Auto Update 2020/08/04 06:10:07

This commit is contained in:
motikan2010-bot 2020-08-04 06:10:07 +09:00
parent 9aa609d4cf
commit 946ea6f4ea
42 changed files with 101 additions and 500 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 178449456,
"name": "CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"full_name": "schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"owner": {
"login": "schwankner",
"id": 1496765,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1496765?v=4",
"html_url": "https:\/\/github.com\/schwankner"
},
"html_url": "https:\/\/github.com\/schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
"description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit",
"fork": false,
"created_at": "2019-03-29T17:31:14Z",
"updated_at": "2019-08-26T16:40:59Z",
"pushed_at": "2019-03-29T17:31:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2020-08-02T13:01:44Z",
"updated_at": "2020-08-03T17:22:57Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 264,
"watchers_count": 264,
"stargazers_count": 265,
"watchers_count": 265,
"forks_count": 85,
"forks": 85,
"watchers": 264,
"watchers": 265,
"score": 0
},
{

View file

@ -1,25 +0,0 @@
[
{
"id": 264008888,
"name": "CVE-2009-0229-PoC",
"full_name": "zveriu\/CVE-2009-0229-PoC",
"owner": {
"login": "zveriu",
"id": 3428446,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3428446?v=4",
"html_url": "https:\/\/github.com\/zveriu"
},
"html_url": "https:\/\/github.com\/zveriu\/CVE-2009-0229-PoC",
"description": "PoC for CVE-2009-0229 \"Print Spooler Read File Vulnerability\" LPE AFR (related to CVE-2020-1048)",
"fork": false,
"created_at": "2020-05-14T19:40:50Z",
"updated_at": "2020-05-20T20:29:49Z",
"pushed_at": "2020-05-15T11:32:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 162229782,
"name": "str2hax",
"full_name": "Fullmetal5\/str2hax",
"owner": {
"login": "Fullmetal5",
"id": 3742968,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3742968?v=4",
"html_url": "https:\/\/github.com\/Fullmetal5"
},
"html_url": "https:\/\/github.com\/Fullmetal5\/str2hax",
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-12-18T04:24:43Z",
"updated_at": "2020-07-13T19:50:36Z",
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 4,
"forks": 4,
"watchers": 27,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 191334884,
"name": "vmware_exploit_pack_CVE-2009-1244",
"full_name": "piotrbania\/vmware_exploit_pack_CVE-2009-1244",
"owner": {
"login": "piotrbania",
"id": 51699228,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51699228?v=4",
"html_url": "https:\/\/github.com\/piotrbania"
},
"html_url": "https:\/\/github.com\/piotrbania\/vmware_exploit_pack_CVE-2009-1244",
"description": "vmware cloudburst exploit CVE-2009-1244",
"fork": false,
"created_at": "2019-06-11T09:08:52Z",
"updated_at": "2020-04-14T09:22:50Z",
"pushed_at": "2019-06-11T13:49:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,50 +1,4 @@
[
{
"id": 163585014,
"name": "CVE-2009-1330",
"full_name": "adenkiewicz\/CVE-2009-1330",
"owner": {
"login": "adenkiewicz",
"id": 1060275,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4",
"html_url": "https:\/\/github.com\/adenkiewicz"
},
"html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2009-1330",
"description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.",
"fork": false,
"created_at": "2018-12-30T12:17:08Z",
"updated_at": "2018-12-31T10:09:34Z",
"pushed_at": "2018-12-31T09:59:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 164236833,
"name": "CVE-2009-1330",
"full_name": "war4uthor\/CVE-2009-1330",
"owner": {
"login": "war4uthor",
"id": 45926018,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor"
},
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2009-1330",
"description": "CVE-2009-1330 - Easy RM to MP3 Converter Local Buffer Overflow. Tested on Windows XP Professional SP3",
"fork": false,
"created_at": "2019-01-05T17:32:00Z",
"updated_at": "2019-01-06T12:29:19Z",
"pushed_at": "2019-01-06T12:29:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 171340357,
"name": "CVE-2009-1330_EasyRMToMp3Converter",

View file

@ -1,25 +0,0 @@
[
{
"id": 122073610,
"name": "CVE-2009-1437",
"full_name": "HanseSecure\/CVE-2009-1437",
"owner": {
"login": "HanseSecure",
"id": 24669088,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24669088?v=4",
"html_url": "https:\/\/github.com\/HanseSecure"
},
"html_url": "https:\/\/github.com\/HanseSecure\/CVE-2009-1437",
"description": null,
"fork": false,
"created_at": "2018-02-19T14:26:18Z",
"updated_at": "2019-09-01T20:20:18Z",
"pushed_at": "2018-02-23T19:27:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 121771822,
"name": "CVE-2009-2698",
"full_name": "xiaoxiaoleo\/CVE-2009-2698",
"owner": {
"login": "xiaoxiaoleo",
"id": 9813186,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9813186?v=4",
"html_url": "https:\/\/github.com\/xiaoxiaoleo"
},
"html_url": "https:\/\/github.com\/xiaoxiaoleo\/CVE-2009-2698",
"description": "CVE-2009-2698 compiled for CentOS 4.8",
"fork": false,
"created_at": "2018-02-16T16:17:24Z",
"updated_at": "2018-03-12T20:07:49Z",
"pushed_at": "2018-02-16T16:30:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 112379736,
"name": "CVE-2009-4137",
"full_name": "Alexeyan\/CVE-2009-4137",
"owner": {
"login": "Alexeyan",
"id": 6674109,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6674109?v=4",
"html_url": "https:\/\/github.com\/Alexeyan"
},
"html_url": "https:\/\/github.com\/Alexeyan\/CVE-2009-4137",
"description": "Exploit for piwik CVE-2009-4140 RCE",
"fork": false,
"created_at": "2017-11-28T19:31:47Z",
"updated_at": "2019-12-19T19:46:29Z",
"pushed_at": "2018-01-15T10:40:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 183373457,
"name": "-Ruby-dl-handle.c-CVE-2009-5147-",
"full_name": "zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-",
"owner": {
"login": "zhangyongbo100",
"id": 49974023,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/49974023?v=4",
"html_url": "https:\/\/github.com\/zhangyongbo100"
},
"html_url": "https:\/\/github.com\/zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-",
"description": null,
"fork": false,
"created_at": "2019-04-25T06:46:50Z",
"updated_at": "2020-05-20T03:19:01Z",
"pushed_at": "2019-04-25T06:49:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-03T08:22:27Z",
"updated_at": "2020-08-03T16:12:57Z",
"pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 614,
"watchers_count": 614,
"stargazers_count": 616,
"watchers_count": 616,
"forks_count": 148,
"forks": 148,
"watchers": 614,
"watchers": 616,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-03T08:22:27Z",
"updated_at": "2020-08-03T16:12:57Z",
"pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 614,
"watchers_count": 614,
"stargazers_count": 616,
"watchers_count": 616,
"forks_count": 148,
"forks": 148,
"watchers": 614,
"watchers": 616,
"score": 0
}
]

View file

@ -1,50 +1,4 @@
[
{
"id": 80148945,
"name": "extra_recipe",
"full_name": "maximehip\/extra_recipe",
"owner": {
"login": "maximehip",
"id": 6273425,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6273425?v=4",
"html_url": "https:\/\/github.com\/maximehip"
},
"html_url": "https:\/\/github.com\/maximehip\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004",
"fork": false,
"created_at": "2017-01-26T19:47:43Z",
"updated_at": "2017-01-26T19:48:19Z",
"pushed_at": "2017-01-26T19:48:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 80717942,
"name": "extra_recipe",
"full_name": "JackBro\/extra_recipe",
"owner": {
"login": "JackBro",
"id": 21210712,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21210712?v=4",
"html_url": "https:\/\/github.com\/JackBro"
},
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
"fork": false,
"created_at": "2017-02-02T11:16:38Z",
"updated_at": "2017-10-14T08:34:32Z",
"pushed_at": "2017-01-27T17:44:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 81874110,
"name": "extra_recipe-iOS-10.2",

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-03T08:22:27Z",
"updated_at": "2020-08-03T16:12:57Z",
"pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 614,
"watchers_count": 614,
"stargazers_count": 616,
"watchers_count": 616,
"forks_count": 148,
"forks": 148,
"watchers": 614,
"watchers": 616,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept exploit for CVE-2017-3599",
"fork": false,
"created_at": "2017-04-18T17:08:39Z",
"updated_at": "2020-05-15T17:39:30Z",
"updated_at": "2020-08-03T19:51:16Z",
"pushed_at": "2017-04-18T17:10:18Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 17,
"forks": 17,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 79682713,
"name": "CVE-2017-3730",
"full_name": "guidovranken\/CVE-2017-3730",
"owner": {
"login": "guidovranken",
"id": 6846644,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6846644?v=4",
"html_url": "https:\/\/github.com\/guidovranken"
},
"html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
"description": "OpenSSL CVE-2017-3730 proof-of-concept",
"fork": false,
"created_at": "2017-01-22T00:40:34Z",
"updated_at": "2018-12-04T20:01:55Z",
"pushed_at": "2017-01-26T01:30:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},
{
"id": 97466064,
"name": "OpenSSL-CVE-2017-3730",

View file

@ -128,13 +128,13 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2020-08-02T02:10:39Z",
"updated_at": "2020-08-03T18:15:37Z",
"pushed_at": "2017-11-27T16:28:14Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 68,
"forks": 68,
"watchers": 196,
"watchers": 197,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-03T08:22:27Z",
"updated_at": "2020-08-03T16:12:57Z",
"pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 614,
"watchers_count": 614,
"stargazers_count": 616,
"watchers_count": 616,
"forks_count": 148,
"forks": 148,
"watchers": 614,
"watchers": 616,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2020-07-19T02:56:57Z",
"updated_at": "2020-08-03T21:01:09Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 54,
"forks": 54,
"watchers": 198,
"watchers": 199,
"score": 0
}
]

View file

@ -82,8 +82,8 @@
"description": "A WebUSB based payload launcher for devices vulnerable to CVE-2018-6242",
"fork": false,
"created_at": "2020-05-12T20:39:24Z",
"updated_at": "2020-05-23T18:22:57Z",
"pushed_at": "2020-05-23T05:46:52Z",
"updated_at": "2020-08-03T20:44:02Z",
"pushed_at": "2020-08-03T20:44:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-24T20:40:42Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"forks_count": 4,
"forks": 4,
"watchers": 18,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2020-07-31T13:24:33Z",
"updated_at": "2020-08-03T17:08:15Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 75,
"forks": 75,
"watchers": 127,
"watchers": 126,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-09-04T17:39:35Z",
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 29,
"forks": 29,
"forks_count": 30,
"forks": 30,
"watchers": 110,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-17570 details and proof of concept",
"fork": false,
"created_at": "2020-01-24T11:32:18Z",
"updated_at": "2020-08-03T14:13:44Z",
"updated_at": "2020-08-03T15:27:54Z",
"pushed_at": "2020-06-15T22:01:13Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 8,
"forks": 8,
"watchers": 60,
"watchers": 61,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
"fork": false,
"created_at": "2019-12-08T10:44:51Z",
"updated_at": "2020-07-31T12:58:39Z",
"updated_at": "2020-08-03T15:28:46Z",
"pushed_at": "2019-12-08T17:55:01Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 9,
"forks": 9,
"watchers": 34,
"watchers": 33,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-03T08:22:27Z",
"updated_at": "2020-08-03T16:12:57Z",
"pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 614,
"watchers_count": 614,
"stargazers_count": 616,
"watchers_count": 616,
"forks_count": 148,
"forks": 148,
"watchers": 614,
"watchers": 616,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2020-08-03T14:12:56Z",
"updated_at": "2020-08-03T14:12:57Z",
"pushed_at": "2020-08-03T14:12:57Z",
"updated_at": "2020-08-03T16:13:37Z",
"pushed_at": "2020-08-03T16:13:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-04-15T11:17:39Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 29,
"score": 0
}

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-07-28T10:20:53Z",
"updated_at": "2020-08-03T17:55:20Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 818,
"watchers_count": 818,
"stargazers_count": 819,
"watchers_count": 819,
"forks_count": 213,
"forks": 213,
"watchers": 818,
"watchers": 819,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 44,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 51,
"forks": 51,
"forks_count": 52,
"forks": 52,
"watchers": 159,
"score": 0
}

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-08-03T01:30:06Z",
"updated_at": "2020-08-03T20:54:30Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 204,
"watchers_count": 204,
"forks_count": 75,
"forks": 75,
"watchers": 203,
"watchers": 204,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-07-24T14:51:57Z",
"updated_at": "2020-08-03T20:57:47Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 47,
"forks": 47,
"watchers": 116,
"watchers": 117,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-07-31T13:07:29Z",
"updated_at": "2020-08-03T15:29:45Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 382,
"watchers_count": 382,
"stargazers_count": 383,
"watchers_count": 383,
"forks_count": 89,
"forks": 89,
"watchers": 382,
"watchers": 383,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 264008888,
"name": "CVE-2009-0229-PoC",
"full_name": "zveriu\/CVE-2009-0229-PoC",
"owner": {
"login": "zveriu",
"id": 3428446,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3428446?v=4",
"html_url": "https:\/\/github.com\/zveriu"
},
"html_url": "https:\/\/github.com\/zveriu\/CVE-2009-0229-PoC",
"description": "PoC for CVE-2009-0229 \"Print Spooler Read File Vulnerability\" LPE AFR (related to CVE-2020-1048)",
"fork": false,
"created_at": "2020-05-14T19:40:50Z",
"updated_at": "2020-05-20T20:29:49Z",
"pushed_at": "2020-05-15T11:32:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 274483148,
"name": "CVE-2020-1048",

View file

@ -13,13 +13,13 @@
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2020-07-29T15:56:50Z",
"updated_at": "2020-08-03T12:21:25Z",
"updated_at": "2020-08-03T20:32:18Z",
"pushed_at": "2020-07-30T07:48:40Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 10,
"forks": 10,
"watchers": 84,
"watchers": 89,
"score": 0
}
]

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/b4ny4n"
},
"html_url": "https:\/\/github.com\/b4ny4n\/CVE-2020-13151",
"description": null,
"description": "POC for CVE-2020-13151",
"fork": false,
"created_at": "2020-08-01T14:29:59Z",
"updated_at": "2020-08-01T21:58:32Z",
"pushed_at": "2020-08-01T21:58:29Z",
"updated_at": "2020-08-03T18:55:39Z",
"pushed_at": "2020-08-03T18:55:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-07-20T03:51:06Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 63,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-08-03T08:22:27Z",
"updated_at": "2020-08-03T16:12:57Z",
"pushed_at": "2020-07-30T05:31:08Z",
"stargazers_count": 614,
"watchers_count": 614,
"stargazers_count": 616,
"watchers_count": 616,
"forks_count": 148,
"forks": 148,
"watchers": 614,
"watchers": 616,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-07-31T13:13:30Z",
"updated_at": "2020-08-03T15:28:47Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 42,
"forks": 42,
"watchers": 193,
"watchers": 192,
"score": 0
},
{

View file

@ -201,8 +201,8 @@
"pushed_at": "2020-07-05T20:32:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 11,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-20209934 POC",
"fork": false,
"created_at": "2020-07-27T22:09:01Z",
"updated_at": "2020-08-03T05:57:44Z",
"updated_at": "2020-08-03T15:15:09Z",
"pushed_at": "2020-07-28T16:39:20Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -330,7 +330,6 @@ An elevation of privilege vulnerability exists in the way that the User-Mode Pow
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070.
</code>
- [zveriu/CVE-2009-0229-PoC](https://github.com/zveriu/CVE-2009-0229-PoC)
- [shubham0d/CVE-2020-1048](https://github.com/shubham0d/CVE-2020-1048)
### CVE-2020-1054
@ -8690,8 +8689,6 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the &quot;Kernel&quot; component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app.
</code>
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
- [Rootkitsmm/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm/extra_recipe-iOS-10.2)
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
@ -8815,7 +8812,6 @@ Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Serve
In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
</code>
- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730)
- [ymmah/OpenSSL-CVE-2017-3730](https://github.com/ymmah/OpenSSL-CVE-2017-3730)
### CVE-2017-3881
@ -14109,14 +14105,6 @@ Liferay Portal through 6.2.10 allows remote authenticated users to execute arbit
## 2009
### CVE-2009-0229
<code>
The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka &quot;Print Spooler Read File Vulnerability.&quot;
</code>
- [zveriu/CVE-2009-0229-PoC](https://github.com/zveriu/CVE-2009-0229-PoC)
### CVE-2009-0473
<code>
@ -14125,14 +14113,6 @@ Open redirect vulnerability in the web interface in the Rockwell Automation Cont
- [akbarq/CVE-2009-0473](https://github.com/akbarq/CVE-2009-0473)
### CVE-2009-0689
<code>
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
</code>
- [Fullmetal5/str2hax](https://github.com/Fullmetal5/str2hax)
### CVE-2009-1151
<code>
@ -14141,14 +14121,6 @@ Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.1
- [minervais/pocs](https://github.com/minervais/pocs)
### CVE-2009-1244
<code>
Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916.
</code>
- [piotrbania/vmware_exploit_pack_CVE-2009-1244](https://github.com/piotrbania/vmware_exploit_pack_CVE-2009-1244)
### CVE-2009-1324
<code>
@ -14163,18 +14135,8 @@ Stack-based buffer overflow in Mini-stream ASX to MP3 Converter 3.0.0.7 allows r
Stack-based buffer overflow in Easy RM to MP3 Converter allows remote attackers to execute arbitrary code via a long filename in a playlist (.pls) file.
</code>
- [adenkiewicz/CVE-2009-1330](https://github.com/adenkiewicz/CVE-2009-1330)
- [war4uthor/CVE-2009-1330](https://github.com/war4uthor/CVE-2009-1330)
- [exploitwritter/CVE-2009-1330_EasyRMToMp3Converter](https://github.com/exploitwritter/CVE-2009-1330_EasyRMToMp3Converter)
### CVE-2009-1437
<code>
Stack-based buffer overflow in PortableApps CoolPlayer Portable (aka CoolPlayer+ Portable) 2.19.6 and earlier allows remote attackers to execute arbitrary code via a long string in a malformed playlist (.m3u) file. NOTE: this may overlap CVE-2008-3408.
</code>
- [HanseSecure/CVE-2009-1437](https://github.com/HanseSecure/CVE-2009-1437)
### CVE-2009-1904
<code>
@ -14191,14 +14153,6 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- [jdvalentini/CVE-2009-2692](https://github.com/jdvalentini/CVE-2009-2692)
### CVE-2009-2698
<code>
The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
</code>
- [xiaoxiaoleo/CVE-2009-2698](https://github.com/xiaoxiaoleo/CVE-2009-2698)
### CVE-2009-3103
<code>
@ -14223,14 +14177,6 @@ The StartServiceCtrlDispatcher function in the cvpnd service (cvpnd.exe) in Cisc
- [alt3kx/CVE-2009-4118](https://github.com/alt3kx/CVE-2009-4118)
### CVE-2009-4137
<code>
The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does not validate strings obtained from cookies before calling the unserialize function, which allows remote attackers to execute arbitrary code or upload arbitrary files via vectors related to the __destruct function in the Piwik_Config class; php://filter URIs; the __destruct functions in Zend Framework, as demonstrated by the Zend_Log destructor; the shutdown functions in Zend Framework, as demonstrated by the Zend_Log_Writer_Mail class; the render function in the Piwik_View class; Smarty templates; and the _eval function in Smarty.
</code>
- [Alexeyan/CVE-2009-4137](https://github.com/Alexeyan/CVE-2009-4137)
### CVE-2009-4660
<code>
@ -14246,7 +14192,6 @@ DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.
</code>
- [vpereira/CVE-2009-5147](https://github.com/vpereira/CVE-2009-5147)
- [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-)
## 2008
@ -14522,14 +14467,6 @@ Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded app
- [tagatac/libsafe-CVE-2005-1125](https://github.com/tagatac/libsafe-CVE-2005-1125)
### CVE-2005-2428
<code>
Lotus Domino R5 and R6 WebMail, with &quot;Generate HTML for all fields&quot; enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
</code>
- [schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit](https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit)
## 2004
### CVE-2004-0558