Auto Update 2024/10/18 00:30:24

This commit is contained in:
motikan2010-bot 2024-10-18 09:30:24 +09:00
parent 01fb153cc2
commit 891df19076
5805 changed files with 28080 additions and 14117 deletions

View file

@ -7,7 +7,8 @@
"login": "pexmee", "login": "pexmee",
"id": 60260590, "id": 60260590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60260590?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60260590?v=4",
"html_url": "https:\/\/github.com\/pexmee" "html_url": "https:\/\/github.com\/pexmee",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/pexmee\/CVE-1999-0016-Land-DOS-tool", "html_url": "https:\/\/github.com\/pexmee\/CVE-1999-0016-Land-DOS-tool",
"description": "A simple dos-tool ", "description": "A simple dos-tool ",
@ -37,7 +38,8 @@
"login": "Pommaq", "login": "Pommaq",
"id": 42520348, "id": 42520348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42520348?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42520348?v=4",
"html_url": "https:\/\/github.com\/Pommaq" "html_url": "https:\/\/github.com\/Pommaq",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Pommaq\/CVE-1999-0016-POC", "html_url": "https:\/\/github.com\/Pommaq\/CVE-1999-0016-POC",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "websecnl", "login": "websecnl",
"id": 20278695, "id": 20278695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4",
"html_url": "https:\/\/github.com\/websecnl" "html_url": "https:\/\/github.com\/websecnl",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/websecnl\/Bulk_CVE-1999-0532_Scanner", "html_url": "https:\/\/github.com\/websecnl\/Bulk_CVE-1999-0532_Scanner",
"description": "A tool i made for use in combination with hackerone.com for Bounty Hacking purposes.", "description": "A tool i made for use in combination with hackerone.com for Bounty Hacking purposes.",
@ -37,7 +38,8 @@
"login": "Rodney-O-C-Melby", "login": "Rodney-O-C-Melby",
"id": 16503898, "id": 16503898,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16503898?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16503898?v=4",
"html_url": "https:\/\/github.com\/Rodney-O-C-Melby" "html_url": "https:\/\/github.com\/Rodney-O-C-Melby",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Rodney-O-C-Melby\/dns-zone-transfer-test", "html_url": "https:\/\/github.com\/Rodney-O-C-Melby\/dns-zone-transfer-test",
"description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.", "description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.",

View file

@ -7,7 +7,8 @@
"login": "siunam321", "login": "siunam321",
"id": 104430134, "id": 104430134,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104430134?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104430134?v=4",
"html_url": "https:\/\/github.com\/siunam321" "html_url": "https:\/\/github.com\/siunam321",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/siunam321\/CVE-1999-1053-PoC", "html_url": "https:\/\/github.com\/siunam321\/CVE-1999-1053-PoC",
"description": "CVE-1999-1053 Proof-of-Concept Exploit", "description": "CVE-1999-1053 Proof-of-Concept Exploit",

View file

@ -7,7 +7,8 @@
"login": "Cappricio-Securities", "login": "Cappricio-Securities",
"id": 102907425, "id": 102907425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
"html_url": "https:\/\/github.com\/Cappricio-Securities" "html_url": "https:\/\/github.com\/Cappricio-Securities",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2000-0114", "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2000-0114",
"description": "Microsoft FrontPage Extensions Check (shtml.dll)", "description": "Microsoft FrontPage Extensions Check (shtml.dll)",
@ -48,7 +49,8 @@
"login": "Josekutty-K", "login": "Josekutty-K",
"id": 155238968, "id": 155238968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155238968?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155238968?v=4",
"html_url": "https:\/\/github.com\/Josekutty-K" "html_url": "https:\/\/github.com\/Josekutty-K",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Josekutty-K\/frontpage-server-extensions-vulnerability-scanner", "html_url": "https:\/\/github.com\/Josekutty-K\/frontpage-server-extensions-vulnerability-scanner",
"description": "Python script to scan for CVE-2000-0114 vulnerability in Frontpage Server Extensions. Automates subdomain enumeration and vulnerability scanning using subfinder and nuclei. For educational and professional use in cybersecurity assessments.", "description": "Python script to scan for CVE-2000-0114 vulnerability in Frontpage Server Extensions. Automates subdomain enumeration and vulnerability scanning using subfinder and nuclei. For educational and professional use in cybersecurity assessments.",
@ -78,7 +80,8 @@
"login": "adhamelhansye", "login": "adhamelhansye",
"id": 145185592, "id": 145185592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145185592?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145185592?v=4",
"html_url": "https:\/\/github.com\/adhamelhansye" "html_url": "https:\/\/github.com\/adhamelhansye",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/adhamelhansye\/CVE-2000-0114", "html_url": "https:\/\/github.com\/adhamelhansye\/CVE-2000-0114",
"description": "This a CVE I found it in VDP at hackerone Platform", "description": "This a CVE I found it in VDP at hackerone Platform",

View file

@ -7,7 +7,8 @@
"login": "mike182", "login": "mike182",
"id": 509504, "id": 509504,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/509504?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/509504?v=4",
"html_url": "https:\/\/github.com\/mike182" "html_url": "https:\/\/github.com\/mike182",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/mike182\/exploit", "html_url": "https:\/\/github.com\/mike182\/exploit",
"description": "CVE-2000-0170", "description": "CVE-2000-0170",

View file

@ -7,7 +7,8 @@
"login": "rafaelh", "login": "rafaelh",
"id": 3272113, "id": 3272113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3272113?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3272113?v=4",
"html_url": "https:\/\/github.com\/rafaelh" "html_url": "https:\/\/github.com\/rafaelh",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/rafaelh\/CVE-2000-0649", "html_url": "https:\/\/github.com\/rafaelh\/CVE-2000-0649",
"description": "Test for CVE-2000-0649, and return an IP address if vulnerable", "description": "Test for CVE-2000-0649, and return an IP address if vulnerable",
@ -42,7 +43,8 @@
"login": "stevenvegar", "login": "stevenvegar",
"id": 70730301, "id": 70730301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4",
"html_url": "https:\/\/github.com\/stevenvegar" "html_url": "https:\/\/github.com\/stevenvegar",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649", "html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649",
"description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers", "description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers",
@ -72,7 +74,8 @@
"login": "Downgraderz", "login": "Downgraderz",
"id": 19348425, "id": 19348425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19348425?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19348425?v=4",
"html_url": "https:\/\/github.com\/Downgraderz" "html_url": "https:\/\/github.com\/Downgraderz",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Downgraderz\/PoC-CVE-2000-0649", "html_url": "https:\/\/github.com\/Downgraderz\/PoC-CVE-2000-0649",
"description": "A small tool to create a PoC for CVE-2000-0649.", "description": "A small tool to create a PoC for CVE-2000-0649.",

View file

@ -7,7 +7,8 @@
"login": "Z6543", "login": "Z6543",
"id": 1755029, "id": 1755029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1755029?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1755029?v=4",
"html_url": "https:\/\/github.com\/Z6543" "html_url": "https:\/\/github.com\/Z6543",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Z6543\/CVE-2000-0979", "html_url": "https:\/\/github.com\/Z6543\/CVE-2000-0979",
"description": "CVE-2000-0979", "description": "CVE-2000-0979",

View file

@ -7,7 +7,8 @@
"login": "gilberto47831", "login": "gilberto47831",
"id": 60636483, "id": 60636483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60636483?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60636483?v=4",
"html_url": "https:\/\/github.com\/gilberto47831" "html_url": "https:\/\/github.com\/gilberto47831",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/gilberto47831\/Network-Filesystem-Forensics", "html_url": "https:\/\/github.com\/gilberto47831\/Network-Filesystem-Forensics",
"description": "Reports on post-exploitation on honeypot exploiting vulnerable wu-ftpd (CVE-2001-0550)", "description": "Reports on post-exploitation on honeypot exploiting vulnerable wu-ftpd (CVE-2001-0550)",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0680", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0680",
"description": "Directory traversal vulnerability in ftpd in QPC QVT\/Net 4.0 and AVT\/Term 5.0", "description": "Directory traversal vulnerability in ftpd in QPC QVT\/Net 4.0 and AVT\/Term 5.0",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0758", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0758",
"description": "Directory traversal vulnerability in Shambala 4.5 ", "description": "Directory traversal vulnerability in Shambala 4.5 ",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0931", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0931",
"description": "Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attackers to list or read arbitrary files and directories via a .. (dot dot) in (1) LS or (2) GET.", "description": "Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attackers to list or read arbitrary files and directories via a .. (dot dot) in (1) LS or (2) GET.",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0932", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0932",
"description": "Cooolsoft PowerFTP Server 2.0 3\/2.10 - Multiple Denial of Service Vulnerabilities", "description": "Cooolsoft PowerFTP Server 2.0 3\/2.10 - Multiple Denial of Service Vulnerabilities",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0933", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0933",
"description": "Cooolsoft PowerFTP Server 2.03 allows remote attackers to list the contents of arbitrary drives via a ls (LIST) command that includes the drive letter as an argument, e.g. \"ls C:\".", "description": "Cooolsoft PowerFTP Server 2.03 allows remote attackers to list the contents of arbitrary drives via a ls (LIST) command that includes the drive letter as an argument, e.g. \"ls C:\".",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0934", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0934",
"description": "Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical path of the server root via the pwd command, which lists the full pathname.", "description": "Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical path of the server root via the pwd command, which lists the full pathname.",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-1442", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-1442",
"description": "ISC INN 2.x - Command-Line Buffer Overflow", "description": "ISC INN 2.x - Command-Line Buffer Overflow",

View file

@ -7,7 +7,8 @@
"login": "p1ton3rr", "login": "p1ton3rr",
"id": 184847683, "id": 184847683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184847683?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184847683?v=4",
"html_url": "https:\/\/github.com\/p1ton3rr" "html_url": "https:\/\/github.com\/p1ton3rr",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/p1ton3rr\/poc-cve-2001-1473", "html_url": "https:\/\/github.com\/p1ton3rr\/poc-cve-2001-1473",
"description": "A novel approach to the old problem", "description": "A novel approach to the old problem",

View file

@ -7,7 +7,8 @@
"login": "becrevex", "login": "becrevex",
"id": 8326868, "id": 8326868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4",
"html_url": "https:\/\/github.com\/becrevex" "html_url": "https:\/\/github.com\/becrevex",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/becrevex\/Gaston", "html_url": "https:\/\/github.com\/becrevex\/Gaston",
"description": "BEAST (CVE-2001-3389) Checker", "description": "BEAST (CVE-2001-3389) Checker",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0200", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0200",
"description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.", "description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0201", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0201",
"description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request, possibly triggering a buffer overflow.", "description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request, possibly triggering a buffer overflow.",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0288", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0288",
"description": "Phusion WebServer 1.0 - Directory Traversal", "description": "Phusion WebServer 1.0 - Directory Traversal",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0289", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0289",
"description": "Phusion WebServer 1.0 - 'URL' Remote Buffer Overflow", "description": "Phusion WebServer 1.0 - 'URL' Remote Buffer Overflow",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0346", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0346",
"description": "Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to execute arbitrary script as other Cobalt users via Javascript in a URL to (1) service.cgi or (2) alert.cgi.", "description": "Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to execute arbitrary script as other Cobalt users via Javascript in a URL to (1) service.cgi or (2) alert.cgi.",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0347", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0347",
"description": "Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to read password-protected files, and possibly files outside the web root, via a .. (dot dot) in an HTTP request.", "description": "Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to read password-protected files, and possibly files outside the web root, via a .. (dot dot) in an HTTP request.",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0348", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0348",
"description": "service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service", "description": "service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0448", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0448",
"description": "Xerver 2.10 - Multiple Request Denial of Service Vulnerabilities", "description": "Xerver 2.10 - Multiple Request Denial of Service Vulnerabilities",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0740", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0740",
"description": "SLRNPull Spool Directory Command Line Parameter Buffer Overflow Vulnerability", "description": "SLRNPull Spool Directory Command Line Parameter Buffer Overflow Vulnerability",

View file

@ -7,7 +7,8 @@
"login": "fauzanwijaya", "login": "fauzanwijaya",
"id": 139438257, "id": 139438257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139438257?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139438257?v=4",
"html_url": "https:\/\/github.com\/fauzanwijaya" "html_url": "https:\/\/github.com\/fauzanwijaya",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/fauzanwijaya\/CVE-2002-0748", "html_url": "https:\/\/github.com\/fauzanwijaya\/CVE-2002-0748",
"description": "Proof of concept for LabVIEW Web Server HTTP Get Newline DoS vulnerability", "description": "Proof of concept for LabVIEW Web Server HTTP Get Newline DoS vulnerability",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0991", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2002-0991",
"description": "Buffer overflows in the cifslogin command for HP CIFS\/9000 Client A.01.06 and earlier", "description": "Buffer overflows in the cifslogin command for HP CIFS\/9000 Client A.01.06 and earlier",

View file

@ -7,7 +7,8 @@
"login": "wlensinas", "login": "wlensinas",
"id": 17731891, "id": 17731891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17731891?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17731891?v=4",
"html_url": "https:\/\/github.com\/wlensinas" "html_url": "https:\/\/github.com\/wlensinas",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/wlensinas\/CVE-2002-1614", "html_url": "https:\/\/github.com\/wlensinas\/CVE-2002-1614",
"description": null, "description": null,

View file

@ -7,16 +7,17 @@
"login": "c0r0n3r", "login": "c0r0n3r",
"id": 979146, "id": 979146,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/979146?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/979146?v=4",
"html_url": "https:\/\/github.com\/c0r0n3r" "html_url": "https:\/\/github.com\/c0r0n3r",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/c0r0n3r\/dheater", "html_url": "https:\/\/github.com\/c0r0n3r\/dheater",
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)", "description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false, "fork": false,
"created_at": "2021-08-31T09:51:12Z", "created_at": "2021-08-31T09:51:12Z",
"updated_at": "2024-10-03T06:28:07Z", "updated_at": "2024-10-17T20:53:33Z",
"pushed_at": "2024-05-03T22:24:07Z", "pushed_at": "2024-05-03T22:24:07Z",
"stargazers_count": 184, "stargazers_count": 185,
"watchers_count": 184, "watchers_count": 185,
"has_discussions": false, "has_discussions": false,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
@ -46,7 +47,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 184, "watchers": 185,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
} }

View file

@ -7,7 +7,8 @@
"login": "krdsploit", "login": "krdsploit",
"id": 104392085, "id": 104392085,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104392085?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104392085?v=4",
"html_url": "https:\/\/github.com\/krdsploit" "html_url": "https:\/\/github.com\/krdsploit",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/krdsploit\/CVE-2002-2420", "html_url": "https:\/\/github.com\/krdsploit\/CVE-2002-2420",
"description": "The New Exploit there no available on metasploit framework !", "description": "The New Exploit there no available on metasploit framework !",

View file

@ -7,7 +7,8 @@
"login": "marb08", "login": "marb08",
"id": 22150927, "id": 22150927,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22150927?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22150927?v=4",
"html_url": "https:\/\/github.com\/marb08" "html_url": "https:\/\/github.com\/marb08",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/marb08\/etherleak-checker", "html_url": "https:\/\/github.com\/marb08\/etherleak-checker",
"description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.", "description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.",

View file

@ -7,7 +7,8 @@
"login": "cyberdesu", "login": "cyberdesu",
"id": 78768764, "id": 78768764,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78768764?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78768764?v=4",
"html_url": "https:\/\/github.com\/cyberdesu" "html_url": "https:\/\/github.com\/cyberdesu",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/cyberdesu\/Remote-Buffer-overflow-CVE-2003-0172", "html_url": "https:\/\/github.com\/cyberdesu\/Remote-Buffer-overflow-CVE-2003-0172",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "KernelPan1k", "login": "KernelPan1k",
"id": 3338681, "id": 3338681,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3338681?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3338681?v=4",
"html_url": "https:\/\/github.com\/KernelPan1k" "html_url": "https:\/\/github.com\/KernelPan1k",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/KernelPan1k\/trans2open-CVE-2003-0201", "html_url": "https:\/\/github.com\/KernelPan1k\/trans2open-CVE-2003-0201",
"description": "Samba exploit CVE2003-0201", "description": "Samba exploit CVE2003-0201",

View file

@ -7,7 +7,8 @@
"login": "phamthanhsang280477", "login": "phamthanhsang280477",
"id": 45278781, "id": 45278781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45278781?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45278781?v=4",
"html_url": "https:\/\/github.com\/phamthanhsang280477" "html_url": "https:\/\/github.com\/phamthanhsang280477",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/phamthanhsang280477\/CVE-2003-0222", "html_url": "https:\/\/github.com\/phamthanhsang280477\/CVE-2003-0222",
"description": "CVE-2003-0222", "description": "CVE-2003-0222",

View file

@ -7,7 +7,8 @@
"login": "adenkiewicz", "login": "adenkiewicz",
"id": 1060275, "id": 1060275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4",
"html_url": "https:\/\/github.com\/adenkiewicz" "html_url": "https:\/\/github.com\/adenkiewicz",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2003-0264", "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2003-0264",
"description": "Exploit for CVE-2003-0264 based on pwntools and metasploit's windows\/reverse_tcp", "description": "Exploit for CVE-2003-0264 based on pwntools and metasploit's windows\/reverse_tcp",
@ -37,7 +38,8 @@
"login": "fyoderxx", "login": "fyoderxx",
"id": 31161670, "id": 31161670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31161670?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31161670?v=4",
"html_url": "https:\/\/github.com\/fyoderxx" "html_url": "https:\/\/github.com\/fyoderxx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/fyoderxx\/slmail-exploit", "html_url": "https:\/\/github.com\/fyoderxx\/slmail-exploit",
"description": "Exploit SLmail Buffer Overflow CVE-2003-0264", "description": "Exploit SLmail Buffer Overflow CVE-2003-0264",
@ -67,7 +69,8 @@
"login": "war4uthor", "login": "war4uthor",
"id": 45926018, "id": 45926018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor" "html_url": "https:\/\/github.com\/war4uthor",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2003-0264", "html_url": "https:\/\/github.com\/war4uthor\/CVE-2003-0264",
"description": "CVE-2003-0264 - SLMail 5.5 POP3 'PASS' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", "description": "CVE-2003-0264 - SLMail 5.5 POP3 'PASS' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",
@ -97,7 +100,8 @@
"login": "pwncone", "login": "pwncone",
"id": 57570315, "id": 57570315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4",
"html_url": "https:\/\/github.com\/pwncone" "html_url": "https:\/\/github.com\/pwncone",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5", "html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5", "description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
@ -127,7 +131,8 @@
"login": "vrikodar", "login": "vrikodar",
"id": 73271976, "id": 73271976,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73271976?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73271976?v=4",
"html_url": "https:\/\/github.com\/vrikodar" "html_url": "https:\/\/github.com\/vrikodar",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/vrikodar\/CVE-2003-0264_EXPLOIT", "html_url": "https:\/\/github.com\/vrikodar\/CVE-2003-0264_EXPLOIT",
"description": "Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3", "description": "Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3",
@ -166,7 +171,8 @@
"login": "nobodyatall648", "login": "nobodyatall648",
"id": 35725871, "id": 35725871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
"html_url": "https:\/\/github.com\/nobodyatall648" "html_url": "https:\/\/github.com\/nobodyatall648",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2003-0264", "html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2003-0264",
"description": "CVE-2003-0264 SLMail5.5_RemoteBufferOverflow", "description": "CVE-2003-0264 SLMail5.5_RemoteBufferOverflow",

View file

@ -7,7 +7,8 @@
"login": "silasol", "login": "silasol",
"id": 24622986, "id": 24622986,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24622986?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24622986?v=4",
"html_url": "https:\/\/github.com\/silasol" "html_url": "https:\/\/github.com\/silasol",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/silasol\/cve-2003-0282", "html_url": "https:\/\/github.com\/silasol\/cve-2003-0282",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "gmh5225", "login": "gmh5225",
"id": 13917777, "id": 13917777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
"html_url": "https:\/\/github.com\/gmh5225" "html_url": "https:\/\/github.com\/gmh5225",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2003-0358", "html_url": "https:\/\/github.com\/gmh5225\/CVE-2003-0358",
"description": "By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.", "description": "By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.",
@ -37,7 +38,8 @@
"login": "fengjixuchui", "login": "fengjixuchui",
"id": 2487206, "id": 2487206,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2487206?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2487206?v=4",
"html_url": "https:\/\/github.com\/fengjixuchui" "html_url": "https:\/\/github.com\/fengjixuchui",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/fengjixuchui\/CVE-2003-0358", "html_url": "https:\/\/github.com\/fengjixuchui\/CVE-2003-0358",
"description": "By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.", "description": "By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.",

View file

@ -7,7 +7,8 @@
"login": "fibonascii", "login": "fibonascii",
"id": 11827510, "id": 11827510,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11827510?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11827510?v=4",
"html_url": "https:\/\/github.com\/fibonascii" "html_url": "https:\/\/github.com\/fibonascii",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/fibonascii\/CVE-2004-0558", "html_url": "https:\/\/github.com\/fibonascii\/CVE-2004-0558",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "ivanitlearning", "login": "ivanitlearning",
"id": 52420671, "id": 52420671,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4",
"html_url": "https:\/\/github.com\/ivanitlearning" "html_url": "https:\/\/github.com\/ivanitlearning",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2004-1561", "html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2004-1561",
"description": "Icecast Header Overwrite buffer overflow RCE < 2.0.1 (Win32)", "description": "Icecast Header Overwrite buffer overflow RCE < 2.0.1 (Win32)",
@ -37,7 +38,8 @@
"login": "ratiros01", "login": "ratiros01",
"id": 14090955, "id": 14090955,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14090955?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14090955?v=4",
"html_url": "https:\/\/github.com\/ratiros01" "html_url": "https:\/\/github.com\/ratiros01",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/ratiros01\/CVE-2004-1561", "html_url": "https:\/\/github.com\/ratiros01\/CVE-2004-1561",
"description": null, "description": null,
@ -67,7 +69,8 @@
"login": "darrynb89", "login": "darrynb89",
"id": 23241437, "id": 23241437,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23241437?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23241437?v=4",
"html_url": "https:\/\/github.com\/darrynb89" "html_url": "https:\/\/github.com\/darrynb89",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/darrynb89\/CVE-2004-1561", "html_url": "https:\/\/github.com\/darrynb89\/CVE-2004-1561",
"description": "Python version of Metasploit exploit for CVE-2004-1561", "description": "Python version of Metasploit exploit for CVE-2004-1561",
@ -97,7 +100,8 @@
"login": "thel1nus", "login": "thel1nus",
"id": 77783022, "id": 77783022,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77783022?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77783022?v=4",
"html_url": "https:\/\/github.com\/thel1nus" "html_url": "https:\/\/github.com\/thel1nus",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/thel1nus\/CVE-2004-1561-Notes", "html_url": "https:\/\/github.com\/thel1nus\/CVE-2004-1561-Notes",
"description": "My notes for CVE-2004-1561 IceCast exploitation", "description": "My notes for CVE-2004-1561 IceCast exploitation",

View file

@ -7,7 +7,8 @@
"login": "sinkaroid", "login": "sinkaroid",
"id": 12372481, "id": 12372481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12372481?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12372481?v=4",
"html_url": "https:\/\/github.com\/sinkaroid" "html_url": "https:\/\/github.com\/sinkaroid",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/sinkaroid\/shiguresh", "html_url": "https:\/\/github.com\/sinkaroid\/shiguresh",
"description": "CVE-2004-1769 cPanel Resetpass Remote Command Execution", "description": "CVE-2004-1769 cPanel Resetpass Remote Command Execution",
@ -40,7 +41,8 @@
"login": "Redsplit", "login": "Redsplit",
"id": 65139960, "id": 65139960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65139960?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65139960?v=4",
"html_url": "https:\/\/github.com\/Redsplit" "html_url": "https:\/\/github.com\/Redsplit",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Redsplit\/shiguresh", "html_url": "https:\/\/github.com\/Redsplit\/shiguresh",
"description": "CVE-2004-1769 \/\/ Mass cPanel Reset password", "description": "CVE-2004-1769 \/\/ Mass cPanel Reset password",

View file

@ -7,7 +7,8 @@
"login": "uzzzval", "login": "uzzzval",
"id": 7476462, "id": 7476462,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7476462?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7476462?v=4",
"html_url": "https:\/\/github.com\/uzzzval" "html_url": "https:\/\/github.com\/uzzzval",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/uzzzval\/cve-2004-2167", "html_url": "https:\/\/github.com\/uzzzval\/cve-2004-2167",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "kkirsche", "login": "kkirsche",
"id": 947110, "id": 947110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4",
"html_url": "https:\/\/github.com\/kkirsche" "html_url": "https:\/\/github.com\/kkirsche",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2004-2271", "html_url": "https:\/\/github.com\/kkirsche\/CVE-2004-2271",
"description": "Minishare 1.4.1 Remote Buffer Overflow", "description": "Minishare 1.4.1 Remote Buffer Overflow",
@ -37,7 +38,8 @@
"login": "PercussiveElbow", "login": "PercussiveElbow",
"id": 10052381, "id": 10052381,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10052381?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10052381?v=4",
"html_url": "https:\/\/github.com\/PercussiveElbow" "html_url": "https:\/\/github.com\/PercussiveElbow",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/PercussiveElbow\/CVE-2004-2271-MiniShare-1.4.1-Buffer-Overflow", "html_url": "https:\/\/github.com\/PercussiveElbow\/CVE-2004-2271-MiniShare-1.4.1-Buffer-Overflow",
"description": null, "description": null,
@ -67,7 +69,8 @@
"login": "war4uthor", "login": "war4uthor",
"id": 45926018, "id": 45926018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor" "html_url": "https:\/\/github.com\/war4uthor",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2004-2271", "html_url": "https:\/\/github.com\/war4uthor\/CVE-2004-2271",
"description": "CVE-2004-2271 - Minishare 1.4.1 HTTP Server Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", "description": "CVE-2004-2271 - Minishare 1.4.1 HTTP Server Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",
@ -97,7 +100,8 @@
"login": "pwncone", "login": "pwncone",
"id": 57570315, "id": 57570315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4",
"html_url": "https:\/\/github.com\/pwncone" "html_url": "https:\/\/github.com\/pwncone",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/pwncone\/CVE-2004-2271-MiniShare-1.4.1-BOF", "html_url": "https:\/\/github.com\/pwncone\/CVE-2004-2271-MiniShare-1.4.1-BOF",
"description": "A python implementation of CVE-2004-2271 targeting MiniShare 1.4.1.", "description": "A python implementation of CVE-2004-2271 targeting MiniShare 1.4.1.",

View file

@ -7,7 +7,8 @@
"login": "ParallelVisions", "login": "ParallelVisions",
"id": 70821640, "id": 70821640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70821640?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70821640?v=4",
"html_url": "https:\/\/github.com\/ParallelVisions" "html_url": "https:\/\/github.com\/ParallelVisions",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/ParallelVisions\/DoSTool", "html_url": "https:\/\/github.com\/ParallelVisions\/DoSTool",
"description": "DDoS Tool which exploits vulnerability CVE-2004-2449 from vendor GameSpy (now known as OpenSpy). User is prompted for input IP address, and port. (NOTE: Please use this responsibly, I made this as a proof of concept of vulnerability exploitation ONLY. I do not endorse DOSing, DDoSing, or cheating in any way. Use this at your own risk.)", "description": "DDoS Tool which exploits vulnerability CVE-2004-2449 from vendor GameSpy (now known as OpenSpy). User is prompted for input IP address, and port. (NOTE: Please use this responsibly, I made this as a proof of concept of vulnerability exploitation ONLY. I do not endorse DOSing, DDoSing, or cheating in any way. Use this at your own risk.)",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2004-2549", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2004-2549",
"description": "Nortel Wireless LAN Access Point 2200 Series - Denial of Service", "description": "Nortel Wireless LAN Access Point 2200 Series - Denial of Service",

View file

@ -7,7 +7,8 @@
"login": "NyxByt3", "login": "NyxByt3",
"id": 66146701, "id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/NyxByt3" "html_url": "https:\/\/github.com\/NyxByt3",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/NyxByt3\/distccd_rce_CVE-2004-2687", "html_url": "https:\/\/github.com\/NyxByt3\/distccd_rce_CVE-2004-2687",
"description": null, "description": null,
@ -37,7 +38,8 @@
"login": "k4miyo", "login": "k4miyo",
"id": 49828037, "id": 49828037,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49828037?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49828037?v=4",
"html_url": "https:\/\/github.com\/k4miyo" "html_url": "https:\/\/github.com\/k4miyo",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/k4miyo\/CVE-2004-2687", "html_url": "https:\/\/github.com\/k4miyo\/CVE-2004-2687",
"description": "CVE-2004-2687 DistCC Daemon Command Execution", "description": "CVE-2004-2687 DistCC Daemon Command Execution",
@ -67,7 +69,8 @@
"login": "ss0wl", "login": "ss0wl",
"id": 61596312, "id": 61596312,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61596312?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61596312?v=4",
"html_url": "https:\/\/github.com\/ss0wl" "html_url": "https:\/\/github.com\/ss0wl",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/ss0wl\/CVE-2004-2687_distcc_v1", "html_url": "https:\/\/github.com\/ss0wl\/CVE-2004-2687_distcc_v1",
"description": "Remote Command Execution exploit for vulnerability CVE-2004-2687 in DistCC Daemon v1", "description": "Remote Command Execution exploit for vulnerability CVE-2004-2687 in DistCC Daemon v1",

View file

@ -7,7 +7,8 @@
"login": "yougboiz", "login": "yougboiz",
"id": 133153602, "id": 133153602,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133153602?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133153602?v=4",
"html_url": "https:\/\/github.com\/yougboiz" "html_url": "https:\/\/github.com\/yougboiz",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/yougboiz\/Metasploit-CVE-2004-6768", "html_url": "https:\/\/github.com\/yougboiz\/Metasploit-CVE-2004-6768",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "3t3rn4lv01d", "login": "3t3rn4lv01d",
"id": 78852098, "id": 78852098,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78852098?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78852098?v=4",
"html_url": "https:\/\/github.com\/3t3rn4lv01d" "html_url": "https:\/\/github.com\/3t3rn4lv01d",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/3t3rn4lv01d\/CVE-2005-0575", "html_url": "https:\/\/github.com\/3t3rn4lv01d\/CVE-2005-0575",
"description": "Exploit for KNet 1.04b Web Server Buffer Overflow SEH", "description": "Exploit for KNet 1.04b Web Server Buffer Overflow SEH",

View file

@ -7,7 +7,8 @@
"login": "Parcer0", "login": "Parcer0",
"id": 70012338, "id": 70012338,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4",
"html_url": "https:\/\/github.com\/Parcer0" "html_url": "https:\/\/github.com\/Parcer0",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure", "html_url": "https:\/\/github.com\/Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "tagatac", "login": "tagatac",
"id": 1304425, "id": 1304425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304425?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304425?v=4",
"html_url": "https:\/\/github.com\/tagatac" "html_url": "https:\/\/github.com\/tagatac",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/tagatac\/libsafe-CVE-2005-1125", "html_url": "https:\/\/github.com\/tagatac\/libsafe-CVE-2005-1125",
"description": "Libsafe - Safety Check Bypass Vulnerability (Proof of Concept Exploit & Time Randomization to Thwart It)", "description": "Libsafe - Safety Check Bypass Vulnerability (Proof of Concept Exploit & Time Randomization to Thwart It)",

View file

@ -7,7 +7,8 @@
"login": "InitRoot", "login": "InitRoot",
"id": 954507, "id": 954507,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/954507?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/954507?v=4",
"html_url": "https:\/\/github.com\/InitRoot" "html_url": "https:\/\/github.com\/InitRoot",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/InitRoot\/CVE-2005-1794Scanner", "html_url": "https:\/\/github.com\/InitRoot\/CVE-2005-1794Scanner",
"description": "Scanner for network for CVE-2005-1794.", "description": "Scanner for network for CVE-2005-1794.",

View file

@ -7,7 +7,8 @@
"login": "schwankner", "login": "schwankner",
"id": 1496765, "id": 1496765,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1496765?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1496765?v=4",
"html_url": "https:\/\/github.com\/schwankner" "html_url": "https:\/\/github.com\/schwankner",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit", "html_url": "https:\/\/github.com\/schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit", "description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit",

View file

@ -7,7 +7,8 @@
"login": "RizeKishimaro", "login": "RizeKishimaro",
"id": 75617768, "id": 75617768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75617768?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75617768?v=4",
"html_url": "https:\/\/github.com\/RizeKishimaro" "html_url": "https:\/\/github.com\/RizeKishimaro",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/RizeKishimaro\/CVE-2005-3299", "html_url": "https:\/\/github.com\/RizeKishimaro\/CVE-2005-3299",
"description": "CVE 2005 exploit.Perl in Perl.", "description": "CVE 2005 exploit.Perl in Perl.",
@ -37,7 +38,8 @@
"login": "Cr0w-ui", "login": "Cr0w-ui",
"id": 173009007, "id": 173009007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173009007?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173009007?v=4",
"html_url": "https:\/\/github.com\/Cr0w-ui" "html_url": "https:\/\/github.com\/Cr0w-ui",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Cr0w-ui\/-CVE-2005-3299-", "html_url": "https:\/\/github.com\/Cr0w-ui\/-CVE-2005-3299-",
"description": " phpMyAdmin 2.6.4-pl1 - Directory Traversal", "description": " phpMyAdmin 2.6.4-pl1 - Directory Traversal",

View file

@ -7,7 +7,8 @@
"login": "Parcer0", "login": "Parcer0",
"id": 70012338, "id": 70012338,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4",
"html_url": "https:\/\/github.com\/Parcer0" "html_url": "https:\/\/github.com\/Parcer0",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities", "html_url": "https:\/\/github.com\/Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities",
"description": "CVE-2006-0450. phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.", "description": "CVE-2006-0450. phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.",

View file

@ -7,7 +7,8 @@
"login": "pcastagnaro", "login": "pcastagnaro",
"id": 8824742, "id": 8824742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8824742?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8824742?v=4",
"html_url": "https:\/\/github.com\/pcastagnaro" "html_url": "https:\/\/github.com\/pcastagnaro",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/pcastagnaro\/dns_amplification_scanner", "html_url": "https:\/\/github.com\/pcastagnaro\/dns_amplification_scanner",
"description": "This script checks if each domain from a given domain list is vulnerable to CVE-2006-0987", "description": "This script checks if each domain from a given domain list is vulnerable to CVE-2006-0987",

View file

@ -7,7 +7,8 @@
"login": "Axua", "login": "Axua",
"id": 28788087, "id": 28788087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4",
"html_url": "https:\/\/github.com\/Axua" "html_url": "https:\/\/github.com\/Axua",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236", "html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236",
"description": "Exploit script for Crossfire 1.9.0", "description": "Exploit script for Crossfire 1.9.0",

View file

@ -7,7 +7,8 @@
"login": "Saksham2002", "login": "Saksham2002",
"id": 31695520, "id": 31695520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31695520?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31695520?v=4",
"html_url": "https:\/\/github.com\/Saksham2002" "html_url": "https:\/\/github.com\/Saksham2002",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Saksham2002\/CVE-2006-20001", "html_url": "https:\/\/github.com\/Saksham2002\/CVE-2006-20001",
"description": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice", "description": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice",

View file

@ -7,7 +7,8 @@
"login": "karthi-the-hacker", "login": "karthi-the-hacker",
"id": 33289300, "id": 33289300,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4",
"html_url": "https:\/\/github.com\/karthi-the-hacker" "html_url": "https:\/\/github.com\/karthi-the-hacker",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2006-2842", "html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2006-2842",
"description": "CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.", "description": "CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",

View file

@ -7,7 +7,8 @@
"login": "0xtz", "login": "0xtz",
"id": 53442065, "id": 53442065,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53442065?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53442065?v=4",
"html_url": "https:\/\/github.com\/0xtz" "html_url": "https:\/\/github.com\/0xtz",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/0xtz\/CVE-2006-3392", "html_url": "https:\/\/github.com\/0xtz\/CVE-2006-3392",
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)", "description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
@ -37,7 +38,8 @@
"login": "IvanGlinkin", "login": "IvanGlinkin",
"id": 64857726, "id": 64857726,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64857726?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64857726?v=4",
"html_url": "https:\/\/github.com\/IvanGlinkin" "html_url": "https:\/\/github.com\/IvanGlinkin",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/IvanGlinkin\/CVE-2006-3392", "html_url": "https:\/\/github.com\/IvanGlinkin\/CVE-2006-3392",
"description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.", "description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.",
@ -67,7 +69,8 @@
"login": "Adel-kaka-dz", "login": "Adel-kaka-dz",
"id": 65834056, "id": 65834056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65834056?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65834056?v=4",
"html_url": "https:\/\/github.com\/Adel-kaka-dz" "html_url": "https:\/\/github.com\/Adel-kaka-dz",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Adel-kaka-dz\/CVE-2006-3392", "html_url": "https:\/\/github.com\/Adel-kaka-dz\/CVE-2006-3392",
"description": "It is a simple tool to exploit local file include . vulnerabilities", "description": "It is a simple tool to exploit local file include . vulnerabilities",
@ -97,7 +100,8 @@
"login": "gb21oc", "login": "gb21oc",
"id": 66036094, "id": 66036094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66036094?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66036094?v=4",
"html_url": "https:\/\/github.com\/gb21oc" "html_url": "https:\/\/github.com\/gb21oc",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/gb21oc\/ExploitWebmin", "html_url": "https:\/\/github.com\/gb21oc\/ExploitWebmin",
"description": "Python script to exploit webmin vulnerability cve-2006-3392", "description": "Python script to exploit webmin vulnerability cve-2006-3392",
@ -127,7 +131,8 @@
"login": "kernel-cyber", "login": "kernel-cyber",
"id": 21226709, "id": 21226709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
"html_url": "https:\/\/github.com\/kernel-cyber" "html_url": "https:\/\/github.com\/kernel-cyber",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2006-3392", "html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2006-3392",
"description": "Webmin Local File Include (unauthenticated)", "description": "Webmin Local File Include (unauthenticated)",
@ -157,7 +162,8 @@
"login": "g1vi", "login": "g1vi",
"id": 120142960, "id": 120142960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120142960?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120142960?v=4",
"html_url": "https:\/\/github.com\/g1vi" "html_url": "https:\/\/github.com\/g1vi",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/g1vi\/CVE-2006-3392", "html_url": "https:\/\/github.com\/g1vi\/CVE-2006-3392",
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary file disclosure", "description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary file disclosure",
@ -187,7 +193,8 @@
"login": "MrEmpy", "login": "MrEmpy",
"id": 71796063, "id": 71796063,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71796063?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71796063?v=4",
"html_url": "https:\/\/github.com\/MrEmpy" "html_url": "https:\/\/github.com\/MrEmpy",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/MrEmpy\/CVE-2006-3392", "html_url": "https:\/\/github.com\/MrEmpy\/CVE-2006-3392",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "adenkiewicz", "login": "adenkiewicz",
"id": 1060275, "id": 1060275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4",
"html_url": "https:\/\/github.com\/adenkiewicz" "html_url": "https:\/\/github.com\/adenkiewicz",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2006-3592", "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2006-3592",
"description": "Exploit for Easy File Sharing FTP Server 3.5 on Win7 32", "description": "Exploit for Easy File Sharing FTP Server 3.5 on Win7 32",

View file

@ -7,7 +7,8 @@
"login": "defensahacker", "login": "defensahacker",
"id": 23421429, "id": 23421429,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23421429?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23421429?v=4",
"html_url": "https:\/\/github.com\/defensahacker" "html_url": "https:\/\/github.com\/defensahacker",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/defensahacker\/CVE-2006-3747", "html_url": "https:\/\/github.com\/defensahacker\/CVE-2006-3747",
"description": "Information about my advisory on CVE-2006-3747 (Apache mod_rewrite LDAP off-by-one buffer overflow).. At the time, it was the first public working exploit :)", "description": "Information about my advisory on CVE-2006-3747 (Apache mod_rewrite LDAP off-by-one buffer overflow).. At the time, it was the first public working exploit :)",

View file

@ -7,7 +7,8 @@
"login": "Mario1234", "login": "Mario1234",
"id": 30897590, "id": 30897590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30897590?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30897590?v=4",
"html_url": "https:\/\/github.com\/Mario1234" "html_url": "https:\/\/github.com\/Mario1234",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Mario1234\/js-driveby-download-CVE-2006-4777", "html_url": "https:\/\/github.com\/Mario1234\/js-driveby-download-CVE-2006-4777",
"description": "malware del lado del cliente de explotacion de vulnerabilidad de internet explorer 6.0 SP1 en windows xp SP2. No requiere de consentimiento por parte del usuario y no descarga ningun archivo", "description": "malware del lado del cliente de explotacion de vulnerabilidad de internet explorer 6.0 SP1 en windows xp SP2. No requiere de consentimiento por parte del usuario y no descarga ningun archivo",

View file

@ -7,7 +7,8 @@
"login": "tagatac", "login": "tagatac",
"id": 1304425, "id": 1304425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304425?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304425?v=4",
"html_url": "https:\/\/github.com\/tagatac" "html_url": "https:\/\/github.com\/tagatac",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/tagatac\/linux-CVE-2006-4814", "html_url": "https:\/\/github.com\/tagatac\/linux-CVE-2006-4814",
"description": "A deadlock on the mmap semaphore mmap sem in the CentOS 3.9 kernel, that is triggered by a specific interleaving of concurrent threads, one calling the mmap system call and the other calling the mincore system call.", "description": "A deadlock on the mmap semaphore mmap sem in the CentOS 3.9 kernel, that is triggered by a specific interleaving of concurrent threads, one calling the mmap system call and the other calling the mincore system call.",

View file

@ -7,7 +7,8 @@
"login": "bigb0x", "login": "bigb0x",
"id": 13532434, "id": 13532434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
"html_url": "https:\/\/github.com\/bigb0x" "html_url": "https:\/\/github.com\/bigb0x",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387", "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.", "description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
@ -43,7 +44,8 @@
"login": "sardine-web", "login": "sardine-web",
"id": 80635620, "id": 80635620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
"html_url": "https:\/\/github.com\/sardine-web" "html_url": "https:\/\/github.com\/sardine-web",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check", "html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check",
"description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.", "description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
@ -73,7 +75,8 @@
"login": "ThemeHackers", "login": "ThemeHackers",
"id": 107047730, "id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers" "html_url": "https:\/\/github.com\/ThemeHackers",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-6387", "html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-6387",
"description": "CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH.", "description": "CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH.",

View file

@ -7,7 +7,8 @@
"login": "shauntdergrigorian", "login": "shauntdergrigorian",
"id": 7718028, "id": 7718028,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7718028?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7718028?v=4",
"html_url": "https:\/\/github.com\/shauntdergrigorian" "html_url": "https:\/\/github.com\/shauntdergrigorian",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184", "html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
"description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.", "description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.",
@ -37,7 +38,8 @@
"login": "b03902043", "login": "b03902043",
"id": 9023845, "id": 9023845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9023845?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9023845?v=4",
"html_url": "https:\/\/github.com\/b03902043" "html_url": "https:\/\/github.com\/b03902043",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184", "html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184",
"description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184", "description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",

View file

@ -7,7 +7,8 @@
"login": "Axua", "login": "Axua",
"id": 28788087, "id": 28788087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4",
"html_url": "https:\/\/github.com\/Axua" "html_url": "https:\/\/github.com\/Axua",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038", "html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038",
"description": "IE7 buffer overflow through an ANI file", "description": "IE7 buffer overflow through an ANI file",

View file

@ -7,7 +7,8 @@
"login": "z3APA3A", "login": "z3APA3A",
"id": 7222768, "id": 7222768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7222768?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7222768?v=4",
"html_url": "https:\/\/github.com\/z3APA3A" "html_url": "https:\/\/github.com\/z3APA3A",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/z3APA3A\/spydir", "html_url": "https:\/\/github.com\/z3APA3A\/spydir",
"description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)", "description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)",

View file

@ -7,7 +7,8 @@
"login": "war4uthor", "login": "war4uthor",
"id": 45926018, "id": 45926018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor" "html_url": "https:\/\/github.com\/war4uthor",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2007-1567", "html_url": "https:\/\/github.com\/war4uthor\/CVE-2007-1567",
"description": "CVE-2007-1567 - WarFTP 1.65 'USER' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", "description": "CVE-2007-1567 - WarFTP 1.65 'USER' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",

View file

@ -7,7 +7,8 @@
"login": "anthophilee", "login": "anthophilee",
"id": 75995332, "id": 75995332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4",
"html_url": "https:\/\/github.com\/anthophilee" "html_url": "https:\/\/github.com\/anthophilee",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan", "html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan",
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",

View file

@ -7,7 +7,8 @@
"login": "amriunix", "login": "amriunix",
"id": 6618368, "id": 6618368,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6618368?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6618368?v=4",
"html_url": "https:\/\/github.com\/amriunix" "html_url": "https:\/\/github.com\/amriunix",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447", "html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447",
"description": "CVE-2007-2447 - Samba usermap script", "description": "CVE-2007-2447 - Samba usermap script",
@ -37,7 +38,8 @@
"login": "Unix13", "login": "Unix13",
"id": 52569108, "id": 52569108,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52569108?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52569108?v=4",
"html_url": "https:\/\/github.com\/Unix13" "html_url": "https:\/\/github.com\/Unix13",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Unix13\/metasploitable2", "html_url": "https:\/\/github.com\/Unix13\/metasploitable2",
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.", "description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
@ -67,7 +69,8 @@
"login": "b1fair", "login": "b1fair",
"id": 43326124, "id": 43326124,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43326124?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43326124?v=4",
"html_url": "https:\/\/github.com\/b1fair" "html_url": "https:\/\/github.com\/b1fair",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/b1fair\/smb_usermap", "html_url": "https:\/\/github.com\/b1fair\/smb_usermap",
"description": "A simple exploit for CVE-2007-2447", "description": "A simple exploit for CVE-2007-2447",
@ -97,7 +100,8 @@
"login": "JoseBarrios", "login": "JoseBarrios",
"id": 794342, "id": 794342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/794342?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/794342?v=4",
"html_url": "https:\/\/github.com\/JoseBarrios" "html_url": "https:\/\/github.com\/JoseBarrios",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447", "html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447",
"description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.", "description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.",
@ -127,7 +131,8 @@
"login": "3x1t1um", "login": "3x1t1um",
"id": 54857145, "id": 54857145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54857145?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54857145?v=4",
"html_url": "https:\/\/github.com\/3x1t1um" "html_url": "https:\/\/github.com\/3x1t1um",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447", "html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447",
"description": null, "description": null,
@ -157,7 +162,8 @@
"login": "xlcc4096", "login": "xlcc4096",
"id": 75581853, "id": 75581853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75581853?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75581853?v=4",
"html_url": "https:\/\/github.com\/xlcc4096" "html_url": "https:\/\/github.com\/xlcc4096",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/xlcc4096\/exploit-CVE-2007-2447", "html_url": "https:\/\/github.com\/xlcc4096\/exploit-CVE-2007-2447",
"description": "Exploit for the vulnerability CVE-2007-2447", "description": "Exploit for the vulnerability CVE-2007-2447",
@ -187,7 +193,8 @@
"login": "WildfootW", "login": "WildfootW",
"id": 11520473, "id": 11520473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4",
"html_url": "https:\/\/github.com\/WildfootW" "html_url": "https:\/\/github.com\/WildfootW",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/WildfootW\/CVE-2007-2447_Samba_3.0.25rc3", "html_url": "https:\/\/github.com\/WildfootW\/CVE-2007-2447_Samba_3.0.25rc3",
"description": null, "description": null,
@ -217,7 +224,8 @@
"login": "Ziemni", "login": "Ziemni",
"id": 22441278, "id": 22441278,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22441278?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22441278?v=4",
"html_url": "https:\/\/github.com\/Ziemni" "html_url": "https:\/\/github.com\/Ziemni",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Ziemni\/CVE-2007-2447-in-Python", "html_url": "https:\/\/github.com\/Ziemni\/CVE-2007-2447-in-Python",
"description": "Python implementation of 'Username' map script' RCE Exploit for Samba 3.0.20 < 3.0.25rc3 (CVE-2007-2447).", "description": "Python implementation of 'Username' map script' RCE Exploit for Samba 3.0.20 < 3.0.25rc3 (CVE-2007-2447).",
@ -247,7 +255,8 @@
"login": "0xKn", "login": "0xKn",
"id": 80174242, "id": 80174242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80174242?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80174242?v=4",
"html_url": "https:\/\/github.com\/0xKn" "html_url": "https:\/\/github.com\/0xKn",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/0xKn\/CVE-2007-2447", "html_url": "https:\/\/github.com\/0xKn\/CVE-2007-2447",
"description": null, "description": null,
@ -277,7 +286,8 @@
"login": "ozuma", "login": "ozuma",
"id": 1208361, "id": 1208361,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1208361?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1208361?v=4",
"html_url": "https:\/\/github.com\/ozuma" "html_url": "https:\/\/github.com\/ozuma",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/ozuma\/CVE-2007-2447", "html_url": "https:\/\/github.com\/ozuma\/CVE-2007-2447",
"description": "Exploit Samba", "description": "Exploit Samba",
@ -307,7 +317,8 @@
"login": "un4gi", "login": "un4gi",
"id": 47873286, "id": 47873286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47873286?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47873286?v=4",
"html_url": "https:\/\/github.com\/un4gi" "html_url": "https:\/\/github.com\/un4gi",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/un4gi\/CVE-2007-2447", "html_url": "https:\/\/github.com\/un4gi\/CVE-2007-2447",
"description": "Samba 3.0.20 username map script exploit", "description": "Samba 3.0.20 username map script exploit",
@ -337,7 +348,8 @@
"login": "G01d3nW01f", "login": "G01d3nW01f",
"id": 75846902, "id": 75846902,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4",
"html_url": "https:\/\/github.com\/G01d3nW01f" "html_url": "https:\/\/github.com\/G01d3nW01f",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2007-2447", "html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2007-2447",
"description": "cve-2007-2447 this script was rewrite the part of Metasploit modules to python3", "description": "cve-2007-2447 this script was rewrite the part of Metasploit modules to python3",
@ -367,7 +379,8 @@
"login": "cherrera0001", "login": "cherrera0001",
"id": 19656010, "id": 19656010,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19656010?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19656010?v=4",
"html_url": "https:\/\/github.com\/cherrera0001" "html_url": "https:\/\/github.com\/cherrera0001",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/cherrera0001\/CVE-2007-2447", "html_url": "https:\/\/github.com\/cherrera0001\/CVE-2007-2447",
"description": " Samba usermap script.", "description": " Samba usermap script.",
@ -397,7 +410,8 @@
"login": "Alien0ne", "login": "Alien0ne",
"id": 73351962, "id": 73351962,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73351962?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73351962?v=4",
"html_url": "https:\/\/github.com\/Alien0ne" "html_url": "https:\/\/github.com\/Alien0ne",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Alien0ne\/CVE-2007-2447", "html_url": "https:\/\/github.com\/Alien0ne\/CVE-2007-2447",
"description": "CVE-2007-2447 - Samba usermap script", "description": "CVE-2007-2447 - Samba usermap script",
@ -427,7 +441,8 @@
"login": "3t4n", "login": "3t4n",
"id": 16639269, "id": 16639269,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16639269?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16639269?v=4",
"html_url": "https:\/\/github.com\/3t4n" "html_url": "https:\/\/github.com\/3t4n",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/3t4n\/samba-3.0.24-CVE-2007-2447-vunerable-", "html_url": "https:\/\/github.com\/3t4n\/samba-3.0.24-CVE-2007-2447-vunerable-",
"description": null, "description": null,
@ -457,7 +472,8 @@
"login": "xbufu", "login": "xbufu",
"id": 49696158, "id": 49696158,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49696158?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49696158?v=4",
"html_url": "https:\/\/github.com\/xbufu" "html_url": "https:\/\/github.com\/xbufu",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/xbufu\/CVE-2007-2447", "html_url": "https:\/\/github.com\/xbufu\/CVE-2007-2447",
"description": "Exploit code for CVE-2007-2447 written in Python3.", "description": "Exploit code for CVE-2007-2447 written in Python3.",
@ -487,7 +503,8 @@
"login": "s4msec", "login": "s4msec",
"id": 75855533, "id": 75855533,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75855533?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75855533?v=4",
"html_url": "https:\/\/github.com\/s4msec" "html_url": "https:\/\/github.com\/s4msec",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/s4msec\/CVE-2007-2447", "html_url": "https:\/\/github.com\/s4msec\/CVE-2007-2447",
"description": null, "description": null,
@ -517,7 +534,8 @@
"login": "0xConstant", "login": "0xConstant",
"id": 51972282, "id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/0xConstant" "html_url": "https:\/\/github.com\/0xConstant",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/0xConstant\/CVE-2007-2447", "html_url": "https:\/\/github.com\/0xConstant\/CVE-2007-2447",
"description": null, "description": null,
@ -547,7 +565,8 @@
"login": "Nosferatuvjr", "login": "Nosferatuvjr",
"id": 67665267, "id": 67665267,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67665267?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67665267?v=4",
"html_url": "https:\/\/github.com\/Nosferatuvjr" "html_url": "https:\/\/github.com\/Nosferatuvjr",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Nosferatuvjr\/Samba-Usermap-exploit", "html_url": "https:\/\/github.com\/Nosferatuvjr\/Samba-Usermap-exploit",
"description": "CVE-2007-2447", "description": "CVE-2007-2447",
@ -577,7 +596,8 @@
"login": "testaross4", "login": "testaross4",
"id": 105503572, "id": 105503572,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105503572?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105503572?v=4",
"html_url": "https:\/\/github.com\/testaross4" "html_url": "https:\/\/github.com\/testaross4",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/testaross4\/CVE-2007-2447", "html_url": "https:\/\/github.com\/testaross4\/CVE-2007-2447",
"description": null, "description": null,
@ -607,7 +627,8 @@
"login": "mr-l0n3lly", "login": "mr-l0n3lly",
"id": 24935413, "id": 24935413,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24935413?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24935413?v=4",
"html_url": "https:\/\/github.com\/mr-l0n3lly" "html_url": "https:\/\/github.com\/mr-l0n3lly",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/mr-l0n3lly\/CVE-2007-2447", "html_url": "https:\/\/github.com\/mr-l0n3lly\/CVE-2007-2447",
"description": "CVE-2007-2447 samba remote code execution", "description": "CVE-2007-2447 samba remote code execution",
@ -637,7 +658,8 @@
"login": "HerculesRD", "login": "HerculesRD",
"id": 73125772, "id": 73125772,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4",
"html_url": "https:\/\/github.com\/HerculesRD" "html_url": "https:\/\/github.com\/HerculesRD",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/HerculesRD\/PyUsernameMapScriptRCE", "html_url": "https:\/\/github.com\/HerculesRD\/PyUsernameMapScriptRCE",
"description": "CVE-2007-2447 exploit written in python to get reverse shell", "description": "CVE-2007-2447 exploit written in python to get reverse shell",
@ -667,7 +689,8 @@
"login": "Aviksaikat", "login": "Aviksaikat",
"id": 31238298, "id": 31238298,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4",
"html_url": "https:\/\/github.com\/Aviksaikat" "html_url": "https:\/\/github.com\/Aviksaikat",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2007-2447", "html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2007-2447",
"description": "automated script for exploiting CVE-2007-2447", "description": "automated script for exploiting CVE-2007-2447",
@ -697,7 +720,8 @@
"login": "NyxByt3", "login": "NyxByt3",
"id": 66146701, "id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/NyxByt3" "html_url": "https:\/\/github.com\/NyxByt3",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2007-2447", "html_url": "https:\/\/github.com\/NyxByt3\/CVE-2007-2447",
"description": "Exploit Samba smbd 3.0.20-Debian", "description": "Exploit Samba smbd 3.0.20-Debian",
@ -727,7 +751,8 @@
"login": "bdunlap9", "login": "bdunlap9",
"id": 23561759, "id": 23561759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23561759?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23561759?v=4",
"html_url": "https:\/\/github.com\/bdunlap9" "html_url": "https:\/\/github.com\/bdunlap9",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/bdunlap9\/CVE-2007-2447_python", "html_url": "https:\/\/github.com\/bdunlap9\/CVE-2007-2447_python",
"description": "Exploit i used in HTB", "description": "Exploit i used in HTB",
@ -757,7 +782,8 @@
"login": "MikeRega7", "login": "MikeRega7",
"id": 114309996, "id": 114309996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114309996?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114309996?v=4",
"html_url": "https:\/\/github.com\/MikeRega7" "html_url": "https:\/\/github.com\/MikeRega7",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/MikeRega7\/CVE-2007-2447-RCE", "html_url": "https:\/\/github.com\/MikeRega7\/CVE-2007-2447-RCE",
"description": "Samba 3.0.20", "description": "Samba 3.0.20",
@ -787,7 +813,8 @@
"login": "0xTabun", "login": "0xTabun",
"id": 144548207, "id": 144548207,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144548207?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144548207?v=4",
"html_url": "https:\/\/github.com\/0xTabun" "html_url": "https:\/\/github.com\/0xTabun",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/0xTabun\/CVE-2007-2447", "html_url": "https:\/\/github.com\/0xTabun\/CVE-2007-2447",
"description": "Samba Reverse Shell", "description": "Samba Reverse Shell",
@ -817,7 +844,8 @@
"login": "ShivamDey", "login": "ShivamDey",
"id": 87941867, "id": 87941867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87941867?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87941867?v=4",
"html_url": "https:\/\/github.com\/ShivamDey" "html_url": "https:\/\/github.com\/ShivamDey",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/ShivamDey\/Samba-CVE-2007-2447-Exploit", "html_url": "https:\/\/github.com\/ShivamDey\/Samba-CVE-2007-2447-Exploit",
"description": null, "description": null,
@ -847,7 +875,8 @@
"login": "Juantos", "login": "Juantos",
"id": 22524318, "id": 22524318,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22524318?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22524318?v=4",
"html_url": "https:\/\/github.com\/Juantos" "html_url": "https:\/\/github.com\/Juantos",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Juantos\/cve-2007-2447", "html_url": "https:\/\/github.com\/Juantos\/cve-2007-2447",
"description": "Samba 3.0.0 - 3.0.25rc3", "description": "Samba 3.0.0 - 3.0.25rc3",
@ -877,7 +906,8 @@
"login": "IamLucif3r", "login": "IamLucif3r",
"id": 53969258, "id": 53969258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53969258?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53969258?v=4",
"html_url": "https:\/\/github.com\/IamLucif3r" "html_url": "https:\/\/github.com\/IamLucif3r",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/IamLucif3r\/CVE-2007-2447-Exploit", "html_url": "https:\/\/github.com\/IamLucif3r\/CVE-2007-2447-Exploit",
"description": "This is a exploit for CVE-2007-2447; Vulnerable SMB ", "description": "This is a exploit for CVE-2007-2447; Vulnerable SMB ",

View file

@ -7,7 +7,8 @@
"login": "DenuwanJayasekara", "login": "DenuwanJayasekara",
"id": 181200406, "id": 181200406,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181200406?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181200406?v=4",
"html_url": "https:\/\/github.com\/DenuwanJayasekara" "html_url": "https:\/\/github.com\/DenuwanJayasekara",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/DenuwanJayasekara\/CVE-Exploitation-Reports", "html_url": "https:\/\/github.com\/DenuwanJayasekara\/CVE-Exploitation-Reports",
"description": "CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708", "description": "CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-3830", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-3830",
"description": "IBM Proventia Sensor Appliance - Multiple Input Validation Vulnerabilities", "description": "IBM Proventia Sensor Appliance - Multiple Input Validation Vulnerabilities",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-3831", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-3831",
"description": "PHP remote file inclusion in main.php in ISS Proventia Network IPS GX5108 1.3 and GX5008 1.5 ", "description": "PHP remote file inclusion in main.php in ISS Proventia Network IPS GX5108 1.3 and GX5008 1.5 ",

View file

@ -7,7 +7,8 @@
"login": "advanced-threat-research", "login": "advanced-threat-research",
"id": 27901279, "id": 27901279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
"html_url": "https:\/\/github.com\/advanced-threat-research" "html_url": "https:\/\/github.com\/advanced-threat-research",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/advanced-threat-research\/Creosote", "html_url": "https:\/\/github.com\/advanced-threat-research\/Creosote",
"description": "Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.", "description": "Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.",
@ -37,7 +38,8 @@
"login": "Ooscaar", "login": "Ooscaar",
"id": 60936394, "id": 60936394,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60936394?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60936394?v=4",
"html_url": "https:\/\/github.com\/Ooscaar" "html_url": "https:\/\/github.com\/Ooscaar",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Ooscaar\/MALW", "html_url": "https:\/\/github.com\/Ooscaar\/MALW",
"description": "CVE-2007-4559 - Polemarch exploit", "description": "CVE-2007-4559 - Polemarch exploit",
@ -67,7 +69,8 @@
"login": "davidholiday", "login": "davidholiday",
"id": 7077306, "id": 7077306,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7077306?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7077306?v=4",
"html_url": "https:\/\/github.com\/davidholiday" "html_url": "https:\/\/github.com\/davidholiday",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/davidholiday\/CVE-2007-4559", "html_url": "https:\/\/github.com\/davidholiday\/CVE-2007-4559",
"description": null, "description": null,
@ -97,7 +100,8 @@
"login": "luigigubello", "login": "luigigubello",
"id": 27034386, "id": 27034386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27034386?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27034386?v=4",
"html_url": "https:\/\/github.com\/luigigubello" "html_url": "https:\/\/github.com\/luigigubello",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/luigigubello\/trellix-tarslip-patch-bypass", "html_url": "https:\/\/github.com\/luigigubello\/trellix-tarslip-patch-bypass",
"description": "Bypass for CVE-2007-4559 Trellix patch", "description": "Bypass for CVE-2007-4559 Trellix patch",
@ -127,7 +131,8 @@
"login": "JamesDarf", "login": "JamesDarf",
"id": 96758146, "id": 96758146,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96758146?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96758146?v=4",
"html_url": "https:\/\/github.com\/JamesDarf" "html_url": "https:\/\/github.com\/JamesDarf",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/JamesDarf\/tarpioka", "html_url": "https:\/\/github.com\/JamesDarf\/tarpioka",
"description": "YISF 2024 CTF-Web (Directory Traversal via \".tar\" file, CVE-2007-4559), easy", "description": "YISF 2024 CTF-Web (Directory Traversal via \".tar\" file, CVE-2007-4559), easy",

View file

@ -7,7 +7,8 @@
"login": "0x1sac", "login": "0x1sac",
"id": 121731764, "id": 121731764,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121731764?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121731764?v=4",
"html_url": "https:\/\/github.com\/0x1sac" "html_url": "https:\/\/github.com\/0x1sac",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/0x1sac\/ClamAV-Milter-Sendmail-0.91.2-Remote-Code-Execution", "html_url": "https:\/\/github.com\/0x1sac\/ClamAV-Milter-Sendmail-0.91.2-Remote-Code-Execution",
"description": "Exploit for CVE-2007-4560 (ClamAV Milter Sendmail 0.91.2 Remote Code Execution)", "description": "Exploit for CVE-2007-4560 (ClamAV Milter Sendmail 0.91.2 Remote Code Execution)",

View file

@ -7,7 +7,8 @@
"login": "joeyrideout", "login": "joeyrideout",
"id": 4960269, "id": 4960269,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4960269?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4960269?v=4",
"html_url": "https:\/\/github.com\/joeyrideout" "html_url": "https:\/\/github.com\/joeyrideout",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/joeyrideout\/CVE-2007-4607", "html_url": "https:\/\/github.com\/joeyrideout\/CVE-2007-4607",
"description": "Make CVE-2007-4607 exploitable again!", "description": "Make CVE-2007-4607 exploitable again!",

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-5036", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-5036",
"description": "Airsensor M520 - HTTPd Unauthenticated Remote Denial of Service \/ Buffer Overflow (PoC)", "description": "Airsensor M520 - HTTPd Unauthenticated Remote Denial of Service \/ Buffer Overflow (PoC)",

View file

@ -7,7 +7,8 @@
"login": "antogit-sys", "login": "antogit-sys",
"id": 64706936, "id": 64706936,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64706936?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64706936?v=4",
"html_url": "https:\/\/github.com\/antogit-sys" "html_url": "https:\/\/github.com\/antogit-sys",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/antogit-sys\/CVE-2007-5962", "html_url": "https:\/\/github.com\/antogit-sys\/CVE-2007-5962",
"description": "vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption", "description": "vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption",

View file

@ -7,7 +7,8 @@
"login": "Nicoslo", "login": "Nicoslo",
"id": 64541498, "id": 64541498,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64541498?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64541498?v=4",
"html_url": "https:\/\/github.com\/Nicoslo" "html_url": "https:\/\/github.com\/Nicoslo",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Nicoslo\/Windows-exploitation-BadBlue-2.7-CVE-2007-6377", "html_url": "https:\/\/github.com\/Nicoslo\/Windows-exploitation-BadBlue-2.7-CVE-2007-6377",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-6638", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-6638",
"description": "March Networks DVR 3204 - Logfile Information Disclosure", "description": "March Networks DVR 3204 - Logfile Information Disclosure",

View file

@ -7,7 +7,8 @@
"login": "ngyanch", "login": "ngyanch",
"id": 26293983, "id": 26293983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26293983?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26293983?v=4",
"html_url": "https:\/\/github.com\/ngyanch" "html_url": "https:\/\/github.com\/ngyanch",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/ngyanch\/4062-1", "html_url": "https:\/\/github.com\/ngyanch\/4062-1",
"description": "CVE-2008-0128", "description": "CVE-2008-0128",

View file

@ -7,7 +7,8 @@
"login": "g0tmi1k", "login": "g0tmi1k",
"id": 535942, "id": 535942,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/535942?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/535942?v=4",
"html_url": "https:\/\/github.com\/g0tmi1k" "html_url": "https:\/\/github.com\/g0tmi1k",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/g0tmi1k\/debian-ssh", "html_url": "https:\/\/github.com\/g0tmi1k\/debian-ssh",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
@ -39,7 +40,8 @@
"login": "avarx", "login": "avarx",
"id": 1161946, "id": 1161946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1161946?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1161946?v=4",
"html_url": "https:\/\/github.com\/avarx" "html_url": "https:\/\/github.com\/avarx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/avarx\/vulnkeys", "html_url": "https:\/\/github.com\/avarx\/vulnkeys",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
@ -69,7 +71,8 @@
"login": "badkeys", "login": "badkeys",
"id": 97682451, "id": 97682451,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97682451?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97682451?v=4",
"html_url": "https:\/\/github.com\/badkeys" "html_url": "https:\/\/github.com\/badkeys",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/badkeys\/debianopenssl", "html_url": "https:\/\/github.com\/badkeys\/debianopenssl",
"description": "Private keys vulnerable to Debian OpenSSL bug (CVE-2008-0166)", "description": "Private keys vulnerable to Debian OpenSSL bug (CVE-2008-0166)",
@ -99,7 +102,8 @@
"login": "demining", "login": "demining",
"id": 87700947, "id": 87700947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87700947?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87700947?v=4",
"html_url": "https:\/\/github.com\/demining" "html_url": "https:\/\/github.com\/demining",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/demining\/Vulnerable-to-Debian-OpenSSL-bug-CVE-2008-0166", "html_url": "https:\/\/github.com\/demining\/Vulnerable-to-Debian-OpenSSL-bug-CVE-2008-0166",
"description": "Search for BTC coins on earlier versions of Bitcoin Core with critical vulnerability OpenSSL 0.9.8 CVE-2008-0166", "description": "Search for BTC coins on earlier versions of Bitcoin Core with critical vulnerability OpenSSL 0.9.8 CVE-2008-0166",

View file

@ -7,7 +7,8 @@
"login": "SpiderLabs", "login": "SpiderLabs",
"id": 508521, "id": 508521,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/508521?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/508521?v=4",
"html_url": "https:\/\/github.com\/SpiderLabs" "html_url": "https:\/\/github.com\/SpiderLabs",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/SpiderLabs\/TWSL2011-007_iOS_code_workaround", "html_url": "https:\/\/github.com\/SpiderLabs\/TWSL2011-007_iOS_code_workaround",
"description": "Workaround for the vulnerability identified by TWSL2011-007 or CVE-2008-0228 - iOS x509 Certificate Chain Validation Vulnerability", "description": "Workaround for the vulnerability identified by TWSL2011-007 or CVE-2008-0228 - iOS x509 Certificate Chain Validation Vulnerability",

View file

@ -7,7 +7,8 @@
"login": "Axua", "login": "Axua",
"id": 28788087, "id": 28788087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4",
"html_url": "https:\/\/github.com\/Axua" "html_url": "https:\/\/github.com\/Axua",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Axua\/CVE-2008-1611", "html_url": "https:\/\/github.com\/Axua\/CVE-2008-1611",
"description": "CVE-2008-1611 TFTP 1.41 buffer overflow exploit in the filepath", "description": "CVE-2008-1611 TFTP 1.41 buffer overflow exploit in the filepath",

View file

@ -7,7 +7,8 @@
"login": "SECFORCE", "login": "SECFORCE",
"id": 8157384, "id": 8157384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE" "html_url": "https:\/\/github.com\/SECFORCE",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613", "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613",
"description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.", "description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.",

View file

@ -7,7 +7,8 @@
"login": "TheRook", "login": "TheRook",
"id": 521783, "id": 521783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/521783?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/521783?v=4",
"html_url": "https:\/\/github.com\/TheRook" "html_url": "https:\/\/github.com\/TheRook",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/TheRook\/AudioCaptchaBypass-CVE-2008-2019", "html_url": "https:\/\/github.com\/TheRook\/AudioCaptchaBypass-CVE-2008-2019",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "Naramsim", "login": "Naramsim",
"id": 8996268, "id": 8996268,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996268?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996268?v=4",
"html_url": "https:\/\/github.com\/Naramsim" "html_url": "https:\/\/github.com\/Naramsim",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Naramsim\/Offensive", "html_url": "https:\/\/github.com\/Naramsim\/Offensive",
"description": "Reproducible exploits for: CVE-2016-1240 CVE-2008-2938 CVE-2014-2064 CVE-2014-1904", "description": "Reproducible exploits for: CVE-2016-1240 CVE-2008-2938 CVE-2014-2064 CVE-2014-1904",

View file

@ -7,7 +7,8 @@
"login": "test-one9", "login": "test-one9",
"id": 175934231, "id": 175934231,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175934231?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175934231?v=4",
"html_url": "https:\/\/github.com\/test-one9" "html_url": "https:\/\/github.com\/test-one9",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/test-one9\/ps4-11.50.github.io", "html_url": "https:\/\/github.com\/test-one9\/ps4-11.50.github.io",
"description": "ps4 cve-2008-3531", "description": "ps4 cve-2008-3531",

View file

@ -7,7 +7,8 @@
"login": "bigb0x", "login": "bigb0x",
"id": 13532434, "id": 13532434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
"html_url": "https:\/\/github.com\/bigb0x" "html_url": "https:\/\/github.com\/bigb0x",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387", "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.", "description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",

View file

@ -7,7 +7,8 @@
"login": "thunderstrike9090", "login": "thunderstrike9090",
"id": 28643644, "id": 28643644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28643644?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28643644?v=4",
"html_url": "https:\/\/github.com\/thunderstrike9090" "html_url": "https:\/\/github.com\/thunderstrike9090",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/thunderstrike9090\/Conflicker_analysis_scripts", "html_url": "https:\/\/github.com\/thunderstrike9090\/Conflicker_analysis_scripts",
"description": "Scripts to analyze conflicker worm which exploits famous netapi vulnerability (CVE-2008-4250) i.e MS08-067", "description": "Scripts to analyze conflicker worm which exploits famous netapi vulnerability (CVE-2008-4250) i.e MS08-067",

View file

@ -7,7 +7,8 @@
"login": "mrclki", "login": "mrclki",
"id": 75611002, "id": 75611002,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75611002?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75611002?v=4",
"html_url": "https:\/\/github.com\/mrclki" "html_url": "https:\/\/github.com\/mrclki",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/mrclki\/sockstress", "html_url": "https:\/\/github.com\/mrclki\/sockstress",
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go", "description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",

View file

@ -7,7 +7,8 @@
"login": "bongbongco", "login": "bongbongco",
"id": 3170006, "id": 3170006,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4",
"html_url": "https:\/\/github.com\/bongbongco" "html_url": "https:\/\/github.com\/bongbongco",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/bongbongco\/CVE-2008-4654", "html_url": "https:\/\/github.com\/bongbongco\/CVE-2008-4654",
"description": "VideoLAN VLC media player 0.9.4 Media Player ty.c buffer overflow", "description": "VideoLAN VLC media player 0.9.4 Media Player ty.c buffer overflow",
@ -37,7 +38,8 @@
"login": "KernelErr", "login": "KernelErr",
"id": 45716019, "id": 45716019,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45716019?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45716019?v=4",
"html_url": "https:\/\/github.com\/KernelErr" "html_url": "https:\/\/github.com\/KernelErr",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/KernelErr\/VLC-CVE-2008-4654-Exploit", "html_url": "https:\/\/github.com\/KernelErr\/VLC-CVE-2008-4654-Exploit",
"description": "An EXP could run on Windows x64 against CVE-2008-4654.", "description": "An EXP could run on Windows x64 against CVE-2008-4654.",
@ -73,7 +75,8 @@
"login": "rnnsz", "login": "rnnsz",
"id": 84464863, "id": 84464863,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84464863?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84464863?v=4",
"html_url": "https:\/\/github.com\/rnnsz" "html_url": "https:\/\/github.com\/rnnsz",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/rnnsz\/CVE-2008-4654", "html_url": "https:\/\/github.com\/rnnsz\/CVE-2008-4654",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "nmurilo", "login": "nmurilo",
"id": 22617810, "id": 22617810,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22617810?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22617810?v=4",
"html_url": "https:\/\/github.com\/nmurilo" "html_url": "https:\/\/github.com\/nmurilo",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/nmurilo\/CVE-2008-4687-exploit", "html_url": "https:\/\/github.com\/nmurilo\/CVE-2008-4687-exploit",
"description": null, "description": null,
@ -37,7 +38,8 @@
"login": "twisted007", "login": "twisted007",
"id": 76926949, "id": 76926949,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76926949?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76926949?v=4",
"html_url": "https:\/\/github.com\/twisted007" "html_url": "https:\/\/github.com\/twisted007",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/twisted007\/mantis_rce", "html_url": "https:\/\/github.com\/twisted007\/mantis_rce",
"description": "Python script to obtain RCE on Mantis Bug Tracker prior to version 1.2.x Check CVE-2008-4687 for additional information", "description": "Python script to obtain RCE on Mantis Bug Tracker prior to version 1.2.x Check CVE-2008-4687 for additional information",

View file

@ -7,7 +7,8 @@
"login": "SECFORCE", "login": "SECFORCE",
"id": 8157384, "id": 8157384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE" "html_url": "https:\/\/github.com\/SECFORCE",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-5416", "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-5416",
"description": "Microsoft SQL Server sp_replwritetovarbin Memory Corruption via SQL Injection", "description": "Microsoft SQL Server sp_replwritetovarbin Memory Corruption via SQL Injection",

View file

@ -7,7 +7,8 @@
"login": "K3ysTr0K3R", "login": "K3ysTr0K3R",
"id": 70909693, "id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R" "html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2008-5862-EXPLOIT", "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2008-5862-EXPLOIT",
"description": "A PoC exploit for CVE-2008-5862 - Directory traversal vulnerability in webcamXP 5.3.2.375 and 5.3.2.410", "description": "A PoC exploit for CVE-2008-5862 - Directory traversal vulnerability in webcamXP 5.3.2.375 and 5.3.2.410",

View file

@ -7,7 +7,8 @@
"login": "threatcode", "login": "threatcode",
"id": 120432727, "id": 120432727,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120432727?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120432727?v=4",
"html_url": "https:\/\/github.com\/threatcode" "html_url": "https:\/\/github.com\/threatcode",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/threatcode\/CVE-2008-6806", "html_url": "https:\/\/github.com\/threatcode\/CVE-2008-6806",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "alt3kx", "login": "alt3kx",
"id": 3140111, "id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx" "html_url": "https:\/\/github.com\/alt3kx",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2008-6827", "html_url": "https:\/\/github.com\/alt3kx\/CVE-2008-6827",
"description": "Symantec Altiris Client Service 6.8.378 - Local Privilege Escalation", "description": "Symantec Altiris Client Service 6.8.378 - Local Privilege Escalation",

View file

@ -7,7 +7,8 @@
"login": "KyomaHooin", "login": "KyomaHooin",
"id": 19186867, "id": 19186867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19186867?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19186867?v=4",
"html_url": "https:\/\/github.com\/KyomaHooin" "html_url": "https:\/\/github.com\/KyomaHooin",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/KyomaHooin\/CVE-2008-6970", "html_url": "https:\/\/github.com\/KyomaHooin\/CVE-2008-6970",
"description": "Blind SQL injection brute force.", "description": "Blind SQL injection brute force.",

View file

@ -7,7 +7,8 @@
"login": "followboy1999", "login": "followboy1999",
"id": 4121091, "id": 4121091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4121091?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4121091?v=4",
"html_url": "https:\/\/github.com\/followboy1999" "html_url": "https:\/\/github.com\/followboy1999",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/followboy1999\/CVE-2008-7220", "html_url": "https:\/\/github.com\/followboy1999\/CVE-2008-7220",
"description": null, "description": null,

View file

@ -7,7 +7,8 @@
"login": "nobodyatall648", "login": "nobodyatall648",
"id": 35725871, "id": 35725871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
"html_url": "https:\/\/github.com\/nobodyatall648" "html_url": "https:\/\/github.com\/nobodyatall648",
"user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2009-0182", "html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2009-0182",
"description": "CVE-2009-0182 VUPlayer2.49_LocalBufferOverflow", "description": "CVE-2009-0182 VUPlayer2.49_LocalBufferOverflow",

Some files were not shown because too many files have changed in this diff Show more