0, - "watchers": 11, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-18873.json b/2019/CVE-2019-18873.json deleted file mode 100644 index 508ac1319d..0000000000 --- a/2019/CVE-2019-18873.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 217798293, - "name": "FUDforum-XSS-RCE", - "full_name": "fuzzlove\/FUDforum-XSS-RCE", - "owner": { - "login": "fuzzlove", - "id": 44779781, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4", - "html_url": "https:\/\/github.com\/fuzzlove" - }, - "html_url": "https:\/\/github.com\/fuzzlove\/FUDforum-XSS-RCE", - "description": "FUDForum 3.0.9 - XSS \/ Remote Code Execution (CVE-2019-18873, CVE-2019-18839)", - "fork": false, - "created_at": "2019-10-27T03:07:26Z", - "updated_at": "2021-02-05T01:06:01Z", - "pushed_at": "2019-11-13T20:56:14Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 4, - "forks": 4, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19012.json b/2019/CVE-2019-19012.json deleted file mode 100644 index 723b1d03fa..0000000000 --- a/2019/CVE-2019-19012.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 222906322, - "name": "CVE-2019-19012", - "full_name": "ManhNDd\/CVE-2019-19012", - "owner": { - "login": "ManhNDd", - "id": 18594865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18594865?v=4", - "html_url": "https:\/\/github.com\/ManhNDd" - }, - "html_url": "https:\/\/github.com\/ManhNDd\/CVE-2019-19012", - "description": "Integer overflow in Oniguruma", - "fork": false, - "created_at": "2019-11-20T10:00:18Z", - "updated_at": "2019-12-03T08:44:25Z", - "pushed_at": "2019-11-20T15:53:38Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 222956814, - "name": "CVE-2019-19012", - "full_name": "tarantula-team\/CVE-2019-19012", - "owner": { - "login": "tarantula-team", - "id": 51333391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51333391?v=4", - "html_url": "https:\/\/github.com\/tarantula-team" - }, - "html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-19012", - "description": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read", - "fork": false, - "created_at": "2019-11-20T14:32:23Z", - "updated_at": "2019-11-20T15:24:36Z", - "pushed_at": "2019-11-20T15:24:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19033.json b/2019/CVE-2019-19033.json deleted file mode 100644 index 156b8981cd..0000000000 --- a/2019/CVE-2019-19033.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 222300876, - "name": "CVE-2019-19033", - "full_name": "ricardojoserf\/CVE-2019-19033", - "owner": { - "login": "ricardojoserf", - "id": 11477353, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11477353?v=4", - "html_url": "https:\/\/github.com\/ricardojoserf" - }, - "html_url": "https:\/\/github.com\/ricardojoserf\/CVE-2019-19033", - "description": "CVE-2019-19033 description and scripts to check the vulnerability in Jalios JCMS 10 (Authentication Bypass)", - "fork": false, - "created_at": "2019-11-17T19:32:10Z", - "updated_at": "2021-03-03T17:21:00Z", - "pushed_at": "2019-12-03T19:22:32Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19203.json b/2019/CVE-2019-19203.json deleted file mode 100644 index 31fe650fee..0000000000 --- a/2019/CVE-2019-19203.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 223278825, - "name": "CVE-2019-19203", - "full_name": "ManhNDd\/CVE-2019-19203", - "owner": { - "login": "ManhNDd", - "id": 18594865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18594865?v=4", - "html_url": "https:\/\/github.com\/ManhNDd" - }, - "html_url": "https:\/\/github.com\/ManhNDd\/CVE-2019-19203", - "description": "Heap-buffer-overflow in Oniguruma (function gb18030_mbc_enc_len)", - "fork": false, - "created_at": "2019-11-21T22:43:34Z", - "updated_at": "2021-01-04T16:55:17Z", - "pushed_at": "2019-11-22T00:04:51Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 229900382, - "name": "CVE-2019-19203", - "full_name": "tarantula-team\/CVE-2019-19203", - "owner": { - "login": "tarantula-team", - "id": 51333391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51333391?v=4", - "html_url": "https:\/\/github.com\/tarantula-team" - }, - "html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-19203", - "description": "An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read", - "fork": false, - "created_at": "2019-12-24T08:11:11Z", - "updated_at": "2019-12-24T08:18:12Z", - "pushed_at": "2019-12-24T08:18:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19204.json b/2019/CVE-2019-19204.json deleted file mode 100644 index d5378146a0..0000000000 --- a/2019/CVE-2019-19204.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 223286619, - "name": "CVE-2019-19204", - "full_name": "ManhNDd\/CVE-2019-19204", - "owner": { - "login": "ManhNDd", - "id": 18594865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18594865?v=4", - "html_url": "https:\/\/github.com\/ManhNDd" - }, - "html_url": "https:\/\/github.com\/ManhNDd\/CVE-2019-19204", - "description": "Heap-buffer-overflow in Oniguruma (function fetch_interval_quantifier)", - "fork": false, - "created_at": "2019-11-21T23:53:16Z", - "updated_at": "2021-01-04T16:55:19Z", - "pushed_at": "2019-11-22T00:04:37Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 229901564, - "name": "CVE-2019-19204", - "full_name": "tarantula-team\/CVE-2019-19204", - "owner": { - "login": "tarantula-team", - "id": 51333391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51333391?v=4", - "html_url": "https:\/\/github.com\/tarantula-team" - }, - "html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-19204", - "description": "Heap-buffer-overflow in Oniguruma (function fetch_interval_quantifier)", - "fork": false, - "created_at": "2019-12-24T08:19:02Z", - "updated_at": "2019-12-24T08:29:30Z", - "pushed_at": "2019-12-24T08:27:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19231.json b/2019/CVE-2019-19231.json deleted file mode 100644 index e53e310f84..0000000000 --- a/2019/CVE-2019-19231.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 229404870, - "name": "CVE-2019-19231", - "full_name": "hessandrew\/CVE-2019-19231", - "owner": { - "login": "hessandrew", - "id": 45692132, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45692132?v=4", - "html_url": "https:\/\/github.com\/hessandrew" - }, - "html_url": "https:\/\/github.com\/hessandrew\/CVE-2019-19231", - "description": "https:\/\/techdocs.broadcom.com\/us\/product-content\/recommended-reading\/security-notices\/CA20191218-01-security-notice-for-ca-client-automation-agent-for-windows.html", - "fork": false, - "created_at": "2019-12-21T09:23:51Z", - "updated_at": "2019-12-22T15:02:16Z", - "pushed_at": "2019-12-21T09:23:53Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19268.json b/2019/CVE-2019-19268.json deleted file mode 100644 index 740085582f..0000000000 --- a/2019/CVE-2019-19268.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 223930097, - "name": "CVE-2019-19268", - "full_name": "TheCyberGeek\/CVE-2019-19268", - "owner": { - "login": "TheCyberGeek", - "id": 52138157, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52138157?v=4", - "html_url": "https:\/\/github.com\/TheCyberGeek" - }, - "html_url": "https:\/\/github.com\/TheCyberGeek\/CVE-2019-19268", - "description": "New Found 0-days!", - "fork": false, - "created_at": "2019-11-25T11:14:26Z", - "updated_at": "2020-10-18T15:46:08Z", - "pushed_at": "2019-12-04T10:14:51Z", - "stargazers_count": 35, - "watchers_count": 35, - "forks_count": 2, - "forks": 2, - "watchers": 35, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19315.json b/2019/CVE-2019-19315.json deleted file mode 100644 index f2f76882ca..0000000000 --- a/2019/CVE-2019-19315.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 228518016, - "name": "mailorder", - "full_name": "monoxgas\/mailorder", - "owner": { - "login": "monoxgas", - "id": 1223016, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1223016?v=4", - "html_url": "https:\/\/github.com\/monoxgas" - }, - "html_url": "https:\/\/github.com\/monoxgas\/mailorder", - "description": "Nalpeiron Licensing Service (NLSSRV32) arbitrary disk read [CVE-2019-19315]", - "fork": false, - "created_at": "2019-12-17T02:41:20Z", - "updated_at": "2019-12-18T02:11:23Z", - "pushed_at": "2019-12-17T03:54:25Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 1, - "forks": 1, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19633.json b/2019/CVE-2019-19633.json deleted file mode 100644 index 34a94ae94d..0000000000 --- a/2019/CVE-2019-19633.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 226651422, - "name": "CVE-2019-19633", - "full_name": "jra89\/CVE-2019-19633", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19633", - "description": "lib\/G\/functions.php in Chevereto 1.0.0 through 1.1.4 Free, and through 3.13.5 Core, allows an attacker to perform bruteforce attacks without triggering the implemented protection mechanism by manipulating the X-Forwarded-For header in the request.", - "fork": false, - "created_at": "2019-12-08T10:42:28Z", - "updated_at": "2020-01-11T13:35:20Z", - "pushed_at": "2019-12-21T12:35:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19634.json b/2019/CVE-2019-19634.json deleted file mode 100644 index 7fb677bba3..0000000000 --- a/2019/CVE-2019-19634.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 226651675, - "name": "CVE-2019-19634", - "full_name": "jra89\/CVE-2019-19634", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19634", - "description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4", - "fork": false, - "created_at": "2019-12-08T10:44:51Z", - "updated_at": "2020-12-07T21:45:52Z", - "pushed_at": "2019-12-08T17:55:01Z", - "stargazers_count": 36, - "watchers_count": 36, - "forks_count": 11, - "forks": 11, - "watchers": 36, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19651.json b/2019/CVE-2019-19651.json deleted file mode 100644 index 668f6d806e..0000000000 --- a/2019/CVE-2019-19651.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 227379066, - "name": "CVE-2019-19651", - "full_name": "jra89\/CVE-2019-19651", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19651", - "description": "Chevereto reflected XSS in Website Name - 1.0.0 - 1.1.4 Free, <= 3.13.5 Core", - "fork": false, - "created_at": "2019-12-11T14:00:32Z", - "updated_at": "2020-08-27T17:38:10Z", - "pushed_at": "2019-12-11T14:11:56Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19652.json b/2019/CVE-2019-19652.json deleted file mode 100644 index 3bd5716c1d..0000000000 --- a/2019/CVE-2019-19652.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 227375117, - "name": "CVE-2019-19652", - "full_name": "jra89\/CVE-2019-19652", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19652", - "description": "Chevereto downgrade attack - 1.0.0 - 1.1.4 Free, <= 3.13.5 Core", - "fork": false, - "created_at": "2019-12-11T13:42:18Z", - "updated_at": "2020-01-11T13:36:18Z", - "pushed_at": "2019-12-11T14:41:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19658.json b/2019/CVE-2019-19658.json deleted file mode 100644 index 10bbfee539..0000000000 --- a/2019/CVE-2019-19658.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 227381894, - "name": "CVE-2019-19658", - "full_name": "jra89\/CVE-2019-19658", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19658", - "description": "Chevereto stored XSS in profile page - 1.0.0 - 1.1.4 Free, <= 3.13.5 Core", - "fork": false, - "created_at": "2019-12-11T14:13:51Z", - "updated_at": "2020-01-11T13:35:52Z", - "pushed_at": "2019-12-12T12:07:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19732.json b/2019/CVE-2019-19732.json deleted file mode 100644 index d39092394d..0000000000 --- a/2019/CVE-2019-19732.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 227598056, - "name": "CVE-2019-19732", - "full_name": "jra89\/CVE-2019-19732", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19732", - "description": "Yetishare SQL Injection (sSortDir_0) - v3.5.2 - v4.5.3", - "fork": false, - "created_at": "2019-12-12T12:08:49Z", - "updated_at": "2020-02-15T22:37:58Z", - "pushed_at": "2019-12-12T14:30:01Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 1, - "forks": 1, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19733.json b/2019/CVE-2019-19733.json deleted file mode 100644 index a5127dbcf4..0000000000 --- a/2019/CVE-2019-19733.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 228708634, - "name": "CVE-2019-19733", - "full_name": "jra89\/CVE-2019-19733", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19733", - "description": "YetiShare v3.5.2 - v4.5.3 Cross-site scripting in get_all_file_server_paths.ajax.php", - "fork": false, - "created_at": "2019-12-17T21:56:56Z", - "updated_at": "2019-12-23T08:51:49Z", - "pushed_at": "2019-12-17T22:01:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19734.json b/2019/CVE-2019-19734.json deleted file mode 100644 index 2a20fb4cd3..0000000000 --- a/2019/CVE-2019-19734.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 227626239, - "name": "CVE-2019-19734", - "full_name": "jra89\/CVE-2019-19734", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19734", - "description": "YetiShare SQL Injection in the fileIds parameter in _account_move_file_in_folder.ajax.php - v3.5.2", - "fork": false, - "created_at": "2019-12-12T14:31:49Z", - "updated_at": "2019-12-23T08:52:10Z", - "pushed_at": "2019-12-12T14:34:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19735.json b/2019/CVE-2019-19735.json deleted file mode 100644 index d52c6d7b1a..0000000000 --- a/2019/CVE-2019-19735.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 227595700, - "name": "CVE-2019-19735", - "full_name": "jra89\/CVE-2019-19735", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19735", - "description": "YetiShare password reset hash bruteforce - v3.5.2 - v4.5.3", - "fork": false, - "created_at": "2019-12-12T11:56:00Z", - "updated_at": "2019-12-23T08:51:01Z", - "pushed_at": "2019-12-21T00:04:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19738.json b/2019/CVE-2019-19738.json deleted file mode 100644 index 029da0d134..0000000000 --- a/2019/CVE-2019-19738.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 228709394, - "name": "CVE-2019-19738", - "full_name": "jra89\/CVE-2019-19738", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19738", - "description": "YetiShare v3.5.2 - v4.5.3 Cross-site scripting in log_file_viewer.php", - "fork": false, - "created_at": "2019-12-17T22:02:40Z", - "updated_at": "2019-12-23T08:51:28Z", - "pushed_at": "2019-12-17T22:04:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19844.json b/2019/CVE-2019-19844.json index 08e4613dcd..d330d285a2 100644 --- a/2019/CVE-2019-19844.json +++ b/2019/CVE-2019-19844.json @@ -1,27 +1,4 @@ [ - { - "id": 229376107, - "name": "django_cve_2019_19844_poc", - "full_name": "ryu22e\/django_cve_2019_19844_poc", - "owner": { - "login": "ryu22e", - "id": 301892, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/301892?v=4", - "html_url": "https:\/\/github.com\/ryu22e" - }, - "html_url": "https:\/\/github.com\/ryu22e\/django_cve_2019_19844_poc", - "description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)", - "fork": false, - "created_at": "2019-12-21T04:30:34Z", - "updated_at": "2021-05-31T13:23:17Z", - "pushed_at": "2019-12-24T12:31:47Z", - "stargazers_count": 94, - "watchers_count": 94, - "forks_count": 7, - "forks": 7, - "watchers": 94, - "score": 0 - }, { "id": 230083007, "name": "django_cve201919844", diff --git a/2019/CVE-2019-2107.json b/2019/CVE-2019-2107.json index 364752b77d..0e546ac17d 100644 --- a/2019/CVE-2019-2107.json +++ b/2019/CVE-2019-2107.json @@ -21,28 +21,5 @@ "forks": 96, "watchers": 309, "score": 0 - }, - { - "id": 199203476, - "name": "CVE-2019-2107", - "full_name": "infiniteLoopers\/CVE-2019-2107", - "owner": { - "login": "infiniteLoopers", - "id": 27885817, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27885817?v=4", - "html_url": "https:\/\/github.com\/infiniteLoopers" - }, - "html_url": "https:\/\/github.com\/infiniteLoopers\/CVE-2019-2107", - "description": null, - "fork": false, - "created_at": "2019-07-27T19:03:27Z", - "updated_at": "2019-10-18T20:42:21Z", - "pushed_at": "2019-07-27T19:06:11Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 3, - "forks": 3, - "watchers": 4, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 46910d3a4d..4b97f7a1cd 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -1,73 +1,4 @@ [ - { - "id": 212750414, - "name": "CVE-2019-2215", - "full_name": "timwr\/CVE-2019-2215", - "owner": { - "login": "timwr", - "id": 684924, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4", - "html_url": "https:\/\/github.com\/timwr" - }, - "html_url": "https:\/\/github.com\/timwr\/CVE-2019-2215", - "description": null, - "fork": false, - "created_at": "2019-10-04T06:32:08Z", - "updated_at": "2021-05-04T20:59:30Z", - "pushed_at": "2019-11-12T03:58:00Z", - "stargazers_count": 63, - "watchers_count": 63, - "forks_count": 25, - "forks": 25, - "watchers": 63, - "score": 0 - }, - { - "id": 214570152, - "name": "CVE-2019-2215", - "full_name": "raystyle\/CVE-2019-2215", - "owner": { - "login": "raystyle", - "id": 3284570, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3284570?v=4", - "html_url": "https:\/\/github.com\/raystyle" - }, - "html_url": "https:\/\/github.com\/raystyle\/CVE-2019-2215", - "description": null, - "fork": false, - "created_at": "2019-10-12T03:22:27Z", - "updated_at": "2020-09-08T02:32:35Z", - "pushed_at": "2019-10-09T06:32:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 215104992, - "name": "cve-2019-2215", - "full_name": "kangtastic\/cve-2019-2215", - "owner": { - "login": "kangtastic", - "id": 942136, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/942136?v=4", - "html_url": "https:\/\/github.com\/kangtastic" - }, - "html_url": "https:\/\/github.com\/kangtastic\/cve-2019-2215", - "description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215", - "fork": false, - "created_at": "2019-10-14T17:27:37Z", - "updated_at": "2021-06-04T21:15:20Z", - "pushed_at": "2019-10-15T01:04:08Z", - "stargazers_count": 69, - "watchers_count": 69, - "forks_count": 45, - "forks": 45, - "watchers": 69, - "score": 0 - }, { "id": 215531522, "name": "CVE-2019-2215", diff --git a/2019/CVE-2019-2525.json b/2019/CVE-2019-2525.json index 6f999a2994..8e528b3b0d 100644 --- a/2019/CVE-2019-2525.json +++ b/2019/CVE-2019-2525.json @@ -1,27 +1,4 @@ [ - { - "id": 200009594, - "name": "VirtualBox_CVE-2019-2525-CVE-2019-2548", - "full_name": "Phantomn\/VirtualBox_CVE-2019-2525-CVE-2019-2548", - "owner": { - "login": "Phantomn", - "id": 14885058, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14885058?v=4", - "html_url": "https:\/\/github.com\/Phantomn" - }, - "html_url": "https:\/\/github.com\/Phantomn\/VirtualBox_CVE-2019-2525-CVE-2019-2548", - "description": null, - "fork": false, - "created_at": "2019-08-01T08:25:53Z", - "updated_at": "2019-08-02T07:08:06Z", - "pushed_at": "2019-08-02T07:08:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, { "id": 200372787, "name": "VirtualBox-6.0.0-Exploit-1-day", diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 7333f9e0e7..fb0de887b0 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -91,52 +91,6 @@ "watchers": 769, "score": 0 }, - { - "id": 219771562, - "name": "cve-2019-2618", - "full_name": "he1dan\/cve-2019-2618", - "owner": { - "login": "he1dan", - "id": 48038929, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48038929?v=4", - "html_url": "https:\/\/github.com\/he1dan" - }, - "html_url": "https:\/\/github.com\/he1dan\/cve-2019-2618", - "description": "自用验证", - "fork": false, - "created_at": "2019-11-05T14:57:23Z", - "updated_at": "2019-11-06T02:55:47Z", - "pushed_at": "2019-11-05T14:59:11Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 222606343, - "name": "cve-2019-2618", - "full_name": "ianxtianxt\/cve-2019-2618", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/cve-2019-2618", - "description": "cve-2019-2618 需要用户名密码", - "fork": false, - "created_at": "2019-11-19T04:12:39Z", - "updated_at": "2020-07-03T04:04:02Z", - "pushed_at": "2019-11-19T04:13:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 3, - "forks": 3, - "watchers": 1, - "score": 0 - }, { "id": 233997916, "name": "weblogicScanner", @@ -151,13 +105,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-06-18T03:28:34Z", + "updated_at": "2021-06-18T23:08:29Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1070, - "watchers_count": 1070, + "stargazers_count": 1071, + "watchers_count": 1071, "forks_count": 238, "forks": 238, - "watchers": 1070, + "watchers": 1071, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 0028a91394..3e4aef50e0 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -321,75 +321,6 @@ "watchers": 61, "score": 0 }, - { - "id": 203902761, - "name": "CVE-2019-2725", - "full_name": "pimps\/CVE-2019-2725", - "owner": { - "login": "pimps", - "id": 11393266, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11393266?v=4", - "html_url": "https:\/\/github.com\/pimps" - }, - "html_url": "https:\/\/github.com\/pimps\/CVE-2019-2725", - "description": "WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit ", - "fork": false, - "created_at": "2019-08-23T01:42:57Z", - "updated_at": "2021-01-25T14:53:33Z", - "pushed_at": "2019-09-26T05:46:14Z", - "stargazers_count": 38, - "watchers_count": 38, - "forks_count": 10, - "forks": 10, - "watchers": 38, - "score": 0 - }, - { - "id": 219766632, - "name": "CVE-2019-2725", - "full_name": "ianxtianxt\/CVE-2019-2725", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-2725", - "description": "CVE-2019-2725", - "fork": false, - "created_at": "2019-11-05T14:35:16Z", - "updated_at": "2020-10-13T07:27:48Z", - "pushed_at": "2019-11-05T14:35:53Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 2, - "forks": 2, - "watchers": 3, - "score": 0 - }, - { - "id": 227509207, - "name": "CVE-2019-2725-POC", - "full_name": "N0b1e6\/CVE-2019-2725-POC", - "owner": { - "login": "N0b1e6", - "id": 46476997, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46476997?v=4", - "html_url": "https:\/\/github.com\/N0b1e6" - }, - "html_url": "https:\/\/github.com\/N0b1e6\/CVE-2019-2725-POC", - "description": "CVE-2019-2725-POC", - "fork": false, - "created_at": "2019-12-12T03:09:23Z", - "updated_at": "2019-12-12T03:11:14Z", - "pushed_at": "2019-12-12T03:11:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 232495610, "name": "weblogic_2019_2725_wls_batch", diff --git a/2019/CVE-2019-2888.json b/2019/CVE-2019-2888.json deleted file mode 100644 index 03e8c979e6..0000000000 --- a/2019/CVE-2019-2888.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 219025202, - "name": "CVE-2019-2888", - "full_name": "jas502n\/CVE-2019-2888", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-2888", - "description": "WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)", - "fork": false, - "created_at": "2019-11-01T16:44:51Z", - "updated_at": "2021-04-08T03:38:31Z", - "pushed_at": "2019-11-02T10:47:46Z", - "stargazers_count": 39, - "watchers_count": 39, - "forks_count": 17, - "forks": 17, - "watchers": 39, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-2890.json b/2019/CVE-2019-2890.json index 1cacf9d6f4..928186b5d1 100644 --- a/2019/CVE-2019-2890.json +++ b/2019/CVE-2019-2890.json @@ -1,142 +1,4 @@ [ - { - "id": 215688965, - "name": "CVE-2019-2890", - "full_name": "ZO1RO\/CVE-2019-2890", - "owner": { - "login": "ZO1RO", - "id": 39914312, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39914312?v=4", - "html_url": "https:\/\/github.com\/ZO1RO" - }, - "html_url": "https:\/\/github.com\/ZO1RO\/CVE-2019-2890", - "description": "CVE-2019-2890 Exploit for WebLogic with T3", - "fork": false, - "created_at": "2019-10-17T02:46:00Z", - "updated_at": "2020-10-31T03:19:04Z", - "pushed_at": "2019-10-17T01:25:41Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 29, - "forks": 29, - "watchers": 11, - "score": 0 - }, - { - "id": 218243263, - "name": "CVE-2019-2890", - "full_name": "Ky0-HVA\/CVE-2019-2890", - "owner": { - "login": "Ky0-HVA", - "id": 5560146, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5560146?v=4", - "html_url": "https:\/\/github.com\/Ky0-HVA" - }, - "html_url": "https:\/\/github.com\/Ky0-HVA\/CVE-2019-2890", - "description": "Clone code from https:\/\/github.com\/v-gift\/CVE-2019-2890", - "fork": false, - "created_at": "2019-10-29T08:53:28Z", - "updated_at": "2019-11-01T16:56:11Z", - "pushed_at": "2019-10-29T08:57:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 218738609, - "name": "weblogic_cve-2019-2890", - "full_name": "freeide\/weblogic_cve-2019-2890", - "owner": { - "login": "freeide", - "id": 33774184, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33774184?v=4", - "html_url": "https:\/\/github.com\/freeide" - }, - "html_url": "https:\/\/github.com\/freeide\/weblogic_cve-2019-2890", - "description": "weblogic_cve-2019-2890", - "fork": false, - "created_at": "2019-10-31T10:17:07Z", - "updated_at": "2021-04-18T11:06:26Z", - "pushed_at": "2019-10-28T06:13:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 226284594, - "name": "CVE-2019-2890", - "full_name": "SukaraLin\/CVE-2019-2890", - "owner": { - "login": "SukaraLin", - "id": 27796303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27796303?v=4", - "html_url": "https:\/\/github.com\/SukaraLin" - }, - "html_url": "https:\/\/github.com\/SukaraLin\/CVE-2019-2890", - "description": null, - "fork": false, - "created_at": "2019-12-06T08:46:31Z", - "updated_at": "2020-11-27T18:19:32Z", - "pushed_at": "2019-12-06T09:18:56Z", - "stargazers_count": 86, - "watchers_count": 86, - "forks_count": 24, - "forks": 24, - "watchers": 86, - "score": 0 - }, - { - "id": 226617297, - "name": "CVE-2019-2890", - "full_name": "jas502n\/CVE-2019-2890", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-2890", - "description": "CVE-2019-2890 WebLogic 反序列化RCE漏洞", - "fork": false, - "created_at": "2019-12-08T05:03:32Z", - "updated_at": "2021-02-24T06:35:56Z", - "pushed_at": "2019-12-08T05:50:42Z", - "stargazers_count": 38, - "watchers_count": 38, - "forks_count": 5, - "forks": 5, - "watchers": 38, - "score": 0 - }, - { - "id": 227987309, - "name": "CVE-2019-2890", - "full_name": "ianxtianxt\/CVE-2019-2890", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-2890", - "description": "0-sec.org", - "fork": false, - "created_at": "2019-12-14T08:01:53Z", - "updated_at": "2020-07-03T03:59:12Z", - "pushed_at": "2019-12-14T08:04:01Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 2, - "forks": 2, - "watchers": 5, - "score": 0 - }, { "id": 286429427, "name": "Weblogic_Vuln", diff --git a/2019/CVE-2019-3394.json b/2019/CVE-2019-3394.json deleted file mode 100644 index 8ff4bdf62b..0000000000 --- a/2019/CVE-2019-3394.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 205331614, - "name": "CVE-2019-3394", - "full_name": "jas502n\/CVE-2019-3394", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-3394", - "description": "Confluence(\/confluence\/WEB-INF\/)文件读取漏洞", - "fork": false, - "created_at": "2019-08-30T07:44:17Z", - "updated_at": "2020-06-17T22:26:17Z", - "pushed_at": "2019-09-02T13:37:00Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 6, - "forks": 6, - "watchers": 15, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index 181c53aa6e..5661423333 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -206,52 +206,6 @@ "watchers": 0, "score": 0 }, - { - "id": 194643451, - "name": "test1", - "full_name": "tanw923\/test1", - "owner": { - "login": "tanw923", - "id": 49778932, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49778932?v=4", - "html_url": "https:\/\/github.com\/tanw923" - }, - "html_url": "https:\/\/github.com\/tanw923\/test1", - "description": "https:\/\/github.com\/Yt1g3r\/CVE-2019-3396_EXP.git", - "fork": false, - "created_at": "2019-07-01T09:35:17Z", - "updated_at": "2019-07-02T15:24:32Z", - "pushed_at": "2019-07-02T15:24:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 203499284, - "name": "CVE-2019-3396-confluence-poc", - "full_name": "skommando\/CVE-2019-3396-confluence-poc", - "owner": { - "login": "skommando", - "id": 22767889, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22767889?v=4", - "html_url": "https:\/\/github.com\/skommando" - }, - "html_url": "https:\/\/github.com\/skommando\/CVE-2019-3396-confluence-poc", - "description": "CVE-2019-3396 漏洞验证txt与模板文件。", - "fork": false, - "created_at": "2019-08-21T03:30:53Z", - "updated_at": "2019-08-21T06:10:16Z", - "pushed_at": "2019-08-21T06:09:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 218002069, "name": "CVE-2019-3396TEST", @@ -275,52 +229,6 @@ "watchers": 0, "score": 0 }, - { - "id": 223076925, - "name": "CVE-2019-3396", - "full_name": "am6539\/CVE-2019-3396", - "owner": { - "login": "am6539", - "id": 19407692, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19407692?v=4", - "html_url": "https:\/\/github.com\/am6539" - }, - "html_url": "https:\/\/github.com\/am6539\/CVE-2019-3396", - "description": null, - "fork": false, - "created_at": "2019-11-21T03:07:08Z", - "updated_at": "2019-11-21T03:18:13Z", - "pushed_at": "2019-11-21T03:18:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 227548353, - "name": "CVE-2019-3396", - "full_name": "W2Ning\/CVE-2019-3396", - "owner": { - "login": "W2Ning", - "id": 33406415, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33406415?v=4", - "html_url": "https:\/\/github.com\/W2Ning" - }, - "html_url": "https:\/\/github.com\/W2Ning\/CVE-2019-3396", - "description": "For test", - "fork": false, - "created_at": "2019-12-12T07:40:22Z", - "updated_at": "2019-12-13T08:59:05Z", - "pushed_at": "2019-12-13T08:59:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, { "id": 313479621, "name": "cve-2019-3396", diff --git a/2019/CVE-2019-3778.json b/2019/CVE-2019-3778.json deleted file mode 100644 index a12b1a5c7e..0000000000 --- a/2019/CVE-2019-3778.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 214928698, - "name": "CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection", - "full_name": "BBB-man\/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection", - "owner": { - "login": "BBB-man", - "id": 21234393, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21234393?v=4", - "html_url": "https:\/\/github.com\/BBB-man" - }, - "html_url": "https:\/\/github.com\/BBB-man\/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection", - "description": "Spring Security OAuth 2.3 Open Redirection 分析复现篇", - "fork": false, - "created_at": "2019-10-14T02:15:39Z", - "updated_at": "2019-10-14T02:20:07Z", - "pushed_at": "2019-10-14T02:20:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-3929.json b/2019/CVE-2019-3929.json deleted file mode 100644 index 93f4b90566..0000000000 --- a/2019/CVE-2019-3929.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 209102630, - "name": "CVE-2019-3929", - "full_name": "xfox64x\/CVE-2019-3929", - "owner": { - "login": "xfox64x", - "id": 11416821, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11416821?v=4", - "html_url": "https:\/\/github.com\/xfox64x" - }, - "html_url": "https:\/\/github.com\/xfox64x\/CVE-2019-3929", - "description": "Crestron\/Barco\/Extron\/InFocus\/TeqAV Remote Command Injection (CVE-2019-3929) Metasploit Module", - "fork": false, - "created_at": "2019-09-17T16:23:04Z", - "updated_at": "2019-11-25T21:43:58Z", - "pushed_at": "2019-11-25T21:17:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, - "forks": 2, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-5418.json b/2019/CVE-2019-5418.json index 88ca2e1ec4..189bb13760 100644 --- a/2019/CVE-2019-5418.json +++ b/2019/CVE-2019-5418.json @@ -136,51 +136,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 212888337, - "name": "CVE-2019-5418-Rails3", - "full_name": "ztgrace\/CVE-2019-5418-Rails3", - "owner": { - "login": "ztgrace", - "id": 2554037, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2554037?v=4", - "html_url": "https:\/\/github.com\/ztgrace" - }, - "html_url": "https:\/\/github.com\/ztgrace\/CVE-2019-5418-Rails3", - "description": "Rails 3 PoC of CVE-2019-5418", - "fork": false, - "created_at": "2019-10-04T19:28:10Z", - "updated_at": "2019-10-04T19:29:56Z", - "pushed_at": "2019-10-04T19:29:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 222660643, - "name": "CVE-2019-5418", - "full_name": "random-robbie\/CVE-2019-5418", - "owner": { - "login": "random-robbie", - "id": 4902869, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4", - "html_url": "https:\/\/github.com\/random-robbie" - }, - "html_url": "https:\/\/github.com\/random-robbie\/CVE-2019-5418", - "description": null, - "fork": false, - "created_at": "2019-11-19T09:40:06Z", - "updated_at": "2021-04-26T19:41:51Z", - "pushed_at": "2019-11-19T09:41:18Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 1, - "forks": 1, - "watchers": 5, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5475.json b/2019/CVE-2019-5475.json index 4272ab410e..f350d356e8 100644 --- a/2019/CVE-2019-5475.json +++ b/2019/CVE-2019-5475.json @@ -1,27 +1,4 @@ [ - { - "id": 210890120, - "name": "CVE-2019-5475-Nexus-Repository-Manager-", - "full_name": "jaychouzzk\/CVE-2019-5475-Nexus-Repository-Manager-", - "owner": { - "login": "jaychouzzk", - "id": 45549315, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45549315?v=4", - "html_url": "https:\/\/github.com\/jaychouzzk" - }, - "html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-5475-Nexus-Repository-Manager-", - "description": null, - "fork": false, - "created_at": "2019-09-25T16:22:56Z", - "updated_at": "2020-09-06T01:27:36Z", - "pushed_at": "2019-09-25T16:33:53Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 5, - "forks": 5, - "watchers": 6, - "score": 0 - }, { "id": 255116667, "name": "CVE-2019-5475-EXP", diff --git a/2019/CVE-2019-5489.json b/2019/CVE-2019-5489.json deleted file mode 100644 index 5d286ad241..0000000000 --- a/2019/CVE-2019-5489.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 226253609, - "name": "CVE-2019-5489", - "full_name": "mmxsrup\/CVE-2019-5489", - "owner": { - "login": "mmxsrup", - "id": 19609323, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19609323?v=4", - "html_url": "https:\/\/github.com\/mmxsrup" - }, - "html_url": "https:\/\/github.com\/mmxsrup\/CVE-2019-5489", - "description": "Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux", - "fork": false, - "created_at": "2019-12-06T05:37:08Z", - "updated_at": "2020-10-15T12:08:59Z", - "pushed_at": "2019-12-19T02:09:27Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, - "forks": 0, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-5700.json b/2019/CVE-2019-5700.json deleted file mode 100644 index 6dfda35bd3..0000000000 --- a/2019/CVE-2019-5700.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 226178220, - "name": "CVE-2019-5700", - "full_name": "oscardagrach\/CVE-2019-5700", - "owner": { - "login": "oscardagrach", - "id": 17905072, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17905072?v=4", - "html_url": "https:\/\/github.com\/oscardagrach" - }, - "html_url": "https:\/\/github.com\/oscardagrach\/CVE-2019-5700", - "description": "CVE-2019-5700", - "fork": false, - "created_at": "2019-12-05T19:54:33Z", - "updated_at": "2020-07-16T05:38:36Z", - "pushed_at": "2019-12-05T21:36:42Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 0, - "forks": 0, - "watchers": 10, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index a7d35a651c..85662bdfc8 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -344,75 +344,6 @@ "watchers": 0, "score": 0 }, - { - "id": 200632359, - "name": "cve-2019-5736-study", - "full_name": "Lee-SungYoung\/cve-2019-5736-study", - "owner": { - "login": "Lee-SungYoung", - "id": 34130740, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34130740?v=4", - "html_url": "https:\/\/github.com\/Lee-SungYoung" - }, - "html_url": "https:\/\/github.com\/Lee-SungYoung\/cve-2019-5736-study", - "description": null, - "fork": false, - "created_at": "2019-08-05T10:15:52Z", - "updated_at": "2019-08-05T10:16:32Z", - "pushed_at": "2019-08-05T10:16:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 214599324, - "name": "cve-2019-5736-poc", - "full_name": "chosam2\/cve-2019-5736-poc", - "owner": { - "login": "chosam2", - "id": 40632767, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40632767?v=4", - "html_url": "https:\/\/github.com\/chosam2" - }, - "html_url": "https:\/\/github.com\/chosam2\/cve-2019-5736-poc", - "description": null, - "fork": false, - "created_at": "2019-10-12T07:22:57Z", - "updated_at": "2019-11-16T09:01:20Z", - "pushed_at": "2019-11-16T09:01:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 227655174, - "name": "Docker-Escape-Miner", - "full_name": "epsteina16\/Docker-Escape-Miner", - "owner": { - "login": "epsteina16", - "id": 14108788, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14108788?v=4", - "html_url": "https:\/\/github.com\/epsteina16" - }, - "html_url": "https:\/\/github.com\/epsteina16\/Docker-Escape-Miner", - "description": "Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user.", - "fork": false, - "created_at": "2019-12-12T16:57:13Z", - "updated_at": "2020-11-25T06:50:26Z", - "pushed_at": "2019-12-12T16:58:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 238321546, "name": "CVE-2019-5736-Custom-Runtime", diff --git a/2019/CVE-2019-5782.json b/2019/CVE-2019-5782.json index 096db891c0..14067d5e9f 100644 --- a/2019/CVE-2019-5782.json +++ b/2019/CVE-2019-5782.json @@ -13,13 +13,13 @@ "description": "Full chain Chrome 71.0.3578.98 exploit", "fork": false, "created_at": "2020-12-18T21:57:26Z", - "updated_at": "2021-06-18T21:02:13Z", + "updated_at": "2021-06-18T23:04:37Z", "pushed_at": "2020-12-18T22:12:57Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 0, "forks": 0, - "watchers": 13, + "watchers": 14, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5825.json b/2019/CVE-2019-5825.json deleted file mode 100644 index fa6bcbfa5d..0000000000 --- a/2019/CVE-2019-5825.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 223578530, - "name": "CVE-2019-5825", - "full_name": "timwr\/CVE-2019-5825", - "owner": { - "login": "timwr", - "id": 684924, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4", - "html_url": "https:\/\/github.com\/timwr" - }, - "html_url": "https:\/\/github.com\/timwr\/CVE-2019-5825", - "description": null, - "fork": false, - "created_at": "2019-11-23T11:35:34Z", - "updated_at": "2021-05-07T03:03:10Z", - "pushed_at": "2019-11-25T06:09:35Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 4, - "forks": 4, - "watchers": 6, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-6225.json b/2019/CVE-2019-6225.json index 215af62295..c1bbb1a3de 100644 --- a/2019/CVE-2019-6225.json +++ b/2019/CVE-2019-6225.json @@ -44,28 +44,5 @@ "forks": 2, "watchers": 2, "score": 0 - }, - { - "id": 201224192, - "name": "jailbreak-iOS12", - "full_name": "raystyle\/jailbreak-iOS12", - "owner": { - "login": "raystyle", - "id": 3284570, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3284570?v=4", - "html_url": "https:\/\/github.com\/raystyle" - }, - "html_url": "https:\/\/github.com\/raystyle\/jailbreak-iOS12", - "description": "OS 12.0 & 12.1.2 - Jailbreak with CVE-2019-6225", - "fork": false, - "created_at": "2019-08-08T09:22:57Z", - "updated_at": "2019-09-28T04:38:14Z", - "pushed_at": "2019-02-27T12:57:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-6329.json b/2019/CVE-2019-6329.json deleted file mode 100644 index e98f01eeae..0000000000 --- a/2019/CVE-2019-6329.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 214792106, - "name": "CVE-2019-6329", - "full_name": "ManhNDd\/CVE-2019-6329", - "owner": { - "login": "ManhNDd", - "id": 18594865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18594865?v=4", - "html_url": "https:\/\/github.com\/ManhNDd" - }, - "html_url": "https:\/\/github.com\/ManhNDd\/CVE-2019-6329", - "description": "Local Privilege Escalation in HP Support Assistant", - "fork": false, - "created_at": "2019-10-13T09:20:16Z", - "updated_at": "2019-12-03T08:44:30Z", - "pushed_at": "2019-11-20T10:28:12Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-6715.json b/2019/CVE-2019-6715.json deleted file mode 100644 index 57bce4cece..0000000000 --- a/2019/CVE-2019-6715.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 221241280, - "name": "cve-2019-6715", - "full_name": "random-robbie\/cve-2019-6715", - "owner": { - "login": "random-robbie", - "id": 4902869, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4", - "html_url": "https:\/\/github.com\/random-robbie" - }, - "html_url": "https:\/\/github.com\/random-robbie\/cve-2019-6715", - "description": null, - "fork": false, - "created_at": "2019-11-12T14:47:25Z", - "updated_at": "2021-04-26T19:41:57Z", - "pushed_at": "2019-11-12T14:54:10Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 2, - "forks": 2, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json index ea62272596..2f3f7b77d1 100644 --- a/2019/CVE-2019-7238.json +++ b/2019/CVE-2019-7238.json @@ -45,29 +45,6 @@ "watchers": 62, "score": 0 }, - { - "id": 199046172, - "name": "nexus_rce_CVE-2019-7238", - "full_name": "verctor\/nexus_rce_CVE-2019-7238", - "owner": { - "login": "verctor", - "id": 24811125, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24811125?v=4", - "html_url": "https:\/\/github.com\/verctor" - }, - "html_url": "https:\/\/github.com\/verctor\/nexus_rce_CVE-2019-7238", - "description": "Some debug notes and exploit(not blind)", - "fork": false, - "created_at": "2019-07-26T16:08:40Z", - "updated_at": "2021-04-09T08:01:11Z", - "pushed_at": "2019-07-28T02:32:07Z", - "stargazers_count": 37, - "watchers_count": 37, - "forks_count": 7, - "forks": 7, - "watchers": 37, - "score": 0 - }, { "id": 233010845, "name": "CVE-2019-7238_Nexus_RCE_Tool", diff --git a/2019/CVE-2019-7609.json b/2019/CVE-2019-7609.json index 6ed756d0da..3ae04462aa 100644 --- a/2019/CVE-2019-7609.json +++ b/2019/CVE-2019-7609.json @@ -1,96 +1,4 @@ [ - { - "id": 215933649, - "name": "kibana-RCE", - "full_name": "jas502n\/kibana-RCE", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/kibana-RCE", - "description": "kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609", - "fork": false, - "created_at": "2019-10-18T03:25:22Z", - "updated_at": "2021-03-31T12:57:07Z", - "pushed_at": "2019-10-22T06:44:20Z", - "stargazers_count": 85, - "watchers_count": 85, - "forks_count": 17, - "forks": 17, - "watchers": 85, - "score": 0 - }, - { - "id": 216505019, - "name": "CVE-2019-7609", - "full_name": "mpgn\/CVE-2019-7609", - "owner": { - "login": "mpgn", - "id": 5891788, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4", - "html_url": "https:\/\/github.com\/mpgn" - }, - "html_url": "https:\/\/github.com\/mpgn\/CVE-2019-7609", - "description": "RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer", - "fork": false, - "created_at": "2019-10-21T07:32:31Z", - "updated_at": "2021-01-01T10:01:26Z", - "pushed_at": "2019-12-20T14:28:44Z", - "stargazers_count": 35, - "watchers_count": 35, - "forks_count": 10, - "forks": 10, - "watchers": 35, - "score": 0 - }, - { - "id": 216602890, - "name": "CVE-2019-7609", - "full_name": "LandGrey\/CVE-2019-7609", - "owner": { - "login": "LandGrey", - "id": 16769779, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16769779?v=4", - "html_url": "https:\/\/github.com\/LandGrey" - }, - "html_url": "https:\/\/github.com\/LandGrey\/CVE-2019-7609", - "description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts", - "fork": false, - "created_at": "2019-10-21T15:31:13Z", - "updated_at": "2021-05-26T09:55:01Z", - "pushed_at": "2019-10-23T07:10:35Z", - "stargazers_count": 113, - "watchers_count": 113, - "forks_count": 43, - "forks": 43, - "watchers": 113, - "score": 0 - }, - { - "id": 225175128, - "name": "CVE-2019-7609", - "full_name": "hekadan\/CVE-2019-7609", - "owner": { - "login": "hekadan", - "id": 57190788, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57190788?v=4", - "html_url": "https:\/\/github.com\/hekadan" - }, - "html_url": "https:\/\/github.com\/hekadan\/CVE-2019-7609", - "description": null, - "fork": false, - "created_at": "2019-12-01T14:29:22Z", - "updated_at": "2020-04-28T02:57:04Z", - "pushed_at": "2019-12-01T14:34:37Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 2, - "forks": 2, - "watchers": 19, - "score": 0 - }, { "id": 252699702, "name": "CVE-2019-7609", diff --git a/2019/CVE-2019-7610.json b/2019/CVE-2019-7610.json deleted file mode 100644 index 41702d7bab..0000000000 --- a/2019/CVE-2019-7610.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 219403020, - "name": "CVE-2019-7610", - "full_name": "whoami0622\/CVE-2019-7610", - "owner": { - "login": "whoami0622", - "id": 18344039, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18344039?v=4", - "html_url": "https:\/\/github.com\/whoami0622" - }, - "html_url": "https:\/\/github.com\/whoami0622\/CVE-2019-7610", - "description": null, - "fork": false, - "created_at": "2019-11-04T02:42:40Z", - "updated_at": "2020-06-19T09:31:43Z", - "pushed_at": "2019-10-30T18:00:12Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-7839.json b/2019/CVE-2019-7839.json deleted file mode 100644 index c8c7c34554..0000000000 --- a/2019/CVE-2019-7839.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 200336681, - "name": "CVE-2019-7839", - "full_name": "securifera\/CVE-2019-7839", - "owner": { - "login": "securifera", - "id": 12126525, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4", - "html_url": "https:\/\/github.com\/securifera" - }, - "html_url": "https:\/\/github.com\/securifera\/CVE-2019-7839", - "description": "CVE-2019-7839", - "fork": false, - "created_at": "2019-08-03T05:39:22Z", - "updated_at": "2020-03-30T03:50:21Z", - "pushed_at": "2019-08-03T05:47:59Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 4, - "forks": 4, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-8451.json b/2019/CVE-2019-8451.json deleted file mode 100644 index 2c491e1d76..0000000000 --- a/2019/CVE-2019-8451.json +++ /dev/null @@ -1,94 +0,0 @@ -[ - { - "id": 208774563, - "name": "CVE-2019-8451", - "full_name": "0xbug\/CVE-2019-8451", - "owner": { - "login": "0xbug", - "id": 12611275, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12611275?v=4", - "html_url": "https:\/\/github.com\/0xbug" - }, - "html_url": "https:\/\/github.com\/0xbug\/CVE-2019-8451", - "description": "https:\/\/jira.atlassian.com\/browse\/JRASERVER-69793", - "fork": false, - "created_at": "2019-09-16T10:39:40Z", - "updated_at": "2019-11-06T12:26:45Z", - "pushed_at": "2019-09-16T10:47:45Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 2, - "forks": 2, - "watchers": 10, - "score": 0 - }, - { - "id": 210587808, - "name": "CVE-2019-8451", - "full_name": "ianxtianxt\/CVE-2019-8451", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-8451", - "description": null, - "fork": false, - "created_at": "2019-09-24T11:38:20Z", - "updated_at": "2019-09-24T11:40:02Z", - "pushed_at": "2019-09-24T11:40:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 3, - "forks": 3, - "watchers": 0, - "score": 0 - }, - { - "id": 211003999, - "name": "CVE-2019-8451", - "full_name": "jas502n\/CVE-2019-8451", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-8451", - "description": "Jira未授权SSRF漏洞", - "fork": false, - "created_at": "2019-09-26T05:06:11Z", - "updated_at": "2021-06-18T13:22:39Z", - "pushed_at": "2019-09-30T01:45:50Z", - "stargazers_count": 27, - "watchers_count": 27, - "forks_count": 13, - "forks": 13, - "watchers": 27, - "score": 0 - }, - { - "id": 211424148, - "name": "Jira-CVE-2019-8451", - "full_name": "h0ffayyy\/Jira-CVE-2019-8451", - "owner": { - "login": "h0ffayyy", - "id": 6510183, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6510183?v=4", - "html_url": "https:\/\/github.com\/h0ffayyy" - }, - "html_url": "https:\/\/github.com\/h0ffayyy\/Jira-CVE-2019-8451", - "description": "POC to check for Jira instances vulnerable to CVE-2019-8451", - "fork": false, - "created_at": "2019-09-28T01:01:26Z", - "updated_at": "2021-06-18T13:20:20Z", - "pushed_at": "2019-09-28T03:13:25Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 5, - "forks": 5, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-8781.json b/2019/CVE-2019-8781.json deleted file mode 100644 index 5cd4e2383a..0000000000 --- a/2019/CVE-2019-8781.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 209122833, - "name": "macOS-Kernel-Exploit", - "full_name": "A2nkF\/macOS-Kernel-Exploit", - "owner": { - "login": "A2nkF", - "id": 30269068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30269068?v=4", - "html_url": "https:\/\/github.com\/A2nkF" - }, - "html_url": "https:\/\/github.com\/A2nkF\/macOS-Kernel-Exploit", - "description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :)", - "fork": false, - "created_at": "2019-09-17T17:59:26Z", - "updated_at": "2021-06-09T11:08:49Z", - "pushed_at": "2019-10-15T17:05:38Z", - "stargazers_count": 281, - "watchers_count": 281, - "forks_count": 45, - "forks": 45, - "watchers": 281, - "score": 0 - }, - { - "id": 217838487, - "name": "CVE-2019-8781-macOS", - "full_name": "TrungNguyen1909\/CVE-2019-8781-macOS", - "owner": { - "login": "TrungNguyen1909", - "id": 22745058, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22745058?v=4", - "html_url": "https:\/\/github.com\/TrungNguyen1909" - }, - "html_url": "https:\/\/github.com\/TrungNguyen1909\/CVE-2019-8781-macOS", - "description": "Exploit POC for the bug CVE-2019-8781, found by @LinusHenze", - "fork": false, - "created_at": "2019-10-27T10:28:35Z", - "updated_at": "2020-04-01T13:38:19Z", - "pushed_at": "2019-10-27T10:30:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-9670.json b/2019/CVE-2019-9670.json deleted file mode 100644 index ca2bb323f1..0000000000 --- a/2019/CVE-2019-9670.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 202659145, - "name": "Zimbra-RCE", - "full_name": "rek7\/Zimbra-RCE", - "owner": { - "login": "rek7", - "id": 25335191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25335191?v=4", - "html_url": "https:\/\/github.com\/rek7" - }, - "html_url": "https:\/\/github.com\/rek7\/Zimbra-RCE", - "description": "Zimbra RCE PoC - CVE-2019-9670 XXE\/SSRF", - "fork": false, - "created_at": "2019-08-16T04:37:11Z", - "updated_at": "2021-03-21T04:02:58Z", - "pushed_at": "2019-08-16T05:54:16Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 12, - "forks": 12, - "watchers": 15, - "score": 0 - }, - { - "id": 202751712, - "name": "Zimbra-RCE", - "full_name": "attackgithub\/Zimbra-RCE", - "owner": { - "login": "attackgithub", - "id": 45205753, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45205753?v=4", - "html_url": "https:\/\/github.com\/attackgithub" - }, - "html_url": "https:\/\/github.com\/attackgithub\/Zimbra-RCE", - "description": "Zimbra RCE CVE-2019-9670", - "fork": false, - "created_at": "2019-08-16T15:22:27Z", - "updated_at": "2019-08-17T01:04:11Z", - "pushed_at": "2019-08-16T05:54:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 4, - "forks": 4, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-9745.json b/2019/CVE-2019-9745.json deleted file mode 100644 index c539ff9c84..0000000000 --- a/2019/CVE-2019-9745.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 215005621, - "name": "CVE-2019-9745", - "full_name": "KPN-CISO\/CVE-2019-9745", - "owner": { - "login": "KPN-CISO", - "id": 6069290, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6069290?v=4", - "html_url": "https:\/\/github.com\/KPN-CISO" - }, - "html_url": "https:\/\/github.com\/KPN-CISO\/CVE-2019-9745", - "description": "Write-up on the CVE-2019-9745 vulnerability.", - "fork": false, - "created_at": "2019-10-14T09:44:44Z", - "updated_at": "2019-11-07T14:36:56Z", - "pushed_at": "2019-11-07T14:36:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-9787.json b/2019/CVE-2019-9787.json index d6f850a48e..3e96241b29 100644 --- a/2019/CVE-2019-9787.json +++ b/2019/CVE-2019-9787.json @@ -22,29 +22,6 @@ "watchers": 1, "score": 0 }, - { - "id": 202961104, - "name": "CodePath_Week_7-8", - "full_name": "PalmTreeForest\/CodePath_Week_7-8", - "owner": { - "login": "PalmTreeForest", - "id": 30913112, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30913112?v=4", - "html_url": "https:\/\/github.com\/PalmTreeForest" - }, - "html_url": "https:\/\/github.com\/PalmTreeForest\/CodePath_Week_7-8", - "description": "CodePath Assignment for Weeks 7 & 8: CVE-2017-14719, CVE-2019-9787 & Unauthenticated Page\/Post Content Modification via REST API", - "fork": false, - "created_at": "2019-08-18T04:50:37Z", - "updated_at": "2019-08-18T05:22:44Z", - "pushed_at": "2019-08-18T05:18:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 260468975, "name": "Wordpress_cve-2019-9787_defense", diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json index 08ec24b9c7..830cf1bd39 100644 --- a/2020/CVE-2020-10199.json +++ b/2020/CVE-2020-10199.json @@ -105,13 +105,13 @@ "description": "CVE-2020-10199 回显版本", "fork": false, "created_at": "2020-05-15T06:12:51Z", - "updated_at": "2021-06-10T11:33:03Z", + "updated_at": "2021-06-18T23:09:07Z", "pushed_at": "2020-05-15T06:18:18Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 9, "forks": 9, - "watchers": 30, + "watchers": 31, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-13935.json b/2020/CVE-2020-13935.json index e056bc6b09..84ccda0eef 100644 --- a/2020/CVE-2020-13935.json +++ b/2020/CVE-2020-13935.json @@ -13,13 +13,13 @@ "description": "Exploit for WebSocket Vulnerability in Apache Tomcat", "fork": false, "created_at": "2020-11-02T14:48:55Z", - "updated_at": "2021-06-07T19:57:12Z", + "updated_at": "2021-06-18T23:09:47Z", "pushed_at": "2020-11-02T14:51:48Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 127, + "watchers_count": 127, "forks_count": 28, "forks": 28, - "watchers": 126, + "watchers": 127, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14321.json b/2020/CVE-2020-14321.json index 0732ec57aa..4403b6816b 100644 --- a/2020/CVE-2020-14321.json +++ b/2020/CVE-2020-14321.json @@ -13,13 +13,13 @@ "description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE", "fork": false, "created_at": "2020-07-26T01:28:53Z", - "updated_at": "2021-06-18T20:34:52Z", + "updated_at": "2021-06-18T23:02:42Z", "pushed_at": "2020-07-26T01:36:14Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "forks_count": 3, "forks": 3, - "watchers": 18, + "watchers": 19, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index edd41ded31..77f0ed1cb0 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -82,13 +82,13 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2021-06-17T10:10:05Z", + "updated_at": "2021-06-18T21:30:30Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 802, - "watchers_count": 802, + "stargazers_count": 803, + "watchers_count": 803, "forks_count": 230, "forks": 230, - "watchers": 802, + "watchers": 803, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2021-06-18T11:44:14Z", + "updated_at": "2021-06-19T02:45:05Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 217, + "watchers_count": 217, "forks_count": 40, "forks": 40, - "watchers": 216, + "watchers": 217, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2021-06-16T09:48:49Z", + "updated_at": "2021-06-18T22:38:34Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 317, - "watchers_count": 317, + "stargazers_count": 316, + "watchers_count": 316, "forks_count": 100, "forks": 100, - "watchers": 317, + "watchers": 316, "score": 0 }, { diff --git a/2020/CVE-2020-16947.json b/2020/CVE-2020-16947.json index c550d54785..d1743902de 100644 --- a/2020/CVE-2020-16947.json +++ b/2020/CVE-2020-16947.json @@ -13,13 +13,13 @@ "description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)", "fork": false, "created_at": "2020-10-15T14:32:25Z", - "updated_at": "2021-06-16T03:11:19Z", + "updated_at": "2021-06-18T23:09:45Z", "pushed_at": "2020-10-20T20:09:58Z", - "stargazers_count": 120, - "watchers_count": 120, + "stargazers_count": 121, + "watchers_count": 121, "forks_count": 35, "forks": 35, - "watchers": 120, + "watchers": 121, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 597334c5e1..e4c1f539f2 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-06-18T03:28:34Z", + "updated_at": "2021-06-18T23:08:29Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1070, - "watchers_count": 1070, + "stargazers_count": 1071, + "watchers_count": 1071, "forks_count": 238, "forks": 238, - "watchers": 1070, + "watchers": 1071, "score": 0 }, { diff --git a/2020/CVE-2020-36179.json b/2020/CVE-2020-36179.json index 32ecd7c2e2..715634e588 100644 --- a/2020/CVE-2020-36179.json +++ b/2020/CVE-2020-36179.json @@ -13,13 +13,13 @@ "description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE", "fork": false, "created_at": "2021-01-10T06:47:49Z", - "updated_at": "2021-06-18T13:39:48Z", + "updated_at": "2021-06-19T01:38:14Z", "pushed_at": "2021-01-10T06:48:53Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "forks_count": 7, "forks": 7, - "watchers": 65, + "watchers": 66, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index 48df378345..acedd8dfb0 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -59,13 +59,13 @@ "description": "CVE-2020-5902 BIG-IP", "fork": false, "created_at": "2020-07-05T16:38:32Z", - "updated_at": "2021-05-23T14:09:00Z", + "updated_at": "2021-06-18T23:09:16Z", "pushed_at": "2020-07-15T02:52:33Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 347, + "watchers_count": 347, "forks_count": 108, "forks": 108, - "watchers": 346, + "watchers": 347, "score": 0 }, { @@ -1209,13 +1209,13 @@ "description": "Auto exploit RCE CVE-2020-5902 ", "fork": false, "created_at": "2021-04-13T06:48:20Z", - "updated_at": "2021-04-13T21:13:25Z", + "updated_at": "2021-06-18T22:57:25Z", "pushed_at": "2021-04-13T21:13:23Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-27905.json b/2021/CVE-2021-27905.json index 958fa0b25c..54d790fd59 100644 --- a/2021/CVE-2021-27905.json +++ b/2021/CVE-2021-27905.json @@ -13,13 +13,13 @@ "description": "Apache Solr SSRF(CVE-2021-27905)", "fork": false, "created_at": "2021-04-21T09:27:21Z", - "updated_at": "2021-06-08T02:22:00Z", + "updated_at": "2021-06-19T02:07:15Z", "pushed_at": "2021-04-21T10:00:59Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "forks_count": 15, "forks": 15, - "watchers": 34, + "watchers": 35, "score": 0 }, { diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 4c441b1f9f..113c530a96 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -17,8 +17,8 @@ "pushed_at": "2021-06-12T08:27:09Z", "stargazers_count": 738, "watchers_count": 738, - "forks_count": 119, - "forks": 119, + "forks_count": 120, + "forks": 120, "watchers": 738, "score": 0 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 11ad3a9407..74df0c23d7 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -381,13 +381,13 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2021-06-18T01:42:37Z", + "updated_at": "2021-06-19T02:49:51Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 728, - "watchers_count": 728, + "stargazers_count": 729, + "watchers_count": 729, "forks_count": 205, "forks": 205, - "watchers": 728, + "watchers": 729, "score": 0 }, { @@ -661,8 +661,8 @@ "pushed_at": "2021-02-03T22:28:14Z", "stargazers_count": 53, "watchers_count": 53, - "forks_count": 28, - "forks": 28, + "forks_count": 29, + "forks": 29, "watchers": 53, "score": 0 }, diff --git a/README.md b/README.md index 0f7722f0f2..4f6b8719de 100644 --- a/README.md +++ b/README.md @@ -7643,7 +7643,6 @@ In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows - [mpgn/CVE-2019-0192](https://github.com/mpgn/CVE-2019-0192) -- [Rapidsafeguard/Solr-RCE-CVE-2019-0192](https://github.com/Rapidsafeguard/Solr-RCE-CVE-2019-0192) ### CVE-2019-0193 (2019-08-01) @@ -7652,9 +7651,7 @@ In Apache Solr, the DataImportHandler, an optional but popular module to pull in - [xConsoIe/CVE-2019-0193](https://github.com/xConsoIe/CVE-2019-0193) -- [jas502n/CVE-2019-0193](https://github.com/jas502n/CVE-2019-0193) - [1135/solr_exploit](https://github.com/1135/solr_exploit) -- [jaychouzzk/CVE-2019-0193-exp](https://github.com/jaychouzzk/CVE-2019-0193-exp) ### CVE-2019-0211 (2019-04-08) @@ -7664,14 +7661,6 @@ In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or p - [ozkanbilge/Apache-Exploit-2019](https://github.com/ozkanbilge/Apache-Exploit-2019) -### CVE-2019-0227 (2019-05-01) - - -A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue. - - -- [ianxtianxt/cve-2019-0227](https://github.com/ianxtianxt/cve-2019-0227) - ### CVE-2019-0230 (2020-09-14) @@ -7693,20 +7682,11 @@ When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in - [pyn3rd/CVE-2019-0232](https://github.com/pyn3rd/CVE-2019-0232) - [jas502n/CVE-2019-0232](https://github.com/jas502n/CVE-2019-0232) - [CherishHair/CVE-2019-0232-EXP](https://github.com/CherishHair/CVE-2019-0232-EXP) -- [setrus/CVE-2019-0232](https://github.com/setrus/CVE-2019-0232) - [0xmanjoos/CVE-2019-0232](https://github.com/0xmanjoos/CVE-2019-0232) - [Nicoslo/Windows-exploitation-Apache-Tomcat-8.5.19-CVE-2019-0232-](https://github.com/Nicoslo/Windows-exploitation-Apache-Tomcat-8.5.19-CVE-2019-0232-) - [Nicoslo/Windows-Exploitation-Web-Server-Tomcat-8.5.39-CVE-2019-0232](https://github.com/Nicoslo/Windows-Exploitation-Web-Server-Tomcat-8.5.39-CVE-2019-0232) - [jaiguptanick/CVE-2019-0232](https://github.com/jaiguptanick/CVE-2019-0232) -### CVE-2019-0539 (2019-01-08) - - -A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0567, CVE-2019-0568. - - -- [0x43434343/CVE-2019-0539](https://github.com/0x43434343/CVE-2019-0539) - ### CVE-2019-0604 (2019-03-05) @@ -7716,7 +7696,6 @@ A remote code execution vulnerability exists in Microsoft SharePoint when the so - [linhlhq/CVE-2019-0604](https://github.com/linhlhq/CVE-2019-0604) - [likescam/CVE-2019-0604_sharepoint_CVE](https://github.com/likescam/CVE-2019-0604_sharepoint_CVE) - [k8gege/CVE-2019-0604](https://github.com/k8gege/CVE-2019-0604) -- [m5050/CVE-2019-0604](https://github.com/m5050/CVE-2019-0604) - [boxhg/CVE-2019-0604](https://github.com/boxhg/CVE-2019-0604) - [Gh0st0ne/weaponized-0604](https://github.com/Gh0st0ne/weaponized-0604) @@ -7728,14 +7707,6 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon - [DreamoneOnly/CVE-2019-0623-32-exp](https://github.com/DreamoneOnly/CVE-2019-0623-32-exp) -### CVE-2019-0678 (2019-04-08) - - -An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain.In a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability, aka 'Microsoft Edge Elevation of Privilege Vulnerability'. - - -- [c0d3G33k/CVE-2019-0678](https://github.com/c0d3G33k/CVE-2019-0678) - ### CVE-2019-0708 (2019-05-16) @@ -7818,40 +7789,16 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly - [cream-sec/CVE-2019-0708-Msf--](https://github.com/cream-sec/CVE-2019-0708-Msf--) - [wdfcc/CVE-2019-0708](https://github.com/wdfcc/CVE-2019-0708) - [cvencoder/cve-2019-0708](https://github.com/cvencoder/cve-2019-0708) -- [ze0r/CVE-2019-0708-exp](https://github.com/ze0r/CVE-2019-0708-exp) -- [mekhalleh/cve-2019-0708](https://github.com/mekhalleh/cve-2019-0708) -- [cve-2019-0708-poc/cve-2019-0708](https://github.com/cve-2019-0708-poc/cve-2019-0708) - [andripwn/CVE-2019-0708](https://github.com/andripwn/CVE-2019-0708) -- [0xeb-bp/bluekeep](https://github.com/0xeb-bp/bluekeep) -- [ntkernel0/CVE-2019-0708](https://github.com/ntkernel0/CVE-2019-0708) -- [dorkerdevil/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-](https://github.com/dorkerdevil/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-) -- [turingcompl33t/bluekeep](https://github.com/turingcompl33t/bluekeep) -- [fade-vivida/CVE-2019-0708-test](https://github.com/fade-vivida/CVE-2019-0708-test) -- [skommando/CVE-2019-0708](https://github.com/skommando/CVE-2019-0708) -- [RickGeex/msf-module-CVE-2019-0708](https://github.com/RickGeex/msf-module-CVE-2019-0708) -- [wqsemc/CVE-2019-0708](https://github.com/wqsemc/CVE-2019-0708) -- [mai-lang-chai/CVE-2019-0708-RCE](https://github.com/mai-lang-chai/CVE-2019-0708-RCE) -- [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF) -- [cpkkcb/CVE-2019-0708-BlueKeep](https://github.com/cpkkcb/CVE-2019-0708-BlueKeep) -- [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708) -- [qing-root/CVE-2019-0708-EXP-MSF-](https://github.com/qing-root/CVE-2019-0708-EXP-MSF-) -- [distance-vector/CVE-2019-0708](https://github.com/distance-vector/CVE-2019-0708) -- [0xFlag/CVE-2019-0708-test](https://github.com/0xFlag/CVE-2019-0708-test) -- [1aa87148377/CVE-2019-0708](https://github.com/1aa87148377/CVE-2019-0708) -- [coolboy4me/cve-2019-0708_bluekeep_rce](https://github.com/coolboy4me/cve-2019-0708_bluekeep_rce) - [Cyb0r9/ispy](https://github.com/Cyb0r9/ispy) -- [shishibabyq/CVE-2019-0708](https://github.com/shishibabyq/CVE-2019-0708) -- [pwnhacker0x18/Wincrash](https://github.com/pwnhacker0x18/Wincrash) - [R4v3nG/CVE-2019-0708-DOS](https://github.com/R4v3nG/CVE-2019-0708-DOS) - [lwtz/CVE-2019-0708](https://github.com/lwtz/CVE-2019-0708) -- [ulisesrc/-2-CVE-2019-0708](https://github.com/ulisesrc/-2-CVE-2019-0708) - [worawit/CVE-2019-0708](https://github.com/worawit/CVE-2019-0708) - [cbwang505/CVE-2019-0708-EXP-Windows](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows) - [eastmountyxz/CVE-2019-0708-Windows](https://github.com/eastmountyxz/CVE-2019-0708-Windows) - [JSec1337/Scanner-CVE-2019-0708](https://github.com/JSec1337/Scanner-CVE-2019-0708) - [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI) - [AaronWilsonGrylls/CVE-2019-0708-POC](https://github.com/AaronWilsonGrylls/CVE-2019-0708-POC) -- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit) - [sinlee1/CVE-2019-0708](https://github.com/sinlee1/CVE-2019-0708) - [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows) - [Kinesys/Kinesys-CVE-2019-0708-Exploit](https://github.com/Kinesys/Kinesys-CVE-2019-0708-Exploit) @@ -7884,14 +7831,6 @@ A security feature bypass vulnerability exists when Internet Explorer VBScript e - [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit) -### CVE-2019-0785 (2019-07-15) - - -A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server, aka 'Windows DHCP Server Remote Code Execution Vulnerability'. - - -- [Jaky5155/CVE-2019-0785](https://github.com/Jaky5155/CVE-2019-0785) - ### CVE-2019-0803 (2019-04-09) @@ -7964,7 +7903,6 @@ A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle a - [Ridter/CVE-2019-1040-dcpwn](https://github.com/Ridter/CVE-2019-1040-dcpwn) - [lazaars/UltraRealy_with_CVE-2019-1040](https://github.com/lazaars/UltraRealy_with_CVE-2019-1040) - [fox-it/cve-2019-1040-scanner](https://github.com/fox-it/cve-2019-1040-scanner) -- [wzxmt/CVE-2019-1040](https://github.com/wzxmt/CVE-2019-1040) - [QAX-A-Team/dcpwn](https://github.com/QAX-A-Team/dcpwn) ### CVE-2019-1064 (2019-06-12) @@ -8001,14 +7939,6 @@ A denial of service vulnerability exists when Microsoft Common Object Runtime Li - [stevenseeley/HowCVE-2019-1083Works](https://github.com/stevenseeley/HowCVE-2019-1083Works) -### CVE-2019-1096 (2019-07-15) - - -An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'. - - -- [CrackerCat/cve-2019-1096-poc](https://github.com/CrackerCat/cve-2019-1096-poc) - ### CVE-2019-1108 (2019-07-29) @@ -8025,23 +7955,6 @@ An information disclosure vulnerability exists when certain central processing u - [bitdefender/swapgs-attack-poc](https://github.com/bitdefender/swapgs-attack-poc) -### CVE-2019-1132 (2019-07-29) - - -An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. - - -- [Vlad-tri/CVE-2019-1132](https://github.com/Vlad-tri/CVE-2019-1132) -- [petercc/CVE-2019-1132](https://github.com/petercc/CVE-2019-1132) - -### CVE-2019-1181 (2019-08-14) - - -A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1182, CVE-2019-1222, CVE-2019-1226. - - -- [major203/cve-2019-1181](https://github.com/major203/cve-2019-1181) - ### CVE-2019-1215 (2019-09-11) @@ -8073,17 +7986,6 @@ An elevation of privilege vulnerability exists when the Windows AppX Deployment - [rogue-kdc/CVE-2019-1253](https://github.com/rogue-kdc/CVE-2019-1253) -- [likescam/CVE-2019-1253](https://github.com/likescam/CVE-2019-1253) -- [padovah4ck/CVE-2019-1253](https://github.com/padovah4ck/CVE-2019-1253) -- [sgabe/CVE-2019-1253](https://github.com/sgabe/CVE-2019-1253) - -### CVE-2019-1315 (2019-10-10) - - -An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339, CVE-2019-1342. - - -- [Mayter/CVE-2019-1315](https://github.com/Mayter/CVE-2019-1315) ### CVE-2019-1351 (2020-01-24) @@ -8093,59 +7995,16 @@ A tampering vulnerability exists when Git for Visual Studio improperly handles v - [JonasDL/PruebaCVE20191351](https://github.com/JonasDL/PruebaCVE20191351) -### CVE-2019-1367 (2019-09-23) - - -A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221. - - -- [mandarenmanman/CVE-2019-1367](https://github.com/mandarenmanman/CVE-2019-1367) - -### CVE-2019-1385 (2019-11-12) - - -An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'. - - -- [klinix5/CVE-2019-1385](https://github.com/klinix5/CVE-2019-1385) -- [0x413x4/CVE-2019-1385](https://github.com/0x413x4/CVE-2019-1385) - ### CVE-2019-1388 (2019-11-12) An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'. -- [jas502n/CVE-2019-1388](https://github.com/jas502n/CVE-2019-1388) -- [jaychouzzk/CVE-2019-1388](https://github.com/jaychouzzk/CVE-2019-1388) - [sv3nbeast/CVE-2019-1388](https://github.com/sv3nbeast/CVE-2019-1388) - [nobodyatall648/CVE-2019-1388](https://github.com/nobodyatall648/CVE-2019-1388) - [suprise4u/CVE-2019-1388](https://github.com/suprise4u/CVE-2019-1388) -### CVE-2019-1402 (2019-11-12) - - -An information disclosure vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Information Disclosure Vulnerability'. - - -- [lauxjpn/CorruptQueryAccessWorkaround](https://github.com/lauxjpn/CorruptQueryAccessWorkaround) - -### CVE-2019-1405 (2019-11-12) - - -An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'. - - -- [apt69/COMahawk](https://github.com/apt69/COMahawk) - -### CVE-2019-1422 (2019-11-12) - - -An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll handles file creation allowing for a file overwrite, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1420, CVE-2019-1423. - - -- [ze0r/cve-2019-1422](https://github.com/ze0r/cve-2019-1422) - ### CVE-2019-1458 (2019-12-10) @@ -8157,14 +8016,6 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon - [DreamoneOnly/CVE-2019-1458-malware](https://github.com/DreamoneOnly/CVE-2019-1458-malware) - [Eternit7/CVE-2019-1458](https://github.com/Eternit7/CVE-2019-1458) -### CVE-2019-1476 (2019-12-10) - - -An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1483. - - -- [sgabe/CVE-2019-1476](https://github.com/sgabe/CVE-2019-1476) - ### CVE-2019-1477 (2019-12-10) @@ -8179,7 +8030,6 @@ An elevation of privilege vulnerability exists when the Windows Printer Service Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code. -- [securifera/CVE-2019-1579](https://github.com/securifera/CVE-2019-1579) - [Elsfa7-110/CVE-2019-1579](https://github.com/Elsfa7-110/CVE-2019-1579) ### CVE-2019-1652 (2019-01-24) @@ -8222,7 +8072,6 @@ In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds - [marcinguy/CVE-2019-2107](https://github.com/marcinguy/CVE-2019-2107) -- [infiniteLoopers/CVE-2019-2107](https://github.com/infiniteLoopers/CVE-2019-2107) ### CVE-2019-2196 (2019-11-13) @@ -8246,9 +8095,6 @@ In Download Provider, there is a possible SQL injection vulnerability. This coul A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095 -- [timwr/CVE-2019-2215](https://github.com/timwr/CVE-2019-2215) -- [raystyle/CVE-2019-2215](https://github.com/raystyle/CVE-2019-2215) -- [kangtastic/cve-2019-2215](https://github.com/kangtastic/cve-2019-2215) - [marcinguy/CVE-2019-2215](https://github.com/marcinguy/CVE-2019-2215) - [LIznzn/CVE-2019-2215](https://github.com/LIznzn/CVE-2019-2215) - [DimitriFourny/cve-2019-2215](https://github.com/DimitriFourny/cve-2019-2215) @@ -8264,7 +8110,6 @@ A use-after-free in binder.c allows an elevation of privilege from an applicatio Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). -- [Phantomn/VirtualBox_CVE-2019-2525-CVE-2019-2548](https://github.com/Phantomn/VirtualBox_CVE-2019-2525-CVE-2019-2548) - [wotmd/VirtualBox-6.0.0-Exploit-1-day](https://github.com/wotmd/VirtualBox-6.0.0-Exploit-1-day) ### CVE-2019-2615 (2019-04-23) @@ -8285,8 +8130,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [jas502n/cve-2019-2618](https://github.com/jas502n/cve-2019-2618) - [wsfengfan/CVE-2019-2618-](https://github.com/wsfengfan/CVE-2019-2618-) - [dr0op/WeblogicScan](https://github.com/dr0op/WeblogicScan) -- [he1dan/cve-2019-2618](https://github.com/he1dan/cve-2019-2618) -- [ianxtianxt/cve-2019-2618](https://github.com/ianxtianxt/cve-2019-2618) - [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner) ### CVE-2019-2725 (2019-04-26) @@ -8309,9 +8152,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [jiansiting/CVE-2019-2725](https://github.com/jiansiting/CVE-2019-2725) - [kerlingcode/CVE-2019-2725](https://github.com/kerlingcode/CVE-2019-2725) - [black-mirror/Weblogic](https://github.com/black-mirror/Weblogic) -- [pimps/CVE-2019-2725](https://github.com/pimps/CVE-2019-2725) -- [ianxtianxt/CVE-2019-2725](https://github.com/ianxtianxt/CVE-2019-2725) -- [N0b1e6/CVE-2019-2725-POC](https://github.com/N0b1e6/CVE-2019-2725-POC) - [GGyao/weblogic_2019_2725_wls_batch](https://github.com/GGyao/weblogic_2019_2725_wls_batch) - [ludy-dev/Oracle-WLS-Weblogic-RCE](https://github.com/ludy-dev/Oracle-WLS-Weblogic-RCE) @@ -8325,26 +8165,12 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [ruthlezs/CVE-2019-2729-Exploit](https://github.com/ruthlezs/CVE-2019-2729-Exploit) - [pizza-power/weblogic-CVE-2019-2729-POC](https://github.com/pizza-power/weblogic-CVE-2019-2729-POC) -### CVE-2019-2888 (2019-10-16) - - -Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: EJB Container). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). - - -- [jas502n/CVE-2019-2888](https://github.com/jas502n/CVE-2019-2888) - ### CVE-2019-2890 (2019-10-16) Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). -- [ZO1RO/CVE-2019-2890](https://github.com/ZO1RO/CVE-2019-2890) -- [Ky0-HVA/CVE-2019-2890](https://github.com/Ky0-HVA/CVE-2019-2890) -- [freeide/weblogic_cve-2019-2890](https://github.com/freeide/weblogic_cve-2019-2890) -- [SukaraLin/CVE-2019-2890](https://github.com/SukaraLin/CVE-2019-2890) -- [jas502n/CVE-2019-2890](https://github.com/jas502n/CVE-2019-2890) -- [ianxtianxt/CVE-2019-2890](https://github.com/ianxtianxt/CVE-2019-2890) - [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln) ### CVE-2019-3010 (2019-10-16) @@ -8355,14 +8181,6 @@ Vulnerability in the Oracle Solaris product of Oracle Systems (component: XScree - [chaizeg/privilege-escalation-breach](https://github.com/chaizeg/privilege-escalation-breach) -### CVE-2019-3394 (2019-08-29) - - -There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability. - - -- [jas502n/CVE-2019-3394](https://github.com/jas502n/CVE-2019-3394) - ### CVE-2019-3396 (2019-03-25) @@ -8378,11 +8196,7 @@ The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 - [s1xg0d/CVE-2019-3396](https://github.com/s1xg0d/CVE-2019-3396) - [quanpt103/CVE-2019-3396](https://github.com/quanpt103/CVE-2019-3396) - [vntest11/confluence_CVE-2019-3396](https://github.com/vntest11/confluence_CVE-2019-3396) -- [tanw923/test1](https://github.com/tanw923/test1) -- [skommando/CVE-2019-3396-confluence-poc](https://github.com/skommando/CVE-2019-3396-confluence-poc) - [JonathanZhou348/CVE-2019-3396TEST](https://github.com/JonathanZhou348/CVE-2019-3396TEST) -- [am6539/CVE-2019-3396](https://github.com/am6539/CVE-2019-3396) -- [W2Ning/CVE-2019-3396](https://github.com/W2Ning/CVE-2019-3396) - [yuehanked/cve-2019-3396](https://github.com/yuehanked/cve-2019-3396) - [abdallah-elsharif/cve-2019-3396](https://github.com/abdallah-elsharif/cve-2019-3396) - [46o60/CVE-2019-3396_Confluence](https://github.com/46o60/CVE-2019-3396_Confluence) @@ -8429,14 +8243,6 @@ Dell SupportAssist Client versions prior to 3.2.0.90 contain a remote code execu - [jiansiting/CVE-2019-3719](https://github.com/jiansiting/CVE-2019-3719) -### CVE-2019-3778 (2019-03-07) - - -Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and 2.1 prior to 2.1.4, and 2.0 prior to 2.0.17, and older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the "redirect_uri" parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and uses the DefaultRedirectResolver in the AuthorizationEndpoint. This vulnerability does not expose applications that: Act in the role of an Authorization Server and uses a different RedirectResolver implementation other than DefaultRedirectResolver, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient). - - -- [BBB-man/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection](https://github.com/BBB-man/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection) - ### CVE-2019-3799 (2019-05-06) @@ -8461,14 +8267,6 @@ A vulnerability was found in moodle before versions 3.6.3, 3.5.5, 3.4.8 and 3.1. - [danielthatcher/moodle-login-csrf](https://github.com/danielthatcher/moodle-login-csrf) -### CVE-2019-3929 (2019-04-30) - - -The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. - - -- [xfox64x/CVE-2019-3929](https://github.com/xfox64x/CVE-2019-3929) - ### CVE-2019-3980 (2019-10-08) @@ -8514,8 +8312,6 @@ There is a File Content Disclosure vulnerability in Action View <5.2.2.1, < - [mpgn/Rails-doubletap-RCE](https://github.com/mpgn/Rails-doubletap-RCE) - [takeokunn/CVE-2019-5418](https://github.com/takeokunn/CVE-2019-5418) - [Bad3r/RailroadBandit](https://github.com/Bad3r/RailroadBandit) -- [ztgrace/CVE-2019-5418-Rails3](https://github.com/ztgrace/CVE-2019-5418-Rails3) -- [random-robbie/CVE-2019-5418](https://github.com/random-robbie/CVE-2019-5418) ### CVE-2019-5420 (2019-03-27) @@ -8551,18 +8347,9 @@ SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to dest The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability. -- [jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-](https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-) - [rabbitmask/CVE-2019-5475-EXP](https://github.com/rabbitmask/CVE-2019-5475-EXP) - [lyy289065406/CVE-2019-5475](https://github.com/lyy289065406/CVE-2019-5475) -### CVE-2019-5489 (2019-01-07) - - -The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. - - -- [mmxsrup/CVE-2019-5489](https://github.com/mmxsrup/CVE-2019-5489) - ### CVE-2019-5544 (2019-12-06) @@ -8588,14 +8375,6 @@ A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose In - [rbeede/CVE-2019-5630](https://github.com/rbeede/CVE-2019-5630) -### CVE-2019-5700 (2019-10-09) - - -NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure. - - -- [oscardagrach/CVE-2019-5700](https://github.com/oscardagrach/CVE-2019-5700) - ### CVE-2019-5736 (2019-02-11) @@ -8617,9 +8396,6 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow - [milloni/cve-2019-5736-exp](https://github.com/milloni/cve-2019-5736-exp) - [panzouh/Docker-Runc-Exploit](https://github.com/panzouh/Docker-Runc-Exploit) - [RyanNgWH/CVE-2019-5736-POC](https://github.com/RyanNgWH/CVE-2019-5736-POC) -- [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study) -- [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc) -- [epsteina16/Docker-Escape-Miner](https://github.com/epsteina16/Docker-Escape-Miner) - [GiverOfGifts/CVE-2019-5736-Custom-Runtime](https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime) - [Billith/CVE-2019-5736-PoC](https://github.com/Billith/CVE-2019-5736-PoC) - [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736) @@ -8657,14 +8433,6 @@ Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 al - [Silence-Rain/14-828_Exploitation_of_CVE-2019-5822](https://github.com/Silence-Rain/14-828_Exploitation_of_CVE-2019-5822) -### CVE-2019-5825 (2019-11-25) - - -Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. - - -- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825) - ### CVE-2019-5893 (2019-01-10) @@ -8707,7 +8475,6 @@ A memory corruption issue was addressed with improved validation. This issue is - [fatgrass/OsirisJailbreak12](https://github.com/fatgrass/OsirisJailbreak12) - [TrungNguyen1909/CVE-2019-6225-macOS](https://github.com/TrungNguyen1909/CVE-2019-6225-macOS) -- [raystyle/jailbreak-iOS12](https://github.com/raystyle/jailbreak-iOS12) ### CVE-2019-6249 (2019-01-13) @@ -8733,14 +8500,6 @@ An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global - [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC) -### CVE-2019-6329 (2019-06-25) - - -HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. Note: A different vulnerability than CVE-2019-6328. - - -- [ManhNDd/CVE-2019-6329](https://github.com/ManhNDd/CVE-2019-6329) - ### CVE-2019-6340 (2019-02-21) @@ -8817,14 +8576,6 @@ python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt - [stigtsp/CVE-2019-6690-python-gnupg-vulnerability](https://github.com/stigtsp/CVE-2019-6690-python-gnupg-vulnerability) - [brianwrf/CVE-2019-6690](https://github.com/brianwrf/CVE-2019-6690) -### CVE-2019-6715 (2019-04-01) - - -pub/sns.php in the W3 Total Cache plugin before 0.9.4 for WordPress allows remote attackers to read arbitrary files via the SubscribeURL field in SubscriptionConfirmation JSON data. - - -- [random-robbie/cve-2019-6715](https://github.com/random-robbie/cve-2019-6715) - ### CVE-2019-7192 (2019-12-05) @@ -8867,7 +8618,6 @@ Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control. - [mpgn/CVE-2019-7238](https://github.com/mpgn/CVE-2019-7238) - [jas502n/CVE-2019-7238](https://github.com/jas502n/CVE-2019-7238) -- [verctor/nexus_rce_CVE-2019-7238](https://github.com/verctor/nexus_rce_CVE-2019-7238) - [magicming200/CVE-2019-7238_Nexus_RCE_Tool](https://github.com/magicming200/CVE-2019-7238_Nexus_RCE_Tool) - [smallpiggy/CVE-2019-7238](https://github.com/smallpiggy/CVE-2019-7238) @@ -8921,20 +8671,8 @@ A vulnerability in SonicWall Email Security appliance allow an unauthenticated u Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. -- [jas502n/kibana-RCE](https://github.com/jas502n/kibana-RCE) -- [mpgn/CVE-2019-7609](https://github.com/mpgn/CVE-2019-7609) -- [LandGrey/CVE-2019-7609](https://github.com/LandGrey/CVE-2019-7609) -- [hekadan/CVE-2019-7609](https://github.com/hekadan/CVE-2019-7609) - [rhbb/CVE-2019-7609](https://github.com/rhbb/CVE-2019-7609) -### CVE-2019-7610 (2019-03-25) - - -Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. - - -- [whoami0622/CVE-2019-7610](https://github.com/whoami0622/CVE-2019-7610) - ### CVE-2019-7616 (2019-07-30) @@ -8951,14 +8689,6 @@ D-Link routers with the mydlink feature have some web interfaces without authent - [xw77cve/CVE-2019-7642](https://github.com/xw77cve/CVE-2019-7642) -### CVE-2019-7839 (2019-06-12) - - -ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 and earlier have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution. - - -- [securifera/CVE-2019-7839](https://github.com/securifera/CVE-2019-7839) - ### CVE-2019-8389 (2019-02-16) @@ -8984,17 +8714,6 @@ The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allow - [mufeedvh/CVE-2019-8449](https://github.com/mufeedvh/CVE-2019-8449) - [r0lh/CVE-2019-8449](https://github.com/r0lh/CVE-2019-8449) -### CVE-2019-8451 (2019-09-11) - - -The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class. - - -- [0xbug/CVE-2019-8451](https://github.com/0xbug/CVE-2019-8451) -- [ianxtianxt/CVE-2019-8451](https://github.com/ianxtianxt/CVE-2019-8451) -- [jas502n/CVE-2019-8451](https://github.com/jas502n/CVE-2019-8451) -- [h0ffayyy/Jira-CVE-2019-8451](https://github.com/h0ffayyy/Jira-CVE-2019-8451) - ### CVE-2019-8513 (2019-12-18) @@ -9070,15 +8789,6 @@ This was addressed with additional checks by Gatekeeper on files mounted through - [D00MFist/CVE-2019-8656](https://github.com/D00MFist/CVE-2019-8656) -### CVE-2019-8781 (2019-12-18) - - -A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15. An application may be able to execute arbitrary code with kernel privileges. - - -- [A2nkF/macOS-Kernel-Exploit](https://github.com/A2nkF/macOS-Kernel-Exploit) -- [TrungNguyen1909/CVE-2019-8781-macOS](https://github.com/TrungNguyen1909/CVE-2019-8781-macOS) - ### CVE-2019-8791 (2019-12-18) @@ -9274,15 +8984,6 @@ NUUO Network Video Recorder Firmware 1.7.x through 3.3.x allows unauthenticated - [grayoneday/CVE-2019-9653](https://github.com/grayoneday/CVE-2019-9653) -### CVE-2019-9670 (2019-05-29) - - -mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability. - - -- [rek7/Zimbra-RCE](https://github.com/rek7/Zimbra-RCE) -- [attackgithub/Zimbra-RCE](https://github.com/attackgithub/Zimbra-RCE) - ### CVE-2019-9673 (2019-06-05) @@ -9307,14 +9008,6 @@ Incorrect access control in the CxUtilSvc component of the Synaptics Sound Devic - [jthuraisamy/CVE-2019-9730](https://github.com/jthuraisamy/CVE-2019-9730) -### CVE-2019-9745 (2019-10-14) - - -CloudCTI HIP Integrator Recognition Configuration Tool allows privilege escalation via its EXQUISE integration. This tool communicates with a service (Recognition Update Client Service) via an insecure communication channel (Named Pipe). The data (JSON) sent via this channel is used to import data from CRM software using plugins (.dll files). The plugin to import data from the EXQUISE software (DatasourceExquiseExporter.dll) can be persuaded to start arbitrary programs (including batch files) that are executed using the same privileges as Recognition Update Client Service (NT AUTHORITY\SYSTEM), thus elevating privileges. This occurs because a higher-privileged process executes scripts from a directory writable by a lower-privileged user. - - -- [KPN-CISO/CVE-2019-9745](https://github.com/KPN-CISO/CVE-2019-9745) - ### CVE-2019-9766 (2019-03-14) @@ -9330,7 +9023,6 @@ WordPress before 5.1.1 does not properly filter comment content, leading to Remo - [rkatogit/cve-2019-9787_csrf_poc](https://github.com/rkatogit/cve-2019-9787_csrf_poc) -- [PalmTreeForest/CodePath_Week_7-8](https://github.com/PalmTreeForest/CodePath_Week_7-8) - [sijiahi/Wordpress_cve-2019-9787_defense](https://github.com/sijiahi/Wordpress_cve-2019-9787_defense) - [matinciel/Wordpress_CVE-2019-9787](https://github.com/matinciel/Wordpress_CVE-2019-9787) @@ -9370,14 +9062,6 @@ Zoho ManageEngine ServiceDesk 9.3 allows session hijacking and privilege escalat - [ignis-sec/CVE-2019-10008](https://github.com/ignis-sec/CVE-2019-10008) -### CVE-2019-10086 (2019-08-20) - - -In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. - - -- [evilangelplus/CVE-2019-10086](https://github.com/evilangelplus/CVE-2019-10086) - ### CVE-2019-10092 (2019-09-26) @@ -9397,9 +9081,6 @@ A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation - [MNEMO-CERT/PoC--CVE-2019-10149_Exim](https://github.com/MNEMO-CERT/PoC--CVE-2019-10149_Exim) - [aishee/CVE-2019-10149-quick](https://github.com/aishee/CVE-2019-10149-quick) - [AzizMea/CVE-2019-10149-privilege-escalation](https://github.com/AzizMea/CVE-2019-10149-privilege-escalation) -- [Brets0150/StickyExim](https://github.com/Brets0150/StickyExim) -- [ChrissHack/exim.exp](https://github.com/ChrissHack/exim.exp) -- [darsigovrustam/CVE-2019-10149](https://github.com/darsigovrustam/CVE-2019-10149) - [Diefunction/CVE-2019-10149](https://github.com/Diefunction/CVE-2019-10149) - [Dilshan-Eranda/CVE-2019-10149](https://github.com/Dilshan-Eranda/CVE-2019-10149) - [area1/exim-cve-2019-10149-data](https://github.com/area1/exim-cve-2019-10149-data) @@ -9412,31 +9093,6 @@ A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML - [rusakovichma/CVE-2019-10172](https://github.com/rusakovichma/CVE-2019-10172) -### CVE-2019-10207 (2019-11-25) - - -A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash. - - -- [butterflyhack/CVE-2019-10207](https://github.com/butterflyhack/CVE-2019-10207) - -### CVE-2019-10392 (2019-09-12) - - -Jenkins Git Client Plugin 2.8.4 and earlier and 3.0.0-rc did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection. - - -- [jas502n/CVE-2019-10392](https://github.com/jas502n/CVE-2019-10392) -- [ftk-sostupid/CVE-2019-10392_EXP](https://github.com/ftk-sostupid/CVE-2019-10392_EXP) - -### CVE-2019-10475 (2019-10-23) - - -A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin. - - -- [vesche/CVE-2019-10475](https://github.com/vesche/CVE-2019-10475) - ### CVE-2019-10678 (2019-03-31) @@ -9453,21 +9109,12 @@ A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Heidelber - [alt3kx/CVE-2019-10685](https://github.com/alt3kx/CVE-2019-10685) -### CVE-2019-10708 (2019-04-02) - - -S-CMS PHP v1.0 has SQL injection via the 4/js/scms.php?action=unlike id parameter. - - -- [stavhaygn/CVE-2019-10708](https://github.com/stavhaygn/CVE-2019-10708) - ### CVE-2019-10758 (2019-12-24) mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment. -- [masahiro331/CVE-2019-10758](https://github.com/masahiro331/CVE-2019-10758) - [lp008/CVE-2019-10758](https://github.com/lp008/CVE-2019-10758) ### CVE-2019-10779 (2020-01-27) @@ -9486,14 +9133,6 @@ Path Traversal and Unrestricted File Upload exists in the Ninja Forms plugin bef - [KTN1990/CVE-2019-10869](https://github.com/KTN1990/CVE-2019-10869) -### CVE-2019-10915 (2019-07-11) - - -A vulnerability has been identified in TIA Administrator (All versions < V1.0 SP1 Upd1). The integrated configuration web application (TIA Administrator) allows to execute certain application commands without proper authentication. The vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known. - - -- [jiansiting/CVE-2019-10915](https://github.com/jiansiting/CVE-2019-10915) - ### CVE-2019-10999 (2019-05-06) @@ -9508,22 +9147,8 @@ The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution. -- [neex/phuip-fpizdam](https://github.com/neex/phuip-fpizdam) -- [B1gd0g/CVE-2019-11043](https://github.com/B1gd0g/CVE-2019-11043) -- [tinker-li/CVE-2019-11043](https://github.com/tinker-li/CVE-2019-11043) - [jas502n/CVE-2019-11043](https://github.com/jas502n/CVE-2019-11043) - [AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-](https://github.com/AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-) -- [ianxtianxt/CVE-2019-11043](https://github.com/ianxtianxt/CVE-2019-11043) -- [fairyming/CVE-2019-11043](https://github.com/fairyming/CVE-2019-11043) -- [akamajoris/CVE-2019-11043-Docker](https://github.com/akamajoris/CVE-2019-11043-Docker) -- [theMiddleBlue/CVE-2019-11043](https://github.com/theMiddleBlue/CVE-2019-11043) -- [shadow-horse/cve-2019-11043](https://github.com/shadow-horse/cve-2019-11043) -- [huowen/CVE-2019-11043](https://github.com/huowen/CVE-2019-11043) -- [ypereirareis/docker-CVE-2019-11043](https://github.com/ypereirareis/docker-CVE-2019-11043) -- [MRdoulestar/CVE-2019-11043](https://github.com/MRdoulestar/CVE-2019-11043) -- [0th3rs-Security-Team/CVE-2019-11043](https://github.com/0th3rs-Security-Team/CVE-2019-11043) -- [k8gege/CVE-2019-11043](https://github.com/k8gege/CVE-2019-11043) -- [moniik/CVE-2019-11043_env](https://github.com/moniik/CVE-2019-11043_env) - [kriskhub/CVE-2019-11043](https://github.com/kriskhub/CVE-2019-11043) - [alokaranasinghe/cve-2019-11043](https://github.com/alokaranasinghe/cve-2019-11043) - [corifeo/CVE-2019-11043](https://github.com/corifeo/CVE-2019-11043) @@ -9545,14 +9170,6 @@ Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthen - [livehybrid/poc-cribl-rce](https://github.com/livehybrid/poc-cribl-rce) -### CVE-2019-11157 (2019-12-16) - - -Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and/or information disclosure via local access. - - -- [zkenjar/v0ltpwn](https://github.com/zkenjar/v0ltpwn) - ### CVE-2019-11223 (2019-04-18) @@ -9592,7 +9209,6 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - [DanielRuf/snyk-js-jquery-174006](https://github.com/DanielRuf/snyk-js-jquery-174006) -- [bitnesswise/jquery-prototype-pollution-fix](https://github.com/bitnesswise/jquery-prototype-pollution-fix) - [DanielRuf/snyk-js-jquery-565129](https://github.com/DanielRuf/snyk-js-jquery-565129) - [chrisneagu/FTC-SKYSTONE-TEAM-DARK-ANGELS-ROMANIA-2020](https://github.com/chrisneagu/FTC-SKYSTONE-TEAM-DARK-ANGELS-ROMANIA-2020) @@ -9608,14 +9224,6 @@ An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate th - [ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE](https://github.com/ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE) - [thewhiteh4t/cve-2019-11447](https://github.com/thewhiteh4t/cve-2019-11447) -### CVE-2019-11477 (2019-06-18) - - -Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff. - - -- [sasqwatch/cve-2019-11477-poc](https://github.com/sasqwatch/cve-2019-11477-poc) - ### CVE-2019-11510 (2019-05-08) @@ -9623,12 +9231,6 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7 - [projectzeroindia/CVE-2019-11510](https://github.com/projectzeroindia/CVE-2019-11510) -- [nuc13us/Pulse](https://github.com/nuc13us/Pulse) -- [imjdl/CVE-2019-11510-poc](https://github.com/imjdl/CVE-2019-11510-poc) -- [es0/CVE-2019-11510_poc](https://github.com/es0/CVE-2019-11510_poc) -- [r00tpgp/http-pulse_ssl_vpn.nse](https://github.com/r00tpgp/http-pulse_ssl_vpn.nse) -- [jas502n/CVE-2019-11510-1](https://github.com/jas502n/CVE-2019-11510-1) -- [jason3e7/CVE-2019-11510](https://github.com/jason3e7/CVE-2019-11510) - [BishopFox/pwn-pulse](https://github.com/BishopFox/pwn-pulse) - [aqhmal/pulsexploit](https://github.com/aqhmal/pulsexploit) - [cisagov/check-your-pulse](https://github.com/cisagov/check-your-pulse) @@ -9643,32 +9245,14 @@ Anviz Global M3 Outdoor RFID Access Control executes any command received from a - [wizlab-it/anviz-m3-rfid-cve-2019-11523-poc](https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc) -### CVE-2019-11539 (2019-04-25) - - -In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands. - - -- [0xDezzy/CVE-2019-11539](https://github.com/0xDezzy/CVE-2019-11539) - ### CVE-2019-11580 (2019-06-03) Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability. -- [jas502n/CVE-2019-11580](https://github.com/jas502n/CVE-2019-11580) - [shelld3v/CVE-2019-11580](https://github.com/shelld3v/CVE-2019-11580) -### CVE-2019-11581 (2019-08-09) - - -There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability. - - -- [jas502n/CVE-2019-11581](https://github.com/jas502n/CVE-2019-11581) -- [kobs0N/CVE-2019-11581](https://github.com/kobs0N/CVE-2019-11581) - ### CVE-2019-11687 (2019-05-02) @@ -9683,7 +9267,6 @@ An issue was discovered in the DICOM Part 10 File Format in the NEMA DICOM Stand A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2. -- [vigneshsrao/CVE-2019-11707](https://github.com/vigneshsrao/CVE-2019-11707) - [tunnelshade/cve-2019-11707](https://github.com/tunnelshade/cve-2019-11707) ### CVE-2019-11708 (2019-07-23) @@ -9694,14 +9277,6 @@ Insufficient vetting of parameters passed with the Prompt:Open IPC message betwe - [0vercl0k/CVE-2019-11708](https://github.com/0vercl0k/CVE-2019-11708) -### CVE-2019-11730 (2019-07-23) - - -A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8. - - -- [alidnf/CVE-2019-11730](https://github.com/alidnf/CVE-2019-11730) - ### CVE-2019-11881 (2019-06-10) @@ -9710,15 +9285,6 @@ A vulnerability exists in Rancher 2.1.4 in the login component, where the errorM - [MauroEldritch/VanCleef](https://github.com/MauroEldritch/VanCleef) -### CVE-2019-11931 (2019-11-14) - - -A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100. - - -- [kasif-dekel/whatsapp-rce-patched](https://github.com/kasif-dekel/whatsapp-rce-patched) -- [nop-team/CVE-2019-11931](https://github.com/nop-team/CVE-2019-11931) - ### CVE-2019-11932 (2019-10-03) @@ -9727,14 +9293,7 @@ A double free vulnerability in the DDGifSlurp function in decoding.c in the andr - [dorkerdevil/CVE-2019-11932](https://github.com/dorkerdevil/CVE-2019-11932) - [KeepWannabe/WhatsRCE](https://github.com/KeepWannabe/WhatsRCE) -- [awakened1712/CVE-2019-11932](https://github.com/awakened1712/CVE-2019-11932) -- [TulungagungCyberLink/CVE-2019-11932](https://github.com/TulungagungCyberLink/CVE-2019-11932) -- [infiniteLoopers/CVE-2019-11932](https://github.com/infiniteLoopers/CVE-2019-11932) -- [5l1v3r1/CVE-2019-11932](https://github.com/5l1v3r1/CVE-2019-11932) -- [valbrux/CVE-2019-11932-SupportApp](https://github.com/valbrux/CVE-2019-11932-SupportApp) - [fastmo/CVE-2019-11932](https://github.com/fastmo/CVE-2019-11932) -- [mRanonyMousTZ/CVE-2019-11932-whatsApp-exploit](https://github.com/mRanonyMousTZ/CVE-2019-11932-whatsApp-exploit) -- [SmoZy92/CVE-2019-11932](https://github.com/SmoZy92/CVE-2019-11932) - [dashtic172/https-github.com-awakened171](https://github.com/dashtic172/https-github.com-awakened171) - [Err0r-ICA/WhatsPayloadRCE](https://github.com/Err0r-ICA/WhatsPayloadRCE) - [starling021/CVE-2019-11932-SupportApp](https://github.com/starling021/CVE-2019-11932-SupportApp) @@ -9823,38 +9382,12 @@ In Zoho ManageEngine ServiceDesk Plus through 10.5, users with the lowest privil - [tuyenhva/CVE-2019-12252](https://github.com/tuyenhva/CVE-2019-12252) -### CVE-2019-12255 (2019-08-09) - - -Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow. - - -- [sud0woodo/Urgent11-Suricata-LUA-scripts](https://github.com/sud0woodo/Urgent11-Suricata-LUA-scripts) - -### CVE-2019-12272 (2019-05-23) - - -In OpenWrt LuCI through 0.10, the endpoints admin/status/realtime/bandwidth_status and admin/status/realtime/wireless_status of the web application are affected by a command injection vulnerability. - - -- [HACHp1/LuCI_RCE_exp](https://github.com/HACHp1/LuCI_RCE_exp) -- [roguedream/lede-17.01.3](https://github.com/roguedream/lede-17.01.3) - -### CVE-2019-12314 (2019-05-24) - - -Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI. - - -- [ras313/CVE-2019-12314](https://github.com/ras313/CVE-2019-12314) - ### CVE-2019-12384 (2019-06-24) FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible. -- [jas502n/CVE-2019-12384](https://github.com/jas502n/CVE-2019-12384) - [MagicZer0/Jackson_RCE-CVE-2019-12384](https://github.com/MagicZer0/Jackson_RCE-CVE-2019-12384) - [Sharker3312/CVE-2019-12384](https://github.com/Sharker3312/CVE-2019-12384) @@ -9874,14 +9407,6 @@ Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attac - [PwnCast/CVE-2019-12406](https://github.com/PwnCast/CVE-2019-12406) -### CVE-2019-12409 (2019-11-18) - - -The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server. - - -- [jas502n/CVE-2019-12409](https://github.com/jas502n/CVE-2019-12409) - ### CVE-2019-12419 (2019-11-06) @@ -9898,14 +9423,6 @@ Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client t - [PwnCast/CVE-2019-12423](https://github.com/PwnCast/CVE-2019-12423) -### CVE-2019-12453 (2019-07-19) - - -In MicroStrategy Web before 10.1 patch 10, stored XSS is possible in the FLTB parameter due to missing input validation. - - -- [undefinedmode/CVE-2019-12453](https://github.com/undefinedmode/CVE-2019-12453) - ### CVE-2019-12460 (2019-05-30) @@ -9914,14 +9431,6 @@ Web Port 1.19.1 allows XSS via the /access/setup type parameter. - [EmreOvunc/WebPort-v1.19.1-Reflected-XSS](https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS) -### CVE-2019-12475 (2019-07-17) - - -In MicroStrategy Web before 10.4.6, there is stored XSS in metric due to insufficient input validation. - - -- [undefinedmode/CVE-2019-12475](https://github.com/undefinedmode/CVE-2019-12475) - ### CVE-2019-12476 (2019-06-17) @@ -9962,22 +9471,6 @@ An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS - [tarantula-team/CVE-2019-12543](https://github.com/tarantula-team/CVE-2019-12543) -### CVE-2019-12562 (2019-09-26) - - -Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 allows remote attackers to store and embed the malicious script into the admin notification page. The exploit could be used to perfom any action with admin privileges such as managing content, adding users, uploading backdoors to the server, etc. Successful exploitation occurs when an admin user visits a notification page with stored cross-site scripting. - - -- [MAYASEVEN/CVE-2019-12562](https://github.com/MAYASEVEN/CVE-2019-12562) - -### CVE-2019-12586 (2019-09-04) - - -The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message. - - -- [Matheus-Garbelini/esp32_esp8266_attacks](https://github.com/Matheus-Garbelini/esp32_esp8266_attacks) - ### CVE-2019-12594 (2019-07-02) @@ -10005,14 +9498,6 @@ getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers - [oldthree3/CVE-2019-12735-VIM-NEOVIM](https://github.com/oldthree3/CVE-2019-12735-VIM-NEOVIM) - [nickylimjj/cve-2019-12735](https://github.com/nickylimjj/cve-2019-12735) -### CVE-2019-12750 (2019-07-31) - - -Symantec Endpoint Protection, prior to 14.2 RU1 & 12.1 RU6 MP10 and Symantec Endpoint Protection Small Business Edition, prior to 12.1 RU6 MP10c (12.1.7491.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. - - -- [v-p-b/cve-2019-12750](https://github.com/v-p-b/cve-2019-12750) - ### CVE-2019-12796 - [PeterUpfold/CVE-2019-12796](https://github.com/PeterUpfold/CVE-2019-12796) @@ -10030,7 +9515,6 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x thro An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306. -- [KTN1990/CVE-2019-12815](https://github.com/KTN1990/CVE-2019-12815) - [lcartey/proftpd-cve-2019-12815](https://github.com/lcartey/proftpd-cve-2019-12815) ### CVE-2019-12836 (2019-06-21) @@ -10047,27 +9531,9 @@ The Bobronix JEditor editor before 3.0.6 for Jira allows an attacker to add a UR In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi. -- [bkaraceylan/CVE-2019-12840_POC](https://github.com/bkaraceylan/CVE-2019-12840_POC) -- [KrE80r/webmin_cve-2019-12840_poc](https://github.com/KrE80r/webmin_cve-2019-12840_poc) - [anasbousselham/webminscan](https://github.com/anasbousselham/webminscan) - [zAbuQasem/CVE-2019-12840](https://github.com/zAbuQasem/CVE-2019-12840) -### CVE-2019-12889 (2019-08-20) - - -An unauthenticated privilege escalation exists in SailPoint Desktop Password Reset 7.2. A user with local access to only the Windows logon screen can escalate their privileges to NT AUTHORITY\System. An attacker would need local access to the machine for a successful exploit. The attacker must disconnect the computer from the local network / WAN and connect it to an internet facing access point / network. At that point, the attacker can execute the password-reset functionality, which will expose a web browser. Browsing to a site that calls local Windows system functions (e.g., file upload) will expose the local file system. From there an attacker can launch a privileged command shell. - - -- [nulsect0r/CVE-2019-12889](https://github.com/nulsect0r/CVE-2019-12889) - -### CVE-2019-12890 (2019-06-19) - - -RedwoodHQ 2.5.5 does not require any authentication for database operations, which allows remote attackers to create admin users via a con.automationframework users insert_one call. - - -- [EthicalHCOP/CVE-2019-12890_RedxploitHQ](https://github.com/EthicalHCOP/CVE-2019-12890_RedxploitHQ) - ### CVE-2019-12949 (2019-06-25) @@ -10076,63 +9542,6 @@ In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated ad - [tarantula-team/CVE-2019-12949](https://github.com/tarantula-team/CVE-2019-12949) -### CVE-2019-12999 (2020-01-31) - - -Lightning Network Daemon (lnd) before 0.7 allows attackers to trigger loss of funds because of Incorrect Access Control. - - -- [lightninglabs/chanleakcheck](https://github.com/lightninglabs/chanleakcheck) - -### CVE-2019-13000 (2020-01-31) - - -Eclair through 0.3 allows attackers to trigger loss of funds because of Incorrect Access Control. NOTE: README.md states "it is beta-quality software and don't put too much money in it." - - -- [ACINQ/detection-tool-cve-2019-13000](https://github.com/ACINQ/detection-tool-cve-2019-13000) - -### CVE-2019-13024 (2019-07-01) - - -Centreon 18.x before 18.10.6, 19.x before 19.04.3, and Centreon web before 2.8.29 allows the attacker to execute arbitrary system commands by using the value "init_script"-"Monitoring Engine Binary" in main.get.php to insert a arbitrary command into the database, and execute it by calling the vulnerable page www/include/configuration/configGenerate/xml/generateFiles.php (which passes the inserted value to the database to shell_exec without sanitizing it, allowing one to execute system arbitrary commands). - - -- [mhaskar/CVE-2019-13024](https://github.com/mhaskar/CVE-2019-13024) -- [get-get-get-get/Centreon-RCE](https://github.com/get-get-get-get/Centreon-RCE) - -### CVE-2019-13025 (2019-10-02) - - -Compal CH7465LG CH7465LG-NCIP-6.12.18.24-5p8-NOSH devices have Incorrect Access Control because of Improper Input Validation. The attacker can send a maliciously modified POST (HTTP) request containing shell commands, which will be executed on the device, to an backend API endpoint of the cable modem. - - -- [x1tan/CVE-2019-13025](https://github.com/x1tan/CVE-2019-13025) - -### CVE-2019-13027 (2019-07-12) - - -Realization Concerto Critical Chain Planner (aka CCPM) 5.10.8071 has SQL Injection in at least in the taskupdt/taskdetails.aspx webpage via the projectname parameter. - - -- [IckoGZ/CVE-2019-13027](https://github.com/IckoGZ/CVE-2019-13027) - -### CVE-2019-13051 (2019-10-09) - - -Pi-Hole 4.3 allows Command Injection. - - -- [pr0tean/CVE-2019-13051](https://github.com/pr0tean/CVE-2019-13051) - -### CVE-2019-13063 (2019-09-23) - - -Within Sahi Pro 8.0.0, an attacker can send a specially crafted URL to include any victim files on the system via the script parameter on the Script_view page. This will result in file disclosure (i.e., being able to pull any file from the remote victim application). This can be used to steal and obtain sensitive config and other files. This can result in complete compromise of the application. The script parameter is vulnerable to directory traversal and both local and remote file inclusion. - - -- [0x6b7966/CVE-2019-13063-POC](https://github.com/0x6b7966/CVE-2019-13063-POC) - ### CVE-2019-13086 (2019-06-30) @@ -10141,14 +9550,6 @@ core/MY_Security.php in CSZ CMS 1.2.2 before 2019-06-20 has member/login/check S - [lingchuL/CVE_POC_test](https://github.com/lingchuL/CVE_POC_test) -### CVE-2019-13101 (2019-08-08) - - -An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page. - - -- [halencarjunior/dlkploit600](https://github.com/halencarjunior/dlkploit600) - ### CVE-2019-13115 (2019-07-16) @@ -10156,15 +9557,6 @@ In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exc - [viz27/Libssh2-Exploit](https://github.com/viz27/Libssh2-Exploit) -- [CSSProject/libssh2-Exploit](https://github.com/CSSProject/libssh2-Exploit) - -### CVE-2019-13143 (2019-08-06) - - -An HTTP parameter pollution issue was discovered on Shenzhen Dragon Brothers Fingerprint Bluetooth Round Padlock FB50 2.3. With the user ID, user name, and the lock's MAC address, anyone can unbind the existing owner of the lock, and bind themselves instead. This leads to complete takeover of the lock. The user ID, name, and MAC address are trivially obtained from APIs found within the Android or iOS application. With only the MAC address of the lock, any attacker can transfer ownership of the lock from the current user, over to the attacker's account. Thus rendering the lock completely inaccessible to the current user. - - -- [securelayer7/pwnfb50](https://github.com/securelayer7/pwnfb50) ### CVE-2019-13272 (2019-07-17) @@ -10172,11 +9564,6 @@ An HTTP parameter pollution issue was discovered on Shenzhen Dragon Brothers Fin In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. -- [jas502n/CVE-2019-13272](https://github.com/jas502n/CVE-2019-13272) -- [Cyc1eC/CVE-2019-13272](https://github.com/Cyc1eC/CVE-2019-13272) -- [bigbigliang-malwarebenchmark/cve-2019-13272](https://github.com/bigbigliang-malwarebenchmark/cve-2019-13272) -- [oneoy/CVE-2019-13272](https://github.com/oneoy/CVE-2019-13272) -- [Huandtx/CVE-2019-13272](https://github.com/Huandtx/CVE-2019-13272) - [polosec/CVE-2019-13272](https://github.com/polosec/CVE-2019-13272) - [sumedhaDharmasena/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272](https://github.com/sumedhaDharmasena/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272) - [Tharana/Exploiting-a-Linux-kernel-vulnerability](https://github.com/Tharana/Exploiting-a-Linux-kernel-vulnerability) @@ -10185,22 +9572,6 @@ In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the - [teddy47/CVE-2019-13272---Documentation](https://github.com/teddy47/CVE-2019-13272---Documentation) - [jana30116/CVE-2019-13272-Local-Privilege-Escalation](https://github.com/jana30116/CVE-2019-13272-Local-Privilege-Escalation) -### CVE-2019-13361 (2019-09-05) - - -Smanos W100 1.0.0 devices have Insecure Permissions, exploitable by an attacker on the same Wi-Fi network. - - -- [lodi-g/CVE-2019-13361](https://github.com/lodi-g/CVE-2019-13361) - -### CVE-2019-13403 (2019-07-17) - - -Temenos CWX version 8.9 has an Broken Access Control vulnerability in the module /CWX/Employee/EmployeeEdit2.aspx, leading to the viewing of user information. - - -- [B3Bo1d/CVE-2019-13403](https://github.com/B3Bo1d/CVE-2019-13403) - ### CVE-2019-13404 (2019-07-07) @@ -10209,46 +9580,6 @@ Temenos CWX version 8.9 has an Broken Access Control vulnerability in the module - [alidnf/CVE-2019-13404](https://github.com/alidnf/CVE-2019-13404) -### CVE-2019-13496 (2019-11-04) - - -One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response. - - -- [FurqanKhan1/CVE-2019-13496](https://github.com/FurqanKhan1/CVE-2019-13496) - -### CVE-2019-13497 (2019-11-04) - - -One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows CSRF for logout requests. - - -- [FurqanKhan1/CVE-2019-13497](https://github.com/FurqanKhan1/CVE-2019-13497) - -### CVE-2019-13498 (2019-07-29) - - -One Identity Cloud Access Manager 8.1.3 does not use HTTP Strict Transport Security (HSTS), which may allow man-in-the-middle (MITM) attacks. This issue is fixed in version 8.1.4. - - -- [FurqanKhan1/CVE-2019-13498](https://github.com/FurqanKhan1/CVE-2019-13498) - -### CVE-2019-13504 (2019-07-10) - - -There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2. - - -- [hazedic/fuzzenv-exiv2](https://github.com/hazedic/fuzzenv-exiv2) - -### CVE-2019-13574 (2019-07-11) - - -In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command. - - -- [masahiro331/CVE-2019-13574](https://github.com/masahiro331/CVE-2019-13574) - ### CVE-2019-13600 - [Crystalware/CVE-2019-13600](https://github.com/Crystalware/CVE-2019-13600) @@ -10266,7 +9597,6 @@ Blinger.io v.1.0.2519 is vulnerable to Blind/Persistent XSS. An attacker can sen Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. -- [cve-2019-13720/cve-2019-13720](https://github.com/cve-2019-13720/cve-2019-13720) - [ChoKyuWon/CVE-2019-13720](https://github.com/ChoKyuWon/CVE-2019-13720) ### CVE-2019-13956 (2019-07-18) @@ -10301,22 +9631,6 @@ Access to the uninitialized variable when the driver tries to unmap the dma buff - [parallelbeings/CVE-2019-14079](https://github.com/parallelbeings/CVE-2019-14079) -### CVE-2019-14205 (2019-07-21) - - -A Local File Inclusion vulnerability in the Nevma Adaptive Images plugin before 0.6.67 for WordPress allows remote attackers to retrieve arbitrary files via the $REQUEST['adaptive-images-settings']['source_file'] parameter in adaptive-images-script.php. - - -- [security-kma/EXPLOITING-CVE-2019-14205](https://github.com/security-kma/EXPLOITING-CVE-2019-14205) - -### CVE-2019-14220 (2019-09-24) - - -An issue was discovered in BlueStacks 4.110 and below on macOS and on 4.120 and below on Windows. BlueStacks employs Android running in a virtual machine (VM) to enable Android apps to run on Windows or MacOS. Bug is in a local arbitrary file read through a system service call. The impacted method runs with System admin privilege and if given the file name as parameter returns you the content of file. A malicious app using the affected method can then read the content of any system file which it is not authorized to read - - -- [seqred-s-a/cve-2019-14220](https://github.com/seqred-s-a/cve-2019-14220) - ### CVE-2019-14267 (2019-07-29) @@ -10331,18 +9645,10 @@ PDFResurrect 0.15 has a buffer overflow via a crafted PDF file because data asso In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. -- [FauxFaux/sudo-cve-2019-14287](https://github.com/FauxFaux/sudo-cve-2019-14287) - [CashWilliams/CVE-2019-14287-demo](https://github.com/CashWilliams/CVE-2019-14287-demo) -- [n0w4n/CVE-2019-14287](https://github.com/n0w4n/CVE-2019-14287) -- [gurneesh/CVE-2019-14287-write-up](https://github.com/gurneesh/CVE-2019-14287-write-up) - [shallvhack/Sudo-Security-Bypass-CVE-2019-14287](https://github.com/shallvhack/Sudo-Security-Bypass-CVE-2019-14287) -- [Janette88/cve-2019-14287sudoexp](https://github.com/Janette88/cve-2019-14287sudoexp) -- [huang919/cve-2019-14287-PPT](https://github.com/huang919/cve-2019-14287-PPT) -- [wenyu1999/sudo-](https://github.com/wenyu1999/sudo-) -- [Sindadziy/cve-2019-14287](https://github.com/Sindadziy/cve-2019-14287) - [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271) - [CMNatic/Dockerized-CVE-2019-14287](https://github.com/CMNatic/Dockerized-CVE-2019-14287) -- [axax002/sudo-vulnerability-CVE-2019-14287](https://github.com/axax002/sudo-vulnerability-CVE-2019-14287) - [SachinthaDeSilva-cmd/Exploit-CVE-2019-14287](https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287) - [HussyCool/CVE-2019-14287-IT18030372-](https://github.com/HussyCool/CVE-2019-14287-IT18030372-) - [ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287](https://github.com/ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287) @@ -10363,14 +9669,6 @@ A SQL injection vulnerability exists in the Imagely NextGEN Gallery plugin befor - [imthoe/CVE-2019-14314](https://github.com/imthoe/CVE-2019-14314) -### CVE-2019-14319 (2019-09-04) - - -The TikTok (formerly Musical.ly) application 12.2.0 for Android and iOS performs unencrypted transmission of images, videos, and likes. This allows an attacker to extract private sensitive information by sniffing network traffic. - - -- [MelroyB/CVE-2019-14319](https://github.com/MelroyB/CVE-2019-14319) - ### CVE-2019-14322 (2019-07-28) @@ -10388,22 +9686,6 @@ An issue was discovered in AndyOS Andy versions up to 46.11.113. By default, it - [seqred-s-a/cve-2019-14326](https://github.com/seqred-s-a/cve-2019-14326) -### CVE-2019-14339 (2019-09-05) - - -The ContentProvider in the Canon PRINT jp.co.canon.bsd.ad.pixmaprint 2.5.5 application for Android does not properly restrict canon.ij.printer.capability.data data access. This allows an attacker's malicious application to obtain sensitive information including factory passwords for the administrator web interface and WPA2-PSK key. - - -- [0x48piraj/CVE-2019-14339](https://github.com/0x48piraj/CVE-2019-14339) - -### CVE-2019-14439 (2019-07-30) - - -A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath. - - -- [jas502n/CVE-2019-14439](https://github.com/jas502n/CVE-2019-14439) - ### CVE-2019-14450 (2019-10-28) @@ -10420,38 +9702,6 @@ An issue was discovered in Microvirt MEmu all versions prior to 7.0.2. A guest A - [seqred-s-a/cve-2019-14514](https://github.com/seqred-s-a/cve-2019-14514) -### CVE-2019-14529 (2019-08-02) - - -OpenEMR before 5.0.2 allows SQL Injection in interface/forms/eye_mag/save.php. - - -- [Wezery/CVE-2019-14529](https://github.com/Wezery/CVE-2019-14529) - -### CVE-2019-14530 (2019-08-13) - - -An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server. - - -- [Wezery/CVE-2019-14530](https://github.com/Wezery/CVE-2019-14530) - -### CVE-2019-14537 (2019-08-07) - - -YOURLS through 1.7.3 is affected by a type juggling vulnerability in the api component that can result in login bypass. - - -- [Wocanilo/CVE-2019-14537](https://github.com/Wocanilo/CVE-2019-14537) - -### CVE-2019-14540 (2019-09-15) - - -A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. - - -- [LeadroyaL/cve-2019-14540-exploit](https://github.com/LeadroyaL/cve-2019-14540-exploit) - ### CVE-2019-14615 (2020-01-17) @@ -10460,30 +9710,6 @@ Insufficient control flow in certain data structures for some Intel(R) Processor - [HE-Wenjian/iGPU-Leak](https://github.com/HE-Wenjian/iGPU-Leak) -### CVE-2019-14745 (2019-08-07) - - -In radare2 before 3.7.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to improper handling of symbol names embedded in executables. - - -- [xooxo/CVE-2019-14745](https://github.com/xooxo/CVE-2019-14745) - -### CVE-2019-14751 (2019-08-22) - - -NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction. - - -- [mssalvatore/CVE-2019-14751_PoC](https://github.com/mssalvatore/CVE-2019-14751_PoC) - -### CVE-2019-14830 (2021-03-19) - - -A vulnerability was found in Moodle 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where the mobile launch endpoint contained an open redirect in some circumstances, which could result in a user's mobile access token being exposed. (Note: This does not affect sites with a forced URL scheme configured, mobile service disabled, or where the mobile app login method is "via the app"). - - -- [Fr3d-/moodle-token-stealer](https://github.com/Fr3d-/moodle-token-stealer) - ### CVE-2019-14899 (2019-12-11) @@ -10500,22 +9726,6 @@ A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Be - [shanika04/hibernate-orm](https://github.com/shanika04/hibernate-orm) -### CVE-2019-14912 (2019-09-20) - - -An issue was discovered in PRiSE adAS 1.7.0. The OPENSSO module does not properly check the goto parameter, leading to an open redirect that leaks the session cookie. - - -- [Wocanilo/adaPwn](https://github.com/Wocanilo/adaPwn) - -### CVE-2019-15029 (2019-09-05) - - -FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command. - - -- [mhaskar/CVE-2019-15029](https://github.com/mhaskar/CVE-2019-15029) - ### CVE-2019-15043 (2019-09-03) @@ -10524,29 +9734,12 @@ In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthentic - [h0ffayyy/CVE-2019-15043](https://github.com/h0ffayyy/CVE-2019-15043) -### CVE-2019-15053 (2019-08-14) - - -The "HTML Include and replace macro" plugin before 1.5.0 for Confluence Server allows a bypass of the includeScripts=false XSS protection mechanism via vectors involving an IFRAME element. - - -- [l0nax/CVE-2019-15053](https://github.com/l0nax/CVE-2019-15053) - ### CVE-2019-15107 (2019-08-15) An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability. -- [jas502n/CVE-2019-15107](https://github.com/jas502n/CVE-2019-15107) -- [HACHp1/webmin_docker_and_exp](https://github.com/HACHp1/webmin_docker_and_exp) -- [ketlerd/CVE-2019-15107](https://github.com/ketlerd/CVE-2019-15107) -- [AdministratorGithub/CVE-2019-15107](https://github.com/AdministratorGithub/CVE-2019-15107) -- [Rayferrufino/Make-and-Break](https://github.com/Rayferrufino/Make-and-Break) -- [AleWong/WebminRCE-EXP-CVE-2019-15107-](https://github.com/AleWong/WebminRCE-EXP-CVE-2019-15107-) -- [ianxtianxt/CVE-2019-15107](https://github.com/ianxtianxt/CVE-2019-15107) -- [hannob/webminex](https://github.com/hannob/webminex) -- [ChakoMoonFish/webmin_CVE-2019-15107](https://github.com/ChakoMoonFish/webmin_CVE-2019-15107) - [cdedmondson/Modified-CVE-2019-15107](https://github.com/cdedmondson/Modified-CVE-2019-15107) - [ruthvikvegunta/CVE-2019-15107](https://github.com/ruthvikvegunta/CVE-2019-15107) - [n0obit4/Webmin_1.890-POC](https://github.com/n0obit4/Webmin_1.890-POC) @@ -10554,14 +9747,6 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_chan - [MuirlandOracle/CVE-2019-15107](https://github.com/MuirlandOracle/CVE-2019-15107) - [diegojuan/CVE-2019-15107](https://github.com/diegojuan/CVE-2019-15107) -### CVE-2019-15120 (2019-08-16) - - -The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode. - - -- [h3llraiser/CVE-2019-15120](https://github.com/h3llraiser/CVE-2019-15120) - ### CVE-2019-15126 (2020-02-05) @@ -10573,30 +9758,6 @@ An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and - [akabe1/kr00ker](https://github.com/akabe1/kr00ker) - [mustafasevim/kr00k-vulnerability](https://github.com/mustafasevim/kr00k-vulnerability) -### CVE-2019-15224 (2019-08-19) - - -The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected. - - -- [chef-cft/inspec_cve_2019_15224](https://github.com/chef-cft/inspec_cve_2019_15224) - -### CVE-2019-15233 (2019-08-20) - - -The Live:Text Box macro in the Old Street Live Input Macros app before 2.11 for Confluence has XSS, leading to theft of the Administrator Session Cookie. - - -- [l0nax/CVE-2019-15233](https://github.com/l0nax/CVE-2019-15233) - -### CVE-2019-15511 (2019-11-21) - - -An exploitable local privilege escalation vulnerability exists in the GalaxyClientService installed by GOG Galaxy. Due to Improper Access Control, an attacker can send unauthenticated local TCP packets to the service to gain SYSTEM privileges in Windows system where GOG Galaxy software is installed. All GOG Galaxy versions before 1.2.60 and all corresponding versions of GOG Galaxy 2.0 Beta are affected. - - -- [adenkiewicz/CVE-2019-15511](https://github.com/adenkiewicz/CVE-2019-15511) - ### CVE-2019-15588 (2019-11-01) @@ -10613,14 +9774,6 @@ HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delive - [jlcarruda/node-poc-http-smuggling](https://github.com/jlcarruda/node-poc-http-smuggling) -### CVE-2019-15642 (2019-08-26) - - -rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users." - - -- [jas502n/CVE-2019-15642](https://github.com/jas502n/CVE-2019-15642) - ### CVE-2019-15813 (2019-09-04) @@ -10630,22 +9783,6 @@ Multiple file upload restriction bypass vulnerabilities in Sentrifugo 3.2 could - [iamhrishikeshpadhye/CVE-2019-15813-Exploitation](https://github.com/iamhrishikeshpadhye/CVE-2019-15813-Exploitation) - [wolf1892/CVE-2019-15813](https://github.com/wolf1892/CVE-2019-15813) -### CVE-2019-15846 (2019-09-06) - - -Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash. - - -- [synacktiv/Exim-CVE-2019-15846](https://github.com/synacktiv/Exim-CVE-2019-15846) - -### CVE-2019-15858 (2019-09-03) - - -admin/includes/class.import.snippet.php in the "Woody ad snippets" plugin before 2.2.5 for WordPress allows unauthenticated options import, as demonstrated by storing an XSS payload for remote code execution. - - -- [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858) - ### CVE-2019-15903 (2019-09-04) @@ -10654,35 +9791,6 @@ In libexpat before 2.2.8, crafted XML input could fool the parser into changing - [PwnCast/CVE-2019-15903](https://github.com/PwnCast/CVE-2019-15903) -### CVE-2019-15972 (2019-11-25) - - -A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates SQL values. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database. - - -- [FSecureLABS/Cisco-UCM-SQLi-Scripts](https://github.com/FSecureLABS/Cisco-UCM-SQLi-Scripts) - -### CVE-2019-16097 (2019-09-08) - - -core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP. - - -- [evilAdan0s/CVE-2019-16097](https://github.com/evilAdan0s/CVE-2019-16097) -- [rockmelodies/CVE-2019-16097-batch](https://github.com/rockmelodies/CVE-2019-16097-batch) -- [ianxtianxt/CVE-2019-16097](https://github.com/ianxtianxt/CVE-2019-16097) -- [dacade/cve-2019-16097](https://github.com/dacade/cve-2019-16097) -- [theLSA/harbor-give-me-admin](https://github.com/theLSA/harbor-give-me-admin) -- [luckybool1020/CVE-2019-16097](https://github.com/luckybool1020/CVE-2019-16097) - -### CVE-2019-16098 (2019-09-11) - - -The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code. - - -- [Barakat/CVE-2019-16098](https://github.com/Barakat/CVE-2019-16098) - ### CVE-2019-16113 (2019-09-08) @@ -10712,24 +9820,10 @@ In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browse Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request. -- [jas502n/CVE-2019-16278](https://github.com/jas502n/CVE-2019-16278) -- [imjdl/CVE-2019-16278-PoC](https://github.com/imjdl/CVE-2019-16278-PoC) - [ianxtianxt/CVE-2019-16278](https://github.com/ianxtianxt/CVE-2019-16278) -- [darkerego/Nostromo_Python3](https://github.com/darkerego/Nostromo_Python3) -- [AnubisSec/CVE-2019-16278](https://github.com/AnubisSec/CVE-2019-16278) -- [theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE](https://github.com/theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE) -- [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278) - [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278) - [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278) -### CVE-2019-16279 (2019-10-14) - - -A memory error in the function SSL_accept in nostromo nhttpd through 1.9.6 allows an attacker to trigger a denial of service via a crafted HTTP request. - - -- [ianxtianxt/CVE-2019-16279](https://github.com/ianxtianxt/CVE-2019-16279) - ### CVE-2019-16374 (2020-08-13) @@ -10754,41 +9848,13 @@ Centreon Web before 2.8.30, 18.10.x before 18.10.8, 19.04.x before 19.04.5 and 1 - [TheCyberGeek/CVE-2019-16405.rb](https://github.com/TheCyberGeek/CVE-2019-16405.rb) -### CVE-2019-16662 (2019-10-28) - - -An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution. - - -- [mhaskar/CVE-2019-16662](https://github.com/mhaskar/CVE-2019-16662) - -### CVE-2019-16663 (2019-10-28) - - -An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution. - - -- [mhaskar/CVE-2019-16663](https://github.com/mhaskar/CVE-2019-16663) - -### CVE-2019-16692 (2019-09-22) - - -phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/filter-result.php table parameter when action=add is used. - - -- [kkirsche/CVE-2019-16692](https://github.com/kkirsche/CVE-2019-16692) - ### CVE-2019-16759 (2019-09-24) vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request. -- [M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit](https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit) -- [r00tpgp/http-vuln-CVE-2019-16759](https://github.com/r00tpgp/http-vuln-CVE-2019-16759) -- [jas502n/CVE-2019-16759](https://github.com/jas502n/CVE-2019-16759) - [theLSA/vbulletin5-rce](https://github.com/theLSA/vbulletin5-rce) -- [FarjaalAhmad/CVE-2019-16759](https://github.com/FarjaalAhmad/CVE-2019-16759) - [andripwn/pwn-vbulletin](https://github.com/andripwn/pwn-vbulletin) - [psychoxploit/vbull](https://github.com/psychoxploit/vbull) - [jd-961/CVE-2019-16759-bypass](https://github.com/jd-961/CVE-2019-16759-bypass) @@ -10806,30 +9872,6 @@ In PyInstaller before version 3.6, only on Windows, a local privilege escalation - [AlterSolutions/PyInstallerPrivEsc](https://github.com/AlterSolutions/PyInstallerPrivEsc) -### CVE-2019-16889 (2019-09-25) - - -Ubiquiti EdgeMAX devices before 2.0.3 allow remote attackers to cause a denial of service (disk consumption) because *.cache files in /var/run/beaker/container_file/ are created when providing a valid length payload of 249 characters or fewer to the beaker.session.id cookie in a GET header. The attacker can use a long series of unique session IDs. - - -- [grampae/meep](https://github.com/grampae/meep) - -### CVE-2019-16920 (2019-09-27) - - -Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825. - - -- [pwnhacker0x18/CVE-2019-16920-MassPwn3r](https://github.com/pwnhacker0x18/CVE-2019-16920-MassPwn3r) - -### CVE-2019-16941 (2019-09-28) - - -NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary code execution if the Read XML Files feature of Bit Patterns Explorer is used with a modified XML document. This occurs in Features/BytePatterns/src/main/java/ghidra/bitpatterns/info/FileBitPatternInfoReader.java. An attack could start with an XML document that was originally created by DumpFunctionPatternInfoScript but then directly modified by an attacker (for example, to make a java.lang.Runtime.exec call). - - -- [purpleracc00n/CVE-2019-16941](https://github.com/purpleracc00n/CVE-2019-16941) - ### CVE-2019-17026 (2020-03-01) @@ -10847,23 +9889,6 @@ An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixfo - [Resery/CVE-2019-17041](https://github.com/Resery/CVE-2019-17041) -### CVE-2019-17080 (2019-10-02) - - -mintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports. - - -- [Andhrimnirr/Mintinstall-object-injection](https://github.com/Andhrimnirr/Mintinstall-object-injection) -- [materaj2/Mintinstall-object-injection](https://github.com/materaj2/Mintinstall-object-injection) - -### CVE-2019-17124 (2019-10-09) - - -Kramer VIAware 2.5.0719.1034 has Incorrect Access Control. - - -- [hessandrew/CVE-2019-17124](https://github.com/hessandrew/CVE-2019-17124) - ### CVE-2019-17137 (2020-02-10) @@ -10911,14 +9936,6 @@ bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute- - [brunosgio/bloodit](https://github.com/brunosgio/bloodit) - [spyx/cve-2019-17240](https://github.com/spyx/cve-2019-17240) -### CVE-2019-17424 (2019-10-22) - - -A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file. - - -- [guywhataguy/CVE-2019-17424](https://github.com/guywhataguy/CVE-2019-17424) - ### CVE-2019-17427 (2019-10-09) @@ -10927,14 +9944,6 @@ In Redmine before 3.4.11 and 4.0.x before 4.0.4, persistent XSS exists due to te - [RealLinkers/CVE-2019-17427](https://github.com/RealLinkers/CVE-2019-17427) -### CVE-2019-17495 (2019-10-10) - - -A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method. - - -- [SecT0uch/CVE-2019-17495-test](https://github.com/SecT0uch/CVE-2019-17495-test) - ### CVE-2019-17525 (2020-04-21) @@ -10990,7 +9999,6 @@ An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcRes Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. -- [shadow-horse/CVE-2019-17571](https://github.com/shadow-horse/CVE-2019-17571) - [Al1ex/CVE-2019-17571](https://github.com/Al1ex/CVE-2019-17571) - [PwnCast/CVE-2019-17571](https://github.com/PwnCast/CVE-2019-17571) @@ -11003,14 +10011,6 @@ By default, Apache CXF creates a /services page containing a listing of the avai - [PwnCast/CVE-2019-17573](https://github.com/PwnCast/CVE-2019-17573) - [PwnCast/CVE-2020-13954](https://github.com/PwnCast/CVE-2020-13954) -### CVE-2019-17596 (2019-10-24) - - -Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates. - - -- [pquerna/poc-dsa-verify-CVE-2019-17596](https://github.com/pquerna/poc-dsa-verify-CVE-2019-17596) - ### CVE-2019-17625 (2019-10-16) @@ -11019,14 +10019,6 @@ There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS i - [Ekultek/CVE-2019-17625](https://github.com/Ekultek/CVE-2019-17625) -### CVE-2019-17633 (2019-12-19) - - -For Eclipse Che versions 6.16 to 7.3.0, with both authentication and TLS disabled, visiting a malicious web site could trigger the start of an arbitrary Che workspace. Che with no authentication and no TLS is not usually deployed on a public network but is often used for local installations (e.g. on personal laptops). In that case, even if the Che API is not exposed externally, some javascript running in the local browser is able to send requests to it. - - -- [mgrube/CVE-2019-17633](https://github.com/mgrube/CVE-2019-17633) - ### CVE-2019-17638 (2020-07-09) @@ -11097,14 +10089,6 @@ An issue was discovered in drivers/media/platform/vivid in the Linux kernel thro - [sanjana123-cloud/CVE-2019-18683](https://github.com/sanjana123-cloud/CVE-2019-18683) - [Limesss/cve-2019-18683](https://github.com/Limesss/cve-2019-18683) -### CVE-2019-18873 (2019-11-11) - - -FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. The problem is in admsession.php and admuser.php. - - -- [fuzzlove/FUDforum-XSS-RCE](https://github.com/fuzzlove/FUDforum-XSS-RCE) - ### CVE-2019-18885 (2019-11-14) @@ -11144,41 +10128,6 @@ TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access cont - [ReverseBrain/CVE-2019-18988](https://github.com/ReverseBrain/CVE-2019-18988) - [mr-r3b00t/CVE-2019-18988](https://github.com/mr-r3b00t/CVE-2019-18988) -### CVE-2019-19012 (2019-11-16) - - -An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression. - - -- [ManhNDd/CVE-2019-19012](https://github.com/ManhNDd/CVE-2019-19012) -- [tarantula-team/CVE-2019-19012](https://github.com/tarantula-team/CVE-2019-19012) - -### CVE-2019-19033 (2019-11-21) - - -Jalios JCMS 10 allows attackers to access any part of the website and the WebDAV server with administrative privileges via a backdoor account, by using any username and the hardcoded dev password. - - -- [ricardojoserf/CVE-2019-19033](https://github.com/ricardojoserf/CVE-2019-19033) - -### CVE-2019-19203 (2019-11-21) - - -An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read. - - -- [ManhNDd/CVE-2019-19203](https://github.com/ManhNDd/CVE-2019-19203) -- [tarantula-team/CVE-2019-19203](https://github.com/tarantula-team/CVE-2019-19203) - -### CVE-2019-19204 (2019-11-21) - - -An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read. - - -- [ManhNDd/CVE-2019-19204](https://github.com/ManhNDd/CVE-2019-19204) -- [tarantula-team/CVE-2019-19204](https://github.com/tarantula-team/CVE-2019-19204) - ### CVE-2019-19208 (2020-03-16) @@ -11187,25 +10136,6 @@ Codiad Web IDE through 2.8.4 allows PHP Code injection. - [Hacker5preme/CVE-2019-19208-exploit](https://github.com/Hacker5preme/CVE-2019-19208-exploit) -### CVE-2019-19231 (2019-12-20) - - -An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, 14.2, and 14.3 Agent for Windows that can allow a local attacker to gain escalated privileges. - - -- [hessandrew/CVE-2019-19231](https://github.com/hessandrew/CVE-2019-19231) - -### CVE-2019-19268 -- [TheCyberGeek/CVE-2019-19268](https://github.com/TheCyberGeek/CVE-2019-19268) - -### CVE-2019-19315 (2019-12-17) - - -NLSSRV32.EXE in Nalpeiron Licensing Service 7.3.4.0, as used with Nitro PDF and other products, allows Elevation of Privilege via the \\.\mailslot\nlsX86ccMailslot mailslot. - - -- [monoxgas/mailorder](https://github.com/monoxgas/mailorder) - ### CVE-2019-19356 (2020-02-07) @@ -11261,32 +10191,12 @@ class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as - [jra89/CVE-2019-19576](https://github.com/jra89/CVE-2019-19576) -### CVE-2019-19633 -- [jra89/CVE-2019-19633](https://github.com/jra89/CVE-2019-19633) - -### CVE-2019-19634 (2019-12-17) - - -class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other products, omits .pht from the set of dangerous file extensions, a similar issue to CVE-2019-19576. - - -- [jra89/CVE-2019-19634](https://github.com/jra89/CVE-2019-19634) - -### CVE-2019-19651 -- [jra89/CVE-2019-19651](https://github.com/jra89/CVE-2019-19651) - -### CVE-2019-19652 -- [jra89/CVE-2019-19652](https://github.com/jra89/CVE-2019-19652) - ### CVE-2019-19653 - [jra89/CVE-2019-19653](https://github.com/jra89/CVE-2019-19653) ### CVE-2019-19654 - [jra89/CVE-2019-19654](https://github.com/jra89/CVE-2019-19654) -### CVE-2019-19658 -- [jra89/CVE-2019-19658](https://github.com/jra89/CVE-2019-19658) - ### CVE-2019-19699 (2020-04-06) @@ -11295,46 +10205,6 @@ There is Authenticated remote code execution in Centreon Infrastructure Monitori - [SpengeSec/CVE-2019-19699](https://github.com/SpengeSec/CVE-2019-19699) -### CVE-2019-19732 (2019-12-30) - - -translation_manage_text.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 directly insert values from the aSortDir_0 and/or sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. - - -- [jra89/CVE-2019-19732](https://github.com/jra89/CVE-2019-19732) - -### CVE-2019-19733 (2019-12-30) - - -_get_all_file_server_paths.ajax.php (aka get_all_file_server_paths.ajax.php) in MFScripts YetiShare 3.5.2 through 4.5.3 does not sanitize or encode the output from the fileIds parameter on the page, which would allow an attacker to input HTML or execute scripts on the site, aka XSS. - - -- [jra89/CVE-2019-19733](https://github.com/jra89/CVE-2019-19733) - -### CVE-2019-19734 (2019-12-30) - - -_account_move_file_in_folder.ajax.php in MFScripts YetiShare 3.5.2 directly inserts values from the fileIds parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. - - -- [jra89/CVE-2019-19734](https://github.com/jra89/CVE-2019-19734) - -### CVE-2019-19735 (2019-12-30) - - -class.userpeer.php in MFScripts YetiShare 3.5.2 through 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an attacker to guess the hash and set the password within a few hours by bruteforcing. - - -- [jra89/CVE-2019-19735](https://github.com/jra89/CVE-2019-19735) - -### CVE-2019-19738 (2019-12-30) - - -log_file_viewer.php in MFScripts YetiShare 3.5.2 through 4.5.3 does not sanitize or encode the output from the lFile parameter on the page, which would allow an attacker to input HTML or execute scripts on the site, aka XSS. - - -- [jra89/CVE-2019-19738](https://github.com/jra89/CVE-2019-19738) - ### CVE-2019-19781 (2019-12-27) @@ -11395,7 +10265,6 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.) -- [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc) - [andripwn/django_cve201919844](https://github.com/andripwn/django_cve201919844) - [0xsha/CVE_2019_19844](https://github.com/0xsha/CVE_2019_19844) @@ -11529,14 +10398,6 @@ Dolibarr 7.0.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: - [chaizeg/CSRF-breach](https://github.com/chaizeg/CSRF-breach) -### CVE-2019-1010298 (2019-07-15) - - -Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Buffer Overflow. The impact is: Code execution in the context of TEE core (kernel). The component is: optee_os. The fixed version is: 3.4.0 and later. - - -- [RKX1209/CVE-2019-1010298](https://github.com/RKX1209/CVE-2019-1010298) - ### CVE-2019-1020010 (2019-07-29)